id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
139k
cpes
sequencelengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
CVE-2023-46241
Potential account take over due to unverified emails from Microsoft Identity Platform
`discourse-microsoft-auth` is a plugin that enables authentication via Microsoft. On sites with the `discourse-microsoft-auth` plugin enabled, an attack can potentially take control of a victim's Discourse account. Sites that have configured their application's account type to any options other than `Accounts in this organizational directory only (O365 only - Single tenant)` are vulnerable. This vulnerability has been patched in commit c40665f44509724b64938c85def9fb2e79f62ec8 of `discourse-microsoft-auth`. A `microsoft_auth:revoke` rake task has also been added which will deactivate and log out all users that have connected their accounts to Microsoft. User API keys as well as API keys created by those users will also be revoked. The rake task will also remove the connection records to Microsoft for those users. This will allow affected users to re-verify their account emails as well as reconnect their Discourse account to Microsoft for authentication. As a workaround, disable the `discourse-microsoft-auth` plugin by setting the `microsoft_auth_enabled` site setting to `false`. Run the `microsoft_auth:log_out_users` rake task to log out all users with associated Microsoft accounts.
[ "cpe:2.3:a:discourse:discourse:*:*:*:*:*:*:*:*" ]
null
9.1
null
null
GHSA-27x2-77hh-wh7h
A Missing Authorization vulnerability in the Socket Intercept (SI) command file interface of Juniper Networks Junos OS Evolved allows an authenticated, low-privilege local attacker to modify certain files, allowing the attacker to cause any command to execute with root privileges leading to privilege escalation ultimately compromising the system.This issue affects Junos OS Evolved:All versions prior to 21.2R3-S8-EVO,21.4 versions prior to  21.4R3-S6-EVO,22.1 versions prior to 22.1R3-S5-EVO,22.2 versions prior to 22.2R3-S3-EVO,22.3 versions prior to 22.3R3-S3-EVO,22.4 versions prior to 22.4R3-EVO,23.2 versions prior to 23.2R2-EVO.
[]
7
7.3
null
null
GHSA-6r33-3vw6-mjj9
The LLDP implementation in Cisco IOS allows remote attackers to cause a denial of service (device reload) via a malformed packet, aka Bug ID CSCum96282.
[]
null
null
null
null
CVE-2024-50363
A CWE-78 "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')" was discovered affecting the following devices manufactured by Advantech: EKI-6333AC-2G (<= 1.6.3), EKI-6333AC-2GD (<= v1.6.3) and EKI-6333AC-1GPO (<= v1.2.1). The source of the vulnerability relies on multiple parameters belonging to the "mp_apply" API which are not properly sanitized before being concatenated to OS level commands.
[ "cpe:2.3:o:advantech:eki-6333ac-2g_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:advantech:eki-6333ac-2gd_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:advantech:eki-6333ac-1gpo_firmware:*:*:*:*:*:*:*:*" ]
null
7.2
null
null
CVE-2024-21831
Uncontrolled search path in some Intel(R) Processor Diagnostic Tool software before version 4.1.9.41 may allow an authenticated user to potentially enable escalation of privilege via local access.
[ "cpe:2.3:a:intel:processor_diagnostic_tool:*:*:*:*:*:*:*:*" ]
null
6.7
null
null
GHSA-xjfx-ffgc-2697
In Optimizely Configured Commerce before 5.2.2408, malicious payloads can be stored and subsequently executed in users' browsers under specific conditions: XSS from client-side template injection in list item names.
[]
null
6.1
null
null
CVE-2012-1198
base_ag_main.php in Basic Analysis and Security Engine (BASE) 1.4.5 allows remote attackers to execute arbitrary code by uploading contents of the file with an executable extension via a create action, then accessing it via a view action.
[ "cpe:2.3:a:secureideas:basic_analysis_and_security_engine:1.4.5:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2025-0498
Rockwell Automation FactoryTalk® AssetCentre Data Exposure Vulnerability
A data exposure vulnerability exists in all versions prior to V15.00.001 of Rockwell Automation FactoryTalk® AssetCentre. The vulnerability exists due to insecure storage of FactoryTalk® Security user tokens, which could allow a threat actor to steal a token and, impersonate another user.
