id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
197k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
GHSA-5662-cv6m-63wh
melange's world-writable permissions expose SBOM files to potential image tampering
It was discovered that the SBOM files generated by melange in apks had file system permissions mode 666:This issue was introduced in commit 1b272db ("Persist workspace filesystem throughout package builds (#1836)") ([v0.23.0](https://github.com/chainguard-dev/melange/releases/tag/v0.23.0)).ImpactThis potentially allows an unprivileged user to tamper with apk SBOMs on a running image, potentially confusing security scanners. An attacker could also perform a DoS under special circumstances.PatchesThis issue was addressed in melange in e29494b ("fix: tighten up permissions for written SBOM files and signature tarballs (#2086)") ([v0.29.5](https://github.com/chainguard-dev/melange/releases/tag/v0.29.5)).AcknowledgementsThanks to Cody Harris [H2O.ai](https://h2o.ai/) and Markus Boehme for independently reporting this issue.
[]
null
4.4
null
null
GHSA-vgq8-wrpg-ch5m
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in datafeedr.Com Ads by datafeedr.Com allows Stored XSS.This issue affects Ads by datafeedr.Com: from n/a through 1.2.0.
[]
null
6.5
null
null
CVE-2020-2556
Vulnerability in the Primavera P6 Enterprise Project Portfolio Management product of Oracle Construction and Engineering (component: Core). Supported versions that are affected are 16.2.0.0-16.2.19.0, 17.12.0.0-17.12.16.0, 18.8.0.0-18.8.16.0, 19.12.0.0 and 20.1.0.0. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Primavera P6 Enterprise Project Portfolio Management executes to compromise Primavera P6 Enterprise Project Portfolio Management. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Primavera P6 Enterprise Project Portfolio Management, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Primavera P6 Enterprise Project Portfolio Management accessible data as well as unauthorized read access to a subset of Primavera P6 Enterprise Project Portfolio Management accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Primavera P6 Enterprise Project Portfolio Management. CVSS 3.0 Base Score 7.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:C/C:L/I:H/A:L).
[ "cpe:2.3:a:oracle:primavera_p6_enterprise_project_portfolio_management:*:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:primavera_p6_enterprise_project_portfolio_management:19.12.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:primavera_p6_enterprise_project_portfolio_management:20.1.0.0:*:*:*:*:*:*:*" ]
null
null
7.3
null
CVE-2024-30568
Netgear R6850 1.1.0.88 was discovered to contain a command injection vulnerability via the c4-IPAddr parameter.
[ "cpe:2.3:o:netgear:r6850_firmware:1.1.0.88:*:*:*:*:*:*:*" ]
null
9.8
null
null
GHSA-qjh8-8mpw-pg76
Symphony 2 2.6.11 has XSS in the meta[navigation_group] parameter to content/content.blueprintssections.php.
[]
null
6.1
null
null
GHSA-ch6w-869j-m5qj
An information disclosure vulnerability exists when Microsoft Project reads out of bound memory due to an uninitialized variable, aka 'Microsoft Project Information Disclosure Vulnerability'.
[]
null
null
null
null
CVE-2019-2179
In NDEF_MsgValidate of ndef_utils in Android 7.1.1, 7.1.2, 8.0, 8.1 and 9, there is a possible out of bounds read due to an integer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.
[ "cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*" ]
null
null
5.5
4.3
GHSA-wvg9-27w3-xhh7
An issue was discovered in the Linux kernel before 5.6.7. xdp_umem_reg in net/xdp/xdp_umem.c has an out-of-bounds write (by a user with the CAP_NET_ADMIN capability) because of a lack of headroom validation.
[]
null
6.7
null
null
CVE-2024-10488
Use after free in WebRTC in Google Chrome prior to 130.0.6723.92 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" ]
null
8.8
null
null
CVE-1999-0705
Buffer overflow in INN inews program.
[ "cpe:2.3:a:isc:inn:*:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:linux:6.0:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2022-2635
Autoptimize < 3.1.1 - Admin+ Stored Cross Site Scripting
The Autoptimize WordPress plugin before 3.1.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
[ "cpe:2.3:a:autoptimize:autoptimize:*:*:*:*:*:wordpress:*:*" ]
null
4.8
null
null
GHSA-cq6h-w3mc-57f4
Information exposure via query strings in URL
ImpactInformation exposure via query strings in URLPatchesWe recommend to update to the current version 6.3.4.1. You can get the update to 6.3.4.1 regularly via the Auto-Updater or directly via the download overview.https://www.shopware.com/en/download/#shopware-6WorkaroundsFor older versions of 6.1 and 6.2 the corresponding changes are also available via plugin:https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659For more informationhttps://docs.shopware.com/en/shopware-6-en/security-updates/security-update-12-2020CreditsWe would like to thank <a rel="noopener" href="https://www.vater-it.de/">Oliver Herrmann</a> for reporting this issue.
[]
null
null
null
null
GHSA-f58h-hjj3-8549
An issue was discovered in Enalean Tuleap 9.6 and prior versions. The vulnerability exists because the User::getRecentElements() method is using the unserialize() function with a preference value that can be arbitrarily manipulated by malicious users through the REST API interface, and this can be exploited to inject arbitrary PHP objects into the application scope, allowing an attacker to perform a variety of attacks (including but not limited to Remote Code Execution).
[]
null
null
8.8
null
CVE-2008-6474
The management interface in F5 BIG-IP 9.4.3 allows remote authenticated users with Resource Manager privileges to inject arbitrary Perl code via unspecified configuration settings related to Perl EP3 with templates, probably triggering static code injection.
