id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
197k
cpes
listlengths
0
4.89k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
CVE-2012-0191
The web container in IBM Lotus Expeditor 6.1.x and 6.2.x before 6.2 FP5+Security Pack does not properly perform access control for requests, which allows remote attackers to spoof a localhost request origin via crafted headers.
[ "cpe:2.3:a:ibm:lotus_expeditor:6.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_expeditor:6.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_expeditor:6.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_expeditor:6.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_expeditor:6.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_expeditor:6.2.3:*:*:*:*:*:*:*" ]
null
null
null
5
GHSA-3g4h-66cq-c8vg
The application Faronics WINSelect (Standard + Enterprise) saves its configuration in an encrypted file on the file system which "Everyone" has read and write access to, path to file:C:\ProgramData\WINSelect\WINSelect.wsdThe path for the affected WINSelect Enterprise configuration file is:C:\ProgramData\Faronics\StorageSpace\WS\WINSelect.wsd
[]
null
7.7
null
null
CVE-2005-2966
The Python SVG import plugin (diasvg_import.py) for DIA 0.94 and earlier allows user-assisted attackers to execute arbitrary commands via a crafted SVG file.
[ "cpe:2.3:a:dia:dia:*:*:*:*:*:*:*:*", "cpe:2.3:a:dia:dia:0.91:*:*:*:*:*:*:*", "cpe:2.3:a:dia:dia:0.92.2:*:*:*:*:*:*:*", "cpe:2.3:a:dia:dia:0.93:*:*:*:*:*:*:*" ]
null
null
null
5.1
GHSA-rw8v-g4fm-gw3v
In the Linux kernel, the following vulnerability has been resolved:NFSD: Prevent a potential integer overflowIf the tag length is >= U32_MAX - 3 then the "length + 4" addition can result in an integer overflow. Address this by splitting the decoding into several steps so that decode_cb_compound4res() does not have to perform arithmetic on the unsafe length value.
[]
null
5.5
null
null
GHSA-93gh-j29f-4h3w
The Service configuration-2 function in ASUS BMC’s firmware Web management page does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service.
[]
null
null
null
null
cisco-sa-20190327-evss
Cisco IOS XE Software Catalyst 4500 Cisco Discovery Protocol Denial of Service Vulnerability
A vulnerability in the Easy Virtual Switching System (VSS) of Cisco IOS XE Software on Catalyst 4500 Series Switches could allow an unauthenticated, adjacent attacker to cause the switches to reload. The vulnerability is due to incomplete error handling when processing Cisco Discovery Protocol (CDP) packets used with the Easy Virtual Switching System. An attacker could exploit this vulnerability by sending a specially crafted CDP packet. An exploit could allow the attacker to cause the device to reload, resulting in a denial of service (DoS) condition. Cisco has released software updates that address this vulnerability. There are workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-evss ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-evss"] This advisory is part of the March 27, 2019, release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication, which includes 17 Cisco Security Advisories that describe 19 vulnerabilities. For a complete list of the advisories and links to them, see Cisco Event Response: March 2019 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication ["https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-71135"].
[]
null
null
7.4
null
CVE-2022-46914
An issue in the firmware update process of TP-LINK TL-WA801N / TL-WA801ND V1 v3.12.16 and earlier allows attackers to execute arbitrary code or cause a Denial of Service (DoS) via uploading a crafted firmware image.
[ "cpe:2.3:o:tp-link:tl-wa801n_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:tl-wa801n:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:tl-wa801nd_v1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:tl-wa801nd_v1:-:*:*:*:*:*:*:*" ]
null
8.8
null
null
GHSA-cg44-83gm-9c7j
IBM Security Guardium 10.0 is vulnerable to HTTP response splitting attacks. A remote attacker could exploit this vulnerability using specially-crafted URL to cause the server to return a split response, once the URL is clicked. This would allow the attacker to perform further attacks, such as Web cache poisoning, cross-site scripting, and possibly obtain sensitive information. IBM X-Force ID: 124737.
[]
null
null
6.1
null
CVE-2022-1594
HC Custom WP-Admin URL <= 1.4 - Arbitrary Settings Update via CSRF
The HC Custom WP-Admin URL WordPress plugin through 1.4 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack, allowing them to change the login URL
[ "cpe:2.3:a:hc_custom_wp-admin_url_project:hc_custom_wp-admin_url:*:*:*:*:*:wordpress:*:*" ]
null
4.3
null
4.3
CVE-2017-17412
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Quest NetVault Backup 11.3.0.12. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of GET method requests. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to execute arbitrary code in the context of the underlying database. Was ZDI-CAN-4223.
