id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
197k
cpes
sequencelengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
GHSA-j6j6-rqgq-38xw
IBM Maximo Asset Management 7.5 and 7.6 generates error messages that could reveal sensitive information that could be used in further attacks against the system. IBM X-Force ID: 125153.
[]
null
null
5.3
null
CVE-2021-22205
An issue has been discovered in GitLab CE/EE affecting all versions starting from 11.9. GitLab was not properly validating image files that were passed to a file parser which resulted in a remote command execution.
[ "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*" ]
null
10
null
null
GHSA-c8x5-69w4-954r
In TrustZone in all Android releases from CAF using the Linux kernel, an Information Exposure Through Timing Discrepancy vulnerability could potentially exist.
[]
null
null
5.5
null
GHSA-3g9w-ghrc-hc72
In ARM mbed TLS before 2.7.0, there is a bounds-check bypass through an integer overflow in PSK identity parsing in the ssl_parse_client_psk_identity() function in library/ssl_srv.c.
[]
null
null
9.8
null
CVE-2007-5939
The gss_userok function in appl/ftp/ftpd/gss_userok.c in Heimdal 0.7.2 does not allocate memory for the ticketfile pointer before calling free, which allows remote attackers to have an unknown impact via an invalid username. NOTE: the vulnerability was originally reported for ftpd.c, but this is incorrect.
[ "cpe:2.3:a:heimdal:heimdal:0.7.2:*:*:*:*:*:*:*" ]
null
null
null
10
GHSA-c5qg-72q9-j764
There is a Vulnerability of obtaining broadcast information improperly due to improper broadcast permission settings in Smartphones.Successful exploitation of this vulnerability may affect service confidentiality.
[]
null
7.5
null
null
RHSA-2024:4479
Red Hat Security Advisory: OpenShift Container Platform 4.14.33 bug fix and security update
ssh: Prefix truncation attack on Binary Packet Protocol (BPP) go-retryablehttp: url might write sensitive information to log file openssh: regreSSHion - race condition in SSH allows RCE/DoS
[ "cpe:/a:redhat:openshift:4.14::el8", "cpe:/a:redhat:openshift:4.14::el9" ]
null
8.1
null
null
GHSA-m5xw-hwxw-fq3j
Deserialization of untrusted data in IPC and Parquet readers in the Apache Arrow R package versions 4.0.0 through 16.1.0 allows arbitrary code execution. An application is vulnerable if it reads Arrow IPC, Feather or Parquet data from untrusted sources (for example, user-supplied input files). This vulnerability only affects the arrow R package, not other Apache Arrow implementations or bindings unless those bindings are specifically used via the R package (for example, an R application that embeds a Python interpreter and uses PyArrow to read files from untrusted sources is still vulnerable if the arrow R package is an affected version). It is recommended that users of the arrow R package upgrade to 17.0.0 or later. Similarly, it is recommended that downstream libraries upgrade their dependency requirements to arrow 17.0.0 or later. If using an affected version of the package, untrusted data can read into a Table and its internal to_data_frame() method can be used as a workaround (e.g., read_parquet(..., as_data_frame = FALSE)$to_data_frame()).This issue affects the Apache Arrow R package: from 4.0.0 through 16.1.0.Users are recommended to upgrade to version 17.0.0, which fixes the issue.
[]
null
9.8
null
null
CVE-2025-26921
WordPress Booking and Rental Manager Plugin <= 2.2.6 - PHP Object Injection vulnerability
Deserialization of Untrusted Data vulnerability in magepeopleteam Booking and Rental Manager allows Object Injection. This issue affects Booking and Rental Manager: from n/a through 2.2.6.
[]
null
8.8
null
null
CVE-2025-23042
Gradio Blocked Path ACL Bypass Vulnerability
Gradio is an open-source Python package that allows quick building of demos and web application for machine learning models, API, or any arbitrary Python function. Gradio's Access Control List (ACL) for file paths can be bypassed by altering the letter case of a blocked file or directory path. This vulnerability arises due to the lack of case normalization in the file path validation logic. On case-insensitive file systems, such as those used by Windows and macOS, this flaw enables attackers to circumvent security restrictions and access sensitive files that should be protected. This issue can lead to unauthorized data access, exposing sensitive information and undermining the integrity of Gradio's security model. Given Gradio's popularity for building web applications, particularly in machine learning and AI, this vulnerability may pose a substantial threat if exploited in production environments. This issue has been addressed in release version 5.6.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.
[]
8.7
null
null
null
CVE-2008-2793
SQL injection vulnerability in group_posts.php in ClipShare before 3.0.1 allows remote attackers to execute arbitrary SQL commands via the tid parameter.
[ "cpe:2.3:a:clip-share:clipshare:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2016-8008
Privilege escalation vulnerability in Windows 7 and Windows 10 in McAfee Security Scan Plus (SSP) 3.11.376 allows attackers to load a replacement of the version.dll file via McAfee McUICnt.exe onto a Windows system.
[ "cpe:2.3:a:mcafee:security_scan_plus:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*" ]
null
null
8.8
7.2
RHSA-2021:0765
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
kernel: bad kfree in auditfilter.c may lead to escalation of privilege kernel: performance counters race condition use-after-free kernel: Local buffer overflow in ctnetlink_parse_tuple_filter in net/netfilter/nf_conntrack_netlink.c kernel: ICMP rate limiting can be used for DNS poisoning attack kernel: locking issue in drivers/tty/tty_jobctrl.c can lead to an use-after-free
[ "cpe:/a:redhat:rhel_eus:8.2::crb", "cpe:/o:redhat:rhel_eus:8.2::baseos" ]
null
7.8
null
null
CVE-2021-24333
Content Copy Protection & Prevent Image Save <= 1.3 - CSRF to Stored Cross-Site Scripting (XSS)
The Content Copy Protection & Prevent Image Save WordPress plugin through 1.3 does not check for CSRF when saving its settings, not perform any validation and sanitisation on them, allowing attackers to make a logged in administrator set arbitrary XSS payloads in them.
