id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
4.89k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2024-22096 | Relative Path Traversal in Rapid SCADA | In Rapid Software LLC's Rapid SCADA versions prior to Version 5.8.4, an attacker can append path traversal characters to the filename when using a specific command, allowing them to read arbitrary files from the system.
| [
"cpe:2.3:a:rapidscada:rapid_scada:*:*:*:*:*:*:*:*"
]
| null | 6.5 | null | null |
GHSA-vw95-gg42-q3x6 | libautotrace.a in AutoTrace 0.31.1 has a "cannot be represented in type int" issue in pxl-outline.c:106:54. | []
| null | null | 9.8 | null |
|
GHSA-p4f3-r6cj-mw74 | AeroAdmin 4.1 uses a function to copy data between two pointers where the size of the data copied is taken directly from a network packet. This can cause a buffer overflow and denial of service. | []
| null | null | 7.5 | null |
|
CVE-2023-46842 | x86 HVM hypercalls may trigger Xen bug check | Unlike 32-bit PV guests, HVM guests may switch freely between 64-bit and
other modes. This in particular means that they may set registers used
to pass 32-bit-mode hypercall arguments to values outside of the range
32-bit code would be able to set them to.
When processing of hypercalls takes a considerable amount of time,
the hypervisor may choose to invoke a hypercall continuation. Doing so
involves putting (perhaps updated) hypercall arguments in respective
registers. For guests not running in 64-bit mode this further involves
a certain amount of translation of the values.
Unfortunately internal sanity checking of these translated values
assumes high halves of registers to always be clear when invoking a
hypercall. When this is found not to be the case, it triggers a
consistency check in the hypervisor and causes a crash.
| []
| null | 6.5 | null | null |
GHSA-c3c7-9cj5-pr3c | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in CRM Perks CRM Perks Forms – WordPress Form Builder allows Stored XSS.This issue affects CRM Perks Forms – WordPress Form Builder: from n/a through 1.1.2. | []
| null | 5.9 | null | null |
|
GHSA-q35c-c2jc-37j6 | Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Gopi Ramasamy Vertical scroll recent post plugin <= 14.0 versions. | []
| null | 6.5 | null | null |
|
CVE-2024-30416 | Use After Free (UAF) vulnerability in the underlying driver module.
Impact: Successful exploitation of this vulnerability will affect availability. | [
"cpe:2.3:o:huawei:harmonyos:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:2.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*"
]
| null | 7.5 | null | null |
|
GHSA-p469-ghp4-p7hq | Adobe Acrobat and Reader versions, 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2017.011.30142 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have a heap overflow vulnerability. Successful exploitation could lead to arbitrary code execution. | []
| null | null | null | null |
|
cisco-sa-rv-multi-lldp-u7e4chCe | Cisco Small Business RV Series Routers Link Layer Discovery Protocol Vulnerabilities | Multiple vulnerabilities exist in the Link Layer Discovery Protocol (LLDP) implementation for Cisco Small Business RV Series Routers. An unauthenticated, adjacent attacker could execute arbitrary code or cause an affected router to leak system memory or reload. A memory leak or device reload would cause a denial of service (DoS) condition on an affected device.
For more information about these vulnerabilities, see the Details ["#details"] section of this advisory.
Note: LLDP is a Layer 2 protocol. To exploit these vulnerabilities, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent).
Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.
