id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
197k
cpes
sequencelengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
CVE-2021-33824
An issue was discovered on MOXA Mgate MB3180 Version 2.1 Build 18113012. Attackers can use slowhttptest tool to send incomplete HTTP request, which could make server keep waiting for the packet to finish the connection, until its resource exhausted. Then the web server is denial-of-service.
[ "cpe:2.3:o:moxa:mgate_mb3180_firmware:2.1:build_18113012:*:*:*:*:*:*", "cpe:2.3:h:moxa:mgate_mb3180:-:*:*:*:*:*:*:*" ]
null
7.5
null
5
GHSA-vg4r-p8pw-h88f
PHPBlogger stores sensitive information under the web root with insufficient access control, which allows remote attackers to download a database containing an admin password hash via a direct request for data/pref.db. NOTE: this can be easily leveraged for administrative access because composing the authentication cookie only requires the password hash, not the cleartext version.
[]
null
null
null
null
GHSA-mvwf-xw7r-mvpr
xosview 1.5.1 in Red Hat 5.1 allows local users to gain root access via a long HOME environmental variable.
[]
null
null
null
null
CVE-2024-21356
Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability
Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability
[ "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*" ]
null
6.5
null
null
GHSA-vq94-9pfv-ccqr
SQL injection in Apache Traffic Control
An SQL injection vulnerability in Traffic Ops in Apache Traffic Control <= 8.0.1, >= 8.0.0 allows a privileged user with role "admin", "federation", "operations", "portal", or "steering" to execute arbitrary SQL against the database by sending a specially-crafted PUT request.Users are recommended to upgrade to version Apache Traffic Control 8.0.2 if you run an affected version of Traffic Ops.
[]
null
8.8
null
null
GHSA-vj3r-c4pc-hrp4
FW-WGS-804HPT v1.305b241111 was discovered to contain a stack overflow via the stp_conf_name parameter in the web_stp_globalSetting_post function.
[]
null
9.8
null
null
RHSA-2024:0889
Red Hat Security Advisory: oniguruma security update
oniguruma: Use-after-free in onig_new_deluxe() in regext.c oniguruma: Stack exhaustion in regcomp.c because of recursion in regparse.c oniguruma: integer overflow in search_in_range function in regexec.c leads to out-of-bounds read oniguruma: Heap-based buffer over-read in function gb18030_mbc_enc_len in file gb18030.c oniguruma: Heap-based buffer over-read in function fetch_interval_quantifier in regparse.c
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
7.5
6.5
null
GHSA-x5rw-hv6h-jjmw
The simple-share-buttons-adder plugin before 6.0.0 for WordPress has XSS.
[]
null
null
6.1
null
GHSA-8vp7-j5cj-vvm2
Ability to expose data in Sylius by using an unintended serialisation group
ImpactResourceBundle accepts and uses any serialisation groups to be passed via a HTTP header. This might lead to data exposure by using an unintended serialisation group - for example it could make Shop API use a more permissive group from Admin API.Anyone exposing an API with ResourceBundle's controller is affected. The vulnerable versions are: `<1.3 || >=1.3.0 <=1.3.12 || >=1.4.0 <=1.4.5 || >=1.5.0 <=1.5.0 || >=1.6.0 <=1.6.2`.PatchesThe patch is provided for ResourceBundle 1.3.13, 1.4.6, 1.5.1 and 1.6.3, but not for any versions below 1.3.After it is applied, It allows to choose only the groups that are defined in `serialization_groups` or `allowed_serialization_groups` route definition. Any group not defined in those will not be used.This behaviour might be a BC break for those using custom groups via the HTTP header, please adjust `allowed_serialization_groups` accordingly.WorkaroundsService `sylius.resource_controller.request_configuration_factory` can be overridden with an implementation copied from `\Sylius\Bundle\ResourceBundle\Controller\RequestConfigurationFactory` where the part that handles custom serialisation groups is deleted.
[]
null
4.4
null
null
GHSA-9wfq-hrqc-6wfv
Unspecified vulnerability in the Oracle Application Testing Suite component in Oracle Enterprise Manager Grid Control 12.4.0.2 and 12.5.0.2 allows remote attackers to affect confidentiality and integrity via unknown vectors related to Test Manager for Web Apps, a different vulnerability than CVE-2016-0490. NOTE: the previous information is from the January 2016 CPU. Oracle has not commented on third-party claims that this is a directory traversal vulnerability in the process method in the ActionServlet servlet, which allows remote attackers to bypass authentication via directory traversal sequences following an unspecified URI string.
[]
null
null
null
null
GHSA-g43m-56w9-qc5h
Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability
[]
null
8.8
null
null
GHSA-fmrh-jfvw-wcmr
An issue was discovered on Samsung mobile devices with O(8.x) and P(9.0) software. Data may leak via a Bluetooth debug command. The Samsung ID is SVE-2019-15398 (November 2019).
[]
null
null
null
null
CVE-2025-20084
Uncontrolled resource consumption for some Edge Orchestrator software for Intel(R) Tiber™ Edge Platform may allow an authenticated user to potentially enable denial of service via adjacent access.
[]
5.1
3.5
null
null
GHSA-xfff-cfmp-p8vp
OX App Suite before 7.10.3-rev32 and 7.10.4 before 7.10.4-rev18 allows XSS via a code snippet (user-generated content) when a sharing link is created and an App Loader relative URL is used.