[ "cpe:2.3:a:content_copy_protection_\\&_prevent_image_save_project:content_copy_protection_\\&_prevent_image_save:*:*:*:*:*:wordpress:*:*" ]
null
6.5
null
4.3
GHSA-xh3c-49q5-vp78
lunary-ai/lunary version 1.0.0 is vulnerable to unauthorized evaluation creation due to missing server-side checks for user account status during evaluation creation. While the web UI restricts evaluation creation to paid accounts, the server-side API endpoint '/v1/evaluations' does not verify if the user has a paid account, allowing users with free or self-hosted accounts to create unlimited evaluations without upgrading their account. This vulnerability is due to the lack of account status validation in the evaluation creation process.
[]
null
null
5.3
null
GHSA-pp9v-vrjh-4q7m
The protection bypass vulnerability in DLP for Windows 11.9.x is addressed in version 11.10.0. This allowed a local user to bypass DLP controls when uploading sensitive data from a mapped drive into a web email client. Loading from a local driver was correctly prevented. Versions prior to 11.9 correctly detected and blocked the attempted upload of sensitive data.
[]
null
8.2
null
null
GHSA-w792-393v-4wjj
Directory traversal vulnerability in Microsoft Internet Explorer allows remote attackers to read arbitrary files via directory traversal sequences in a URI with a certain scheme, possibly related to "..%5C" (encoded backslash) sequences.
[]
null
null
null
null
CVE-2022-1033
Unrestricted Upload of File with Dangerous Type in crater-invoice/crater
Unrestricted Upload of File with Dangerous Type in GitHub repository crater-invoice/crater prior to 6.0.6.
[ "cpe:2.3:a:craterapp:crater:*:*:*:*:*:*:*:*" ]
null
null
7.2
null
GHSA-g87c-v886-hqf3
An out-of-bounds read was addressed with improved input validation. This issue is fixed in macOS Catalina 10.15.3. A remote attacker may be able to leak memory.
[]
null
null
null
null
GHSA-9r44-rxj7-mwq3
IBM Cognos Controller 10.4.1, 10.4.2, and 11.0.0 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 190837.
[]
null
5.9
null
null
GHSA-qw3g-35hc-fcrh
Cross-Site Scripting (XSS) in restify
Affected versions of `restify` are susceptible to a cross-site scripting vulnerability when using URL encoded script tags in a non-existent URL.Proof of Concept:RequestWill be included in response:```<script>alert(73541);</script>```RecommendationUpdate to version 4.1.0 or later.
[]
null
null
6.1
null
cisco-sa-uccx-xss-GO9L9xxr
Cisco Unified Contact Center Express Stored Cross-Site Scripting Vulnerability
A vulnerability in the web-based management interface of Cisco Unified Contact Center Express (Unified CCX) could allow an authenticated, remote attacker to perform a stored cross-site scripting (XSS) attack. This vulnerability is due to insufficient input validation of user-supplied data. An attacker could exploit this vulnerability by entering crafted text into various input fields within the web-based management interface. A successful exploit could allow the attacker to perform a stored XSS attack, which could allow the execution of scripts within the context of other users of the interface. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
[]
null
5.4
null
null
RHSA-2025:8183
Red Hat Security Advisory: gstreamer1-plugins-bad-free security update
GStreamer: GStreamer H265 Codec Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
8.8
null
null
GHSA-q77x-cxrq-988j
Jenkins Azure VM Agents Plugin missing permission checks
Jenkins Azure VM Agents Plugin 852.v8d35f0960a_43 and earlier does not perform permission checks in several HTTP endpoints.This allows attackers with Overall/Read permission to connect to an attacker-specified Azure Cloud server using attacker-specified credentials IDs obtained through another method.Additionally, these HTTP endpoints do not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability.Azure VM Agents Plugin 853.v4a_1a_dd947520 requires POST requests and the appropriate permissions for the affected HTTP endpoints.
[]
null
4.3
null
null
GHSA-9gp7-jvm2-r4mx
Apache Struts Improper Input Validation vulnerability
If an application allows enter an URL in a form field and built-in URLValidator is used, it is possible to prepare a special URL which will be used to overload server process when performing validation of the URL. Solution is to upgrade to Apache Struts version 2.5.12.
[]
null
null
5.9
null
CVE-2019-6265
The Scripting and AutoUpdate functionality in Cordaware bestinformed Microsoft Windows client versions before 6.2.1.0 are affected by insecure implementations which allow remote attackers to execute arbitrary commands and escalate privileges.
[ "cpe:2.3:a:cordaware:bestinformed:*:*:*:*:*:windows:*:*" ]
null
null
7.8
4.6
GHSA-vqc6-2j8r-xqpr
Vulnerability in the Oracle Outside In Technology component of Oracle Fusion Middleware (subcomponent: Outside In Filters ). Supported versions that are affected are 8.5.2 and 8.5.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Outside In Technology. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Outside In Technology accessible data as well as unauthorized update, insert or delete access to some of Oracle Outside In Technology accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Outside In Technology. Note: Outside In Technology is a suite of software development kits (SDKs). The protocol and CVSS score depend on the software that uses the Outside In Technology code. The CVSS score assumes that the software passes data received over a network directly to Outside In Technology code, but if data is not received over a network the CVSS score may be lower. CVSS v3.0 Base Score 8.6 (Confidentiality, Integrity and Availability impacts).
[]
null
null
8.6
null
GHSA-prj7-2jhj-62fj
In some cases, Kea log files or lease files may be world-readable. This issue affects Kea versions 2.4.0 through 2.4.1, 2.6.0 through 2.6.2, and 2.7.0 through 2.7.8.
