id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
197k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
CVE-2025-3594
Path traversal vulnerability with the downloading and installation of Xuggler in Liferay Portal 7.0.0 through 7.4.3.4, and Liferay DXP 7.4 GA, 7.3 GA through update 34, and older unsupported versions allows remote attackers to (1) add files to arbitrary locations on the server and (2) download and execute arbitrary files from the download server via the `_com_liferay_server_admin_web_portlet_ServerAdminPortlet_jarName` parameter.
[]
8.6
null
null
null
GHSA-q3jh-482f-mc4x
The (1) server and (2) agent components in CA ARCserve Backup r12.5, r15, and r16 on Windows do not properly validate RPC requests, which allows remote attackers to cause a denial of service (service crash) via a crafted request.
[]
null
null
null
null
CVE-2019-9799
Insufficient bounds checking of data during inter-process communication might allow a compromised content process to be able to read memory from the parent process under certain conditions. This vulnerability affects Firefox < 66.
[ "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" ]
null
null
7.5
5
RHSA-2020:5056
Red Hat Security Advisory: podman security and bug fix update
golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash podman: environment variables leak between containers when started via Varlink or Docker-compatible REST API
[ "cpe:/a:redhat:rhel_extras_other:7" ]
null
5.3
null
null
GHSA-2p25-55c9-h58q
Overflow/crash in `tf.tile` when tiling tensor is large
ImpactIf `tf.tile` is called with a large input argument then the TensorFlow process will crash due to a `CHECK`-failure caused by an overflow.The number of elements in the output tensor is too much for the `int64_t` type and the overflow is detected via a `CHECK` statement. This aborts the process.PatchesWe have patched the issue in GitHub commit [9294094df6fea79271778eb7e7ae1bad8b5ef98f](https://github.com/tensorflow/tensorflow/commit/9294094df6fea79271778eb7e7ae1bad8b5ef98f) (merging [#51138](https://github.com/tensorflow/tensorflow/pull/51138)).The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.For more informationPlease consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.AttributionThis vulnerability has been reported externally via a [GitHub issue](https://github.com/tensorflow/tensorflow/issues/46911).
[]
6.8
5.5
null
null
CVE-2006-4898
PHP remote file inclusion vulnerability in include/phpxd/phpXD.php in guanxiCRM 0.9.1 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the appconf[rootpath] parameter.
[ "cpe:2.3:a:guanxicrm:guanxicrm_business_solution:0.9.1:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-2mf5-r62x-gr5c
Insertion of Sensitive Information into Log File in Checkmk GmbH's Checkmk versions <2.3.0p29, <2.2.0p41 and <=2.1.0p49 (EOL) causes remote site authentication secrets to be written to log files accessible to administrators.
[]
7.1
null
null
null
GHSA-h79h-p55m-548h
Microsoft Internet Explorer 9 through 11 allow remote attackers to obtain sensitive information from process memory via a crafted web site, aka "Internet Explorer Information Disclosure Vulnerability." This vulnerability is different from those described in CVE-2017-0009 and CVE-2017-0059.
[]
null
null
4.3
null
CVE-2025-27200
Animate | Use After Free (CWE-416)
Animate versions 24.0.7, 23.0.10 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[]
null
7.8
null
null
CVE-2014-5325
The (1) DOMConverter, (2) JDOMConverter, (3) DOM4JConverter, and (4) XOMConverter functions in Direct Web Remoting (DWR) through 2.0.10 and 3.x through 3.0.RC2 allow remote attackers to read arbitrary files via DOM data containing an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.
[ "cpe:2.3:a:directwebremoting:direct_web_remoting:*:*:*:*:*:*:*:*", "cpe:2.3:a:directwebremoting:direct_web_remoting:3.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:directwebremoting:direct_web_remoting:3.0:rc2:*:*:*:*:*:*" ]
null
null
null
5
GHSA-fm9w-35mc-phwx
A Incorrect Default Permissions vulnerability in the packaging of inn in openSUSE Leap 15.2, openSUSE Tumbleweed, openSUSE Leap 15.1 allows local attackers with control of the new user to escalate their privileges to root. This issue affects: openSUSE Leap 15.2 inn version 2.6.2-lp152.1.26 and prior versions. openSUSE Tumbleweed inn version 2.6.2-4.2 and prior versions. openSUSE Leap 15.1 inn version 2.5.4-lp151.3.3.1 and prior versions.
[]
null
7.8
null
null
CVE-2015-0680
Cisco Unified Call Manager (CM) 9.1(2.1000.28) does not properly restrict resource requests, which allows remote authenticated users to read arbitrary files via unspecified vectors, aka Bug ID CSCuq44439.
[ "cpe:2.3:a:cisco:unified_callmanager:9.1\\(2.1000.28\\):*:*:*:*:*:*:*" ]
null
null
null
4
GHSA-qqhf-v97g-rhw4
Code42 server through 7.0.2 for Windows has an Untrusted Search Path. In certain situations, a non-administrative attacker on the local server could create or modify a dynamic-link library (DLL). The Code42 service could then load it at runtime, and potentially execute arbitrary code at an elevated privilege on the local server.
[]
null
7.3
null
null
CVE-2014-4643
Multiple heap-based buffer overflows in the client in Core FTP LE 2.2 build 1798 allow remote FTP servers to cause a denial of service (application crash) and possibly execute arbitrary code via a long string in a reply to a (1) USER, (2) PASS, (3) PASV, (4) SYST, (5) PWD, or (6) CDUP command.
[ "cpe:2.3:a:coreftp:core_ftp:2.2:*:*:*:*:*:*:*" ]
null
null
null
5
GHSA-cq2v-6q97-jv69
In the Linux kernel, the following vulnerability has been resolved:ksmbd: validate payload size in ipc responseIf installing malicious ksmbd-tools, ksmbd.mountd can return invalid ipc response to ksmbd kernel server. ksmbd should validate payload size of ipc response from ksmbd.mountd to avoid memory overrun or slab-out-of-bounds. This patch validate 3 ipc response that has payload.
[]
null
5.5
null
null
GHSA-9fp3-x7mf-h9vj
An OS Command Injection vulnerability exists in SIMULIA 3DOrchestrate from Release 3DEXPERIENCE R2021x through Release 3DEXPERIENCE R2023x. A specially crafted HTTP request can lead to arbitrary command execution.
[]
null
8.8
null
null
GHSA-xwm8-ff5h-57g6
Stack-based buffer overflow in the Core Foundation Library in Mac OS X 10.3.5 and 10.3.6, and possibly earlier versions, allows local users to execute arbitrary code via a long CF_CHARSET_PATH environment variable.
