id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
139k
cpes
sequencelengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
GHSA-5c3r-jc6c-jrpr
A CWE-306 "Missing Authentication for Critical Function" in maxprofile/accounts/routes.lua in Q-Free MaxTime less than or equal to version 2.11.0 allows an unauthenticated remote attacker to create arbitrary users, including administrators, via crafted HTTP requests.
[]
null
9.8
null
null
CVE-2024-1102
Jberet: jberet-core logging database credentials
A vulnerability was found in jberet-core logging. An exception in 'dbProperties' might display user credentials such as the username and password for the database-connection.
[ "cpe:/a:redhat:jboss_enterprise_application_platform:8.0", "cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8", "cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9", "cpe:/a:redhat:build_keycloak:", "cpe:/a:redhat:jboss_data_grid:8", "cpe:/a:redhat:jboss_fuse:7", "cpe:/a:redhat:jboss_data_grid:7", "cpe:/a:redhat:jboss_enterprise_application_platform:6", "cpe:/a:redhat:jboss_enterprise_application_platform:7", "cpe:/a:redhat:jbosseapxp", "cpe:/a:redhat:red_hat_single_sign_on:7" ]
null
6.5
null
null
CVE-2024-29011
Use of hard-coded password in the GMS ECM endpoint leading to authentication bypass vulnerability. This issue affects GMS: 9.3.4 and earlier versions.
[ "cpe:2.3:a:sonicwall:global_management_system:-:*:*:*:*:*:*:*" ]
null
7.5
null
null
cisco-sa-backhaul-ap-cmdinj-R7E28Ecs
Cisco Unified Industrial Wireless Software for Ultra-Reliable Wireless Backhaul Access Point Command Injection Vulnerability
A vulnerability in the web-based management interface of Cisco Unified Industrial Wireless Software for Cisco Ultra-Reliable Wireless Backhaul (URWB) Access Points could allow an unauthenticated, remote attacker to perform command injection attacks with root privileges on the underlying operating system. This vulnerability is due to improper validation of input to the web-based management interface. An attacker could exploit this vulnerability by sending crafted HTTP requests to the web-based management interface of an affected system. A successful exploit could allow the attacker to execute arbitrary commands with root privileges on the underlying operating system of the affected device. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
[]
null
10
null
null
RHSA-2023:6188
Red Hat Security Advisory: firefox security update
Mozilla: Queued up rendering could have allowed websites to clickjack Mozilla: Large WebGL draw could have led to a crash Mozilla: WebExtensions could open arbitrary URLs Mozilla: Improper object tracking during GC in the JavaScript engine could have led to a crash. Mozilla: Memory safety bugs fixed in Firefox 119, Firefox ESR 115.4, and Thunderbird 115.4 Mozilla: Address bar spoofing via bidirectional characters libvpx: crash related to VP9 encoding in libvpx
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
7.5
null
null
CVE-2022-44648
An Out-of-bounds read vulnerability in Trend Micro Apex One and Apex One as a Service could allow a local attacker to disclose sensitive information on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This is similar to, but not the same as CVE-2022-44647.
[ "cpe:2.3:a:trendmicro:apex_one:*:*:*:*:saas:*:*:*", "cpe:2.3:a:trendmicro:apex_one:2019:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
5.5
null
null
GHSA-g483-mcjg-g334
An issue was discovered in the DBI module before 1.632 for Perl. Using many arguments to methods for Callbacks may lead to memory corruption.
[]
null
5.3
null
null
CVE-2025-30298
Adobe Framemaker | Stack-based Buffer Overflow (CWE-121)
Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by a Stack-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[]
null
7.8
null
null
RHSA-2021:2881
Red Hat Security Advisory: thunderbird security update
Mozilla: IMAP server responses sent by a MITM prior to STARTTLS could be processed Mozilla: Use-after-free in accessibility features of a document Mozilla: Memory safety bugs fixed in Firefox 90 and Firefox ESR 78.12 chromium-browser: Out of bounds write in ANGLE
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
8.8
null
null
GHSA-c3pr-rr9m-p77p
Microsoft Site Server 3.0 prior to SP4 installs a default user, LDAP_Anonymous, with a default password of LdapPassword_1, which allows remote attackers the "Log on locally" privilege.
[]
null
null
null
null
CVE-2022-1993
Path Traversal in gogs/gogs
Path Traversal in GitHub repository gogs/gogs prior to 0.12.9.
[ "cpe:2.3:a:gogs:gogs:*:*:*:*:*:*:*:*" ]
null
null
8.1
null
CVE-2012-6561
Cross-site scripting (XSS) vulnerability in engine/lib/views.php in Elgg before 1.8.5 allows remote attackers to inject arbitrary web script or HTML via the view parameter to index.php. NOTE: some of these details are obtained from third party information.
[ "cpe:2.3:a:elgg:elgg:*:*:*:*:*:*:*:*", "cpe:2.3:a:elgg:elgg:1.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:elgg:elgg:1.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:elgg:elgg:1.7.2:*:*:*:*:*:*:*", "cpe:2.3:a:elgg:elgg:1.7.3:*:*:*:*:*:*:*", "cpe:2.3:a:elgg:elgg:1.7.4:*:*:*:*:*:*:*", "cpe:2.3:a:elgg:elgg:1.7.5:*:*:*:*:*:*:*", "cpe:2.3:a:elgg:elgg:1.7.6:*:*:*:*:*:*:*", "cpe:2.3:a:elgg:elgg:1.7.7:*:*:*:*:*:*:*", "cpe:2.3:a:elgg:elgg:1.7.8:*:*:*:*:*:*:*", "cpe:2.3:a:elgg:elgg:1.7.9:*:*:*:*:*:*:*", "cpe:2.3:a:elgg:elgg:1.7.10:*:*:*:*:*:*:*", "cpe:2.3:a:elgg:elgg:1.7.11:*:*:*:*:*:*:*", "cpe:2.3:a:elgg:elgg:1.7.12:*:*:*:*:*:*:*", "cpe:2.3:a:elgg:elgg:1.7.13:*:*:*:*:*:*:*", "cpe:2.3:a:elgg:elgg:1.7.14:*:*:*:*:*:*:*", "cpe:2.3:a:elgg:elgg:1.7.15:*:*:*:*:*:*:*", "cpe:2.3:a:elgg:elgg:1.7.16:*:*:*:*:*:*:*", "cpe:2.3:a:elgg:elgg:1.7.17:*:*:*:*:*:*:*", "cpe:2.3:a:elgg:elgg:1.7.18:*:*:*:*:*:*:*", "cpe:2.3:a:elgg:elgg:1.8.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:elgg:elgg:1.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:elgg:elgg:1.8.3:*:*:*:*:*:*:*" ]
null
null
null
4.3
GHSA-gm5j-v4fx-cqp5
Unquoted Windows search path vulnerability in EMC Replication Manager through 5.5.2 and AppSync before 2.1.0 allows local users to gain privileges via a Trojan horse application with a name composed of an initial substring of a path that contains a space character.
