id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
4.89k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2020-27428 | A DOM-based cross-site scripting (XSS) vulnerability in Scratch-Svg-Renderer v0.2.0 allows attackers to execute arbitrary web scripts or HTML via a crafted sb3 file. | [
"cpe:2.3:a:mit:scratch-svg-renderer:0.2.0:*:*:*:*:node.js:*:*"
]
| null | 6.1 | null | 4.3 |
|
GHSA-fj59-pgc7-7mf2 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.30 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H). | []
| null | 6.5 | null | null |
|
GHSA-4vx7-w6f9-96fg | Veeam ONE Reporter 9.5.0.3201 allows CSRF. | []
| null | null | 8.8 | null |
|
GHSA-ccw5-7vfh-p5hm | Directory Traversal in dmmcquay.lab6 | Affected versions of `dmmcquay.lab6` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.**Example request:**RecommendationNo patch is available for this vulnerability.It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead. | []
| null | null | 7.5 | null |
CVE-2015-6058 | Microsoft Edge mishandles HTML attributes in HTTP responses, which allows remote attackers to bypass a cross-site scripting (XSS) protection mechanism via unspecified vectors, aka "Microsoft Edge XSS Filter Bypass." | [
"cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*"
]
| null | null | null | 4.3 |
|
CVE-2013-4694 | Stack-based buffer overflow in gen_jumpex.dll in Winamp before 5.64 Build 3418 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a package with a long Skin directory name. NOTE: a second buffer overflow involving a long GUI Search field to ml_local.dll was also reported. However, since it is only exploitable by the user of the application, this issue would not cross privilege boundaries unless Winamp is running under a highly restricted environment such as a kiosk. | [
"cpe:2.3:a:nullsoft:winamp:*:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:0.20a:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:0.92:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:1.006:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:1.90:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:2.91:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:2.92:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:2.95:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.01:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.1:-:surround:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.02:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.03:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.04:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.05:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.06:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.07:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.08c:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.08d:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.08e:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.09:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.11:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.12:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.13:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.21:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.22:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.23:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.24:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.31:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.32:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.33:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.34:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.35:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.36:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.51:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.51:beta:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.52:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.53:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.54:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.54:beta:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.55:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.55:beta:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.56:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.57:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.58:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.59:beta:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.61:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.091:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.093:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.094:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.111:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.112:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.531:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.541:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.551:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.552:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.572:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.581:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.623:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
PYSEC-2019-122 | null | Sqla_yaml_fixtures 0.9.1 allows local users to execute arbitrary python code via the fixture_text argument in sqla_yaml_fixtures.load. | []
| null | null | null | null |