[ "cpe:2.3:a:quest:netvault_backup:11.3.0.12:*:*:*:*:*:*:*" ]
null
null
9.8
7.5
CVE-2008-5655
Multiple SQL injection vulnerabilities in MyioSoft EasyBookMarker 4.0 allow remote attackers to execute arbitrary SQL commands via the (1) delete_folder and (2) delete_link parameters to unspecified vectors, possibly to (a) plugins/bookmarker/bookmarker_backend.php or (b) ajaxp.php, different vectors than CVE-2008-5654. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
[ "cpe:2.3:a:myiosoft:easybookmarker:4.0:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-jqcf-frh4-x2vj
In adreno_set_param of adreno_gpu.c, there is a possible memory corruption due to a double free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-265016072References: Upstream kernel
[]
null
7.8
null
null
GHSA-2cf3-8v44-39fh
An Improper Access Control could allow a malicious actor authenticated in the API to enable Android Debug Bridge (ADB) and make unsupported changes to the system.Affected Products:UniFi Connect EV Station (Version 1.1.18 and earlier)UniFi Connect EV Station Pro (Version 1.1.18 and earlier)UniFi Access G2 Reader Pro (Version 1.2.172 and earlier)UniFi Access Reader Pro (Version 2.7.238 and earlier)UniFi Access Intercom (Version 1.0.66 and earlier)UniFi Access Intercom Viewer (Version 1.0.5 and earlier)UniFi Connect Display (Version 1.9.324 and earlier)UniFi Connect Display Cast (Version 1.6.225 and earlier)Mitigation:Update UniFi Connect Application to Version 3.10.7 or later.Update UniFi Connect EV Station to Version 1.2.15 or later.Update UniFi Connect EV Station Pro to Version 1.2.15 or later.Update UniFi Access G2 Reader Pro Version 1.3.37 or later.Update UniFi Access Reader Pro Version 2.8.19 or later.Update UniFi Access Intercom Version 1.1.32 or later.Update UniFi Access Intercom Viewer Version 1.1.6 or later.Update UniFi Connect Display to Version 1.11.348 or later.Update UniFi Connect Display Cast to Version 1.8.255 or later.
[]
null
null
2.2
null
CVE-2022-43406
A sandbox bypass vulnerability in Jenkins Pipeline: Deprecated Groovy Libraries Plugin 583.vf3b_454e43966 and earlier allows attackers with permission to define untrusted Pipeline libraries and to define and run sandboxed scripts, including Pipelines, to bypass the sandbox protection and execute arbitrary code in the context of the Jenkins controller JVM.
[ "cpe:2.3:a:jenkins:groovy_libraries:*:*:*:*:*:jenkins:*:*" ]
null
9.9
null
null
CVE-2014-2968
Cross-site scripting (XSS) vulnerability in the web interface on the Huawei E355 CH1E355SM modem with software 21.157.37.01.910 and Web UI 11.001.08.00.03 allows remote attackers to inject arbitrary web script or HTML via an SMS message.
[ "cpe:2.3:a:huawei:e355_web_ui:11.001.08.00.03:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:e355_firmware:21.157.37.01.910:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:e355:ch1e355sm:*:*:*:*:*:*:*" ]
null
null
null
4.3
CVE-2017-3652
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.56 and earlier, 5.6.36 and earlier and 5.7.18 and earlier. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data as well as unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.0 Base Score 4.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N).
[ "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" ]
null
null
4.2
4.9
CVE-2021-4107
Cross-site Scripting (XSS) - Reflected in yetiforcecompany/yetiforcecrm
yetiforcecrm is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
[ "cpe:2.3:a:yetiforce:yetiforce_customer_relationship_management:*:*:*:*:*:*:*:*" ]
null
null
5.3
null
GHSA-j6cm-xq5x-cjv3
Unspecified vulnerability in in.named in Solaris 9 allows attackers to cause a denial of service via unknown manipulations that cause in.named to "make unnecessary queries."
[]
null
null
null
null
CVE-2025-3228
Unauthorized Guest user access to Playbook
Mattermost versions 10.5.x <= 10.5.5, 9.11.x <= 9.11.15, 10.8.x <= 10.8.0, 10.7.x <= 10.7.2, 10.6.x <= 10.6.5 fail to properly retrieve requestorInfo from playbooks handler for guest users which allows an attacker access to the playbook run.
[]
null
4.3
null
null
CVE-2023-38492
Kirby vulnerable to denial of service from unlimited password lengths
Kirby is a content management system. A vulnerability in versions prior to 3.5.8.3, 3.6.6.3, 3.7.5.2, 3.8.4.1, and 3.9.6 affects all Kirby sites with user accounts (unless Kirby's API and Panel are disabled in the config). The real-world impact of this vulnerability is limited, however we still recommend to update to one of the patch releases because they also fix more severe vulnerabilities. Kirby's authentication endpoint did not limit the password length. This allowed attackers to provide a password with a length up to the server's maximum request body length. Validating that password against the user's actual password requires hashing the provided password, which requires more CPU and memory resources (and therefore processing time) the longer the provided password gets. This could be abused by an attacker to cause the website to become unresponsive or unavailable. Because Kirby comes with a built-in brute force protection, the impact of this vulnerability is limited to 10 failed logins from each IP address and 10 failed logins for each existing user per hour. The problem has been patched in Kirby 3.5.8.3, 3.6.6.3, 3.7.5.2, 3.8.4.1, and 3.9.6. In all of the mentioned releases, the maintainers have added password length limits in the affected code so that passwords longer than 1000 bytes are immediately blocked, both when setting a password and when logging in.