[]
null
4
null
null
GHSA-qg4c-8pj4-qgw2
A use-after-free vulnerability was found in libxml2. This issue occurs when parsing XPath elements under certain circumstances when the XML schematron has the <sch:name path="..."/> schema elements. This flaw allows a malicious actor to craft a malicious XML document used as input for libxml, resulting in the program's crash using libxml or other possible undefined behaviors.
[]
null
9.1
null
null
CVE-2015-7761
Mail in Apple OS X before 10.11 does not properly recognize user preferences, which allows attackers to obtain sensitive information via an unspecified action during the printing of an e-mail message, a different vulnerability than CVE-2015-7760.
[ "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*" ]
null
null
null
5
GHSA-4fhw-67rp-wjhj
Heap-based buffer overflow in Adobe Flash Player before 13.0.0.252 and 14.x and 15.x before 15.0.0.223 on Windows and OS X and before 11.2.202.418 on Linux, Adobe AIR before 15.0.0.356, Adobe AIR SDK before 15.0.0.356, and Adobe AIR SDK & Compiler before 15.0.0.356 allows attackers to complete a transition from Low Integrity to Medium Integrity via unspecified vectors.
[]
null
null
null
null
CVE-2014-1265
The systemsetup program in the Date and Time subsystem in Apple OS X before 10.9.2 allows local users to bypass intended access restrictions by changing the current time on the system clock.
[ "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.7.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.7.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.7.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.7.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.7.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.7.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.8.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.8.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.8.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.8.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.8.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.8.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.8.5:supplemental_update:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.9:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.7.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.7.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.7.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.7.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.7.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.7.5:*:*:*:*:*:*:*" ]
null
null
null
4.6
CVE-2007-5625
Cross-site scripting (XSS) vulnerability in filename.asp in ASP Site Search SearchSimon Lite 1.0 allows remote attackers to inject arbitrary web script or HTML via the QUERY parameter.
[ "cpe:2.3:a:simongibson:asp_site_search_searchsimon_lite:1.0:*:*:*:*:*:*:*" ]
null
null
null
4.3
GHSA-p4cv-qgmg-7q4w
The WordPress Single Sign-On (SSO) plugin for WordPress is vulnerable to unauthorized access due to a misconfigured capability check on a function in all versions up to, and including, the *.5.3 versions of the plugin. This makes it possible for unauthenticated attackers to extract sensitive data including site content that has been restricted to certain users and/or roles.
[]
null
5.3
null
null
CVE-2021-39035
IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.0.3.5, 6.1.0.0 through 6.1.0.4, and 6.1.1.0 through 6.1.1.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 213965.
[ "cpe:2.3:a:ibm:sterling_b2b_integrator:*:*:*:*:standard:*:*:*", "cpe:2.3:o:hp:hp-ux:-:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:aix:-:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "cpe:2.3:o:oracle:solaris:-:*:*:*:*:*:-:*" ]
null
null
5.4
null
GHSA-9m8g-jq9x-h3f8
Vulnerability in the BI Publisher (formerly XML Publisher) component of Oracle Fusion Middleware (subcomponent: BI Publisher Security). The supported version that is affected is 11.1.1.9.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise BI Publisher (formerly XML Publisher). While the vulnerability is in BI Publisher (formerly XML Publisher), attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of BI Publisher (formerly XML Publisher) accessible data as well as unauthorized read access to a subset of BI Publisher (formerly XML Publisher) accessible data. CVSS 3.0 Base Score 7.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N).
[]
null
null
null
null
GHSA-vcgf-5qvw-2fwc
SWFTools commit 772e55a2 was discovered to contain a heap-buffer overflow via draw_stroke at /gfxpoly/stroke.c.
[]
null
5.5
null
null
CVE-2015-6114
Microsoft Silverlight 5 before 5.1.41105.00 allows remote attackers to bypass the ASLR protection mechanism via a crafted web site, aka "Microsoft Silverlight Information Disclosure Vulnerability," a different vulnerability than CVE-2015-6165.
[ "cpe:2.3:a:microsoft:silverlight:5.0:*:*:*:*:*:*:*" ]
null
null
null
4.3
CVE-2018-8792
rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in function cssp_read_tsrequest() that results in a Denial of Service (segfault).
[ "cpe:2.3:a:rdesktop:rdesktop:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" ]
null
null
7.5
5
CVE-2023-52472
crypto: rsa - add a check for allocation failure
In the Linux kernel, the following vulnerability has been resolved: crypto: rsa - add a check for allocation failure Static checkers insist that the mpi_alloc() allocation can fail so add a check to prevent a NULL dereference. Small allocations like this can't actually fail in current kernels, but adding a check is very simple and makes the static checkers happy.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
null
5.5
null
null
GHSA-48fj-hh68-6w6q
Replay Attackin ABB, Busch-Jaeger, FTS Display (version 1.00) and BCU (version 1.3.0.33) allows attacker to capture/replay KNX telegram to local KNX Bus-System
[]
7.3
9.2
null
null
CVE-2019-0671
A remote code execution vulnerability exists when the Microsoft Office Access Connectivity Engine improperly handles objects in memory, aka 'Microsoft Office Access Connectivity Engine Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-0672, CVE-2019-0673, CVE-2019-0674, CVE-2019-0675.
[ "cpe:2.3:a:microsoft:office:2010:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2013:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2013:sp1:*:*:rt:*:*:*", "cpe:2.3:a:microsoft:office:2016:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office_365_proplus:-:*:*:*:*:*:*:*" ]
null
null
7.8
9.3
GHSA-p988-h6pg-9xrg
Directory traversal vulnerability in DJcalendar.cgi in DJCalendar allows remote attackers to read arbitrary files via a .. (dot dot) in the TEMPLATE parameter.