[]
7
null
null
null
GHSA-r375-j569-v9qr
A CSRF vulnerability in the gestione_utenti.php endpoint of HotelDruid 3.0.7 allows attackers to perform unauthorized actions (e.g., modifying user passwords) on behalf of authenticated users by exploiting the lack of origin or referrer validation and the absence of CSRF tokens.
[]
null
7.3
null
null
GHSA-46pw-mqwx-ghm8
Luxion KeyShot OBJ File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Luxion KeyShot. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of obj files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-23697.
[]
null
null
7.8
null
CVE-2019-19893
In IXP EasyInstall 6.2.13723, there is Directory Traversal on TCP port 8000 via the Engine Service by an unauthenticated attacker, who can access the server's filesystem with the access rights of NT AUTHORITY\SYSTEM.
[ "cpe:2.3:a:ixpdata:easyinstall:6.2.13723:*:*:*:*:*:*:*" ]
null
null
7.5
null
CVE-2007-4546
Unreal Commander 0.92 build 565 and 573 lists the filenames from the Central Directory of a ZIP archive, but extracts to local filenames corresponding to names in Local File Header fields in this archive, which might allow remote attackers to trick a user into performing a dangerous file overwrite or creation.
[ "cpe:2.3:a:x-diesel:unreal_commander:0.92_build565:*:*:*:*:*:*:*", "cpe:2.3:a:x-diesel:unreal_commander:0.92_build573:*:*:*:*:*:*:*" ]
null
null
null
5.8
GHSA-qgvv-jpx6-4hx7
Online Sports Complex Booking System 1.0 is vulnerable to SQL Injection via /scbs/admin/categories/manage_category.php?id=.
[]
null
9.8
null
null
CVE-2022-0030
PAN-OS: Authentication Bypass in Web Interface
An authentication bypass vulnerability in the Palo Alto Networks PAN-OS 8.1 web interface allows a network-based attacker with specific knowledge of the target firewall or Panorama appliance to impersonate an existing PAN-OS administrator and perform privileged actions.
[ "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*" ]
null
8.1
null
null
GHSA-4wjx-5h7f-wqhw
In the Linux kernel, the following vulnerability has been resolved:drm: omapdrm: Add missing check for alloc_ordered_workqueueAs it may return NULL pointer and cause NULL pointer dereference. Add check for the return value of alloc_ordered_workqueue.
[]
null
5.5
null
null
GHSA-xj9h-242g-rjqv
An issue was discovered in Pivotal GemFire for PCF 1.6.x versions prior to 1.6.5 and 1.7.x versions prior to 1.7.1. The gfsh (Geode Shell) endpoint, used by operators and application developers to connect to their cluster, is unauthenticated and publicly accessible. Because HTTPS communications are terminated at the gorouter, communications from the gorouter to GemFire clusters are unencrypted. An attacker could run any command available on gfsh and could cause denial of service, lost confidentiality of data, escalate privileges, or eavesdrop on other communications between the gorouter and the cluster.
[]
null
null
9.8
null
RHSA-2018:1318
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
Kernel: ipsec: xfrm: use-after-free leading to potential privilege escalation kernel: Out-of-bounds write via userland offsets in ebt_entry struct in netfilter/ebtables.c Kernel: KVM: error in exception handling leads to wrong debug stack value kernel: guest kernel crash during core dump on POWER9 host Kernel: error in exception handling leads to DoS kernel: ptrace() incorrect error handling leads to corruption and DoS
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
7.8
null
CVE-2024-29883
CreateWiki's wiki request suppression ignores the suppression settings set by the suppressor
CreateWiki is Miraheze's MediaWiki extension for requesting & creating wikis. Suppression of wiki requests does not work as intended, and always restricts visibility to those with the `(createwiki)` user right regardless of the settings one sets on a given wiki request. This may expose information to users who are not supposed to be able to access it.
