id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
197k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
RHSA-2024:2041
Red Hat Security Advisory: tigervnc security update
xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice xorg-x11-server: Use-after-free in ProcRenderAddGlyphs
[ "cpe:/a:redhat:rhel_aus:8.2::appstream", "cpe:/a:redhat:rhel_e4s:8.2::appstream", "cpe:/a:redhat:rhel_tus:8.2::appstream" ]
null
7.8
null
null
GHSA-58x6-9vjj-69q7
Online Nurse Hiring System v1.0 was discovered to contain multiple SQL injection vulnerabilities in the component /admin/add-nurse.php via the gender and emailid parameters.
[]
null
7.2
null
null
GHSA-f2f5-xcrp-m3x6
Adobe Acrobat Reader versions 23.006.20360 (and earlier) and 20.005.30524 (and earlier) are affected by an Access of Uninitialized Pointer vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[]
null
7.8
null
null
CVE-2025-47520
WordPress Charitable <= 1.8.5.1 - Cross Site Scripting (XSS) Vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Syed Balkhi Charitable allows Stored XSS. This issue affects Charitable: from n/a through 1.8.5.1.
[]
null
5.9
null
null
CVE-2021-21317
Denial of Service in uap-core
uap-core in an open-source npm package which contains the core of BrowserScope's original user agent string parser. In uap-core before version 0.11.0, some regexes are vulnerable to regular expression denial of service (REDoS) due to overlapping capture groups. This allows remote attackers to overload a server by setting the User-Agent header in an HTTP(S) request to maliciously crafted long strings. This is fixed in version 0.11.0. Downstream packages such as uap-python, uap-ruby etc which depend upon uap-core follow different version schemes.
[ "cpe:2.3:a:uap-core_project:uap-core:*:*:*:*:*:node.js:*:*" ]
null
5.3
null
null
RHSA-2022:8846
Red Hat Security Advisory: Red Hat OpenStack Platform 16.2.4 (puppet) security update
puppet: silent configuration failure in agent
[ "cpe:/a:redhat:openstack:16.2::el8" ]
null
6.3
null
null
GHSA-qxp2-p463-6f3f
An elevation of privilege vulnerability exists in the way that the Windows Network List Service handles objects in memory, aka 'Windows Network List Service Elevation of Privilege Vulnerability'.
[]
null
null
null
null
CVE-2020-24403
Incorrect permissions could lead to unauthorized modification of inventory source data via REST API
Magento version 2.4.0 and 2.3.5p1 (and earlier) are affected by an incorrect user permissions vulnerability within the Inventory component. This vulnerability could be abused by authenticated users with Inventory and Source permissions to make unauthorized changes to inventory source data via the REST API.
[ "cpe:2.3:a:magento:magento:*:*:*:*:commerce:*:*:*", "cpe:2.3:a:magento:magento:*:*:*:*:open_source:*:*:*", "cpe:2.3:a:magento:magento:2.3.5:-:*:*:commerce:*:*:*", "cpe:2.3:a:magento:magento:2.3.5:-:*:*:open_source:*:*:*", "cpe:2.3:a:magento:magento:2.3.5:p1:*:*:commerce:*:*:*", "cpe:2.3:a:magento:magento:2.3.5:p1:*:*:open_source:*:*:*", "cpe:2.3:a:magento:magento:2.4.0:*:*:*:commerce:*:*:*", "cpe:2.3:a:magento:magento:2.4.0:*:*:*:open_source:*:*:*" ]
null
2.7
null
null
CVE-2021-30935
A logic issue was addressed with improved validation. This issue is fixed in Security Update 2021-008 Catalina, macOS Big Sur 11.6.2. An application may be able to execute arbitrary code with kernel privileges.
[ "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-005:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-007:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-002:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-003:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-004:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-005:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-006:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-007:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:supplemental_update:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*" ]
null
8.8
null
8.3
GHSA-r59j-cggc-648q
Insufficient granularity of access control in out-of-band management in some Intel(R) Atom and Intel Xeon Scalable Processors may allow a privileged user to potentially enable escalation of privilege via adjacent network access.