[]
null
null
null
null
CVE-2003-0752
SQL injection vulnerability in global.php3 of AttilaPHP 3.0, and possibly earlier versions, allows remote attackers to bypass authentication via a modified cook_id parameter.
[ "cpe:2.3:a:attila-php.net:attilaphp:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-6wmr-jwhh-q9m7
Use-after-free vulnerability in Adobe Reader and Acrobat 10.x before 10.1.16 and 11.x before 11.0.13, Acrobat and Acrobat Reader DC Classic before 2015.006.30094, and Acrobat and Acrobat Reader DC Continuous before 2015.009.20069 on Windows and OS X allows attackers to execute arbitrary code by leveraging improper EScript exception handling, a different vulnerability than CVE-2015-5586, CVE-2015-6683, CVE-2015-6684, CVE-2015-6687, CVE-2015-6688, CVE-2015-6689, CVE-2015-6690, CVE-2015-6691, CVE-2015-7615, and CVE-2015-7621.
[]
null
null
null
null
GHSA-7w3j-wxh4-94xw
An issue was discovered in icoutils 0.31.1. A buffer overflow was observed in the "extract_icons" function in the "extract.c" source file. This issue can be triggered by processing a corrupted ico file and will result in an icotool crash.
[]
null
null
5.5
null
RHSA-2016:0011
Red Hat Security Advisory: samba security update
samba: Insufficient symlink verification in smbd samba: client requesting encryption vulnerable to downgrade attack Samba: Missing access control check in shadow copy code
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
GHSA-2hvx-9r8j-qvph
The WordPress Contact Forms by Cimatti plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.5.7. This is due to missing or incorrect nonce validation on the function _accua_forms_form_edit_action. This makes it possible for unauthenticated attackers to delete forms created with this plugin via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
[]
null
4.3
null
null
GHSA-m7fj-x53w-pr9v
EMC RSA Authentication Manager 8.0 before P1 allows local users to discover cleartext operating-system passwords, HTTP plug-in proxy passwords, and SNMP communities by reading a (1) log file or (2) configuration file.
[]
null
null
null
null
GHSA-w3pg-gj6v-vr2v
Cross-Site Request Forgery (CSRF) vulnerability in shohei.tanaka Japanized For WooCommerce allows Cross Site Request Forgery. This issue affects Japanized For WooCommerce: from n/a through 2.6.40.
[]
null
5.4
null
null
GHSA-w8x6-wwmf-7h55
Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier, and 5.6.20 and earlier, allows remote attackers to affect confidentiality via vectors related to C API SSL CERTIFICATE HANDLING.
[]
null
null
null
null
GHSA-hp45-h3cg-fcrw
A vulnerability was found in code-projects Admission Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file index.php of the component Login. The manipulation of the argument u_id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
[]
6.9
7.3
null
null
GHSA-q22w-8p46-57wg
PHP remote file inclusion vulnerability in index.php in A4Desk Event Calendar, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary PHP code via a URL in the v parameter.
[]
null
null
null
null
GHSA-r6gw-8vw8-65gm
DESCOR INFOCAD 3.5.1 and before and fixed in v.3.5.2.0 has a broken authorization schema.
[]
null
4.3
null
null
GHSA-vx4j-2p26-q8m4
In the Linux kernel, the following vulnerability has been resolved:powerpc: Avoid nmi_enter/nmi_exit in real mode interrupt.nmi_enter()/nmi_exit() touches per cpu variables which can lead to kernel crash when invoked during real mode interrupt handling (e.g. early HMI/MCE interrupt handler) if percpu allocation comes from vmalloc area.Early HMI/MCE handlers are called through DEFINE_INTERRUPT_HANDLER_NMI() wrapper which invokes nmi_enter/nmi_exit calls. We don't see any issue when percpu allocation is from the embedded first chunk. However with CONFIG_NEED_PER_CPU_PAGE_FIRST_CHUNK enabled there are chances where percpu allocation can come from the vmalloc area.With kernel command line "percpu_alloc=page" we can force percpu allocation to come from vmalloc area and can see kernel crash in machine_check_early:[ 1.215714] NIP [c000000000e49eb4] rcu_nmi_enter+0x24/0x110 [ 1.215717] LR [c0000000000461a0] machine_check_early+0xf0/0x2c0 [ 1.215719] --- interrupt: 200 [ 1.215720] [c000000fffd73180] [0000000000000000] 0x0 (unreliable) [ 1.215722] [c000000fffd731b0] [0000000000000000] 0x0 [ 1.215724] [c000000fffd73210] [c000000000008364] machine_check_early_common+0x134/0x1f8Fix this by avoiding use of nmi_enter()/nmi_exit() in real mode if percpu first chunk is not embedded.
[]
null
null
null
null
CVE-2022-2063
Improper Privilege Management in nocodb/nocodb
Improper Privilege Management in GitHub repository nocodb/nocodb prior to 0.91.7+.
[ "cpe:2.3:a:xgenecloud:nocodb:*:*:*:*:*:*:*:*" ]
null
null
9
null
CVE-2025-1548
iteachyou Dreamer CMS edit cross site scripting
A vulnerability was found in iteachyou Dreamer CMS 4.1.3. It has been declared as problematic. This vulnerability affects unknown code of the file /admin/archives/edit. The manipulation of the argument editorValue/answer/content leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
[]
5.1
3.5
3.5
4
CVE-2023-41734
WordPress Insert Estimated Reading Time Plugin <= 1.2 is vulnerable to Cross Site Scripting (XSS)
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in nigauri Insert Estimated Reading Time plugin <= 1.2 versions.
[ "cpe:2.3:a:nigauri:insert_estimated_reading_time:*:*:*:*:*:wordpress:*:*" ]
null
5.9
null
null
CVE-2018-5689
Cross-site scripting (XSS) vulnerability in admin/auth.php in Dotclear 2.12.1 allows remote authenticated users to inject arbitrary web script or HTML via the malicious user's email.
[ "cpe:2.3:a:dotclear:dotclear:2.12.1:*:*:*:*:*:*:*" ]
null
null
5.4
3.5
GHSA-rf6j-jvpp-wpg9
The component listed above contains a vulnerability that allows an attacker to traverse directories and access sensitive files, leading to unauthorized disclosure of system configuration and potentially sensitive information.
[]
null
5.3
null
null
CVE-2022-38179
JetBrains Ktor before 2.1.0 was vulnerable to the Reflect File Download attack
[ "cpe:2.3:a:jetbrains:ktor:*:*:*:*:*:*:*:*" ]
null
4.7
null
null
CVE-2021-40354
A vulnerability has been identified in Teamcenter V12.4 (All versions < V12.4.0.8), Teamcenter V13.0 (All versions < V13.0.0.7), Teamcenter V13.1 (All versions < V13.1.0.5), Teamcenter V13.2 (All versions < 13.2.0.2). The "surrogate" functionality on the user profile of the application does not perform sufficient access control that could lead to an account takeover. Any profile on the application can perform this attack and access any other user assigned tasks via the "inbox/surrogate tasks".