CVE-2024-8049 | Telerik Document Processing Improper Handling of Memory Resources | In Progress Telerik Document Processing Libraries, versions prior to 2024 Q4 (2024.4.1106), importing a document with unsupported features can lead to excessive processing, leading to excessive use of computing resources leaving the application process unavailable. | [
"cpe:2.3:a:progress:telerik_document_processing_libraries:*:*:*:*:*:*:*:*"
]
| null | 6.5 | null | null |
CVE-2024-33543 | WordPress WP Time Slots Booking Form plugin <= 1.2.06 - Broken Access Control vulnerability | Missing Authorization vulnerability in CodePeople WP Time Slots Booking Form.This issue affects WP Time Slots Booking Form: from n/a through 1.2.06. | [
"cpe:2.3:a:codepeople:wp_time_slots_booking_form:*:*:*:*:*:*:*:*",
"cpe:2.3:a:codepeople:wp_time_slots_booking_form:*:*:*:*:*:wordpress:*:*"
]
| null | 7.5 | null | null |
GHSA-343p-p7qv-45r9 | SQL injection vulnerability in the Jomres (com_jomres) component before 7.3.1 for Joomla! allows remote authenticated users with the "Business Manager" permission to execute arbitrary SQL commands via the id parameter in an editProfile action to administrator/index.php. | []
| null | null | null | null |
|
GHSA-rqm2-g87f-f74v | In da, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08541781; Issue ID: ALPS08541781. | []
| null | 6.6 | null | null |
|
GHSA-qfqg-fwpj-f3c6 | In memory management driver, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android SoCAndroid ID: A-183461320 | []
| null | null | null | null |
|
GHSA-8r38-jrwh-8grw | An issue has been discovered in GitLab CE/EE affecting all versions before 15.5.7, all versions starting from 15.6 before 15.6.4, all versions starting from 15.7 before 15.7.2. A race condition can lead to verified email forgery and takeover of third-party accounts when using GitLab as an OAuth provider. | []
| null | 8.5 | null | null |
|
CVE-2022-30392 | Merchandise Online Store v1.0 is vulnerable to SQL Injection via /vloggers_merch/classes/Master.php?f=delete_sub_category. | [
"cpe:2.3:a:merchandise_online_store_project:merchandise_online_store:1.0:*:*:*:*:*:*:*"
]
| null | 9.8 | null | 7.5 |
|
CVE-2024-44855 | Open Robotics Robotic Operating System 2 ROS2 navigation2 v.humble was discovered to contain a NULL pointer dereference via the component nav2_navfn_planner(). | [
"cpe:2.3:a:openrobotics:robot_operating_system:2:humble:*:*:*:*:*:*",
"cpe:2.3:a:openrobotics:robot_operating_system:2:iron:*:*:*:*:*:*"
]
| null | 7.5 | null | null |
|
CVE-2023-25810 | Persistent Cross site scripting (XSS) through description in status page in Uptime Kuma | Uptime Kuma is a self-hosted monitoring tool. In versions prior to 1.20.0 the Uptime Kuma status page allows a persistent XSS attack. Users are advised to upgrade. There are no known workarounds for this vulnerability. | [
"cpe:2.3:a:uptime-kuma_project:uptime-kuma:*:*:*:*:*:*:*:*"
]
| null | 6.3 | null | null |
GHSA-8jr7-cfwf-c8r8 | The Qualcomm SPMI driver in Android before 2016-09-05 on Nexus 5, 5X, 6, and 6P devices allows attackers to obtain sensitive information via a crafted application, aka Android internal bug 28760543 and Qualcomm internal bug CR1024197. | []
| null | null | 5.5 | null |
|
CVE-2016-10825 | cPanel before 55.9999.141 allows attackers to bypass a Security Policy by faking static documents (SEC-92). | [
"cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*"
]
| null | null | 8.1 | 5.5 |
|
CVE-2023-4680 | Vault's Transit Secrets Engine Allowed Nonce Specified without Convergent Encryption | HashiCorp Vault and Vault Enterprise transit secrets engine allowed authorized users to specify arbitrary nonces, even with convergent encryption disabled. The encrypt endpoint, in combination with an offline attack, could be used to decrypt arbitrary ciphertext and potentially derive the authentication subkey when using transit secrets engine without convergent encryption. Introduced in 1.6.0 and fixed in 1.14.3, 1.13.7, and 1.12.11. | [
"cpe:2.3:a:hashicorp:vault:*:*:*:*:*:*:*:*",
"cpe:2.3:a:hashicorp:vault_enterprise:*:*:*:*:*:*:*:*",
"cpe:2.3:a:hashicorp:vault:*:*:*:*:enterprise:*:*:*"
]
| null | 6.8 | null | null |
CVE-2024-32569 | WordPress Ditty plugin <= 3.1.31 - Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Metaphor Creations Ditty allows Stored XSS.This issue affects Ditty: from n/a through 3.1.31.
| [
"cpe:2.3:a:metaphorcreations:ditty:-:*:*:*:*:wordpress:*:*"
]
| null | 6.5 | null | null |
GHSA-5xp9-mqm3-5jw2 | Unspecified vulnerability in Oracle Sun Solaris 10 and 11.3 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to the PAM LDAP module. | []
| null | null | 9.8 | null |
|
GHSA-95qh-rxf5-w7vp | Blind SQL injection vulnerability in the Conacwin 3.7.1.2 web interface, the exploitation of which could allow a local attacker to obtain sensitive data stored in the database by sending a specially crafted SQL query to the xml parameter. | []
| null | 9.9 | null | null |
|
GHSA-rmx2-4jx5-xv9c | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Pepro Dev. Group PeproDev WooCommerce Receipt Uploader allows Reflected XSS. This issue affects PeproDev WooCommerce Receipt Uploader: from n/a through 2.6.9. | []
| null | 7.1 | null | null |
|
GHSA-mvrh-3gxx-gj39 | HTTP response splitting vulnerability in the @SetHTTPHeader function in Lotus Domino 6.5.x before 6.5.4 and 6.0.x before 6.0.5 allows attackers to poison the web cache via malicious applications. | []
| null | null | null | null |
|
CVE-2024-32697 | WordPress HelloAsso plugin <= 1.1.5 - Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in HelloAsso allows Stored XSS.This issue affects HelloAsso: from n/a through 1.1.5.