[ "cpe:2.3:o:f5:tmos:9.4.3:*:*:*:*:*:*:*" ]
null
null
null
9
CVE-2025-52889
Incus vulnerable to DoS through antispoofing nftables firewall rule bypass on bridge networks with ACLs
Incus is a system container and virtual machine manager. When using an ACL on a device connected to a bridge, Incus version 6.12 and 6.13 generates nftables rules for local services (DHCP, DNS...) that partially bypass security options `security.mac_filtering`, `security.ipv4_filtering` and `security.ipv6_filtering`. This can lead to DHCP pool exhaustion and opens the door for other attacks. A patch is available at commit 2516fb19ad8428454cb4edfe70c0a5f0dc1da214.
[]
null
3.4
null
null
RHSA-2016:0118
Red Hat Security Advisory: Red Hat JBoss Operations Network 3.3.5 update
groovy: remote execution of untrusted code in class MethodClosure apache-commons-collections: InvokerTransformer code execution during deserialisation
[ "cpe:/a:redhat:jboss_operations_network:3.3" ]
null
null
9.6
null
GHSA-p442-pxcc-px5g
BTV-W09C229B002CUSTC229D005,BTV-W09C233B029, earlier than BTV-W09C100B006CUSTC100D002 versions, earlier than BTV-W09C128B003CUSTC128D002 versions, earlier than BTV-W09C199B002CUSTC199D002 versions, earlier than BTV-W09C209B005CUSTC209D001 versions, earlier than BTV-W09C331B002CUSTC331D001 versions, earlier than CRR-L09C432B390 versions, earlier than CRR-L09C605B355CUSTC605D003 versions have a Factory Reset Protection (FRP) bypass security vulnerability. When re-configuring the mobile phone using the factory reset protection (FRP) function, an attacker can perform some operations to update the Google account. As a result, the FRP function is bypassed.
[]
null
null
4.6
null
GHSA-hjqr-gcv7-w67w
Vulnerability in the Oracle CRM Technical Foundation component of Oracle E-Business Suite (subcomponent: Preferences). Supported versions that are affected are 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6, 12.2.7 and 12.2.8. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle CRM Technical Foundation. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle CRM Technical Foundation, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle CRM Technical Foundation accessible data as well as unauthorized update, insert or delete access to some of Oracle CRM Technical Foundation accessible data. CVSS 3.0 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N).
[]
null
null
null
null
GHSA-f4v5-wx3x-7j5v
Improper conditions check in the Intel(R) Data Center GPU Max Series 1100 and 1550 products may allow an privileged user to potentially enable denial of service via local access.
[]
null
6
null
null
GHSA-cgrr-8q8m-cx6q
An incorrect authorization vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated users to bypass intended access restrictions via a network.We have already fixed the vulnerability in the following versions: QTS 5.1.6.2722 build 20240402 and later QuTS hero h5.1.6.2734 build 20240414 and later
[]
null
7.4
null
null
CVE-2009-3235
Multiple stack-based buffer overflows in the Sieve plugin in Dovecot 1.0 before 1.0.4 and 1.1 before 1.1.7, as derived from Cyrus libsieve, allow context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted SIEVE script, as demonstrated by forwarding an e-mail message to a large number of recipients, a different vulnerability than CVE-2009-2632.
[ "cpe:2.3:a:dovecot:dovecot:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:dovecot:dovecot:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:dovecot:dovecot:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:dovecot:dovecot:1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:dovecot:dovecot:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:dovecot:dovecot:1.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:dovecot:dovecot:1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:dovecot:dovecot:1.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:dovecot:dovecot:1.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:dovecot:dovecot:1.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:dovecot:dovecot:1.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:dovecot:dovecot:1.1.6:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2020-10675
The Library API in buger jsonparser through 2019-12-04 allows attackers to cause a denial of service (infinite loop) via a Delete call.
[ "cpe:2.3:a:jsonparser_project:jsonparser:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*" ]
null
7.5
null
5
CVE-2019-12841
Incorrect handling of user input in ZIP extraction was detected in JetBrains TeamCity. The issue was fixed in TeamCity 2018.2.2.
[ "cpe:2.3:a:jetbrains:teamcity:*:*:*:*:*:*:*:*" ]
null
null
7.5
5
GHSA-f49g-9gwg-jc3x
Intel Alert Management System (aka AMS or AMS2), as used in Symantec Antivirus Corporate Edition (SAVCE) 10.x before 10.1 MR10, Symantec System Center (SSC) 10.x, and Symantec Quarantine Server 3.5 and 3.6, allows remote attackers to execute arbitrary commands via crafted messages over TCP, as discovered by Junaid Bohio, a different vulnerability than CVE-2010-0110 and CVE-2010-0111. NOTE: some of these details are obtained from third party information.
[]
null
null
null
null
GHSA-v5gm-3g5x-xmp8
Cross-site scripting (XSS) vulnerability in superalbum/index.php in Photoalbum B&W 1.3 allows remote attackers to inject arbitrary web script or HTML via the pic parameter.
[]
null
null
null
null
RHSA-2024:2778
Red Hat Security Advisory: nodejs:20 security update
nodejs: using the fetch() function to retrieve content from an untrusted URL leads to denial of service c-ares: Out of bounds read in ares__read_line() nodejs: HTTP Request Smuggling via Content Length Obfuscation nodejs: CONTINUATION frames DoS nghttp2: CONTINUATION frames DoS
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
5.3
null
null
GHSA-56hj-j6mv-g5fc
An unrestricted file upload vulnerability exists in the Product Image section of the VirtueMart backend. Authenticated attackers can upload files with arbitrary extensions, including executable or malicious files, potentially leading to remote code execution or other security impacts depending on server configuration.