[]
null
null
null
null
GHSA-868f-54xq-2j4c
An issue was discovered on Samsung mobile devices with P(9.0) and Q(10.0) software. Attackers can bypass Factory Reset Protection (FRP) via AppInfo. The Samsung ID is SVE-2020-17758 (August 2020).
[]
null
null
null
null
CVE-2006-1570
Cross-site scripting (XSS) vulnerability in Esqlanelapse 2.0 and 2.2 allows remote attackers to inject arbitrary web script or HTML via unknown attack vectors.
[ "cpe:2.3:a:esqlanelapse:esqlanelapse:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:esqlanelapse:esqlanelapse:2.2:*:*:*:*:*:*:*" ]
null
null
null
4.3
GHSA-f44q-mpr6-mggp
Auth. (contributor+) Stored Cross-Site Scripting vulnerability in Galleryape Gallery Images Ape plugin <= 2.2.8 versions.
[]
null
5.4
null
null
CVE-2015-4162
XML external entity (XXE) vulnerability in the management interface in PAN-OS before 5.0.16, 6.x before 6.0.8, and 6.1.x before 6.1.4 allows remote authenticated administrators to obtain sensitive information via crafted XML data.
[ "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:6.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:6.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:6.0.3:*:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:6.0.4:*:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:6.0.5:*:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:6.0.6:*:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:6.0.7:*:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:6.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:6.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:6.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:6.1.3:*:*:*:*:*:*:*" ]
null
null
null
4
CVE-2004-1104
Microsoft Internet Explorer 6.0 SP2 allows remote attackers to spoof a legitimate URL in the status bar and conduct a phishing attack via a web page that contains a BASE element that points to the legitimate site, followed by an anchor (a) element with an empty "href" attribute, and a FORM whose action points to a malicious URL, and an INPUT submit element that is modified to look like a legitimate URL.
[ "cpe:2.3:a:microsoft:ie:6.0:sp2:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2006-0409
Cross-site scripting (XSS) vulnerability in index.php in Pixelpost Photoblog 1.4.3 allows remote attackers to inject arbitrary web script or HTML via the "Add Comment" field in a comment popup.
[ "cpe:2.3:a:pixelpost:photoblog:1.4.3:*:*:*:*:*:*:*" ]
null
null
null
4.3
CVE-2011-3171
Directory traversal vulnerability in pure-FTPd 1.0.22 and possibly other versions, when running on SUSE Linux Enterprise Server and possibly other operating systems, when the Netware OES remote server feature is enabled, allows local users to overwrite arbitrary files via unknown vectors.
[ "cpe:2.3:a:pureftpd:pure-ftpd:*:*:*:*:*:*:*:*", "cpe:2.3:a:pureftpd:pure-ftpd:0.90:*:*:*:*:*:*:*", "cpe:2.3:a:pureftpd:pure-ftpd:0.91:*:*:*:*:*:*:*", "cpe:2.3:a:pureftpd:pure-ftpd:0.92:*:*:*:*:*:*:*", "cpe:2.3:a:pureftpd:pure-ftpd:0.93:*:*:*:*:*:*:*", "cpe:2.3:a:pureftpd:pure-ftpd:0.94:*:*:*:*:*:*:*", "cpe:2.3:a:pureftpd:pure-ftpd:0.95:*:*:*:*:*:*:*", "cpe:2.3:a:pureftpd:pure-ftpd:0.95:pre1:*:*:*:*:*:*", "cpe:2.3:a:pureftpd:pure-ftpd:0.95:pre2:*:*:*:*:*:*", "cpe:2.3:a:pureftpd:pure-ftpd:0.95:pre3:*:*:*:*:*:*", "cpe:2.3:a:pureftpd:pure-ftpd:0.95:pre4:*:*:*:*:*:*", "cpe:2.3:a:pureftpd:pure-ftpd:0.95.1:*:*:*:*:*:*:*", "cpe:2.3:a:pureftpd:pure-ftpd:0.95.2:*:*:*:*:*:*:*", "cpe:2.3:a:pureftpd:pure-ftpd:0.96:*:*:*:*:*:*:*", "cpe:2.3:a:pureftpd:pure-ftpd:0.96:pre1:*:*:*:*:*:*", "cpe:2.3:a:pureftpd:pure-ftpd:0.96.1:*:*:*:*:*:*:*", "cpe:2.3:a:pureftpd:pure-ftpd:0.97:pre1:*:*:*:*:*:*", "cpe:2.3:a:pureftpd:pure-ftpd:0.97:pre2:*:*:*:*:*:*", "cpe:2.3:a:pureftpd:pure-ftpd:0.97:pre3:*:*:*:*:*:*", "cpe:2.3:a:pureftpd:pure-ftpd:0.97:pre4:*:*:*:*:*:*", "cpe:2.3:a:pureftpd:pure-ftpd:0.97:pre5:*:*:*:*:*:*", "cpe:2.3:a:pureftpd:pure-ftpd:0.97-final:*:*:*:*:*:*:*", "cpe:2.3:a:pureftpd:pure-ftpd:0.97.1:*:*:*:*:*:*:*", "cpe:2.3:a:pureftpd:pure-ftpd:0.97.2:*:*:*:*:*:*:*", "cpe:2.3:a:pureftpd:pure-ftpd:0.97.3:*:*:*:*:*:*:*", "cpe:2.3:a:pureftpd:pure-ftpd:0.97.4:*:*:*:*:*:*:*", "cpe:2.3:a:pureftpd:pure-ftpd:0.97.5:*:*:*:*:*:*:*", "cpe:2.3:a:pureftpd:pure-ftpd:0.97.6:*:*:*:*:*:*:*", "cpe:2.3:a:pureftpd:pure-ftpd:0.97.7:*:*:*:*:*:*:*", "cpe:2.3:a:pureftpd:pure-ftpd:0.97.7:pre1:*:*:*:*:*:*", "cpe:2.3:a:pureftpd:pure-ftpd:0.97.7:pre2:*:*:*:*:*:*", "cpe:2.3:a:pureftpd:pure-ftpd:0.97.7:pre3:*:*:*:*:*:*", "cpe:2.3:a:pureftpd:pure-ftpd:0.98:final:*:*:*:*:*:*", "cpe:2.3:a:pureftpd:pure-ftpd:0.98:pre1:*:*:*:*:*:*", "cpe:2.3:a:pureftpd:pure-ftpd:0.98:pre2:*:*:*:*:*:*", "cpe:2.3:a:pureftpd:pure-ftpd:0.98.1:*:*:*:*:*:*:*", "