| []
| null | 7.4 | null | null |
CVE-2004-0388 | The mysqld_multi script in MySQL allows local users to overwrite arbitrary files via a symlink attack. | [
"cpe:2.3:a:oracle:mysql:5.0.33:*:*:*:*:*:*:*"
]
| null | null | null | 2.1 |
|
GHSA-56rf-q4xp-9h6w | An issue was discovered in Motorola CX2 1.01 and M2 1.01. There is a command injection in the function downloadFirmware in hnap, which leads to remote code execution via shell metacharacters in a JSON value. | []
| null | null | null | null |
|
GHSA-rc9x-h469-w6gc | A correctness issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14.5. An app may be able to read arbitrary files. | []
| null | 6.2 | null | null |
|
GHSA-53gp-9cgv-fj68 | smss.exe debugging subsystem in Windows NT and Windows 2000 does not properly authenticate programs that connect to other programs, which allows local users to gain administrator or SYSTEM privileges by duplicating a handle to a privileged process, as demonstrated by DebPloit. | []
| null | 7.8 | null | null |
|
CVE-2024-54285 | WordPress SeedProd Pro plugin <= 6.18.10 - Remote Code Execution (RCE) vulnerability | Unrestricted Upload of File with Dangerous Type vulnerability in SeedProd LLC SeedProd Pro allows Upload a Web Shell to a Web Server.This issue affects SeedProd Pro: from n/a through 6.18.10. | []
| null | 9.1 | null | null |
RHSA-2020:5163 | Red Hat Security Advisory: thunderbird security update | Mozilla: Write side effects in MCallGetProperty opcode not accounted for | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
]
| null | null | 8.8 | null |
GHSA-pr6v-87q4-3hj8 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in HasThemes Extensions For CF7 allows Stored XSS.This issue affects Extensions For CF7: from n/a through 3.0.6. | []
| null | 7.1 | null | null |
|
GHSA-8fxj-h3w5-87xc | Multiple SQL injection vulnerabilities in index.asp in FipsSHOP allow remote attackers to execute arbitrary SQL commands via the (1) cat or (2) did parameter. | []
| null | null | null | null |
|
GHSA-67vc-8g25-fcqm | The Linux Foundation ONOS 2.0.0 and earlier is affected by: Poor Input-validation. The impact is: A network administrator (or attacker) can install unintended flow rules in the switch by mistake. The component is: createFlow() and createFlows() functions in FlowWebResource.java (RESTful service). The attack vector is: network management and connectivity. | []
| null | null | 4.9 | null |
|
GHSA-qcm7-2qvw-4c58 | The Remote Data Service (RDS) DataFactory component of Microsoft Data Access Components (MDAC) in IIS 3.x and 4.x exposes unsafe methods, which allows remote attackers to execute arbitrary commands. | []
| null | null | null | null |
|
GHSA-mx5w-cv3g-w9v3 | Unspecified vulnerability in the SetLicenseInfoEx method in an ActiveX control in mraboutb.dll in IBM SPSS Dimensions 5.5 and SPSS Data Collection 5.6, 6.0, and 6.0.1 allows remote attackers to execute arbitrary code via a crafted HTML document. | []
| null | null | null | null |
|
CVE-2021-38961 | IBM OPENBMC OP910 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 212049. | [
"cpe:2.3:o:ibm:power_system_ac922_\\(8335-gtg\\)_firmware:op910:*:*:*:*:*:*:*",
"cpe:2.3:h:ibm:power_system_ac922_\\(8335-gtg\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:power_system_ac922_\\(8335-gtc\\)_firmware:op910:*:*:*:*:*:*:*",
"cpe:2.3:h:ibm:power_system_ac922_\\(8335-gtc\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:power_system_ac922_\\(8335-gtw\\)_firmware:op910:*:*:*:*:*:*:*",
"cpe:2.3:h:ibm:power_system_ac922_\\(8335-gtw\\):-:*:*:*:*:*:*:*"
]
| null | null | 6.1 | null |
|
CVE-2013-3089 | Cross-site request forgery (CSRF) vulnerability in apply.cgi in Belkin N300 (F7D7301v1) router allows remote attackers to hijack the authentication of administrators for requests that modify configuration. | [
"cpe:2.3:o:belkin:n300_firmware:1.00.06:*:*:*:*:*:*:*",
"cpe:2.3:h:belkin:n300:-:*:*:*:*:*:*:*"
]
| null | null | null | 6.8 |
|
GHSA-xj7r-q24h-7jww | Cisco NX-OS 1.1(1g) on Nexus 9000 devices allows remote authenticated users to discover cleartext passwords by leveraging the existence of a decryption mechanism, aka Bug ID CSCuu84391. | []
| null | null | null | null |
|
GHSA-ph66-m9wc-38mf | A stored-self XSS exists in web/skins/classic/views/zones.php of ZoneMinder through 1.32.3, allowing an attacker to execute HTML or JavaScript code in a vulnerable field via a crafted Zone NAME to the index.php?view=zones&action=zoneImage&mid=1 URI. | []
