id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
197k
cpes
listlengths
0
4.89k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
GHSA-mf3m-m2fx-pq76
A vulnerability, which was classified as critical, has been found in Netgear EX6120 1.0.3.94. Affected by this issue is the function sub_30394. The manipulation of the argument host leads to buffer overflow. The attack may be launched remotely. The vendor was contacted early about this disclosure but did not respond in any way.
[]
8.7
8.8
null
null
ICSA-19-010-02
Omron CX-One CX-Protocol
Three type confusion vulnerabilities exist when processing project files. An attacker could use a specially crafted project file to exploit and execute code under the privileges of the application.CVE-2018-19027 has been assigned to this vulnerability. A CVSS v3 base score of 6.6 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H).
[]
null
null
6.6
null
GHSA-fw99-pr6r-pcfm
Integer overflow in the AAC file parsing code in Apple iTunes before 6.0.5 on Mac OS X 10.2.8 or later, and Windows XP and 2000, allows remote user-assisted attackers to execute arbitrary code via an AAC (M4P, M4A, or M4B) file with a sample table size (STSZ) atom with a "malformed" sample_size_table value.
[]
null
null
null
null
GHSA-xwf4-fv46-xv49
Multiple stack-based buffer overflows in WebGate eDVR Manager allow remote attackers to execute arbitrary code via unspecified vectors to the (1) Connect, (2) ConnectEx, or (3) ConnectEx2 function in the WESPEvent.WESPEventCtrl.1 control; (4) AudioOnlySiteChannel function in the WESPPlayback.WESPPlaybackCtrl.1 control; (5) Connect or (6) ConnectEx function in the WESPPTZ.WESPPTZCtrl.1 control; (7) SiteChannel property in the WESPPlayback.WESPPlaybackCtrl.1 control; (8) SiteName property in the WESPPlayback.WESPPlaybackCtrl.1 control; or (9) OpenDVrSSite function in the WESPPTZ.WESPPTZCtrl.1 control.
[]
null
null
null
null
ICSA-19-204-02
NREL EnergyPlus
The application fails to prevent an exception handler from being overwritten with arbitrary code.CVE-2019-10974 has been assigned to this vulnerability. A CVSS v3 base score of 6.1 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L).
[]
null
null
6.1
null
GHSA-fcc5-g273-rp3g
Multiple cross-site scripting (XSS) vulnerabilities in cgi/block.cgi in 8e6 R3000 Internet Filter allow remote attackers to inject arbitrary web script or HTML via the (1) URL, (2) CAT, and (3) USER parameters. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
[]
null
null
null
null
CVE-2022-28365
Reprise License Manager 14.2 is affected by an Information Disclosure vulnerability via a GET request to /goforms/rlminfo. No authentication is required. The information disclosed is associated with software versions, process IDs, network configuration, hostname(s), system architecture, and file/directory details.
[ "cpe:2.3:a:reprisesoftware:reprise_license_manager:14.2:*:*:*:*:*:*:*" ]
null
5.3
null
5
CVE-2023-50268
jq has stack-based buffer overflow in decNaNs
jq is a command-line JSON processor. Version 1.7 is vulnerable to stack-based buffer overflow in builds using decNumber. Version 1.7.1 contains a patch for this issue.
[ "cpe:2.3:a:jqlang:jq:1.7:*:*:*:*:*:*:*" ]
null
6.2
null
null
CVE-2014-3891
Buffer overflow in RimArts Becky! Internet Mail before 2.68 allows remote POP3 servers to execute arbitrary code via a crafted response.
[ "cpe:2.3:a:rimarts:becky\\!_internet_mail:*:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:1.26.3:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:1.26.4:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:1.26.5:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.00.0:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.00.01:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.00.02:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.00.03:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.00.04:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.00.05:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.00.06:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.00.07:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.00.08:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.00.09:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.00.10:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.00.11:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.05.00:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.05.01:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.05.02:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.05.03:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.05.04:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.05.05:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.05.06:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.05.07:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.05.08:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.05.09:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.05.10:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.05.11:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.06:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.06.02:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.07:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.07.01:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.07.02:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.07.03:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.07.04:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.08:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.08.01:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.09:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.09.01:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.10:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.10.01:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.10.02:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.10.03:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.10.04:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.11:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.11.01:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.11.02:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.12:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.12.01:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.20:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.20.01:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.20.02:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.20.03:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.20.04:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.20.05:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.20.06:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.20.07:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.21:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.21.01:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.21.02:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.21.03:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.21.04:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.22:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.22.01:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.22.02:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.23:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.24:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.24.01:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.24.02:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.25:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.25.01:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.25.02:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.26:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.27:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.28:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.28.01:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.29:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.30:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.30.01:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.30.02:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.30.03:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.30.04:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.31.00:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.40.00:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.40.01:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.40.02:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.40.03:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.40.04:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.41.00:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.42.00:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.43.00:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.44.00:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.45.00:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.45.01:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.45.02:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.46:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.47:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.47.01:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.48:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.48.01:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.48.02:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.50:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.50.01:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.50.02:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.50.03:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.50.04:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.50.05:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.50.06:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.50.07:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.51:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.51.01:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.51.02:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.51.03:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.51.04:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.51.05:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.51.06:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.51.07:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.52:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.52.01:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.52.02:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.52.03:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.53:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.54:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.55:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.56:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.56.01:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.56.02:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.56.03:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.56.04:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.56.05:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.57.00:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.57.01:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.57.02:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.57.03:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.58.00:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.59.00:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.60.00:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.60.01:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.61:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.61.01:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.62:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.63:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.64:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.64.01:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.64.02:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.64.03:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.64.04:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.64.05:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.64.06:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.65:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.65.01:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.65.02:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.65.03:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.65.04:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.65.05:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.65.06:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.65.07:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.66:*:*:*:*:*:*:*" ]
null
null
null
6.8
GHSA-v27h-j97p-wqmx
The Preview plugin in CKEditor allows Cross-site scripting (XSS)
Cross-site scripting (XSS) vulnerability in the Preview plugin before 4.4.3 in CKEditor allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
[]
6.9
null
null
null
RHSA-2016:1039
Red Hat Security Advisory: java-1.8.0-ibm security update
JDK: buffer overflow vulnerability in the IBM JVM JDK: insecure use of invoke method in CORBA component, incorrect CVE-2013-3009 fix JDK: insecure deserialization in CORBA, incorrect CVE-2013-5456 fix OpenJDK: insufficient thread consistency checks in ObjectInputStream (Serialization, 8129952) OpenJDK: insufficient byte type checks (Hotspot, 8132051) JDK: unspecified vulnerability fixed in 6u115, 7u101 and 8u91 (2D) OpenJDK: non-constant time GCM authentication tag comparison (JCE, 8143945) OpenJDK: unrestricted deserialization of authentication credentials (JMX, 8144430) JDK: unspecified vulnerability fixed in 6u115, 7u101 and 8u91 (2D) JDK: unspecified vulnerability fixed in 6u115, 7u101 and 8u91 (Deployment)
[ "cpe:/a:redhat:rhel_extras:6" ]
null
null
null
null
GHSA-2mhr-7vwh-hrjc
SQL injection vulnerability in the password recovery feature in Yeager CMS 1.2.1 allows remote attackers to change the account credentials of known users via the "userEmail" parameter.
