id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
139k
cpes
sequencelengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
GHSA-4wvc-ffmh-rrcr
Open redirect vulnerability in index.php (aka the Login Page) in ownCloud before 3.0.3 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the redirect_url parameter.
[]
null
null
null
null
GHSA-j8jq-cv4q-c5x6
Unspecified vulnerability in the PeopleSoft Enterprise HRMS component in Oracle PeopleSoft Products 9.0 allows remote authenticated users to affect confidentiality and integrity via unknown vectors related to eCompensation Manager Desktop.
[]
null
null
null
null
GHSA-3mw8-jr69-x96w
Improper File Permissions in NetScout nGeniusONE 6.3.2 build 904 allows authenticated remote users to gain permissions via a crafted payload.
[]
null
8.8
null
null
CVE-2017-11507
A cross site scripting (XSS) vulnerability exists in Check_MK versions 1.2.8x prior to 1.2.8p25 and 1.4.0x prior to 1.4.0p9, allowing an unauthenticated attacker to inject arbitrary HTML or JavaScript via the output_format parameter, and the username parameter of failed HTTP basic authentication attempts, which is returned unencoded in an internal server error page.
[ "cpe:2.3:a:check_mk_project:check_mk:1.2.8:*:*:*:*:*:*:*", "cpe:2.3:a:check_mk_project:check_mk:1.2.8:b1:*:*:*:*:*:*", "cpe:2.3:a:check_mk_project:check_mk:1.2.8:b10:*:*:*:*:*:*", "cpe:2.3:a:check_mk_project:check_mk:1.2.8:b11:*:*:*:*:*:*", "cpe:2.3:a:check_mk_project:check_mk:1.2.8:b2:*:*:*:*:*:*", "cpe:2.3:a:check_mk_project:check_mk:1.2.8:b3:*:*:*:*:*:*", "cpe:2.3:a:check_mk_project:check_mk:1.2.8:b4:*:*:*:*:*:*", "cpe:2.3:a:check_mk_project:check_mk:1.2.8:b5:*:*:*:*:*:*", "cpe:2.3:a:check_mk_project:check_mk:1.2.8:b6:*:*:*:*:*:*", "cpe:2.3:a:check_mk_project:check_mk:1.2.8:b7:*:*:*:*:*:*", "cpe:2.3:a:check_mk_project:check_mk:1.2.8:b8:*:*:*:*:*:*", "cpe:2.3:a:check_mk_project:check_mk:1.2.8:b9:*:*:*:*:*:*", "cpe:2.3:a:check_mk_project:check_mk:1.2.8:p1:*:*:*:*:*:*", "cpe:2.3:a:check_mk_project:check_mk:1.2.8:p10:*:*:*:*:*:*", "cpe:2.3:a:check_mk_project:check_mk:1.2.8:p11:*:*:*:*:*:*", "cpe:2.3:a:check_mk_project:check_mk:1.2.8:p12:*:*:*:*:*:*", "cpe:2.3:a:check_mk_project:check_mk:1.2.8:p13:*:*:*:*:*:*", "cpe:2.3:a:check_mk_project:check_mk:1.2.8:p14:*:*:*:*:*:*", "cpe:2.3:a:check_mk_project:check_mk:1.2.8:p15:*:*:*:*:*:*", "cpe:2.3:a:check_mk_project:check_mk:1.2.8:p16:*:*:*:*:*:*", "cpe:2.3:a:check_mk_project:check_mk:1.2.8:p17:*:*:*:*:*:*", "cpe:2.3:a:check_mk_project:check_mk:1.2.8:p18:*:*:*:*:*:*", "cpe:2.3:a:check_mk_project:check_mk:1.2.8:p19:*:*:*:*:*:*", "cpe:2.3:a:check_mk_project:check_mk:1.2.8:p2:*:*:*:*:*:*", "cpe:2.3:a:check_mk_project:check_mk:1.2.8:p20:*:*:*:*:*:*", "cpe:2.3:a:check_mk_project:check_mk:1.2.8:p21:*:*:*:*:*:*", "cpe:2.3:a:check_mk_project:check_mk:1.2.8:p22:*:*:*:*:*:*", "cpe:2.3:a:check_mk_project:check_mk:1.2.8:p23:*:*:*:*:*:*", "cpe:2.3:a:check_mk_project:check_mk:1.2.8:p24:*:*:*:*:*:*", "cpe:2.3:a:check_mk_project:check_mk:1.2.8:p25:*:*:*:*:*:*", "cpe:2.3:a:check_mk_project:check_mk:1.2.8:p3:*:*:*:*:*:*", "cpe:2.3:a:check_mk_project:check_mk:1.2.8:p4:*:*:*:*:*:*", "cpe:2.3:a:check_mk_project:check_mk:1.2.8:p5:*:*:*:*:*:*", "cpe:2.3:a:check_mk_project:check_mk:1.2.8:p6:*:*:*:*:*:*", "cpe:2.3:a:check_mk_project:check_mk:1.2.8:p7:*:*:*:*:*:*", "cpe:2.3:a:check_mk_project:check_mk:1.2.8:p8:*:*:*:*:*:*", "cpe:2.3:a:check_mk_project:check_mk:1.2.8:p9:*:*:*:*:*:*", "cpe:2.3:a:check_mk_project:check_mk:1.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:check_mk_project:check_mk:1.4.0:b1:*:*:*:*:*:*", "cpe:2.3:a:check_mk_project:check_mk:1.4.0:b2:*:*:*:*:*:*", "cpe:2.3:a:check_mk_project:check_mk:1.4.0:b3:*:*:*:*:*:*", "cpe:2.3:a:check_mk_project:check_mk:1.4.0:b4:*:*:*:*:*:*", "cpe:2.3:a:check_mk_project:check_mk:1.4.0:b5:*:*:*:*:*:*", "cpe:2.3:a:check_mk_project:check_mk:1.4.0:b6:*:*:*:*:*:*", "cpe:2.3:a:check_mk_project:check_mk:1.4.0:b7:*:*:*:*:*:*", "cpe:2.3:a:check_mk_project:check_mk:1.4.0:b8:*:*:*:*:*:*", "cpe:2.3:a:check_mk_project:check_mk:1.4.0:b9:*:*:*:*:*:*", "cpe:2.3:a:check_mk_project:check_mk:1.4.0:p1:*:*:*:*:*:*", "cpe:2.3:a:check_mk_project:check_mk:1.4.0:p2:*:*:*:*:*:*", "cpe:2.3:a:check_mk_project:check_mk:1.4.0:p3:*:*:*:*:*:*", "cpe:2.3:a:check_mk_project:check_mk:1.4.0:p4:*:*:*:*:*:*", "cpe:2.3:a:check_mk_project:check_mk:1.4.0:p5:*:*:*:*:*:*", "cpe:2.3:a:check_mk_project:check_mk:1.4.0:p6:*:*:*:*:*:*", "cpe:2.3:a:check_mk_project:check_mk:1.4.0:p7:*:*:*:*:*:*", "cpe:2.3:a:check_mk_project:check_mk:1.4.0:p8:*:*:*:*:*:*", "cpe:2.3:a:check_mk_project:check_mk:1.4.0:p9:*:*:*:*:*:*" ]
null
null
6.1
4.3
CVE-2006-4923
Cross-site scripting (XSS) vulnerability in search.php in eSyndiCat Portal System allows remote attackers to inject arbitrary web script or HTML via the what parameter.