[ "cpe:2.3:a:siemens:teamcenter_visualization:*:*:*:*:*:*:*:*" ]
null
7.1
null
5.5
GHSA-rjch-74fq-3rc8
Heap-based buffer overflow in the nsTransformedTextRun function in Mozilla Firefox before 33.0, Firefox ESR 31.x before 31.2, and Thunderbird 31.x before 31.2 allows remote attackers to execute arbitrary code via Cascading Style Sheets (CSS) token sequences that trigger changes to capitalization style.
[]
null
null
null
null
CVE-2014-7913
The print_option function in dhcp-common.c in dhcpcd through 6.9.1, as used in dhcp.c in dhcpcd 5.x in Android before 5.1 and other products, misinterprets the return value of the snprintf function, which allows remote DHCP servers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted message.
[ "cpe:2.3:a:dhcpcd_project:dhcpcd:*:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*" ]
null
null
null
6.8
GHSA-8pwp-phcg-h36g
DB-GPT Path Traversal vulnerability
A Path Traversal vulnerability exists in the eosphoros-ai/db-gpt version 0.6.0 at the API endpoint `/v1/resource/file/delete`. This vulnerability allows an attacker to delete any file on the server by manipulating the `file_key` parameter. The `file_key` parameter is not properly sanitized, enabling an attacker to specify arbitrary file paths. If the specified file exists, the application will delete it.
[]
null
null
8.2
null
CVE-2022-34870
Apache Geode stored Cross-Site Scripting (XSS) via data injection vulnerability in Pulse web application
Apache Geode versions up to 1.15.0 are vulnerable to a Cross-Site Scripting (XSS) via data injection when using Pulse web application to view Region entries.
[ "cpe:2.3:a:apache:geode:*:*:*:*:*:*:*:*" ]
null
5.4
null
null
GHSA-cqgc-44vw-w3h7
The polling timer handler in ACRN before 2.5 has a use-after-free for a freed virtio device, related to devicemodel/hw/pci/virtio/*.c.
[]
null
null
null
null
GHSA-34v7-fvgc-mxc2
Lack or insufficent input validation in WebGUI CLI web in Infinera G42 version R6.1.3 allows remote authenticated users to read all OS files via crafted CLI commands.Details: The web interface based management of the Infinera G42 appliance enables the feature of executing a restricted set of commands. This feature also offers the option to execute a script-file already present on the target device. When a non-script or incorrect file is specified, the content of the file is shown along with an error message. Due to an execution of the http service with a privileged user all files on the file system can be viewed this way.
[]
null
6.5
null
null
GHSA-cfxm-4p54-5w7h
Directory traversal in pooledwebsocket
Affected versions of `pooledwebsocket` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.**Example request:**RecommendationUpdate to version 0.0.19 or later.
[]
null
null
7.5
null
CVE-2019-2319
HLOS could corrupt CPZ page table memory for S1 managed VMs in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wired Infrastructure and Networking in MDM9205, QCS404, QCS605, SDA845, SDM670, SDM710, SDM845, SDM850, SM6150, SM7150, SM8150, SXR1130, SXR2130
[ "cpe:2.3:o:qualcomm:mdm9205_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9205:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcs404_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcs404:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcs605_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcs605:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sda845_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sda845:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdm670_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm670:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdm710_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm710:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdm845_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm845:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdm850_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm850:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm6150_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm6150:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm7150_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm7150:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm8150_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm8150:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sxr1130_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sxr1130:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sxr2130_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sxr2130:-:*:*:*:*:*:*:*" ]
null
7.8
null
4.6
CVE-2025-26670
Lightweight Directory Access Protocol (LDAP) Client Remote Code Execution Vulnerability
Use after free in Windows LDAP - Lightweight Directory Access Protocol allows an unauthorized attacker to execute code over a network.
[]
null
8.1
null
null
GHSA-fc98-j6vr-xfjf
In setTransactionState of SurfaceFlinger, there is possible arbitrary code execution in a privileged process due to improper casting. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12Android ID: A-193033243
[]
null
7.8
null
null
GHSA-v8pj-w2gf-97p5
Vulnerability in the Oracle Common Applications product of Oracle E-Business Suite (component: CRM User Management Framework). Supported versions that are affected are 12.1.3 and 12.2.3-12.2.9. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Common Applications. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Common Applications, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Common Applications accessible data. CVSS 3.1 Base Score 4.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N).
[]
null
null
null
null
CVE-2024-34379
WordPress Restaurant and Cafe theme <= 1.2.1 - Cross Site Request Forgery (CSRF) vulnerability
Cross-Site Request Forgery (CSRF) vulnerability in Rara Theme Restaurant and Cafe.This issue affects Restaurant and Cafe: from n/a through 1.2.1.
[]
null
4.3
null
null
CVE-2025-29690
A cross-site scripting (XSS) vulnerability in OA System before v2025.01.01 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the outtype parameter at /address/AddrController.java.
[]
null
6.1
null
null
GHSA-cfx4-q2wp-rc2c
In wlan firmware, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08477406; Issue ID: MSV-1010.
[]
null
8.4
null
null
CVE-2022-45180
An issue was discovered in LIVEBOX Collaboration vDesk through v018. Broken Access Control exists under the /api/v1/vdesk_{DOMAIN]/export endpoint. A malicious user, authenticated to the product without any specific privilege, can use the API for exporting information about all users of the system (an operation intended to only be available to the system administrator).
[ "cpe:2.3:a:liveboxcloud:vdesk:*:*:*:*:*:*:*:*" ]
null
6.5
null
null
GHSA-46qw-vj9r-rqgq
When a user opens manipulated Jupiter Tessellation (.JT) format files received from untrusted sources in SAP 3D Visual Enterprise Viewer version 9, the application crashes and becomes temporarily unavailable to the user until restart of the application.
[]
null
null
null
null
RHSA-2019:1860
Red Hat Security Advisory: rh-redis32-redis security update
redis: Heap corruption in lua_cmsgpack.c redis: Integer overflow in lua_struct.c:b_unpack() redis: Code execution in redis-cli via crafted command line arguments redis: Heap buffer overflow in HyperLogLog triggered by malicious client
[ "cpe:/a:redhat:rhel_software_collections:3::el6", "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
null
7.2
null
GHSA-78pr-m5p7-52qj
Data Validation / Data Sanitization vulnerabilities in Linux allows unvalidated and unsanitized data to be injected in an Aspect device.  Affected products:ABB ASPECT - Enterprise v3.08.02; NEXUS Series v3.08.02; MATRIX Series v3.08.02
[]
9.3
10
null
null
GHSA-9hf2-v2rp-2vp6
The WordPress Contact Forms by Cimatti plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.9.2. This is due to missing or incorrect nonce validation on the process_bulk_action function. This makes it possible for unauthenticated attackers to delete forms via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
[]
null
4.3
null
null
GHSA-9mpj-44vg-wf94
An email address enumeration vulnerability exists in the password reset function of Rocket.Chat through 3.7.1.