[]
null
null
9.8
null
ICSA-22-090-05
Rockwell Automation Logix Controllers
An attacker with the ability to modify a user program may change user program code on some ControlLogix, CompactLogix, and GuardLogix Control systems. Studio 5000 Logix Designer writes user-readable program code to a separate location than the executed compiled code, allowing an attacker to change one and not the other.CVE-2022-1161 has been assigned to this vulnerability. A CVSS v3 base score of 10.0 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H).
[]
null
null
10
null
GHSA-r3m4-x4g8-pm2w
The ASUSTOR ADM 3.1.0.RFQ3 NAS portal suffers from an unauthenticated remote code execution vulnerability in the portal/apis/aggrecate_js.cgi file by embedding OS commands in the 'script' parameter.
[]
null
null
9.8
null
GHSA-2jwm-qv7q-9cc7
An information disclosure issue was addressed with improved private data redaction for log entries. This issue is fixed in tvOS 18.1, iOS 18.1 and iPadOS 18.1, iOS 17.7.1 and iPadOS 17.7.1, macOS Ventura 13.7.1, macOS Sonoma 14.7.1, watchOS 11.1, visionOS 2.1. An app may be able to leak sensitive kernel state.
[]
null
5.5
null
null
CVE-2024-11667
A directory traversal vulnerability in the web management interface of Zyxel ATP series firmware versions V5.00 through V5.38, USG FLEX series firmware versions V5.00 through V5.38, USG FLEX 50(W) series firmware versions V5.10 through V5.38, and USG20(W)-VPN series firmware versions V5.10 through V5.38 could allow an attacker to download or upload files via a crafted URL.
[ "cpe:2.3:o:zyxel:usg_flex_100h_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:usg_flex_100hp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:usg_flex_100w_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:usg_flex_200_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:usg_flex_200h_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:usg_flex_200hp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:usg_flex_500_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:usg_flex_500h_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:usg_flex_500w_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:usg_flex_50ax_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:usg_flex_50_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:usg_flex_60ax_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:usg_flex_700_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:usg_flex_700h_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:usg_flex_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:atp100_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:atp100w_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:atp500_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:atp700_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:atp800_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:atp_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:usg20-vpn_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:usg_flex_50w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:zld:*:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:atp:-:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:atp100:-:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:atp100w:-:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:atp200:-:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:atp500:-:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:atp700:-:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:atp800:-:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:usg_flex:-:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:usg_flex_100:-:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:usg_flex_100ax:-:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:usg_flex_100w:-:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:usg_flex_200:-:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:usg_flex_50:-:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:usg_flex_500:-:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:usg_flex_700:-:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:usg_flex_50w:-:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:usg_20w-vpn:-:*:*:*:*:*:*:*" ]
null
7.5
null
null
CVE-2000-1156
StarOffice 5.2 follows symlinks and sets world-readable permissions for the /tmp/soffice.tmp directory, which allows a local user to read files of the user who is using StarOffice.
[ "cpe:2.3:a:sun:staroffice:5.2:*:*:*:*:*:*:*" ]
null
null
null
3.6
CVE-2017-5239
Due to a lack of standard encryption when transmitting sensitive information over the internet to a centralized monitoring service, the Eview EV-07S GPS Tracker discloses personally identifying information, such as GPS data and IMEI numbers, to any man-in-the-middle (MitM) listener.
[ "cpe:2.3:o:eviewgps:ev-07s_gps_tracker_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:eviewgps:ev-07s_gps_tracker:-:*:*:*:*:*:*:*" ]
null
null
7.5
5
GHSA-29qg-42xm-553c
In the Linux kernel, the following vulnerability has been resolved:can: bcm: add locking for bcm_op runtime updatesThe CAN broadcast manager (CAN BCM) can send a sequence of CAN frames via hrtimer. The content and also the length of the sequence can be changed resp reduced at runtime where the 'currframe' counter is then set to zero.Although this appeared to be a safe operation the updates of 'currframe' can be triggered from user space and hrtimer context in bcm_can_tx(). Anderson Nascimento created a proof of concept that triggered a KASAN slab-out-of-bounds read access which can be prevented with a spin_lock_bh.At the rework of bcm_can_tx() the 'count' variable has been moved into the protected section as this variable can be modified from both contexts too.
[]
null
null
null
null
GHSA-79c6-5cw9-rpwc
The issue was addressed with improved checks. This issue is fixed in visionOS 2, macOS Sequoia 15. A malicious app with root privileges may be able to modify the contents of system files.
[]
null
6
null
null
GHSA-33v5-vv3q-q64q
Cross-site scripting (XSS) vulnerability in EditModule.aspx for DotNetNuke (formerly IBuySpy Workshop) 1.0.6 through 1.0.10d allows remote attackers to inject arbitrary web script or HTML.
[]
null
null
null
null
CVE-2006-0113
Enhanced Simple PHP Gallery 1.7 allows remote attackers to obtain the full path of the application via a direct request to sp_helper_functions.php, which leaks the pathname in an error message.
[ "cpe:2.3:a:enhanced_simple_php_gallery:enhanced_simple_php_gallery:1.7:*:*:*:*:*:*:*" ]
null
null
null
5
CVE-2018-14496
Vivotek FD8136 devices allow remote memory corruption and remote code execution because of a stack-based buffer overflow, related to sprintf, vlocal_buff_4326, and set_getparam.cgi. NOTE: The vendor has disputed this as a vulnerability and states that the issue does not cause a web server crash or have any other affect on it's performance
[ "cpe:2.3:o:vivotek:fd8136_firmware:0301a:*:*:*:*:*:*:*", "cpe:2.3:h:vivotek:fd8136:-:*:*:*:*:*:*:*" ]
null
null
9.8
7.5
GHSA-wfjm-v5vc-xqwp
SQL injection vulnerability in item.asp in WarHound General Shopping Cart allows remote attackers to execute arbitrary SQL commands via the ItemID parameter.
[]
null
null
null
null
CVE-2025-22983
An access control issue in the component /square/getAllSquare/circle of iceCMS v2.2.0 allows unauthenticated attackers to access sensitive information.
