id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
197k
cpes
listlengths
0
4.89k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
CVE-2025-30999
WordPress WP Shopify <= 1.5.3 - Local File Inclusion Vulnerability
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Fahad Mahmood WP Shopify allows PHP Local File Inclusion. This issue affects WP Shopify: from n/a through 1.5.3.
[]
null
7.5
null
null
CVE-2000-0978
bbd server in Big Brother System and Network Monitor before 1.5c2 allows remote attackers to execute arbitrary commands via the "&" shell metacharacter.
[ "cpe:2.3:a:bb4:big_brother_network_monitor:1.5c2:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2000-0005
HP-UX aserver program allows local users to gain privileges via a symlink attack.
[ "cpe:2.3:o:hp:hp-ux:7.00:*:*:*:*:*:*:*", "cpe:2.3:o:hp:hp-ux:7.02:*:*:*:*:*:*:*", "cpe:2.3:o:hp:hp-ux:7.04:*:*:*:*:*:*:*", "cpe:2.3:o:hp:hp-ux:7.06:*:*:*:*:*:*:*", "cpe:2.3:o:hp:hp-ux:7.08:*:*:*:*:*:*:*", "cpe:2.3:o:hp:hp-ux:8.00:*:*:*:*:*:*:*", "cpe:2.3:o:hp:hp-ux:8.01:*:*:*:*:*:*:*", "cpe:2.3:o:hp:hp-ux:8.02:*:*:*:*:*:*:*", "cpe:2.3:o:hp:hp-ux:8.04:*:*:*:*:*:*:*", "cpe:2.3:o:hp:hp-ux:8.05:*:*:*:*:*:*:*", "cpe:2.3:o:hp:hp-ux:8.06:*:*:*:*:*:*:*", "cpe:2.3:o:hp:hp-ux:8.07:*:*:*:*:*:*:*", "cpe:2.3:o:hp:hp-ux:8.08:*:*:*:*:*:*:*", "cpe:2.3:o:hp:hp-ux:8.09:*:*:*:*:*:*:*", "cpe:2.3:o:hp:hp-ux:9.00:*:*:*:*:*:*:*", "cpe:2.3:o:hp:hp-ux:9.01:*:*:*:*:*:*:*", "cpe:2.3:o:hp:hp-ux:9.03:*:*:*:*:*:*:*", "cpe:2.3:o:hp:hp-ux:9.04:*:*:*:*:*:*:*", "cpe:2.3:o:hp:hp-ux:9.05:*:*:*:*:*:*:*", "cpe:2.3:o:hp:hp-ux:9.06:*:*:*:*:*:*:*", "cpe:2.3:o:hp:hp-ux:9.07:*:*:*:*:*:*:*", "cpe:2.3:o:hp:hp-ux:9.08:*:*:*:*:*:*:*", "cpe:2.3:o:hp:hp-ux:9.09:*:*:*:*:*:*:*", "cpe:2.3:o:hp:hp-ux:9.10:*:*:*:*:*:*:*", "cpe:2.3:o:hp:hp-ux:10.00:*:*:*:*:*:*:*", "cpe:2.3:o:hp:hp-ux:10.01:*:*:*:*:*:*:*", "cpe:2.3:o:hp:hp-ux:10.08:*:*:*:*:*:*:*", "cpe:2.3:o:hp:hp-ux:10.09:*:*:*:*:*:*:*", "cpe:2.3:o:hp:hp-ux:10.10:*:*:*:*:*:*:*", "cpe:2.3:o:hp:hp-ux:10.16:*:*:*:*:*:*:*", "cpe:2.3:o:hp:hp-ux:10.20:*:*:*:*:*:*:*", "cpe:2.3:o:hp:hp-ux:10.24:*:*:*:*:*:*:*", "cpe:2.3:o:hp:hp-ux:10.30:*:*:*:*:*:*:*", "cpe:2.3:o:hp:hp-ux:10.34:*:*:*:*:*:*:*", "cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*", "cpe:2.3:a:hp:aserver:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:9000:7_800:*:*:*:*:*:*:*" ]
null
null
null
7.2
CVE-2007-5707
OpenLDAP before 2.3.39 allows remote attackers to cause a denial of service (slapd crash) via an LDAP request with a malformed objectClasses attribute. NOTE: this has been reported as a double free, but the reports are inconsistent.
[ "cpe:2.3:a:openldap:openldap:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:1.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:1.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:1.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:1.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:1.2:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:1.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:1.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:1.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:1.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:1.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:1.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:1.2.7:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:1.2.8:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:1.2.9:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:1.2.10:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:1.2.11:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:1.2.12:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:1.2.13:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.0.11_9:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.0.11_11:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.0.11_11s:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.0.13:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.0.14:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.0.15:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.0.16:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.0.17:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.0.18:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.0.19:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.0.20:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.0.21:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.0.22:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.0.23:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.0.24:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.0.25:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.0.26:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.0.27:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.1.8:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.1.9:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.1.10:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.1.11:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.1.12:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.1.13:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.1.14:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.1.15:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.1.16:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.1.17:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.1.18:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.1.19:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.1.20:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.1.21:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.1.22:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.1.23:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.1.24:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.1.25:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.1.26:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.1.27:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.1.28:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.1.29:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.1.30:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.1_.20:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.2.7:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.2.8:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.2.9:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.2.10:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.2.11:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.2.12:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.2.13:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.2.14:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.2.15:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.2.16:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.2.17:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.2.18:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.2.19:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.2.20:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.2.21:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.2.22:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.2.23:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.2.24:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.2.25:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.2.26:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.2.27:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.2.28_r2:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.2.29_rev_1.134:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.3.27_2.20061018:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.3.28_2.20061022:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.3.28_20061022:*:*:*:*:*:*:*", "cpe:2.3:a:openldap:openldap:2.3.28_e1.0.0:*:*:*:*:*:*:*" ]
null
null
null
7.1
CVE-2018-17616
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of onBlur events. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-6334.