[]
null
null
null
null
RHSA-2015:1622
Red Hat Security Advisory: Red Hat JBoss Web Server 2.1.0 tomcat security update
tomcat: non-persistent DoS attack by feeding data by aborting an upload Tomcat/JbossWeb: security manager bypass via EL expressions
[ "cpe:/a:redhat:jboss_enterprise_web_server:2::el5", "cpe:/a:redhat:jboss_enterprise_web_server:2::el6", "cpe:/a:redhat:jboss_enterprise_web_server:2::el7" ]
null
null
null
null
GHSA-56q7-7qfv-m92r
The issue was addressed with improved memory handling. This issue is fixed in macOS Sonoma 14. An app may be able to cause a denial-of-service.
[]
null
5.5
null
null
GHSA-rxqg-9cwv-cw87
Multiple cross-site scripting (XSS) vulnerabilities in Ktools.net PhotoStore allow remote attackers to inject arbitrary web script or HTML via the (1) gid parameter in details.php, or the (2) photogid parameter in view_photog.php.
[]
null
null
null
null
RHSA-2021:2136
Red Hat Security Advisory: Openshift Logging security and bugs update (5.0.4)
gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation
[ "cpe:/a:redhat:logging:5.0::el8" ]
null
8.6
null
null
GHSA-958q-v58v-6fr2
In the Linux kernel, the following vulnerability has been resolved:platform/x86: think-lmi: Fix password opcode ordering for workstationsThe Lenovo workstations require the password opcode to be run before the attribute value is changed (if Admin password is enabled).Tested on some Thinkpads to confirm they are OK with this order too.
[]
null
7.8
null
null
CVE-2024-21102
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Thread Pooling). Supported versions that are affected are 8.0.36 and prior and 8.3.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
[ "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.33_and_prior:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.29_and_prior:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.36_and_prior:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql_ndb_cluster:8.3.0_and_prior:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql_server:8.0.36_and_prior:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql_server:8.3.0_and_prior:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*", "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*", "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*" ]
null
4.9
null
null
GHSA-hq3r-79m9-8fph
Multiple SQL injection vulnerabilities in Active Price Comparison 4 allow remote attackers to execute arbitrary SQL commands via the (1) ProductID parameter to reviews.aspx or the (2) linkid parameter to links.asp.
[]
null
null
null
null
GHSA-6prr-mp53-33xp
Stack-based buffer overflow in Triologic Media Player 7 and 8.0.0.0 allows user-assisted remote attackers to execute arbitrary code via a long string in a .m3u playlist file. NOTE: some of these details are obtained from third party information.
[]
null
null
null
null
GHSA-x526-g954-qx57
Microsoft Internet Explorer 8 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."
[]
null
null
null
null
CVE-2018-11046
Pivotal Operations Manager, versions 2.1.x prior to 2.1.6 and version 2.0.14, includes NGINX packages that lacks security vulnerability patches. An attacker with access to the NGINX processes and knowledge of how to exploit the unpatched vulnerabilities may be able to impact Operations Manager
[ "cpe:2.3:a:pivotal_software:operations_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:pivotal_software:operations_manager:2.0.14:*:*:*:*:*:*:*" ]
null
null
6.5
4
CVE-2019-2869
Vulnerability in the Data Store component of Oracle Berkeley DB. Supported versions that are affected are 12.1.6.1.23, 12.1.6.1.26, 12.1.6.1.29, 12.1.6.1.36, 12.1.6.2.23 and 12.1.6.2.32. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Data Store executes to compromise Data Store. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Data Store. CVSS 3.0 Base Score 7.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).
[ "cpe:2.3:a:oracle:berkeley_db:12.1.6.1.23:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:berkeley_db:12.1.6.1.26:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:berkeley_db:12.1.6.1.29:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:berkeley_db:12.1.6.1.36:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:berkeley_db:12.1.6.2.23:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:berkeley_db:12.1.6.2.32:*:*:*:*:*:*:*" ]
null
null
7
3.7
RHSA-2023:6385
Red Hat Security Advisory: liblouis security update
liblouis: buffer overflow in lou_logFile function at logginc.c liblouis: buffer overflow in lou_setDataPath liblouis: buffer overflow in Lou_Trace
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
7.5
null
null
GHSA-p9g8-3jw8-v3h3
The Spotify Play Button WordPress plugin through 1.0 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
[]
null
5.4
null
null
CVE-2017-3338
Vulnerability in the Oracle Marketing component of Oracle E-Business Suite (subcomponent: User Interface). Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5 and 12.2.6. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Marketing. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Marketing, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Marketing accessible data as well as unauthorized update, insert or delete access to some of Oracle Marketing accessible data. CVSS v3.0 Base Score 8.2 (Confidentiality and Integrity impacts).
[ "cpe:2.3:a:oracle:marketing:12.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:marketing:12.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:marketing:12.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:marketing:12.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:marketing:12.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:marketing:12.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:marketing:12.2.6:*:*:*:*:*:*:*" ]
null
null
8.2
5.8
CVE-2021-4226
RSFirewall < 1.1.25 - IP Block Bypass
RSFirewall tries to identify the original IP address by looking at different HTTP headers. A bypass is possible due to the way it is implemented.
[ "cpe:2.3:a:rsjoomla:rsfirewall\\!:*:*:*:*:*:wordpress:*:*" ]
null
9.8
null
null
GHSA-vgc3-2w4v-5m3j
A type confusion issue was addressed with improved memory handling. This issue affected versions prior to iOS 11.4.1, tvOS 11.4.1, watchOS 4.3.2, Safari 11.1.2, iTunes 12.8 for Windows, iCloud for Windows 7.6.
[]
null
null
8.8
null
GHSA-m84x-g88w-3fr7
A vulnerability has been found in code-projects Online Book System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /cart.php. The manipulation of the argument quantity/remove leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-258205 was assigned to this vulnerability.
