id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
197k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
GHSA-fmcr-pj8v-2rrp
Insufficient password protection in the attestation database for Open CIT may allow an authenticated user to potentially enable information disclosure via local access.
[]
null
3.3
null
null
CVE-2023-26332
ZDI-CAN-20144: Adobe Dimension USD File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability
Adobe Dimension versions 3.4.7 (and earlier) is affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[ "cpe:2.3:a:adobe:dimension:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
7.8
null
null
GHSA-4mrr-j6hj-j39r
Buffer overflow in Snes9x 1.37, when installed setuid root, allows local users to gain root privileges via a long command line argument.
[]
null
null
null
null
GHSA-r58j-7299-f87q
The ctl_request_sense function could expose up to three bytes of the kernel heap to userspace.Malicious software running in a guest VM that exposes virtio_scsi can exploit the vulnerabilities to achieve code execution on the host in the bhyve userspace process, which typically runs as root. Note that bhyve runs in a Capsicum sandbox, so malicious code is constrained by the capabilities available to the bhyve process. A malicious iSCSI initiator could achieve remote code execution on the iSCSI target host.
[]
null
8.4
null
null
GHSA-fvrq-c69c-wh39
A vulnerability was found in SourceCodester Shopping Website 1.0. It has been classified as critical. Affected is an unknown function of the file check_availability.php. The manipulation of the argument email leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-233286 is the identifier assigned to this vulnerability.
[]
null
null
6.3
null
GHSA-mqhg-vhp9-4f97
SQL injection vulnerability in index.php in FicHive 1.0 allows remote attackers to execute arbitrary SQL commands via the letter parameter in a Search action, a different vector than CVE-2008-2416. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
[]
null
null
null
null
CVE-2017-8367
Buffer overflow in Ether Software Easy MOV Converter 1.4.24, Easy DVD Creator, Easy MPEG/AVI/DIVX/WMV/RM to DVD, Easy Avi/Divx/Xvid to DVD Burner, Easy MPEG to DVD Burner, Easy WMV/ASF/ASX to DVD Burner, Easy RM RMVB to DVD Burner, Easy CD DVD Copy, MP3/AVI/MPEG/WMV/RM to Audio CD Burner, MP3/WAV/OGG/WMA/AC3 to CD Burner, MP3 WAV to CD Burner, My Video Converter, Easy AVI DivX Converter, Easy Video to iPod Converter, Easy Video to PSP Converter, Easy Video to 3GP Converter, Easy Video to MP4 Converter, and Easy Video to iPod/MP4/PSP/3GP Converter allows local attackers to cause a denial of service (SEH overwrite) or possibly have unspecified other impact via a long username.
[ "cpe:2.3:a:ether_software:easy_avi\\/divx\\/xvid_to_dvd_burner:-:*:*:*:*:*:*:*", "cpe:2.3:a:ether_software:easy_avi_divx_converter:-:*:*:*:*:*:*:*", "cpe:2.3:a:ether_software:easy_cd_dvd_copy:-:*:*:*:*:*:*:*", "cpe:2.3:a:ether_software:easy_dvd_creator:-:*:*:*:*:*:*:*", "cpe:2.3:a:ether_software:easy_mov_converter:-:*:*:*:*:*:*:*", "cpe:2.3:a:ether_software:easy_mov_converter:1.4.24:*:*:*:*:*:*:*", "cpe:2.3:a:ether_software:easy_mpeg\\/avi\\/divx\\/wmv\\/rm_to_dvd:-:*:*:*:*:*:*:*", "cpe:2.3:a:ether_software:easy_mpeg_to_dvd_burner:-:*:*:*:*:*:*:*", "cpe:2.3:a:ether_software:easy_rm_rmvb_to_dvd_burner:-:*:*:*:*:*:*:*", "cpe:2.3:a:ether_software:easy_video_to_3gp_converter:-:*:*:*:*:*:*:*", "cpe:2.3:a:ether_software:easy_video_to_ipod\\/mp4\\/psp\\/3gp_converter:-:*:*:*:*:*:*:*", "cpe:2.3:a:ether_software:easy_video_to_ipod_converter:-:*:*:*:*:*:*:*", "cpe:2.3:a:ether_software:easy_video_to_mp4_converter:-:*:*:*:*:*:*:*", "cpe:2.3:a:ether_software:easy_video_to_psp_converter:-:*:*:*:*:*:*:*", "cpe:2.3:a:ether_software:easy_wmv\\/asf\\/asx_to_dvd_burner:-:*:*:*:*:*:*:*", "cpe:2.3:a:ether_software:mp3\\/avi\\/mpeg\\/wmv\\/rm_to_audio_cd_burner:-:*:*:*:*:*:*:*", "cpe:2.3:a:ether_software:mp3\\/wav\\/ogg\\/wma\\/ac3_to_cd_burner:-:*:*:*:*:*:*:*", "cpe:2.3:a:ether_software:mp3_wav_to_cd_burner:-:*:*:*:*:*:*:*", "cpe:2.3:a:ether_software:my_video_converter:-:*:*:*:*:*:*:*" ]
null
null
7.8
4.6
CVE-2025-25429
Trendnet TEW-929DRU 1.0.0.10 contains a Stored Cross-site Scripting (XSS) vulnerability via the r_name variable inside the have_same_name function on the /addschedule.htm page.