[ "cpe:2.3:a:getkirby:kirby:*:*:*:*:*:*:*:*" ]
null
5.3
null
null
GHSA-97j4-jf77-v37p
Heap-based buffer overflow in the wordwrap function in PHP after 4.1.2 and before 4.3.0 may allow attackers to cause a denial of service or execute arbitrary code.
[]
null
null
null
null
CVE-2022-35963
`CHECK` failures in `FractionalAvgPoolGrad` in TensorFlow
TensorFlow is an open source platform for machine learning. The implementation of `FractionalAvgPoolGrad` does not fully validate the input `orig_input_tensor_shape`. This results in an overflow that results in a `CHECK` failure which can be used to trigger a denial of service attack. We have patched the issue in GitHub commit 03a659d7be9a1154fdf5eeac221e5950fec07dad. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
[ "cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*", "cpe:2.3:a:google:tensorflow:2.8.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:tensorflow:2.9.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:tensorflow:2.10:rc0:*:*:*:*:*:*", "cpe:2.3:a:google:tensorflow:2.10:rc1:*:*:*:*:*:*", "cpe:2.3:a:google:tensorflow:2.10:rc2:*:*:*:*:*:*", "cpe:2.3:a:google:tensorflow:2.10:rc3:*:*:*:*:*:*" ]
null
5.9
null
null
GHSA-cpw3-947f-46cc
Microsoft SharePoint Server 2010 SP1 and SP2 and 2013, and Office Web Apps 2013, allows remote attackers to execute arbitrary code via crafted page content, aka "SharePoint Page Content Vulnerabilities."
[]
null
null
null
null
CVE-2007-3502
Unspecified vulnerability in the web-based product configuration system in Kaspersky Anti-Spam before 3.0 MP1 allows remote attackers to obtain access to certain directories.
[ "cpe:2.3:a:kaspersky_lab:kaspersky_anti-spam:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-6cpp-547f-8pvw
Multiple cross-site scripting (XSS) vulnerabilities in SoftCart.exe in SoftCart 5.1.2.2 allow remote attackers to inject arbitrary web script or HTML via the (1) License_Plate, (2) License_State, (3) Ticket_Date, and (4) Ticket_Number parameters. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
[]
null
null
null
null
GHSA-3px9-vgqj-48v9
Missing Authorization vulnerability in WPDeveloper BetterLinks allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects BetterLinks: from n/a through 1.6.0.
[]
null
7.3
null
null
RHSA-2020:3911
Red Hat Security Advisory: python security update
python: XSS vulnerability in the documentation XML-RPC server in server_title field
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
6.1
null
null
CVE-2023-21937
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Networking). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
[ "cpe:2.3:a:oracle:graalvm:20.3.9:*:*:*:enterprise:*:*:*", "cpe:2.3:a:oracle:graalvm:21.3.5:*:*:*:enterprise:*:*:*", "cpe:2.3:a:oracle:graalvm:22.3.1:*:*:*:enterprise:*:*:*", "cpe:2.3:a:oracle:jdk:1.8.0:update361:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:11.0.18:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:17.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:20:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.8.0:update361:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:11.0.18:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:17.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:20:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:brocade_san_navigator:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:cloud_insights_acquisition_unit:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:cloud_insights_storage_workload_security_agent:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:milestone1:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:milestone2:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:milestone3:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:milestone4:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:milestone5:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:milestone6:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:milestone7:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:milestone8:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:milestone9:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update101:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update102:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update11:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update111:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update112:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update121:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update131:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update141:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update151:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update152:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update161:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update162:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update171:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update172:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update181:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update191:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update192:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update20:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update201:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update202:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update211:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update212:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update221:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update222:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update231:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update232:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update241:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update242:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update25:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update252:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update262:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update271:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update281:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update282:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update291:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update301:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update302:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update31:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update312:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update322:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update332:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update342:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update352:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update362:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update40:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update45:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update5:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update51:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update60:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update65:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update66:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update71:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update72:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update73:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update74:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update77:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update91:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update92:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:20:*:*:*:*:*:*:*" ]
null
3.7
null
null
CVE-2000-0613
Cisco Secure PIX Firewall does not properly identify forged TCP Reset (RST) packets, which allows remote attackers to force the firewall to close legitimate connections.
[ "cpe:2.3:a:cisco:pix_firewall:*:*:*:*:*:*:*:*" ]
null
null
null
5
CVE-2006-7159
Directory traversal vulnerability in include/prune_torrents.php in BTI-Tracker 1.3.2 (aka btitracker) allows remote attackers to delete arbitrary files via ".." sequences in the TORRENTSDIR parameter in a prune action.
[ "cpe:2.3:a:bti-tracker:bti-tracker:1.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:btitracker:btitracker:1.3.2:*:*:*:*:*:*:*" ]
null
null
null
6.4
RHSA-2024:1468
Red Hat Security Advisory: go-toolset-1.19-golang security update
golang-fips/openssl: Memory leaks in code encrypting and decrypting RSA payloads
[ "cpe:/a:redhat:devtools:2023::el7" ]
null
7.5
null
null
GHSA-gh6q-hg4q-mm5j
The WP Mail Log WordPress plugin before 1.1.3 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by users with a role as low as Contributor.