[ "cpe:2.3:a:esyndicat_portal_system:esyndicat_portal_system:*:*:*:*:*:*:*:*" ]
null
null
null
4.3
CVE-2006-2089
Multiple cross-site scripting (XSS) vulnerabilities in misc.php in MySmartBB 1.1.x allow remote attackers to inject arbitrary web script or HTML via the (1) id and (2) username parameters.
[ "cpe:2.3:a:mysmartbb:mysmartbb:1.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:mysmartbb:mysmartbb:1.1.3:*:*:*:*:*:*:*" ]
null
null
null
4.3
GHSA-w7x5-g6gj-cxw9
Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: Internal Operations). Supported versions that are affected are 7.4.38 and prior, 7.5.28 and prior, 7.6.24 and prior and 8.0.31 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H).
[]
null
6.3
null
null
ICSA-23-236-05
CODESYS Development System
In CODESYS Development System versions from 3.5.11.0 and before 3.5.19.20 a missing integrity check might allow an unauthenticated remote attacker to manipulate the content of notifications received via HTTP by the CODESYS notification server.
[]
null
null
9.6
null
GHSA-6xf5-f23f-5cff
A Remote Denial of Service vulnerability in Hewlett Packard Enterprise Moonshot Provisioning Manager Appliance version v1.20 was found.
[]
null
null
9.1
null
GHSA-f6fc-pffh-c6vq
Multiple heap-based buffer overflows in RealNetworks RealPlayer 11.0 through 11.1, RealPlayer SP 1.0 through 1.1.5, and Linux RealPlayer 11.0.2.1744 allow remote attackers to have an unspecified impact via a crafted header in an IVR file.
[]
null
null
null
null
CVE-2024-20382
A vulnerability in the VPN web client services feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a browser that is accessing an affected device. This vulnerability is due to improper validation of user-supplied input to application endpoints. An attacker could exploit this vulnerability by persuading a user to follow a link designed to submit malicious input to the affected application. A successful exploit could allow the attacker to execute arbitrary HTML or script code in the browser in the context of the web services page.
[]
null
6.1
null
null
CVE-2001-1245
Opera 5.0 for Linux does not properly handle malformed HTTP headers, which allows remote attackers to cause a denial of service, possibly with a header whose value is the same as a MIME header name.
[ "cpe:2.3:a:opera_software:opera_web_browser:5.0:*:linux:*:*:*:*:*" ]
null
null
null
5
RHSA-2023:7215
Red Hat Security Advisory: Red Hat OpenShift Service Mesh Containers for 2.2.12
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
[ "cpe:/a:redhat:service_mesh:2.2::el8" ]
null
7.5
null
null
CVE-2014-5447
Zarafa WebAccess 7.1.10 and WebApp 1.6 beta uses weak permissions (644) for config.php, which allows local users to obtain sensitive information by reading the PHP session files. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-0103.
[ "cpe:2.3:a:zarafa:webapp:1.6:*:*:*:*:*:*:*", "cpe:2.3:a:zarafa:zarafa:7.1.10:*:*:*:*:*:*:*" ]
null
null
null
2.1
CVE-2021-22791
A CWE-787: Out-of-bounds Write vulnerability that could cause a Denial of Service on the Modicon PLC controller / simulator when updating the controller application with a specially crafted project file exists in Modicon M580 CPU (part numbers BMEP* and BMEH*, all versions), Modicon M340 CPU (part numbers BMXP34*, all versions), Modicon MC80 (part numbers BMKC80*, all versions), Modicon Momentum Ethernet CPU (part numbers 171CBU*, all versions), PLC Simulator for EcoStruxureª Control Expert, including all Unity Pro versions (former name of EcoStruxureª Control Expert, all versions), PLC Simulator for EcoStruxureª Process Expert including all HDCS versions (former name of EcoStruxureª Process Expert, all versions), Modicon Quantum CPU (part numbers 140CPU*, all versions), Modicon Premium CPU (part numbers TSXP5*, all versions).