[]
null
null
null
null
GHSA-22hp-fm45-6q7j
On Patlite NH-FB series devices through 1.46, remote attackers can cause a denial of service by omitting the query string.
[]
null
7.5
null
null
GHSA-4j8q-xx5v-j248
Due to a logic error in the code, upload-image-with-ajax v1.0 allows arbitrary files to be uploaded to the web root allowing code execution.
[]
null
null
null
null
CVE-2015-8664
Integer overflow in the WebCursor::Deserialize function in content/common/cursors/webcursor.cc in Google Chrome before 47.0.2526.106 allows remote attackers to cause a denial of service or possibly have unspecified other impact via an RGBA pixel array with crafted dimensions, a different vulnerability than CVE-2015-6792.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" ]
null
null
8.8
7.5
CVE-2019-4296
IBM Robotic Process Automation with Automation Anywhere 11 information disclosure could allow a local user to obtain e-mail contents from the client debug log file. IBM X-Force ID: 160759.
[ "cpe:2.3:a:ibm:robotic_process_automation_with_automation_anywhere:*:*:*:*:*:*:*:*" ]
null
null
4
null
GHSA-pgc3-2268-v6r2
BookStack version 0.18.4 is vulnerable to stored cross-site scripting, within the page creation page, which can result in disruption of service and execution of javascript code.
[]
null
null
5.4
null
RHSA-2024:8129
Red Hat Security Advisory: OpenJDK 21.0.5 Security Update for Windows Builds
giflib: Heap-Buffer Overflow during Image Saving in DumpScreen2RGB Function JDK: HTTP client improper handling of maxHeaderSize (8328286) JDK: Array indexing integer overflow (8328544) JDK: Unbounded allocation leads to out-of-memory error (8331446) JDK: Integer conversion error leads to incorrect range check (8332644)
[ "cpe:/a:redhat:openjdk:21::windows" ]
null
4.8
null
null
GHSA-9wpf-wh66-2mmp
In ImageMagick 7.0.7-29 and earlier, a missing NULL check in ReadOneJNGImage in coders/png.c allows an attacker to cause a denial of service (WriteBlob assertion failure and application exit) via a crafted file.
[]
null
6.5
null
null
CVE-2005-2854
CRLF injection vulnerability in thesitewizard.com chfeedback.pl Feedback Form Perl Script 2.0.1 allows remote attackers to use the script as a mail relay (spam proxy) via CRLF sequences in the (1) name or (2) email fields, which are injected into mail headers.
[ "cpe:2.3:a:thesitewizard.com:chfeedback.pl_feedback_form_perl_script:2.0.1:*:*:*:*:*:*:*" ]
null
null
null
5
CVE-2018-0139
A vulnerability in the Interactive Voice Response (IVR) management connection interface for Cisco Unified Customer Voice Portal (CVP) could allow an unauthenticated, remote attacker to cause the IVR connection to disconnect, creating a system-wide denial of service (DoS) condition. The vulnerability is due to improper handling of a TCP connection request when the IVR connection is already established. An attacker could exploit this vulnerability by initiating a crafted connection to the IP address of the targeted CVP device. An exploit could allow the attacker to disconnect the IVR to CVP connection, creating a DoS condition that prevents the CVP from accepting new, incoming calls while the IVR automatically attempts to re-establish the connection to the CVP. This vulnerability affects Cisco Unified Customer Voice Portal (CVP) Software Release 11.5(1). Cisco Bug IDs: CSCve70560.
[ "cpe:2.3:a:cisco:unified_customer_voice_portal:11.5\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_customer_voice_portal:11.6:*:*:*:*:*:*:*" ]
null
8.6
null
5
GHSA-jrj8-w63v-jf8f
IBM PowerVM Hypervisor FW860, FW940, and FW950 could allow an attacker that gains service access to the FSP can read and write arbitrary host system memory through a series of carefully crafted service procedures. IBM X-Force ID: 210018.
[]
null
null
null
null
CVE-2017-16369
An issue was discovered in Adobe Acrobat and Reader: 2017.012.20098 and earlier versions, 2017.011.30066 and earlier versions, 2015.006.30355 and earlier versions, and 11.0.22 and earlier versions. This vulnerability is an instance of a Same Origin Policy security bypass vulnerability, affecting files on the local system, etc.
[ "cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*" ]
null
null
6.5
4.3
CVE-2021-2380
Vulnerability in the Oracle Applications Framework product of Oracle E-Business Suite (component: Attachments / File Upload). Supported versions that are affected are 12.1.3 and 12.2.3-12.2.10. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Applications Framework. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Applications Framework, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Applications Framework accessible data as well as unauthorized update, insert or delete access to some of Oracle Applications Framework accessible data. CVSS 3.1 Base Score 7.6 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N).
[ "cpe:2.3:a:oracle:applications_framework:*:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:applications_framework:12.1.3:*:*:*:*:*:*:*" ]
null
7.6
null
null
CVE-2005-2291
Oracle JDeveloper 9.0.4, 9.0.5, and 10.1.2 passes the cleartext password as a parameter when starting sqlplus, which allows local users to gain sensitive information.
[ "cpe:2.3:a:oracle:jdeveloper:9.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdeveloper:9.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdeveloper:10.1.2:*:*:*:*:*:*:*" ]
null
null
null
4.6
CVE-2023-31716
FUXA <= 1.1.12 has a Local File Inclusion vulnerability via file=fuxa.log
[ "cpe:2.3:a:frangoteam:fuxa:*:*:*:*:*:*:*:*" ]
null
7.5
null
null
RHSA-2024:0733
Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.4 Product Security and Bug Fix Update
python-urllib3: Cookie request header isn't stripped during cross-origin redirects ansible-core: possible information leak in tasks that ignore ANSIBLE_NO_LOG configuration
[ "cpe:/a:redhat:ansible_automation_platform:2.4::el8", "cpe:/a:redhat:ansible_automation_platform:2.4::el9", "cpe:/a:redhat:ansible_automation_platform_developer:2.4::el8", "cpe:/a:redhat:ansible_automation_platform_developer:2.4::el9", "cpe:/a:redhat:ansible_automation_platform_inside:2.4::el8", "cpe:/a:redhat:ansible_automation_platform_inside:2.4::el9" ]
null
5
null
null
GHSA-m8h6-32jj-7hxp
An issue was discovered in Treasure Data Fluent Bit 1.7.1, a wrong variable is used to get the msgpack data resulting in a heap overflow in flb_msgpack_gelf_value_ext. An attacker can craft a malicious file and tick the victim to open the file with the software, triggering a heap overflow and execute arbitrary code on the target system.