[]
null
7.2
null
null
GHSA-v64g-f7qf-63xm
An issue has been discovered in GitLab affecting all versions starting from 9.3 before 16.4.4, all versions starting from 16.5 before 16.5.4, all versions starting from 16.6 before 16.6.2. In certain situations, it may have been possible for developers to override predefined CI variables via the REST API.
[]
null
4.3
null
null
CVE-2024-13725
Keap Official Opt-in Forms <= 2.0.1 - Unauthenticated Limited Local File Inclusion
The Keap Official Opt-in Forms plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 2.0.1 via the service parameter. This makes it possible for unauthenticated attackers to include PHP files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where PHP files can be uploaded and included. If register_argc_argv is enabled on the server and pearcmd.php is installed, this issue might lead to Remote Code Execution.
[]
null
9.8
null
null
GHSA-97mx-8397-c6cw
Acrobat Reader DC versions 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[]
null
3.3
null
null
GHSA-xpm9-95h9-q996
TinyXML2 through 10.0.0 has a reachable assertion for UINT_MAX/16, that may lead to application exit, in tinyxml2.cpp XMLUtil::GetCharacterRef.
[]
null
6.5
null
null
CVE-2017-6851
The jas_matrix_bindsub function in jas_seq.c in JasPer 2.0.10 allows remote attackers to cause a denial of service (invalid read) via a crafted image.
[ "cpe:2.3:a:jasper_project:jasper:*:*:*:*:*:*:*:*" ]
null
null
5.5
4.3
CVE-2023-22004
Vulnerability in the Oracle Applications Technology product of Oracle E-Business Suite (component: Reports Configuration). Supported versions that are affected are 12.2.3-12.2.12. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Applications Technology. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Applications Technology accessible data. CVSS 3.1 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N).
[ "cpe:2.3:a:oracle:e-business_suite:*:*:*:*:*:*:*:*" ]
null
4.3
null
null
CVE-2002-1379
OpenLDAP2 (OpenLDAP 2) 2.2.0 and earlier allows remote or local attackers to execute arbitrary code when libldap reads the .ldaprc file within applications that are running with extra privileges.
[ "cpe:2.3:a:openldap:openldap:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
RHSA-2022:2256
Red Hat Security Advisory: pcs security update
sinatra: path traversal possible outside of public_dir when serving static files
[ "cpe:/a:redhat:rhel_eus:8.4::highavailability", "cpe:/a:redhat:rhel_eus:8.4::resilientstorage" ]
null
7.5
null
null
GHSA-5w7r-vv9c-xhfh
Multiple cross-site scripting (XSS) vulnerabilities in IBM InfoSphere Information Server through 8.5 FP3, 8.7 through FP2, and 9.1 allow remote authenticated users to inject arbitrary web script or HTML via vectors related to the (1) web console and (2) repository management user interfaces.
[]
null
null
null
null
CVE-2020-8745
Insufficient control flow management in subsystem for Intel(R) CSME versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 13.0.40, 13.30.10, 14.0.45 and 14.5.25 , Intel(R) TXE versions before 3.1.80 and 4.0.30 may allow an unauthenticated user to potentially enable escalation of privilege via physical access.
[ "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*", "cpe:2.3:a:intel:trusted_execution_technology:*:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_drive_controller_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_drive_controller:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_et200sp_1515sp_pc2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_et200sp_1515sp_pc2:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_field_pg_m5_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_field_pg_m5:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_field_pg_m6_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_field_pg_m6:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_ipc127e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_ipc127e:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_ipc427e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_ipc427e:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_ipc477e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_ipc477e:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_ipc477e_pro:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_ipc527g_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_ipc527g:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_ipc547g_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_ipc547g:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_ipc627e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_ipc627e:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_ipc647e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_ipc647e:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_ipc667e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_ipc667e:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_ipc847e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_ipc847e:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_itp1000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_itp1000:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:sinumerik_828d_hw_pu.4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:sinumerik_828d_hw_pu.4:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:sinumerik_mc_mcu_1720_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:sinumerik_mc_mcu_1720:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:sinumerik_one_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:sinumerik_one:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:sinumerik_840d_sl_ht_10_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:sinumerik_840d_sl_ht_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:sinumerik_one_ncu_1740_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:sinumerik_one_ncu_1740:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:sinumerik_one_ppu_1740_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:sinumerik_one_ppu_1740:-:*:*:*:*:*:*:*" ]
null
6.8
null
4.6
CVE-2024-23488
Files of archived channels accessible with the “Allow users to view archived channels” option disabled
Mattermost fails to properly restrict the access of files attached to posts in an archived channel, resulting in members being able to access files of archived channels even if the “Allow users to view archived channels” option is disabled.
[]
null
3.1
null
null
CVE-2014-5410
The DNP3 feature on Rockwell Automation Allen-Bradley MicroLogix 1400 1766-Lxxxxx A FRN controllers 7 and earlier and 1400 1766-Lxxxxx B FRN controllers before 15.001 allows remote attackers to cause a denial of service (process disruption) via malformed packets over (1) an Ethernet network or (2) a serial line.