[ "cpe:2.3:a:foxitsoftware:phantompdf:*:*:*:*:*:*:*:*", "cpe:2.3:a:foxitsoftware:reader:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
null
8.8
6.8
GHSA-v92f-jx6p-73rx
Improper Control of Generation of Code ('Code Injection') in jai-ext
ImpactPrograms using jt-jiffle, and allowing Jiffle script to be provided via network request, are susceptible to a Remote Code Execution as the Jiffle script is compiled into Java code via Janino, and executed. In particular, this affects the downstream GeoServer project.PatchesVersion 1.2.22 will contain a patch that disables the ability to inject malicious code into the resulting script.WorkaroundsNegate the ability to compile Jiffle scripts from the final application, by removing janino-x.y.z.jar from the classpath.ReferencesNone.
[]
null
9.8
null
null
GHSA-3vvf-jcfx-25cj
This vulnerability allows remote attackers to execute arbitrary code on affected installations of OpenText Brava! Desktop Build 16.6.4.55. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of CGM files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-13679.
[]
null
7.8
null
null
CVE-2015-1776
Apache Hadoop 2.6.x encrypts intermediate data generated by a MapReduce job and stores it along with the encryption key in a credentials file on disk when the Intermediate data encryption feature is enabled, which allows local users to obtain sensitive information by reading the file.
[ "cpe:2.3:a:apache:hadoop:2.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:hadoop:2.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:hadoop:2.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:apache:hadoop:2.6.3:*:*:*:*:*:*:*", "cpe:2.3:a:apache:hadoop:2.6.4:*:*:*:*:*:*:*" ]
null
null
6.2
2.1
GHSA-6qcx-qr4g-4fx9
Go before 1.15.15 and 1.16.x before 1.16.7 has a race condition that can lead to a net/http/httputil ReverseProxy panic upon an ErrAbortHandler abort.
[]
null
5.9
null
null
GHSA-fw3p-p4px-mp7p
IBM Jazz Team Server 6.0.6, 6.0.6.1, 7.0, 7.0.1, and 7.0.2 could allow a remote attacker to obtain sensitive information, caused by the failure to set the HTTPOnly flag. A remote attacker could exploit this vulnerability to obtain sensitive information from the cookie. IBM X-Force ID: 194891.
[]
null
5.3
null
null
GHSA-q63r-mw4c-62hc
SQL injection vulnerability in default.php in MMSLamp allows remote attackers to execute arbitrary SQL commands via the idpro parameter in a prodotti_dettaglio action.
[]
null
null
null
null
CVE-2021-34555
OpenDMARC 1.4.1 and 1.4.1.1 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a multi-value From header field.
[ "cpe:2.3:a:trusteddomain:opendmarc:1.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:trusteddomain:opendmarc:1.4.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*" ]
null
7.5
null
5
CVE-2021-21478
SAP Web Dynpro ABAP allow an attacker to redirect users to a malicious site due to Reverse Tabnabbing vulnerabilities.
[ "cpe:2.3:a:sap:web_dynpro_abap:-:*:*:*:*:*:*:*" ]
null
null
4.7
null
GHSA-3g5h-5mpr-m5qx
SQL injection exists in Scriptzee Hotel Booking Engine 1.0 via the hotels h_room_type parameter.
[]
null
null
null
null
ICSA-19-318-05
ABB Power Generation Information Manager (PGIM) and Plant Connect
The affected product is vulnerable to authentication bypass, which may allow an attacker to remotely bypass authentication and extract credentials from the affected device.CVE-2019-18250 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
[]
null
null
9.8
null
CVE-2025-27427
Apache ActiveMQ Artemis: Address routing-type can be updated by user without the createAddress permission
A vulnerability exists in Apache ActiveMQ Artemis whereby a user with the createDurableQueue or createNonDurableQueue permission on an address can augment the routing-type supported by that address even if said user doesn't have the createAddress permission for that particular address. When combined with the send permission and automatic queue creation a user could successfully send a message with a routing-type not supported by the address when that message should actually be rejected on the basis that the user doesn't have permission to change the routing-type of the address. This issue affects Apache ActiveMQ Artemis from 2.0.0 through 2.39.0. Users are recommended to upgrade to version 2.40.0 which fixes the issue.
[]
2.3
null
null
null
GHSA-cppr-qmr8-4r9j
Null pointer dereference in some Zoom Workplace Apps for Windows may allow an authenticated user to conduct a denial of service via network access.
[]
null
6.5
null
null
RHSA-2017:3470
Red Hat Security Advisory: qemu-kvm-rhev security and bug fix update
Qemu: qemu-nbd crashes due to undefined I/O coroutine Qemu: qemu-nbd: server breaks with SIGPIPE upon client abort Qemu: exec: oob access during dma operation Qemu: i386: multiboot OOB access while loading kernel image Qemu: cirrus: OOB access issue in mode4and5 write functions
[ "cpe:/a:redhat:openstack:9::el7" ]
null
null
4.4
null
GHSA-ccx9-5rv5-mwfr
Cross-Site Request Forgery (CSRF) vulnerability in Dylan James Zephyr Project Manager plugin <= 3.3.93 versions.
[]
null
5.4
null
null
CVE-2024-44289
A privacy issue was addressed with improved private data redaction for log entries. This issue is fixed in macOS Ventura 13.7.1, macOS Sonoma 14.7.1. An app may be able to read sensitive location information.
[ "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*" ]
null
7.5
null
null
CVE-2001-0010
Buffer overflow in transaction signature (TSIG) handling code in BIND 8 allows remote attackers to gain root privileges.