cpe:2.3:a:pureftpd:pure-ftpd:0.98.2:*:*:*:*:*:*:*", "cpe:2.3:a:pureftpd:pure-ftpd:0.98.2:a:*:*:*:*:*:*", "cpe:2.3:a:pureftpd:pure-ftpd:0.98.3:*:*:*:*:*:*:*", "cpe:2.3:a:pureftpd:pure-ftpd:0.98.4:*:*:*:*:*:*:*", "cpe:2.3:a:pureftpd:pure-ftpd:0.98.5:*:*:*:*:*:*:*", "cpe:2.3:a:pureftpd:pure-ftpd:0.98.6:*:*:*:*:*:*:*", "cpe:2.3:a:pureftpd:pure-ftpd:0.98.7:*:*:*:*:*:*:*", "cpe:2.3:a:pureftpd:pure-ftpd:0.99:*:*:*:*:*:*:*", "cpe:2.3:a:pureftpd:pure-ftpd:0.99:a:*:*:*:*:*:*", "cpe:2.3:a:pureftpd:pure-ftpd:0.99:b:*:*:*:*:*:*", "cpe:2.3:a:pureftpd:pure-ftpd:0.99:pre1:*:*:*:*:*:*", "cpe:2.3:a:pureftpd:pure-ftpd:0.99:pre2:*:*:*:*:*:*", "cpe:2.3:a:pureftpd:pure-ftpd:0.99.1:*:*:*:*:*:*:*", "cpe:2.3:a:pureftpd:pure-ftpd:0.99.1:a:*:*:*:*:*:*", "cpe:2.3:a:pureftpd:pure-ftpd:0.99.1:b:*:*:*:*:*:*", "cpe:2.3:a:pureftpd:pure-ftpd:0.99.2:*:*:*:*:*:*:*", "cpe:2.3:a:pureftpd:pure-ftpd:0.99.2:a:*:*:*:*:*:*", "cpe:2.3:a:pureftpd:pure-ftpd:0.99.3:*:*:*:*:*:*:*", "cpe:2.3:a:pureftpd:pure-ftpd:0.99.4:*:*:*:*:*:*:*", "cpe:2.3:a:pureftpd:pure-ftpd:0.99.9:*:*:*:*:*:*:*", "cpe:2.3:a:pureftpd:pure-ftpd:1.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:pureftpd:pure-ftpd:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:pureftpd:pure-ftpd:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:pureftpd:pure-ftpd:1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:pureftpd:pure-ftpd:1.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:pureftpd:pure-ftpd:1.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:pureftpd:pure-ftpd:1.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:pureftpd:pure-ftpd:1.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:pureftpd:pure-ftpd:1.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:pureftpd:pure-ftpd:1.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:pureftpd:pure-ftpd:1.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:pureftpd:pure-ftpd:1.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:pureftpd:pure-ftpd:1.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:pureftpd:pure-ftpd:1.0.13:a:*:*:*:*:*:*", "cpe:2.3:a:pureftpd:pure-ftpd:1.0.14:*:*:*:*:*:*:*", "cpe:2.3:a:pureftpd:pure-ftpd:1.0.15:*:*:*:*:*:*:*", "cpe:2.3:a:pureftpd:pure-ftpd:1.0.16:a:*:*:*:*:*:*", "cpe:2.3:a:pureftpd:pure-ftpd:1.0.16:b:*:*:*:*:*:*", "cpe:2.3:a:pureftpd:pure-ftpd:1.0.16:c:*:*:*:*:*:*", "cpe:2.3:a:pureftpd:pure-ftpd:1.0.17:*:*:*:*:*:*:*", "cpe:2.3:a:pureftpd:pure-ftpd:1.0.17:a:*:*:*:*:*:*", "cpe:2.3:a:pureftpd:pure-ftpd:1.0.18:*:*:*:*:*:*:*", "cpe:2.3:a:pureftpd:pure-ftpd:1.0.19:*:*:*:*:*:*:*", "cpe:2.3:a:pureftpd:pure-ftpd:1.0.20:*:*:*:*:*:*:*", "cpe:2.3:a:pureftpd:pure-ftpd:1.0.21:*:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_server:11:sp1:vmware:*:*:*:*:*" ]
null
null
null
3.6
GHSA-jm95-jq7g-49p8
The WP Maintenance plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 6.1.6 via the REST API. This makes it possible for unauthenticated attackers to bypass the plugin's maintenance mode obtain post and page content via REST API.
[]
null
5.3
null
null
CVE-2020-21605
libde265 v1.0.4 contains a segmentation fault in the apply_sao_internal function, which can be exploited via a crafted a file.
[ "cpe:2.3:a:struktur:libde265:1.0.4:*:*:*:*:*:*:*" ]
null
6.5
null
4.3
GHSA-2c9f-3x4j-7qjc
PHP remote file inclusion vulnerability in admin/configset.php in Sphider 1.3 and earlier, when register_globals is disabled, allows remote attackers to execute arbitrary PHP code via a URL in the settings_dir parameter.
[]
null
null
null
null
CVE-2023-1342
The RapidLoad Power-Up for Autoptimize plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.7.1. This is due to missing or incorrect nonce validation on the ucss_connect function. This makes it possible for unauthenticated attackers to connect the site to a new license key via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
[ "cpe:2.3:a:rapidload:power-up_for_autoptimize:*:*:*:*:*:wordpress:*:*" ]
null
4.3
null
null
GHSA-7mqr-2v3q-v2wm
Ory fosite contains Improper Handling of Exceptional Conditions
ImpactThe `TokenRevocationHandler` ignores errors coming from the storage. This can lead to unexpected 200 status codes indicating successful revocation while the token is still valid. Whether an attacker can use this for her advantage depends on the ability to trigger errors in the store.References[RFC 7009](https://tools.ietf.org/html/rfc7009#section-2.2.1) states that a 503 HTTP code must be returned when the server has a problem.
[]
null
8
null
null
CVE-2011-4431
Directory traversal vulnerability in main.php in Merethis Centreon before 2.3.2 allows remote authenticated users to execute arbitrary commands via a .. (dot dot) in the command_name parameter.