[]
null
8.8
null
null
GHSA-5c48-7h6p-5x58
Dell Enterprise SONiC OS, 3.5.3, 4.0.0, 4.0.1, 4.0.2, contains an "Uncontrolled Resource Consumption vulnerability" in authentication component. An unauthenticated remote attacker could potentially exploit this vulnerability, leading to uncontrolled resource consumption by creating permanent home directories for unauthenticated users.
[]
null
7.5
null
null
GHSA-vm94-m3xr-gvj8
The Awesome Contact Form7 for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'AEP Contact Form 7' widget in all versions up to, and including, 2.9 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
6.4
null
null
GHSA-wv2h-fph6-hx6j
The contact-form-plugin plugin before 3.96 for WordPress has XSS.
[]
null
null
6.1
null
CVE-2010-3926
Multiple cross-site scripting (XSS) vulnerabilities in Shop.cgi in SGX-SP Final before 11.00 and SGX-SP Final NE before 11.00 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.
[ "cpe:2.3:a:wb-i:sgx-sp_final:*:*:*:*:*:*:*:*", "cpe:2.3:a:wb-i:sgx-sp_final_ne:*:*:*:*:*:*:*:*" ]
null
null
null
4.3
GHSA-q3cc-722m-mfc6
Dell vApp Manager, versions prior to 9.2.4.x contain an information disclosure vulnerability. A remote attacker could potentially exploit this vulnerability leading to obtain sensitive information that may aid in further attacks.
[]
null
7.5
null
null
GHSA-75cj-f663-h7fv
Cross-site request forgery (CSRF) vulnerability in core/ajax/appconfig.php in ownCloud before 4.0.7 allows remote attackers to hijack the authentication of administrators for requests that edit the app configurations.
[]
null
null
null
null
CVE-2013-4451
gitolite commit fa06a34 through 3.5.3 might allow attackers to have unspecified impact via vectors involving world-writable permissions when creating (1) ~/.gitolite.rc, (2) ~/.gitolite, or (3) ~/repositories/gitolite-admin.git on fresh installs.
[ "cpe:2.3:a:gitolite:gitolite:*:*:*:*:*:*:*:*" ]
null
null
9.8
7.5
RHSA-2015:1206
Red Hat Security Advisory: openstack-cinder security and bug fix update
openstack-cinder: Host file disclosure through qcow2 backing file
[ "cpe:/a:redhat:openstack:5::el6", "cpe:/a:redhat:openstack:5::el7", "cpe:/a:redhat:openstack:6::el7" ]
null
null
null
null
CVE-2022-1310
Use after free in regular expressions in Google Chrome prior to 100.0.4896.88 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" ]
null
8.8
null
null
CVE-2025-5895
Metabase dom.js parseDataUri redos
A vulnerability was found in Metabase 54.10. It has been classified as problematic. This affects the function parseDataUri of the file frontend/src/metabase/lib/dom.js. The manipulation leads to inefficient regular expression complexity. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The patch is named 4454ebbdc7719016bf80ca0f34859ce5cee9f6b0. It is recommended to apply a patch to fix this issue.
[]
5.3
4.3
4.3
4
CVE-2021-3243
Wfilter ICF 5.0.117 contains a cross-site scripting (XSS) vulnerability. An attacker in the same LAN can craft a packet with a malicious User-Agent header to inject a payload in its logs, where an attacker can take over the system by through its plugin-running function.
[ "cpe:2.3:a:wfiltericf:wfilter_internet_content_filter:5.0.117:*:*:*:*:*:*:*" ]
null
6.1
null
4.3
CVE-2024-4894
ITPison OMICARD EDM - Server-Side Request Forgery
ITPison OMICARD EDM fails to properly filter specific URL parameter, allowing unauthenticated remote attackers to modify the parameters and conduct Server-Side Request Forgery (SSRF) attacks. This vulnerability enables attackers to probe internal network information.
[ "cpe:2.3:a:itpison:omicard_edm:*:*:*:*:*:*:*:*" ]
null
5.3
null
null
GHSA-vgfh-ppxh-3g5c
BSD pppd allows local users to change the permissions of arbitrary files via a symlink attack on a file that is specified as a tty device.
[]
null
null
null
null
CVE-2022-36866
Improper access control vulnerability in Broadcaster in Group Sharing prior to versions 13.0.6.15 in Android S(12), 13.0.6.14 in Android R(11) and below allows attackers to identify the device.
[ "cpe:2.3:a:samsung:group_sharing:*:*:*:*:*:android:*:*", "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*" ]
null
4
null
null
CVE-2023-27376
Missing Authentication In IDAttend’s IDWeb Application
Missing authentication in the StudentPopupDetails_StudentDetails method in IDAttend’s IDWeb application 3.1.052 and earlier allows extraction of sensitive student data by unauthenticated attackers.