| null | null | 5.4 | null |
|
RHSA-2022:7261 | Red Hat Security Advisory: OpenShift API for Data Protection (OADP) 1.0.5 security and bug fix update | prometheus/client_golang: Denial of service using InstrumentHandlerCounter | [
"cpe:/a:redhat:openshift_api_data_protection:1.0::el8"
]
| null | 7.5 | null | null |
CVE-2020-3427 | Duo Authentication for Windows Logon and RDP Privilege Escalation Vulnerability | The Windows Logon installer prior to 4.1.2 did not properly validate file installation paths. This allows an attacker with local user privileges to coerce the installer to write to arbitrary privileged directories. If successful, an attacker can manipulate files used by Windows Logon, cause Denial of Service (DoS) by deleting file(s), or replace system files to potentially achieve elevation of privileges. Note that this can only exploitable during new installations while the installer is running and is not exploitable once installation is finished. Versions 4.1.2 of Windows Logon addresses this issue. | [
"cpe:2.3:a:cisco:duo_authentication_for_windows_logon_and_rdp:*:*:*:*:*:*:*:*"
]
| null | 6.6 | null | null |
GHSA-hx36-3mj4-89jh | An issue was discovered in certain Apple products. iOS before 10.3.2 is affected. tvOS before 10.2.1 is affected. watchOS before 3.2.2 is affected. The issue involves the "AVEVideoEncoder" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app. | []
| null | null | 7.8 | null |
|
CVE-2008-0184 | Absolute path traversal vulnerability in index.php in Sys-Hotel on Line System allows remote attackers to read arbitrary files via an encoded "/" ("%2F") in the file parameter. | [
"cpe:2.3:a:prenotazioni_on_line:syshotel_on_line_system:*:*:*:*:*:*:*:*"
]
| null | null | null | 6.4 |
|
CVE-2018-1000830 | XR3Player version <= V3.124 contains a XML External Entity (XXE) vulnerability in Playlist parser that can result in Disclosure of confidential data, denial of service, SSRF, port scanning. | [
"cpe:2.3:a:xr3player_project:xr3player:*:*:*:*:*:*:*:*"
]
| null | null | 10 | 7.5 |
|
RHSA-2019:4074 | Red Hat Security Advisory: OpenShift Container Platform 4.2 runc security update | runc: AppArmor/SELinux bypass with malicious image that specifies a volume at /proc | [
"cpe:/a:redhat:openshift:4.2::el8"
]
| null | null | 6.5 | null |
GHSA-pfr4-4397-3hg8 | seajs Cross-site Scripting vulnerability | Cross Site Scripting vulnerability in seajs v.2.2.3 allows a remote attacker to execute arbitrary code via the seajs package | []
| 2.1 | null | null | null |
CVE-2017-7779 | Memory safety bugs were reported in Firefox 54, Firefox ESR 52.2, and Thunderbird 52.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird < 52.3, Firefox ESR < 52.3, and Firefox < 55. | [
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*"
]
| null | null | 9.8 | 10 |
|
GHSA-8ff3-4xrr-3mhr | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Sandeep Verma HTML5 Lyrics Karaoke Player allows Reflected XSS.This issue affects HTML5 Lyrics Karaoke Player: from n/a through 2.4. | []
| null | 7.1 | null | null |
|
GHSA-6wvh-43r9-m9g8 | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in vlad.olaru Fonto allows Path Traversal. This issue affects Fonto: from n/a through 1.2.2. | []
| null | 4.9 | null | null |
|
CVE-2022-30789 | A crafted NTFS image can cause a heap-based buffer overflow in ntfs_check_log_client_array in NTFS-3G through 2021.8.22. | [
"cpe:2.3:a:tuxera:ntfs-3g:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*"
]
| null | 7.8 | null | 4.6 |
|
GHSA-75jm-2xrg-5wpf | A flaw was found in Python, specifically within the urllib.parse module. This module helps break Uniform Resource Locator (URL) strings into components. The issue involves how the urlparse method does not sanitize input and allows characters like '\r' and '\n' in the URL path. This flaw allows an attacker to input a crafted URL, leading to injection attacks. This flaw affects Python versions prior to 3.10.0b1, 3.9.5, 3.8.11, 3.7.11 and 3.6.14. | []
| null | null | null | null |
|
CVE-2024-33919 | WordPress RomethemeKit For Elementor plugin <= 1.4.1 - Broken Access Control vulnerability | Missing Authorization vulnerability in Rometheme RomethemeKit For Elementor.This issue affects RomethemeKit For Elementor: from n/a through 1.4.1.