| []
| null | 6.5 | null | null |
CVE-2007-1097 | Unrestricted file upload vulnerability in the onAttachFiles function in the upload tool (inc/lib/attachment.lib.php) in Wiclear before 0.11.1 allows remote attackers to upload and execute arbitrary PHP code via unspecified vectors related to filename validation. NOTE: some details were obtained from third party information. | [
"cpe:2.3:a:wiclear:wiclear:*:*:*:*:*:*:*:*"
]
| null | null | null | 10 |
|
CVE-2013-4444 | Unrestricted file upload vulnerability in Apache Tomcat 7.x before 7.0.40, in certain situations involving outdated java.io.File code and a custom JMX configuration, allows remote attackers to execute arbitrary code by uploading and accessing a JSP file. | [
"cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.2:beta:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.4:beta:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.21:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.22:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.23:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.24:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.25:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.26:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.27:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.28:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.29:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.30:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.31:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.32:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.33:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.34:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.35:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.36:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.37:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.38:*:*:*:*:*:*:*"
]
| null | null | null | 6.8 |
|
GHSA-q5h7-h4x9-6hwv | Phicomm FIR151B A2, FIR302E A2, FIR300B A2, FIR303B A2 routers V3.0.1.17 were discovered to contain a remote command execution (RCE) vulnerability via the current_time parameter of the time function. | []
| null | 7.2 | null | null |
|
GHSA-c8rx-qghv-2wwg | In atf (hwfde), there is a possible leak of sensitive information due to incorrect error handling. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06171729; Issue ID: ALPS06171729. | []
| null | 4.4 | null | null |
|
CVE-2018-2379 | In SAP HANA Extended Application Services, 1.0, an unauthenticated user could test if a given username is valid by evaluating error messages of a specific endpoint. | [
"cpe:2.3:a:sap:hana_extended_application_services:1.0:*:*:*:*:*:*:*"
]
| null | null | 6.5 | 4 |
|
CVE-2024-36573 | almela obx before v.0.0.4 has a Prototype Pollution issue which allows arbitrary code execution via the obx/build/index.js:656), reduce (@almela/obx/build/index.js:470), Object.set (obx/build/index.js:269) component. | [
"cpe:2.3:a:almela:obx:*:*:*:*:*:*:*:*"
]
| null | 9.8 | null | null |
|
CVE-2024-36453 | Cross-site scripting vulnerability exists in session_login.cgi of Webmin versions prior to 1.970 and Usermin versions prior to 1.820. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who accessed the website using the product. As a result, a webpage may be altered or sensitive information such as a credential may be disclosed. | []
| null | 6.1 | null | null |
|
CVE-2023-39348 | Improper log output when using GitHub Status Notifications in spinnaker | Spinnaker is an open source, multi-cloud continuous delivery platform. Log output when updating GitHub status is improperly set to FULL always. It's recommended to apply the patch and rotate the GitHub token used for github status notifications. Given that this would output github tokens to a log system, the risk is slightly higher than a "low" since token exposure could grant elevated access to repositories outside of control. If using READ restricted tokens, the exposure is such that the token itself could be used to access resources otherwise restricted from reads. This only affects users of GitHub Status Notifications. This issue has been addressed in pull request 1316. Users are advised to upgrade. Users unable to upgrade should disable GH Status Notifications, Filter their logs for Echo log data and use read-only tokens that are limited in scope. | [
"cpe:2.3:a:linuxfoundation:spinnaker:*:*:*:*:*:*:*:*",
"cpe:2.3:a:linuxfoundation:spinnaker:1.30.0:*:*:*:*:*:*:*"
]
| null | 4 | null | null |
GHSA-g97p-564p-26xp | A stack exhaustion issue in the printIFDStructure function of Exiv2 0.27 allows remote attackers to cause a denial of service (DOS) via a crafted file. | []
| null | 6.5 | null | null |
|
GHSA-r744-r36f-363j | mruby is vulnerable to NULL Pointer Dereference | []
| null | null | null | null |
|
GHSA-vr96-v4f2-hj3f | IrfanView version 4.44 (32bit) with TOOLS Plugin 4.50 might allow attackers to cause a denial of service or execute arbitrary code via a crafted file, related to "Data from Faulting Address controls Branch Selection starting at KERNELBASE!EnumResourceTypesInternal+0x0000000000000589." | []
| null | null | 7.8 | null |
|
GHSA-6647-3gg5-89vr | login.php in ACal Calendar Project 2.2.5 allows remote attackers to bypass authentication by setting the ACalAuthenticate cookie variable to "inside". | []
| null | null | null | null |
|
CVE-2025-24480 | FactoryTalk® View Machine Editon - Remote Code Execution | A Remote Code Execution Vulnerability exists in the product and version listed above. The vulnerability is due to lack of input sanitation and could allow a remote attacker to run commands or code as a high privileged user. | []
| 9.3 | null | null | null |
GHSA-jgrv-p7rc-9f92 | The mg_http_serve_file function in Cesanta Mongoose HTTP server 7.0 is vulnerable to remote OOB write attack via connection request after exhausting memory pool. | []
| null | null | null | null |
|