[ "cpe:2.3:a:idattend:idweb:*:*:*:*:*:*:*:*" ]
null
7.5
null
null
CVE-2017-5112
Heap buffer overflow in WebGL in Google Chrome prior to 61.0.3163.79 for Windows allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
null
8.8
6.8
CVE-2007-5815
Absolute path traversal vulnerability in the WebCacheCleaner ActiveX control 1.3.0.3 in SonicWall SSL-VPN 200 before 2.1, and SSL-VPN 2000/4000 before 2.5, allows remote attackers to delete arbitrary files via a full pathname in the argument to the FileDelete method.
[ "cpe:2.3:a:sonicwall:ssl_vpn_200:*:*:*:*:*:*:*:*", "cpe:2.3:a:sonicwall:ssl_vpn2000\\/4000:*:*:*:*:*:*:*:*" ]
null
null
null
10
GHSA-g73p-9p76-7wm8
An improper limitation of a pathname to a restricted directory ('path traversal') vulnerability [CWE-22] in FortiVoiceEntreprise version 7.0.0 and before 6.4.7 allows an authenticated attacker to read arbitrary files from the system via sending crafted HTTP or HTTPS requests
[]
null
6.5
null
null
ICSA-19-134-05
ICSA-19-134-05 Siemens SINAMICS PERFECT HARMONY GH180 Drives NXG I and NXG II
A denial of service vulnerability exists in the affected products. The vulnerability could be exploited by an attacker with network access to the device. Successful exploitation requires no privileges and no user interaction. An attacker could use the vulnerability to compromise availability of the affected system. At the time of advisory publication no public exploitation of this security vulnerability was known.
[]
null
null
7.5
null
RHSA-2024:8315
Red Hat Security Advisory: Logging for Red Hat OpenShift - 5.9.8
net/http: Denial of service due to improper 100-continue handling in net/http go/parser: golang: Calling any of the Parse functions containing deeply nested literals can cause a panic/stack exhaustion encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion go/build/constraint: golang: Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion
[ "cpe:/a:redhat:logging:5.9::el9" ]
null
5.9
null
null
GHSA-v6qf-ph27-h56h
PHP remote file inclusion vulnerability in include/class_yapbbcooker.php in YapBB 1.2.Beta 2 allows remote attackers to execute arbitrary PHP code via a URL in the cfgIncludeDirectory parameter.
[]
null
null
null
null
CVE-2017-8401
In SWFTools 0.9.2, an out-of-bounds read of heap data can occur in the function png_load() in lib/png.c:724. This issue can be triggered by a malformed PNG file that is mishandled by png2swf. Attackers could exploit this issue for DoS.
[ "cpe:2.3:a:swftools:swftools:*:*:*:*:*:*:*:*" ]
null
null
6.5
4.3
RHSA-2004:073
Red Hat Security Advisory: metamail security update
security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws" ]
null
null
null
null
CVE-2022-45478
Telepad allows an attacker (in a man-in-the-middle position between the server and a connected device) to see all data (including keypresses) in cleartext. CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
[ "cpe:2.3:a:telepad-app:telepad:*:*:*:*:*:*:*:*" ]
null
5.1
null
null
GHSA-796c-4hrx-2rq6
A vulnerability was found in SourceCodester Human Resource Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file detailview.php. The manipulation of the argument employeeid leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-232288.
[]
null
null
6.3
null
CVE-2020-6446
Insufficient policy enforcement in trusted types in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to bypass content security policy via a crafted HTML page.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:backports:sle-15:sp1:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*" ]
null
6.5
null
4.3
CVE-2019-1615
Cisco NX-OS Software Image Signature Verification Vulnerability
A vulnerability in the Image Signature Verification feature of Cisco NX-OS Software could allow an authenticated, local attacker with administrator-level credentials to install a malicious software image on an affected device. The vulnerability is due to improper verification of digital signatures for software images. An attacker could exploit this vulnerability by loading an unsigned software image on an affected device. A successful exploit could allow the attacker to boot a malicious software image. Note: The fix for this vulnerability requires a BIOS upgrade as part of the software upgrade. For additional information, see the Details section of this advisory. Nexus 3000 Series Switches are affected running software versions prior to 7.0(3)I7(5). Nexus 9000 Series Fabric Switches in ACI Mode are affected running software versions prior to 13.2(1l). Nexus 9000 Series Switches in Standalone NX-OS Mode are affected running software versions prior to 7.0(3)I7(5). Nexus 9500 R-Series Line Cards and Fabric Modules are affected running software versions prior to 7.0(3)F3(5).
[ "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i7\\(3\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:9.2\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:12.3\\(0.97\\):*:*:*:*:*:*:*", "cpe:2.3:h:cisco:9432pq:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:9536pq:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:9636pq:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:9736pq:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:n9k-x9432c-s:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:n9k-x9464px:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:n9k-x9464tx2:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:n9k-x9564px:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:n9k-x9564tx:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:n9k-x9636c-r:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:n9k-x9636c-rx:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:n9k-x97160yc-ex:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:n9k-x9732c-ex:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:n9k-x9732c-fx:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:n9k-x9736c-ex:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:n9k-x9736c-fx:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:n9k-x9788tc-fx:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_92160yc-x:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_92300yc:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_92304qc:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_9236c:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_9272q:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_93108tc-ex:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_93108tc-fx:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_93120tx:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_9316d-gx:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_93180lc-ex:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_93180yc-ex:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_93180yc-fx:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_93240yc-fx2:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_9332c:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_9336c-fx2:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_9348gc-fxp:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_93600cd-gx:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_9364c:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_9504:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_9508:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_9516:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:x9636q-r:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i7\\(5\\):*:*:*:*:*:*:*", "cpe:2.3:h:cisco:n3k-c31128pq-10ge:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:n3k-c3132c-z:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:n3k-c3164q-40ge:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:n3k-c3264q:-:*:*:*:*:*:*:*" ]
null
null
6.7
null
CVE-2016-1464
Cisco WebEx Meetings Player T29.10, when WRF file support is enabled, allows remote attackers to execute arbitrary code via a crafted file, aka Bug ID CSCva09375.