| [
"cpe:2.3:a:rometheme:romethemekit_for_elementor:*:*:*:*:*:*:*:*"
]
| null | 6.5 | null | null |
CVE-2007-2132 | Unspecified vulnerability in the PeopleTools component in Oracle PeopleSoft Enterprise 8.47.12 and 8.48.08 has unknown impact and attack vectors, aka PSE02. | [
"cpe:2.3:a:oracle:peoplesoft_enterprise:8.47.12:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:peoplesoft_enterprise:8.48.08:*:*:*:*:*:*:*"
]
| null | null | null | 10 |
|
GHSA-v3f3-x57x-hfg9 | Cross-site scripting (XSS) vulnerability in +webvpn+/index.html in WebVPN on the Cisco Adaptive Security Appliances (ASA) 5520 with software 7.2(4)30 and earlier 7.2 versions including 7.2(2)22, and 8.0(4)28 and earlier 8.0 versions, when clientless mode is enabled, allows remote attackers to inject arbitrary web script or HTML via the Host HTTP header. | []
| null | null | null | null |
|
ICSA-16-348-04 | Siemens SIMATIC WinCC and SIMATIC PCS 7 ActiveX Vulnerability | A vulnerability in SIEMENS SIMATIC WinCC (All versions < SIMATIC WinCC V7.2) and SIEMENS SIMATIC PCS 7 (All versions < SIMATIC PCS 7 V8.0 SP1) could allow a remote attacker to crash an ActiveX component or leak parts of the application memory if a user is tricked into clicking on a malicious link under certain conditions. | []
| null | null | 4.2 | null |
CVE-2025-3011 | PiExtract SOOP-CLM - SQL Injection | SOOP-CLM from PiExtract has a SQL Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary SQL commands to read, modify, and delete database contents. | []
| null | 9.8 | null | null |
GHSA-p427-pg3j-fh4p | Out of bounds access in SwiftShader in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | []
| null | 6.5 | null | null |
|
GHSA-jp75-4xf8-w783 | Multiple directory traversal vulnerabilities in phpKF-Portal 1.10 allow remote attackers to include arbitrary files via a .. (dot dot) in the (1) tema_dizin parameter to baslik.php and (2) portal_ayarlarportal_dili parameter to anket_yonetim.php. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | []
| null | null | null | null |
|
GHSA-m3h7-ffr6-fmrq | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Pierre Lebedel Kodex Posts likes allows Stored XSS.This issue affects Kodex Posts likes: from n/a through 2.5.0. | []
| null | 6.5 | null | null |
|
RHSA-2019:0935 | Red Hat Security Advisory: openstack-neutron security and bug fix update | openstack-neutron: incorrect validation of port settings in iptables security group driver openstack-neutron: DOS via broken port range merging in security group | [
"cpe:/a:redhat:openstack:13::el7"
]
| null | null | 7.5 | null |
GHSA-hq9q-3r42-xq2p | An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0691, CVE-2020-0719, CVE-2020-0720, CVE-2020-0721, CVE-2020-0722, CVE-2020-0723, CVE-2020-0724, CVE-2020-0725, CVE-2020-0731. | []
| null | null | null | null |
|
GHSA-hc34-vgpq-wg4g | A SQL injection vulnerability has been reported to affect QuMagie. If exploited, the vulnerability could allow authenticated users to inject malicious code via a network.We have already fixed the vulnerability in the following version:
QuMagie 2.1.4 and later | []
| null | 7.4 | null | null |
|
GHSA-p837-pjxr-j498 | A vulnerability, which was classified as critical, was found in SourceCodester Petrol Pump Management Software 1.0. This affects an unknown part of the file /admin/edit_customer.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. | []
| 5.3 | 6.3 | null | null |
|
CVE-2019-12984 | A NULL pointer dereference vulnerability in the function nfc_genl_deactivate_target() in net/nfc/netlink.c in the Linux kernel before 5.1.13 can be triggered by a malicious user-mode program that omits certain NFC attributes, leading to denial of service. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
]
| null | null | 5.5 | 4.3 |
|
GHSA-m4c5-25qf-rmm3 | A vulnerability has been identified in XHQ (All Versions < 6.1). The web interface could allow attackers to traverse through the file system of the server based by sending specially crafted packets over the network without authentication. | []
| null | null | null | null |
|
CVE-2009-4227 | Stack-based buffer overflow in the read_1_3_textobject function in f_readold.c in Xfig 3.2.5b and earlier, and in the read_textobject function in read1_3.c in fig2dev in Transfig 3.2.5a and earlier, allows remote attackers to execute arbitrary code via a long string in a malformed .fig file that uses the 1.3 file format. NOTE: some of these details are obtained from third party information. | [