[ "cpe:2.3:a:isc:bind:8.2:*:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:8.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:8.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:8.2.2:p1:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:8.2.2:p2:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:8.2.2:p3:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:8.2.2:p4:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:8.2.2:p5:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:8.2.2:p6:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:8.2.2:p7:*:*:*:*:*:*" ]
null
null
null
10
GHSA-7qr6-vjfq-429r
In the Linux kernel, the following vulnerability has been resolved:fs/erofs/fileio: call erofs_onlinefolio_split() after bio_add_folio()If bio_add_folio() fails (because it is full), erofs_fileio_scan_folio() needs to submit the I/O request via erofs_fileio_rq_submit() and allocate a new I/O request with an empty `struct bio`. Then it retries the bio_add_folio() call.However, at this point, erofs_onlinefolio_split() has already been called which increments `folio->private`; the retry will call erofs_onlinefolio_split() again, but there will never be a matching erofs_onlinefolio_end() call. This leaves the folio locked forever and all waiters will be stuck in folio_wait_bit_common().This bug has been added by commit ce63cb62d794 ("erofs: support unencoded inodes for fileio"), but was practically unreachable because there was room for 256 folios in the `struct bio` - until commit 9f74ae8c9ac9 ("erofs: shorten bvecs[] for file-backed mounts") which reduced the array capacity to 16 folios.It was now trivial to trigger the bug by manually invoking readahead from userspace, e.g.:posix_fadvise(fd, 0, st.st_size, POSIX_FADV_WILLNEED);This should be fixed by invoking erofs_onlinefolio_split() only after bio_add_folio() has succeeded. This is safe: asynchronous completions invoking erofs_onlinefolio_end() will not unlock the folio because erofs_fileio_scan_folio() is still holding a reference to be released by erofs_onlinefolio_end() at the end.
[]
null
null
null
null
GHSA-f4j2-495p-326w
In Init of protocolnetadapter.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
[]
null
5.5
null
null
CVE-2008-2434
The Trend Micro HouseCall ActiveX control 6.51.0.1028 and 6.6.0.1278 in Housecall_ActiveX.dll allows remote attackers to download an arbitrary library file onto a client system via a "custom update server" argument. NOTE: this can be leveraged for code execution by writing to a Startup folder.
[ "cpe:2.3:a:trend_micro:housecall:6.6:*:server:*:*:*:*:*", "cpe:2.3:a:trend_micro:housecall:6.6.0.1278:*:*:*:*:*:*:*", "cpe:2.3:a:trend_micro:housecall:6.51.0.1028:*:*:*:*:*:*:*" ]
null
null
null
9.3
GHSA-h4j5-2v82-4354
The domain designer component of TIBCO Software Inc.'s TIBCO JasperReports Server, TIBCO JasperReports Server Community Edition, TIBCO JasperReports Server for ActiveMatrix BPM, TIBCO Jaspersoft for AWS with Multi-Tenancy, and TIBCO Jaspersoft Reporting and Analytics for AWS contains a vulnerability which may allow, in the context of a non-default permissions configuration, persisted cross-site scripting (XSS) attacks. Affected releases include TIBCO Software Inc.'s TIBCO JasperReports Server: versions up to and including 6.2.4; 6.3.0; 6.3.2; 6.3.3; 6.4.0; 6.4.2, TIBCO JasperReports Server Community Edition: versions up to and including 6.4.2, TIBCO JasperReports Server for ActiveMatrix BPM: versions up to and including 6.4.2, TIBCO Jaspersoft for AWS with Multi-Tenancy: versions up to and including 6.4.2, TIBCO Jaspersoft Reporting and Analytics for AWS: versions up to and including 6.4.2.
[]
null
null
5.4
null
CVE-2008-4028
Microsoft Office Word 2000 SP3, 2002 SP3, 2003 SP3, and 2007 Gold and SP1; Outlook 2007 Gold and SP1; Word Viewer 2003 Gold and SP3; Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats Gold and SP1; Office 2004 and 2008 for Mac; and Open XML File Format Converter for Mac allow remote attackers to execute arbitrary code via crafted control words related to multiple Drawing Object tags in (1) an RTF file or (2) a rich text e-mail message, which triggers incorrect memory allocation and a heap-based buffer overflow, aka "Word RTF Object Parsing Vulnerability," a different vulnerability than CVE-2008-4030.
[ "cpe:2.3:a:microsoft:office:2004:*:mac:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2008:*:mac:*:*:*:*:*", "cpe:2.3:a:microsoft:office_compatibility_pack_for_word_excel_ppt_2007:*:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office_compatibility_pack_for_word_excel_ppt_2007:*:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office_word_viewer:2003:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office_word_viewer:2003:sp3:*:*:*:*:*:*", "cpe:2.3:a:microsoft:open_xml_file_format_converter:*:*:mac:*:*:*:*:*", "cpe:2.3:a:microsoft:works:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office_outlook:2007:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office_outlook:2007:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office_word:2000:sp3:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office_word:2002:sp3:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office_word:2003:sp3:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office_word:2007:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2000:sp3:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2003:sp3:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:xp:sp3:*:*:*:*:*:*", "cpe:2.3:o:microsoft:office_system:*:2007:*:*:*:*:*:*", "cpe:2.3:o:microsoft:office_system:sp1:2007:*:*:*:*:*:*" ]
null
null
null
9.3
RHSA-2019:0739
Red Hat Security Advisory: Red Hat OpenShift Container Platform 3.11 jenkins-2-plugins security update
jenkins-plugin-script-security: Sandbox Bypass in Script Security Plugin (SECURITY-1292) jenkins-plugin-script-security: Sandbox Bypass in Script Security Plugin (SECURITY-1320) jenkins-plugin-script-security: sandbox bypass in script security plugin jenkins-plugin-workflow-cps: Sandbox bypass in Pipeline: Groovy Plugin (SECURITY-1336(2)) jenkins-matrix-project-plugin: sandbox bypass in matrix project plugin jenkins-job-dsl-plugin: Script security sandbox bypass in Job DSL Plugin (SECURITY-1342)
[ "cpe:/a:redhat:openshift:3.11::el7" ]
null
null
8.8
null
GHSA-x6w3-cv3w-952r
Sudo 1.5 in Debian Linux 2.1 and Red Hat 6.0 allows local users to determine the existence of arbitrary files by attempting to execute the target filename as a program, which generates a different error message when the file does not exist.
[]
null
null
null
null
CVE-2020-28931
Lack of an anti-CSRF token in the entire administrative interface in EPSON EPS TSE Server 8 (21.0.11) allows an unauthenticated attacker to force an administrator to execute external POST requests by visiting a malicious website.