[ "cpe:2.3:h:rockwellautomation:ab_micrologix_controller:1400:*:*:*:*:*:*:*" ]
null
null
null
7.1
CVE-2024-6520
fluentform <= 5.1.19 - Authenticated (Administrator+) Stored Cross-Site Scripting
The Contact Form Plugin by Fluent Forms for Quiz, Survey, and Drag & Drop WP Form Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting in all versions up to, and including, 5.1.19 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Administrator-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[ "cpe:2.3:a:web-dorado:wp_form_builder:*:*:*:*:*:wordpress:*:*", "cpe:2.3:a:fluentforms:contact_form:*:*:*:*:*:wordpress:*:*" ]
null
5.5
null
null
GHSA-3c6p-c4v9-m5mw
An issue in redoxOS relibc before commit 98aa4ea5 allows a local attacker to cause a denial of service via the setsockopt function.
[]
null
5.5
null
null
CVE-2024-41849
Adobe Experience Manager | Improper Input Validation (CWE-20)
Adobe Experience Manager versions 6.5.20 and earlier are affected by an Improper Input Validation vulnerability that could lead to a security feature bypass. An low-privileged attacker could leverage this vulnerability to slightly affect the integrity of the page. Exploitation of this issue requires user interaction and scope is changed.
[ "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*" ]
null
4.1
null
null
CVE-2020-12052
Grafana version < 6.7.3 is vulnerable for annotation popup XSS.
[ "cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:*" ]
null
6.1
null
4.3
GHSA-3mqj-g336-hgj5
SQL injection vulnerability in search.php in SiteX CMS 0.7.3 Beta allows remote attackers to execute arbitrary SQL commands via the search parameter.
[]
null
null
null
null
GHSA-qjmq-8hjr-qcv6
SQL Injection when creating an application with Reactive SQL backend
ImpactSQL Injection vulnerability in entities for applications generated with the option "reactive with Spring WebFlux" enabled and an SQL database using r2dbc. Applications created without "reactive with Spring WebFlux" and applications with NoSQL databases are not affected.If you have generated a microservice Gateway using the affected version, you might be impacted as Gateways are reactive by default.Currently, SQL injection is possible in the `findAllBy(Pageable pageable, Criteria criteria)` method of an entity repository class generated in these applications as the where clause using Criteria for queries are not sanitized and user input is passed on as it is by the criteria.Impacted applicationsMonolith and microservice applications with SQL database and reactive with Spring WebFlux combination (other combinations are not affected and the issue is only present when you generate entities)Gateway applications with SQL database (issue will appear only when generating entities)PatchesPatched in v7.8.1The `findAllBy(Pageable pageable, Criteria criteria)` method has been removed from the entity repositories and `org.springframework.data.relational.core.query.Criteria` support in the underlying methods has been replaced with `org.springframework.data.relational.core.sql.Condition`. This means you won't be able to do custom filtering in the generated applications.If you have existing reactive applications generated by the impacted version, we advise you to audit for use of `Criteria` and take appropriate actions.WorkaroundsThe problem lies in the `EntityManager.java` class when creating the where clause via `Conditions.just(criteria.toString())`.`just` accepts the literal string provided. Criteria's `toString` method returns a plain string and this combination is vulnerable to sql injection as the string is not sanitized and will contain whatever used passed as input using any plain SQLSo be careful when combining criterias and conditions. As a workaround we have removed the possibility to pass any user-provided criteria to the `createSelect` method of `EntityManager`.ExampleReferences[More details in this Issue report](https://github.com/jhipster/generator-jhipster/issues/18269)For more informationIf you have any questions or comments about this advisory:Open an issue in [JHipster issue tracker](https://github.com/jhipster/generator-jhipster/issues)
[]
null
8.1
null
null
CVE-2019-16265
CODESYS V2.3 ENI server up to V3.2.2.24 has a Buffer Overflow.
[ "cpe:2.3:a:codesys:eni_server:*:*:*:*:*:*:*:*", "cpe:2.3:a:codesys:codesys:*:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
CVE-2023-50096
STMicroelectronics STSAFE-A1xx middleware before 3.3.7 allows MCU code execution if an adversary has the ability to read from and write to the I2C bus. This is caused by an StSafeA_ReceiveBytes buffer overflow in the X-CUBE-SAFEA1 Software Package for STSAFE-A sample applications (1.2.0), and thus can affect user-written code that was derived from a published sample application.
[ "cpe:2.3:a:st:x-cube-safea1:1.2.0:*:*:*:*:stsafe-a:*:*" ]
null
7.5
null
null
GHSA-6f8j-qh6v-75rj
In loadLabel of PackageItemInfo.java, there is a possible way to DoS a device by having a long label in an app due to incorrect input validation. This could lead to local denial of service with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11 Android-9 Android-10Android ID: A-67013844
[]
null
null
null
null
GHSA-7x87-p94m-4r53
The SAN Manager Master Agent service (aka msragent.exe) in EMC Control Center before 6.1 does not properly authenticate SST_SENDFILE requests, which allows remote attackers to read arbitrary files.
[]
null
null
null
null
CVE-2023-22469
Nextcloud Deck card vulnerable to data leak to unauthorized users via reference preview cache
Deck is a kanban style organization tool aimed at personal planning and project organization for teams integrated with Nextcloud. When getting the reference preview for Deck cards the user has no access to, unauthorized user could eventually get the cached data of a user that has access. There are currently no known workarounds. It is recommended that the Nextcloud app Deck is upgraded to 1.8.2.
[ "cpe:2.3:a:nextcloud:deck:*:*:*:*:*:*:*:*" ]
null
5.8
null
null
GHSA-f6gf-jq3w-2r4c
Use after free in V8 in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
[]
null
8.8
null
null
CVE-2021-20652
Cross-site request forgery (CSRF) vulnerability in Name Directory 1.17.4 and earlier allows remote attackers to hijack the authentication of administrators via unspecified vectors.