[ "cpe:2.3:h:schneider-electric:modicon_m340_bmxp341000:-:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:modicon_m340_bmxp342010:-:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:modicon_m340_bmxp342020:-:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:modicon_m340_bmxp342030:-:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:modicon_m580_bmeh582040:-:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:modicon_m580_bmeh582040c:-:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:modicon_m580_bmeh582040s:-:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:modicon_m580_bmeh584040:-:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:modicon_m580_bmeh584040c:-:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:modicon_m580_bmeh584040s:-:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:modicon_m580_bmeh586040:-:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:modicon_m580_bmeh586040c:-:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:modicon_m580_bmeh586040s:-:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:modicon_m580_bmep581020:-:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:modicon_m580_bmep581020h:-:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:modicon_m580_bmep582020:-:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:modicon_m580_bmep582020h:-:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:modicon_m580_bmep582040:-:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:modicon_m580_bmep582040h:-:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:modicon_m580_bmep582040s:-:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:modicon_m580_bmep583020:-:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:modicon_m580_bmep583040:-:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:modicon_m580_bmep584020:-:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:modicon_m580_bmep584040:-:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:modicon_m580_bmep584040s:-:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:modicon_m580_bmep585040:-:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:modicon_m580_bmep585040c:-:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:modicon_m580_bmep586040:-:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:modicon_m580_bmep586040c:-:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:modicon_mc80_bmkc8020301:-:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:modicon_mc80_bmkc8020310:-:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:modicon_mc80_bmkc8030311:-:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:modicon_momentum_171cbu78090:-:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:modicon_momentum_171cbu98090:-:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:modicon_momentum_171cbu98091:-:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:modicon_premium_tsxp57_1634m:-:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:modicon_premium_tsxp57_2634m:-:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:modicon_premium_tsxp57_2834m:-:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:modicon_premium_tsxp57_454m:-:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:modicon_premium_tsxp57_4634m:-:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:modicon_premium_tsxp57_554m:-:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:modicon_premium_tsxp57_5634m:-:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:modicon_premium_tsxp57_6634m:-:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:modicon_quantum_140cpu65150:-:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:modicon_quantum_140cpu65150c:-:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:modicon_quantum_140cpu65160:-:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:modicon_quantum_140cpu65160c:-:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:plc_simulator_for_ecostruxure_control_expert:-:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:plc_simulator_for_ecostruxure_process_expert:-:*:*:*:*:*:*:*" ]
null
6.5
null
4
RHSA-2022:0162
Red Hat Security Advisory: gegl security update
gegl: shell expansion via a crafted pathname
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
7.8
null
null
GHSA-qxmp-jrhr-mhjw
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.16. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 6.0 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N).
[]
null
null
null
null
CVE-2006-6763
Multiple PHP remote file inclusion vulnerabilities in the Keep It Simple Guest Book (KISGB) allow remote attackers to execute arbitrary PHP code via a URL in the (1) path_to_themes parameter in (a) authenticate.php, and the (2) default_path_for_themes parameter in (b) admin.php and (c) upconfig.php.
[ "cpe:2.3:a:keep_it_simple_guest_book:keep_it_simple_guest_book:5.0:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2010-0956
SQL injection vulnerability in index.php in OpenCart 1.3.2 allows remote attackers to execute arbitrary SQL commands via the page parameter.
[ "cpe:2.3:a:opencart:opencart:1.3.2:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-cxcr-v85c-3586
Franklin Fueling System EVO 550 and EVO 5000 are vulnerable to a Path Traversal vulnerability that could allow an attacker to access sensitive files on the system.
[]
null
7.5
null
null
GHSA-86w6-r554-8hxh
A local privilege escalation in Fortinet FortiClient for Windows 6.0.4 and earlier allows attacker to execute unauthorized code or commands via the parsing of the file.
[]
null
7.8
null
null
GHSA-5fw3-pvfm-qmmq
User Interface (UI) Misrepresentation of Critical Information vulnerability in DropBox Sign(HelloSign) allows Content Spoofing. Displayed version does not show the layer flattened version, once download, If printed (e.g. via Google Chrome -> Examine the print preview): Will render the vulnerability only, not all layers are flattened. This issue affects DropBox Sign(HelloSign): through 2024-12-04.
[]
8.2
null
null
null
CVE-2006-6452
Multiple cross-site scripting (XSS) vulnerabilities in the MyArticles module before 0.6 beta 1, for RunCMS, allow remote attackers to inject arbitrary web script or HTML via unspecified parameters to (1) topics.php, (2) submit.php, and (3) class/calendar.class.php.
[ "cpe:2.3:a:myarticles:myarticles:*:*:*:*:*:*:*:*" ]
null
null
null
6.8
RHSA-2008:0524
Red Hat Security Advisory: Red Hat Network Satellite Server security update
openmotif21 stack overflows in libxpm openmotif21 stack overflows in libxpm mod_ssl SSLCipherSuite bypass openmotif21 stack overflows in libxpm libxpm buffer overflow tomcat multiple content-length header poisioning tomcat DoS openmotif libUil buffer overflows tomcat manager example DoS tomcat examples XSS perl-Crypt-CBC weaker encryption with some ciphers jabberd SASL DoS tomcat directory listing issue httpd mod_status XSS tomcat XSS in example webapps tomcat XSS in example webapps mod_jk chunk too long java-jre: GIF buffer overflow tomcat directory traversal mod_perl PerlRun denial of service tomcat XSS in samples tomcat accept-language xss flaw mod_jk sends decoded URL to tomcat javaws vulnerabilities tomcat examples jsp XSS tomcat host manager XSS Integer overflow in the embedded ICC profile image parser in Sun Java Development Kit BMP image parser vulnerability httpd scoreboard lack of PID protection tomcat handling of cookies tomcat handling of cookie values mod_autoindex XSS httpd: mod_imagemap XSS Absolute path traversal Apache Tomcat WEBDAV JFreeChart: XSS vulnerabilities in the image map feature apache mod_status cross-site scripting tomcat5 SSO cookie login information disclosure
[ "cpe:/a:redhat:network_satellite:4.2::el3", "cpe:/a:redhat:network_satellite:4.2::el4" ]
null
null
null
null
CVE-2017-16945
The standardrestorer binary in Arq 5.10 and earlier for Mac allows local users to write to arbitrary files and consequently gain root privileges via a crafted restore path.
[ "cpe:2.3:a:haystacksoftware:arq:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*" ]
null
null
7.8
7.2
CVE-2014-3453
Eval injection vulnerability in the flag_import_form_validate function in includes/flag.export.inc in the Flag module 7.x-3.0, 7.x-3.5, and earlier for Drupal allows remote authenticated administrators to execute arbitrary PHP code via the "Flag import code" text area to admin/structure/flags/import. NOTE: this issue could also be exploited by other attackers if the administrator ignores a security warning on the permissions assignment page.