[ "cpe:2.3:a:cisco:webex_wrf_player_t29:sp10_base:*:*:*:*:*:*:*" ]
null
null
7.8
9.3
CVE-2022-3083
All versions of Landis+Gyr E850 (ZMQ200) are vulnerable to CWE-784: Reliance on Cookies Without Validation and Integrity. The device's web application navigation depends on the value of the session cookie. The web application could become inaccessible for the user if an attacker changes the cookie values.
[ "cpe:2.3:o:landisgyr:e850_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:landisgyr:e850:-:*:*:*:*:*:*:*" ]
null
3.9
null
null
CVE-2021-34945
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View 10.15.0.75. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of JT files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-15054.
[ "cpe:2.3:a:bentley:bentley_view:*:*:*:*:*:*:*:*", "cpe:2.3:a:bentley:microstation:*:*:*:*:*:*:*:*" ]
null
null
7.8
null
CVE-2020-21990
Emmanuel MyDomoAtHome (MDAH) REST API REST API Domoticz ISS Gateway 0.2.40 is affected by an information disclosure vulnerability due to improper access control enforcement. An unauthenticated remote attacker can exploit this, via a specially crafted request to gain access to sensitive information.
[ "cpe:2.3:a:domoticz:mydomoathome:0.240:*:*:*:*:node.js:*:*" ]
null
7.5
null
5
CVE-2023-21912
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges). Supported versions that are affected are 5.7.41 and prior and 8.0.30 and prior. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
[ "cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*" ]
null
7.5
null
null
GHSA-pr7j-566r-q2rq
** DISPUTED ** SQL injection vulnerability in index.php for Quick.cart 0.3.0 allows remote attackers to execute arbitrary SQL commands via the iCategory parameter. NOTE: the vendor has privately disputed this issue, saying that Quick.cart does not even use SQL and therefore can not be vulnerable to SQL injection.
[]
null
null
null
null
RHSA-2024:1129
Red Hat Security Advisory: curl security update
curl: information disclosure by exploiting a mixed case flaw
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
5.3
null
null
CVE-2020-12272
OpenDMARC through 1.3.2 and 1.4.x allows attacks that inject authentication results to provide false information about the domain that originated an e-mail message. This is caused by incorrect parsing and interpretation of SPF/DKIM authentication results, as demonstrated by the example.net(.example.com substring.
[ "cpe:2.3:a:trusteddomain:opendmarc:*:*:*:*:*:*:*:*", "cpe:2.3:a:trusteddomain:opendmarc:1.4.0:-:*:*:*:*:*:*", "cpe:2.3:a:trusteddomain:opendmarc:1.4.0:beta0:*:*:*:*:*:*", "cpe:2.3:a:trusteddomain:opendmarc:1.4.0:beta1:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*" ]
null
5.3
null
5
RHSA-2025:0211
Red Hat Security Advisory: dpdk security update
dpdk: Denial Of Service from malicious guest on hypervisors using DPDK Vhost library
[ "cpe:/a:redhat:rhel_e4s:9.0::appstream" ]
null
null
7.4
null
CVE-2018-8004
There are multiple HTTP smuggling and cache poisoning issues when clients making malicious requests interact with Apache Traffic Server (ATS). This affects versions 6.0.0 to 6.2.2 and 7.0.0 to 7.1.3. To resolve this issue users running 6.x should upgrade to 6.2.3 or later versions and 7.x users should upgrade to 7.1.4 or later versions.
[ "cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" ]
null
null
6.5
4
CVE-2021-31780
In app/Model/MispObject.php in MISP 2.4.141, an incorrect sharing group association could lead to information disclosure on an event edit. When an object has a sharing group associated with an event edit, the sharing group object is ignored and instead the passed local ID is reused.
[ "cpe:2.3:a:misp:misp:2.4.141:*:*:*:*:*:*:*" ]
null
7.5
null
5
GHSA-v4cq-4w34-cj9c
A vulnerability has been found in SourceCodester Billing Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file ajax_service.php of the component POST Parameter Handler. The manipulation of the argument drop_services leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-228397 was assigned to this vulnerability.
[]
null
null
6.3
null
CVE-2019-19553
In Wireshark 3.0.0 to 3.0.6 and 2.6.0 to 2.6.12, the CMS dissector could crash. This was addressed in epan/dissectors/asn1/cms/packet-cms-template.c by ensuring that an object identifier is set to NULL after a ContentInfo dissection.