[]
null
4.8
null
null
GHSA-x2v2-qh6j-j5r3
SYNEL - eharmony Directory Traversal. Directory Traversal - is an attack against a server or a Web application aimed at unauthorized access to the file system. on the "Name" parameter the attacker can return to the root directory and open the host file. The path exposes sensitive files that users upload
[]
null
null
null
null
GHSA-pc69-wrpv-h7r8
TYPO3 3.7.1 allows remote attackers to obtain sensitive information via a direct request to (1) thumbs.php, (2) showpic.php, or (3) tables.php, which causes them to incorrectly define a variable and reveal the path in an error message when a require function call fails.
[]
null
null
null
null
CVE-2003-0348
A certain Microsoft Windows Media Player 9 Series ActiveX control allows remote attackers to view and manipulate the Media Library on the local system via HTML script.
[ "cpe:2.3:a:microsoft:windows_media_player:9:*:*:*:*:*:*:*" ]
null
null
null
6.4
GHSA-wx9v-xq78-r94h
Netfilter in the Linux kernel 2.6.8.1 allows local users to cause a denial of service (memory consumption) via certain packet fragments that are reassembled twice, which causes a data structure to be allocated twice.
[]
null
null
null
null
CVE-2018-5896
In Android releases from CAF using the linux kernel (Android for MSM, Firefox OS for MSM, QRD Android) before security patch level 2018-06-05, kernel panic may happen due to out-of-bound read, caused by not checking source buffer length against length of packet stream to be copied.
[ "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*" ]
null
null
7.1
6.6
GHSA-wj7f-g5mv-8r59
Buffer overflow in subsystem in Intel(R) DAL before version 12.0.35 may allow a privileged user to potentially enable escalation of privilege via local access.
[]
null
null
6.7
null
CVE-2005-0560
Heap-based buffer overflow in the SvrAppendReceivedChunk function in xlsasink.dll in the SMTP service of Exchange Server 2000 and 2003 allows remote attackers to execute arbitrary code via a crafted X-LINK2STATE extended verb request to the SMTP port.
[ "cpe:2.3:a:microsoft:exchange_server:2000:-:*:*:*:*:*:*", "cpe:2.3:a:microsoft:exchange_server:2003:-:*:*:*:*:*:*" ]
null
null
null
7.5
RHSA-2012:0410
Red Hat Security Advisory: raptor security update
raptor: XML External Entity (XXE) attack via RDF files
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
CVE-2023-6877
The RSS Aggregator by Feedzy – Feed to Post, Autoblogging, News & YouTube Video Feeds Aggregator plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcode(s) in all versions up to, and including, 4.3.3 due to insufficient input sanitization and output escaping on the Content-Type field of error messages when retrieving an invalid RSS feed. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
6.4
null
null
RHSA-2023:7587
Red Hat Security Advisory: Updated IBM Business Automation Manager Open Editions 8.0.4 SP1 Images
HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
[ "cpe:/a:redhat:rhosemc:1.0::el8" ]
null
7.5
null
null
CVE-2023-6977
Path Traversal: '\..\filename'
This vulnerability enables malicious users to read sensitive files on the server.
[ "cpe:2.3:a:lfprojects:mlflow:*:*:*:*:*:*:*:*" ]
null
null
10
null
GHSA-r93j-cm86-gfc2
Bentley MicroStation and MicroStation-based applications may be affected by out-of-bounds read issues when opening crafted FBX files. Exploiting these issues could lead to information disclosure and code execution. The fixed versions are 10.17.01.58* for MicroStation and 10.17.01.19* for Bentley View.
[]
null
7.8
null
null
GHSA-36qp-p5p2-rm5x
Multiple PHP remote file inclusion vulnerabilities in Rhode Island Open Meetings Filing Application (OMFA) allow remote attackers to execute arbitrary PHP code via a URL in the PROJECT_ROOT parameter to (1) editmeetings/session.php, (2) email/session.php, (3) entityproperties/session.php, or (4) inc/mail.php.
[]
null
null
null
null
CVE-2021-36316
Dell EMC Avamar Server versions 18.2, 19.1, 19.2, 19.3, and 19.4 contain an improper privilege management vulnerability in AUI. A malicious user with high privileges could potentially exploit this vulnerability, leading to the disclosure of the AUI info and performing some unauthorized operation on the AUI.
[ "cpe:2.3:a:dell:emc_avamar_server:18.2:*:*:*:*:*:*:*", "cpe:2.3:a:dell:emc_avamar_server:19.1:*:*:*:*:*:*:*", "cpe:2.3:a:dell:emc_avamar_server:19.2:*:*:*:*:*:*:*", "cpe:2.3:a:dell:emc_avamar_server:19.3:*:*:*:*:*:*:*", "cpe:2.3:a:dell:emc_avamar_server:19.4:*:*:*:*:*:*:*" ]
null
6.7
null
null
GHSA-4pjg-hm2r-rj25
The username command in Cisco ACE Application Control Engine Module for Catalyst 6500 Switches and 7600 Routers and Cisco ACE 4710 Application Control Engine Appliance stores a cleartext password by default, which allows context-dependent attackers to obtain sensitive information.