[ "cpe:2.3:o:epson:eps_tse_server_8_firmware:21.0.11:*:*:*:*:*:*:*", "cpe:2.3:h:epson:eps_tse_server_8:-:*:*:*:*:*:*:*" ]
null
8.8
null
6.8
CVE-2008-3153
SQL injection vulnerability in Triton CMS Pro allows remote attackers to execute arbitrary SQL commands via the X-Forwarded-For HTTP header.
[ "cpe:2.3:a:tritoncms:triton_cms_pro:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2015-0271
The log-viewing function in the Red Hat redhat-access-plugin before 6.0.3 for OpenStack Dashboard (horizon) allows remote attackers to read arbitrary files via a crafted path.
[ "cpe:2.3:a:redhat:openstack:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:openstack:6.0:*:*:*:*:*:*:*" ]
null
null
null
4
CVE-2023-50651
TOTOLINK X6000R v9.4.0cu.852_B20230719 was discovered to contain a remote command execution (RCE) vulnerability via the component /cgi-bin/cstecgi.cgi.
[ "cpe:2.3:o:totolink:x6000r_firmware:9.4.0cu.852_b20230719:*:*:*:*:*:*:*", "cpe:2.3:h:totolink:x6000r:-:*:*:*:*:*:*:*" ]
null
9.8
null
null
CVE-2025-0442
Inappropriate implementation in Payments in Google Chrome prior to 132.0.6834.83 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium)
[]
null
6.5
null
null
GHSA-p82g-wxxj-p2ff
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Detlef Beyer SVT Simple allows Reflected XSS.This issue affects SVT Simple: from n/a through 1.0.1.
[]
null
7.1
null
null
CVE-2015-10090
Landing Pages Plugin cross site scripting
A vulnerability, which was classified as problematic, has been found in Landing Pages Plugin up to 1.8.7 on WordPress. Affected by this issue is some unknown functionality. The manipulation leads to cross site scripting. The attack may be launched remotely. Upgrading to version 1.8.8 is able to address this issue. The name of the patch is c8e22c1340c11fedfb0a0a67ea690421bdb62b94. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-222320.
[ "cpe:2.3:a:inboundnow:landing-pages:*:*:*:*:*:wordpress:*:*" ]
null
3.5
3.5
4
CVE-2018-18361
An issue was discovered in nc-cms through 2017-03-10. index.php?action=edit_html allows XSS via the name parameter, as demonstrated by a value beginning with home_content and containing a crafted SRC attribute of an IMG element.
[ "cpe:2.3:a:nconsulting:nc-cms:*:*:*:*:*:*:*:*" ]
null
null
6.1
4.3
ICSA-18-275-03
Entes EMG 12
The application uses a web interface where it is possible for an attacker to bypass authentication with a specially crafted URL. This could allow for remote code execution. CVE-2018-14826 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). An information exposure through query strings vulnerability in the web interface has been identified, which may allow an attacker to impersonate a legitimate user and execute arbitrary code.CVE-2018-14822 has been assigned to this vulnerability. A CVSS v3 base score of 9.1 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N).
[]
null
null
9.1
null
GHSA-p2hm-2cjf-f2wg
Use of Hard-coded Cryptographic Key vulnerability in Mitsubishi Electric GX Works3 all versions allows a remote unauthenticated attacker to disclose sensitive information. As a result, unauthorized users may view or execute programs illegally.
[]
null
7.5
null
null
CVE-2020-36489
Dropouts Technologies LLP Air Share v1.2 was discovered to contain a cross-site scripting (XSS) vulnerability in the devicename parameter. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the devicename information.
[ "cpe:2.3:a:dropouts:air_share:1.2:*:*:*:*:*:*:*" ]
null
5.4
null
3.5
RHSA-2019:3218
Red Hat Security Advisory: kernel security and bug fix update
hardware: bluetooth: BR/EDR encryption key negotiation attacks (KNOB)
[ "cpe:/o:redhat:rhel_aus:7.3::server", "cpe:/o:redhat:rhel_e4s:7.3::server", "cpe:/o:redhat:rhel_tus:7.3::server" ]
null
null
7
null
GHSA-cw58-3hpw-976j
An authentication bypass vulnerability exists in the CiRpcAccepted() functionality of SoftEther VPN 4.41-9782-beta and 5.01.9674. A specially crafted network packet can lead to unauthorized access. An attacker can send a network request to trigger this vulnerability.
[]
null
7.3
null
null
CVE-2018-19158
ColossusCoinXT through 1.0.5 (a chain-based proof-of-stake cryptocurrency) allows a remote denial of service, exploitable by an attacker who acquires even a small amount of stake/coins in the system. The attacker sends invalid headers/blocks, which are stored on the victim's disk.
[ "cpe:2.3:a:colossusxt:colossuscoinxt:*:*:*:*:*:*:*:*" ]
null
7.5
null
5
CVE-2025-21539
Vulnerability in the PeopleSoft Enterprise FIN eSettlements product of Oracle PeopleSoft (component: eSettlements). The supported version that is affected is 9.2. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise FIN eSettlements. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise FIN eSettlements accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise FIN eSettlements accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N).
[ "cpe:2.3:a:oracle:peoplesoft_enterprise_fin_esettlements:9.2:*:*:*:*:*:*:*" ]
null
5.4
null
null
CVE-2003-0961
Integer overflow in the do_brk function for the brk system call in Linux kernel 2.4.22 and earlier allows local users to gain root privileges.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
null
null
null
7.2
CVE-2021-34954
Foxit PDF Editor StrikeOut Annotation Use-After-Free Remote Code Execution Vulnerability
Foxit PDF Editor StrikeOut Annotation Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Annotation objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14355.
[ "cpe:2.3:a:foxit:pdf_editor:11.0.0.49893:*:*:*:*:*:*:*" ]
null
null
7.8
null
GHSA-rj36-vf3r-744c
In the Linux kernel, the following vulnerability has been resolved:dma-buf/dma-resv: check if the new fence is really laterPreviously when we added a fence to a dma_resv object we always assumed the the newer than all the existing fences.With Jason's work to add an UAPI to explicit export/import that's not necessary the case any more. So without this check we would allow userspace to force the kernel into an use after free error.Since the change is very small and defensive it's probably a good idea to backport this to stable kernels as well just in case others are using the dma_resv object in the same way.