[ "cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "cpe:2.3:o:oracle:solaris:11:*:*:*:*:*:*:*", "cpe:2.3:o:oracle:zfs_storage_appliance:8.8:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" ]
null
7.5
null
5
GHSA-cr48-c784-cmxh
authpam.c in courier-authdaemon for Courier Mail Server 0.37.3 through 0.52.1, when using pam_tally, does not call the pam_acct_mgmt function to verify that access should be granted, which allows attackers to authenticate to the server using accounts that have been disabled.
[]
null
null
null
null
CVE-2021-28956
The unofficial vscode-sass-lint (aka Sass Lint) extension through 1.0.7 for Visual Studio Code allows attackers to execute arbitrary binaries if the user opens a crafted workspace. NOTE: This vulnerability only affects products that are no longer supported by the maintainer
[ "cpe:2.3:a:sass_lint_project:sass_lint:*:*:*:*:*:visual_studio_code:*:*" ]
null
8.8
null
6.8
GHSA-v53w-m46c-w4w4
Multiple cross-site request forgery (CSRF) vulnerabilities in the Sharebar plugin 1.2.5 for WordPress allow remote attackers to hijack the authentication of administrators for requests that (1) add or (2) modify buttons, or (3) insert cross-site scripting (XSS) sequences.
[]
null
null
null
null
GHSA-v665-8rf9-gphr
Cross-site scripting (XSS) vulnerability in WebKit in Apple Safari before 4.0, iPhone OS 1.0 through 2.2.1, and iPhone OS for iPod touch 1.1 through 2.2.1 allows remote attackers to inject arbitrary web script or HTML via vectors involving submission of a form to the about:blank URL, leading to security-context replacement.
[]
null
null
null
null
GHSA-q3r4-2437-ppv4
Windows Update Stack Elevation of Privilege Vulnerability
[]
null
7.8
null
null
GHSA-g3c7-95hc-gv66
An arbitrary file upload vulnerability in the component /server/executeExec of JEHC-BPM v2.0.1 allows attackers to execute arbitrary code via uploading a crafted file.
[]
null
9.8
null
null
CVE-2024-56288
WordPress WP Docs plugin <= 2.2.1 - Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Fahad Mahmood WP Docs allows Stored XSS.This issue affects WP Docs: from n/a through 2.2.1.
[]
null
5.9
null
null
CVE-2021-38561
golang.org/x/text/language in golang.org/x/text before 0.3.7 can panic with an out-of-bounds read during BCP 47 language tag parsing. Index calculation is mishandled. If parsing untrusted user input, this can be used as a vector for a denial-of-service attack.
[ "cpe:2.3:a:golang:text:*:*:*:*:*:*:*:*" ]
null
7.5
null
null
RHSA-2022:5823
Red Hat Security Advisory: 389-ds:1.4 security update
389-ds-base: sending crafted message could result in DoS 389-ds-base: expired password was still allowed to access the database
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
5.7
null
null
CVE-2014-7860
The web/web_file/fb_publish.php script in D-Link DNS-320L before 1.04b12 and DNS-327L before 1.03b04 Build0119 does not authenticate requests, which allows remote attackers to obtain arbitrary photos and publish them to an arbitrary Facebook profile via a target album_id and access_token.
[ "cpe:2.3:o:d-link:dns-327l_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:dns-327l:-:*:*:*:*:*:*:*", "cpe:2.3:o:d-link:dns-320l_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:dns-320l:-:*:*:*:*:*:*:*" ]
null
null
5.3
5
GHSA-vmh9-w834-6xjq
win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT allows local users to gain privileges via a crafted application, aka "Win32k Multiple Fetch Vulnerability," a different vulnerability than CVE-2013-1343, CVE-2013-1344, CVE-2013-3864, and CVE-2013-3865.
[]
null
7.8
null
null
RHSA-2015:0103
Red Hat Security Advisory: Red Hat Enterprise Linux 6.4 Extended Update Support One-Month Notice
This is the One-Month notification for the retirement of Red Hat Enterprise Linux 6.4 Extended Update Support (EUS). This notification applies only to those customers subscribed to the Extended Update Support (EUS) channel for Red Hat Enterprise Linux 6.4.
[ "cpe:/o:redhat:rhel_eus:6.4::server" ]
null
null
null
null
GHSA-wp73-c4gh-8ccr
Incorrect access control in the firmware update and download processes of Ruochan Smart v4.4.7 allows attackers to access sensitive information by analyzing the code and data within the APK file.
[]
null
8.4
null
null
GHSA-87f4-45wv-qprf
In Wireshark 2.2.0 to 2.2.5 and 2.0.0 to 2.0.11, the WBXML dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-wbxml.c by adding length validation.
[]
null
null
7.5
null
GHSA-3cv4-xxv7-934q
Improper Verification of Cryptographic Signature in Apache Pulsar in TensorFlow
If Apache Pulsar is configured to authenticate clients using tokens based on JSON Web Tokens (JWT), the signature of the token is not validated if the algorithm of the presented token is set to "none". This allows an attacker to connect to Pulsar instances as any user (incl. admins).