[ "cpe:2.3:a:merethis:centreon:*:*:*:*:*:*:*:*", "cpe:2.3:a:merethis:centreon:1.4:*:*:*:*:*:*:*", "cpe:2.3:a:merethis:centreon:1.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:merethis:centreon:1.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:merethis:centreon:1.4.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:merethis:centreon:1.4.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:merethis:centreon:1.4.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:merethis:centreon:1.4.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:merethis:centreon:1.4.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:merethis:centreon:1.4.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:merethis:centreon:1.4.2.7:*:*:*:*:*:*:*", "cpe:2.3:a:merethis:centreon:2.0:b2:*:*:*:*:*:*", "cpe:2.3:a:merethis:centreon:2.0:b3:*:*:*:*:*:*", "cpe:2.3:a:merethis:centreon:2.0:b4:*:*:*:*:*:*", "cpe:2.3:a:merethis:centreon:2.0:b5:*:*:*:*:*:*", "cpe:2.3:a:merethis:centreon:2.0:b6:*:*:*:*:*:*", "cpe:2.3:a:merethis:centreon:2.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:merethis:centreon:2.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:merethis:centreon:2.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:merethis:centreon:2.0:rc4:*:*:*:*:*:*", "cpe:2.3:a:merethis:centreon:2.0:rc5:*:*:*:*:*:*", "cpe:2.3:a:merethis:centreon:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:merethis:centreon:2.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:merethis:centreon:2.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:merethis:centreon:2.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:merethis:centreon:2.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:merethis:centreon:2.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:merethis:centreon:2.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:merethis:centreon:2.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:merethis:centreon:2.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:merethis:centreon:2.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:merethis:centreon:2.1.8:*:*:*:*:*:*:*", "cpe:2.3:a:merethis:centreon:2.1.9:*:*:*:*:*:*:*", "cpe:2.3:a:merethis:centreon:2.1.10:*:*:*:*:*:*:*", "cpe:2.3:a:merethis:centreon:2.1.11:*:*:*:*:*:*:*", "cpe:2.3:a:merethis:centreon:2.1.12:*:*:*:*:*:*:*", "cpe:2.3:a:merethis:centreon:2.1.13:*:*:*:*:*:*:*", "cpe:2.3:a:merethis:centreon:2.2:*:*:*:*:*:*:*", "cpe:2.3:a:merethis:centreon:2.2:b1:*:*:*:*:*:*", "cpe:2.3:a:merethis:centreon:2.2:rc1:*:*:*:*:*:*", "cpe:2.3:a:merethis:centreon:2.2:rc2:*:*:*:*:*:*", "cpe:2.3:a:merethis:centreon:2.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:merethis:centreon:2.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:merethis:centreon:2.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:merethis:centreon:2.3.0:rc3:*:*:*:*:*:*" ]
null
null
null
6.5
GHSA-q4cc-gv4m-4q8g
Out of bounds read in JavaScript in Google Chrome prior to 76.0.3809.100 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
[]
null
null
null
null
GHSA-2q6x-5pqx-mmvc
DGLogik Inc DGLux Server All Versions is affected by: Insecure Permissions. The impact is: Remote Execution, Credential Leaks. The component is: IoT API. The attack vector is: Any Accessible Server.
[]
null
null
9.8
null
GHSA-56w7-9rqr-p4fc
ImageMagick 7.0.8-54 Q16 allows Division by Zero in RemoveDuplicateLayers in MagickCore/layer.c.
[]
null
6.5
null
null
GHSA-5p7g-3pf4-fr58
Shearwater SecurEnvoy SecurAccess Enrol before 9.4.515 allows authentication through only a six-digit TOTP code (skipping a password check) if an HTTP POST request contains a SESSION parameter.
[]
null
8.6
null
null
RHSA-2013:0254
Red Hat Security Advisory: flash-plugin security update
flash-plugin: information disclosure flaw (APSB13-05) flash-plugin: multiple code execution flaws (APSB13-05) flash-plugin: multiple code execution flaws (APSB13-05) flash-plugin: multiple code execution flaws (APSB13-05) flash-plugin: multiple code execution flaws (APSB13-05) flash-plugin: multiple code execution flaws (APSB13-05) flash-plugin: multiple code execution flaws (APSB13-05) flash-plugin: multiple code execution flaws (APSB13-05) flash-plugin: multiple code execution flaws (APSB13-05) flash-plugin: multiple code execution flaws (APSB13-05) flash-plugin: multiple code execution flaws (APSB13-05) flash-plugin: multiple code execution flaws (APSB13-05) flash-plugin: multiple code execution flaws (APSB13-05) flash-plugin: multiple code execution flaws (APSB13-05) flash-plugin: multiple code execution flaws (APSB13-05) flash-plugin: multiple code execution flaws (APSB13-05) flash-plugin: multiple code execution flaws (APSB13-05)
[ "cpe:/a:redhat:rhel_extras:5::server", "cpe:/a:redhat:rhel_extras:6" ]
null
null
null
null
CVE-2023-32316
Users can add themselves to any organization in CloudExplorer Lite
CloudExplorer Lite is an open source cloud management tool. In affected versions users can add themselves to any organization in CloudExplorer Lite. This is due to a missing permission check on the user profile. It is recommended to upgrade the version to v1.1.0. There are no known workarounds for this vulnerability.
[ "cpe:2.3:a:fit2cloud:cloudexplorer:*:*:*:*:lite:*:*:*" ]
null
7.1
null
null
CVE-2020-26516
A CSRF issue was discovered in Intland codeBeamer ALM 10.x through 10.1.SP4. Requests sent to the server that trigger actions do not contain a CSRF token and can therefore be entirely predicted allowing attackers to cause the victim's browser to execute undesired actions in the web application through crafted requests.
[ "cpe:2.3:a:intland:codebeamer:10.0.0:-:*:*:*:*:*:*", "cpe:2.3:a:intland:codebeamer:10.0.0:prerelease4:*:*:*:*:*:*", "cpe:2.3:a:intland:codebeamer:10.0.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:intland:codebeamer:10.0.0:sp1:*:*:*:*:*:*", "cpe:2.3:a:intland:codebeamer:10.0.0:sp2:*:*:*:*:*:*", "cpe:2.3:a:intland:codebeamer:10.0.1:sp1:*:*:*:*:*:*", "cpe:2.3:a:intland:codebeamer:10.1.0:-:*:*:*:*:*:*", "cpe:2.3:a:intland:codebeamer:10.1.0:sp1:*:*:*:*:*:*", "cpe:2.3:a:intland:codebeamer:10.1.0:sp2:*:*:*:*:*:*", "cpe:2.3:a:intland:codebeamer:10.1.0:sp3:*:*:*:*:*:*", "cpe:2.3:a:intland:codebeamer:10.1.0:sp4:*:*:*:*:*:*", "cpe:2.3:a:intland:codebeamer:21.04:*:*:*:*:*:*:*" ]
null
8.8
null
6.8
CVE-2021-39166
Improper Neutralization of Text-Values in Object Version Preview
Pimcore is an open source data & experience management platform. Prior to version 10.1.2, text-values were not properly escaped before printed in the version preview. This allowed XSS by authenticated users with access to the resources. This issue is patched in Pimcore version 10.1.2.
[ "cpe:2.3:a:pimcore:pimcore:*:*:*:*:*:*:*:*" ]
null
8
null
null
GHSA-3gx7-r2xg-967q
SQL injection vulnerability in the TU-Clausthal Staff (tuc_staff) 0.3.0 and earlier extension for TYPO3 allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
[]
null
null
null
null
CVE-2012-0774
Integer overflow in Adobe Reader and Acrobat 9.x before 9.5.1 and 10.x before 10.1.3 allows attackers to execute arbitrary code via a crafted TrueType font.