[]
null
6.8
null
null
CVE-2006-4835
Bluview Blue Magic Board (BMB) (aka BMForum) 5.5 allows remote attackers to obtain sensitive information via a direct request to (1) footer.php, (2) header.php, (3) db_mysql_error.php, (4) langlist.php, (5) sendmail.php, or (6) style.php, which reveals the path in various error messages.
[ "cpe:2.3:a:bluview:blue_magic_board:5.5:*:*:*:*:*:*:*" ]
null
null
null
5
GHSA-r943-gcwv-6gq5
A code injection vulnerability in backup/plugin.php of Bludit 3.13.1 allows attackers to execute arbitrary code via a crafted ZIP file.
[]
null
null
null
null
CVE-2014-3909
Session fixation vulnerability in Falcon WisePoint 4.1.19.7 and earlier allows remote attackers to hijack web sessions via unspecified vectors.
[ "cpe:2.3:a:falconsc:wisepoint:*:*:*:*:*:*:*:*", "cpe:2.3:a:falconsc:wisepoint:3.6.7:*:*:*:*:*:*:*", "cpe:2.3:a:falconsc:wisepoint:3.6.8:*:*:*:*:*:*:*", "cpe:2.3:a:falconsc:wisepoint:3.6.10:*:*:*:*:*:*:*", "cpe:2.3:a:falconsc:wisepoint:3.6.11:*:*:*:*:*:*:*", "cpe:2.3:a:falconsc:wisepoint:3.6.13:*:*:*:*:*:*:*", "cpe:2.3:a:falconsc:wisepoint:3.6.15:*:*:*:*:*:*:*", "cpe:2.3:a:falconsc:wisepoint:3.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:falconsc:wisepoint:3.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:falconsc:wisepoint:3.7.2:*:*:*:*:*:*:*", "cpe:2.3:a:falconsc:wisepoint:3.7.3:*:*:*:*:*:*:*", "cpe:2.3:a:falconsc:wisepoint:4.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:falconsc:wisepoint:4.1.10:*:*:*:*:*:*:*", "cpe:2.3:a:falconsc:wisepoint:4.1.13:*:*:*:*:*:*:*", "cpe:2.3:a:falconsc:wisepoint:4.1.17:*:*:*:*:*:*:*", "cpe:2.3:a:falconsc:wisepoint:4.1.18:*:*:*:*:*:*:*", "cpe:2.3:a:falconsc:wisepoint:4.1.19:*:*:*:*:*:*:*", "cpe:2.3:a:falconsc:wisepoint:4.1.19.1:*:*:*:*:*:*:*", "cpe:2.3:a:falconsc:wisepoint:4.1.19.2:*:*:*:*:*:*:*", "cpe:2.3:a:falconsc:wisepoint:4.1.19.4:*:*:*:*:*:*:*", "cpe:2.3:a:falconsc:wisepoint:4.1.19.6:*:*:*:*:*:*:*" ]
null
null
null
6.8
CVE-2007-1932
Directory traversal vulnerability in scarnews.inc.php in ScarNews 1.2.1 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the sn_admin_dir parameter.
[ "cpe:2.3:a:scar4u:scarnews:1.2.1:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2020-23765
A file upload vulnerability was discovered in the file path /bl-plugins/backup/plugin.php on Bludit version 3.12.0. If an attacker is able to gain Administrator rights they will be able to use unsafe plugins to upload a backup file and control the server.
[ "cpe:2.3:a:bludit:bludit:3.12.0:*:*:*:*:*:*:*" ]
null
7.2
null
6.5
CVE-2012-3739
The Passcode Lock implementation in Apple iOS before 6 allows physically proximate attackers to bypass an intended passcode requirement via vectors involving use of the camera.