[]
null
6.3
null
null
CVE-2022-33974
WordPress Custom Twitter Feeds (Tweets Widget) Plugin <= 1.8.4 is vulnerable to Cross Site Request Forgery (CSRF)
Cross-Site Request Forgery (CSRF) vulnerability in Smash Balloon Custom Twitter Feeds (Tweets Widget) plugin <= 1.8.4 versions.
[ "cpe:2.3:a:smashballoon:custom_twitter_feeds:*:*:*:*:*:wordpress:*:*" ]
null
5.4
null
null
GHSA-5qj6-vw7x-6j4g
The random-number generator on Siemens SIMATIC S7-1200 CPU PLC devices with firmware before 4.0 does not have sufficient entropy, which makes it easier for remote attackers to defeat cryptographic protection mechanisms and hijack sessions via unspecified vectors, a different vulnerability than CVE-2014-2251.
[]
null
null
null
null
RHSA-2023:1655
Red Hat Security Advisory: OpenShift Container Platform 4.10.56 security update
kube-apiserver: Aggregated API server can cause clients to be redirected (SSRF) spring-security-oauth2-client: Privilege Escalation in spring-security-oauth2-client spring-security: Authorization rules can be bypassed via forward or include dispatcher types in Spring Security apache-commons-text: variable interpolation RCE jenkins-2-plugins/script-security: Sandbox bypass vulnerability in Script Security Plugin haproxy: request smuggling attack in HTTP/1 header parsing Jenkins: XSS vulnerability in plugin manager Jenkins: Temporary plugin file created with insecure permissions Jenkins: Temporary file parameter created with insecure permissions Jenkins: Information disclosure through error stack traces related to agents
[ "cpe:/a:redhat:openshift:4.10::el7", "cpe:/a:redhat:openshift:4.10::el8" ]
null
5.3
null
null
CVE-1999-1323
Norton AntiVirus for Internet Email Gateways (NAVIEG) 1.0.1.7 and earlier, and Norton AntiVirus for MS Exchange (NAVMSE) 1.5 and earlier, store the administrator password in cleartext in (1) the navieg.ini file for NAVIEG, and (2) the ModifyPassword registry key in NAVMSE.
[ "cpe:2.3:a:symantec:norton_antivirus:*:*:internet_email_gateways:*:*:*:*:*", "cpe:2.3:a:symantec:norton_antivirus:*:*:exchange:*:*:*:*:*" ]
null
null
null
4.6
CVE-2013-3381
Cisco Hosted Collaboration Mediation allows remote attackers to cause a denial of service (CPU consumption) via a flood of malformed UDP packets on port 162, aka Bug ID CSCug85756.
[ "cpe:2.3:a:cisco:hosted_collaboration_solution:-:*:*:*:*:*:*:*" ]
null
null
null
5
CVE-2021-44489
An issue was discovered in YottaDB through r1.32 and V7.0-000. Using crafted input, attackers can cause an integer underflow of the size of calls to memset in op_fnj3 in sr_port/op_fnj3.c in order to cause a segmentation fault and crash the application. This is a "- digs" subtraction.
[ "cpe:2.3:a:fisglobal:gt.m:*:*:*:*:*:*:*:*", "cpe:2.3:a:yottadb:yottadb:*:*:*:*:*:*:*:*" ]
null
7.5
null
5
GHSA-4xf9-4r44-86rc
ImpressPages CMS RCE
ImpressPages CMS v1.0.12 has Unspecified Remote Code Execution (fixed in v1.0.13)
[]
null
9.8
null
null
CVE-2023-25895
ZDI-CAN-19540: Adobe Dimension USD File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability
Adobe Dimension versions 3.4.7 (and earlier) is affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[ "cpe:2.3:a:adobe:dimension:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
7.8
null
null
GHSA-xgqr-693c-m9jh
A vulnerability has been found in SourceCodester Take-Note App 1.0 and classified as problematic. This vulnerability affects unknown code. The manipulation leads to cross-site request forgery. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-239350 is the identifier assigned to this vulnerability.
[]
null
null
4.3
null
GHSA-p7wf-2w5g-7chw
The Live updates from Excel plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'ipushpull_page' shortcode in versions up to, and including, 2.3.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
6.4
null
null
GHSA-px2w-2hm4-m39w
rmuser utility in FreeBSD 4.2 and 4.3 creates a copy of the master.passwd file with world-readable permissions while updating the original file, which could allow local users to gain privileges by reading the copied file while rmuser is running, obtain the password hashes, and crack the passwords.
[]
null
null
null
null
CVE-2001-1267
Directory traversal vulnerability in GNU tar 1.13.19 and earlier allows local users to overwrite arbitrary files during archive extraction via a tar file whose filenames contain a .. (dot dot).
[ "cpe:2.3:a:gnu:tar:*:*:*:*:*:*:*:*" ]
null
null
null
2.1
CVE-2022-29506
Out-of-bounds read vulnerability exist in the simulator module contained in the graphic editor 'V-SFT' v6.1.3.0 and earlier, which may allow an attacker to obtain information and/or execute arbitrary code by having a user to open a specially crafted image file.
[ "cpe:2.3:a:fujielectric:v-server:*:*:*:*:-:*:*:*", "cpe:2.3:a:fujielectric:v-server:*:*:*:*:lite:*:*:*", "cpe:2.3:a:fujielectric:v-sft:*:*:*:*:*:*:*:*" ]
null
7.8
null
6.8
CVE-2023-41320
Account takeover via SQL Injection in UI layout preferences in GLPI
GLPI stands for Gestionnaire Libre de Parc Informatique is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. UI layout preferences management can be hijacked to lead to SQL injection. This injection can be use to takeover an administrator account. Users are advised to upgrade to version 10.0.10. There are no known workarounds for this vulnerability.