[]
null
7.5
null
null
GHSA-7fg4-f264-6232
A vulnerability, which was classified as problematic, was found in SourceCodester Web-based Pharmacy Product Management System 1.0. This affects an unknown part of the file add-supplier.php. The manipulation of the argument txtsupplier_name/txtaddress leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
[]
4.8
2.4
null
null
CVE-2020-25042
An arbitrary file upload issue exists in Mara CMS 7.5. In order to exploit this, an attacker must have a valid authenticated (admin/manager) session and make a codebase/dir.php?type=filenew request to upload PHP code to codebase/handler.php.
[ "cpe:2.3:a:maracms:maracms:7.5:*:*:*:*:*:*:*" ]
null
7.2
null
6.5
CVE-2016-9311
ntpd in NTP before 4.2.8p9, when the trap service is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted packet.
[ "cpe:2.3:a:ntp:ntp:*:p8:*:*:*:*:*:*" ]
null
null
5.9
7.1
GHSA-q22w-8p46-57wg
PHP remote file inclusion vulnerability in index.php in A4Desk Event Calendar, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary PHP code via a URL in the v parameter.
[]
null
null
null
null
CVE-2021-45909
An issue was discovered in gif2apng 1.9. There is a heap-based buffer overflow vulnerability in the DecodeLZW function. It allows an attacker to write a large amount of arbitrary data outside the boundaries of a buffer.
[ "cpe:2.3:a:gif2apng_project:gif2apng:1.9:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" ]
null
7.8
null
6.8
RHSA-2023:3781
Red Hat Security Advisory: python38:3.8 and python38-devel:3.8 security update
python: urllib.parse url blocklisting bypass
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
7.5
null
null
GHSA-8gfm-8wff-rjvj
An issue was discovered in HTTP2 in Qt before 5.15.18, 6.x before 6.2.13, 6.3.x through 6.5.x before 6.5.7, and 6.6.x through 6.7.x before 6.7.3. Code to make security-relevant decisions about an established connection may execute too early, because the encrypted() signal has not yet been emitted and processed..
[]
null
8.6
null
null
CVE-2023-28862
An issue was discovered in LemonLDAP::NG before 2.16.1. Weak session ID generation in the AuthBasic handler and incorrect failure handling during a password check allow attackers to bypass 2FA verification. Any plugin that tries to deny session creation after the store step does not deny an AuthBasic session.
[ "cpe:2.3:a:lemonldap-ng:lemonldap\\:\\:ng:*:*:*:*:*:*:*:*" ]
null
9.8
null
null
GHSA-cp2r-29q5-494x
The CRM WordPress Plugin – RepairBuddy plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 3.8120. This is due to the plugin not properly validating a user's identity prior to updating their email through the wc_update_user_data AJAX action. This makes it possible for authenticated attackers, with subscriber-level access and above, to change arbitrary user's email addresses, including administrators, and leverage that to reset the user's password and gain access to their account.
[]
null
8.8
null
null
CVE-2017-10719
Recently it was discovered as a part of the research on IoT devices in the most recent firmware for Shekar Endoscope that the device has default Wi-Fi credentials that are exactly the same for every device. This device acts as an Endoscope camera that allows its users to use it in various industrial systems and settings, car garages, and also in some cases in the medical clinics to get access to areas that are difficult for a human being to reach. Any breach of this system can allow an attacker to get access to video feed and pictures viewed by that user and might allow them to get a foot hold in air gapped networks especially in case of nation critical infrastructure/industries.
[ "cpe:2.3:o:ishekar:endoscope_camera_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ishekar:endoscope_camera:-:*:*:*:*:*:*:*" ]
null
null
6.5
4
GHSA-w62w-hwrh-8fpp
Cross-site scripting (XSS) vulnerability in the Google Analytics by Yoast (google-analytics-for-wordpress) plugin before 5.1.3 for WordPress allows remote attackers to inject arbitrary web script or HTML via the "Manually enter your UA code" (manual_ua_code_field) field in the General Settings.
[]
null
null
null
null
CVE-2023-40058
Sensitive Information Disclosure Vulnerability
Sensitive data was added to our public-facing knowledgebase that, if exploited, could be used to access components of Access Rights Manager (ARM) if the threat actor is in the same environment.
[ "cpe:2.3:a:solarwinds:access_rights_manager:*:*:*:*:*:*:*:*" ]
null
6.5
null
null
GHSA-5grr-wg7c-8c88
Incorrect authorization vulnerability in KONICA MINOLTA bizhub series (bizhub C750i G00-35 and earlier, bizhub C650i/C550i/C450i G00-B6 and earlier, bizhub C360i/C300i/C250i G00-B6 and earlier, bizhub 750i/650i/550i/450i G00-37 and earlier, bizhub 360i/300i G00-33 and earlier, bizhub C287i/C257i/C227i G00-19 and earlier, bizhub 306i/266i/246i/226i G00-B6 and earlier, bizhub C759/C659 GC7-X8 and earlier, bizhub C658/C558/C458 GC7-X8 and earlier, bizhub 958/808/758 GC7-X8 and earlier, bizhub 658e/558e/458e GC7-X8 and earlier, bizhub C287/C227 GC7-X8 and earlier, bizhub 287/227 GC7-X8 and earlier, bizhub 368e/308e GC7-X8 and earlier, bizhub C368/C308/C258 GC9-X4 and earlier, bizhub 558/458/368/308 GC9-X4 and earlier, bizhub C754e/C654e GDQ-M0 and earlier, bizhub 754e/654e GDQ-M0 and earlier, bizhub C554e/C454e GDQ-M1 and earlier, bizhub C364e/C284e/C224e GDQ-M1 and earlier, bizhub 554e/454e/364e/284e/224e GDQ-M1 and earlier, bizhub C754/C654 C554/C454 GR1-M0 and earlier, bizhub C364/C284/C224 GR1-M0 and earlier, bizhub 754/654 GR1-M0 and earlier, bizhub C4050i/C3350i/C4000i/C3300i G00-B6 and earlier, bizhub C3320i G00-B6 and earlier, bizhub 4750i/4050i G00-22 and earlier, bizhub 4700i G00-22 and earlier, bizhub C3851FS/C3851/C3351 GC9-X4 and earlier, and bizhub 4752/4052 GC9-X4 and earlier) allows an attacker on the adjacent network to obtain user credentials if external server authentication is enabled via a specific SOAP message sent by an administrative user.
[]
null
null
null
null
GHSA-53g7-46gp-g47p
Profile Manager in Apple Mac OS X before 10.7.5 does not properly perform authentication for the Device Management private interface, which allows attackers to enumerate managed devices via unspecified vectors.