[]
null
null
null
null
CVE-2024-43747
Adobe Experience Manager | Cross-site Scripting (Stored XSS) (CWE-79)
Adobe Experience Manager versions 6.5.21 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
[ "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*", "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*" ]
null
5.4
null
null
GHSA-r9c2-8gff-gw8f
Multiple unknown vulnerabilities in the (1) DHCP and (2) Telnet dissectors in Ethereal before 0.10.11 allow remote attackers to cause a denial of service (abort).
[]
null
null
null
null
CVE-2019-1439
An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory, aka 'Windows GDI Information Disclosure Vulnerability'.
[ "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*" ]
null
6.5
null
4.3
GHSA-rq43-vgrv-48m9
Insufficient memory write check in SMM service for EDK II may allow an authenticated user to potentially enable escalation of privilege, information disclosure and/or denial of service via local access.
[]
null
null
6.7
null
GHSA-hmvg-cx6j-hfj7
In the Linux kernel, the following vulnerability has been resolved:tomoyo: fix UAF write bug in tomoyo_write_control()Since tomoyo_write_control() updates head->write_buf when write() of long lines is requested, we need to fetch head->write_buf after head->io_sem is held. Otherwise, concurrent write() requests can cause use-after-free-write and double-free problems.
[]
null
7.8
null
null
CVE-2021-45815
Quectel UC20 UMTS/HSPA+ UC20 6.3.14 is affected by a Cross Site Scripting (XSS) vulnerability.
[ "cpe:2.3:o:quectel:uc20_firmware:6.3.14:*:*:*:*:*:*:*", "cpe:2.3:h:quectel:uc20:*:*:*:*:*:*:*:*" ]
null
6.1
null
4.3
CVE-2014-5238
XML external entity (XXE) vulnerability in Open-Xchange (OX) AppSuite before 7.4.2-rev11 and 7.6.x before 7.6.0-rev9 allows remote attackers to read arbitrary files and possibly other unspecified impact via a crafted OpenDocument Text document.
[ "cpe:2.3:a:open-xchange:open-xchange_appsuite:*:*:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.4.2:revision1:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.4.2:revision10:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.4.2:revision2:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.4.2:revision3:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.4.2:revision4:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.4.2:revision5:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.4.2:revision6:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.4.2:revision7:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.4.2:revision8:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.4.2:revision9:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.0:revision1:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.0:revision2:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.0:revision3:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.0:revision4:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.0:revision5:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.0:revision6:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.0:revision7:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.0:revision8:*:*:*:*:*:*" ]
null
7.8
null
6.8
GHSA-pwq7-q338-mgmf
The Mozilla Updater can be made to choose an arbitrary target working directory for output files resulting from the update process. This vulnerability requires local system access. Note: this issue only affects Windows operating systems. This vulnerability affects Thunderbird < 45.5, Firefox ESR < 45.5, and Firefox < 50.
[]
null
null
5.5
null
CVE-2020-22673
Memory leak in the senc_Parse function in MP4Box in gpac 0.8.0 allows attackers to cause a denial of service (DoS) via a crafted input.
[ "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*" ]
null
5.5
null
4.3
CVE-2018-9544
In register_app of btif_hd.cc, there is a possible out-of-bounds read due to a missing bounds check. This could lead to local information disclosure in the Bluetooth service with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android-9. Android ID: A-113037220
[ "cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*" ]
null
null
5.5
2.1
CVE-2001-0293
Directory traversal vulnerability in FtpXQ FTP server 2.0.93 allows remote attackers to read arbitrary files via a .. (dot dot) in the GET command.
[ "cpe:2.3:a:datawizard:ftpxq:2.0.93:*:*:*:*:*:*:*" ]
null
null
null
5
GHSA-v875-jf7g-hg8j
Heap buffer overflow in Blink in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
[]
null
null
null
null
CVE-2005-4799
Multiple cross-site scripting (XSS) vulnerabilities in Yet Another PHP Image Gallery (YaPIG) 0.95b and earlier allow remote attackers to inject arbitrary web script or HTML via (1) the Homepage field (aka the Website field) in an "image-related comment" and (2) the img_size field in view.php. NOTE: due to lack of details from the researcher, it is not clear whether the comment vector overlaps CVE-2005-1886.
[ "cpe:2.3:a:yapig:yapig:*:*:*:*:*:*:*:*", "cpe:2.3:a:yapig:yapig:0.92b:*:*:*:*:*:*:*", "cpe:2.3:a:yapig:yapig:0.93u:*:*:*:*:*:*:*", "cpe:2.3:a:yapig:yapig:0.94u:*:*:*:*:*:*:*", "cpe:2.3:a:yapig:yapig:0.95:*:*:*:*:*:*:*" ]
null
null
null
5.1
CVE-2020-7485
**VERSION NOT SUPPORTED WHEN ASSIGNED** A legacy support account in the TriStation software version v4.9.0 and earlier could cause improper access to the TriStation host machine. This was addressed in TriStation version v4.9.1 and v4.10.1 released on May 30, 2013.1
[ "cpe:2.3:a:schneider-electric:tristation_1131:*:*:*:*:*:*:*:*", "cpe:2.3:a:schneider-electric:tristation_1131:4.10.0:*:*:*:*:*:*:*", "cpe:2.3:a:schneider-electric:tristation_1131:4.12.0:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_nt:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:-:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
CVE-2020-2193
Jenkins ECharts API Plugin 4.7.0-3 and earlier does not escape the parser identifier when rendering charts, resulting in a stored cross-site scripting vulnerability.
[ "cpe:2.3:a:jenkins:echarts_api:*:*:*:*:*:jenkins:*:*" ]
null
5.4
null
3.5
CVE-2005-4497
Cross-site scripting (XSS) vulnerability in Tangora Portal CMS 4.0 and earlier allows remote attackers to inject arbitrary web script or HTML via the action parameter in a search page, as demonstrated using (1) page1631.aspx and (2) page496.aspx.