GHSA-wfx2-p684-q6v4 | Adobe Media Encoder version 24.0.2 (and earlier) and 23.6 (and earlier) are affected by an Access of Uninitialized Pointer vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | []
| null | 3.3 | null | null |
|
CVE-2023-40485 | Maxon Cinema 4D SKP File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability | Maxon Cinema 4D SKP File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Maxon Cinema 4D. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of SKP files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-21433. | [
"cpe:2.3:a:maxon:cinema_4d:*:*:*:*:*:*:*:*"
]
| null | null | 7.8 | null |
GHSA-f84h-684p-rggr | The Brizy Page Builder plugin <= 2.3.11 for WordPress was vulnerable to stored XSS by lower-privileged users such as a subscribers. It was possible to add malicious JavaScript to a page by modifying the request sent to update the page via the brizy_update_item AJAX action and adding JavaScript to the data parameter, which would be executed in the session of any visitor viewing or previewing the post or page. | []
| null | 5.4 | null | null |
|
CVE-2014-4963 | Shopizer 1.1.5 and earlier allows remote attackers to modify the account settings of arbitrary users via the customer.customerId parameter to shop/profile/register.action. | [
"cpe:2.3:a:shopizer:shopizer:*:*:*:*:*:*:*:*"
]
| null | null | null | 6.8 |
|
CVE-2024-43138 | WordPress Event Manager and Tickets Selling Plugin for WooCommerce plugin <= 4.2.1 - Local File Inclusion vulnerability | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in MagePeople Team Event Manager for WooCommerce allows PHP Local File Inclusion.This issue affects Event Manager for WooCommerce: from n/a through 4.2.1. | [
"cpe:2.3:a:mage-people:event_manager_and_tickets_selling_for_woocommerce:*:*:*:*:*:wordpress:*:*"
]
| null | 6.5 | null | null |
CVE-2015-4493 | Heap-based buffer overflow in the stagefright::ESDS::parseESDescriptor function in libstagefright in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 allows remote attackers to execute arbitrary code via an invalid size field in an esds chunk in MPEG-4 video data, a related issue to CVE-2015-1539. | [
"cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*"
]
| null | null | null | 9.3 |
|
GHSA-67cw-4jhh-3jm7 | speechd 0.54 and earlier, with the Festival or rsynth speech synthesis package, allows attackers to execute arbitrary commands via shell metacharacters. | []
| null | null | null | null |
|
CVE-2025-2312 | cifs.upcall makes an upcall to the wrong namespace in containerized environments | A flaw was found in cifs-utils. When trying to obtain Kerberos credentials, the cifs.upcall program from the cifs-utils package makes an upcall to the wrong namespace in containerized environments. This issue may lead to disclosing sensitive data from the host's Kerberos credentials cache. | []
| null | 5.9 | null | null |
CVE-2023-24055 | KeePass through 2.53 (in a default installation) allows an attacker, who has write access to the XML configuration file, to obtain the cleartext passwords by adding an export trigger. NOTE: the vendor's position is that the password database is not intended to be secure against an attacker who has that level of access to the local PC. | [
"cpe:2.3:a:keepass:keepass:*:*:*:*:*:*:*:*"
]
| null | 5.5 | null | null |
|
GHSA-62wf-h26v-5m57 | Cross Site Scripting vulnerability in Dolibarr ERP CRM | Cross Site Scripting vulnerability in Dolibarr ERP CRM v.17.0.1 and before allows a remote attacker to obtain sensitive information and execute arbitrary code via the REST API module, related to analyseVarsForSqlAndScriptsInjection and testSqlAndScriptInject. | []
| null | 9.6 | null | null |
GHSA-cf86-5cg9-6496 | An issue has been discovered in GitLab affecting all versions starting from 10.0 before 12.9.8, all versions starting from 12.10 before 12.10.7, all versions starting from 13.0 before 13.0.1. A user could use an unverified email as a public email and commit email by sending a specifically crafted request on user update settings. | []
| null | 0 | null | null |
|
GHSA-h6j2-5wf7-xffq | The zip:// URL wrapper provided by the PECL zip extension in PHP before 4.4.7, and 5.2.0 and 5.2.1, does not implement safemode or open_basedir checks, which allows remote attackers to read ZIP archives located outside of the intended directories. | []
| null | null | null | null |
|
CVE-2022-41653 | Daikin SVMPC1 version 2.1.22 and prior and SVMPC2 version 1.2.3 and prior are vulnerable to an attacker obtaining user login credentials and control the system. | [
"cpe:2.3:a:daikinlatam:svmpc1:*:*:*:*:*:*:*:*",
"cpe:2.3:a:daikinlatam:svmpc2:*:*:*:*:*:*:*:*"
]
| null | 9.8 | null | null |
|
GHSA-mhww-7vf3-c57h | PHP remote file inclusion vulnerability in index.php in phpDVD 1.0.4 allows remote attackers to execute arbitrary PHP code via a URL in the dvd_config_file parameter. | []
| null | null | null | null |
|
CVE-2024-10517 | ProfilePress < 4.15.15 - Admin+ Stored XSS | The Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content WordPress plugin before 4.15.15 does not sanitise and escape some of its Drag & Drop Builder fields, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). | []
| null | 4.8 | null | null |
GHSA-9fgx-q25h-jxrg | DOM XSS in Theme Preview | ImpactAn unused endpoint added during the development of 4.0.0 has left sites vulnerable to untrusted users gaining access to Ghost Admin. Attackers can gain access by getting logged in users to click a link containing malicious code. Users do not need to enter credentials and may not know they've visited a malicious site.Ghost(Pro) has already been patched. We can find no evidence that the issue was exploited on Ghost(Pro) prior to the patch being added.Self-hosters are impacted if running Ghost a version between 4.0.0 and 4.3.2. Immediate action should be taken to secure your site - see patches & workarounds below.PatchesFixed in 4.3.3, all 4.x sites should upgrade as soon as possible.