[]
null
null
null
null
CVE-2019-16993
In phpBB before 3.1.7-PL1, includes/acp/acp_bbcodes.php has improper verification of a CSRF token on the BBCode page in the Administration Control Panel. An actual CSRF attack is possible if an attacker also manages to retrieve the session id of a reauthenticated administrator prior to targeting them.
[ "cpe:2.3:a:phpbb:phpbb:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" ]
null
8.8
null
6.8
GHSA-57hv-vqrf-h67f
Avaya IX Workforce Engagement v15.2.7.1195 - CWE-522: Insufficiently Protected Credentials
[]
null
6.5
null
null
RHSA-2006:0197
Red Hat Security Advisory: python security update
pcre heap overflow
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
CVE-2020-14811
Vulnerability in the Oracle Applications Manager product of Oracle E-Business Suite (component: AMP EBS Integration). Supported versions that are affected are 12.1.3 and 12.2.3 - 12.2.10. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Applications Manager. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Applications Manager accessible data. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).
[ "cpe:2.3:a:oracle:applications_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:applications_manager:12.1.3:*:*:*:*:*:*:*" ]
null
5.3
null
null
GHSA-8ghp-mgj8-vqhc
Cross-site scripting (XSS) vulnerability in Outlook Web Access for Exchange Server 5.5 Service Pack 4 allows remote attackers to insert arbitrary script and spoof content in HTML email or web caches via an HTML redirect query.
[]
null
null
null
null
GHSA-7fmv-6c6f-qf7m
SQL injection vulnerability in moderation.php in MyBB (aka MyBulletinBoard) 1.0.3 allows remote authenticated users, with certain privileges for moderating and merging posts, to execute arbitrary SQL commands via the posts parameter.
[]
null
null
null
null
GHSA-fq7q-wgm6-7rqj
The WP ERP | Complete HR solution with recruitment & job listings | WooCommerce CRM & Accounting WordPress plugin before 1.13.4 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
[]
null
4.8
null
null
CVE-2024-35190
Asterisk' res_pjsip_endpoint_identifier_ip: wrongly matches ALL unauthorized SIP requests
Asterisk is an open source private branch exchange and telephony toolkit. After upgrade to 18.23.0, ALL unauthorized SIP requests are identified as PJSIP Endpoint of local asterisk server. This vulnerability is fixed in 18.23.1, 20.8.1, and 21.3.1.
[ "cpe:2.3:a:asterisk:asterisk:21.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:asterisk:20.8.0:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:asterisk:18.23.0:*:*:*:*:*:*:*" ]
null
5.8
null
null
GHSA-3xq2-5f28-3fjr
An arbitrary file upload vulnerability in Poly Trio 8800 7.2.2.1094 allows attackers to execute arbitrary code via a crafted ringtone file.
[]
null
5.4
null
null
GHSA-57p7-jq6g-q5p2
WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-08-13-1 and APPLE-SA-2015-08-13-3.
[]
null
null
null
null
GHSA-756x-44c5-4g9v
Unspecified vulnerability in the Enterprise Manager Base Platform component in Oracle Enterprise Manager Grid Control 11.1.0.1, 11.2.0.4, 12.1.0.4, and 12.1.0.5 allows local users to affect confidentiality and availability via unknown vectors related to Agent Next Gen.
[]
null
null
null
null
GHSA-7c4r-hwgp-rjj4
Vulnerability in the Oracle Marketing product of Oracle E-Business Suite (component: Marketing Administration). Supported versions that are affected are 12.2.7-12.2.10. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Marketing. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Marketing accessible data as well as unauthorized access to critical data or complete access to all Oracle Marketing accessible data. CVSS 3.1 Base Score 9.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N).
[]
null
null
null
null
cisco-sa-ucsfi-imm-syn-p6kZTDQC
Cisco UCS 6400 and 6500 Series Fabric Interconnects Intersight Managed Mode Denial of Service Vulnerability
A vulnerability in system resource management in Cisco UCS 6400 and 6500 Series Fabric Interconnects that are in Intersight Managed Mode (IMM) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on the Device Console UI of an affected device. This vulnerability is due to insufficient rate-limiting of TCP connections to an affected device. An attacker could exploit this vulnerability by sending a high number of TCP packets to the Device Console UI. A successful exploit could allow an attacker to cause the Device Console UI process to crash, resulting in a DoS condition. A manual reload of the fabric interconnect is needed to restore complete functionality. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
[]
null
5.3
null
null
CVE-2004-0929
Heap-based buffer overflow in the OJPEGVSetField function in tif_ojpeg.c for libtiff 3.6.1 and earlier, when compiled with the OJPEG_SUPPORT (old JPEG support) option, allows remote attackers to execute arbitrary code via a malformed TIFF image.
[ "cpe:2.3:a:libtiff:libtiff:3.6.1:*:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux:1.0:*:desktop:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux:8:*:enterprise_server:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux:9.0:*:enterprise_server:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*" ]
null
null
null
10
GHSA-jfcv-5g7v-v55x
A vulnerability classified as critical has been found in code-projects Jonnys Liquor 1.0. This affects an unknown part of the file /admin/delete-row.php. The manipulation of the argument ID leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
[]
5.5
7.3
null
null
CVE-2008-6361
Directory traversal vulnerability in index.php in InSun Feed CMS 1.7.3 19Beta allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the lang parameter.
[ "cpe:2.3:a:insun_podcast:feedcms:1.7.3_19beta:*:*:*:*:*:*:*" ]
null
null
null
6.8
CVE-2015-6636
mediaserver in Android 5.x before 5.1.1 LMY49F and 6.0 before 2016-01-01 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file, aka internal bugs 25070493 and 24686670.
[ "cpe:2.3:o:google:android:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:5.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*" ]
null
null
9.8
10
GHSA-8cvf-fjrc-gr48
Unspecified vulnerability in Oracle Java SE 7u40 and earlier and JavaFX 2.2.40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to JavaFX.
[]
null
null
null
null
RHSA-2019:3222
Red Hat Security Advisory: systemd security and bug fix update
systemd: line splitting via fgets() allows for state injection during daemon-reexec systemd: out-of-bounds read when parsing a crafted syslog message
[ "cpe:/o:redhat:rhel_eus:7.6::computenode", "cpe:/o:redhat:rhel_eus:7.6::server" ]
null
null
4.3
null
GHSA-77gp-7427-w37r
Adobe Reader and Acrobat 10.x before 10.1.14 and 11.x before 11.0.11 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2014-9161, CVE-2015-3046, CVE-2015-3049, CVE-2015-3050, CVE-2015-3051, CVE-2015-3052, CVE-2015-3056, CVE-2015-3057, and CVE-2015-3070.