[]
null
null
null
null
GHSA-3q7v-8c55-wjvj
The JScript scripting engine 5.1, 5.6, 5.7, and 5.8 in JScript.dll in Microsoft Windows, as used in Internet Explorer, does not properly load decoded scripts into memory before execution, which allows remote attackers to execute arbitrary code via a crafted web site that triggers memory corruption, aka "JScript Remote Code Execution Vulnerability."
[]
null
null
null
null
CVE-2024-38971
vaeThink 1.0.2 is vulnerable to stored Cross Site Scripting (XSS) in the system backend.
[ "cpe:2.3:a:vaethink:vaethink:1.0.2:*:*:*:*:*:*:*" ]
null
5.4
null
null
CVE-2015-0504
Unspecified vulnerability in the Oracle Application Object Library component in Oracle E-Business Suite 12.0.6 and 12.1.3 allows remote attackers to affect integrity via unknown vectors related to Error Messages.
[ "cpe:2.3:a:oracle:e-business_suite:12.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:e-business_suite:12.1.3:*:*:*:*:*:*:*" ]
null
null
null
2.6
CVE-2014-8960
Cross-site scripting (XSS) vulnerability in libraries/error_report.lib.php in the error-reporting feature in phpMyAdmin 4.1.x before 4.1.14.7 and 4.2.x before 4.2.12 allows remote authenticated users to inject arbitrary web script or HTML via a crafted filename.
[ "cpe:2.3:a:phpmyadmin:phpmyadmin:4.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.1.8:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.1.9:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.1.10:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.1.11:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.1.12:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.1.13:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.1.14:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.1.14.1:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.1.14.2:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.1.14.3:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.1.14.4:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.1.14.5:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.1.14.6:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.2.7:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.2.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.2.8:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.2.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.2.9:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.2.10:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.2.11:*:*:*:*:*:*:*" ]
null
null
null
3.5
GHSA-xhg9-xwch-vr7x
quiche vulnerable to unbounded storage of information related to connection ID retirement
ImpactCloudflare quiche was discovered to be vulnerable to unbounded storage of information related to connection ID retirement, which could lead to excessive resource consumption. Each QUIC connection possesses a set of connection Identifiers (IDs); see [RFC 9000 Section 5.1](https://datatracker.ietf.org/doc/html/rfc9000#section-5.1). Endpoints declare the number of active connection IDs they are willing to support using the active_connection_id_limit transport parameter. The peer can create new IDs using a NEW_CONNECTION_ID frame but must stay within the active ID limit. This is done by retirement of old IDs, the endpoint sends NEW_CONNECTION_ID includes a value in the retire_prior_to field, which elicits a RETIRE_CONNECTION_ID frame as confirmation. An unauthenticated remote attacker can exploit the vulnerability by sending NEW_CONNECTION_ID frames and manipulating the connection (e.g. by restricting the peer's congestion window size) so that RETIRE_CONNECTION_ID frames can only be sent at a slower rate than they are received, leading to storage of information related to connection IDs in an unbounded queue.PatchesQuiche versions 0.19.2 and 0.20.1 are the earliest to address this problem. There is no workaround for affected versions.
[]
null
3.7
null
null
GHSA-qjqh-pp4q-mrg7
D-link DIR-816 A2_v1.10CNB04.img reboots the router without authentication via /goform/doReboot. No authentication is required, and reboot is executed when the function returns at the end.
[]
null
7.5
null
null
GHSA-rpv2-g4pc-wp72
Magento Open Source allows XML Injection
Adobe Commerce versions 2.4.6-p1 (and earlier), 2.4.5-p3 (and earlier) and 2.4.4-p4 (and earlier) are affected by a XML Injection (aka Blind XPath Injection) vulnerability that could lead in minor arbitrary file system read. Exploitation of this issue does not require user interaction.
[]
2.7
5.3
null
null
GHSA-994m-2xmx-fwhg
Fwmon before 1.0.10 allows remote attackers to cause a denial of service (crash) by causing the kernel to return a large packet.
[]
null
null
null
null
GHSA-r8mp-h8qj-rxw2
A vulnerability has been identified in Tecnomatix Plant Simulation (All versions < V16.0.5). The PlantSimCore.dll library lacks proper validation of user-supplied data when parsing SPP files. This could result in a stack based buffer overflow, a different vulnerability than CVE-2021-27398. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-13279)
[]
null
null
null
null
CVE-2015-6379
The XML parser in the management interface in Cisco Adaptive Security Appliance (ASA) Software 8.4 allows remote authenticated users to cause a denial of service (device crash) via a crafted XML document, aka Bug ID CSCut14223.
[ "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.0:*:*:*:*:*:*:*" ]
null
null
null
6.8
GHSA-vxcj-679q-r6q8
**VERSION NOT SUPPORTED WHEN ASSIGNED** A vulnerability could cause TCM modules to reset when under high network load in TCM v10.4.x and in system v10.3.x. This vulnerability was discovered and remediated in version v10.5.x on August 13, 2009. TCMs from v10.5.x and on will no longer exhibit this behavior.
[]
null
null
null
null
GHSA-rr34-f794-39mj
A vulnerability in the DHCP service of Cisco Industrial Network Director could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition. The vulnerability is due to improper handling of DHCP lease requests. An attacker could exploit this vulnerability by sending malicious DHCP lease requests to an affected application. A successful exploit could allow the attacker to cause the DHCP service to terminate, resulting in a DoS condition.
[]
null
null
4.3
null
RHSA-2024:4014
Red Hat Security Advisory: ghostscript security update
ghostscript: OPVP device arbitrary code execution via custom Driver library
[ "cpe:/a:redhat:rhel_e4s:9.0::appstream" ]
null
8.8
null
null
GHSA-9fvj-4grr-mv9j
An improper check or handling of exceptional conditions in NPU driver prior to SMR Jan-2022 Release 1 allows arbitrary memory write and code execution.
[]
null
7.8
null
null
GHSA-hhmm-3887-jfh7
Windows Internet Information Services Cachuri Module Denial of Service Vulnerability.