[ "cpe:2.3:a:adobe:acrobat_reader:9.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:9.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:9.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:9.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:9.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:9.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:9.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:9.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:9.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:9.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:9.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:9.4:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:9.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:9.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:9.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:9.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:9.4.5:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:9.4.6:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:9.4.7:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:9.5:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.0:-:pro:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.1:-:pro:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.3:-:pro:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.4:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.4.5:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.4.6:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.4.7:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.5:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.0:-:pro:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.0.1:-:pro:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.1.2:*:*:*:*:*:*:*" ]
null
null
null
10
GHSA-m2q3-w4f2-83p6
Adobe Substance 3D Stager versions 2.0.0 (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[]
null
7.8
null
null
GHSA-rch7-f4h5-x9rj
Identity Spoofing in libp2p-secio
Affected versions of `libp2p-secio` does not correctly verify that the `PeerId` of `DstPeer` matches the `PeerId` discovered in the crypto handshake, resulting in a high severity identity spoofing vulnerability.RecommendationUpdate to version 0.9.0 or later.
[]
null
9.1
null
null
GHSA-rr6v-q8mf-wwqp
Microsoft Internet Explorer 6 through 9 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that was not properly initialized, aka "OLEAuto32.dll Remote Code Execution Vulnerability."
[]
null
null
null
null
GHSA-755f-qgr8-28qg
In Veritas System Recovery before 16 SP1, there is a DLL hijacking vulnerability in the patch installer if an attacker has write access to the directory from which the product is executed.
[]
null
null
7.8
null
CVE-2019-1432
An information disclosure vulnerability exists when DirectWrite improperly discloses the contents of its memory, aka 'DirectWrite Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2019-1411.
[ "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*" ]
null
6.5
null
4.3
RHSA-2021:2025
Red Hat Security Advisory: squid:4 security update
squid: improper input validation may allow a trusted client to perform HTTP request smuggling
[ "cpe:/a:redhat:rhel_eus:8.1::appstream", "cpe:/a:redhat:rhel_eus:8.2::appstream" ]
null
8.6
null
null
GHSA-w2q7-453r-gjq2
Deserialization of Untrusted Data vulnerability in Nextend Smart Slider 3.This issue affects Smart Slider 3: from n/a through 3.5.1.9.
[]
null
4.3
null
null
GHSA-5946-8p38-vffp
Apache Airflow Improper Input Validation vulnerability
Apache Airflow, versions before 2.6.3, is affected by a vulnerability that allows an attacker to cause a service disruption by manipulating the run_id parameter. This vulnerability is considered low since it requires an authenticated user to exploit it. It is recommended to upgrade to a version that is not affected
[]
7.1
6.5
null
null
GHSA-37cw-h2j8-6mwf
An issue was discovered in Navigate CMS through 2.8.7. It allows Directory Traversal because lib/packages/templates/template.class.php mishandles ../ and ..\ substrings.
[]
null
null
null
null
GHSA-mw97-4xhw-r6f2
Foxit PDF Reader Doc Object Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the handling of Doc objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-22639.
[]
null
null
7.8
null
CVE-2015-4374
Cross-site scripting (XSS) vulnerability in the Webform module before 6.x-3.23, 7.x-3.x before 7.x-3.23, and 7.x-4.x before 7.x-4.5 for Drupal allows remote authenticated users with certain permissions to inject arbitrary web script or HTML via a component name in the recipient (To) address of an email.
[ "cpe:2.3:a:webform_project:webform:*:*:*:*:*:drupal:*:*", "cpe:2.3:a:webform_project:webform:7.x-3.0:*:*:*:*:drupal:*:*", "cpe:2.3:a:webform_project:webform:7.x-3.1:*:*:*:*:drupal:*:*", "cpe:2.3:a:webform_project:webform:7.x-3.2:*:*:*:*:drupal:*:*", "cpe:2.3:a:webform_project:webform:7.x-3.3:*:*:*:*:drupal:*:*", "cpe:2.3:a:webform_project:webform:7.x-3.4:*:*:*:*:drupal:*:*", "cpe:2.3:a:webform_project:webform:7.x-3.5:*:*:*:*:drupal:*:*", "cpe:2.3:a:webform_project:webform:7.x-3.6:*:*:*:*:drupal:*:*", "cpe:2.3:a:webform_project:webform:7.x-3.7:*:*:*:*:drupal:*:*", "cpe:2.3:a:webform_project:webform:7.x-3.8:*:*:*:*:drupal:*:*", "cpe:2.3:a:webform_project:webform:7.x-3.9:*:*:*:*:drupal:*:*", "cpe:2.3:a:webform_project:webform:7.x-3.10:*:*:*:*:drupal:*:*", "cpe:2.3:a:webform_project:webform:7.x-3.11:*:*:*:*:drupal:*:*", "cpe:2.3:a:webform_project:webform:7.x-3.12:*:*:*:*:drupal:*:*", "cpe:2.3:a:webform_project:webform:7.x-3.13:*:*:*:*:drupal:*:*", "cpe:2.3:a:webform_project:webform:7.x-3.14:*:*:*:*:drupal:*:*", "cpe:2.3:a:webform_project:webform:7.x-3.15:*:*:*:*:drupal:*:*", "cpe:2.3:a:webform_project:webform:7.x-3.16:*:*:*:*:drupal:*:*", "cpe:2.3:a:webform_project:webform:7.x-3.17:*:*:*:*:drupal:*:*", "cpe:2.3:a:webform_project:webform:7.x-3.18:*:*:*:*:drupal:*:*", "cpe:2.3:a:webform_project:webform:7.x-3.19:*:*:*:*:drupal:*:*", "cpe:2.3:a:webform_project:webform:7.x-3.20:*:*:*:*:drupal:*:*", "cpe:2.3:a:webform_project:webform:7.x-3.21:*:*:*:*:drupal:*:*", "cpe:2.3:a:webform_project:webform:7.x-3.22:*:*:*:*:drupal:*:*", "cpe:2.3:a:webform_project:webform:7.x-4.0:*:*:*:*:drupal:*:*", "cpe:2.3:a:webform_project:webform:7.x-4.1:*:*:*:*:drupal:*:*", "cpe:2.3:a:webform_project:webform:7.x-4.2:*:*:*:*:drupal:*:*", "cpe:2.3:a:webform_project:webform:7.x-4.3:*:*:*:*:drupal:*:*", "cpe:2.3:a:webform_project:webform:7.x-4.4:*:*:*:*:drupal:*:*" ]
null
null
null
3.5
GHSA-27vh-h6mc-q6g8
btcd did not correctly re-implement Bitcoin Core's "FindAndDelete()" functionality
ImpactThe btcd Bitcoin client (versions 0.10 to 0.24) did not correctly re-implement Bitcoin Core's "FindAndDelete()" functionality. This logic is consensus-critical: the difference in behavior with the other Bitcoin clients can lead to btcd clients accepting an invalid Bitcoin block (or rejecting a valid one).This consensus failure can be leveraged to cause a chain split (accepting an invalid Bitcoin block) or be exploited to DoS the btcd nodes (rejecting a valid Bitcoin block). An attacker can create a standard transaction where FindAndDelete doesn't return a match but removeOpCodeByData does making btcd get a different sighash, leading to a chain split. Importantly, this vulnerability can be exploited remotely by any Bitcoin user and does not require any hash power. This is because the difference in behavior can be triggered by a "standard" Bitcoin transaction, that is a transaction which gets relayed through the P2P network before it gets included in a Bitcoin block.`FindAndDelete` vs. `removeOpcodeByData``removeOpcodeByData(script []byte, dataToRemove []byte)` removes any data pushes from `script` that *contain* `dataToRemove`. However, `FindAndDelete` only removes *exact* matches. So for example, with `script = "<data> <data||foo>"` and `dataToRemove = "data"` btcd will remove both data pushes but Bitcoin Core's `FindAndDelete` only removes the first `<data>` push.PatchesThis has been patched in `btcd` version v0.24.2-beta.References`FindAndDelete`: https://github.com/btcsuite/btcd/security/advisories/GHSA-27vh-h6mc-q6g8
[]
8.3
7.4
null
null
GHSA-7hcp-ff5q-84p9
Xiaohuanxiong v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /app/controller/Books.php.