"cpe:2.3:a:xfig:xfig:*:*:*:*:*:*:*:*",
"cpe:2.3:a:xfig:xfig:3.2.5:*:*:*:*:*:*:*"
]
| null | null | null | 6.8 |
|
CVE-2005-0706 | Buffer overflow in discdb.c for grip 3.1.2 allows attackers to cause a denial of service (crash) and possibly execute arbitrary code by causing the cddb lookup to return more matches than expected. | [
"cpe:2.3:a:grip:grip:2.9.6:*:*:*:*:*:*:*",
"cpe:2.3:a:grip:grip:3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:grip:grip:3.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:grip:grip:3.2.0:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
RHSA-2012:0428 | Red Hat Security Advisory: gnutls security update | gnutls: buffer overflow in gnutls_session_get_data() (GNUTLS-SA-2011-2) libtasn1: DER decoding buffer overflow (GNUTLS-SA-2012-3, MU-201202-02) gnutls: TLS record handling issue (GNUTLS-SA-2012-2, MU-201202-01) | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
]
| null | null | null | null |
CVE-2018-17146 | A cross-site scripting vulnerability exists in Nagios XI before 5.5.4 via the 'name' parameter within the Account Information page. Exploitation of this vulnerability allows an attacker to execute arbitrary JavaScript code within the auto login admin management page. | [
"cpe:2.3:a:nagios:nagios_xi:*:*:*:*:*:*:*:*"
]
| null | null | 5.4 | 3.5 |
|
GHSA-gfc3-ch46-26gp | This issue was addressed through improved state management. This issue is fixed in macOS Sequoia 15.1. A person with physical access to a Mac may be able to bypass Login Window during a software update. | []
| null | 7.5 | null | null |
|
CVE-2024-21250 | Vulnerability in the Oracle Process Manufacturing Product Development product of Oracle E-Business Suite (component: Quality Manager Specification). Supported versions that are affected are 12.2.13-12.2.14. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Process Manufacturing Product Development. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Process Manufacturing Product Development accessible data as well as unauthorized access to critical data or complete access to all Oracle Process Manufacturing Product Development accessible data. CVSS 3.1 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N). | [
"cpe:2.3:a:oracle:process_manufacturing_product_development:12.2.13-12.2.14:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:process_manufacturing_product_development:12.2.13:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:process_manufacturing_product_development:12.2.14:*:*:*:*:*:*:*"
]
| null | 8.1 | null | null |
|
CVE-2025-44021 | OpenStack Ironic before 29.0.1 can write unintended files to a target node disk during image handling (if a deployment was performed via the API). A malicious project assigned as a node owner can provide a path to any local file (readable by ironic-conductor), which may then be written to the target node disk. This is difficult to exploit in practice, because a node deployed in this manner should never reach the ACTIVE state, but it still represents a danger in environments running with non-default, insecure configurations such as with automated cleaning disabled. The fixed versions are 24.1.3, 26.1.1, and 29.0.1. | []
| null | 2.8 | null | null |
|
CVE-2022-0323 | Improper Neutralization of Special Elements Used in a Template Engine in bobthecow/mustache.php | Improper Neutralization of Special Elements Used in a Template Engine in Packagist mustache/mustache prior to 2.14.1. | [
"cpe:2.3:a:mustache_project:mustache:*:*:*:*:*:php:*:*"
]
| null | null | 5.3 | null |
CVE-2021-29512 | Heap buffer overflow in `RaggedBinCount` | TensorFlow is an end-to-end open source platform for machine learning. If the `splits` argument of `RaggedBincount` does not specify a valid `SparseTensor`(https://www.tensorflow.org/api_docs/python/tf/sparse/SparseTensor), then an attacker can trigger a heap buffer overflow. This will cause a read from outside the bounds of the `splits` tensor buffer in the implementation of the `RaggedBincount` op(https://github.com/tensorflow/tensorflow/blob/8b677d79167799f71c42fd3fa074476e0295413a/tensorflow/core/kernels/bincount_op.cc#L430-L433). Before the `for` loop, `batch_idx` is set to 0. The user controls the `splits` array, making it contain only one element, 0. Thus, the code in the `while` loop would increment `batch_idx` and then try to read `splits(1)`, which is outside of bounds. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2 and TensorFlow 2.3.3, as these are also affected. | [
"cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*"
]
| null | 2.5 | null | null |
RHSA-2016:1347 | Red Hat Security Advisory: Red Hat JBoss BPM Suite security update | JGroups: Authorization bypass | [
"cpe:/a:redhat:jboss_enterprise_brms_platform:6.3"
]
| null | null | 9.8 | null |
GHSA-x6jv-5vfg-gm7x | Path traversal in ServiceCenter | Improper configuration will cause ServiceComb ServiceCenter Directory Traversal problem in ServcieCenter 1.x.x versions and fixed in 2.0.0. | []
| null | 7.5 | null | null |
CVE-2019-3899 | It was found that default configuration of Heketi does not require any authentication potentially exposing the management interface to misuse. This isue only affects heketi as shipped with Openshift Container Platform 3.11. | [
"cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*",
"cpe:2.3:a:heketi_project:heketi:-:*:*:*:*:*:*:*"
]
| null | null | 7.3 | null |
|
GHSA-99g5-5643-xphp | mm-wiki is vulnerable to Cross-Site Scripting (XSS) | mm-wki v0.2.1 is vulnerable to Cross Site Scripting (XSS). | []
| null | 6.1 | null | null |
GHSA-9p26-f84f-j6jq | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused | []
| null | null | null | null |
|
GHSA-7vf7-877p-m8c7 | On BIG-IP APM 14.0.0-14.0.0.2 or 13.0.0-13.1.1.1, TMM may restart when processing a specially crafted request with APM portal access. | []
| null | null | 5.9 | null |
|
CVE-2011-0539 | The key_certify function in usr.bin/ssh/key.c in OpenSSH 5.6 and 5.7, when generating legacy certificates using the -t command-line option in ssh-keygen, does not initialize the nonce field, which might allow remote attackers to obtain sensitive stack memory contents or make it easier to conduct hash collision attacks. | [
"cpe:2.3:a:openbsd:openssh:5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:5.7:*:*:*:*:*:*:*"
]
| null | null | null | 5 |
|
CVE-2024-13319 | Themify Builder <= 7.6.5 - Reflected Cross-Site Scripting | The Themify Builder plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 7.6.5. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. | []
| null | 6.1 | null | null |
GHSA-3439-fg7p-gc46 | Multiple plugins for WordPress are vulnerable to Stored Cross-Site Scripting via the plugin's bundled Magnific Popups library (version 1.1.0) in various versions due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. NOTE: This vulnerability was fixed in the upstream library (Magnific Popups version 1.2.0) by disabling the loading of HTML within certain fields by default. | []
| null | 6.4 | null | null |
|
GHSA-5m78-jr6f-rgf5 | SQL injection vulnerability in include/admin/model_field.class.php in PHPCMS 2008 V2 allows remote attackers to execute arbitrary SQL commands via the modelid parameter to flash_upload.php. | []
| null | null | null | null |
|
CVE-2010-0862 | Unspecified vulnerability in the Retail - Oracle Retail Markdown Optimization component in Oracle Industry Product Suite 13.1 allows remote attackers to affect integrity via unknown vectors related to Online Help. | [
"cpe:2.3:a:oracle:industry_product_suite:13.1:*:*:*:*:*:*:*"
]
| null | null | null | 4.3 |
|
CVE-2025-52878 | In JetBrains TeamCity before 2025.03.3 usernames were exposed to the users without proper permissions | []
| null | 4.3 | null | null |
|
CVE-2006-2998 | PHP remote file inclusion vulnerability in board/post.php in free QBoard 1.1 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the qb_path parameter. | [
"cpe:2.3:a:free_qboard:free_qboard:1.1:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
CVE-2007-2057 | Stack-based buffer overflow in aircrack-ng airodump-ng 0.7 allows remote attackers to execute arbitrary code via crafted 802.11 authentication packets. | [
"cpe:2.3:a:aircrack-ng:airodump-ng:0.7:*:*:*:*:*:*:*"
]
| null | null | null | 10 |
|
CVE-2023-32006 | The use of `module.constructor.createRequire()` can bypass the policy mechanism and require modules outside of the policy.json definition for a given module.
This vulnerability affects all users using the experimental policy mechanism in all active release lines: 16.x, 18.x, and, 20.x.