[ "cpe:2.3:a:flag_module_project:flag:*:*:*:*:*:drupal:*:*", "cpe:2.3:a:flag_module_project:flag:7.x-3.0:-:*:*:*:drupal:*:*", "cpe:2.3:a:flag_module_project:flag:7.x-3.0:alpha1:*:*:*:drupal:*:*", "cpe:2.3:a:flag_module_project:flag:7.x-3.0:alpha2:*:*:*:drupal:*:*", "cpe:2.3:a:flag_module_project:flag:7.x-3.0:alpha3:*:*:*:drupal:*:*", "cpe:2.3:a:flag_module_project:flag:7.x-3.0:alpha4:*:*:*:drupal:*:*", "cpe:2.3:a:flag_module_project:flag:7.x-3.0:beta1:*:*:*:drupal:*:*", "cpe:2.3:a:flag_module_project:flag:7.x-3.0:rc1:*:*:*:drupal:*:*", "cpe:2.3:a:flag_module_project:flag:7.x-3.1:*:*:*:*:drupal:*:*", "cpe:2.3:a:flag_module_project:flag:7.x-3.2:*:*:*:*:drupal:*:*", "cpe:2.3:a:flag_module_project:flag:7.x-3.3:*:*:*:*:drupal:*:*", "cpe:2.3:a:flag_module_project:flag:7.x-3.4:*:*:*:*:drupal:*:*", "cpe:2.3:a:flag_module_project:flag:7.x-3.x:dev:*:*:*:drupal:*:*" ]
null
null
null
6.5
CVE-2010-1931
SQL injection vulnerability in includes/content/cart.inc.php in CubeCart PHP Shopping cart 4.3.4 through 4.3.9 allows remote attackers to execute arbitrary SQL commands via the shipKey parameter to index.php.
[ "cpe:2.3:a:cubecart:cubecart:4.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:cubecart:cubecart:4.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:cubecart:cubecart:4.3.6:*:*:*:*:*:*:*", "cpe:2.3:a:cubecart:cubecart:4.3.7:*:*:*:*:*:*:*", "cpe:2.3:a:cubecart:cubecart:4.3.8:*:*:*:*:*:*:*", "cpe:2.3:a:cubecart:cubecart:4.3.9:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2023-36091
Authentication Bypass vulnerability in D-Link DIR-895 FW102b07 allows remote attackers to gain escalated privileges via via function phpcgi_main in cgibin. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
[ "cpe:2.3:h:d-link:dir-895:*:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dir-895l_firmware:1.02:b07:*:*:*:*:*:*", "cpe:2.3:h:dlink:dir-895l:-:*:*:*:*:*:*:*" ]
null
9.8
null
null
GHSA-94xv-rp86-287j
Adobe Experience Manager versions 6.5.20 and earlier are affected by a reflected Cross-Site Scripting (XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
[]
null
5.4
null
null
GHSA-rq8q-fhrf-h2pp
Cisco AireOS 4.1 through 7.4.120.0, 7.5.x, and 7.6.100.0 on Wireless LAN Controller (WLC) devices allows remote attackers to cause a denial of service (device reload) via a crafted HTTP request, aka Bug ID CSCun86747.
[]
null
null
7.5
null
CVE-2023-21857
Vulnerability in the Oracle HCM Common Architecture product of Oracle E-Business Suite (component: Auomated Test Suite). Supported versions that are affected are 12.2.3-12.2.12. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle HCM Common Architecture. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle HCM Common Architecture accessible data. CVSS 3.1 Base Score 7.5 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N).
[ "cpe:2.3:a:oracle:hcm_common_architecture:*:*:*:*:*:*:*:*" ]
null
7.5
null
null
GHSA-crh3-m6cc-pcw5
Directory traversal vulnerability in php/cal_pdf.php in Mini Web Calendar (mwcal) 1.2 allows remote attackers to read arbitrary files via directory traversal sequences in the thefile parameter.
[]
null
null
null
null
GHSA-g3qh-h448-hf99
Divide-by-zero vulnerability in the opj_tcd_init_tile function in tcd.c in OpenJPEG before 2.1.1 allows remote attackers to cause a denial of service (application crash) via a crafted jp2 file. NOTE: this issue exists because of an incorrect fix for CVE-2014-7947.
[]
null
null
5.5
null
CVE-2008-6235
The Netrw plugin (netrw.vim) in Vim 7.0 and 7.1 allows user-assisted attackers to execute arbitrary commands via shell metacharacters in a filename used by the (1) "D" (delete) command or (2) b:netrw_curdir variable, as demonstrated using the netrw.v4 and netrw.v5 test cases.
[ "cpe:2.3:a:vim:vim:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:vim:vim:7.1:*:*:*:*:*:*:*" ]
null
null
null
9.3
GHSA-rxm3-3v27-86hh
HCL iNotes v9, v10 and v11 is susceptible to a Stored Cross-Site Scripting (XSS) vulnerability due to improper handling of message content. An unauthenticated remote attacker could exploit this vulnerability using specially-crafted markup to execute script in a victim's web browser within the security context of the hosting Web site and/or steal the victim's cookie-based authentication credentials.
[]
null
null
null
null
GHSA-4q6p-r6v2-jvc5
Chaijs/get-func-name vulnerable to ReDoS
The current regex implementation for parsing values in the module is susceptible to excessive backtracking, leading to potential DoS attacks. The regex implementation in question is as follows:This vulnerability can be exploited when there is an imbalance in parentheses, which results in excessive backtracking and subsequently increases the CPU load and processing time significantly. This vulnerability can be triggered using the following input:Here is a simple PoC code to demonstrate the issue:
[]
null
7.5
null
null
GHSA-37hw-m3rc-6ww4
A memory leak in the unittest_data_add() function in drivers/of/unittest.c in the Linux kernel before 5.3.10 allows attackers to cause a denial of service (memory consumption) by triggering of_fdt_unflatten_tree() failures, aka CID-e13de8fe0d6a.
[]
null
7.5
null
null
ICSA-18-275-01
Delta Electronics ISPSoft
By opening a crafted file, an attack can cause the application to read past the boundary allocated to a stack object, which could allow execution of code under the context of the application.CVE-2018-14800 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L).