[]
null
9.8
null
null
ICSA-25-135-14
Siemens APOGEE PXC and TALON TC Series
Affected devices start sending unsolicited BACnet broadcast messages after processing a specific BACnet createObject request. This could allow an attacker residing in the same BACnet network to send a specially crafted message that results in a partial denial of service condition of the targeted device, and potentially reduce the availability of BACnet network. A power cycle is required to restore the device's normal operation.
[]
null
4.7
null
null
CVE-2024-12278
Booster for WooCommerce <= 7.2.5 - Unauthenticated Stored Cross-Site Scripting
The Booster for WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via any location that typically sanitizes data using wp_kses, like comments, in all versions up to, and including, 7.2.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
7.2
null
null
RHSA-2022:7811
Red Hat Security Advisory: mingw-expat security update
expat: integer overflow in the doProlog function expat: Malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code execution expat: Namespace-separator characters in "xmlns[:prefix]" attribute values can lead to arbitrary code execution expat: Stack exhaustion in doctype parsing expat: Integer overflow in copyString() expat: Integer overflow in storeRawNames()
[ "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
9.8
null
null
PYSEC-2019-145
null
ansible-playbook -k and ansible cli tools, all versions 2.8.x before 2.8.4, all 2.7.x before 2.7.13 and all 2.6.x before 2.6.19, prompt passwords by expanding them from templates as they could contain special characters. Passwords should be wrapped to prevent templates trigger and exposing them.
[]
null
null
null
null
GHSA-jh49-frp2-9886
Dell PowerScale InsightIQ, version 5.0, contain a Use of hard coded Credentials vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Information disclosure.
[]
null
2.3
null
null
CVE-2021-2079
Vulnerability in the Oracle Configurator product of Oracle Supply Chain (component: UI Servlet). Supported versions that are affected are 12.1 and 12.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Configurator. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Configurator, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Configurator accessible data as well as unauthorized update, insert or delete access to some of Oracle Configurator accessible data. CVSS 3.1 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N).
[ "cpe:2.3:a:oracle:configurator:12.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:configurator:12.2:*:*:*:*:*:*:*" ]
null
8.2
null
null
CVE-2009-5000
Multiple cross-site scripting (XSS) vulnerabilities in the Workplace (aka WP) component in IBM FileNet P8 Application Engine (P8AE) 4.0.2.x before 4.0.2.3-P8AE-FP003 allow remote attackers to inject arbitrary web script or HTML via unspecified parameters to .jsp pages.
[ "cpe:2.3:a:ibm:filenet_p8_application_engine:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:filenet_p8_application_engine:4.0.2:001:*:*:*:*:*:*", "cpe:2.3:a:ibm:filenet_p8_application_engine:4.0.2:002:*:*:*:*:*:*" ]
null
null
null
4.3
GHSA-m79g-h2ww-gqhg
SQL injection vulnerability in save.php in PHPSurveyor 0.995 and earlier allows remote attackers to execute arbitrary SQL commands via the surveyid cookie. NOTE: this issue could be leveraged to execute arbitrary PHP code, as demonstrated by inserting directory traversal sequences into the database, which are then processed by the thissurvey['language'] variable.
[]
null
null
null
null
CVE-2009-1079
Multiple cross-site scripting (XSS) vulnerabilities in Sun Java System Identity Manager (IdM) 7.0 through 8.0 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka Bug IDs 19659, 19660, and 19683.
[ "cpe:2.3:a:sun:java_system_identity_manager:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:sun:java_system_identity_manager:7.1:*:*:*:*:*:*:*", "cpe:2.3:a:sun:java_system_identity_manager:7.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:sun:java_system_identity_manager:8.0:*:*:*:*:*:*:*" ]
null
null
null
4.3
GHSA-c84w-pfmp-9cxg
An externally controlled reference to a resource vulnerability has been reported to affect QNAP NAS running Photo Station. If exploited, This could allow an attacker to modify system files. We have already fixed the vulnerability in the following versions: QTS 5.0.1: Photo Station 6.1.2 and later QTS 5.0.0/4.5.x: Photo Station 6.0.22 and later QTS 4.3.6: Photo Station 5.7.18 and later QTS 4.3.3: Photo Station 5.4.15 and later QTS 4.2.6: Photo Station 5.2.14 and later
[]
null
9.1
null
null
GHSA-wr42-7mgr-v6qx
In the version 12.1.0.1004 and below of 360 Total Security, when the main process of 360 Total Security calls GameChrome.exe, there exists a local privilege escalation vulnerability. An attacker who could exploit DLL hijacking to bypass the hips could execute arbitrary code on the Local system.
[]
null
null
null
null
CVE-2020-13433
Jason2605 AdminPanel 4.0 allows SQL Injection via the editPlayer.php hidden parameter.
[ "cpe:2.3:a:adminpanel_project:adminpanel:4.0:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
CVE-2017-5195
Irssi 0.8.17 before 0.8.21 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via a crafted ANSI x8 color code.
[ "cpe:2.3:a:irssi:irssi:*:*:*:*:*:*:*:*" ]
null
null
7.5
5