[ "cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*" ]
null
8.1
null
null
GHSA-r7qr-w3m7-gjwm
Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vulnerability in Ella van Durpe Slides & Presentations allows Code Injection.This issue affects Slides & Presentations: from n/a through 0.0.39.
[]
null
5.4
null
null
CVE-2021-30523
Use after free in WebRTC in Google Chrome prior to 91.0.4472.77 allowed a remote attacker to potentially exploit heap corruption via a crafted SCTP packet.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*" ]
null
8.8
null
6.8
CVE-2023-31410
A remote unprivileged attacker can intercept the communication via e.g. Man-In-The-Middle, due to the absence of Transport Layer Security (TLS) in the SICK EventCam App. This lack of encryption in the communication channel can lead to the unauthorized disclosure of sensitive information. The attacker can exploit this weakness to eavesdrop on the communication between the EventCam App and the Client, and potentially manipulate the data being transmitted.
[ "cpe:2.3:a:sick:sick_eventcam_app:*:*:*:*:*:*:*:*" ]
null
9.8
null
null
CVE-2005-1801
The vCard viewer in Nokia 9500 allows attackers to cause a denial of service (crash) via a vCard with a long Name field, which causes the crash when the user views it.
[ "cpe:2.3:a:nokia:9500:*:*:*:*:*:*:*:*" ]
null
null
null
2.6
CVE-2006-3053
PHP remote file inclusion vulnerability in common.php in PHORUM 5.1.13 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the PHORUM[http_path] parameter. NOTE: this issue has been disputed by the vendor, who states "common.php is checked on the very first line of non-comment code that it is not being called directly. It has been this way in all 5.x version of Phorum." CVE analysis concurs with the vendor
[ "cpe:2.3:a:phorum:phorum:*:*:*:*:*:*:*:*", "cpe:2.3:a:phorum:phorum:3.1:*:*:*:*:*:*:*", "cpe:2.3:a:phorum:phorum:3.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:phorum:phorum:3.1.1_pre:*:*:*:*:*:*:*", "cpe:2.3:a:phorum:phorum:3.1.1_rc2:*:*:*:*:*:*:*", "cpe:2.3:a:phorum:phorum:3.1.1a:*:*:*:*:*:*:*", "cpe:2.3:a:phorum:phorum:3.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:phorum:phorum:3.2:*:*:*:*:*:*:*", "cpe:2.3:a:phorum:phorum:3.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:phorum:phorum:3.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:phorum:phorum:3.2.3a:*:*:*:*:*:*:*", "cpe:2.3:a:phorum:phorum:3.2.3b:*:*:*:*:*:*:*", "cpe:2.3:a:phorum:phorum:3.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:phorum:phorum:3.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:phorum:phorum:3.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:phorum:phorum:3.2.7:*:*:*:*:*:*:*", "cpe:2.3:a:phorum:phorum:3.2.8:*:*:*:*:*:*:*", "cpe:2.3:a:phorum:phorum:3.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:phorum:phorum:3.3.1a:*:*:*:*:*:*:*", "cpe:2.3:a:phorum:phorum:3.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:phorum:phorum:3.3.2a:*:*:*:*:*:*:*", "cpe:2.3:a:phorum:phorum:3.3.2b3:*:*:*:*:*:*:*", "cpe:2.3:a:phorum:phorum:3.4:*:*:*:*:*:*:*", "cpe:2.3:a:phorum:phorum:3.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:phorum:phorum:3.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:phorum:phorum:3.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:phorum:phorum:3.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:phorum:phorum:3.4.5:*:*:*:*:*:*:*", "cpe:2.3:a:phorum:phorum:3.4.6:*:*:*:*:*:*:*", "cpe:2.3:a:phorum:phorum:3.4.7:*:*:*:*:*:*:*", "cpe:2.3:a:phorum:phorum:3.4.8:*:*:*:*:*:*:*", "cpe:2.3:a:phorum:phorum:3.4.8a:*:*:*:*:*:*:*", "cpe:2.3:a:phorum:phorum:5.0.3_beta:*:*:*:*:*:*:*", "cpe:2.3:a:phorum:phorum:5.0.7_beta:*:*:*:*:*:*:*", "cpe:2.3:a:phorum:phorum:5.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:phorum:phorum:5.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:phorum:phorum:5.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:phorum:phorum:5.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:phorum:phorum:5.0.13:*:*:*:*:*:*:*", "cpe:2.3:a:phorum:phorum:5.0.14:*:*:*:*:*:*:*", "cpe:2.3:a:phorum:phorum:5.0.15a:*:*:*:*:*:*:*", "cpe:2.3:a:phorum:phorum:5.0.16:*:*:*:*:*:*:*", "cpe:2.3:a:phorum:phorum:5.0.17a:*:*:*:*:*:*:*", "cpe:2.3:a:phorum:phorum:5.0.18:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-f6h6-4v35-rxvq
Amano Xoffice parking solutions 7.1.3879 is vulnerable to SQL Injection.
[]
null
9.8
null
null
CVE-2017-9450
The Amazon Web Services (AWS) CloudFormation bootstrap tools package (aka aws-cfn-bootstrap) before 1.4-19.10 allows local users to execute arbitrary code with root privileges by leveraging the ability to create files in an unspecified directory.