[]
null
4.9
null
null
RHSA-2025:3500
Red Hat Security Advisory: RHODF-4.17-RHEL-9 security update
golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html
[ "cpe:/a:redhat:openshift_data_foundation:4.17::el9" ]
null
7.5
null
null
CVE-2024-25596
WordPress Doofinder for WooCommerce plugin <= 2.1.8 - Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Doofinder Doofinder for WooCommerce allows Stored XSS.This issue affects Doofinder for WooCommerce: from n/a through 2.1.8.
[]
null
5.9
null
null
GHSA-qpr4-8773-hjx2
An issue was discovered in the secure portal in Publisure 2.1.2. Because SQL queries are not well sanitized, there are multiple SQL injections in userAccFunctions.php functions. Using this, an attacker can access passwords and/or grant access to the user account "user" in order to become "Administrator" (for example).
[]
null
9.8
null
null
GHSA-7jgh-3vmm-q9r5
Handspring Visor 1.0 and 1.0.1 with the VisorPhone Springboard module installed allows remote attackers to cause a denial of service (PalmOS crash and VisorPhone database corruption) by sending a large or crafted SMS image.
[]
null
null
null
null
CVE-2020-7965
flaskparser.py in Webargs 5.x through 5.5.2 doesn't check that the Content-Type header is application/json when receiving JSON input. If the request body is valid JSON, it will accept it even if the content type is application/x-www-form-urlencoded. This allows for JSON POST requests to be made across domains, leading to CSRF.
[ "cpe:2.3:a:webargs_project:webargs:*:*:*:*:*:*:*:*" ]
null
8.8
null
6.8
GHSA-qpcq-4w33-hhvh
Delta Electronics InfraSuite Device Master Versions 00.00.01a and prior allow attacker provided data already serialized into memory to be used in file operation application programmable interfaces (APIs). This could create arbitrary files, which could be used in API operations and could ultimately result in remote code execution.
[]
null
9.8
null
null
CVE-2018-1565
IBM DB2 for Linux, UNIX and Windows (includes DB2 Connect Server) 9.7, 10.1, 10.5, and 11.1 could allow a local user to overflow a buffer which may result in a privilege escalation to the DB2 instance owner. IBM X-Force ID: 143022.
[ "cpe:2.3:a:ibm:db2:9.7:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:db2:10.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:db2:10.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:db2:11.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
null
8.4
null
GHSA-fpc5-jwwv-g522
ENCDEC.DLL in Windows Media Player and Media Center in Microsoft Windows XP SP2 and SP3, Windows Vista SP2, and Windows 7 Gold and SP1 allows remote attackers to execute arbitrary code via a crafted .dvr-ms file, aka "Windows Media Player DVR-MS Memory Corruption Vulnerability."
[]
null
null
null
null
CVE-2010-4791
SQL injection vulnerability in infusions/mg_user_fotoalbum_panel/mg_user_fotoalbum.php in the MG User-Fotoalbum (mg_user_fotoalbum_panel) module 1.0.1 for PHP-Fusion allows remote attackers to execute arbitrary SQL commands via the album_id parameter.
[ "cpe:2.3:a:marcusg:mg_user_fotoalbum_panel:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:php-fusion:php-fusion:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-7jpc-wcv3-h3mc
A vulnerability has been identified in SiNVR 3 Central Control Server (CCS) (all versions), SiNVR 3 Video Server (all versions). The SFTP service (default port 22/tcp) of the SiNVR 3 Central Control Server (CCS) does not properly limit its capabilities to the specified purpose. In conjunction with CVE-2019-18341, an unauthenticated remote attacker with network access to the CCS server could exploit this vulnerability to read or delete arbitrary files, or access other resources on the same server.