[]
null
7.8
null
null
CVE-2025-7193
itsourcecode Agri-Trading Online Shopping System suppliercontroller.php sql injection
A vulnerability was found in itsourcecode Agri-Trading Online Shopping System up to 1.0. It has been classified as critical. Affected is an unknown function of the file /admin/suppliercontroller.php. The manipulation of the argument supplier leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
[]
6.9
7.3
7.3
7.5
CVE-2022-23080
directus - SSRF which leads to internal port scan
In directus versions v9.0.0-beta.2 through 9.6.0 are vulnerable to server-side request forgery (SSRF) in the media upload functionality which allows a low privileged user to perform internal network port scans.
[ "cpe:2.3:a:rangerstudio:directus:*:*:*:*:*:*:*:*", "cpe:2.3:a:rangerstudio:directus:9.0.0:beta10:*:*:*:*:*:*", "cpe:2.3:a:rangerstudio:directus:9.0.0:beta11:*:*:*:*:*:*", "cpe:2.3:a:rangerstudio:directus:9.0.0:beta12:*:*:*:*:*:*", "cpe:2.3:a:rangerstudio:directus:9.0.0:beta13:*:*:*:*:*:*", "cpe:2.3:a:rangerstudio:directus:9.0.0:beta14:*:*:*:*:*:*", "cpe:2.3:a:rangerstudio:directus:9.0.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:rangerstudio:directus:9.0.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:rangerstudio:directus:9.0.0:beta4:*:*:*:*:*:*", "cpe:2.3:a:rangerstudio:directus:9.0.0:beta5:*:*:*:*:*:*", "cpe:2.3:a:rangerstudio:directus:9.0.0:beta7:*:*:*:*:*:*", "cpe:2.3:a:rangerstudio:directus:9.0.0:beta8:*:*:*:*:*:*", "cpe:2.3:a:rangerstudio:directus:9.0.0:beta9:*:*:*:*:*:*", "cpe:2.3:a:rangerstudio:directus:9.0.0:rc0:*:*:*:*:*:*", "cpe:2.3:a:rangerstudio:directus:9.0.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:rangerstudio:directus:9.0.0:rc10:*:*:*:*:*:*", "cpe:2.3:a:rangerstudio:directus:9.0.0:rc100:*:*:*:*:*:*", "cpe:2.3:a:rangerstudio:directus:9.0.0:rc101:*:*:*:*:*:*", "cpe:2.3:a:rangerstudio:directus:9.0.0:rc11:*:*:*:*:*:*", "cpe:2.3:a:rangerstudio:directus:9.0.0:rc12:*:*:*:*:*:*", "cpe:2.3:a:rangerstudio:directus:9.0.0:rc13:*:*:*:*:*:*", "cpe:2.3:a:rangerstudio:directus:9.0.0:rc14:*:*:*:*:*:*", "cpe:2.3:a:rangerstudio:directus:9.0.0:rc15:*:*:*:*:*:*", "cpe:2.3:a:rangerstudio:directus:9.0.0:rc17:*:*:*:*:*:*", "cpe:2.3:a:rangerstudio:directus:9.0.0:rc18:*:*:*:*:*:*", "cpe:2.3:a:rangerstudio:directus:9.0.0:rc19:*:*:*:*:*:*", "cpe:2.3:a:rangerstudio:directus:9.0.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:rangerstudio:directus:9.0.0:rc20:*:*:*:*:*:*", "cpe:2.3:a:rangerstudio:directus:9.0.0:rc21:*:*:*:*:*:*", "cpe:2.3:a:rangerstudio:directus:9.0.0:rc22:*:*:*:*:*:*", "cpe:2.3:a:rangerstudio:directus:9.0.0:rc23:*:*:*:*:*:*", "cpe:2.3:a:rangerstudio:directus:9.0.0:rc24:*:*:*:*:*:*", "cpe:2.3:a:rangerstudio:directus:9.0.0:rc25:*:*:*:*:*:*", "cpe:2.3:a:rangerstudio:directus:9.0.0:rc26:*:*:*:*:*:*", "cpe:2.3:a:rangerstudio:directus:9.0.0:rc27:*:*:*:*:*:*", "cpe:2.3:a:rangerstudio:directus:9.0.0:rc28:*:*:*:*:*:*", "cpe:2.3:a:rangerstudio:directus:9.0.0:rc29:*:*:*:*:*:*", "cpe:2.3:a:rangerstudio:directus:9.0.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:rangerstudio:directus:9.0.0:rc30:*:*:*:*:*:*", "cpe:2.3:a:rangerstudio:directus:9.0.0:rc31:*:*:*:*:*:*", "cpe:2.3:a:rangerstudio:directus:9.0.0:rc32:*:*:*:*:*:*", "cpe:2.3:a:rangerstudio:directus:9.0.0:rc33:*:*:*:*:*:*", "cpe:2.3:a:rangerstudio:directus:9.0.0:rc34:*:*:*:*:*:*", "cpe:2.3:a:rangerstudio:directus:9.0.0:rc35:*:*:*:*:*:*", "cpe:2.3:a:rangerstudio:directus:9.0.0:rc36:*:*:*:*:*:*", "cpe:2.3:a:rangerstudio:directus:9.0.0:rc37:*:*:*:*:*:*", "cpe:2.3:a:rangerstudio:directus:9.0.0:rc38:*:*:*:*:*:*", "cpe:2.3:a:rangerstudio:directus:9.0.0:rc39:*:*:*:*:*:*", "cpe:2.3:a:rangerstudio:directus:9.0.0:rc4:*:*:*:*:*:*", "cpe:2.3:a:rangerstudio:directus:9.0.0:rc40:*:*:*:*:*:*", "cpe:2.3:a:rangerstudio:directus:9.0.0:rc41:*:*:*:*:*:*", "cpe:2.3:a:rangerstudio:directus:9.0.0:rc42:*:*:*:*:*:*", "cpe:2.3:a:rangerstudio:directus:9.0.0:rc43:*:*:*:*:*:*", "cpe:2.3:a:rangerstudio:directus:9.0.0:rc44:*:*:*:*:*:*", "cpe:2.3:a:rangerstudio:directus:9.0.0:rc45:*:*:*:*:*:*", "cpe:2.3:a:rangerstudio:directus:9.0.0:rc46:*:*:*:*:*:*", "cpe:2.3:a:rangerstudio:directus:9.0.0:rc47:*:*:*:*:*:*", "cpe:2.3:a:rangerstudio:directus:9.0.0:rc48:*:*:*:*:*:*", "cpe:2.3:a:rangerstudio:directus:9.0.0:rc49:*:*:*:*:*:*", "cpe:2.3:a:rangerstudio:directus:9.0.0:rc5:*:*:*:*:*:*", "cpe:2.3:a:rangerstudio:directus:9.0.0:rc50:*:*:*:*:*:*", "cpe:2.3:a:rangerstudio:directus:9.0.0:rc51:*:*:*:*:*:*", "cpe:2.3:a:rangerstudio:directus:9.0.0:rc52:*:*:*:*:*:*", "cpe:2.3:a:rangerstudio:directus:9.0.0:rc53:*:*:*:*:*:*", "cpe:2.3:a:rangerstudio:directus:9.0.0:rc54:*:*:*:*:*:*", "cpe:2.3:a:rangerstudio:directus:9.0.0:rc55:*:*:*:*:*:*", "cpe:2.3:a:rangerstudio:directus:9.0.0:rc56:*:*:*:*:*:*", "cpe:2.3:a:rangerstudio:directus:9.0.0:rc57:*:*:*:*:*:*", "cpe:2.3:a:rangerstudio:directus:9.0.0:rc58:*:*:*:*:*:*", "cpe:2.3:a:rangerstudio:directus:9.0.0:rc59:*:*:*:*:*:*", "cpe:2.3:a:rangerstudio:directus:9.0.0:rc6:*:*:*:*:*:*", "cpe:2.3:a:rangerstudio:directus:9.0.0:rc60:*:*:*:*:*:*", "cpe:2.3:a:rangerstudio:directus:9.0.0:rc61:*:*:*:*:*:*", "cpe:2.3:a:rangerstudio:directus:9.0.0:rc62:*:*:*:*:*:*", "cpe:2.3:a:rangerstudio:directus:9.0.0:rc63:*:*:*:*:*:*", "cpe:2.3:a:rangerstudio:directus:9.0.0:rc64:*:*:*:*:*:*", "cpe:2.3:a:rangerstudio:directus:9.0.0:rc65:*:*:*:*:*:*", "cpe:2.3:a:rangerstudio:directus:9.0.0:rc66:*:*:*:*:*:*", "cpe:2.3:a:rangerstudio:directus:9.0.0:rc67:*:*:*:*:*:*", "cpe:2.3:a:rangerstudio:directus:9.0.0:rc68:*:*:*:*:*:*", "cpe:2.3:a:rangerstudio:directus:9.0.0:rc69:*:*:*:*:*:*", "cpe:2.3:a:rangerstudio:directus:9.0.0:rc7:*:*:*:*:*:*", "cpe:2.3:a:rangerstudio:directus:9.0.0:rc70:*:*:*:*:*:*", "cpe:2.3:a:rangerstudio:directus:9.0.0:rc71:*:*:*:*:*:*", "cpe:2.3:a:rangerstudio:directus:9.0.0:rc72:*:*:*:*:*:*", "cpe:2.3:a:rangerstudio:directus:9.0.0:rc73:*:*:*:*:*:*", "cpe:2.3:a:rangerstudio:directus:9.0.0:rc74:*:*:*:*:*:*", "cpe:2.3:a:rangerstudio:directus:9.0.0:rc75:*:*:*:*:*:*", "cpe:2.3:a:rangerstudio:directus:9.0.0:rc76:*:*:*:*:*:*", "cpe:2.3:a:rangerstudio:directus:9.0.0:rc77:*:*:*:*:*:*", "cpe:2.3:a:rangerstudio:directus:9.0.0:rc78:*:*:*:*:*:*", "cpe:2.3:a:rangerstudio:directus:9.0.0:rc79:*:*:*:*:*:*", "cpe:2.3:a:rangerstudio:directus:9.0.0:rc8:*:*:*:*:*:*", "cpe:2.3:a:rangerstudio:directus:9.0.0:rc80:*:*:*:*:*:*", "cpe:2.3:a:rangerstudio:directus:9.0.0:rc81:*:*:*:*:*:*", "cpe:2.3:a:rangerstudio:directus:9.0.0:rc82:*:*:*:*:*:*", "cpe:2.3:a:rangerstudio:directus:9.0.0:rc83:*:*:*:*:*:*", "cpe:2.3:a:rangerstudio:directus:9.0.0:rc84:*:*:*:*:*:*", "cpe:2.3:a:rangerstudio:directus:9.0.0:rc85:*:*:*:*:*:*", "cpe:2.3:a:rangerstudio:directus:9.0.0:rc86:*:*:*:*:*:*", "cpe:2.3:a:rangerstudio:directus:9.0.0:rc87:*:*:*:*:*:*", "cpe:2.3:a:rangerstudio:directus:9.0.0:rc88:*:*:*:*:*:*", "cpe:2.3:a:rangerstudio:directus:9.0.0:rc89:*:*:*:*:*:*", "cpe:2.3:a:rangerstudio:directus:9.0.0:rc9:*:*:*:*:*:*", "cpe:2.3:a:rangerstudio:directus:9.0.0:rc90:*:*:*:*:*:*", "cpe:2.3:a:rangerstudio:directus:9.0.0:rc91:*:*:*:*:*:*", "cpe:2.3:a:rangerstudio:directus:9.0.0:rc92:*:*:*:*:*:*", "cpe:2.3:a:rangerstudio:directus:9.0.0:rc93:*:*:*:*:*:*", "cpe:2.3:a:rangerstudio:directus:9.0.0:rc94:*:*:*:*:*:*", "cpe:2.3:a:rangerstudio:directus:9.0.0:rc95:*:*:*:*:*:*", "cpe:2.3:a:rangerstudio:directus:9.0.0:rc96:*:*:*:*:*:*", "cpe:2.3:a:rangerstudio:directus:9.0.0:rc97:*:*:*:*:*:*", "cpe:2.3:a:rangerstudio:directus:9.0.0:rc98:*:*:*:*:*:*", "cpe:2.3:a:rangerstudio:directus:9.0.0:rc99:*:*:*:*:*:*" ]
null
5
null
4
GHSA-h9cj-w3hw-v3m7
Cross-site scripting (XSS) vulnerability in w-Agora (aka Web-Agora) 4.2.0 allows remote attackers to inject arbitrary web script or HTML via a post with a BBCode tag that contains a JavaScript event name followed by whitespace before the '=' (equals) character, which bypasses a restrictive regular expression that attempts to remove onmouseover and other events.