[]
null
null
5.3
null
CVE-2021-3479
There's a flaw in OpenEXR's Scanline API functionality in versions before 3.0.0-beta. An attacker who is able to submit a crafted file to be processed by OpenEXR could trigger excessive consumption of memory, resulting in an impact to system availability.
[ "cpe:2.3:a:openexr:openexr:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*" ]
null
5.5
null
4.3
CVE-2014-1809
The MSCOMCTL library in Microsoft Office 2007 SP3, 2010 SP1 and SP2, and 2013 Gold, SP1, RT, and RT SP1 makes it easier for remote attackers to bypass the ASLR protection mechanism via a crafted web site, as exploited in the wild in May 2014, aka "MSCOMCTL ASLR Vulnerability."
[ "cpe:2.3:a:microsoft:office:2007:sp3:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2010:sp1:x64:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2010:sp1:x86:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2010:sp2:x64:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2010:sp2:x86:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2013:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2013:sp1:*:*:*:*:*:*" ]
null
null
null
6.8
CVE-2015-1688
Microsoft Internet Explorer 7 through 11 allows remote attackers to gain privileges via a crafted web site, aka "Internet Explorer Elevation of Privilege Vulnerability."
[ "cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*" ]
null
null
null
6.8
CVE-2005-1177
Unknown vulnerability in (1) Webmin and (2) Usermin before 1.200 causes Webmin to change permissions and ownership of configuration files, with unknown impact.
[ "cpe:2.3:a:usermin:usermin:0.4:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:0.5:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:0.6:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:0.7:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:0.8:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:0.9:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:0.91:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:0.92:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:0.93:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:0.94:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:0.95:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:0.96:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:0.97:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:0.98:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:0.99:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:1.000:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:1.010:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:1.020:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:1.030:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:1.040:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:1.051:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:1.060:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:1.070:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:1.080:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:1.090:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:1.100:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:1.110:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:1.120:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:1.130:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:1.140:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:0.4:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:0.5:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:0.6:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:0.7:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:0.80:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:0.90:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:0.91:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:0.92:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:0.93:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:0.94:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:0.95:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:0.96:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:0.97:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:0.98:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:0.99:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:1.0.00:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:1.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:1.0.20:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:1.0.30:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:1.0.40:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:1.0.51:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:1.0.60:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:1.0.70:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:1.0.80:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:1.0.90:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:1.1.00:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:1.1.10:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:1.1.20:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:1.1.30:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:1.1.40:*:*:*:*:*:*:*" ]
null
null
null
10
CVE-2014-7335
The Liver Health - Hepatitis C (aka gov.nyc.dohmh.HepC) application 2.0.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[ "cpe:2.3:a:nyc:liver_health_-_hepatitis_c:2.0.0:*:*:*:*:android:*:*" ]
null
null
null
5.4
GHSA-gmhr-ccqm-6w75
A vulnerability, which was classified as problematic, has been found in SourceCodester Online Pizza Ordering System 1.0. This issue affects some unknown processing of the file admin/ajax.php?action=save_user. The manipulation leads to cross-site request forgery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-221681 was assigned to this vulnerability.
[]
null
8.8
null
null
CVE-2023-0953
Insufficient input sanitization in the documentation feature of Devolutions Server 2022.3.12 and earlier allows an authenticated attacker to perform an SQL Injection, potentially resulting in unauthorized access to system resources.
[ "cpe:2.3:a:devolutions:devolutions_server:*:*:*:*:*:*:*:*" ]
null
8.8
null
null
GHSA-q7mc-fc87-v7w7
OpenRefine Server-Side Request Forgery vulnerability
OpenRefine <= v3.5.2 contains a Server-Side Request Forgery (SSRF) vulnerability, which permits unauthorized users to exploit the system, potentially leading to unauthorized access to internal resources and sensitive file disclosure.
[]
null
6.5
null
null
RHSA-2020:3219
Red Hat Security Advisory: kernel-rt security and bug fix update
kernel: lockdown: bypass through ACPI write via efivar_ssdt kernel: lockdown: bypass through ACPI write via acpi_configfs
[ "cpe:/a:redhat:enterprise_linux:8::nfv", "cpe:/a:redhat:enterprise_linux:8::realtime" ]
null
6.4
null
null
GHSA-rrcq-rghp-hjgx
Buffer overflows in brouted in FreeBSD and possibly other OSes allows local users to gain root privileges via long command line arguments.
[]
null
null
null
null
GHSA-rmj9-q58g-9qgg
go-unzip vulnerable to Path Traversal
Due to improper path santization, archives containing relative file paths can cause files to be written (or overwritten) outside of the target directory.
[]
null
9.1
null
null
GHSA-6hhx-86qx-9ffc
AdvancedLdapLodinMogule in Red Hat JBoss Enterprise Application Platform (EAP) before 6.4.1 allows attackers to obtain sensitive information via vectors involving logging the LDAP bind credential password when TRACE logging is enabled.
[]
null
null
5.9
null
ICSA-18-058-02
Delta Electronics WPLSoft
The application utilizes a fixed length stack buffer where a value larger than the buffer can be read from a file into the buffer, causing the buffer to be overwritten, which may allow remote code execution or cause the application to crash. CVE-2018-7494 has been assigned to this vulnerability. A CVSS v3 base score of 8.3 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:H). The application utilizes a fixed length heap buffer where a value larger than the buffer can be read from a file into the buffer, causing the buffer to be overwritten, which may allow remote code execution or cause the application to crash. CVE-2018-7507 has been assigned to this vulnerability. A CVSS v3 base score of 8.3 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:H). The application writes data from a file outside the bounds of the intended buffer space, which could cause memory corruption or may allow remote code execution. CVE-2018-7509 has been assigned to this vulnerability. A CVSS v3 base score of 8.3 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:H).
[]
null
null
8.3
null
GHSA-mf54-6363-29h5
Use-after-free vulnerability in Microsoft Internet Explorer 6 SP1, 6 SP2, and and 7 allows remote attackers to execute arbitrary code by assigning malformed values to certain properties, as demonstrated using the by property of an animateMotion SVG element, aka "Property Memory Corruption Vulnerability."