[]
null
9.9
null
null
RHSA-2022:6741
Red Hat Security Advisory: kernel security and bug fix update
kernel: race condition in perf_event_open leads to privilege escalation
[ "cpe:/o:redhat:rhel_aus:7.7::server", "cpe:/o:redhat:rhel_e4s:7.7::server", "cpe:/o:redhat:rhel_tus:7.7::server" ]
null
7.4
null
null
CVE-2023-6567
The LearnPress plugin for WordPress is vulnerable to time-based SQL Injection via the ‘order_by’ parameter in all versions up to, and including, 4.2.5.7 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
[ "cpe:2.3:a:thimpress:learnpress:*:*:*:*:*:wordpress:*:*" ]
null
9.8
null
null
CVE-2015-9423
The PlugNedit Adaptive Editor plugin before 6.2.0 for WordPress has XSS via wp-admin/admin-ajax.php?action=simple_fields_field_type_post_dialog_load PlugneditBGColor, PlugneditEditorMargin, plugnedit_width, pnemedcount, or plugneditcontent parameters.
[ "cpe:2.3:a:simplysymphony:plugnedit:*:*:*:*:*:wordpress:*:*" ]
null
5.4
null
3.5
CVE-2023-1663
Authenticated Resources Accessible via Forced Browsing
Coverity versions prior to 2023.3.2 are vulnerable to forced browsing, which exposes authenticated resources to unauthorized actors. The root cause of this vulnerability is an insecurely configured servlet mapping for the underlying Apache Tomcat server. As a result, the downloads directory and its contents are accessible. 5.9 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L/E:P/RL:O/RC:C)
[ "cpe:2.3:a:synopsys:coverity:*:*:*:*:*:*:*:*" ]
null
6.5
null
null
GHSA-4v4v-cgjf-p5g2
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in biplob018 Shortcode Addons allows Stored XSS.This issue affects Shortcode Addons: from n/a through 3.2.5.
[]
null
5.9
null
null
CVE-2020-35916
An issue was discovered in the image crate before 0.23.12 for Rust. A Mutable reference has immutable provenance. (In the case of LLVM, the IR may be always correct.)
[ "cpe:2.3:a:image-rs:image:*:*:*:*:*:rust:*:*" ]
null
5.5
null
2.1
CVE-2024-45873
A DLL hijacking vulnerability in VegaBird Yaazhini 2.0.2 allows attackers to execute arbitrary code / maintain persistence via placing a crafted DLL file in the same directory as Yaazhini.exe.
[ "cpe:2.3:a:vegabird:yaazhini:2.0.2:*:*:*:*:*:*:*" ]
null
9.8
null
null
CVE-2005-4414
Unspecified vulnerability in Teamwork 3 before alpha 1.7 has unknown impact and attack vectors, related to "a menu security bug."
[ "cpe:2.3:a:open_lab:teamwork:alpha_1.2:*:*:*:*:*:*:*", "cpe:2.3:a:open_lab:teamwork:alpha_1.4:*:*:*:*:*:*:*", "cpe:2.3:a:open_lab:teamwork:alpha_1.6:*:*:*:*:*:*:*" ]
null
null
null
10
GHSA-fvp6-8p9w-vffq
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in LiteSpeed Technologies LiteSpeed Cache allows Stored XSS.This issue affects LiteSpeed Cache: from n/a through 5.7.
[]
null
8.3
null
null
CVE-2023-48545
Adobe Experience Manager | Cross-site Scripting (Stored XSS) (CWE-79)
Adobe Experience Manager versions 6.5.18 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
[ "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:experience_manager_cloud_service:*:*:*:*:*:*:*:*" ]
null
5.4
null
null
RHSA-2023:3318
Red Hat Security Advisory: go-toolset and golang security update
golang: crypto/internal/nistec: specific unreduced P-256 scalars produce incorrect results golang: net/http, net/textproto: denial of service from excessive memory allocation golang: net/http, net/textproto, mime/multipart: denial of service from excessive resource consumption golang: go/parser: Infinite loop in parsing golang: html/template: backticks not treated as string delimiters golang: html/template: improper sanitization of CSS values golang: html/template: improper handling of JavaScript whitespace golang: html/template: improper handling of empty HTML attributes
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
7.3
null
null
CVE-2019-7018
Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution .
[ "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
null
9.8
10
GHSA-vx6p-wh5p-qj6v
The vmw_surface_define_ioctl function in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel through 4.10.5 does not check for a zero value of certain levels data, which allows local users to cause a denial of service (ZERO_SIZE_PTR dereference, and GPF and possibly panic) via a crafted ioctl call for a /dev/dri/renderD* device.
[]
null
null
5.5
null
GHSA-m4jp-mh99-vhwh
Multiple buffer overflows in EvolutionX 3921 and 3935 allow remote attackers to cause a denial of service (hang) via (1) a long cd command to the FTP server, or (2) a long dir command to the telnet server.
[]
null
null
null
null
CVE-2019-16337
The hncbd90 component in Hancom Office 9.6.1.9403 allows a use-after-free via an unknown object in a crafted .docx file.
[ "cpe:2.3:a:hancom:hancom_office_neo:9.6.1.9403:*:*:*:*:*:*:*" ]
null
7.8
null
6.8
GHSA-pphv-qf34-hrw4
phpFileManager 0.9.8 allows remote attackers to execute arbitrary commands via a crafted URL.
[]
null
8.8
null
null
GHSA-9jgg-4q8x-859v
A vulnerability in the identity-based firewall (IDFW) rule processing feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass security protections. This vulnerability is due to improper handling of network requests by affected devices configured to use object group search. An attacker could exploit this vulnerability by sending a specially crafted network request to an affected device. A successful exploit could allow the attacker to bypass access control list (ACL) rules on the device, bypass security protections, and send network traffic to unauthorized hosts.
[]
null
5.3
null
null
RHSA-2024:10752
Red Hat Security Advisory: firefox security update
firefox: thunderbird: Select list elements could be shown over another site firefox: thunderbird: CSP Bypass and XSS Exposure via Web Compatibility Shims firefox: thunderbird: URL Bar Spoofing via Manipulated Punycode and Whitespace Characters firefox: thunderbird: Unhandled Exception in Add-on Signature Verification firefox: thunderbird: Improper Keypress Handling in Executable File Confirmation Dialog firefox: thunderbird: Memory safety bugs fixed in Firefox 133, Thunderbird 133, Firefox ESR 128.5, and Thunderbird 128.5
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8.8
null
null
CVE-2019-14751
NLTK Downloader before 3.4.5 is vulnerable to a directory traversal, allowing attackers to write arbitrary files via a ../ (dot dot slash) in an NLTK package (ZIP archive) that is mishandled during extraction.
[ "cpe:2.3:a:nltk:nltk:*:*:*:*:*:*:*:*" ]
null
null
7.5
5
CVE-2023-28112
Discourse's SSRF protection missing for some FastImage requests
Discourse is an open-source discussion platform. Prior to version 3.1.0.beta3 of the `beta` and `tests-passed` branches, some user provided URLs were being passed to FastImage without SSRF protection. Insufficient protections could enable attackers to trigger outbound network connections from the Discourse server to private IP addresses. This affects any site running the `tests-passed` or `beta` branches versions 3.1.0.beta2 and prior. This issue is patched in version 3.1.0.beta3 of the `beta` and `tests-passed` branches. There are no known workarounds.
[ "cpe:2.3:a:discourse:discourse:*:*:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:*:*:*:*:stable:*:*:*", "cpe:2.3:a:discourse:discourse:3.1.0:beta1:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:3.1.0:beta2:*:*:beta:*:*:*" ]
null
5.9
null
null
GHSA-cmg7-xr2j-4r9v
MoinMoin Improper ACL handling for calendars and includes
MoinMoin before 20070507 does not properly enforce ACLs for calendars and includes, which allows remote attackers to read certain pages via unspecified vectors.
[]
null
null
null
null
GHSA-9pmm-h9qx-3j7r
Ruckus Wireless Zoneflex 2942 devices with firmware 9.6.0.0.267 allow remote attackers to bypass authentication, and subsequently access certain configuration/ and maintenance/ scripts, by constructing a crafted URI after receiving an authentication error for an arbitrary login attempt.