[ "cpe:2.3:a:tangora:tangora_portal_cms:*:*:*:*:*:*:*:*" ]
null
null
null
4.3
RHSA-2024:8118
Red Hat Security Advisory: OpenJDK 8u432 Security Update for Portable Linux Builds
giflib: Heap-Buffer Overflow during Image Saving in DumpScreen2RGB Function JDK: HTTP client improper handling of maxHeaderSize (8328286) JDK: Array indexing integer overflow (8328544) JDK: Unbounded allocation leads to out-of-memory error (8331446) JDK: Integer conversion error leads to incorrect range check (8332644)
[ "cpe:/a:redhat:openjdk:1.8" ]
null
4.8
null
null
RHSA-2020:2320
Red Hat Security Advisory: rh-maven35-jackson-databind security update
jackson-databind: Serialization gadgets in org.springframework:spring-aop jackson-databind: Serialization gadgets in commons-jelly:commons-jelly
[ "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
8.1
null
null
GHSA-rjmm-pv9x-pm33
Cross-site scripting (XSS) vulnerability in WCONSOLE.DLL in Rockliffe MailSite 5.x and 6.1.22 and earlier allows remote attackers to inject arbitrary web script or HTML via the query string.
[]
null
null
null
null
cisco-sa-ucsfi-imm-syn-p6kZTDQC
Cisco UCS 6400 and 6500 Series Fabric Interconnects Intersight Managed Mode Denial of Service Vulnerability
A vulnerability in system resource management in Cisco UCS 6400 and 6500 Series Fabric Interconnects that are in Intersight Managed Mode (IMM) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on the Device Console UI of an affected device. This vulnerability is due to insufficient rate-limiting of TCP connections to an affected device. An attacker could exploit this vulnerability by sending a high number of TCP packets to the Device Console UI. A successful exploit could allow an attacker to cause the Device Console UI process to crash, resulting in a DoS condition. A manual reload of the fabric interconnect is needed to restore complete functionality. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
[]
null
5.3
null
null
CVE-2024-8078
TOTOLINK AC1200 T8 setTracerouteCfg buffer overflow
A vulnerability was found in TOTOLINK AC1200 T8 4.1.5cu.862_B20230228. It has been declared as critical. This vulnerability affects the function setTracerouteCfg. The manipulation leads to buffer overflow. The attack can be initiated remotely. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
[ "cpe:2.3:h:totolink:ac1200_t8:4.1.5cu.862_b20230228:*:*:*:*:*:*:*", "cpe:2.3:o:totolink:t8_firmware:4.1.5cu.862_b20230228:*:*:*:*:*:*:*", "cpe:2.3:h:totolink:t8:-:*:*:*:*:*:*:*" ]
8.7
8.8
8.8
9
CVE-2012-1723
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, and 1.4.2_37 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Hotspot.
[ "cpe:2.3:a:oracle:jdk:*:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.5.0:-:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.5.0:update1:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.5.0:update10:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.5.0:update11:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.5.0:update12:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.5.0:update13:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.5.0:update14:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.5.0:update15:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.5.0:update16:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.5.0:update17:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.5.0:update18:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.5.0:update19:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.5.0:update2:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.5.0:update20:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.5.0:update21:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.5.0:update22:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.5.0:update23:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.5.0:update24:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.5.0:update25:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.5.0:update26:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.5.0:update27:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.5.0:update28:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.5.0:update29:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.5.0:update3:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.5.0:update30:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.5.0:update31:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.5.0:update32:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.5.0:update33:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.5.0:update34:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.5.0:update35:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:-:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update1:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update10:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update11:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update12:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update13:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update14:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update15:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update16:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update17:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update18:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update19:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update2:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update20:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update21:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update22:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update23:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update24:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update25:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update26:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update27:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update29:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update3:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update30:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update31:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update32:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update32_b31:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update32_b32:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:-:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update1:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update2:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update3:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update4:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:*:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:-:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:update1:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:update10:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:update11:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:update12:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:update13:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:update14:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:update15:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:update16:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:update17:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:update18:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:update19:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:update2:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:update20:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:update21:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:update22:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:update23:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:update24:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:update25:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:update26:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:update27:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:update28:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:update29:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:update3:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:update30:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:update31:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:update32:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:update33:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:update34:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:update35:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:-:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update1:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update10:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update11:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update12:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update13:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update14:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update15:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update16:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update17:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update18:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update19:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update2:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update20:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update21:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update22:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update23:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update24:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update25:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update26:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update27:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update29:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update3:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update30:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update31:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update32:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:-:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update1:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update2:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update3:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update4:*:*:*:*:*:*", "cpe:2.3:a:redhat:icedtea6:*:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_eus:6.2:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.2:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*" ]
null
9.8
null
10
CVE-2010-2899
Unspecified vulnerability in the layout implementation in Google Chrome before 5.0.375.125 allows remote attackers to obtain sensitive information from process memory via unknown vectors.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" ]
null
null
null
5
PYSEC-2021-739
null
TensorFlow is an end-to-end open source platform for machine learning. Incomplete validation in `tf.raw_ops.CTCLoss` allows an attacker to trigger an OOB read from heap. The fix will be included in TensorFlow 2.5.0. We will also cherrypick these commits on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
[]
null
null
null
null
CVE-2019-6603
In BIG-IP 11.5.1-11.5.8, 11.6.1-11.6.3, 12.1.0-12.1.3, and 13.0.0-13.0.1, malformed TCP packets sent to a self IP address or a FastL4 virtual server may cause an interruption of service. The control plane is not exposed to this issue. This issue impacts the data plane virtual servers and self IPs.
[ "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*", "cpe:2.3:h:f5:big-ip_protocol_security_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*" ]
null
null
7.5
5
CVE-2022-36789
Improper access control in BIOS firmware for some Intel(R) NUC 10 Performance Kits and Intel(R) NUC 10 Performance Mini PCs before version FNCML357.0053 may allow a privileged user to potentially enable escalation of privilege via local access.