[]
null
7.5
null
null
CVE-2018-11213
An issue was discovered in libjpeg 9a. The get_text_gray_row function in rdppm.c allows remote attackers to cause a denial of service (Segmentation fault) via a crafted file.
[ "cpe:2.3:a:ijg:libjpeg:9a:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*" ]
null
null
6.5
4.3
ICSA-24-284-17
Rockwell Automation Verve Asset Manager
An improper authorization vulnerability exists in the affected products that could allow an unauthorized user to sign in. While removal of all role mappings is unlikely, it could occur in the case of unexpected or accidental removal by the administrator. If exploited, an unauthorized user could access data they previously had but should no longer have access to.
[]
null
6.8
null
null
CVE-2021-38318
3D Cover Carousel <= 1.0 Reflected Cross-Site Scripting
The 3D Cover Carousel WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the id parameter in the ~/cover-carousel.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 1.0.
[ "cpe:2.3:a:3d_cover_carousel_project:3d_cover_carousel:*:*:*:*:*:wordpress:*:*" ]
null
6.1
null
null
GHSA-f2pg-7264-3hcf
In Continuous Delivery for Puppet Enterprise (CD4PE) before 3.4.0, changes to resources or classes containing Sensitive parameters can result in the Sensitive parameters ending up in the impact analysis report.
[]
null
null
null
null
GHSA-xc8j-2crr-pqj3
Multiple PHP remote file inclusion vulnerabilities in openMairie openPlanning 1.00, when register_globals is enabled, allow remote attackers to execute arbitrary PHP code via a URL in the path_om parameter to (1) categorie.class.php, (2) profil.class.php, (3) collectivite.class.php, (4) ressource.class.php, (5) droit.class.php, (6) utilisateur.class.php, and (7) planning.class.php in obj/.
[]
null
null
null
null
CVE-2024-10600
Tongda OA 2017 submenu.php sql injection
A vulnerability, which was classified as critical, was found in Tongda OA 2017 up to 11.6. Affected is an unknown function of the file pda/appcenter/submenu.php. The manipulation of the argument appid leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
[ "cpe:2.3:a:tongda:oa_2017:*:*:*:*:*:*:*:*", "cpe:2.3:a:tongda2000:office_anywhere:*:*:*:*:*:*:*:*", "cpe:2.3:a:tongda2000:office_anywhere:2017:*:*:*:*:*:*:*" ]
6.9
7.3
7.3
7.5
CVE-2019-9812
Given a compromised sandboxed content process due to a separate vulnerability, it is possible to escape that sandbox by loading accounts.firefox.com in that process and forcing a log-in to a malicious Firefox Sync account. Preference settings that disable the sandbox are then synchronized to the local machine and the compromised browser would restart without the sandbox if a crash is triggered. This vulnerability affects Firefox ESR < 60.9, Firefox ESR < 68.1, and Firefox < 69.
[ "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*" ]
null
9.3
null
5.8
CVE-2013-1331
Buffer overflow in Microsoft Office 2003 SP3 and Office 2011 for Mac allows remote attackers to execute arbitrary code via crafted PNG data in an Office document, leading to improper memory allocation, aka "Office Buffer Overflow Vulnerability."
[ "cpe:2.3:a:microsoft:office:2003:sp3:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2011:*:*:*:*:macos:*:*" ]
null
7.8
null
9.3
ICSA-22-069-05
Siemens Simcenter STAR-CCM+ Viewer
The starview+.exe contains a memory corruption vulnerability while parsing specially crafted .SCE files. This could allow an attacker to execute code in the context of the current process.
[]
null
7.8
null
null
GHSA-j8m5-chrv-m4wv
Cross-Site Request Forgery (CSRF) vulnerability in Roland Barker, xnau webdesign Participants Database plugin <= 2.4.5 leads to list column update.
[]
null
4.3
null
null
CVE-2024-20710
Adobe Substance 3D Stager v2.1.1 Vulnerability I
Adobe Substance 3D Stager versions 2.1.3 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[ "cpe:2.3:a:adobe:substance_3d_stager:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
5.5
null
null
GHSA-j9h7-v335-8gcp
A CWE-334: Small Space of Random Values vulnerability exists in Modicon M221 (all references, all versions) that could allow the attacker to break the encryption keys when the attacker has captured the traffic between EcoStruxure Machine - Basic software and Modicon M221 controller.
[]
null
null
null
null
GHSA-rv89-xjc2-9wp5
Race condition in IBM Web Content Manager (WCM) 7.0.0.1 before CF003 allows remote authenticated users to cause a denial of service (infinite recursive query) via unspecified vectors, related to a StackOverflowError exception.
[]
null
null
null
null
CVE-2009-1838
The garbage-collection implementation in Mozilla Firefox before 3.0.11, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.17 sets an element's owner document to null in unspecified circumstances, which allows remote attackers to execute arbitrary JavaScript with chrome privileges via a crafted event handler, related to an incorrect context for this event handler.
[ "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.9:rc:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.9.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.9.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.9.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.9_rc:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.10:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.10.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0:preview_release:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.6:*:linux:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5:beta1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5:beta2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0:beta_1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.13:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.14:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.15:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.16:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.17:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.18:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.19:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.20:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.21:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0_.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0_.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0_.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0_.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0_.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0_.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0_.10:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0_8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0:alpha:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0:beta5:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0beta5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0:*:alpha:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0:*:beta:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0:*:dev:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0:alpha:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0:beta:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0.99:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1:alpha:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.5:1.1.10:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.10:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.11:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.12:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.13:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.15:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:0.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:0.7.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:0.7.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:0.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.0.5:beta:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5:beta2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5.0.13:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5.0.14:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.7.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.13:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.14:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.15:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.16:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.17:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.18:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0_.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0_.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0_.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0_.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0_.12:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0_.13:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0_.14:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0_8:*:*:*:*:*:*:*" ]
null
null
null
9.3
GHSA-62gv-4jrq-r6pg
Rejected reason: Not used
[]
null
null
null
null
CVE-2015-0655
Cross-site scripting (XSS) vulnerability in Unified Web Interaction Manager in Cisco Unified Web and E-Mail Interaction Manager allows remote attackers to inject arbitrary web script or HTML via vectors related to a POST request, aka Bug ID CSCus74184.