[]
null
null
null
null
CVE-2018-11226
The getString function in decompile.c in libming through 0.4.8 mishandles cases where the header indicates a file size greater than the actual size, which allows remote attackers to cause a denial of service (Segmentation fault and application crash) or possibly have unspecified other impact.
[ "cpe:2.3:a:libming:libming:*:*:*:*:*:*:*:*" ]
null
null
8.8
6.8
ICSA-22-067-01
PTC Axeda agent and Axeda Desktop Server (Update C)
The affected product uses hard-coded credentials for its UltraVNC installation. Successful exploitation of this vulnerability could allow a remote authenticated attacker to take full remote control of the host operating system.CVE-2022-25246 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). The affected product may allow an attacker to send certain commands to a specific port without authentication. Successful exploitation of this vulnerability could allow a remote unauthenticated attacker to obtain full file-system access and remote code execution.CVE-2022-25247 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). When connecting to a certain port the affected product supplies the event log of the specific service.CVE-2022-25248 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N). The affected product (disregarding Axeda agent v6.9.2 and v6.9.3) is vulnerable to directory traversal, which could allow a remote unauthenticated attacker to obtain file system read access via web server.CVE-2022-25249 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N). The affected product may allow an attacker to send a certain command to a specific port without authentication. Successful exploitation of this vulnerability could allow a remote unauthenticated attacker to shut down a specific service.CVE-2022-25250 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). The affected product may allow an attacker to send certain XML messages to a specific port without proper authentication. Successful exploitation of this vulnerability could allow a remote unauthenticated attacker to read and modify the affected product 's configuration.CVE-2022-25251 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). The affected product when receiving certain input throws an exception. Services using said function do not handle the exception. Successful exploitation of this vulnerability could allow a remote unauthenticated attacker to crash the affected product.CVE-2022-25252 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
[]
null
null
7.5
null
GHSA-9c74-22fq-7f39
Improper Host header sanitization in the dbfilter routing component in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier allows a remote attacker to deny access to the service and to disclose database names via a crafted request.
[]
null
null
6.5
null
GHSA-jf9h-jpv6-m9gx
SQL injection vulnerability in getin.php in WEBBDOMAIN Quiz 1.02 and earlier allows remote attackers to execute arbitrary SQL commands via the username parameter.
[]
null
null
null
null
CVE-2024-36918
bpf: Check bloom filter map value size
In the Linux kernel, the following vulnerability has been resolved: bpf: Check bloom filter map value size This patch adds a missing check to bloom filter creating, rejecting values above KMALLOC_MAX_SIZE. This brings the bloom map in line with many other map types. The lack of this protection can cause kernel crashes for value sizes that overflow int's. Such a crash was caught by syzkaller. The next patch adds more guard-rails at a lower level.
[]
null
null
null
null
GHSA-6xr5-5rm7-vhmx
IBM Cognos Analytics 11.1.7, 11.2.0, and 11.2.1 is vulnerable to a denial of service via email flooding caused by sending a specially-crafted request. A remote attacker could exploit this vulnerability to cause the server to consume all available CPU resources. IBM X-Force ID: 227591.
[]
null
7.5
null
null
CVE-2020-24573
BAB TECHNOLOGIE GmbH eibPort V3 prior to 3.8.3 devices allow denial of service (Uncontrolled Resource Consumption) via requests to the lighttpd component.
[ "cpe:2.3:o:bab-technologie:eibport_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:bab-technologie:eibport:v3:*:*:*:*:*:*:*" ]
null
7.5
null
5
CVE-2018-13054
An issue was discovered in Cinnamon 1.9.2 through 3.8.6. The cinnamon-settings-users.py GUI runs as root and allows configuration of (for example) other users' icon files in _on_face_browse_menuitem_activated and _on_face_menuitem_activated. These icon files are written to the respective user's $HOME/.face location. If an unprivileged user prepares a symlink pointing to an arbitrary location, then this location will be overwritten with the icon content.
[ "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:linuxmint:cinnamon:*:*:*:*:*:*:*:*" ]
null
null
8.1
5.8
CVE-2021-39036
IBM Cognos Analytics cross-site scripting
IBM Cognos Analytics 11.1 and 11.2 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 213966.
[ "cpe:2.3:a:ibm:cognos_analytics:11.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:cognos_analytics:11.2:*:*:*:*:*:*:*" ]
null
6.1
null
null
CVE-2024-3916
Swift Framework <= 2.7.31 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcodes
The Swift Framework plugin for WordPress is vulnerable to Stored Cross-Site Scripting via several of the plugin's shortcodes in all versions up to, and including, 2.7.31 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. Unfortunately, we did not receive a response from the vendor to send over the vulnerability details.
[]
null
5.3
null
null
GHSA-99q2-hw6h-hxgm
Cross-site scripting (XSS) vulnerability in the Entropy Chat script in cPanel 10.2.0-R82 and 10.6.0-R137 allows remote attackers to inject arbitrary web script or HTML via a chat message containing Javascript in style attributes in tags such as <b>, which are processed by Internet Explorer.
[]
null
null
null
null
CVE-2006-1985
Heap-based buffer overflow in BOM BOMArchiveHelper 10.4 (6.3) Build 312, as used in Mac OS X 10.4.6 and earlier, allows user-assisted attackers to execute arbitrary code via a crafted archive (such as ZIP) that contains long path names, which triggers an error in the BOMStackPop function.
[ "cpe:2.3:a:apple:safari:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:2.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:2.0.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.3.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.3.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.3.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.3.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.3.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.3.6:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.3.7:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.3.8:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.3.9:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.4.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.4.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.4.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.4.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.4.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.4.6:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.3.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.3.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.3.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.3.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.3.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.3.6:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.3.7:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.3.8:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.3.9:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.4.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.4.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.4.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.4.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.4.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.4.6:*:*:*:*:*:*:*" ]
null
null
null
5.1
CVE-2021-33348
An issue was discovered in JFinal framework v4.9.10 and below. The "set" method of the "Controller" class of jfinal framework is not strictly filtered, which will lead to XSS vulnerabilities in some cases.
[ "cpe:2.3:a:jfinal:jfinal:*:*:*:*:*:*:*:*" ]
null
6.1
null
4.3
CVE-2004-2205
Unknown vulnerability in Veritas Cluster Server 1.0.1 through 4.0 allows local users to gain root access via unspecified vectors.