As the endpoint is unused, the patch simply removes it.WorkaroundsLog out of Ghost AdminSuspend any users who cannot log outBlock access to `/ghost/preview`Example of how to block access in nginx:This redirects the endpoint to `/ghost/`, which mimics the behaviour after the patch is applied.References[Forum Post](https://forum.ghost.org/t/critical-security-update-available-for-ghost-4-x/22290)For more informationIf you have any questions or comments about this advisory:email us at [email protected]: Paul Gerste, SonarSource (https://www.sonarsource.com/) | []
| null | 6.8 | null | null |
CVE-2009-0137 | Multiple unspecified vulnerabilities in Safari RSS in Apple Mac OS X 10.4.11 and 10.5.6, and Windows XP and Vista, allow remote attackers to execute arbitrary JavaScript in the local security zone via a crafted feed: URL, related to "input validation issues." | [
"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.11:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.5.6:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.11:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.6:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:*:*:*:*:*:*:*"
]
| null | null | null | 10 |
|
GHSA-w8mq-5926-cx56 | Missing Authorization vulnerability in Uncanny Owl Uncanny Automator Pro allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Uncanny Automator Pro: from n/a through 5.3.0.0. | []
| null | 5.3 | null | null |
|
CVE-2024-38541 | of: module: add buffer overflow check in of_modalias() | In the Linux kernel, the following vulnerability has been resolved:
of: module: add buffer overflow check in of_modalias()
In of_modalias(), if the buffer happens to be too small even for the 1st
snprintf() call, the len parameter will become negative and str parameter
(if not NULL initially) will point beyond the buffer's end. Add the buffer
overflow check after the 1st snprintf() call and fix such check after the
strlen() call (accounting for the terminating NUL char). | [
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
]
| null | 9.8 | null | null |
GHSA-7w8h-h4pj-jgjq | An unprivileged user can delete arbitrary files on a Linux system running ENSLTP 10.5.1, 10.5.0, and 10.2.3 Hotfix 1246778 and earlier. By exploiting a time of check to time of use (TOCTOU) race condition during a specific scanning sequence, the unprivileged user is able to perform a privilege escalation to delete arbitrary files. | []
| null | null | 4.7 | null |
|
GHSA-hpr6-f4vq-mxch | Command injection in LocalStack | The dashboard component of StackLift LocalStack allows attackers to inject arbitrary shell commands via the functionName parameter. | []
| 9.3 | 9.8 | null | null |
CVE-2023-22668 | Use After Free in Audio | Memory Corruption in Audio while invoking IOCTLs calls from the user-space. | [
"cpe:2.3:o:qualcomm:aqt1000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:aqt1000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ar8035:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:fastconnect_6200_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:fastconnect_6200:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:fastconnect_6800_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:fastconnect_6800:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:fastconnect_6900:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:fastconnect_7800:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qam8255p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qam8255p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qam8775p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qam8775p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6391:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6420_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6420:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6426_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6426:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6430_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6430:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6436_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6436:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6584au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6698aq:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca8081:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca8337_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca8337:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcc710_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcc710:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn6224_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn6224:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn6274_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn6274:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qfw7114_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qfw7114:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qfw7124_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qfw7124:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qualcomm_205_mobile_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qualcomm_205_mobile_platform:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qualcomm_215_mobile_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qualcomm_215_mobile_platform:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8255p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8255p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8770p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8770p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8775p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8775p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa9000p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa9000p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd855_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd855:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd865_5g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd865_5g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_210_processor_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_210_processor:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_212_mobile_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_212_mobile_platform:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_855_mobile_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_855_mobile_platform:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_855\\+\\/860_mobile_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_855\\+\\/860_mobile_platform:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_865_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_865_5g_mobile_platform:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_865\\+_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_865\\+_5g_mobile_platform:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_870_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_870_5g_mobile_platform:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_gen_2_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_auto_5g_modem-rf_gen_2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_w5\\+_gen_1_wearable_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_w5\\+_gen_1_wearable_platform:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_wear_4100\\+_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_wear_4100\\+_platform:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_x55_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_x55_5g_modem-rf_system:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_x75_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_x75_5g_modem-rf_system:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_xr2_5g_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_xr2_5g_platform:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sw5100_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sw5100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sw5100p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sw5100p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sxr2130_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sxr2130:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9340_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9340:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9341_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9341:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3610_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3610:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3980:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3988:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8810:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8815:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*"
]
| null | 6.7 | null | null |
CVE-2019-5126 | An exploitable use-after-free vulnerability exists in the JavaScript engine of Foxit PDF Reader, version 9.7.0.29435. A specially crafted PDF document can trigger a previously freed object in memory to be reused, resulting in arbitrary code execution. An attacker needs to trick the user to open the malicious file to trigger this vulnerability. If the browser plugin extension is enabled, visiting a malicious site can also trigger the vulnerability. | [
"cpe:2.3:a:foxitsoftware:phantompdf:*:*:*:*:*:*:*:*",
"cpe:2.3:a:foxitsoftware:reader:*:*:*:*:*:*:*:*"
]
| null | null | 8.8 | null |
|
GHSA-f734-p3hx-8cw4 | LuaJIT through 2.1 has an unsinking of IR_FSTORE for NULL metatable, which leads to Denial of Service (DoS). | []
| null | 7.5 | null | null |
|
CVE-2017-18231 | An issue was discovered in GraphicsMagick 1.3.26. A NULL pointer dereference vulnerability was found in the function ReadEnhMetaFile in coders/emf.c, which allows attackers to cause a denial of service via a crafted file. | [
"cpe:2.3:a:graphicsmagick:graphicsmagick:1.3.26:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
]
| null | null | 6.5 | 4.3 |
|
GHSA-6mwv-rxcm-749p | MIME buffer overflow in Sendmail 8.8.0 and 8.8.1 gives root access. | []
| null | null | null | null |
|
CVE-2024-20502 | A vulnerability in the Cisco AnyConnect VPN server of Cisco Meraki MX and Cisco Meraki Z Series Teleworker Gateway devices could allow an unauthenticated, remote attacker to cause a DoS condition on an affected device.