[]
null
9.8
null
null
RHSA-2020:4638
Red Hat Security Advisory: sysstat security update
sysstat: memory corruption due to an integer overflow in remap_struct in sa_common.c
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
5.5
null
null
CVE-2024-6176
Port scanning vulnerability in LG SuperSign CMS
Allocation of Resources Without Limits or Throttling vulnerability in LG Electronics LG SuperSign CMS allows Port Scanning.This issue affects LG SuperSign CMS: from 4.1.3 before < 4.3.1.
[]
4.8
null
null
null
GHSA-wf2f-7965-9gx5
The Extensions for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's EE Events and EE Flipbox widgets in all versions up to, and including, 2.0.31 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
6.4
null
null
GHSA-48cr-c5wm-gfpq
A vulnerability has been identified in Solid Edge SE2023 (All versions < V223.0 Update 2). The affected application contains a use-after-free vulnerability that could be triggered while parsing specially crafted DWG file. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-19562)
[]
null
7.8
null
null
GHSA-8242-jv2h-87j8
Cross-site scripting (XSS) vulnerability in icue_login.asp in Maximus SchoolMAX 4.0.1 and earlier iCue and iParent applications allows remote attackers to inject arbitrary web script or HTML via the error_msg parameter.
[]
null
null
null
null
GHSA-42p6-jgxv-p4v9
Adobe Experience Manager versions 6.5.20 and earlier are affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
[]
null
5.4
null
null
GHSA-9g7m-p7pr-c4gp
Untrusted search path vulnerability in Flets Install Tool all versions distributed through the website till 2017 August 8 allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.
[]
null
null
7.8
null
PYSEC-2021-848
null
Sockeye is an open-source sequence-to-sequence framework for Neural Machine Translation built on PyTorch. Sockeye uses YAML to store model and data configurations on disk. Versions below 2.3.24 use unsafe YAML loading, which can be made to execute arbitrary code embedded in config files. An attacker can add malicious code to the config file of a trained model and attempt to convince users to download and run it. If users run the model, the embedded code will run locally. The issue is fixed in version 2.3.24.
[]
null
null
null
null
CVE-2020-3861
The issue was addressed with improved permissions logic. This issue is fixed in iTunes for Windows 12.10.4. A user may gain access to protected parts of the file system.
[ "cpe:2.3:a:apple:itunes:*:*:*:*:*:windows:*:*" ]
null
7.1
null
3.6
CVE-2024-32040
FreeRDP vulnerable to integer underflow in nsc_rle_decode
FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients that use a version of FreeRDP prior to 3.5.0 or 2.11.6 and have connections to servers using the `NSC` codec are vulnerable to integer underflow. Versions 3.5.0 and 2.11.6 patch the issue. As a workaround, do not use the NSC codec (e.g. use `-nsc`).
[ "cpe:2.3:a:freerdp:freerdp:*:*:*:*:*:*:*:*" ]
null
8.1
null
null
CVE-2002-1775
NOTE: this issue has been disputed by the vendor. Symantec Norton AntiVirus (NAV) 2002 allows remote attackers to bypass the initial virus scan and cause NAV to prematurely stop scanning by using a non-RFC compliant MIME header. NOTE: the vendor has disputed this issue, acknowledging that the initial scan is bypassed, but the AutoProtect feature would detect the virus before it is executed
[ "cpe:2.3:a:symantec:norton_antivirus:2002:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-gwr5-2w8p-gpfx
liboggplay in Mozilla Firefox 3.5.x before 3.5.6 and SeaMonkey before 2.0.1 might allow context-dependent attackers to cause a denial of service (application crash) or execute arbitrary code via unspecified vectors, related to "memory safety issues."
[]
null
null
null
null
CVE-2021-29802
IBM Security SOAR performs an operation at a privilege level that is higher than the minimum level required, which creates new weaknesses or amplifies the consequences of other weaknesses.
[ "cpe:2.3:a:ibm:resilient_security_orchestration_automation_and_response:*:*:*:*:*:*:*:*" ]
null
null
5.6
null
GHSA-p6c6-6r9j-859q
SAP NetWeaver Application Server Java(HTTP Service), versions - 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7.50, does not sufficiently validate logon group in URLs, resulting in a content spoofing vulnerability when directory listing is enabled.
[]
null
null
null
null
CVE-2025-22305
WordPress Hero Banner Ultimate plugin <= 1.4.2 - Local File Inclusion vulnerability
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in WP OnlineSupport, Essential Plugin Hero Banner Ultimate allows PHP Local File Inclusion.This issue affects Hero Banner Ultimate: from n/a through 1.4.2.
[]
null
6.5
null
null
CVE-2007-2533
Multiple buffer overflows in Trend Micro ServerProtect 5.58 before Security Patch 2- Build 1174 allow remote attackers to execute arbitrary code via a crafted RPC message processed by the (1) the RPCFN_ActiveRollback function in (a) stcommon.dll, or the (2) ENG_SetRealTimeScanConfigInfo or (3) ENG_SendEmail functions in (b) eng50.dll.
[ "cpe:2.3:a:trend_micro:serverprotect:5.58:*:*:*:*:*:*:*" ]
null
null
null
10
CVE-2005-0444
VMware before 4.5.2.8848-r5 searches for gdk-pixbuf shared libraries using a path that includes the rrdharan world-writable temporary directory, which allows local users to execute arbitrary code.
[ "cpe:2.3:a:vmware:workstation:*:r4:*:*:*:*:*:*" ]
null
null
null
4.6
CVE-2018-6906
A persistent Cross Site Scripting (XSS) vulnerability in the Green Electronics RainMachine Mini-8 (2nd Generation) and Touch HD 12 web application allows an attacker to inject arbitrary JavaScript via the REST API.