Please note that at the time this CVE was issued, the policy is an experimental feature of Node.js. | [
"cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*"
]
| null | 8.8 | null | null |
|
GHSA-pxv4-3wmh-64pg | An HTML Injection Vulnerability in iOrder 1.0 allows the remote attacker to execute Malicious HTML codes via the signup form | []
| null | 5.3 | null | null |
|
GHSA-wr3q-48h2-426r | A vulnerability in the web-based management interface of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to bypass authorization, enabling them to access sensitive information, modify the system configuration, or impact the availability of the affected system. The vulnerability is due to insufficient authorization checking on the affected system. An attacker could exploit this vulnerability by sending crafted HTTP requests to the web-based management interface of an affected system. A successful exploit could allow the attacker to gain privileges beyond what would normally be authorized for their configured user authorization level. The attacker may be able to access sensitive information, modify the system configuration, or impact the availability of the affected system. | []
| null | null | null | null |
|
GHSA-h39j-4m7g-qxvh | Cross-site scripting (XSS) vulnerability in Ansel 2.1 and earlier allows remote attackers to inject arbitrary HTML or web script via the album name. | []
| null | null | null | null |
|
CVE-2010-3653 | The Director module (dirapi.dll) in Adobe Shockwave Player before 11.5.9.615 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a Director movie with a crafted rcsL chunk containing a field whose value is used as a pointer offset, as exploited in the wild in October 2010. NOTE: some of these details are obtained from third party information. | [
"cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*"
]
| null | null | null | 9.3 |
|
CVE-2024-3703 | Carousel Slider < 2.2.10 - Editor+ Stored XSS | The Carousel Slider WordPress plugin before 2.2.10 does not validate and escape some of its Slide options before outputting them back in the page/post where the related Slide shortcode is embed, which could allow users with the Editor role and above to perform Stored Cross-Site Scripting attacks | [
"cpe:2.3:a:majeedraza:carousel_slider:*:*:*:*:*:*:*:*"
]
| null | 4.7 | null | null |
RHSA-2019:0567 | Red Hat Security Advisory: openstack-octavia security and bug fix update | openstack-octavia: Private keys written to world-readable log files | [
"cpe:/a:redhat:openstack:13::el7"
]
| null | null | 5.5 | null |
RHSA-2011:0198 | Red Hat Security Advisory: postgresql84 security update | PostgreSQL: Stack-based buffer overflow by processing certain tokens from SQL query string when intarray module enabled | [
"cpe:/o:redhat:enterprise_linux:5::server"
]
| null | null | null | null |
CVE-2019-2600 | Vulnerability in the Oracle Email Center component of Oracle E-Business Suite (subcomponent: Message Display). Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6, 12.2.7 and 12.2.8. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Email Center. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Email Center, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Email Center accessible data as well as unauthorized update, insert or delete access to some of Oracle Email Center accessible data. CVSS 3.0 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N). | [
"cpe:2.3:a:oracle:email_center:12.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:email_center:12.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:email_center:12.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:email_center:12.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:email_center:12.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:email_center:12.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:email_center:12.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:email_center:12.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:email_center:12.2.8:*:*:*:*:*:*:*"
]
| null | null | 8.2 | 5.8 |
|
CVE-2021-29757 | IBM QRadar User Behavior Analytics 4.1.1 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 202168. | [
"cpe:2.3:a:ibm:qradar_user_behavior_analytics:4.1.1:*:*:*:*:*:*:*"
]
| null | null | 4.3 | null |
|
CVE-2021-25103 | GTranslate < 2.9.7 - Reflected Cross-Site Scripting | The Translate WordPress with GTranslate WordPress plugin before 2.9.7 does not sanitise and escape the body parameter in the url_addon/gtranslate-email.php file before outputting it back in the page, leading to a Reflected Cross-Site Scripting issue. Note: exploitation of the issue requires knowledge of the NONCE_SALT and NONCE_KEY | [
"cpe:2.3:a:gtranslate:translate_wordpress_with_gtranslate:*:*:*:*:*:wordpress:*:*"
]
| null | 4.7 | null | 2.6 |
GHSA-wp9c-hm9w-q3wj | There is an unauthorized access vulnerability in Online Diagnostic Lab Management System 1.0. | []
| null | 7.5 | null | null |
|
GHSA-w3v6-4gf2-mrx7 | The GS Portfolio for Envato WordPress plugin before 1.4.0 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embedded, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks | []
| null | 5.4 | null | null |
|
GHSA-ffhh-fjrg-f4fj | Directory traversal in portal/import_template.php in versions of OpenEMR before 5.0.1.4 allows a remote attacker authenticated in the patient portal to execute arbitrary PHP code by writing a file with a PHP extension via the "docid" and "content" parameters and accessing it in the traversed directory. | []