[ "cpe:2.3:a:amazon:amazon_web_services_cloudformation_bootstrap:*:*:*:*:*:*:*:*" ]
null
null
7.8
7.2
GHSA-wj24-xmc5-hjw4
Jenkins Team Concert Plugin missing permission check
A missing permission check in Jenkins Team Concert Plugin 1.3.0 and earlier in form-related methods allowed users with Overall/Read access to enumerate credentials ID of credentials stored in Jenkins.
[]
null
4.3
null
null
GHSA-xr6m-vwc7-4qxx
Vulnerability in the Oracle Access Manager product of Oracle Fusion Middleware (component: SSO Engine). Supported versions that are affected are 11.1.2.3.0 and 12.2.1.3.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Access Manager. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Access Manager, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Access Manager accessible data as well as unauthorized read access to a subset of Oracle Access Manager accessible data. CVSS 3.0 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N).
[]
null
null
null
null
CVE-2025-22913
RE11S v1.11 was discovered to contain a stack overflow via the rootAPmac parameter in the formStaDrvSetup function.
[]
null
9.8
null
null
CVE-2022-33990
Misinterpretation of special domain name characters in dproxy-nexgen (aka dproxy nexgen) leads to cache poisoning because domain names and their associated IP addresses are cached in their misinterpreted form.
[ "cpe:2.3:a:dproxy-nexgen_project:dproxy-nexgen:-:*:*:*:*:*:*:*" ]
null
7.5
null
null
CVE-2017-6913
Cross-site scripting (XSS) vulnerability in the Open-Xchange webmail before 7.6.3-rev28 allows remote attackers to inject arbitrary web script or HTML via the event attribute in a time tag.
[ "cpe:2.3:a:open-xchange:open-xchange_appsuite:*:*:*:*:*:*:*:*" ]
null
null
6.1
4.3
GHSA-c8x3-rg72-fwwg
Privilege escalation in Hashicorp Nomad
HashiCorp Nomad and Nomad Enterprise Raft RPC layer allows non-server agents with a valid certificate signed by the same CA to access server-only functionality, enabling privilege escalation. Fixed in 1.0.10 and 1.1.4.
[]
null
8.8
null
null
GHSA-x9wp-hprc-2gvq
The FormCraft WordPress plugin before 3.8.28 does not validate the URL parameter in the formcraft3_get AJAX action, leading to SSRF issues exploitable by unauthenticated users
[]
null
9.1
null
null
GHSA-frwp-8f86-7mhx
KGet 2.4.2 in KDE SC 4.0.0 through 4.4.3 does not properly request download confirmation from the user, which makes it easier for remote attackers to overwrite arbitrary files via a crafted metalink file.
[]
null
null
null
null
GHSA-9r7p-3jj4-29v6
Use After Free in r_reg_get_name_idx in GitHub repository radareorg/radare2 prior to 5.6.6.
[]
null
5.5
null
null
GHSA-vcm3-phm4-6c23
Xerox AltaLink B8045/B8055/B8065/B8075/B8090, AltaLink C8030/C8035/C8045/C8055/C8070 with software releases before 103.xxx.030.32000 includes two accounts with weak hard-coded passwords which can be exploited and allow unauthorized access which cannot be disabled.
[]
null
null
null
null
CVE-2023-30375
In Tenda AC15 V15.03.05.19, the function "getIfIp" contains a stack-based buffer overflow vulnerability.
[ "cpe:2.3:o:tenda:ac15_firmware:15.03.05.19:*:*:*:*:*:*:*", "cpe:2.3:h:tenda:ac15:-:*:*:*:*:*:*:*" ]
null
9.8
null
null
GHSA-fv96-f45h-hpj6
In PESCMS Team 2.2.1, attackers may upload and execute arbitrary PHP code through /Public/?g=Team&m=Setting&a=upgrade by placing a .php file in a ZIP archive.
[]
null
null
9.8
null
CVE-2020-0532
Improper input validation in subsystem for Intel(R) AMT versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable denial of service or information disclosure via adjacent access.
[ "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*" ]
null
7.1
null
4.8
GHSA-q6f6-gfq8-34cx
Use of Out-of-range Pointer Offset in Conda vim prior to 8.2.
[]
null
7.8
null
null
GHSA-gv97-jrx5-pj3x
The default configuration of ExShortcut\Web.config in EMC SourceOne Email Management before 6.6 SP1, when the Mobile Services component is used, does not properly set the localOnly attribute of the trace element, which allows remote authenticated users to obtain sensitive information via ASP.NET Application Tracing.
[]
null
null
null
null
GHSA-7792-hjmw-g787
The Build App Online plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 1.0.21. This is due to missing authentication checking in the 'set_user_cart' function with the 'user_id' header value. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the user id.
[]
null
9.8
null
null
CVE-2024-27266
IBM Maximo Application Suite XML external entity injection
IBM Maximo Application Suite 7.6.1.3 is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 284566.
[ "cpe:2.3:a:ibm:maximo_application_suite:7.6.1.3:*:*:*:*:*:*:*" ]
null
8.2
null
null
GHSA-2xpr-684m-v738
Unspecified vulnerability in the Oracle Email Center component in Oracle E-Business Suite 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, and 12.2.5 allows remote attackers to affect integrity via vectors related to Email Center Agent Console, a different vulnerability than CVE-2016-3559.