[]
null
null
null
null
RHSA-2023:6021
Red Hat Security Advisory: varnish:6 security update
HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
[ "cpe:/a:redhat:rhel_aus:8.4::appstream", "cpe:/a:redhat:rhel_e4s:8.4::appstream", "cpe:/a:redhat:rhel_tus:8.4::appstream" ]
null
7.5
null
null
GHSA-9cwv-cppx-mqjm
Improper Authentication in Capsule Proxy
ImpactUsing a malicious `Connection` header, an attacker with a proper authentication mechanism could start a privilege escalation towards the Kubernetes API Server, being able to exploit the `cluster-admin` Role bound to `capsule-proxy`.PatchesPatch has been merged in the v0.2.1 release.WorkaroundsUpgrading is mandatory.
[]
null
8.8
null
null
CVE-2022-35278
HTML Injection in ActiveMQ Artemis Web Console
In Apache ActiveMQ Artemis prior to 2.24.0, an attacker could show malicious content and/or redirect users to a malicious URL in the web console by using HTML in the name of an address or queue.
[ "cpe:2.3:a:apache:activemq_artemis:*:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*", "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*" ]
null
6.1
null
null
CVE-2024-5708
WPBakery <= 7.7 - Authenticated (Author+) Stored Cross-Site Scripting
The WPBakery Visual Composer plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘link’ parameter in all versions up to, and including, 7.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, and with post permissions granted by an Administrator, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
6.4
null
null
GHSA-qgrf-34hp-ghm9
OpenCart Path Traversal
OpenCart through 3.0.2.0 allows directory traversal in the `editDownload` function in `admin\model\catalog\download.php` via `admin/index.php?route=catalog/download/edit`, related to the `download_id`. For example, an attacker can download `../../config.php`.
[]
null
null
4.9
null
CVE-2020-3738
Adobe Framemaker versions 2019.0.4 and below have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution.
[ "cpe:2.3:a:adobe:framemaker:*:*:*:*:*:*:*:*" ]
null
8.8
null
6.8
CVE-2018-14950
The mail message display page in SquirrelMail through 1.4.22 has XSS via a "<svg><a xlink:href=" attack.
[ "cpe:2.3:a:squirrelmail:squirrelmail:*:*:*:*:*:*:*:*" ]
null
null
6.1
4.3
CVE-2024-10693
SKT Addons for Elementor <= 3.3 - Authenticated (Contributor+) Post Disclosure
The SKT Addons for Elementor plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 3.3 via the Unfold widget due to insufficient restrictions on which posts can be included. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract data from private or draft posts created by Elementor that they should not have access to.
[]
null
4.3
null
null
GHSA-p2mj-x9rf-q85j
musl libc before 1.1.17 has a buffer overflow via crafted DNS replies because dns_parse_callback in network/lookup_name.c does not restrict the number of addresses, and thus an attacker can provide an unexpected number by sending A records in a reply to an AAAA query.
[]
null
null
7.5
null
CVE-2023-1712
Use of Hard-coded, Security-relevant Constants in deepset-ai/haystack
Use of Hard-coded, Security-relevant Constants in GitHub repository deepset-ai/haystack prior to 0.1.30.
[ "cpe:2.3:a:deepset:haystack:*:*:*:*:*:*:*:*" ]
null
null
9.1
null
CVE-2015-8275
LVRTC eParakstitajs 3.0 (1.3.0) and edoc-libraries-2.5.4_01 allow attackers to write to arbitrary files via crafted EDOC files.
[ "cpe:2.3:a:eparaksts:edoc-libraries:2.5.4_01:*:*:*:*:*:*:*", "cpe:2.3:a:eparaksts:eparakstitajs_3:1.3.0:*:*:*:*:*:*:*" ]
null
null
5.5
4.3
RHSA-2013:0130
Red Hat Security Advisory: httpd security, bug fix, and enhancement update
httpd: mod_negotiation XSS via untrusted file names in directories with MultiViews enabled httpd: mod_negotiation CRLF injection via untrusted file names in directories with MultiViews enabled httpd: mod_negotiation XSS via untrusted file names in directories with MultiViews enabled
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
GHSA-77hq-crr3-x6hc
In the Linux kernel, the following vulnerability has been resolved:ASoC: SOF: Fix DSP oops stack dump output contentsFix @buf arg given to hex_dump_to_buffer() and stack address used in dump error output.
[]
null
null
null
null
GHSA-wm2c-w847-j6cr
CoreText in Apple iOS before 8.4 and OS X before 10.10.4 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted text file, a different vulnerability than CVE-2015-3685, CVE-2015-3687, CVE-2015-3688, and CVE-2015-3689.
[]
null
null
null
null
CVE-2009-3914
Cross-site scripting (XSS) vulnerability in the Temporary Invitation module 5.x before 5.x-2.3 for Drupal allows remote attackers to inject arbitrary web script or HTML via the Name field in an invitation.