[ "cpe:2.3:a:name_directory_project:name_directory:*:*:*:*:*:wordpress:*:*" ]
null
8.8
null
6.8
CVE-2014-0196
The n_tty_write function in drivers/tty/n_tty.c in the Linux kernel through 3.14.3 does not properly manage tty driver access in the "LECHO & !OPOST" case, which allows local users to cause a denial of service (memory corruption and system crash) or gain privileges by triggering a race condition involving read and write operations with long strings.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.31:-:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.31:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.31:rc4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.31:rc5:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.31:rc6:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.31:rc7:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.31:rc8:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.31:rc9:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_eus:6.4:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_eus:6.3:*:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux_enterprise_desktop:11:sp3:*:*:*:-:*:*", "cpe:2.3:o:suse:suse_linux_enterprise_high_availability_extension:11:sp3:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp3:*:*:*:-:*:*", "cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp3:*:*:*:vmware:*:*", "cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_protocol_security_module:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_wan_optimization_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-iq_application_delivery_controller:4.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-iq_centralized_management:4.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-iq_cloud:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-iq_cloud_and_orchestration:1.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-iq_device:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-iq_security:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:enterprise_manager:3.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:enterprise_manager:3.1.1:*:*:*:*:*:*:*" ]
null
5.5
null
6.9
GHSA-5hhg-q22c-6g39
Jenkins Port Allocator Plugin stores credentials in plain text
Jenkins Port Allocator Plugin stores credentials unencrypted in job `config.xml` files on the Jenkins controller. These credentials can be viewed by users with Extended Read permission, or access to the Jenkins controller file system.As of publication of this advisory, there is no fix.
[]
null
null
4.3
null
GHSA-w729-7633-2fw5
Deserialization of Untrusted Data leading to Remote Code Execution in Apache Storm
An Unsafe Deserialization vulnerability exists in the worker services of the Apache Storm supervisor server allowing pre-auth Remote Code Execution (RCE). Apache Storm 2.2.x users should upgrade to version 2.2.1 or 2.3.0. Apache Storm 2.1.x users should upgrade to version 2.1.1. Apache Storm 1.x users should upgrade to version 1.2.4
[]
null
9.8
null
null
CVE-2022-0255
Database Backup for WordPress < 2.5.1 - Admin+ SQL Injection
The Database Backup for WordPress plugin before 2.5.1 does not properly sanitise and escape the fragment parameter before using it in a SQL statement in the admin dashboard, leading to a SQL injection issue
[ "cpe:2.3:a:deliciousbrains:database_backup:*:*:*:*:*:wordpress:*:*" ]
null
7.2
null
6.5
CVE-2018-13605
The mintToken function of a smart contract implementation for Extreme Coin (XT) (Contract Name: ExtremeToken), an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value.
[ "cpe:2.3:a:extremetoken_project:extremetoken:-:*:*:*:*:*:*:*" ]
null
null
7.5
5
CVE-2021-47057
crypto: sun8i-ss - Fix memory leak of object d when dma_iv fails to map
In the Linux kernel, the following vulnerability has been resolved: crypto: sun8i-ss - Fix memory leak of object d when dma_iv fails to map In the case where the dma_iv mapping fails, the return error path leaks the memory allocated to object d. Fix this by adding a new error return label and jumping to this to ensure d is free'd before the return. Addresses-Coverity: ("Resource leak")
[]
null
5.5
null
null
CVE-2025-23439
WordPress TinyMCE Extended Config plugin <= 0.1.0 - Reflected Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in willshouse TinyMCE Extended Config allows Reflected XSS. This issue affects TinyMCE Extended Config: from n/a through 0.1.0.
[]
null
7.1
null
null
CVE-2018-3697
Improper directory permissions in the installer for the Intel Media Server Studio may allow unprivileged users to potentially enable an escalation of privilege via local access.
[ "cpe:2.3:a:intel:media_server_studio:2015:r6:*:*:*:*:*:*", "cpe:2.3:a:intel:media_server_studio:2016:*:*:*:*:*:*:*", "cpe:2.3:a:intel:media_server_studio:2016:*:*:*:professional:*:*:*", "cpe:2.3:a:intel:media_server_studio:2017:*:*:*:professional:*:*:*", "cpe:2.3:a:intel:media_server_studio:2017:r1:*:*:*:*:*:*", "cpe:2.3:a:intel:media_server_studio:2017:r2:*:*:*:*:*:*", "cpe:2.3:a:intel:media_server_studio:2017:r3:*:*:*:*:*:*" ]
null
null
7.8
4.6
CVE-2006-0664
Cross-site scripting (XSS) vulnerability in config_defaults_inc.php in Mantis before 1.0 allows remote attackers to inject arbitrary web script or HTML via unknown attack vectors. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. An original vendor bug report is referenced, but not accessible to the general public.
[ "cpe:2.3:a:mantis:mantis:0.17.1:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:0.17.2:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:0.17.3:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:0.17.4:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:0.17.4a:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:0.17.5:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:0.18:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:0.18.0_rc1:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:0.18.0a2:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:0.18.0a3:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:0.18.0a4:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:0.18.2:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:0.18.3:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:0.18a1:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:0.19.0:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:0.19.0_rc1:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:0.19.0a:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:0.19.0a1:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:0.19.0a2:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:0.19.1:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:0.19.2:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:0.19.3:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:0.19.4:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:1.0.0_rc1:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:1.0.0_rc2:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:1.0.0_rc3:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:1.0.0_rc4:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:1.0.0a1:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:1.0.0a2:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:1.0.0a3:*:*:*:*:*:*:*" ]
null
null
null
4.3
CVE-2016-3855
drivers/thermal/supply_lm_core.c in the Qualcomm components in Android before 2016-08-05 does not validate a certain count parameter, which allows attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via a crafted application, aka Qualcomm internal bug CR990824.