[ "cpe:2.3:a:rainmachine:rainmachine_web_application:-:*:*:*:*:*:*:*" ]
null
null
6.1
4.3
CVE-2015-6114
Microsoft Silverlight 5 before 5.1.41105.00 allows remote attackers to bypass the ASLR protection mechanism via a crafted web site, aka "Microsoft Silverlight Information Disclosure Vulnerability," a different vulnerability than CVE-2015-6165.
[ "cpe:2.3:a:microsoft:silverlight:5.0:*:*:*:*:*:*:*" ]
null
null
null
4.3
GHSA-frh2-w2hj-959j
Apport before 2.17.2-0ubuntu1.1 as packaged in Ubuntu 15.04, before 2.14.70ubuntu8.5 as packaged in Ubuntu 14.10, before 2.14.1-0ubuntu3.11 as packaged in Ubuntu 14.04 LTS, and before 2.0.1-0ubuntu17.9 as packaged in Ubuntu 12.04 LTS allow local users to write to arbitrary files and gain root privileges by leveraging incorrect handling of permissions when generating core dumps for setuid binaries.
[]
null
null
7.8
null
GHSA-8896-f2rw-r85c
Core FTP Server 1.2 before build 515 allows remote attackers to cause a denial of service (reachable assertion and crash) via an AUTH SSL command with malformed data, as demonstrated by pressing the enter key twice.
[]
null
null
null
null
CVE-2018-8492
A security feature bypass vulnerability exists in Device Guard that could allow an attacker to inject malicious code into a Windows PowerShell session, aka "Device Guard Code Integrity Policy Security Feature Bypass Vulnerability." This affects Windows Server 2016, Windows 10, Windows Server 2019, Windows 10 Servers.
[ "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*" ]
null
null
5.3
4.6
CVE-2021-4139
Cross-site Scripting (XSS) - Stored in pimcore/pimcore
pimcore is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
[ "cpe:2.3:a:pimcore:pimcore:*:*:*:*:*:*:*:*" ]
null
null
6.6
null
cisco-sa-dnac-cmdinj-erumsWh9
Cisco DNA Center Command Runner Command Injection Vulnerability
A vulnerability in the Command Runner tool of Cisco DNA Center could allow an authenticated, remote attacker to perform a command injection attack. The vulnerability is due to insufficient input validation by the Command Runner tool. An attacker could exploit this vulnerability by providing crafted input during command execution or via a crafted command runner API call. A successful exploit could allow the attacker to execute arbitrary CLI commands on devices managed by Cisco DNA Center. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
[]
null
9.6
null
null
GHSA-3gf7-6hqc-m4jp
The WStr::_alloc_iostr_data() function in kso.dll in Kingsoft WPS Office 10.1.0.7106 and 10.2.0.5978 allows remote attackers to cause a denial of service (application crash) via a crafted (a) web page, (b) office document, or (c) .rtf file.
[]
null
null
5.5
null
CVE-2006-6434
Unspecified vulnerability in the Web User Interface in Xerox WorkCentre and WorkCentre Pro before 12.050.03.000, 13.x before 13.050.03.000, and 14.x before 14.050.03.000 allows remote attackers to bypass authentication controls via unknown vectors.
[ "cpe:2.3:h:xerox:workcentre_232:*:*:*:*:*:*:*:*", "cpe:2.3:h:xerox:workcentre_232:*:*:pro:*:*:*:*:*", "cpe:2.3:h:xerox:workcentre_238:*:*:*:*:*:*:*:*", "cpe:2.3:h:xerox:workcentre_238:*:*:pro:*:*:*:*:*", "cpe:2.3:h:xerox:workcentre_245:*:*:*:*:*:*:*:*", "cpe:2.3:h:xerox:workcentre_245:*:*:pro:*:*:*:*:*", "cpe:2.3:h:xerox:workcentre_255:*:*:*:*:*:*:*:*", "cpe:2.3:h:xerox:workcentre_255:*:*:pro:*:*:*:*:*", "cpe:2.3:h:xerox:workcentre_265:*:*:*:*:*:*:*:*", "cpe:2.3:h:xerox:workcentre_265:*:*:pro:*:*:*:*:*", "cpe:2.3:h:xerox:workcentre_275:*:*:*:*:*:*:*:*", "cpe:2.3:h:xerox:workcentre_275:*:*:pro:*:*:*:*:*" ]
null
null
null
7.5
CVE-2024-43625
Microsoft Windows VMSwitch Elevation of Privilege Vulnerability
Microsoft Windows VMSwitch Elevation of Privilege Vulnerability
[ "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*" ]
null
8.1
null
null
GHSA-ww7v-5cpr-4v77
SQL Injection vulnerability in PuneethReddyHC Online Shopping sysstem advanced v.1.0 allows an attacker to execute arbitrary code via the register.php
[]
null
9.8
null
null
GHSA-7f69-3jw6-qjqw
The WP Job Portal – A Complete Recruitment System for Company or Job Board website plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the assignUserRole() function in all versions up to, and including, 2.2.2. This makes it possible for unauthenticated attackers to elevate their privileges to that of an employer.
[]
null
4.8
null
null
CVE-2023-32392
A privacy issue was addressed with improved private data redaction for log entries. This issue is fixed in watchOS 9.5, tvOS 16.5, macOS Ventura 13.4, macOS Big Sur 11.7.7, macOS Monterey 12.6.6, iOS 16.5 and iPadOS 16.5. An app may be able to read sensitive location information.
[ "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*" ]
null
5.5
null
null
GHSA-8w87-x959-5wq6
Unspecified vulnerability in Adobe Flash Player 21.0.0.213 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-064.
[]
null
null
7.5
null
CVE-2020-9964
A memory initialization issue was addressed with improved memory handling. This issue is fixed in iOS 14.0 and iPadOS 14.0. A local user may be able to read kernel memory.
[ "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" ]
null
5.5
null
4.9
CVE-2023-31519
Pharmacy Management System v1.0 was discovered to contain a SQL injection vulnerability via the email parameter at login_core.php.
[ "cpe:2.3:a:pharmacy_management_system_project:pharmacy_management_system:1.0:*:*:*:*:*:*:*" ]
null
9.8
null
null
CVE-2022-2788
Emerson Electric's Proficy Machine Edition Version 9.80 and prior is vulnerable to CWE-29 Path Traversal: '\..\Filename', also known as a ZipSlip attack, through an upload procedure which enables attackers to implant a malicious .BLZ file on the PLC. The file can transfer through the engineering station onto Windows in a way that executes the malicious code.
[ "cpe:2.3:a:emerson:electric\\'s_proficy:*:*:*:*:machine:*:*:*" ]
null
3.9
null
null
GHSA-xwhw-2q44-qw48
OX App Suite through 7.10.4 allows SSRF via a URL with an @ character in an appsuite/api/oauth/proxy PUT request.