[ "cpe:2.3:a:cisco:unified_web_and_e-mail_interaction_manager:-:*:*:*:*:*:*:*" ]
null
null
null
4.3
GHSA-8hh4-32mr-38xc
A vulnerability classified as critical was found in Digiwin ERP 5.0.1. Affected by this vulnerability is an unknown functionality of the file /Api/TinyMce/UploadAjaxAPI.ashx. The manipulation of the argument File leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
[]
5.3
6.3
null
null
GHSA-c339-mwfc-fmr2
Openshift Hive Exposes VCenter Credentials via ClusterProvision
A flaw was found in Hive, a component of Multicluster Engine (MCE) and Advanced Cluster Management (ACM). This vulnerability causes VCenter credentials to be exposed in the ClusterProvision object after provisioning a VSphere cluster. Users with read access to ClusterProvision objects can extract sensitive credentials even if they do not have direct access to Kubernetes Secrets. This issue can lead to unauthorized VCenter access, cluster management, and privilege escalation.
[]
null
8.2
null
null
GHSA-8pwj-qgrj-p95h
The kernel in Amazon Web Services FreeRTOS before 10.4.3 has insufficient bounds checking during management of heap memory.
[]
null
null
null
null
GHSA-v5mp-683j-2r34
Rejected reason: Not used
[]
null
null
null
null
CVE-2025-26640
Windows Digital Media Elevation of Privilege Vulnerability
Use after free in Windows Digital Media allows an authorized attacker to elevate privileges locally.
[]
null
7
null
null
GHSA-78jw-247w-7prv
IBM Notes is susceptible to a stack based buffer overflow vulnerability in lasr.dll in Micro Focus KeyView. This could allow a remote unauthenticated attacker to crash the application or execute arbitrary code via a crafted Lotus Ami Pro file. This is different from the vulnerability described in CVE-2022-44751.
[]
null
7.8
null
null
CVE-2002-0630
The Telnet service for Polycom ViewStation before 7.2.4 allows remote attackers to cause a denial of service (crash) via long or malformed ICMP packets.
[ "cpe:2.3:h:polycom:viewstation_128:6.5.1:*:*:*:*:*:*:*", "cpe:2.3:h:polycom:viewstation_128:7.2:*:*:*:*:*:*:*", "cpe:2.3:h:polycom:viewstation_512:6.5.1:*:*:*:*:*:*:*", "cpe:2.3:h:polycom:viewstation_512:7.2:*:*:*:*:*:*:*", "cpe:2.3:h:polycom:viewstation_dcp:6.5.1:*:*:*:*:*:*:*", "cpe:2.3:h:polycom:viewstation_dcp:7.2:*:*:*:*:*:*:*", "cpe:2.3:h:polycom:viewstation_fx_vs4000:4.1.5:*:*:*:*:*:*:*", "cpe:2.3:h:polycom:viewstation_h.323:6.5.1:*:*:*:*:*:*:*", "cpe:2.3:h:polycom:viewstation_h.323:7.2:*:*:*:*:*:*:*", "cpe:2.3:h:polycom:viewstation_mp:6.5.1:*:*:*:*:*:*:*", "cpe:2.3:h:polycom:viewstation_mp:7.2:*:*:*:*:*:*:*", "cpe:2.3:h:polycom:viewstation_sp_384:6.5.1:*:*:*:*:*:*:*", "cpe:2.3:h:polycom:viewstation_sp_384:7.2:*:*:*:*:*:*:*", "cpe:2.3:h:polycom:viewstation_v.35:6.5.1:*:*:*:*:*:*:*", "cpe:2.3:h:polycom:viewstation_v.35:7.2:*:*:*:*:*:*:*" ]
null
null
null
5
PYSEC-2022-67
null
Tensorflow is an Open Source Machine Learning Framework. An attacker can craft a TFLite model that would cause an integer overflow in `TfLiteIntArrayCreate`. The `TfLiteIntArrayGetSizeInBytes` returns an `int` instead of a `size_t. An attacker can control model inputs such that `computed_size` overflows the size of `int` datatype. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
[]
null
null
null
null
GHSA-jfjv-fh74-wcf5
An issue was discovered in Das U-Boot through 2019.07. There is a stack-based buffer overflow in this nfs_handler reply helper function: nfs_mount_reply.
[]
null
null
null
null
CVE-2019-12103
The web-based configuration interface of the TP-Link M7350 V3 with firmware before 190531 is affected by a pre-authentication command injection vulnerability.
[ "cpe:2.3:o:tp-link:m7350_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:m7350:v3:*:*:*:*:*:*:*" ]
null
null
9.8
10
RHSA-2005:057
Red Hat Security Advisory: gpdf security update
security flaw security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
GHSA-hfgr-rp42-29cp
A vulnerability was found in SourceCodester Judging Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file summary_results.php. The manipulation of the argument main_event_id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-223549 was assigned to this vulnerability.