[ "cpe:2.3:a:symantec_veritas:cluster_server:1.0.1_solaris:*:*:*:*:*:*:*", "cpe:2.3:a:symantec_veritas:cluster_server:1.0.2_solaris:*:*:*:*:*:*:*", "cpe:2.3:a:symantec_veritas:cluster_server:1.1.1_solaris:*:*:*:*:*:*:*", "cpe:2.3:a:symantec_veritas:cluster_server:1.1.2_solaris:*:*:*:*:*:*:*", "cpe:2.3:a:symantec_veritas:cluster_server:1.1_solaris:*:*:*:*:*:*:*", "cpe:2.3:a:symantec_veritas:cluster_server:1.2_nt:*:*:*:*:*:*:*", "cpe:2.3:a:symantec_veritas:cluster_server:1.3:*:*:*:*:*:*:*", "cpe:2.3:a:symantec_veritas:cluster_server:1.3.1_hp-ux:*:*:*:*:*:*:*", "cpe:2.3:a:symantec_veritas:cluster_server:1.3.1_p3:*:*:*:*:*:*:*", "cpe:2.3:a:symantec_veritas:cluster_server:1.3_hp-ux:*:*:*:*:*:*:*", "cpe:2.3:a:symantec_veritas:cluster_server:1.3_nt:*:*:*:*:*:*:*", "cpe:2.3:a:symantec_veritas:cluster_server:1.3_p1:*:*:*:*:*:*:*", "cpe:2.3:a:symantec_veritas:cluster_server:1.3_p2:*:*:*:*:*:*:*", "cpe:2.3:a:symantec_veritas:cluster_server:1.3_p3:*:*:*:*:*:*:*", "cpe:2.3:a:symantec_veritas:cluster_server:1.3_p4:*:*:*:*:*:*:*", "cpe:2.3:a:symantec_veritas:cluster_server:1.3_solaris:*:*:*:*:*:*:*", "cpe:2.3:a:symantec_veritas:cluster_server:1.3_solaris_pre-ga:*:*:*:*:*:*:*", "cpe:2.3:a:symantec_veritas:cluster_server:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:symantec_veritas:cluster_server:2.0_aix:*:*:*:*:*:*:*", "cpe:2.3:a:symantec_veritas:cluster_server:2.0_linux:*:*:*:*:*:*:*", "cpe:2.3:a:symantec_veritas:cluster_server:2.0_p1:*:*:*:*:*:*:*", "cpe:2.3:a:symantec_veritas:cluster_server:2.0_p2:*:*:*:*:*:*:*", "cpe:2.3:a:symantec_veritas:cluster_server:2.0_p3:*:*:*:*:*:*:*", "cpe:2.3:a:symantec_veritas:cluster_server:2.0_p4:*:*:*:*:*:*:*", "cpe:2.3:a:symantec_veritas:cluster_server:2.0_solaris:*:*:*:*:*:*:*", "cpe:2.3:a:symantec_veritas:cluster_server:2.0_solaris_beta:*:*:*:*:*:*:*", "cpe:2.3:a:symantec_veritas:cluster_server:2.0_solaris_ga:*:*:*:*:*:*:*", "cpe:2.3:a:symantec_veritas:cluster_server:2.1:*:*:*:*:*:*:*", "cpe:2.3:a:symantec_veritas:cluster_server:2.1_linux:*:*:*:*:*:*:*", "cpe:2.3:a:symantec_veritas:cluster_server:2.1_linux_p1:*:*:*:*:*:*:*", "cpe:2.3:a:symantec_veritas:cluster_server:2.2:*:*:*:*:*:*:*", "cpe:2.3:a:symantec_veritas:cluster_server:2.2_linux:*:*:*:*:*:*:*", "cpe:2.3:a:symantec_veritas:cluster_server:2.2_linux_mp1p1:*:*:*:*:*:*:*", "cpe:2.3:a:symantec_veritas:cluster_server:2.2_mp1:*:*:*:*:*:*:*", "cpe:2.3:a:symantec_veritas:cluster_server:2.2_mp2:*:*:*:*:*:*:*", "cpe:2.3:a:symantec_veritas:cluster_server:3.5:*:*:*:*:*:*:*", "cpe:2.3:a:symantec_veritas:cluster_server:3.5.1_aix:*:*:*:*:*:*:*", "cpe:2.3:a:symantec_veritas:cluster_server:3.5_aix:*:*:*:*:*:*:*", "cpe:2.3:a:symantec_veritas:cluster_server:3.5_hp-ux:*:*:*:*:*:*:*", "cpe:2.3:a:symantec_veritas:cluster_server:3.5_hp-ux_update_1:*:*:*:*:*:*:*", "cpe:2.3:a:symantec_veritas:cluster_server:3.5_hp-ux_update_2:*:*:*:*:*:*:*", "cpe:2.3:a:symantec_veritas:cluster_server:3.5_mp1:*:*:*:*:*:*:*", "cpe:2.3:a:symantec_veritas:cluster_server:3.5_mp1j:*:*:*:*:*:*:*", "cpe:2.3:a:symantec_veritas:cluster_server:3.5_mp2:*:*:*:*:*:*:*", "cpe:2.3:a:symantec_veritas:cluster_server:3.5_p1:*:*:*:*:*:*:*", "cpe:2.3:a:symantec_veritas:cluster_server:3.5_solaris:*:*:*:*:*:*:*", "cpe:2.3:a:symantec_veritas:cluster_server:3.5_solaris_beta:*:*:*:*:*:*:*", "cpe:2.3:a:symantec_veritas:cluster_server:3.5_solaris_mp1:*:*:*:*:*:*:*", "cpe:2.3:a:symantec_veritas:cluster_server:3.5_solaris_mp2:*:*:*:*:*:*:*", "cpe:2.3:a:symantec_veritas:cluster_server:3.5_solaris_mp3:*:*:*:*:*:*:*", "cpe:2.3:a:symantec_veritas:cluster_server:4.0_aix:*:*:*:*:*:*:*", "cpe:2.3:a:symantec_veritas:cluster_server:4.0_aix_beta:*:*:*:*:*:*:*", "cpe:2.3:a:symantec_veritas:cluster_server:4.0_linux:*:*:*:*:*:*:*", "cpe:2.3:a:symantec_veritas:cluster_server:4.0_linux_beta:*:*:*:*:*:*:*", "cpe:2.3:a:symantec_veritas:cluster_server:4.0_solaris:*:*:*:*:*:*:*", "cpe:2.3:a:symantec_veritas:cluster_server:4.0_solaris_beta:*:*:*:*:*:*:*" ]
null
null
null
7.2
CVE-2024-44192
The issue was addressed with improved checks. This issue is fixed in watchOS 11, macOS Sequoia 15, Safari 18, visionOS 2, iOS 18 and iPadOS 18, tvOS 18. Processing maliciously crafted web content may lead to an unexpected process crash.
[]
null
6.5
null
null
CVE-2015-8707
Password reset tokens in Magento CE before 1.9.2.2, and Magento EE before 1.14.2.2 are passed via a GET request and not canceled after use, which allows remote attackers to obtain user passwords via a crafted external service with access to the referrer field.