[ "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i7fnhn_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i7fnhn:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i5fnkn_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i5fnkn:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i5fnhn_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i5fnhn:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i7fnkn_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i7fnkn:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i3fnhn_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i3fnhn:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i3fnkn_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i3fnkn:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc_10_performance_mini_pc_nuc10i5fnhja_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_10_performance_mini_pc_nuc10i5fnhja:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i3fnhf_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i3fnhf:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc_10_performance_mini_pc_nuc10i5fnhca_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_10_performance_mini_pc_nuc10i5fnhca:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc_10_performance_mini_pc_nuc10i3fnhfa_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_10_performance_mini_pc_nuc10i3fnhfa:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i5fnhj_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i5fnhj:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i7fnhc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i7fnhc:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc_10_performance_mini_pc_nuc10i7fnhja_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_10_performance_mini_pc_nuc10i7fnhja:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc_10_performance_mini_pc_nuc10i3fnhja_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_10_performance_mini_pc_nuc10i3fnhja:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i3fnk_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i3fnk:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc_10_performance_mini_pc_nuc10i7fnhaa_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_10_performance_mini_pc_nuc10i7fnhaa:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i5fnh_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i5fnh:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i5fnk_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i5fnk:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i7fnh_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i7fnh:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i5fnhf_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i5fnhf:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc_10_performance_mini_pc_nuc10i7fnkpa_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_10_performance_mini_pc_nuc10i7fnkpa:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc_10_performance_mini_pc_nuc10i5fnkpa_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_10_performance_mini_pc_nuc10i5fnkpa:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i3fnh_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i3fnh:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i7fnk_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i7fnk:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i7fnkp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i7fnkp:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i5fnkp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i5fnkp:-:*:*:*:*:*:*:*" ]
null
7.5
null
null
CVE-2007-6496
Hosting Controller 6.1 Hot fix 3.3 and earlier allows remote attackers to register arbitrary users via a request to hosting/addsubsite.asp with the loginname and password parameters set, when preceded by certain requests to hosting/default.asp and hosting/selectdomain.asp, a related issue to CVE-2005-1654.
[ "cpe:2.3:a:hosting_controller:hosting_controller:6.1_hotfix_3.3:*:*:*:*:*:*:*" ]
null
null
null
6.8
CVE-2023-1921
The WP Fastest Cache plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.1.2. This is due to missing or incorrect nonce validation on the wpfc_start_cdn_integration_ajax_request_callback function. This makes it possible for unauthenticated attackers to change cdn settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
[ "cpe:2.3:a:wpfastestcache:wp_fastest_cache:*:*:*:*:*:wordpress:*:*" ]
null
4.3
null
null
GHSA-pfwp-8pq4-g7pv
Incomplete List of Disallowed Inputs in SOFA-Hessian
SOFA-Hessian through 4.0.2 allows remote attackers to execute arbitrary commands via a crafted serialized Hessian object because blacklisting of com.caucho.naming.QName and com.sun.org.apache.xpath.internal.objects.XString is mishandled, related to Resin Gadget.
[]
null
null
9.8
null
GHSA-rv7x-qjc3-m67h
The LearnPress – WordPress LMS Plugin plugin for WordPress is vulnerable to unauthorized user registration due to a missing capability check on the 'register' function in all versions up to, and including, 4.2.6.8.1. This makes it possible for unauthenticated attackers to bypass disabled user registration to create a new account with the default role.
[]
null
5.3
null
null
GHSA-cjm7-rmgv-2xvx
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Themewinter Eventin allows Stored XSS.This issue affects Eventin: from n/a through 4.0.5.
[]
null
5.9
null
null
CVE-2008-4172
SQL injection vulnerability in page.php in Cars & Vehicle (aka Cars-Vehicle Script) allows remote attackers to execute arbitrary SQL commands via the lnkid parameter.
[ "cpe:2.3:a:rfaah:cars-vehicles_script:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2023-21274
In convertSubgraphFromHAL of ShimConverter.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
[ "cpe:2.3:o:google:android:12.0:-:*:*:*:*:*:*", "cpe:2.3:o:google:android:12.1:-:*:*:*:*:*:*", "cpe:2.3:o:google:android:13.0:-:*:*:*:*:*:*" ]
null
5.5
null
null
GHSA-6j6w-975j-pgqc
Cross-site scripting vulnerability in index.php in PHP Fusebox 4.0.6 allows remote attackers to inject arbitrary web script or HTML via the fuseaction parameter.
[]
null
null
null
null
CVE-2021-40833
Denial-of-Service (DoS) Vulnerability
A vulnerability affecting F-Secure antivirus engine was discovered whereby unpacking UPX file can lead to denial-of-service. The vulnerability can be exploited remotely by an attacker. A successful attack will result in denial-of-service of the antivirus engine.
[ "cpe:2.3:a:f-secure:atlant:-:*:*:*:*:*:*:*", "cpe:2.3:a:f-secure:internet_gatekeeper:-:*:*:*:*:*:*:*", "cpe:2.3:a:f-secure:linux_security:-:*:*:*:*:*:x86:*", "cpe:2.3:a:f-secure:linux_security_64:-:*:*:*:*:*:*:*", "cpe:2.3:a:f-secure:elements_endpoint_protection:-:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
5.5
null
null
CVE-2024-11969
Incorrect default permissions in Cradlepoint NetCloud Exchange
The NetCloud Exchange client for Windows, version 1.110.50, contains an insecure file and folder permissions vulnerability. A normal (non-admin) user could exploit the weakness in file and folder permissions to escalate privileges, execute arbitrary code and maintain persistence on the compromised machine. It has been identified that full control permissions exist on the ‘Everyone’ group (i.e. any user who has local access to the operating system regardless of their privileges).