[ "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*" ]
null
null
7.8
6.8
GHSA-fprr-rrm8-4534
Apache Dubbo vulnerable to remote code execution via Telnet Handler
Apache Dubbo is a Java based, open source RPC framework. Versions prior to 2.6.10 and 2.7.10 are vulnerable to pre-authorization remote code execution via arbitrary bean manipulation in the Telnet handler. The Dubbo main service port can be used to access a Telnet Handler which offers some basic methods to collect information about the providers and methods exposed by the service and it can even allow to shutdown the service. This endpoint is unprotected.Additionally, a provider method can be invoked using the `invoke` handler. This handler uses a safe version of FastJson to process the call arguments. However, the resulting list is later processed with `PojoUtils.realize` which can be used to instantiate arbitrary classes and invoke its setters. Even though FastJson is properly protected with a default blocklist, `PojoUtils.realize` is not, and an attacker can leverage that to achieve remote code execution.Versions 2.6.10 and 2.7.10 contain fixes for this issue.
[]
null
9.8
null
null
CVE-2010-0582
Cisco IOS 12.1 through 12.4, and 15.0M before 15.0(1)M1, allows remote attackers to cause a denial of service (interface queue wedge) via malformed H.323 packets, aka Bug ID CSCta19962.
[ "cpe:2.3:o:cisco:ios:12.1xu:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1yd:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2b:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2bw:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2bx:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2by:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2cz:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2mc:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2t:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2tpc:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xa:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xb:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xc:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xd:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xg:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xh:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xi:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xj:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xk:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xl:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xm:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xq:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xt:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xu:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xv:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xw:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2ya:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2yb:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2yc:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2yd:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2yf:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2yh:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2yj:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2yl:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2ym:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2yn:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2yt:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2yu:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2yv:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2yw:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2yy:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2zc:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2zd:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2ze:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2zf:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2zh:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2zj:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2zl:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2zp:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3b:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3t:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3xa:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3xb:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3xc:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3xd:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3xe:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3xf:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3xg:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3xi:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3xj:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3xk:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3xl:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3xq:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3xr:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3xu:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3xw:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3xx:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3xy:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3xz:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3yf:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3yg:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3yk:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3ym:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3yq:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3ys:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3yt:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3yu:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3yx:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3yz:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3za:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4gc:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4mr:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4t:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xa:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xb:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xc:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xd:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xe:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xj:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xl:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xp:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xt:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xv:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xw:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xy:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xz:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4ya:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4yb:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.0m:*:*:*:*:*:*:*" ]
null
null
null
7.8
CVE-2024-50320
An infinite loop in Ivanti Avalanche before 6.4.6 allows a remote unauthenticated attacker to cause a denial of service.
[ "cpe:2.3:a:ivanti:avalanche:*:*:*:*:*:*:*:*", "cpe:2.3:a:ivanti:avalanche:*:*:*:*:premise:*:*:*" ]
null
7.5
null
null
CVE-2005-3892
Gadu-Gadu 7.20 allows remote attackers to eavesdrop on a user via a web page that accesses the EasycallLite.oce ActiveX control, which can initiate an outgoing phone call and listen to the microphone.
[ "cpe:2.3:a:gadu-gadu:gadu-gadu_instant_messenger:7.20:*:*:*:*:*:*:*" ]
null
null
null
5
CVE-2023-1294
SourceCodester File Tracker Manager System POST Parameter login.php sql injection
A vulnerability was found in SourceCodester File Tracker Manager System 1.0. It has been classified as critical. Affected is an unknown function of the file /file_manager/login.php of the component POST Parameter Handler. The manipulation of the argument username leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-222648.
[ "cpe:2.3:a:file_tracker_manager_system_project:file_tracker_management_system:1.0:*:*:*:*:*:*:*" ]
null
7.3
7.3
7.5
CVE-2018-9381
In gatts_process_read_by_type_req of gatt_sr.c, there is a possible information disclosure due to uninitialized data. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
[ "cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*" ]
null
7.5
null
null
GHSA-xp5x-wr7x-fp9j
In the Linux kernel, the following vulnerability has been resolved:netrom: Fix a memory leak in nr_heartbeat_expiry()syzbot reported a memory leak in nr_create() [0].Commit 409db27e3a2e ("netrom: Fix use-after-free of a listening socket.") added sock_hold() to the nr_heartbeat_expiry() function, where a) a socket has a SOCK_DESTROY flag or b) a listening socket has a SOCK_DEAD flag.But in the case "a," when the SOCK_DESTROY flag is set, the file descriptor has already been closed and the nr_release() function has been called. So it makes no sense to hold the reference count because no one will call another nr_destroy_socket() and put it as in the case "b."nr_connect nr_establish_data_link nr_start_heartbeatnr_release switch (nr->state) case NR_STATE_3 nr->state = NR_STATE_2 sock_set_flag(sk, SOCK_DESTROY);To fix the memory leak, let's call sock_hold() only for a listening socket.Found by InfoTeCS on behalf of Linux Verification Center (linuxtesting.org) with Syzkaller.
[]
null
5.5
null
null
CVE-2019-17096
Bitdefender BOX 2 bootstrap get_image_size command injection vulnerability
A OS Command Injection vulnerability in the bootstrap stage of Bitdefender BOX 2 allows the manipulation of the `get_image_url()` function in special circumstances to inject a system command.