[ "cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*", "cpe:2.3:a:wolfgang_ziegler:temporary_invitation:5.x-1.0:*:*:*:*:*:*:*", "cpe:2.3:a:wolfgang_ziegler:temporary_invitation:5.x-1.1:*:*:*:*:*:*:*", "cpe:2.3:a:wolfgang_ziegler:temporary_invitation:5.x-1.2:*:*:*:*:*:*:*", "cpe:2.3:a:wolfgang_ziegler:temporary_invitation:5.x-1.3:*:*:*:*:*:*:*", "cpe:2.3:a:wolfgang_ziegler:temporary_invitation:5.x-1.4:*:*:*:*:*:*:*", "cpe:2.3:a:wolfgang_ziegler:temporary_invitation:5.x-1.5:*:*:*:*:*:*:*", "cpe:2.3:a:wolfgang_ziegler:temporary_invitation:5.x-1.6:*:*:*:*:*:*:*", "cpe:2.3:a:wolfgang_ziegler:temporary_invitation:5.x-1.7:*:*:*:*:*:*:*", "cpe:2.3:a:wolfgang_ziegler:temporary_invitation:5.x-1.8:*:*:*:*:*:*:*", "cpe:2.3:a:wolfgang_ziegler:temporary_invitation:5.x-1.9:*:*:*:*:*:*:*", "cpe:2.3:a:wolfgang_ziegler:temporary_invitation:5.x-1.10:*:*:*:*:*:*:*", "cpe:2.3:a:wolfgang_ziegler:temporary_invitation:5.x-1.x-dev:*:*:*:*:*:*:*", "cpe:2.3:a:wolfgang_ziegler:temporary_invitation:5.x-2.0:*:*:*:*:*:*:*", "cpe:2.3:a:wolfgang_ziegler:temporary_invitation:5.x-2.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:wolfgang_ziegler:temporary_invitation:5.x-2.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:wolfgang_ziegler:temporary_invitation:5.x-2.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:wolfgang_ziegler:temporary_invitation:5.x-2.0:rc4:*:*:*:*:*:*", "cpe:2.3:a:wolfgang_ziegler:temporary_invitation:5.x-2.0:rc5:*:*:*:*:*:*", "cpe:2.3:a:wolfgang_ziegler:temporary_invitation:5.x-2.0:rc6:*:*:*:*:*:*", "cpe:2.3:a:wolfgang_ziegler:temporary_invitation:5.x-2.0:rc7:*:*:*:*:*:*", "cpe:2.3:a:wolfgang_ziegler:temporary_invitation:5.x-2.1:*:*:*:*:*:*:*", "cpe:2.3:a:wolfgang_ziegler:temporary_invitation:5.x-2.2:*:*:*:*:*:*:*" ]
null
null
null
4.3
GHSA-c929-49h9-7vjw
Offline Explorer 1.4 before Service Release 2 allows remote attackers to read arbitrary files by specifying the drive letter (e.g. C:) in the requested URL.
[]
null
null
null
null
GHSA-7f4p-87qm-rj6c
In CentOS-WebPanel.com (aka CWP) CentOS Web Panel 0.9.8.836, remote attackers can bypass authentication in the login process by leveraging knowledge of a valid username.
[]
null
null
9.8
null
GHSA-mjc2-q8fc-rhrm
Tenda AX3 V16.03.12.11 was discovered to contain a stack overflow via the timeType function at /goform/SetSysTimeCfg.
[]
null
9.8
null
null
GHSA-jr7w-rv7x-x733
Picserver web server allows remote attackers to read arbitrary files via a .. (dot dot) attack in an HTTP GET request.
[]
null
null
null
null
GHSA-p7pw-3rg9-hpxm
There is a command injection vulnerability that may allow an attacker to inject malicious input on the device's operating system.
[]
null
8.8
null
null
RHSA-2014:0189
Red Hat Security Advisory: mariadb55-mariadb security update
mysql: unspecified DoS related to Optimizer (CPU October 2013) mysql: unspecified flaw related to Replication (CPU October 2013) mysql: unspecified vulnerability related to Partition DoS (CPU Jan 2014) mysql: unspecified vulnerability related to Error Handling DoS (CPU Jan 2014) mysql: command-line tool buffer overflow via long server version string mysql: unspecified vulnerability related to Optimizer DoS (CPU Jan 2014) mysql: unspecified vulnerability related to InnoDB affecting integrity (CPU Jan 2014) mysql: unspecified DoS vulnerability (CPU Jan 2014) mysql: unspecified vulnerability related to Locking DoS (CPU Jan 2014) mysql: unspecified vulnerability related to InnoDB DoS (CPU Jan 2014) mysql: unspecified vulnerability related to Replication DoS (CPU Jan 2014) mysql: unspecified vulnerability related to Optimizer DoS (CPU Jan 2014)
[ "cpe:/a:redhat:rhel_software_collections:1::el6" ]
null
null
null
null
CVE-2007-0360
PHP remote file inclusion vulnerability in lang/index.php in Oreon 1.2.3 RC4 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the file parameter.
[ "cpe:2.3:a:oreon_project:oreon:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-hvxg-77mg-vrvp
Mattermost Desktop App Remote Code Execution
Mattermost Desktop App versions <=5.7.0 fail to correctly prompt for permission when opening external URLs which allows a remote attacker to force a victim over the Internet to run arbitrary programs on the victim's system via custom URI schemes.