[ "cpe:2.3:a:cradlepoint:netcloud_exhange_client:*:*:*:*:*:*:*:*" ]
null
8.8
null
null
CVE-2021-41916
A Cross-Site Request Forgery (CSRF) vulnerability in webTareas version 2.4 and earlier allows a remote attacker to create a new administrative profile and add a new user to the new profile. without the victim's knowledge, by enticing an authenticated admin user to visit an attacker's web page.
[ "cpe:2.3:a:webtareas_project:webtareas:*:*:*:*:*:*:*:*" ]
null
8.8
null
6.8
GHSA-pq85-mpmh-g85v
Stack overflow in Intel(R) Baseboard Management Controller firmware may allow an authenticated user to potentially enable information disclosure and/or denial of service via network access.
[]
null
8.1
null
null
CVE-2021-3128
In ASUS RT-AX3000, ZenWiFi AX (XT8), RT-AX88U, and other ASUS routers with firmware < 3.0.0.4.386.42095 or < 9.0.0.4.386.41994, when IPv6 is used, a routing loop can occur that generates excessive network traffic between an affected device and its upstream ISP's router. This occurs when a link prefix route points to a point-to-point link, a destination IPv6 address belongs to the prefix and is not a local IPv6 address, and a router advertisement is received with at least one global unique IPv6 prefix for which the on-link flag is set.
[ "cpe:2.3:o:asus:zenwifi_ax_\\(xt8\\)_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:asus:zenwifi_ax_\\(xt8\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:asus:rt-ax3000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:asus:rt-ax3000:-:*:*:*:*:*:*:*", "cpe:2.3:o:asus:rt-ax55_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:asus:rt-ax55:-:*:*:*:*:*:*:*", "cpe:2.3:o:asus:rt-ax56u_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:asus:rt-ax56u:-:*:*:*:*:*:*:*", "cpe:2.3:o:asus:rt-ax58u_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:asus:rt-ax58u:-:*:*:*:*:*:*:*", "cpe:2.3:o:asus:rt-ax68u_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:asus:rt-ax68u:-:*:*:*:*:*:*:*", "cpe:2.3:o:asus:rt-ax82u_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:asus:rt-ax82u:-:*:*:*:*:*:*:*", "cpe:2.3:o:asus:rt-ax86u_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:asus:rt-ax86u:-:*:*:*:*:*:*:*", "cpe:2.3:o:asus:rt-ax88u_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:asus:rt-ax88u:-:*:*:*:*:*:*:*", "cpe:2.3:o:asus:rt-ac66u_b1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:asus:rt-ac66u_b1:-:*:*:*:*:*:*:*", "cpe:2.3:o:asus:rt-ac1750_b1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:asus:rt-ac1750_b1:-:*:*:*:*:*:*:*", "cpe:2.3:o:asus:rt-ac1900_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:asus:rt-ac1900:-:*:*:*:*:*:*:*", "cpe:2.3:o:asus:rt-ac1900p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:asus:rt-ac1900p:-:*:*:*:*:*:*:*", "cpe:2.3:o:asus:rt-ac1900u_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:asus:rt-ac1900u:-:*:*:*:*:*:*:*", "cpe:2.3:o:asus:rt-ac2900_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:asus:rt-ac2900:-:*:*:*:*:*:*:*", "cpe:2.3:o:asus:rt-ac3100_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:asus:rt-ac3100:-:*:*:*:*:*:*:*", "cpe:2.3:o:asus:rt-ac5300_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:asus:rt-ac5300:-:*:*:*:*:*:*:*", "cpe:2.3:o:asus:rt-ac58u_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:asus:rt-ac58u:-:*:*:*:*:*:*:*", "cpe:2.3:o:asus:rt-ac65u_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:asus:rt-ac65u:-:*:*:*:*:*:*:*", "cpe:2.3:o:asus:rt-ac68p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:asus:rt-ac68p:-:*:*:*:*:*:*:*", "cpe:2.3:o:asus:rt-ac68r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:asus:rt-ac68r:-:*:*:*:*:*:*:*", "cpe:2.3:o:asus:rt-ac68rw_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:asus:rt-ac68rw:-:*:*:*:*:*:*:*", "cpe:2.3:o:asus:rt-ac68u_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:asus:rt-ac68u:-:*:*:*:*:*:*:*", "cpe:2.3:o:asus:rt-ac68w_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:asus:rt-ac68w:-:*:*:*:*:*:*:*", "cpe:2.3:o:asus:rt-ac85u_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:asus:rt-ac85u:-:*:*:*:*:*:*:*", "cpe:2.3:o:asus:rt-ac86u_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:asus:rt-ac86u:-:*:*:*:*:*:*:*", "cpe:2.3:o:asus:rt-ac88u_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:asus:rt-ac88u:-:*:*:*:*:*:*:*" ]
null
7.5
null
5
CVE-2016-6829
The trove service user in (1) Openstack deployment (aka crowbar-openstack) and (2) Trove Barclamp (aka barclamp-trove and crowbar-barclamp-trove) in the Crowbar Framework has a default password, which makes it easier for remote attackers to obtain access via unspecified vectors.
[ "cpe:2.3:a:barclamp-trove_project:barclamp-trove:-:*:*:*:*:*:*:*", "cpe:2.3:a:crowbar-openstack_project:crowbar-openstack:-:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
GHSA-j98c-38q6-r4r2
Buffer overflow in Yahoo! Messenger 5.0 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a long (1) message or (2) IMvironment field.
[]
null
null
null
null
CVE-2025-25823
A cross-site scripting (XSS) vulnerability in Emlog Pro v2.5.4 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the article header at /admin/article.php.
[]
null
7.3
null
null
CVE-2024-57538
Linksys E8450 v1.2.00.360516 was discovered to contain a buffer overflow vulnerability. The parsed field (anonymous_protect_status) is copied to the stack without length verification.