[]
null
null
null
null
CVE-2020-28033
WordPress before 5.5.2 mishandles embeds from disabled sites on a multisite network, as demonstrated by allowing a spam embed.
[ "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*" ]
null
7.5
null
5
GHSA-wqvc-3mg4-x25w
DTStack Taier 1.4.0 allows remote attackers to specify the jobName parameter in the console listNames function to cause a SQL injection vulnerability
[]
null
9.8
null
null
CVE-2022-44957
webtareas 2.4p5 was discovered to contain a cross-site scripting (XSS) vulnerability in the component /clients/listclients.php. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field.
[ "cpe:2.3:a:webtareas_project:webtareas:2.4:p5:*:*:*:*:*:*" ]
null
5.4
null
null
GHSA-4qvx-qq5w-695p
HashiCorp Consul can use cleartext agent-to-agent RPC communication
HashiCorp Consul 0.5.1 through 1.4.0 can use cleartext agent-to-agent RPC communication because the `verify_outgoing` setting is improperly documented. NOTE: the vendor has provided reconfiguration steps that do not require a software upgrade.
[]
null
null
5.9
null
GHSA-4cx5-2fr7-x88f
Cross-Site Scripting (XSS) vulnerability in School Attendance Monitoring System and School Event Management System affecting version 1.0. An attacker could create a specially crafted URL and send it to a victim to obtain details of their session cookie via the 'View' parameter in '/course/index.php'.
[]
null
7.1
null
null
GHSA-j2f6-v4vj-2456
An Improper Check for Unusual or Exceptional Conditions vulnerability in the flow processing daemon (flowd) of Juniper Networks Junos OS onSRX1600, SRX2300, SRX 4000 Series, and SRX5000 Series with SPC3allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS).If a sequence of specific PIM packets is received, this will cause a flowd crash and restart.This issue affects Junos OS:all versions before 21.2R3-S9,21.4 versions before 21.4R3-S11,22.2 versions before 22.2R3-S7,22.4 versions before 22.4R3-S6,23.2 versions before 23.2R2-S4,23.4 versions before 23.4R2-S4,24.2 versions before 24.2R2.This is a similar, but different vulnerability than the issue reported asCVE-2024-47503, published in JSA88133.
[]
8.7
7.5
null
null
CVE-2023-42846
This issue was addressed by removing the vulnerable code. This issue is fixed in watchOS 10.1, iOS 16.7.2 and iPadOS 16.7.2, tvOS 17.1, iOS 17.1 and iPadOS 17.1. A device may be passively tracked by its Wi-Fi MAC address.
[ "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*" ]
null
5.3
null
null
GHSA-w333-hr2m-g7q9
massCode 1.0.0-alpha.6 allows XSS via crafted Markdown text, with resultant remote code execution (because nodeIntegration in webPreferences is true).
[]
null
null
null
null
CVE-2018-9950
This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader 9.0.0.29935. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of PDF documents. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the current process. Was ZDI-CAN-5413.
[ "cpe:2.3:a:foxitsoftware:foxit_reader:*:*:*:*:*:*:*:*", "cpe:2.3:a:foxitsoftware:phantompdf:*:*:*:*:*:*:*:*" ]
null
6.5
null
4.3
RHSA-2024:6708
Red Hat Security Advisory: ACS 4.5 enhancement and security update
containers/image: digest type does not guarantee valid type
[ "cpe:/a:redhat:advanced_cluster_security:4.5::el8" ]
null
8.3
null
null
GHSA-q2rr-fhp3-v3j2
An exploitable denial-of-service vulnerability exists in the mdnscap binary of the CUJO Smart Firewall running firmware 7003. When parsing labels in mDNS packets, the firewall unsafely handles label compression pointers, leading to an uncontrolled recursion that eventually exhausts the stack, crashing the mdnscap process. An unauthenticated attacker can send an mDNS message to trigger this vulnerability.
[]
null
7.5
null
null
CVE-2024-31177
Out-of-bounds Read in libfluid_msg library
Out-of-bounds Read vulnerability in Open Networking Foundation (ONF) libfluid (libfluid_msg modules). This vulnerability is associated with program routines fluid_msg::of13::TableFeaturePropActions::unpack. This issue affects libfluid: 0.1.0.
[ "cpe:2.3:a:open_networking_foundation:libfluid:0.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:opennetworking:libfluid_msg:0.1.0:*:*:*:*:*:*:*" ]
null
6.5
null
null
GHSA-8x7p-gq52-x9jp
Directory traversal vulnerability in Double Choco Latte (DCL) before 20020706 allows remote attackers to read arbitrary files via .. (dot dot) sequences when downloading files from the Projects: Attachments feature.
[]
null
null
null
null
GHSA-r8rj-jvg4-6m59
Unspecified vulnerability in the PeopleSoft Enterprise PeopleTools component in Oracle PeopleSoft Products 8.51 allows remote authenticated users to affect integrity via unknown vectors related to core.
[]
null
null
null
null
CVE-2008-1998
The NNSTAT (aka SYSPROC.NNSTAT) procedure in IBM DB2 8 before FP16, 9.1 before FP4a, and 9.5 before FP1 on Windows allows remote authenticated users to overwrite arbitrary files via the log file parameter.
[ "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:db2:8.0:fp1:*:*:*:*:*:*", "cpe:2.3:a:ibm:db2:8.0:fp10:*:*:*:*:*:*", "cpe:2.3:a:ibm:db2:8.0:fp11:*:*:*:*:*:*", "cpe:2.3:a:ibm:db2:8.0:fp12:*:*:*:*:*:*", "cpe:2.3:a:ibm:db2:8.0:fp13:*:*:*:*:*:*", "cpe:2.3:a:ibm:db2:8.0:fp14:*:*:*:*:*:*", "cpe:2.3:a:ibm:db2:8.0:fp15:*:*:*:*:*:*", "cpe:2.3:a:ibm:db2:8.0:fp2:*:*:*:*:*:*", "cpe:2.3:a:ibm:db2:8.0:fp3:*:*:*:*:*:*", "cpe:2.3:a:ibm:db2:8.0:fp4:*:*:*:*:*:*", "cpe:2.3:a:ibm:db2:8.0:fp5:*:*:*:*:*:*", "cpe:2.3:a:ibm:db2:8.0:fp6:*:*:*:*:*:*", "cpe:2.3:a:ibm:db2:8.0:fp6a:*:*:*:*:*:*", "cpe:2.3:a:ibm:db2:8.0:fp6b:*:*:*:*:*:*", "cpe:2.3:a:ibm:db2:8.0:fp6c:*:*:*:*:*:*", "cpe:2.3:a:ibm:db2:8.0:fp7:*:*:*:*:*:*", "cpe:2.3:a:ibm:db2:8.0:fp7a:*:*:*:*:*:*", "cpe:2.3:a:ibm:db2:8.0:fp7b:*:*:*:*:*:*", "cpe:2.3:a:ibm:db2:8.0:fp8:*:*:*:*:*:*", "cpe:2.3:a:ibm:db2:8.0:fp8a:*:*:*:*:*:*", "cpe:2.3:a:ibm:db2:8.0:fp9:*:*:*:*:*:*", "cpe:2.3:a:ibm:db2:8.0:fp9a:*:*:*:*:*:*", "cpe:2.3:a:ibm:db2:9.1:fp1:*:*:*:*:*:*", "cpe:2.3:a:ibm:db2:9.1:fp2:*:*:*:*:*:*", "cpe:2.3:a:ibm:db2:9.1:fp3:*:*:*:*:*:*", "cpe:2.3:a:ibm:db2:9.1:fp3a:*:*:*:*:*:*", "cpe:2.3:a:ibm:db2:9.1:fp4:*:*:*:*:*:*", "cpe:2.3:a:ibm:db2:9.5:*:*:*:*:*:*:*" ]
null
null
null
8.5
GHSA-wvgm-548x-hh75
Adobe Bridge version 11.0.2 (and earlier) are affected by a Heap-based Buffer overflow vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[]
null
null
null
null
CVE-2011-2685
Stack-based buffer overflow in the Lotus Word Pro import filter in LibreOffice before 3.3.3 allows remote attackers to execute arbitrary code via a crafted .lwp file.