This vulnerability is due to insufficient resource management while establishing SSL VPN sessions. An attacker could exploit this vulnerability by sending a series of crafted HTTPS requests to the VPN server of an affected device. A successful exploit could allow the attacker to cause the Cisco AnyConnect VPN server to stop accepting new connections, preventing new SSL VPN connections from being established. Existing SSL VPN sessions are not impacted.
Note: When the attack traffic stops, the Cisco AnyConnect VPN server recovers gracefully without requiring manual intervention. | [
"cpe:2.3:h:cisco:meraki_mx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:meraki_z1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:meraki_mx65_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:meraki_mx65:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:meraki_mx64_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:meraki_mx64:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:meraki_z4c_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:meraki_z4c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:meraki_z4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:meraki_z4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:meraki_z3c_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:meraki_z3c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:meraki_z3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:meraki_z3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:meraki_vmx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:meraki_vmx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:meraki_mx600_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:meraki_mx600:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:meraki_mx450_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:meraki_mx450:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:meraki_mx400_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:meraki_mx400:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:meraki_mx250_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:meraki_mx250:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:meraki_mx105_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:meraki_mx105:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:meraki_mx100_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:meraki_mx100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:meraki_mx95_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:meraki_mx95:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:meraki_mx85_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:meraki_mx85:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:meraki_mx84_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:meraki_mx84:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:meraki_mx75_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:meraki_mx75:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:meraki_mx68w_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:meraki_mx68w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:meraki_mx68cw_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:meraki_mx68cw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:meraki_mx68_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:meraki_mx68:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:meraki_mx67w_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:meraki_mx67w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:meraki_mx67c_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:meraki_mx67c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:meraki_mx67_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:meraki_mx67:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:meraki_mx65w_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:meraki_mx65w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:meraki_mx64w_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:meraki_mx64w:-:*:*:*:*:*:*:*"
]
| null | 5.8 | null | null |
|
CVE-2017-5697 | Insufficient clickjacking protection in the Web User Interface of Intel AMT firmware versions before 9.1.40.1000, 9.5.60.1952, 10.0.50.1004, 11.0.0.1205, and 11.6.25.1129 potentially allowing a remote attacker to hijack users web clicks via attacker's crafted web page. | [
"cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*"
]
| null | 6.5 | null | 4.3 |
|
GHSA-jxgp-hq49-3gq9 | The Simple:Press plugin for WordPress is vulnerable to arbitrary file modifications in versions up to, and including, 6.8 via the 'file' parameter which does not properly restrict files to be edited in the context of the plugin. This makes it possible with attackers, with high-level permissions such as an administrator, to supply paths to arbitrary files on the server that can be modified outside of the intended scope of the plugin. | []
| null | 4.9 | null | null |
|
CVE-2006-4120 | Cross-site scripting (XSS) vulnerability in the Recipe module (recipe.module) before 1.54 for Drupal 4.6 and earlier allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | [
"cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:4.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:4.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:4.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:4.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:4.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:4.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:4.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:4.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:4.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:4.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:recipe_module:*:*:*:*:*:*:*:*"
]
| null | null | null | 5.1 |
|
RHSA-2023:4025 | Red Hat Security Advisory: Red Hat OpenShift support for Windows Containers 7.1.0 [security update] | containerd: Supplementary groups are not set up properly | [
"cpe:/a:redhat:openshift:4.12::el8"
]
| null | 7.3 | null | null |