[]
null
8.8
null
null
GHSA-5h6p-h5p5-pf3v
BMC Control-M Software v9.0.20.200 was discovered to contain a SQL injection vulnerability via the report-id parameter at /report/deleteReport.
[]
null
9.8
null
null
GHSA-62qj-786m-q427
Cross Site Scripting vulnerability in Zucchetti Ad Hoc Infinity 2.4 allows an authenticated attacker to achieve Remote Code Execution via the /servlet/gsdm_fsave_htmltmp, /servlet/gsdm_btlk_openfile components
[]
null
5.4
null
null
CVE-2018-0566
Cybozu Office 10.0.0 to 10.8.0 allows authenticated attackers to bypass authentication to obtain the schedules without access privilege via unspecified vectors.
[ "cpe:2.3:a:cybozu:office:*:*:*:*:*:*:*:*" ]
null
null
4.3
4
CVE-2003-1335
Directory traversal vulnerability in Kai Blankenhorn Bitfolge simple and nice index file (aka snif) before 1.2.5 allows remote attackers to download files from locations above the snif directory.
[ "cpe:2.3:a:kai_blankenhorn_bitfolge:simple_and_nice_index_file:*:*:*:*:*:*:*:*" ]
null
null
null
5
CVE-2023-23703
WordPress Arconix Shortcodes Plugin <= 2.1.7 is vulnerable to Cross Site Scripting (XSS)
Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Tyche Softwares Arconix Shortcodes plugin <= 2.1.7 versions.
[ "cpe:2.3:a:tychesoftwares:arconix_shortcodes:*:*:*:*:*:wordpress:*:*" ]
null
6.5
null
null
GHSA-9f98-6r3f-jm6g
Improper input validation on input which is used as an array index will lead to an out of bounds issue while processing AP find event from firmware in Snapdragon Auto, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music in MDM9150, MDM9206, MDM9607, MDM9640, MDM9650, MSM8996AU, QCA6174A, QCA6574AU, QCA9377, QCA9379, SD 210/SD 212/SD 205, SD 625, SD 675, SD 712 / SD 710 / SD 670, SD 820, SD 820A, SD 845 / SD 850, SD 855, SDX20, SDX24, SM7150
[]
null
null
7.8
null
CVE-2006-3596
The device driver for Intel-based gigabit network adapters in Cisco Intrusion Prevention System (IPS) 5.1(1) through 5.1(p1), as installed on various Cisco Intrusion Prevention System 42xx appliances, allows remote attackers to cause a denial of service (kernel panic and possibly network outage) via a crafted IP packet.
[ "cpe:2.3:a:cisco:ips_sensor_software:5.1\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:ips_sensor_software:5.1\\(1a\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:ips_sensor_software:5.1\\(1b\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:ips_sensor_software:5.1\\(1c\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:ips_sensor_software:5.1\\(1d\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:ips_sensor_software:5.1\\(1e\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:ips_sensor_software:5.1\\(p1\\):*:*:*:*:*:*:*" ]
null
null
null
5
CVE-2020-20453
FFmpeg 4.2 is affected by a Divide By Zero issue via libavcodec/aaccoder, which allows a remote malicious user to cause a Denial of Service
[ "cpe:2.3:a:ffmpeg:ffmpeg:4.2:-:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*" ]
null
6.5
null
4
CVE-2016-10011
authfile.c in sshd in OpenSSH before 7.4 does not properly consider the effects of realloc on buffer contents, which might allow local users to obtain sensitive private-key information by leveraging access to a privilege-separated child process.
[ "cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*" ]
null
null
5.5
2.1
GHSA-x9c7-9xx2-4682
UPOINT @1 Event Publisher stores sensitive information under the web document root with insufifcient access control, which allows remote attackers to read private comments via a direct request to eventpublisher.txt.
[]
null
null
null
null
GHSA-vgcx-6544-9rp2
Tenda AC10 version US_AC10V4.0si_V16.03.10.13_cn was discovered to contain a stack overflow via the list parameter in the function sub_49E098.
[]
null
9.8
null
null
GHSA-gmmx-gqqf-wp2p
Arista EOS 4.15 before 4.15.8M, 4.16 before 4.16.7M, and 4.17 before 4.17.0F on DCS-7050 series devices allow remote attackers to cause a denial of service (device reboot) by sending crafted packets to the control plane.
[]
null
null
7.5
null
CVE-2019-11291
RabbitMQ XSS attack via federation and shovel endpoints
Pivotal RabbitMQ, 3.7 versions prior to v3.7.20 and 3.8 version prior to v3.8.1, and RabbitMQ for PCF, 1.16.x versions prior to 1.16.7 and 1.17.x versions prior to 1.17.4, contain two endpoints, federation and shovel, which do not properly sanitize user input. A remote authenticated malicious user with administrative access could craft a cross site scripting attack via the vhost or node name fields that could grant access to virtual hosts and policy management information.
[ "cpe:2.3:a:vmware:rabbitmq:*:*:*:*:*:pivotal_cloud_foundry:*:*", "cpe:2.3:a:vmware:rabbitmq:*:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:rabbitmq:3.8.0:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:openstack:15:*:*:*:*:*:*:*" ]
null
null
3.1
null
GHSA-g743-m34x-3m6h
Directory traversal vulnerability in Moreover.com cached_feed.cgi script version 4.July.00 allows remote attackers to read arbitrary files via a .. (dot dot) attack on the category or format parameters.
[]
null
null
null
null
CVE-2016-5878
Open redirect vulnerability in IBM FileNet Workplace 4.0.2 before 4.0.2.14 allows remote authenticated users to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors.