[]
null
null
4.7
null
GHSA-m8r8-3226-6wp8
BT SDP dissector memory leak in Wireshark 4.0.0 to 4.0.7 and 3.6.0 to 3.6.15 allows denial of service via packet injection or crafted capture file
[]
null
5.3
null
null
GHSA-4m38-6q8p-p29r
Possible assertion due to lack of physical layer state validation in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wired Infrastructure and Networking
[]
null
null
null
null
GHSA-5fqw-fcpr-6qgf
The hevc_write_frame function in libbpg.c in libbpg 0.9.7 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) or possibly have unspecified other impact via a crafted BPG file, related to improper interaction with hls_pcm_sample in hevc.c in libavcodec in FFmpeg and put_pcm_var in hevcdsp_template.c in libavcodec in FFmpeg.
[]
null
null
8.8
null
GHSA-72m8-2j54-r5xg
inc.login.php in PHPsFTPd 0.2 through 0.4 allows remote attackers to obtain the administrator's username and password by setting the do_login parameter and performing an edit action using user.php, which causes the login check to be bypassed and leaks the password in the response.
[]
null
null
null
null
CVE-2024-3188
Shortcodes Ultimate < 7.1.0 - Contributor+ Stored XSS
The WP Shortcodes Plugin — Shortcodes Ultimate WordPress plugin before 7.1.0 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks
[ "cpe:2.3:a:getshortcodes:shortcodes_ultimate:-:*:*:*:*:wordpress:*:*" ]
null
6.3
null
null
CVE-2007-0191
Cross-site scripting (XSS) vulnerability in admin.php in MKPortal allows remote attackers to inject arbitrary web script or HTML via two certain fields in a contents_new operation in the ad_contents section.
[ "cpe:2.3:a:mkportal:mkportal:*:*:*:*:*:*:*:*" ]
null
null
null
6.8
GHSA-xf4h-5cm9-5xfc
Untrusted search path vulnerability in Catfish 0.6.0 through 1.0.0 allows local users to gain privileges via a Trojan horse bin/catfish.py under the current working directory.
[]
null
null
null
null
GHSA-89c9-2mcj-c9gr
The 'HTML5 Video Player' WordPress Plugin, version < 2.5.25 is affected by an unauthenticated SQL injection vulnerability in the 'id' parameter in the  'get_view' function.
[]
null
8.6
null
null
CVE-2017-8915
sinopia, as used in SAP HANA XS 1.00 and 2.00, allows remote attackers to cause a denial of service (assertion failure and service crash) by pushing a package with a filename containing a $ (dollar sign) or % (percent) character, aka SAP Security Note 2407694.
[ "cpe:2.3:a:sap:hana_xs:1.00:*:*:*:*:*:*:*", "cpe:2.3:a:sap:hana_xs:2.00:*:*:*:*:*:*:*" ]
null
null
7.5
5
CVE-2013-6668
Multiple unspecified vulnerabilities in Google V8 before 3.24.35.10, as used in Google Chrome before 33.0.1750.146, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.2:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.3:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.4:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.5:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.6:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.7:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.8:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.9:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.10:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.11:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.12:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.13:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.14:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.15:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.16:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.18:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.19:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.20:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.21:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.22:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.23:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.24:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.25:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.26:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.27:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.28:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.29:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.30:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.31:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.34:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.35:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.36:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.37:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.38:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.39:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.40:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.41:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.42:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.43:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.44:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.45:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.46:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.47:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.48:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.49:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.50:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.51:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.52:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.53:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.54:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.55:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.56:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.57:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.58:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.59:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.60:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.61:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.62:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.63:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.64:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.65:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.66:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.67:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.68:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.69:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.70:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.71:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.73:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.74:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.75:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.76:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.77:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.79:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.80:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.81:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.82:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.83:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.85:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.88:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.89:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.90:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.91:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.92:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.93:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.104:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.106:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.107:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.108:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.109:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.110:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.111:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.112:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.113:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.115:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.116:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.117:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.124:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.125:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.126:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.132:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.133:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.135:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.136:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.24.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.24.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.24.2:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.24.3:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.24.4:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.24.5:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.24.6:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.24.7:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.24.8:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.24.9:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.24.10:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.24.11:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.24.12:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.24.13:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.24.14:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.24.15:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.24.16:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.24.17:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.24.18:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.24.19:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.24.20:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.24.21:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.24.22:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.24.23:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.24.24:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.24.25:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.24.26:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.24.27:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.24.28:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.24.29:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.24.30:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.24.31:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.24.32:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.24.33:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.24.34:*:*:*:*:*:*:*", "cpe:2.3:a:nodejs:node.js:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-j6cp-32xj-xr29
phpMyAdmin through 5.0.2 allows CSV injection via Export Section
[]
null
null
null
null
GHSA-r99f-79rc-6fjj
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Contact Form With Captcha allows Reflected XSS.This issue affects Contact Form With Captcha: from n/a through 1.6.8.
[]
null
7.1
null
null
GHSA-4hqj-82pv-rf9g
Vulnerability in the Data Store component of Oracle Berkeley DB. The supported version that is affected is Prior to 6.2.32. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Data Store executes to compromise Data Store. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Data Store. CVSS 3.0 Base Score 7.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).
[]
null
7
null
null
GHSA-32p9-x7g8-8m43
Adobe Experience Manager versions 6.5.22 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
[]
null
5.4
null
null
CVE-2017-7923
A Password in Configuration File issue was discovered in Hikvision DS-2CD2xx2F-I Series V5.2.0 build 140721 to V5.4.0 build 160530, DS-2CD2xx0F-I Series V5.2.0 build 140721 to V5.4.0 Build 160401, DS-2CD2xx2FWD Series V5.3.1 build 150410 to V5.4.4 Build 161125, DS-2CD4x2xFWD Series V5.2.0 build 140721 to V5.4.0 Build 160414, DS-2CD4xx5 Series V5.2.0 build 140721 to V5.4.0 Build 160421, DS-2DFx Series V5.2.0 build 140805 to V5.4.5 Build 160928, and DS-2CD63xx Series V5.0.9 build 140305 to V5.3.5 Build 160106 devices. The password in configuration file vulnerability could allow a malicious user to escalate privileges or assume the identity of another user and access sensitive information.