[ "cpe:2.3:a:libreoffice:libreoffice:*:*:*:*:*:*:*:*", "cpe:2.3:a:libreoffice:libreoffice:3.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:libreoffice:libreoffice:3.3.1:*:*:*:*:*:*:*" ]
null
null
null
9.3
CVE-2019-1010257
An Information Disclosure / Data Modification issue exists in article2pdf_getfile.php in the article2pdf Wordpress plugin 0.24, 0.25, 0.26, 0.27. A URL can be constructed which allows overriding the PDF file's path leading to any PDF whose path is known and which is readable to the web server can be downloaded. The file will be deleted after download if the web server has permission to do so. For PHP versions before 5.3, any file can be read by null terminating the string left of the file extension.
[ "cpe:2.3:a:article2pdf_project:article2pdf:*:*:*:*:*:wordpress:*:*" ]
null
9.1
null
7.5
GHSA-pj69-hq2r-jmr8
The function tee_obj_free in Samsung mTower through 0.3.0 allows a trusted application to trigger a Denial of Service (DoS) by invoking the function TEE_AllocateOperation with a disturbed heap layout, related to utee_cryp_obj_alloc.
[]
null
7.5
null
null
CVE-2024-23336
Incomplete disallowed remote addresses list in MyBB
MyBB is a free and open source forum software. The default list of disallowed remote hosts does not contain the `127.0.0.0/8` block, which may result in a Server-Side Request Forgery (SSRF) vulnerability. The Configuration File's _Disallowed Remote Addresses_ list (`$config['disallowed_remote_addresses']`) contains the address `127.0.0.1`, but does not include the complete block `127.0.0.0/8`. MyBB 1.8.38 resolves this issue in default installations. Administrators of installed boards should update the existing configuration (`inc/config.php`) to include all addresses blocked by default. Additionally, users are advised to verify that it includes any other IPv4 addresses resolving to the server and other internal resources. Users unable to upgrade may manually add 127.0.0.0/8' to their disallowed address list.
[ "cpe:2.3:a:mybb:mybb:*:*:*:*:*:*:*:*" ]
null
5
null
null
RHSA-2014:0186
Red Hat Security Advisory: mysql55-mysql security update
mysql: unspecified DoS related to Optimizer (CPU October 2013) mysql: unspecified flaw related to Replication (CPU October 2013) mysql: unspecified vulnerability related to Partition DoS (CPU Jan 2014) mysql: unspecified vulnerability related to Error Handling DoS (CPU Jan 2014) mysql: command-line tool buffer overflow via long server version string mysql: unspecified vulnerability related to Optimizer DoS (CPU Jan 2014) mysql: unspecified vulnerability related to InnoDB affecting integrity (CPU Jan 2014) mysql: unspecified DoS vulnerability (CPU Jan 2014) mysql: unspecified vulnerability related to Locking DoS (CPU Jan 2014) mysql: unspecified vulnerability related to InnoDB DoS (CPU Jan 2014) mysql: unspecified vulnerability related to Replication DoS (CPU Jan 2014) mysql: unspecified vulnerability related to Optimizer DoS (CPU Jan 2014)
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
GHSA-3f7x-qm4p-6qjv
cPanel before 90.0.17 allows self-XSS via the WHM Transfer Tool interface (SEC-577).
[]
null
null
null
null
GHSA-r727-5v4m-6fx7
A "Reusing a Nonce, Key Pair in Encryption" issue was discovered in Rockwell Automation Allen-Bradley MicroLogix 1100 programmable-logic controllers 1763-L16AWA, Series A and B, Version 16.00 and prior versions; 1763-L16BBB, Series A and B, Version 16.00 and prior versions; 1763-L16BWA, Series A and B, Version 16.00 and prior versions; and 1763-L16DWD, Series A and B, Version 16.00 and prior versions and Allen-Bradley MicroLogix 1400 programmable logic controllers 1766-L32AWA, Series A and B, Version 16.00 and prior versions; 1766-L32BWA, Series A and B, Version 16.00 and prior versions; 1766-L32BWAA, Series A and B, Version 16.00 and prior versions; 1766-L32BXB, Series A and B, Version 16.00 and prior versions; 1766-L32BXBA, Series A and B, Version 16.00 and prior versions; and 1766-L32AWAA, Series A and B, Version 16.00 and prior versions. The affected product reuses nonces, which may allow an attacker to capture and replay a valid request until the nonce is changed.
[]
null
null
9.8
null
GHSA-q9f5-mqv7-56mh
A improper validation of certificate with host mismatch in Fortinet FortiTokenAndroid version 5.0.3 and below, Fortinet FortiTokeniOS version 5.2.0 and below, Fortinet FortiTokenWinApp version 4.0.3 and below allows attacker to retrieve information disclosed via man-in-the-middle attacks.
[]
null
5.4
null
null
CVE-2021-41651
A blind SQL injection vulnerability exists in the Raymart DG / Ahmed Helal Hotel-mgmt-system. A malicious attacker can retrieve sensitive database information and interact with the database using the vulnerable cid parameter in process_update_profile.php.
[ "cpe:2.3:a:hotel_management_system_project:hotel_management_system:-:*:*:*:*:*:*:*" ]
null
7.5
null
5