[]
null
null
null
null
GHSA-56vf-fgp4-xjqj
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in EverPress Mailster allows PHP Local File Inclusion.This issue affects Mailster: from n/a through 4.0.6.
[]
null
8.1
null
null
GHSA-286q-p2xc-rmjg
includes/editor/insert_image.php in Pivot 1.30 RC2 and earlier creates the authentication credentials from parameters, which allows remote attackers to obtain privileges and upload arbitrary files via modified (1) pass and (2) session parameters, and (3) pass and (4) userlevel indices of the (a) Pivot_Vars[] or (b) Users[] array parameters.
[]
null
null
null
null
CVE-2023-6894
Hikvision Intercom Broadcasting System Log File system.html information disclosure
A vulnerability was found in Hikvision Intercom Broadcasting System 3.0.3_20201113_RELEASE(HIK). It has been classified as problematic. This affects an unknown part of the file access/html/system.html of the component Log File Handler. The manipulation leads to information disclosure. The exploit has been disclosed to the public and may be used. Upgrading to version 4.1.0 is able to address this issue. It is recommended to upgrade the affected component. The identifier VDB-248253 was assigned to this vulnerability.
[ "cpe:2.3:o:hikvision:intercom_broadcast_system:*:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-kd-bk:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-kd-dis:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-kd-e:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-kd-in:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-kd-info:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-kd-kk:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-kd-kk\\/s:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-kd-kp:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-kd-kp\\/s:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-kd-m:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-kd3003-e6:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-kd8003ime1\\(b\\):-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-kd8003ime1\\(b\\)\\/flush:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-kd8003ime1\\(b\\)\\/ns:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-kd8003ime1\\(b\\)\\/s:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-kd8003ime1\\(b\\)\\/surface:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-kh6220-le1:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-kh6320-le1:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-kh6320-tde1:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-kh6320-te1:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-kh6320-wtde1:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-kh6320-wte1:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-kh6350-wte1:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-kh6351-te1:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-kh6351-wte1:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-kh63le1\\(b\\):-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-kh8520-wte1:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-kh9310-wte1\\(b\\):-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-kh9510-wte1\\(b\\):-:*:*:*:*:*:*:*" ]
null
4.3
4.3
3.3
GHSA-5cxx-5j5m-7hp9
A reflected cross-site scripting (XSS) vulnerability in MaxSite CMS before V106 via product/page/* allows remote attackers to inject arbitrary web script to a page.
[]
null
null
null
null
CVE-2017-1210
IBM Daeja ViewONE Professional, Standard & Virtual 4.1.5.1 and 5.0.2 could allow an unauthenticated attacker to inject data into log files made to look legitimate. IBM X-Force ID: 123850.
[ "cpe:2.3:a:ibm:daeja_viewone:4.1.5:*:*:*:professional:*:*:*", "cpe:2.3:a:ibm:daeja_viewone:4.1.5:*:*:*:standard:*:*:*", "cpe:2.3:a:ibm:daeja_viewone:4.1.5:*:*:*:virtual:*:*:*", "cpe:2.3:a:ibm:daeja_viewone:4.1.5.1:*:*:*:professional:*:*:*", "cpe:2.3:a:ibm:daeja_viewone:4.1.5.1:*:*:*:standard:*:*:*", "cpe:2.3:a:ibm:daeja_viewone:4.1.5.1:*:*:*:virtual:*:*:*", "cpe:2.3:a:ibm:daeja_viewone:5.0.0:*:*:*:virtual:*:*:*", "cpe:2.3:a:ibm:daeja_viewone:5.0.2:*:*:*:professional:*:*:*", "cpe:2.3:a:ibm:daeja_viewone:5.0.2:*:*:*:standard:*:*:*", "cpe:2.3:a:ibm:daeja_viewone:5.0.2:*:*:*:virtual:*:*:*" ]
null
null
7.5
5
GHSA-cpq4-98gj-fhjv
decode_frame in libavcodec/exr.c in FFmpeg 4.3.1 has an out-of-bounds write because of errors in calculations of when to perform memset zero operations.
[]
null
null
null
null