[]
null
4.7
null
null
RHSA-2019:0364
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.1.6 on RHEL 6 security update
wildfly-core: Cross-site scripting (XSS) in JBoss Management Console undertow: Infoleak in some circumstances where Undertow can serve data from a random buffer dom4j: XML Injection in Class: Element. Methods: addElement, addAttribute which can impact the integrity of XML documents
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7::el6" ]
null
null
5.3
null
CVE-2007-4952
SQL injection vulnerability in article.php in OmniStar Article Manager allows remote attackers to execute arbitrary SQL commands via the page_id parameter in a favorite op action, a different vector than CVE-2006-5917.
[ "cpe:2.3:a:omnistar_interactive:omnistar_article_manager:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2025-37873
eth: bnxt: fix missing ring index trim on error path
In the Linux kernel, the following vulnerability has been resolved: eth: bnxt: fix missing ring index trim on error path Commit under Fixes converted tx_prod to be free running but missed masking it on the Tx error path. This crashes on error conditions, for example when DMA mapping fails.
[]
null
null
null
null
CVE-2024-27443
An issue was discovered in Zimbra Collaboration (ZCS) 9.0 and 10.0. A Cross-Site Scripting (XSS) vulnerability exists in the CalendarInvite feature of the Zimbra webmail classic user interface, because of improper input validation in the handling of the calendar header. An attacker can exploit this via an email message containing a crafted calendar header with an embedded XSS payload. When a victim views this message in the Zimbra webmail classic interface, the payload is executed in the context of the victim's session, potentially leading to execution of arbitrary JavaScript code.
[ "cpe:2.3:a:zimbra:collaboration:*:*:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:9.0.0:-:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:9.0.0:p0:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:9.0.0:p1:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:9.0.0:p10:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:9.0.0:p11:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:9.0.0:p12:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:9.0.0:p13:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:9.0.0:p14:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:9.0.0:p15:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:9.0.0:p16:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:9.0.0:p19:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:9.0.0:p2:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:9.0.0:p20:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:9.0.0:p21:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:9.0.0:p23:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:9.0.0:p24:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:9.0.0:p24.1:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:9.0.0:p25:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:9.0.0:p26:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:9.0.0:p27:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:9.0.0:p3:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:9.0.0:p30:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:9.0.0:p31:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:9.0.0:p32:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:9.0.0:p33:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:9.0.0:p34:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:9.0.0:p35:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:9.0.0:p36:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:9.0.0:p37:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:9.0.0:p38:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:9.0.0:p4:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:9.0.0:p5:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:9.0.0:p6:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:9.0.0:p7:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:9.0.0:p7.1:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:9.0.0:p8:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:9.0.0:p9:*:*:*:*:*:*" ]
null
6.1
null
null
CVE-2008-6754
The Personal Sticky Threads addon 1.0.3c for vBulletin allows remote authenticated users to read the title, author, and pages of an arbitrary thread by toggling a personal sticky.
[ "cpe:2.3:a:jelsoft:vbulletin:*:*:*:*:*:*:*:*", "cpe:2.3:a:mephisteus:the_personal_sticky_threads:1.0.3c:*:*:*:*:*:*:*" ]
null
null
null
4
GHSA-4qc2-r4q6-vfxr
diag_tool.cgi on DASAN H660RM GPON routers with firmware 1.03-0022 lacks any authorization check, which allows remote attackers to run a ping command via a GET request to enumerate LAN devices or crash the router with a DoS attack.
[]
null
null
9.1
null
RHBA-2021:2703
Red Hat Bug Fix Advisory: Red Hat Ansible Automation Platform Product Release
ansible: Template Injection through yaml multi-line strings with ansible facts used in template.
[ "cpe:/a:redhat:ansible_automation_platform:2.0::el8" ]
null
6.6
null
null
RHSA-2020:2513
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update
mojarra: Path traversal in ResourceManager.java:getLocalePrefix() via the loc parameter thrift: Endless loop when feed with specific input data thrift: Out-of-bounds read related to TJSONProtocol or TSimpleJSONProtocol jackson-mapper-asl: XML external entity similar to CVE-2016-3720 cxf: OpenId Connect token service does not properly validate the clientId wildfly: The 'enabled-protocols' value in legacy security is not respected if OpenSSL security provider is in use cxf: reflected XSS in the services listing page resteasy: Improper validation of response header in MediaTypeHeaderDelegate.java class Wildfly: EJBContext principal is not popped back after invoking another EJB using a different Security Domain SmallRye: SecuritySupport class is incorrectly public and contains a static method to access the current threads context class loader undertow: AJP File Read/Inclusion Vulnerability undertow: servletPath is normalized incorrectly leading to dangerous application mapping which could result in security bypass Mojarra: Path traversal via either the loc parameter or the con parameter, incomplete fix of CVE-2018-14371 cryptacular: excessive memory allocation during a decode operation jackson-databind: Lacks certain xbean-reflect/JNDI blocking jackson-databind: Serialization gadgets in shaded-hikari-config jackson-databind: Serialization gadgets in ibatis-sqlmap jackson-databind: Serialization gadgets in anteros-core RESTEasy: RESTEASY003870 exception in RESTEasy can lead to a reflected XSS attack undertow: Memory exhaustion issue in HttpReadListener via "Expect: 100-continue" header undertow: invalid HTTP request with large chunk size
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el8" ]
null
6.5
8.1
null
GHSA-4hrr-7cq5-fj96
tuned 2.10.0 creates its PID file with insecure permissions which allows local users to kill arbitrary processes.