[ "cpe:2.3:a:magento:magento:*:*:*:*:community:*:*:*", "cpe:2.3:a:magento:magento:*:*:*:*:enterprise:*:*:*" ]
null
null
9.8
5
CVE-2022-34817
A cross-site request forgery (CSRF) vulnerability in Jenkins Failed Job Deactivator Plugin 1.2.1 and earlier allows attackers to disable jobs.
[ "cpe:2.3:a:jenkins:failed_job_deactivator:*:*:*:*:*:jenkins:*:*" ]
null
4.3
null
4.3
CVE-2022-29913
The parent process would not properly check whether the Speech Synthesis feature is enabled, when receiving instructions from a child process. This vulnerability affects Thunderbird < 91.9.
[ "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*" ]
null
6.5
null
null
CVE-2018-18748
Sandboxie 5.26 allows a Sandbox Escape via an "import os" statement, followed by os.system("cmd") or os.system("powershell"), within a .py file. NOTE: the vendor disputes this issue because the observed behavior is consistent with the product's intended functionality
[ "cpe:2.3:a:sandboxie:sandboxie:5.26:*:*:*:*:*:*:*" ]
null
null
10
10
GHSA-qjpx-gqc9-mcgx
Stack-based buffer overflow in cgi-bin/cgi_main in NUUO NVRmini 2 1.7.6 through 3.0.0 and NETGEAR ReadyNAS Surveillance 1.1.2 allows remote authenticated users to execute arbitrary code via the sn parameter to the transfer_license command.
[]
null
null
8.8
null
GHSA-49cq-qw4q-w2wj
Multiple cross-site scripting (XSS) vulnerabilities in Helm 3.2.16 allow remote attackers to inject arbitrary web script or HTML via (1) the showOption parameter to domain.asp, or the (2) Folder or (3) StartPath parameter to FileManager.asp.
[]
null
null
null
null
CVE-2020-6362
SAP Banking Services version 500, use an incorrect authorization object in some of its reports. Although the affected reports are protected with otherauthorization objects, exploitation of the vulnerability could lead to privilege escalation and violation in segregation of duties, which in turn could lead to Service interruptions and system unavailability for the victim and users of the component.
[ "cpe:2.3:a:sap:banking_services:500:*:*:*:*:*:*:*" ]
null
null
4.3
null
GHSA-83jc-959v-qgmc
OpenBSD and NetBSD permit usermode code to kill the display server and write to the X.Org /dev/xf86 device, which allows local users with root privileges to reduce securelevel by replacing the System Management Mode (SMM) handler via a write to an SMRAM address within /dev/xf86 (aka the video card memory-mapped I/O range), and then launching the new handler via a System Management Interrupt (SMI), as demonstrated by a write to Programmed I/O port 0xB2.
[]
null
null
null
null
CVE-2020-9245
HUAWEI P30 versions Versions earlier than 10.1.0.160(C00E160R2P11);HUAWEI P30 Pro versions Versions earlier than 10.1.0.160(C00E160R2P8) have a denial of service vulnerability. Certain system configuration can be modified because of improper authorization. The attacker could trick the user installing and executing a malicious application, successful exploit could cause a denial of service condition of PHONE function.
[ "cpe:2.3:o:huawei:p30_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:p30:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:p30_pro_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:p30_pro:-:*:*:*:*:*:*:*" ]
null
5.5
null
4.3
GHSA-6c88-fwg8-4qhh
Vulnerability in the Oracle Solaris product of Oracle Systems (component: Common Desktop Environment). Supported versions that are affected are 10 and 11. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Solaris executes to compromise Oracle Solaris. While the vulnerability is in Oracle Solaris, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle Solaris. CVSS 3.0 Base Score 7.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H).
[]
null
7.8
null
null
GHSA-fx34-3cr4-g3w7
Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2014-0305 and CVE-2014-0311.
[]
null
null
null
null
GHSA-gqh2-528h-q2h8
Stack-based buffer overflow in channels/chan_mgcp.c in MGCP in Asterisk 1.0 through 1.2.10 allows remote attackers to execute arbitrary code via a crafted audit endpoint (AUEP) response.
[]
null
null
null
null
GHSA-f4x7-3x4m-rmvx
luci-app-sms-tool v1.9-6 was discovered to contain a command injection vulnerability via the score parameter.
[]
null
6.3
null
null
CVE-2022-45673
Tenda AC6V1.0 V15.03.05.19 is vulnerable to Cross Site Request Forgery (CSRF) via function fromSysToolRestoreSet.
[ "cpe:2.3:o:tenda:ac6_firmware:15.03.05.19:*:*:*:*:*:*:*", "cpe:2.3:h:tenda:ac6:1.0:*:*:*:*:*:*:*" ]
null
6.5
null
null
GHSA-x5pc-m2mr-3554
LG Simple Editor Incorrect Permission Assignment Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of LG Simple Editor. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.The specific flaw exists within the product installer. The product sets incorrect permissions on folders. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-20327.
[]
null
null
7.8
null
CVE-2009-0200
Integer underflow in OpenOffice.org (OOo) before 3.1.1 and StarOffice/StarSuite 7, 8, and 9 might allow remote attackers to execute arbitrary code via crafted records in the document table of a Word document, leading to a heap-based buffer overflow.