GHSA-x3m6-vcp7-98mr | Stored XSS vulnerability in Jenkins REST List Parameter Plugin | Jenkins REST List Parameter Plugin 1.3.0 and earlier does not escape a parameter name reference in embedded JavaScript.This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.Jenkins REST List Parameter Plugin 1.3.1 no longer identifies a parameter using user-specified content. | []
| null | 5.4 | null | null |
GHSA-874w-m2v2-mj64 | Double Free in Adplug | AdPlug 2.3.1 has a double free in the `Cu6mPlayer` class in `u6m.h`. | []
| null | null | 9.8 | null |
GHSA-qw33-m8q7-rggj | An issue was discovered in GPAC version 0.8.0 and 0.9.0-development-20191109. There is a NULL pointer dereference in the function ilst_item_Read() in isomedia/box_code_apple.c. | []
| null | 5.5 | null | null |
|
GHSA-wvwm-8h46-4mr7 | The stock Android browser address bar in all Android operating systems suffers from Address Bar Spoofing, which allows remote attackers to trick a victim by displaying a malicious page for legitimate domain names. | []
| null | null | 6.5 | null |
|
GHSA-3frx-qxqr-3j3r | cPanel before 74.0.8 allows self XSS in WHM Style Upload interface (SEC-437). | []
| null | null | 5.4 | null |
|
CVE-2019-14825 | A cleartext password storage issue was discovered in Katello, versions 3.x.x.x before katello 3.12.0.9. Registry credentials used during container image discovery were inadvertently logged without being masked. This flaw could expose the registry credentials to other privileged users. | [
"cpe:2.3:a:theforeman:katello:*:*:*:*:*:*:*:*"
]
| null | null | 4.1 | null |
|
RHSA-2005:527 | Red Hat Security Advisory: openssh security update | security flaw openssh may set DISPLAY even if it's unable to listen on respective port | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
]
| null | null | null | null |
CVE-2012-4826 | Stack-based buffer overflow in the SQL/PSM (aka SQL Persistent Stored Module) Stored Procedure (SP) infrastructure in IBM DB2 9.1, 9.5, 9.7 before FP7, 9.8, and 10.1 might allow remote authenticated users to execute arbitrary code by debugging a stored procedure. | [
"cpe:2.3:a:ibm:db2:9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:9.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:9.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:9.7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:9.7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:9.7.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:9.7.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:9.7.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:9.7.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:9.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:10.1:*:*:*:*:*:*:*"
]
| null | null | null | 8.5 |
|
CVE-2023-34998 | An authentication bypass vulnerability exists in the OAS Engine functionality of Open Automation Software OAS Platform v18.00.0072. A specially crafted series of network requests can lead to arbitrary authentication. An attacker can sniff network traffic to trigger this vulnerability. | [
"cpe:2.3:a:openautomationsoftware:oas_platform:18.00.0072:*:*:*:*:*:*:*"
]
| null | 8.1 | null | null |
|
GHSA-279h-9ccj-88q7 | The oEmbed protocol implementation in WordPress before 4.5.3 allows remote attackers to cause a denial of service via unspecified vectors. | []
| null | null | 7.5 | null |
|
RHSA-2015:0301 | Red Hat Security Advisory: hivex security, bug fix, and enhancement update | hivex: missing checks for small-sized files | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
]
| null | null | null | null |
GHSA-p75j-wc34-527c | Exposure of Sensitive Information to an Unauthorized Actor in ansible | A flaw was found in ansible 2.8.0 before 2.8.4. Fields managing sensitive data should be set as such by no_log feature. Some of these fields in GCP modules are not set properly. service_account_contents() which is common class for all gcp modules is not setting no_log to True. Any sensitive data managed by that function would be leak as an output when running ansible playbooks. | []
| 7.1 | 6.5 | null | null |
GHSA-gpv8-9v7v-wv6v | The Linux Foundation ONOS SDN Controller 1.15 and earlier versions is affected by: Improper Input Validation. The impact is: A remote attacker can execute arbitrary commands on the controller. The component is: apps/yang/src/main/java/org/onosproject/yang/impl/YangLiveCompilerManager.java. The attack vector is: network connectivity. The fixed version is: 1.15. | []
| null | null | null | null |
|
GHSA-xpf3-7cmq-j53r | An issue was discovered on Epson WorkForce WF-2861 10.48 LQ22I3, 10.51.LQ20I6 and 10.52.LQ17IA devices. On the 'Air Print Setting' web page, if the data for 'Bonjour Service Location' at /PRESENTATION/BONJOUR is more than 251 bytes when sending data for Air Print Setting, then the device no longer functions until a reboot. | []
| null | null | 7.5 | null |
|
GHSA-8xvr-8v4v-rm6j | Stack-based buffer overflow in Firebird 2.1.3 through 2.1.5 before 18514, and 2.5.1 through 2.5.3 before 26623, on Windows allows remote attackers to execute arbitrary code via a crafted packet to TCP port 3050, related to a missing size check during extraction of a group number from CNCT information. | []
| null | null | null | null |
|
CVE-2017-7913 | A Plaintext Storage of a Password issue was discovered in Moxa OnCell G3110-HSPA Version 1.3 build 15082117 and previous versions, OnCell G3110-HSDPA Version 1.2 Build 09123015 and previous versions, OnCell G3150-HSDPA Version 1.4 Build 11051315 and previous versions, OnCell 5104-HSDPA, OnCell 5104-HSPA, and OnCell 5004-HSPA. The application's configuration file contains parameters that represent passwords in plaintext. | [
"cpe:2.3:o:moxa:oncell_g3110-hspa_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:oncell_g3110-hspa:-:*:*:*:*:*:*:*",
"cpe:2.3:o:moxa:oncell_g3110-hsdpa_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:oncell_g3110-hsdpa:-:*:*:*:*:*:*:*",
"cpe:2.3:o:moxa:oncell_g3150-hsdpa_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:oncell_g3150-hsdpa:-:*:*:*:*:*:*:*",