[]
null
null
null
null
CVE-2005-2637
Multiple SQL injection vulnerabilities in PHPFreeNews 1.40 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) Match or (2) CatID parameter to SearchResults.php, or (3) the password to AccessControl.php.
[ "cpe:2.3:a:phpfreenews:phpfreenews:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2007-0607
W-Agora (Web-Agora) 4.2.1, when register_globals is enabled, stores globals.inc under the web document root with insufficient access control, which allows remote attackers to obtain application path information via a direct request.
[ "cpe:2.3:a:w-agora:w-agora:4.2.1:*:*:*:*:*:*:*" ]
null
null
null
4.3
GHSA-rr4m-8whr-q39q
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
[]
null
null
null
null
GHSA-3mf4-grcw-4c92
The ExecuteExe method in the DVBSExeCall Control ActiveX control 1.0.0.1 in DVBSExeCall.ocx in DATEV Base System (aka Grundpaket Basis) allows remote attackers to execute arbitrary commands via unspecified vectors.
[]
null
null
null
null
GHSA-5gqw-f2qg-w3vf
In Enigmail below 2.1, an attacker in possession of PGP encrypted emails can wrap them as sub-parts within a crafted multipart email. The encrypted part(s) can further be hidden using HTML/CSS or ASCII newline characters. This modified multipart email can be re-sent by the attacker to the intended receiver. If the receiver replies to this (benign looking) email, he unknowingly leaks the plaintext of the encrypted message part(s) back to the attacker. This attack variant bypasses protection mechanisms implemented after the "EFAIL" attacks.
[]
null
null
null
null
GHSA-q82x-fpcf-f854
KNIME Server before 4.13.4 allows directory traversal in a request for a client profile.
[]
null
7.5
null
null
CVE-2000-0787
IRC Xchat client versions 1.4.2 and earlier allows remote attackers to execute arbitrary commands by encoding shell metacharacters into a URL which XChat uses to launch a web browser.
[ "cpe:2.3:a:xchat:xchat:1.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:xchat:xchat:1.3.9:*:*:*:*:*:*:*", "cpe:2.3:a:xchat:xchat:1.3.10:*:*:*:*:*:*:*", "cpe:2.3:a:xchat:xchat:1.3.11:*:*:*:*:*:*:*", "cpe:2.3:a:xchat:xchat:1.3.12:*:*:*:*:*:*:*", "cpe:2.3:a:xchat:xchat:1.3.13:*:*:*:*:*:*:*", "cpe:2.3:a:xchat:xchat:1.4:*:*:*:*:*:*:*", "cpe:2.3:a:xchat:xchat:1.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:xchat:xchat:1.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:xchat:xchat:1.5.6:*:*:*:*:*:*:*", "cpe:2.3:a:xchat:xchat:1.5.xdev:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2022-47517
An issue was discovered in the libsofia-sip fork in drachtio-server before 0.8.19. It allows remote attackers to cause a denial of service (daemon crash) via a crafted UDP message that causes a url_canonize2 heap-based buffer over-read because of an off-by-one error.
[ "cpe:2.3:a:drachtio:drachtio-server:*:*:*:*:*:*:*:*" ]
null
7.5
null
null
GHSA-7hv5-hxph-jxm3
Adobe Digital Editions versions 4.5.10.185749 and below have a heap overflow vulnerability. Successful exploitation could lead to arbitrary code execution.
[]
null
null
9.8
null
GHSA-gq65-xxmf-mf89
Cross-site request forgery (CSRF) vulnerability in Related YouTube Videos versions prior to 1.9.9 allows remote attackers to hijack the authentication of administrators via unspecified vectors.
[]
null
8.8
null
null
CVE-2025-6874
SourceCodester Best Salon Management System add_subscribe.php sql injection
A vulnerability, which was classified as critical, was found in SourceCodester Best Salon Management System 1.0. Affected is an unknown function of the file /panel/add_subscribe.php. The manipulation of the argument user_id/plan_id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
[]
5.3
6.3
6.3
6.5
GHSA-2j48-mrqm-r4w9
CimWebServer in GE Intelligent Platforms Proficy HMI/SCADA - CIMPLICITY 4.01 through 8.0, and Proficy Process Systems with CIMPLICITY, allows remote attackers to execute arbitrary commands or cause a denial of service (daemon crash) via a crafted packet.
[]
null
null
null
null
GHSA-cmp3-q2f2-v785
Cross-Site Request Forgery (CSRF) vulnerability in weblizar HR Management Lite allows Cross Site Request Forgery. This issue affects HR Management Lite: from n/a through 3.3.
[]
null
4.3
null
null
CVE-2021-37759
A Session ID leak in the DEBUG log file in Graylog before 4.1.2 allows attackers to escalate privileges (to the access level of the leaked session ID).