[ "cpe:2.3:o:hikvision:ds-2cd2032-i_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd2112-i_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd2132-i_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd2212-i5_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd2232-i5_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd2312-i_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd2332-i_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd2412f-i\\(w\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd2432f-i\\(w\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd2512f-i\\(s\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd2532f-i\\(s\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd2612f-i\\(s\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd2632f-i\\(s\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd2712f-i\\(s\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd2732f-i\\(s\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd2t32-i3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd2t32-i5_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd2t32-i8_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd4012f-\\(a\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd4012f-\\(p\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd4012f-\\(w\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd4012fwd-\\(a\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd4012fwd-\\(p\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd4012fwd-\\(w\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd4024f-\\(a\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd4024f-\\(p\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd4024f-\\(w\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd4032fwd-\\(a\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd4032fwd-\\(p\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd4032fwd-\\(w\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd4112f-i\\(z\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd4112fwd-i\\(z\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd4124f-i\\(z\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd4132fwd-i\\(z\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd4212f-i\\(h\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd4212f-i\\(s\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd4212f-i\\(z\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd4212fwd-i\\(h\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd4212fwd-i\\(s\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd4212fwd-i\\(z\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd4224f-i\\(h\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd4224f-i\\(s\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd4224f-i\\(z\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd4232fwd-i\\(h\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd4232fwd-i\\(s\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd4232fwd-i\\(z\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd4312f-i\\(h\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd4312f-i\\(s\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd4312f-i\\(z\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd4324f-i\\(h\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd4324f-i\\(s\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd4324f-i\\(z\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd4332fwd-i\\(h\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd4332fwd-i\\(s\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd4332fwd-i\\(z\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd6412fwd_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd2032-i:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd2112-i:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd2132-i:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd2212-i5:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd2232-i5:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd2312-i:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd2332-i:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd2412f-i\\(w\\):-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd2432f-i\\(w\\):-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd2512f-i\\(s\\):-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd2532f-i\\(s\\):-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd2612f-i\\(s\\):-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd2632f-i\\(s\\):-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd2712f-i\\(s\\):-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd2732f-i\\(s\\):-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd2t32-i3:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd2t32-i5:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd2t32-i8:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd4012f-\\(a\\):-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd4012f-\\(p\\):-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd4012f-\\(w\\):-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd4012fwd-\\(a\\):-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd4012fwd-\\(p\\):-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd4012fwd-\\(w\\):-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd4024f-\\(a\\):-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd4024f-\\(p\\):-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd4024f-\\(w\\):-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd4032fwd-\\(a\\):-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd4032fwd-\\(p\\):-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd4032fwd-\\(w\\):-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd4112f-i\\(z\\):-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd4112fwd-i\\(z\\):-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd4124f-i\\(z\\):-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd4132fwd-i\\(z\\):-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd4212f-i\\(h\\):-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd4212f-i\\(s\\):-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd4212f-i\\(z\\):-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd4212fwd-i\\(h\\):-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd4212fwd-i\\(s\\):-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd4212fwd-i\\(z\\):-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd4224f-i\\(h\\):-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd4224f-i\\(s\\):-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd4224f-i\\(z\\):-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd4232fwd-i\\(h\\):-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd4232fwd-i\\(s\\):-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd4232fwd-i\\(z\\):-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd4312f-i\\(h\\):-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd4312f-i\\(s\\):-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd4312f-i\\(z\\):-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd4324f-i\\(h\\):-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd4324f-i\\(s\\):-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd4324f-i\\(z\\):-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd4332fwd-i\\(h\\):-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd4332fwd-i\\(s\\):-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd4332fwd-i\\(z\\):-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd6412fwd:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2dfx_series_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2dfx_series:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-2cd63xx_series_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-2cd63xx_series:-:*:*:*:*:*:*:*" ]
null
null
8.8
4
CVE-2022-45393
A cross-site request forgery (CSRF) vulnerability in Jenkins Delete log Plugin 1.0 and earlier allows attackers to delete build logs.
[ "cpe:2.3:a:jenkins:delete_log:*:*:*:*:*:jenkins:*:*" ]
null
3.5
null
null
CVE-2011-2022
The agp_generic_remove_memory function in drivers/char/agp/generic.c in the Linux kernel before 2.6.38.5 does not validate a certain start parameter, which allows local users to gain privileges or cause a denial of service (system crash) via a crafted AGPIOC_UNBIND agp_ioctl ioctl call, a different vulnerability than CVE-2011-1745.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_aus:5.6:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*" ]
null
null
null
6.9
GHSA-g4r5-jgp4-qm3c
admin/Lib/Action/FpluginAction.class.php in FDCMS (aka Fangfa Content Manage System) 4.2 allows SQL Injection.
[]
null
null
7.5
null
GHSA-vrvr-rv69-wvh3
Skia, as used in Google Chrome before 22.0.1229.79, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger an out-of-bounds write operation, a different vulnerability than CVE-2012-2883.
[]
null
null
null
null
GHSA-36pj-pfw6-cc65
Cross-site scripting (XSS) vulnerability in the Search module before 1.2.2 in Jamroom allows remote attackers to inject arbitrary web script or HTML via the query string to search/results/.