[]
null
9.8
null
null
GHSA-xg8v-m2mh-45m6
PsiTransfer: Violation of the integrity of file distribution
**Summary** The absence of restrictions on the endpoint, which allows you to create a path for uploading a file in a file distribution, allows an attacker to add arbitrary files to the distribution.**Details** Vulnerable endpoint: POST /files**PoC**Create a file distribution. <img width="1434" alt="Снимок экрана 2024-03-17 в 21 27 30" src="https://github.com/psi-4ward/psitransfer/assets/163760990/4634a6f7-6e7d-486e-9929-76156aaa1340">Go to the link address (id of the file distribution is needed by an attacker to upload files there). <img width="1426" alt="Снимок экрана 2024-03-17 в 21 27 35" src="https://github.com/psi-4ward/psitransfer/assets/163760990/a57c910c-69e2-4b07-985d-b0a46c69891a">Send a POST /files. As the value of the Upload-Metadata header we specify the sid parameter with the id of the file distribution obtained in the second step. In the response from the server in the Location header we get the path for uploading a new file to the file distribution. <img width="1403" alt="Снимок экрана 2024-03-17 в 21 28 09" src="https://github.com/psi-4ward/psitransfer/assets/163760990/8b839fb8-2c0b-432f-8503-e4c42a840056">Send a PATCH /files/{{id}} request with arbitrary content in the request body. Id is taken from the previous step. <img width="1067" alt="Снимок экрана 2024-03-17 в 21 28 51" src="https://github.com/psi-4ward/psitransfer/assets/163760990/c5b2acf3-fdf1-4780-8c63-61a7f19338df">Result: <img width="1432" alt="Снимок экрана 2024-03-17 в 21 29 05" src="https://github.com/psi-4ward/psitransfer/assets/163760990/c49b17c8-e1d2-4894-b6e2-f50b9663fca7"> <img width="1424" alt="Снимок экрана 2024-03-17 в 21 29 15" src="https://github.com/psi-4ward/psitransfer/assets/163760990/e4a1e07d-3e77-4f61-a4e7-ceee4a5a7b8e">**Impact** The vulnerability allows an attacker to influence those users who come to the file distribution after him and slip the victim files with a malicious or phishing signature.
[]
null
6.5
null
null
GHSA-34rp-625w-j33p
StarWind SAN & NAS build 1578 and StarWind Command Center Build 6864 Update Manager allows authentication with JTW token which is signed with any key. An attacker could use self-signed JTW token to bypass authentication resulting in escalation of privileges.
[]
null
9.8
null
null
CVE-2025-4089
Due to insufficient escaping of special characters in the "copy as cURL" feature, an attacker could trick a user into using this command, potentially leading to local code execution on the user's system. This vulnerability affects Firefox < 138 and Thunderbird < 138.
[]
null
5.1
null
null
GHSA-j6hc-65ch-6v6p
The LearnPress – WordPress LMS Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Course, Lesson, and Quiz title and content in all versions up to, and including, 4.2.6.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with LP Instructor-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
4.4
null
null
CVE-2024-42484
ESP-NOW OOB Vulnerability In Group Type Message
ESP-NOW Component provides a connectionless Wi-Fi communication protocol. An Out-of-Bound (OOB) vulnerability was discovered in the implementation of the ESP-NOW group type message because there is no check for the addrs_num field of the group type message. This can result in memory corruption related attacks. Normally there are two fields in the group information that need to be checked, i.e., the addrs_num field and the addrs_list fileld. Since we only checked the addrs_list field, an attacker can send a group type message with an invalid addrs_num field, which will cause the message handled by the firmware to be much larger than the current buffer, thus causing a memory corruption issue that goes beyond the payload length.
[ "cpe:2.3:a:espressif:esp-now:*:*:*:*:*:*:*:*" ]
null
6.5
null
null
CVE-2022-38539
Archery v1.7.5 to v1.8.5 was discovered to contain a SQL injection vulnerability via the where parameter at /archive/apply.
[ "cpe:2.3:a:archerydms:archery:*:*:*:*:*:*:*:*" ]
null
9.8
null
null
GHSA-cw8p-532r-7gqx
MariaDB Server v10.7 and below was discovered to contain a global buffer overflow in the component decimal_bin_size, which is exploited via specially crafted SQL statements.
[]
null
7.5
null
null
CVE-2021-44154
An issue was discovered in Reprise RLM 14.2. By using an admin account, an attacker can write a payload to /goform/edit_opt, which will then be triggered when running the diagnostics (via /goform/diagnostics_doit), resulting in a buffer overflow.
[ "cpe:2.3:a:reprisesoftware:reprise_license_manager:14.2:*:*:*:*:*:*:*" ]
null
7.2
null
6.5
GHSA-qc53-6pcv-3q2p
An issue was discovered in Insyde InsydeH2O kernel 5.2 before version 05.29.50, kernel 5.3 before version 05.38.50, kernel 5.4 before version 05.46.50, kernel 5.5 before version 05.54.50, kernel 5.6 before version 05.61.50, and kernel 5.7 before version 05.70.50. In VariableRuntimeDxe driver, VariableServicesSetVariable () can be called by gRT_>SetVariable () or the SmmSetSensitiveVariable () or SmmInternalSetVariable () from SMM. In VariableServicesSetVariable (), it uses StrSize () to get variable name size, uses StrLen () to get variable name length and uses StrCmp () to compare strings. These actions may cause a buffer over-read.
[]
null
7.5
null
null
CVE-2006-3417
Tor client before 0.1.1.20 prefers entry points based on is_fast or is_stable flags, which could allow remote attackers to be preferred over nodes that are identified as more trustworthy "entry guard" (is_guard) systems by directory authorities.
[ "cpe:2.3:a:tor:tor:0.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.0.2_pre13:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.0.2_pre14:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.0.2_pre15:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.0.2_pre16:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.0.2_pre17:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.0.2_pre18:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.0.2_pre19:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.0.2_pre20:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.0.2_pre21:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.0.2_pre22:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.0.2_pre23:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.0.2_pre24:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.0.2_pre25:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.0.2_pre26:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.0.2_pre27:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.0.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.0.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.0.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.0.7.2:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.0.7.3:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.0.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.0.9.1:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.0.9.2:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.0.9.3:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.0.9.4:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.0.9.5:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.0.9.6:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.0.9.7:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.0.9.8:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.0.9.9:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.0.9.10:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.0.13:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.0.14:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.0.15:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.0.16:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.0.17:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.0.18:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.0.19:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.1.1_alpha:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.1.2_alpha:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.1.3_alpha:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.1.4_alpha:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.1.5_alpha:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.1.6_alpha:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.1.7_alpha:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.1.8_alpha:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.1.9_alpha:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.1.10_alpha:*:*:*:*:*:*:*" ]
null
null
null
6.4
CVE-2018-20962
The Backpack\CRUD Backpack component before 3.4.9 for Laravel allows XSS via the select field type.
[ "cpe:2.3:a:backpackforlaravel:backpack\\\\crud:*:*:*:*:*:*:*:*" ]
null
null
6.1
4.3