[ "cpe:2.3:a:graylog:graylog:*:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
GHSA-p6r9-p725-g42c
The unprivileged administrative interface in ABO.CMS version 5.8 through v.5.9.3 is affected by a SQL Injection vulnerability via a HTTP POST request to the TinyMCE module
[]
null
6.5
null
null
RHBA-2023:1037
Red Hat Bug Fix Advisory: Red Hat build of MicroShift 4.12.6 bug fix and enhancement update
openshift/apiserver-library-go: Bypass of SCC seccomp profile restrictions
[ "cpe:/a:redhat:openshift:4.12::el8" ]
null
6.3
null
null
CVE-2025-0952
Eco Nature - Environment & Ecology WordPress Theme <= 2.0.4 - Missing Authorization to Authenticated (Subscriber+) Limited Options Update
The Eco Nature - Environment & Ecology WordPress Theme theme for WordPress is vulnerable to unauthorized modification of data that can lead to a denial of service due to a missing capability check on the 'cmsmasters_hide_admin_notice' AJAX action in all versions up to, and including, 2.0.4. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update option values to 'hide' on the WordPress site. This can be leveraged to update an option that would create an error on the site and deny service to legitimate users or be used to set some values to true such as registration.
[]
null
8.1
null
null
CVE-2024-49086
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
[ "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*" ]
null
8.8
null
null
GHSA-76g7-7jq2-pjg7
TP-LINK TL-WR886N V7.0_3.0.14_Build_221115_Rel.56908n.bin was discovered to contain a stack overflow via the function deviceInfoRegister.
[]
null
9.8
null
null
CVE-2021-29562
CHECK-fail in `tf.raw_ops.IRFFT`
TensorFlow is an end-to-end open source platform for machine learning. An attacker can cause a denial of service by exploiting a `CHECK`-failure coming from the implementation of `tf.raw_ops.IRFFT`. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
[ "cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*" ]
null
2.5
null
null
GHSA-cfr6-fjfx-m5r2
An issue was discovered on TRENDnet TV-IP1314PI 5.5.3 200714 devices. Command injection can occur because the system function is used by davinci to unpack language packs without strict filtering of URL strings.
[]
null
9.8
null
null
CVE-2024-28710
Cross Site Scripting vulnerability in LimeSurvey before 6.5.0+240319 allows a remote attacker to execute arbitrary code via a lack of input validation and output encoding in the Alert Widget's message component.
[ "cpe:2.3:a:limesurvey:limesurvey:*:*:*:*:*:*:*:*" ]
null
6.1
null
null
GHSA-2jhj-4276-cq8h
An issue was discovered in the Vanguard plugin 2.1 for WordPress. XSS can occur via the mails/new title field, a product field to the p/ URI, or the Products Search box.
[]
null
null
null
null
RHSA-2024:11237
Red Hat Security Advisory: libsndfile:1.0.31 security update
libsndfile: Segmentation fault error in ogg_vorbis.c:417 vorbis_analysis_wrote()
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
5.5
null
null
CVE-2023-43766
Certain WithSecure products allow Local privilege escalation via the lhz archive unpack handler. This affects WithSecure Client Security 15, WithSecure Server Security 15, WithSecure Email and Server Security 15, WithSecure Elements Endpoint Protection 17 and later, WithSecure Client Security for Mac 15, WithSecure Elements Endpoint Protection for Mac 17 and later, Linux Security 64 12.0 , Linux Protection 12.0, and WithSecure Atlant (formerly F-Secure Atlant) 1.0.35-1.
[ "cpe:2.3:a:f-secure:linux_protection:12.0:*:*:*:*:*:*:*", "cpe:2.3:a:f-secure:linux_security_64:12.0:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "cpe:2.3:a:f-secure:atlant:1.0.35-1:*:*:*:*:*:*:*", "cpe:2.3:a:f-secure:client_security:15.00:*:*:*:*:*:*:*", "cpe:2.3:a:f-secure:elements_endpoint_protection:*:*:*:*:*:*:*:*", "cpe:2.3:a:f-secure:email_and_server_security:15.00:*:*:*:*:*:*:*", "cpe:2.3:a:f-secure:server_security:15.00:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*" ]
null
7.8
null
null
GHSA-6cvr-wmr3-636f
Transient DOS while decoding attach reject message received by UE, when IEI is set to ESM_IEI.
[]
null
7.5
null
null
GHSA-69p2-c4f9-v6j4
The WP Contact Form7 Email Spam Blocker plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'post' parameter in all versions up to, and including, 1.0.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
[]
null
6.1
null
null
CVE-2024-47435
Substance3D - Painter | Out-of-bounds Read (CWE-125)
Substance3D - Painter versions 10.1.0 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[ "cpe:2.3:a:adobe:substance_3d_painter:*:*:*:*:*:*:*:*" ]
null
5.5
null
null
GHSA-cm69-2c6j-6pvp
A remote cross-site request forgery (csrf) vulnerability was discovered in Aruba SD-WAN Software and Gateways; Aruba Operating System Software version(s): Prior to 8.6.0.4-2.2.0.4; Prior to 8.8.0.1, 8.7.1.2, 8.6.0.8, 8.5.0.12, 8.3.0.15. Aruba has released patches for Aruba SD-WAN Software and Gateways and ArubaOS that address this security vulnerability.
[]
null
null
null
null
CVE-2018-6368
SQL Injection exists in the JomEstate PRO through 3.7 component for Joomla! via the id parameter in a task=detailed action.