[]
null
null
null
null
RHSA-2017:1450
Red Hat Security Advisory: openstack-heat security and bug fix update
openstack-heat: Template source URL allows network port scan
[ "cpe:/a:redhat:openstack:7::el7" ]
null
null
3.5
null
GHSA-3gp6-fj2v-m5f7
Heap-based buffer overflow in the Siemens WinCC Runtime Advanced Loader, as used in SIMATIC WinCC flexible Runtime and SIMATIC WinCC (TIA Portal) Runtime Advanced, allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a crafted packet to TCP port 2308.
[]
null
null
null
null
CVE-2022-30959
A missing permission check in Jenkins SSH Plugin 2.6.1 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified SSH server using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
[ "cpe:2.3:a:jenkins:ssh:*:*:*:*:*:jenkins:*:*" ]
null
6.5
null
4
CVE-2024-38353
CodiMD - Missing Image Access Controls and Unauthorized Image Access
CodiMD allows realtime collaborative markdown notes on all platforms. CodiMD before 2.5.4 is missing authentication and access control vulnerability allowing an unauthenticated attacker to gain unauthorised access to image data uploaded to CodiMD. CodiMD does not require valid authentication to access uploaded images or to upload new image data. An attacker who can determine an uploaded image's URL can gain unauthorised access to uploaded image data. Due to the insecure random filename generation in the underlying Formidable library, an attacker can determine the filenames for previously uploaded images and the likelihood of this issue being exploited is increased. This vulnerability is fixed in 2.5.4.
[ "cpe:2.3:a:hackmd:codimd:*:*:*:*:*:*:*:*" ]
null
5.3
null
null
GHSA-mrm7-vh23-g98v
In the Linux kernel, the following vulnerability has been resolved:io_uring: fix memleak in io_init_wq_offload()I got memory leak report when doing fuzz test:BUG: memory leak unreferenced object 0xffff888107310a80 (size 96): comm "syz-executor.6", pid 4610, jiffies 4295140240 (age 20.135s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 ad 4e ad de ff ff ff ff 00 00 00 00 .....N.......... backtrace: [<000000001974933b>] kmalloc include/linux/slab.h:591 [inline] [<000000001974933b>] kzalloc include/linux/slab.h:721 [inline] [<000000001974933b>] io_init_wq_offload fs/io_uring.c:7920 [inline] [<000000001974933b>] io_uring_alloc_task_context+0x466/0x640 fs/io_uring.c:7955 [<0000000039d0800d>] __io_uring_add_tctx_node+0x256/0x360 fs/io_uring.c:9016 [<000000008482e78c>] io_uring_add_tctx_node fs/io_uring.c:9052 [inline] [<000000008482e78c>] __do_sys_io_uring_enter fs/io_uring.c:9354 [inline] [<000000008482e78c>] __se_sys_io_uring_enter fs/io_uring.c:9301 [inline] [<000000008482e78c>] __x64_sys_io_uring_enter+0xabc/0xc20 fs/io_uring.c:9301 [<00000000b875f18f>] do_syscall_x64 arch/x86/entry/common.c:50 [inline] [<00000000b875f18f>] do_syscall_64+0x3b/0x90 arch/x86/entry/common.c:80 [<000000006b0a8484>] entry_SYSCALL_64_after_hwframe+0x44/0xaeCPU0 CPU1 io_uring_enter io_uring_enter io_uring_add_tctx_node io_uring_add_tctx_node __io_uring_add_tctx_node __io_uring_add_tctx_node io_uring_alloc_task_context io_uring_alloc_task_context io_init_wq_offload io_init_wq_offload hash = kzalloc hash = kzalloc ctx->hash_map = hash ctx->hash_map = hash <- one of the hash is leakedWhen calling io_uring_enter() in parallel, the 'hash_map' will be leaked, add uring_lock to protect 'hash_map'.
[]
null
5.5
null
null
RHSA-2008:0857
Red Hat Security Advisory: kernel security and bug fix update
kernel snd_seq_oss_synth_make_info leak Linux kernel local filesystem DoS Linux kernel dccp_setsockopt_change() integer overflow Linux kernel sctp_setsockopt_auth_key() integer overflow kernel: tmpfs: fix kernel BUG in shmem_delete_inode kernel: fix off-by-one error in iov_iter_advance() kernel: sctp: fix potential panics in the SCTP-AUTH API kernel: nfsd: fix buffer overrun decoding NFSv4 acl kernel: sctp_getsockopt_hmac_ident information disclosure kernel: sctp: fix random memory dereference with SCTP_HMAC_IDENT option
[ "cpe:/a:redhat:enterprise_mrg:1::el5" ]
null
null
null
null
RHSA-2024:3846
Red Hat Security Advisory: python-idna security update
python-idna: potential DoS via resource consumption via specially crafted inputs to idna.encode()
[ "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
6.5
null
null
GHSA-q2h2-m58v-58r8
Buffer overflow in Foxmail 2.0 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a long MAIL FROM command.
[]
null
null
null
null
GHSA-cx4x-4wcx-cq8q
A vulnerability has been identified in OZW672 (All versions < V6.0), OZW772 (All versions < V6.0). The web service of affected devices is vulnerable to SQL injection when checking authentication data. This could allow an unauthenticated remote attacker to bypass the check and authenticate as Administrator user.
[]
9.3
9.8
null
null
GHSA-m6pg-gcp3-79h5
Cross-site scripting (XSS) vulnerability in FTPoed Blog Engine 1.1 allows remote attackers to inject arbitrary web script or HTML via the comment_body parameter, as used by the comment field, when posting a comment.
[]
null
null
null
null