| null | null | 8.8 | null |
|
GHSA-542p-f8qv-wf4h | Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable heap overflow vulnerability in the image conversion engine when processing Enhanced Metafile Format (EMF) data related to polygons. Successful exploitation could lead to arbitrary code execution. | []
| null | null | 8.8 | null |
|
GHSA-88rw-gmxx-j2pc | The UltraPress theme for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.2.1 via deserialization of untrusted input. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable software. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code. | []
| null | 8.8 | null | null |
|
GHSA-vwr9-mg8c-jp94 | SQL injection vulnerability found in Joyplus-cms v.1.6.0 allows a remote attacker to access sensitive information via the id parameter of the goodbad() function. | []
| null | 7.5 | null | null |
|
CVE-2025-32116 | WordPress QR Master plugin <= 1.0.5 - Reflected Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Studi7 QR Master allows Reflected XSS. This issue affects QR Master: from n/a through 1.0.5. | []
| null | 7.1 | null | null |
CVE-2018-0859 | Microsoft Edge and ChakraCore in Microsoft Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows remote code execution, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2018-0834, CVE-2018-0835, CVE-2018-0836, CVE-2018-0837, CVE-2018-0838, CVE-2018-0840, CVE-2018-0856, CVE-2018-0857, CVE-2018-0858, CVE-2018-0860, CVE-2018-0861, and CVE-2018-0866. | [
"cpe:2.3:a:microsoft:chakracore:-:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*"
]
| null | null | 7.5 | 7.6 |
|
CVE-2010-2937 | The ReadMetaFromId3v2 function in taglib.cpp in the TagLib plugin in VideoLAN VLC media player 0.9.0 through 1.1.2 does not properly process ID3v2 tags, which allows remote attackers to cause a denial of service (application crash) via a crafted media file. | [
"cpe:2.3:a:videolan:vlc_media_player:0.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:0.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:0.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:0.9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:0.9.4:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:0.9.5:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:0.9.6:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:0.9.7:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:0.9.8a:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:0.9.9:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:0.9.9a:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:0.9.10:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:1.1.2:*:*:*:*:*:*:*"
]
| null | null | null | 5 |
|
CVE-2017-6654 | A vulnerability in the web-based management interface of Cisco Unified Communications Manager 10.5 through 11.5 could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or allow the attacker to access sensitive browser-based information. Cisco Bug IDs: CSCvc06608. | [
"cpe:2.3:a:cisco:unified_communications_manager:10.5\\(2.10000.5\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:11.0\\(1.10000.10\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:11.5\\(1.10000.6\\):*:*:*:*:*:*:*"
]
| null | null | 6.1 | 4.3 |
|
GHSA-c56g-23r8-83xm | In the Linux kernel, the following vulnerability has been resolved:net: remove two BUG() from skb_checksum_help()I have a syzbot report that managed to get a crash in skb_checksum_help()If syzbot can trigger these BUG(), it makes sense to replace
them with more friendly WARN_ON_ONCE() since skb_checksum_help()
can instead return an error code.Note that syzbot will still crash there, until real bug is fixed. | []
| null | 5.5 | null | null |
|
CVE-2018-10382 | MODX Revolution 2.6.3 has XSS. | [
"cpe:2.3:a:modx:modx_revolution:2.6.3:*:*:*:*:*:*:*"
]
| null | null | 5.4 | 3.5 |
|
CVE-2023-47111 | ZITADEL race condition in lockout policy execution | ZITADEL provides identity infrastructure. ZITADEL provides administrators the possibility to define a `Lockout Policy` with a maximum amount of failed password check attempts. On every failed password check, the amount of failed checks is compared against the configured maximum. Exceeding the limit, will lock the user and prevent further authentication. In the affected implementation it was possible for an attacker to start multiple parallel password checks, giving him the possibility to try out more combinations than configured in the `Lockout Policy`. This vulnerability has been patched in versions 2.40.5 and 2.38.3.
| [
"cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*"
]
| null | 7.3 | null | null |
GHSA-x44w-4pwf-wpx2 | Cross-Site Request Forgery (CSRF) vulnerability in Uncodethemes Ultra Demo Importer allows Upload a Web Shell to a Web Server. This issue affects Ultra Demo Importer: from n/a through 1.0.5. | []
| null | 9.6 | null | null |
|
CVE-2023-1287 | ENOVIA Live Collaboration V6R2013xE is affected by an XSL template injection vulnerability |
An XSL template vulnerability in
ENOVIA Live Collaboration V6R2013xE allows Remote Code Execution.
| [
"cpe:2.3:a:3ds:enovia_live_collaboration:*:*:*:*:*:*:*:*"
]
| null | 9 | null | null |
GHSA-wpq5-crjc-xv3c | Cross-site scripting (XSS) vulnerability in IBM Web Traffic Express Caching Proxy Server 3.6 and 4.x before 4.0.1.26 allows remote attackers to execute script as other users via an HTTP GET request. | []
| null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.