[ "cpe:2.3:a:comdev:jomestate_pro:*:*:*:*:*:joomla\\!:*:*" ]
null
null
9.8
7.5
GHSA-3g5p-5p6j-r9qp
In multiple locations, there is a possible bypass of health data permissions due to an improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
[]
null
7.4
null
null
GHSA-97pg-mf6p-74fr
Multiple PHP remote file inclusion vulnerabilities in phpMyAdmin 2.6.1 allow remote attackers to execute arbitrary PHP code by modifying the (1) theme parameter to phpmyadmin.css.php or (2) cfg[Server][extension] parameter to database_interface.lib.php to reference a URL on a remote web server that contains the code.
[]
null
null
null
null
CVE-2023-1223
Insufficient policy enforcement in Autofill in Google Chrome on Android prior to 111.0.5563.64 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: Medium)
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*" ]
null
4.3
null
null
GHSA-34vx-3926-gfg8
IBM Engineering Workflow Management 7.0, 7.0.1, and 7.0.2 as well as IBM Rational Team Concert 6.0.6 and 6.0.6.1 could allow an authneticated attacker to obtain sensitive information from build definitions that could aid in further attacks against the system. IBM X-Force ID: 200657.
[]
null
4.3
null
null
CVE-2023-49589
An insufficient entropy vulnerability exists in the userRecoverPass.php recoverPass generation functionality of WWBN AVideo dev master commit 15fed957fb. A specially crafted HTTP request can lead to an arbitrary user password recovery. An attacker can send an HTTP request to trigger this vulnerability.
[ "cpe:2.3:a:wwbn:avideo:15fed957fb:*:*:*:*:*:*:*" ]
null
8.8
null
null
CVE-2018-0040
Contrail Service Orchestration: hardcoded cryptographic certificates and keys
Juniper Networks Contrail Service Orchestrator versions prior to 4.0.0 use hardcoded cryptographic certificates and keys in some cases, which may allow network based attackers to gain unauthorized access to services.
[ "cpe:2.3:a:juniper:contrail_service_orchestration:*:*:*:*:*:*:*:*" ]
null
null
9.8
null
CVE-2024-39723
IBM FlashSystem denial of service
IBM FlashSystem 5300 USB ports may be usable even if the port has been disabled by the administrator. A user with physical access to the system could use the USB port to cause loss of access to data. IBM X-Force ID: 295935.
[ "cpe:2.3:a:ibm:storage_virtualize:8.6:*:*:*:*:*:*:*" ]
null
4.6
null
null
GHSA-qxrr-6vvc-2mcc
Buffer underflow in ssldump 0.9b2 and earlier allows remote attackers to cause a denial of service (memory corruption) via a crafted SSLv2 challenge value.
[]
null
null
null
null
GHSA-3w7f-3j97-hfv4
A improper neutralization of input during web page generation ('cross-site scripting') in Fortinet FortiWLM version 8.6.1 and below allows attacker to store malicious javascript code in the device and trigger it via crafted HTTP requests
[]
null
null
null
null
RHSA-2023:3382
Red Hat Security Advisory: git security update
git: by feeding specially crafted input to `git apply --reject`, a path outside the working tree can be overwritten with partially controlled contents git: malicious placement of crafted messages when git was compiled with runtime prefix git: arbitrary configuration injection when renaming or deleting a section from a configuration file
[ "cpe:/a:redhat:rhel_aus:8.2::appstream" ]
null
7.8
null
null
CVE-2024-33660
Potential Firmware update without integrity check
An exploit is possible where an actor with physical access can manipulate SPI flash without being detected.
[]
5.2
null
null
null
RHSA-2022:0856
Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.2.11 security updates and bug fixes
object-path: Type confusion vulnerability can lead to a bypass of CVE-2020-15256 follow-redirects: Exposure of Private Personal Information to an Unauthorized Actor
[ "cpe:/a:redhat:acm:2.2::el7", "cpe:/a:redhat:acm:2.2::el8" ]
null
6.5
null
null
CVE-2006-4900
Directory traversal vulnerability in Computer Associates (CA) eTrust Security Command Center 1.0 and r8 up to SP1 CR2, allows remote authenticated users to read and delete arbitrary files via ".." sequences in the eSCCAdHocHtmlFile parameter to eSMPAuditServlet, which is not properly handled by the getadhochtml function.
[ "cpe:2.3:a:broadcom:etrust_security_command_center:8:*:*:*:*:*:*:*", "cpe:2.3:a:broadcom:etrust_security_command_center:8:sp1:cr1:*:*:*:*:*", "cpe:2.3:a:broadcom:etrust_security_command_center:8:sp1:cr2:*:*:*:*:*" ]
null
null
null
5.5
CVE-2022-23626
Insufficient file checks in m1k1o/blog
m1k1o/blog is a lightweight self-hosted facebook-styled PHP blog. Errors from functions `imagecreatefrom*` and `image*` have not been checked properly. Although PHP issued warnings and the upload function returned `false`, the original file (that could contain a malicious payload) was kept on the disk. Users are advised to upgrade as soon as possible. There are no known workarounds for this issue.
[ "cpe:2.3:a:blog_project:blog:*:*:*:*:*:*:*:*" ]
null
8.5
null
null
GHSA-3gph-8868-xm4r
SearchBlox before Version 9.2.1 is vulnerable to Privileged Escalation-Lower user is able to access Admin functionality.
[]
null
8.8
null
null