[ "cpe:2.3:o:bitdefender:box_2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:bitdefender:box_2:-:*:*:*:*:*:*:*", "cpe:2.3:a:bitdefender:central:*:*:*:*:*:iphone_os:*:*", "cpe:2.3:a:bitdefender:central:*:*:*:*:*:android:*:*" ]
null
9
null
null
GHSA-7v78-784x-w6p3
A vulnerability has been found in SourceCodester Simple Inventory System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file login.php. The manipulation of the argument username leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier VDB-265081 was assigned to this vulnerability.
[]
5.1
5.5
null
null
GHSA-x5cm-f3x4-pcm2
Unspecified vulnerability in the Java VM component in Oracle Database Server 11.1.0.7, 11.2.0.3, 11.2.0.4, 12.1.0.1, and 12.1.0.2 allows remote authenticated users to affect confidentiality via unknown vectors, a different vulnerability than CVE-2014-4294, CVE-2014-4295, and CVE-2014-6563.
[]
null
null
null
null
GHSA-f6vc-5hqq-c3x2
Cross-Site Request Forgery (CSRF) vulnerability in Ref CheckBot allows Stored XSS.This issue affects CheckBot: from n/a through 1.05.
[]
null
7.1
null
null
CVE-2019-6013
DBA-1510P firmware 1.70b009 and earlier allows authenticated attackers to execute arbitrary OS commands via Command Line Interface (CLI).
[ "cpe:2.3:o:dlink:dba-1510p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:dba-1510p:-:*:*:*:*:*:*:*" ]
null
6.6
null
6.8
CVE-2018-1956
IBM Security Identity Manager 6.0.0 does not require that users should have strong passwords by default, which makes it easier for attackers to compromise user accounts. IBM X-Force ID: 153628.
[ "cpe:2.3:a:ibm:security_identity_manager:*:*:*:*:*:*:*:*" ]
null
null
5.9
null
CVE-2013-3597
servlet/CollectionListServlet in SearchBlox before 7.5 build 1 allows remote attackers to read usernames and passwords via a getList action.
[ "cpe:2.3:a:searchblox:searchblox:*:*:*:*:*:*:*:*", "cpe:2.3:a:searchblox:searchblox:6.2:build_1:*:*:*:*:*:*", "cpe:2.3:a:searchblox:searchblox:6.3:build_1:*:*:*:*:*:*", "cpe:2.3:a:searchblox:searchblox:6.4:build_1:*:*:*:*:*:*", "cpe:2.3:a:searchblox:searchblox:6.4:build_2:*:*:*:*:*:*", "cpe:2.3:a:searchblox:searchblox:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:searchblox:searchblox:7.1:*:*:*:*:*:*:*", "cpe:2.3:a:searchblox:searchblox:7.2:*:*:*:*:*:*:*", "cpe:2.3:a:searchblox:searchblox:7.3:*:*:*:*:*:*:*", "cpe:2.3:a:searchblox:searchblox:7.4:*:*:*:*:*:*:*" ]
null
null
null
5
CVE-2022-1816
Zoo Management System Content Module cross site scripting
A vulnerability, which was classified as problematic, has been found in Zoo Management System 1.0. Affected by this issue is /zoo/admin/public_html/view_accounts?type=zookeeper of the content module. The manipulation of the argument admin_name with the input <script>alert(1)</script> leads to an authenticated cross site scripting. Exploit details have been disclosed to the public.
[ "cpe:2.3:a:phpgurukul:zoo_management_system:1.0:*:*:*:*:*:*:*" ]
null
3.5
null
null
CVE-2009-0075
Microsoft Internet Explorer 7 does not properly handle errors during attempted access to deleted objects, which allows remote attackers to execute arbitrary code via a crafted HTML document, related to CFunctionPointer and the appending of document objects, aka "Uninitialized Memory Corruption Vulnerability."
[ "cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2003:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2003:-:sp1:itanium:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:*:itanium:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_xp:-:*:professional:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:-:sp2:professional:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*" ]
null
null
null
9.3
GHSA-x49q-wq3g-gh64
The ModSecurity module before 2.7.4 for the Apache HTTP Server allows remote attackers to cause a denial of service (NULL pointer dereference, process crash, and disk consumption) via a POST request with a large body and a crafted Content-Type header.
[]
null
null
null
null
GHSA-jww8-q46r-8w4c
A DLL hijacking vulnerability exists in Trend Micro Password Manager 5.0 in which, if exploited, would allow an attacker to load an arbitrary unsigned DLL into the signed service's process. This process is very similar, yet not identical to CVE-2019-14684.
[]
null
null
null
null
GHSA-gp37-hv4j-g2qj
Rejected reason: Not used
[]
null
null
null
null
GHSA-wp68-99q2-jm6p
The unpack implementation in Swoole version 4.0.4 lacks correct size checks in the deserialization process. An attacker can craft a serialized object to exploit this vulnerability and cause a SEGV.
[]
null
null
7.5
null
GHSA-ffx6-gv7p-ch36
SQL injection vulnerability in index.php in Shop-Script Pro 2.12, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary SQL commands via the current_currency parameter.
[]
null
null
null
null
CVE-2007-2050
Multiple directory traversal vulnerabilities in header.php in RicarGBooK 1.2.1 allow remote attackers to include and execute arbitrary local files via a .. (dot dot) in (1) a lang cookie or (2) the language parameter.