"cpe:2.3:o:moxa:oncell_5104-hsdpa_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:oncell_5104-hsdpa:-:*:*:*:*:*:*:*",
"cpe:2.3:o:moxa:oncell_5104-hspa_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:oncell_5104-hspa:-:*:*:*:*:*:*:*",
"cpe:2.3:o:moxa:oncell_5004-hspa_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:oncell_5004-hspa:-:*:*:*:*:*:*:*"
]
| null | null | 9.8 | 5 |
|
CVE-2025-2017 | Ashlar-Vellum Cobalt CO File Parsing Buffer Overflow Remote Code Execution Vulnerability | Ashlar-Vellum Cobalt CO File Parsing Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ashlar-Vellum Cobalt. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of CO files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-25240. | []
| null | null | 7.8 | null |
GHSA-5xmx-5p6r-vfrv | The Auth API in ProFTPD before 20070417, when multiple simultaneous authentication modules are configured, does not require that the module that checks authentication is the same as the module that retrieves authentication data, which might allow remote attackers to bypass authentication, as demonstrated by use of SQLAuthTypes Plaintext in mod_sql, with data retrieved from /etc/passwd. | []
| null | null | null | null |
|
CVE-2023-23519 | A memory corruption issue was addressed with improved state management. This issue is fixed in watchOS 9.3, tvOS 16.3, macOS Ventura 13.2, iOS 16.3 and iPadOS 16.3. Processing an image may lead to a denial-of-service. | [
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
]
| null | 7.5 | null | null |
|
CVE-2014-4467 | WebKit, as used in Apple iOS before 8.1.3, does not properly determine scrollbar boundaries during the rendering of FRAME elements, which allows remote attackers to spoof the UI via a crafted web site. | [
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"
]
| null | null | null | 4.3 |
|
CVE-2019-7358 | An exploitable heap overflow vulnerability in the DXF-parsing functionality in Autodesk Advance Steel 2018, Autodesk AutoCAD 2018, Autodesk AutoCAD Architecture 2018, Autodesk AutoCAD Electrical 2018, Autodesk AutoCAD Map 3D 2018, Autodesk AutoCAD Mechanical 2018, Autodesk AutoCAD MEP 2018, Autodesk AutoCAD P&ID 2018, Autodesk AutoCAD Plant 3D 2018, Autodesk AutoCAD LT 2018, and Autodesk Civil 3D 2018. A specially crafted DXF file may cause a heap overflow, resulting in code execution. | [
"cpe:2.3:a:autodesk:advance_steel:2018:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad:2018:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_architecture:2018:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_electrical:2018:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_lt:2018:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_map_3d:2018:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_mechanical:2018:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_mep:2018:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_p\\&id:2018:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_plant_3d:2018:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:civil_3d:2018:*:*:*:*:*:*:*"
]
| null | null | 7.8 | 6.8 |
|
GHSA-cfhc-8r7r-vh6v | VMware Carbon Black App Control 8.7.x prior to 8.7.8, 8.8.x prior to 8.8.6, and 8.9.x.prior to 8.9.4 contain an injection vulnerability. A malicious actor with privileged access to the App Control administration console may be able to use specially crafted input allowing access to the underlying server operating system. | []
| null | 7.2 | null | null |
|
GHSA-gf5p-vf9f-xmpj | Possible buffer overflow due to improper validation of array index while processing external DIAG command in Snapdragon Auto, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables | []
| null | 7.8 | null | null |
|
CVE-2022-46325 | Some smartphones have the out-of-bounds write vulnerability.Successful exploitation of this vulnerability may cause system service exceptions. | [
"cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*"
]
| null | 9.8 | null | null |
|
GHSA-q29c-5v72-jv6f | DedeCMS up to and including 5.7.110 was discovered to contain multiple cross-site scripting (XSS) vulnerabilities at /dede/vote_edit.php via the votename and votenote parameters. | []
| null | 5.4 | null | null |
|
RHSA-2008:0514 | Red Hat Security Advisory: evolution security update | evolution: iCalendar buffer overflow via large timezone specification evolution: iCalendar buffer overflow via large description parameter | [
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation"
]
| null | null | null | null |
GHSA-63m8-pjhm-9hgq | PHP remote file inclusion vulnerability in includes/common.php in Yaap 1.5 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the root_path parameter, possibly related to the __autoload function. | []
| null | null | null | null |
|
GHSA-rp9x-pqc9-2683 | In the Linux kernel, the following vulnerability has been resolved:drm/radeon: fix UBSAN warning in kv_dpm.cAdds bounds check for sumo_vid_mapping_entry. | []
| null | null | null | null |
|
CVE-2022-4019 | Authenticated user could send multiple requests containing a large payload to a Playbooks API and can crash a Mattermost server | A denial-of-service vulnerability in the Mattermost Playbooks plugin allows an authenticated user to crash the server via multiple large requests to one of the Playbooks API endpoints.
| [
"cpe:2.3:a:mattermost:mattermost:-:*:*:*:*:*:*:*"
]
| null | 4.3 | null | null |
GHSA-3vf7-gh27-gx55 | A vulnerability was found in Dart http_server up to 0.9.5 and classified as problematic. Affected by this issue is the function VirtualDirectory of the file lib/src/virtual_directory.dart of the component Directory Listing Handler. The manipulation of the argument request.uri.path leads to cross site scripting. The attack may be launched remotely. Upgrading to version 0.9.6 is able to address this issue. The name of the patch is 27c1cbd8125bb0369e675eb72e48218496e48ffb. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-225356. | []
| null | 6.1 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.