[]
null
null
null
null
ICSA-23-299-06
Rockwell Automation FactoryTalk Services Platform
Due to inadequate code logic, a previously unauthenticated threat actor could potentially obtain a local Windows OS user token through the FactoryTalk Services Platform web service and then use the token to log in into FactoryTalk Services Platform. This vulnerability can only be exploited if the authorized user did not previously log in into the FactoryTalk Services Platform web service.
[]
null
8.1
null
null
GHSA-548g-mwqg-f632
Type confusion in Blink Layout in Google Chrome prior to 99.0.4844.51 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
[]
null
8.8
null
null
GHSA-hgcm-2jjw-4pr2
The flash-based vSphere Web Client (6.0 prior to 6.0 U3c and 5.5 prior to 5.5 U3f) i.e. not the new HTML5-based vSphere Client, contains SSRF and CRLF injection issues due to improper neutralization of URLs. An attacker may exploit these issues by sending a POST request with modified headers towards internal services leading to information disclosure.
[]
null
null
7.5
null
GHSA-429h-x6j7-958r
Cross-site scripting (XSS) vulnerability in the Web-Dorado Instagram Feed WD plugin before 1.3.1 Premium for WordPress allows remote attackers to inject arbitrary web script or HTML by passing payloads in a comment on an Instagram post.
[]
null
null
6.1
null
CVE-2019-3861
An out of bounds read flaw was discovered in libssh2 before 1.8.1 in the way SSH packets with a padding length value greater than the packet length are parsed. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.
[ "cpe:2.3:a:libssh2:libssh2:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*" ]
null
null
5
null
GHSA-7rjr-qxc3-7hh3
In the Linux kernel, the following vulnerability has been resolved:io_uring/poll: don't reissue in case of poll race on multishot requestA previous commit fixed a poll race that can occur, but it's only applicable for multishot requests. For a multishot request, we can safely ignore a spurious wakeup, as we never leave the waitqueue to begin with.A blunt reissue of a multishot armed request can cause us to leak a buffer, if they are ring provided. While this seems like a bug in itself, it's not really defined behavior to reissue a multishot request directly. It's less efficient to do so as well, and not required to rearm anything like it is for singleshot poll requests.
[]
null
5.5
null
null
GHSA-h7v6-mc6c-m4w9
A vulnerability of Uncontrolled Resource Consumption has been identified in STARDOM provided by Yokogawa Electric Corporation. This vulnerability may allow to a remote attacker to cause a denial-of-service condition to the FCN/FCJ controller by sending a crafted packet. While sending the packet, the maintenance homepage of the controller could not be accessed. Therefore, functions of the maintenance homepage, changing configuration, viewing logs, etc. are not available. But the controller’s operation is not stopped by the condition.The affected products and versions are as follows: STARDOM FCN/FCJ R1.01 to R4.31.
[]
null
5.3
null
null
GHSA-9x7m-9hpg-xxmw
Prototype Pollution in putil-merge
Prototype pollution vulnerability in 'putil-merge' versions1.0.0 through 3.6.6 allows attacker to cause a denial of service and may lead to remote code execution.
[]
null
9.8
null
null
GHSA-h56r-m96p-q46q
Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to a buffer overflow. An attacker can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the set_qos function with the rule_name variable with two possible format strings that represent negated commands.
[]
null
7.2
null
null
CVE-2022-32058
An infinite loop in the function httpRpmPass of TP-Link TL-WR741N/TL-WR742N V1/V2/V3_130415 allows attackers to cause a Denial of Service (DoS) via a crafted packet.
[ "cpe:2.3:o:tp-link:tl-wr741n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:tl-wr741n:v1:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:tl-wr741n:v2:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:tl-wr742n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:tl-wr742n:v1:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:tl-wr742n:v2:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:tl-wr741n_firmware:v3_130415:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:tl-wr741n:v3:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:tl-wr742n_firmware:v3_130415:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:tl-wr742n:v3:*:*:*:*:*:*:*" ]
null
7.5
null
7.8
RHSA-2020:4054
Red Hat Security Advisory: qemu-kvm security update
QEMU: usb: out-of-bounds r/w access issue while processing usb packets
[ "cpe:/o:redhat:rhel_aus:6.5::server" ]
null
5
null
null
GHSA-85vx-hqf5-hmvr
Tenda AC1206 US_AC1206V1.0RTL_V15.03.06.23_multi_TD01 was discovered to contain a heap overflow via sched_start_time parameter.
[]
null
7.5
null
null
GHSA-v5h6-rmj4-6h5m
A vulnerability in Juniper Networks SRX Series device configured as a Junos OS Enforcer device may allow a user to access network resources that are not permitted by a UAC policy. This issue might occur when the IP address range configured in the Infranet Controller (IC) is configured as an IP address range instead of an IP address/netmask. See the Workaround section for more detail. The Junos OS Enforcer CLI settings are disabled by default. This issue affects Juniper Networks Junos OS on SRX Series: 12.3X48 versions prior to 12.3X48-D100; 15.1X49 versions prior to 15.1X49-D210; 17.3 versions prior to 17.3R2-S5, 17.3R3-S8; 17.4 versions prior to 17.4R2-S9, 17.4R3-S1; 18.1 versions prior to 18.1R3-S10; 18.2 versions prior to 18.2R2-S7, 18.2R3-S3; 18.3 versions prior to 18.3R1-S7, 18.3R3-S2; 18.4 versions prior to 18.4R1-S6, 18.4R2-S4, 18.4R3-S1; 19.1 versions prior to 19.1R1-S4, 19.1R2-S1, 19.1R3; 19.2 versions prior to 19.2R1-S3, 19.2R2; 19.3 versions prior to 19.3R2-S1, 19.3R3; 19.4 versions prior to 19.4R1-S1, 19.4R2.
[]
null
null
null
null
GHSA-9jm8-7q7r-mfj7
SQL injection vulnerability in archshow.asp in BlogMe 3.0 allows remote attackers to execute arbitrary SQL commands via the var parameter, a different vector than CVE-2006-5976.
[]
null
null
null
null
GHSA-x6r5-vxfg-gq3v
Helm Improper Certificate Validation
helm Before 2.7.2 is affected by: CWE-295: Improper Certificate Validation. The impact is: Unauthorized clients could connect to the server because self-signed client certs were aloowed. The component is: helm (many files updated, see https://github.com/helm/helm/pull/3152/files/1096813bf9a425e2aa4ac755b6c991b626dfab50). The attack vector is: A malicious client could connect to the server over the network. The fixed version is: 2.7.2.
[]
null
null
9.8
null
GHSA-chhg-993f-p755
PHP before 5.2.1 allows attackers to bypass safe_mode and open_basedir restrictions via unspecified vectors in the session extension. NOTE: it is possible that this issue is a duplicate of CVE-2006-6383.
[]
null
null
null
null