[ "cpe:2.3:a:ricargbook:ricargbook:1.2.1:*:*:*:*:*:*:*" ]
null
null
null
5
CVE-2016-1212
Directory traversal vulnerability in futomi MP Form Mail CGI Professional Edition 3.2.3 and earlier allows remote authenticated administrators to read arbitrary files via unspecified vectors.
[ "cpe:2.3:a:futomi:mp_form_mail_cgi:*:*:*:*:professional:*:*:*" ]
null
null
2.7
4
GHSA-q4q4-fwj6-52r8
In Bluetooth, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.
[]
null
6.7
null
null
CVE-2010-4007
Oracle Mojarra uses an encrypted View State without a Message Authentication Code (MAC), which makes it easier for remote attackers to perform successful modifications of the View State via a padding oracle attack, a related issue to CVE-2010-2057.
[ "cpe:2.3:a:oracle:mojarra:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mojarra:1.1_02:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mojarra:1.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mojarra:1.2_01:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mojarra:1.2_02:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mojarra:1.2_03:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mojarra:1.2_04:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mojarra:1.2_05:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mojarra:1.2_06:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mojarra:1.2_07:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mojarra:1.2_08:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mojarra:1.2_09:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mojarra:1.2_10:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mojarra:1.2_11:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mojarra:1.2_12:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mojarra:1.2_13:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mojarra:1.2_14:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mojarra:1.2_15:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mojarra:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mojarra:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mojarra:2.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mojarra:2.0.3:*:*:*:*:*:*:*" ]
null
null
null
5
GHSA-xjch-3r5f-vch2
In all Qualcomm products with Android release from CAF using the Linux kernel, while processing fastboot boot command when verified boot feature is disabled, with length greater than boot image buffer, a buffer overflow can occur.
[]
null
null
7.8
null
GHSA-84ph-h2vc-8hrg
The Patreon WordPress plugin before 1.8.2 does not sanitise and escape the field "Custom Patreon Page name", which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed
[]
null
5.5
null
null
GHSA-w77m-g74v-gvgg
SQL injection vulnerability in TeamCal Neo, version 3.8.2. This could allow an attacker to retrieve, update and delete all database information by injecting a malicious SQL statement via the ‘abs’ parameter in ‘/teamcal/src/index.php’.
[]
null
9.8
null
null
CVE-2020-4150
IBM SiteProtector Appliance 3.1.1 contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data. IBM X-Force ID: 174142.
[ "cpe:2.3:a:ibm:security_siteprotector_system:3.1.1:*:*:*:*:*:*:*" ]
null
null
6.8
null
CVE-2025-29720
Dify v1.0 was discovered to contain a Server-Side Request Forgery (SSRF) via the component controllers.console.remote_files.RemoteFileUploadApi.
[]
null
4.8
null
null
CVE-2020-21487
Cross Site Scripting vulnerability found in Netgate pfSense 2.4.4 and ACME package v.0.6.3 allows attackers to execute arbitrary code via the RootFolder field of acme_certificates.php.
[ "cpe:2.3:a:netgate:pfsense:2.4.4:-:*:*:*:*:*:*", "cpe:2.3:a:netgate:pfsense_acme_package:0.6.3:*:*:*:*:*:*:*" ]
null
9.6
null
null
CVE-2014-9454
Multiple cross-site request forgery (CSRF) vulnerabilities in the Simple Sticky Footer plugin before 1.3.3 for WordPress allow remote attackers to hijack the authentication of administrators for requests that (1) change plugin settings via unspecified vectors or conduct cross-site scripting (XSS) attacks via the (2) simple_sf_width or (3) simple_sf_style parameter in the simple-simple-sticky-footer page to wp-admin/themes.php.
[ "cpe:2.3:a:simple_sticky_footer_project:simple_sticky_footer:*:*:*:*:*:wordpress:*:*" ]
null
null
null
6.8
GHSA-pc4g-pjrm-j2w6
The Afro-Beat (aka com.zero.themelock.tambourine) application 0.2 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[]
null
null
null
null
GHSA-47rg-xchh-xj5g
The bdrv_open function in Qemu 1.0 does not properly handle the failure of the mkstemp function, when in snapshot node, which allows local users to overwrite or read arbitrary files via a symlink attack on an unspecified temporary file.
[]
null
null
null
null
CVE-2022-32366
Product Show Room Site v1.0 is vulnerable to SQL Injection via /psrs/admin/fields/view_field.php?id=.
[ "cpe:2.3:a:product_show_room_site_project:product_show_room_site:1.0:*:*:*:*:*:*:*" ]
null
7.2
null
6.5
GHSA-3x3c-pjw5-pjr2
In Delta Electronics InfraSuite Device Master v.1.0.7, a vulnerability exists that allows an attacker to write to any file to any location of the filesystem, which could lead to remote code execution.
[]
null
8.8
null
null
GHSA-9xm2-hxxj-hgq7
A reflected cross-site scripting (XSS) vulnerability in the component /legacyui/quickReportServlet of Openmrs 2.4.3 Build 0ff0ed allows attackers to execute arbitrary JavaScript in the context of a user's browser via a crafted payload injected into the reportType parameter.
[]
null
5.4
null
null
CVE-2006-1657
Cross-site scripting (XSS) vulnerability in index.php in Chucky A. Ivey N.T. 1.1.0 allows remote attackers to inject arbitrary web script or HTML via the username parameter, which is not filtered when the administrator views the "Login Log" page.
[ "cpe:2.3:a:chucky_a._ivey:n.t.:1.1.0:*:*:*:*:*:*:*" ]
null
null
null
4.3