[ "cpe:2.3:a:openoffice:openoffice.org:*:*:*:*:*:*:*:*", "cpe:2.3:a:openoffice:openoffice.org:1.0-ru:*:*:*:*:*:*:*", "cpe:2.3:a:openoffice:openoffice.org:1.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:openoffice:openoffice.org:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:openoffice:openoffice.org:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:openoffice:openoffice.org:1.0.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:openoffice:openoffice.org:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:openoffice:openoffice.org:1.1:beta:*:*:*:*:*:*", "cpe:2.3:a:openoffice:openoffice.org:1.1:beta2:*:*:*:*:*:*", "cpe:2.3:a:openoffice:openoffice.org:1.1:rc1:*:*:*:*:*:*", "cpe:2.3:a:openoffice:openoffice.org:1.1:rc3:*:*:*:*:*:*", "cpe:2.3:a:openoffice:openoffice.org:1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:openoffice:openoffice.org:1.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:openoffice:openoffice.org:1.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:openoffice:openoffice.org:1.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:openoffice:openoffice.org:1.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:openoffice:openoffice.org:1.9.84:*:*:*:*:*:*:*", "cpe:2.3:a:openoffice:openoffice.org:1.9.87:*:*:*:*:*:*:*", "cpe:2.3:a:openoffice:openoffice.org:1.9.91:*:*:*:*:*:*:*", "cpe:2.3:a:openoffice:openoffice.org:1.9.93:*:*:*:*:*:*:*", "cpe:2.3:a:openoffice:openoffice.org:1.9.95:*:*:*:*:*:*:*", "cpe:2.3:a:openoffice:openoffice.org:1.9.100:*:*:*:*:*:*:*", "cpe:2.3:a:openoffice:openoffice.org:1.9.104:*:*:*:*:*:*:*", "cpe:2.3:a:openoffice:openoffice.org:1.9.113:*:*:*:*:*:*:*", "cpe:2.3:a:openoffice:openoffice.org:1.9.118:*:*:*:*:*:*:*", "cpe:2.3:a:openoffice:openoffice.org:1.9.122:*:*:*:*:*:*:*", "cpe:2.3:a:openoffice:openoffice.org:1.9.130:*:*:*:*:*:*:*", "cpe:2.3:a:openoffice:openoffice.org:1.9.156:*:*:*:*:*:*:*", "cpe:2.3:a:openoffice:openoffice.org:1.9.680:*:*:*:*:*:*:*", "cpe:2.3:a:openoffice:openoffice.org:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:openoffice:openoffice.org:2.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:openoffice:openoffice.org:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:openoffice:openoffice.org:2.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:openoffice:openoffice.org:2.0.2:rc1:*:*:*:*:*:*", "cpe:2.3:a:openoffice:openoffice.org:2.0.2:rc2:*:*:*:*:*:*", "cpe:2.3:a:openoffice:openoffice.org:2.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:openoffice:openoffice.org:2.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:openoffice:openoffice.org:2.1:*:*:*:*:*:*:*", "cpe:2.3:a:openoffice:openoffice.org:2.1.152:*:*:*:*:*:*:*", "cpe:2.3:a:openoffice:openoffice.org:2.1.154:*:*:*:*:*:*:*", "cpe:2.3:a:openoffice:openoffice.org:2.2:*:*:*:*:*:*:*", "cpe:2.3:a:openoffice:openoffice.org:2.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:openoffice:openoffice.org:2.3:*:*:*:*:*:*:*", "cpe:2.3:a:openoffice:openoffice.org:2.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:openoffice:openoffice.org:2.4:*:*:*:*:*:*:*", "cpe:2.3:a:openoffice:openoffice.org:2.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:openoffice:openoffice.org:2.4.1:*:64-bit:*:*:*:*:*", "cpe:2.3:a:openoffice:openoffice.org:3.01:*:*:*:*:*:*:*", "cpe:2.3:a:openoffice:openoffice.org:605b:*:*:*:*:*:*:*", "cpe:2.3:a:openoffice:openoffice.org:609:*:*:*:*:*:*:*", "cpe:2.3:a:openoffice:openoffice.org:614:*:*:*:*:*:*:*", "cpe:2.3:a:openoffice:openoffice.org:619:*:*:*:*:*:*:*", "cpe:2.3:a:openoffice:openoffice.org:627:*:*:*:*:*:*:*", "cpe:2.3:a:openoffice:openoffice.org:633:*:*:*:*:*:*:*", "cpe:2.3:a:openoffice:openoffice.org:638:*:*:*:*:*:*:*", "cpe:2.3:a:openoffice:openoffice.org:638c:*:*:*:*:*:*:*", "cpe:2.3:a:openoffice:openoffice.org:641b:*:*:*:*:*:*:*", "cpe:2.3:a:openoffice:openoffice.org:641d:*:*:*:*:*:*:*", "cpe:2.3:a:openoffice:openoffice.org:643:*:*:*:*:*:*:*" ]
null
null
null
9.3
CVE-2025-46435
WordPress Time Based Greeting plugin <= 2.2.2 - CSRF to Stored XSS vulnerability
Cross-Site Request Forgery (CSRF) vulnerability in Yash Binani Time Based Greeting allows Stored XSS. This issue affects Time Based Greeting: from n/a through 2.2.2.
[]
null
7.1
null
null
CVE-2024-7703
ARMember – Membership Plugin, Content Restriction, Member Levels, User Profile & User signup <= 4.0.37 - Authenticated (Subscriber+) Stored Cross-Site Scripting via SVG File Upload
The ARMember – Membership Plugin, Content Restriction, Member Levels, User Profile & User signup plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 4.0.37 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file.
[]
null
6.4
null
null
CVE-2021-32462
Trend Micro Password Manager (Consumer) version 5.0.0.1217 and below is vulnerable to an Exposed Hazardous Function Remote Code Execution vulnerability which could allow an unprivileged client to manipulate the registry and escalate privileges to SYSTEM on affected installations. Authentication is required to exploit this vulnerability.
[ "cpe:2.3:a:trendmicro:password_manager:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
8.8
null
9
GHSA-354p-799c-vqvc
The Watu Quiz plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'watu-basic-chart' shortcode in all versions up to, and including, 3.4.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
6.4
null
null
GHSA-f8gq-c723-xwpv
Cross-Site Request Forgery (CSRF) vulnerability in SoftLab Integrate Google Drive.This issue affects Integrate Google Drive: from n/a through 1.3.4.
[]
null
4.3
null
null
GHSA-9p89-vww3-h8hf
An out-of-bounds read exists in Info-Zip UnZip version 6.10c22 that allows an attacker to perform a denial of service and read sensitive memory.
[]
null
null
9.1
null
CVE-2001-1594
GE Healthcare eNTEGRA P&R has a password of (1) entegra for the entegra user, (2) passme for the super user of the Polestar/Polestar-i Starlink 4 upgrade, (3) 0 for the entegra user of the Codonics printer FTP service, (4) eNTEGRA for the eNTEGRA P&R user account, (5) insite for the WinVNC Login, and possibly other accounts, which has unspecified impact and attack vectors. NOTE: it is not clear whether this password is default, hardcoded, or dependent on another system or product that requires a fixed value.
[ "cpe:2.3:a:gehealthcare:entegra_p\\&r:*:*:*:*:*:*:*:*" ]
null
null
null
10
ICSA-22-172-04
Phoenix Contact ProConOS and MULTIPROG
The affected product lacks an integrity check in the SDK, which could allow an attacker to upload logic with arbitrary malicious code.CVE-2022-31801 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
[]
null
null
9.8
null
CVE-2021-46242
HDF5 v1.13.1-1 was discovered to contain a heap-use-after free via the component H5AC_unpin_entry.
[ "cpe:2.3:a:hdfgroup:hdf5:1.13.1-1:*:*:*:*:*:*:*" ]
null
8.8
null
6.8
GHSA-8qf9-v635-wg7c
Couchbase Server before 7.1.0 has Incorrect Access Control.
[]
null
4.9
null
null