[]
null
6.5
null
null
CVE-2024-49260
WordPress Limb Gallery plugin <= 1.5.7 - Arbitrary File Upload vulnerability
Unrestricted Upload of File with Dangerous Type vulnerability in Limb WordPress Gallery Plugin – Limb Image Gallery allows Code Injection.This issue affects WordPress Gallery Plugin – Limb Image Gallery: from n/a through 1.5.7.
[ "cpe:2.3:a:limb:limb_image_gallery:*:*:*:*:*:*:*:*" ]
null
9.9
null
null
GHSA-59cr-f2p3-c96w
rConfig 3.9.4 and previous versions has unauthenticated devices.inc.php SQL injection. Because, by default, nodes' passwords are stored in cleartext, this vulnerability leads to lateral movement, granting an attacker access to monitored network devices.
[]
null
null
null
null
CVE-2025-6847
code-projects Simple Forum forum_edit.php sql injection
A vulnerability classified as critical was found in code-projects Simple Forum 1.0. This vulnerability affects unknown code of the file /forum_edit.php. The manipulation of the argument iii leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
[]
5.3
6.3
6.3
6.5
CVE-2024-11246
code-projects Farmacia adicionar-cliente.php cross site scripting
A vulnerability, which was classified as problematic, was found in code-projects Farmacia 1.0. Affected is an unknown function of the file /adicionar-cliente.php. The manipulation of the argument nome/cpf/dataNascimento leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The initial researcher advisory mentions the parameter "nome" to be affected. But further inspection indicates that other parameters might be affected as well.
[ "cpe:2.3:a:code-projects:farmacia:*:*:*:*:*:*:*:*", "cpe:2.3:a:anisha:farmacia:1.0:*:*:*:*:*:*:*" ]
5.3
3.5
3.5
4
CVE-2018-25047
In Smarty before 3.1.47 and 4.x before 4.2.1, libs/plugins/function.mailto.php allows XSS. A web page that uses smarty_function_mailto, and that could be parameterized using GET or POST input parameters, could allow injection of JavaScript code by a user.
[ "cpe:2.3:a:smarty:smarty:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*" ]
null
5.4
null
null
CVE-2022-0994
Hummingbird < 3.3.2 - Admin+ Stored Cross-Site Scripting
The Hummingbird WordPress plugin before 3.3.2 does not sanitise and escape the Config Name, which could allow high privilege users, such as admin to perform cross-Site Scripting attacks even when the unfiltered_html capability is disallowed
[ "cpe:2.3:a:incsub:hummingbird:*:*:*:*:*:wordpress:*:*" ]
null
4.8
null
3.5
CVE-2024-13163
Deserialization of untrusted data in Ivanti EPM before the 2024 January-2025 Security Update and 2022 SU6 January-2025 Security Update allows a remote unauthenticated attacker to achieve remote code execution. Local user interaction is required.
[]
null
7.8
null
null
CVE-2017-9268
open-build-service retrigger / wipebinaries hitting the wrong project bypassing access permissions
In the open build service before 201707022 the wipetrigger and rebuild actions checked the wrong project for permissions, allowing authenticated users to cause operations on projects where they did not have permissions leading to denial of service (resource consumption).
[ "cpe:2.3:a:opensuse:open_build_service:*:*:*:*:*:*:*:*" ]
null
null
4.4
null
CVE-2023-26486
Vega `scale` expression function cross site scripting
Vega is a visualization grammar, a declarative format for creating, saving, and sharing interactive visualization designs. The Vega `scale` expression function has the ability to call arbitrary functions with a single controlled argument. The scale expression function passes a user supplied argument group to getScale, which is then used as if it were an internal context. The context.scales[name].value is accessed from group and called as a function back in scale. This can be exploited to escape the Vega expression sandbox in order to execute arbitrary JavaScript. This issue has been fixed in version 5.13.1.
[ "cpe:2.3:a:vega-functions_project:vega-functions:*:*:*:*:*:node.js:*:*", "cpe:2.3:a:vega_project:vega:*:*:*:*:*:node.js:*:*" ]
null
6.5
null
null
GHSA-h7cg-cp8w-6f8h
Cross Site Scripting vulnerability in num parameter in eyoucms v.1.6.5 allows a remote attacker to run arbitrary code via crafted URL.
[]
null
6.1
null
null
CVE-2017-3337
Vulnerability in the Oracle Marketing component of Oracle E-Business Suite (subcomponent: User Interface). Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5 and 12.2.6. Easily "exploitable" vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Marketing. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Marketing, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Marketing accessible data as well as unauthorized update, insert or delete access to some of Oracle Marketing accessible data. CVSS 3.0 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N).
[ "cpe:2.3:a:oracle:marketing:12.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:marketing:12.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:marketing:12.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:marketing:12.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:marketing:12.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:marketing:12.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:marketing:12.2.6:*:*:*:*:*:*:*" ]
null
null
7.1
7.8
GHSA-7hmq-jcvc-j3gv
Unspecified vulnerability in Investintech.com Able2Doc and Able2Doc Professional allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted document.
[]
null
null
null
null
GHSA-gj5f-9m2c-w52m
A vulnerability in the crypto engine of the Cisco Integrated Services Module for VPN (ISM-VPN) running Cisco IOS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient handling of VPN traffic by the affected device. An attacker could exploit this vulnerability by sending crafted VPN traffic to an affected device. A successful exploit could allow the attacker to cause the affected device to hang or crash, resulting in a DoS condition. Cisco Bug IDs: CSCvd39267.
[]
null
null
7.5
null
CVE-2023-4769
Server-Side Request Forgery in ManageEngine Desktop Central
A SSRF vulnerability has been found in ManageEngine Desktop Central affecting version 9.1.0, specifically the /smtpConfig.do component. This vulnerability could allow an authenticated attacker to launch targeted attacks, such as a cross-port attack, service enumeration and other attacks via HTTP requests.
[ "cpe:2.3:a:manageengine:desktop_central:9.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_desktop_central:9.1.0:*:*:*:*:*:*:*" ]
null
6.6
null
null