[ "cpe:2.3:a:ibm:filenet_workplace:4.0.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:filenet_workplace:4.0.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:filenet_workplace:4.0.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:filenet_workplace:4.0.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:filenet_workplace:4.0.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:filenet_workplace:4.0.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:filenet_workplace:4.0.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:filenet_workplace:4.0.2.7:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:filenet_workplace:4.0.2.8:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:filenet_workplace:4.0.2.9:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:filenet_workplace:4.0.2.10:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:filenet_workplace:4.0.2.11:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:filenet_workplace:4.0.2.12:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:filenet_workplace:4.0.2.13:*:*:*:*:*:*:*" ]
null
null
6.8
4.9
CVE-2021-37991
Race in V8 in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*" ]
null
7.5
null
5.1
GHSA-c6q8-fx49-c26r
The _bfd_elf_parse_attributes function in elf-attrs.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, allows remote attackers to cause a denial of service (_bfd_elf_attr_strdup heap-based buffer over-read and application crash) via a crafted ELF file.
[]
null
null
5.5
null
GHSA-8c44-wv8g-r976
Hospital Management System 1.0 was discovered to contain a SQL injection vulnerability via the pat_number parameter at his_admin_view_single_patient.php.
[]
null
8.8
null
null
GHSA-f5rw-5wqh-76m9
Multiple stored cross-site scripting (XSS) vulnerabilities in Emlog Pro v2.0.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Article Title or Article Summary parameters.
[]
null
5.4
null
null
CVE-2019-0254
SAP Disclosure Management (before version 10.1 Stack 1301) does not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability.
[ "cpe:2.3:a:sap:disclosure_management:*:*:*:*:*:*:*:*" ]
null
null
5.4
3.5
GHSA-h88v-572r-gvxx
The Happy Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Photo Stack Widget in all versions up to, and including, 3.10.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
6.4
null
null
RHSA-2023:4507
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform security update
jackson-databind: Possible DoS if using JDK serialization to serialize JsonNode jettison: Uncontrolled Recursion in JSONArray undertow: OutOfMemoryError due to @MultipartConfig handling
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el9" ]
null
7.5
null
null
GHSA-93gj-m35w-q9v5
Improper Access Control in Samsung Voice Recorder prior to versions 21.4.15.01 in Android 12 and Android 13, 21.4.50.17 in Android 14 allows physical attackers to access Voice Recorder information on the lock screen.
[]
null
6.8
null
null
CVE-2022-2413
Slide Anything < 2.3.47 - Author+ Cross Site Scripting in slide title
The Slide Anything WordPress plugin before 2.3.47 does not properly sanitize or escape the slide title before outputting it in the admin pages, allowing a logged in user with roles as low as Author to inject a javascript payload into the slide title even when the unfiltered_html capability is disabled.
[ "cpe:2.3:a:simonpedge:slide_anything:*:*:*:*:*:wordpress:*:*" ]
null
5.4
null
null
GHSA-43rp-qmpv-m433
In libpbc.a in PBC through 2017-03-02, there is a Segmentation fault in _pbcB_register_fields in bootstrap.c.
[]
null
9.8
null
null
CVE-2021-39761
In Media, there is a possible way to determine whether an app is installed, without query permissions, due to side channel information disclosure. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-179783181
[ "cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*" ]
null
5.5
null
2.1
CVE-2018-1431
A vulnerability in GSKit affects IBM Spectrum Scale 4.1.1, 4.2.0, 4.2.1, 4.2.3, and 5.0.0 that could allow a local attacker to obtain control of the Spectrum Scale daemon and to access and modify files in the Spectrum Scale file system, and possibly to obtain administrator privileges on the node. IBM X-Force ID: 139240.
[ "cpe:2.3:a:ibm:general_parallel_file_system:*:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:spectrum_scale:*:*:*:*:*:*:*:*" ]
null
null
7.4
null
PYSEC-2020-161
null
A flaw was found in the solaris_zone module from the Ansible Community modules. When setting the name for the zone on the Solaris host, the zone name is checked by listing the process with the 'ps' bare command on the remote machine. An attacker could take advantage of this flaw by crafting the name of the zone and executing arbitrary commands in the remote host. Ansible Engine 2.7.15, 2.8.7, and 2.9.2 as well as previous versions are affected.
[]
null
null
null
null
CVE-2024-30426
WordPress Hash Elements plugin <= 1.3.3 - Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in HashThemes Hash Elements allows Stored XSS.This issue affects Hash Elements: from n/a through 1.3.3.
[]
null
6.5
null
null
GHSA-w7fm-92w5-g2m4
Dell EMC ECS, versions prior to 3.5, contains an Exposure of Resource vulnerability. A remote unauthenticated attacker can access the list of DT (Directory Table) objects of all internally running services and gain knowledge of sensitive data of the system.
[]
null
null
null
null
GHSA-7m75-fp2v-fxr7
In cta, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07025415; Issue ID: ALPS07025415.
[]
null
7.8
null
null
RHSA-2022:4800
Red Hat Security Advisory: rsyslog security update
rsyslog: Heap-based overflow in TCP syslog server
[ "cpe:/a:redhat:rhel_eus:8.2::appstream" ]
null
8.1
null
null
CVE-2013-5051
Microsoft Internet Explorer 10 and 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."
[ "cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*" ]
null
null
null
9.3
CVE-2016-6308
statem/statem_dtls.c in the DTLS implementation in OpenSSL 1.1.0 before 1.1.0a allocates memory before checking for an excessive length, which might allow remote attackers to cause a denial of service (memory consumption) via crafted DTLS messages.
[ "cpe:2.3:a:openssl:openssl:1.1.0:*:*:*:*:*:*:*" ]
null
null
5.9
7.1
CVE-2020-27696
Trend Micro Security 2020 (Consumer) contains a vulnerability in the installer package that could be exploited by placing a specific Windows system directory which can lead to obtaining administrative privileges during the installation of the product.
[ "cpe:2.3:a:trendmicro:antivirus\\+_security_2020:*:*:*:*:*:*:*:*", "cpe:2.3:a:trendmicro:internet_security_2020:*:*:*:*:*:*:*:*", "cpe:2.3:a:trendmicro:maximum_security_2020:*:*:*:*:*:*:*:*", "cpe:2.3:a:trendmicro:premium_security_2020:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
7.8
null
6.9
CVE-2014-2103
Cisco Intrusion Prevention System (IPS) Software allows remote attackers to cause a denial of service (MainApp process outage) via malformed SNMP packets, aka Bug IDs CSCum52355 and CSCul49309.
[ "cpe:2.3:a:cisco:intrusion_prevention_system:5.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:intrusion_prevention_system:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:intrusion_prevention_system:6.0.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:intrusion_prevention_system:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:intrusion_prevention_system:7.0\\(1\\)e3:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:intrusion_prevention_system:7.0\\(2\\)e3:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:intrusion_prevention_system:7.0\\(2\\)e4:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:intrusion_prevention_system:7.0\\(3\\)e4:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:intrusion_prevention_system:7.0\\(4\\)e4:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:intrusion_prevention_system:7.0\\(5a\\)e4:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:intrusion_prevention_system:7.0\\(6\\)e4:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:intrusion_prevention_system:7.0\\(7\\)e4:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:intrusion_prevention_system:7.0\\(8\\)e4:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:intrusion_prevention_system:7.0\\(9\\)e4:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:intrusion_prevention_system:7.1:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:intrusion_prevention_system:*:*:*:*:*:*:*:*" ]
null
null
null
6.8
GHSA-6g49-f785-8862
An improper restriction of xml external entity reference in Fortinet FortiNAC version 9.4.0 through 9.4.1, FortiNAC version 9.2.0 through 9.2.7, FortiNAC version 9.1.0 through 9.1.8, FortiNAC version 8.8.0 through 8.8.11, FortiNAC version 8.7.0 through 8.7.6, FortiNAC version 8.6.0 through 8.6.5, FortiNAC version 8.5.0 through 8.5.4, FortiNAC version 8.3.7 allows attacker to read arbitrary files or trigger a denial of service via specifically crafted XML documents.
[]
null
9.1
null
null
CVE-2020-14746
Vulnerability in the Oracle Applications Framework product of Oracle E-Business Suite (component: Popup windows). Supported versions that are affected are 12.1.3 and 12.2.3 - 12.2.10. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Applications Framework. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Applications Framework, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Applications Framework accessible data. CVSS 3.1 Base Score 4.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N).
[ "cpe:2.3:a:oracle:applications_framework:*:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:applications_framework:12.1.3:*:*:*:*:*:*:*" ]
null
4.7
null
null
CVE-2018-17176
A replay issue was discovered on Neato Botvac Connected 2.2.0 devices. Manual control mode requires authentication, but once recorded, the authentication (always transmitted in cleartext) can be replayed to /bin/webserver on port 8081. There are no nonces, and timestamps are not checked at all.
[ "cpe:2.3:o:neatorobotics:botvac_d4_connected_firmware:2.2.0:*:*:*:*:*:*:*", "cpe:2.3:h:neatorobotics:botvac_d4_connected:-:*:*:*:*:*:*:*", "cpe:2.3:o:neatorobotics:botvac_d6_connected_firmware:2.2.0:*:*:*:*:*:*:*", "cpe:2.3:h:neatorobotics:botvac_d6_connected:-:*:*:*:*:*:*:*", "cpe:2.3:o:neatorobotics:botvac_d7_connected_firmware:2.2.0:*:*:*:*:*:*:*", "cpe:2.3:h:neatorobotics:botvac_d7_connected:-:*:*:*:*:*:*:*" ]
null
null
7.5
5
GHSA-qr9w-4vx5-7gf3
Cross-site request forgery (CSRF) vulnerability in HP Systems Insight Manager (SIM) before 6.3 allows remote attackers to hijack the authentication of unspecified victims via unknown vectors.
[]
null
null
null
null
GHSA-3h69-fjjv-586m
Buffer overflow in XiongMai uc-httpd 1.0.0 has unspecified impact and attack vectors, a different vulnerability than CVE-2017-16725.
[]
null
null
9.8
null
GHSA-6hm2-c6p5-fc7q
A remote code execution vulnerability in the Android system ui. Product: Android. Versions: 7.1.1, 7.1.2. Android ID: A-35639138.
[]
null
null
7.8
null
CVE-2018-1369
IBM Security Guardium Big Data Intelligence (SonarG) 3.1 stores sensitive information in URL parameters. This may lead to information disclosure if unauthorized parties have access to the URLs via server logs, referrer header or browser history. IBM X-Force ID: 137767.
[ "cpe:2.3:a:ibm:security_guardium_big_data_intelligence:3.1:*:*:*:*:*:*:*" ]
null
null
3.7
null
GHSA-qhxf-m7jm-jc57
CSRF vulnerability in Pipeline GitHub Notify Step Plugin allows capturing credentials
A cross-site request forgery vulnerability in Jenkins Pipeline GitHub Notify Step Plugin 1.0.4 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
[]
null
7.1
null
null
GHSA-gp94-rxvr-x5cx
Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK & Compiler before 20.0.0.260 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0964, CVE-2016-0965, CVE-2016-0967, CVE-2016-0968, CVE-2016-0969, CVE-2016-0970, CVE-2016-0972, CVE-2016-0976, CVE-2016-0977, CVE-2016-0978, CVE-2016-0979, CVE-2016-0980, and CVE-2016-0981.
[]
null
null
9.8
null
RHSA-2020:2291
Red Hat Security Advisory: kpatch-patch security update
kernel: use-after-free in __blk_add_trace in kernel/trace/blktrace.c Kernel: NetLabel: null pointer dereference while receiving CIPSO packet with null category may cause kernel panic
[ "cpe:/o:redhat:rhel_eus:7.6::server" ]
null
5.9
null
null
CVE-2024-23688
Consensys Discovery Nonce Reuse
Consensys Discovery versions less than 0.4.5 uses the same AES/GCM nonce for the entire session. which should ideally be unique for every message. The node's private key isn't compromised, only the session key generated for specific peer communication is exposed.
[ "cpe:2.3:a:consensys:discovery:*:*:*:*:*:*:*:*" ]
null
5.3
null
null
GHSA-3gjj-f2w8-w88q
modules/rlm_unix/rlm_unix.c in FreeRADIUS before 2.2.0, when unix mode is enabled for user authentication, does not properly check the password expiration in /etc/shadow, which allows remote authenticated users to authenticate using an expired password.
[]
null
null
null
null