[ "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.1.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.1.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.1.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.1.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.2.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.2.8:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.3.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.3.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.3.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.3.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.3.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:5.0.1:*:*:*:*:*:*:*" ]
null
null
null
2.1
CVE-2016-2789
Cross-site scripting (XSS) vulnerability in the Web User Interface in Citrix XenMobile Server 10.0, 10.1 before Rolling Patch 4, and 10.3 before Rolling Patch 1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
[ "cpe:2.3:a:citrix:xenmobile_server:10.0:*:*:*:*:*:*:*", "cpe:2.3:a:citrix:xenmobile_server:10.1:*:*:*:*:*:*:*", "cpe:2.3:a:citrix:xenmobile_server:10.3:*:*:*:*:*:*:*" ]
null
null
6.1
4.3
PYSEC-2023-153
null
Open Redirect vulnerability in Horizon Web Dashboard 19.4.0 thru 20.1.4 via the success_url parameter.
[]
null
6.1
null
null
GHSA-jhgf-xqjm-37vh
The vulnerability allows any attacker to cause the PeerTube server to stop functioning, or in special cases send requests to arbitrary URLs (Blind SSRF). Attackers can send ActivityPub activities to PeerTube's "inbox" endpoint. By abusing the "Create Activity" functionality, it is possible to create crafted playlists which will cause either denial of service or an attacker-controlled blind SSRF.
[]
null
7.5
null
null
GHSA-hcff-292w-f9c6
Directory traversal vulnerability in Microsoft SharePoint Server 2010 SP1 and SharePoint Foundation 2010 SP1 allows remote attackers to bypass intended read restrictions for content, and hijack user accounts, via a crafted URL, aka "SharePoint Directory Traversal Vulnerability."
[]
null
null
null
null
CVE-2004-1168
Stack-based buffer overflow in the WebDav handler in MaxDB WebTools 7.5.00.18 and earlier allows remote attackers to execute arbitrary code via a long Overwrite header.
[ "cpe:2.3:a:mysql:maxdb:7.5.00.08:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:maxdb:7.5.00.11:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:maxdb:7.5.00.12:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:maxdb:7.5.00.14:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:maxdb:7.5.00.15:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:maxdb:7.5.00.16:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:maxdb:7.5.00.18:*:*:*:*:*:*:*" ]
null
null
null
10
CVE-2023-27581
github-slug-action vulnerable to arbitrary code execution
github-slug-action is a GitHub Action to expose slug value of GitHub environment variables inside of one's GitHub workflow. Starting in version 4.0.0` and prior to version 4.4.1, this action uses the `github.head_ref` parameter in an insecure way. This vulnerability can be triggered by any user on GitHub on any workflow using the action on pull requests. They just need to create a pull request with a branch name, which can contain the attack payload. This can be used to execute code on the GitHub runners and to exfiltrate any secrets one uses in the CI pipeline. A patched action is available in version 4.4.1. No workaround is available.
[ "cpe:2.3:a:github-slug-action_project:github-slug-action:*:*:*:*:*:*:*:*" ]
null
8.8
null
null
GHSA-j4j6-8w77-m9g6
The device uses a weak hashing alghorithm to create the password hash. Hence, a matching password can be easily calculated by an attacker. This impacts the security and the integrity of the device.
[]
null
9.8
null
null
GHSA-mxcc-7h5m-x57r
Jenkins GitHub plugin uses weak webhook signature function
Jenkins GitHub Plugin 1.34.4 and earlier uses a non-constant time comparison function when checking whether the provided and computed webhook signatures are equal, allowing attackers to use statistical methods to obtain a valid webhook signature. GitHub Plugin 1.34.5 uses a constant-time comparison when validating the webhook signature.
[]
null
3.1
null
null
GHSA-8gfm-33ch-4g7g
A vulnerability has been found in SourceCodester Task Reminder System 1.0 and classified as critical. This vulnerability affects unknown code of the file /admin/user/manage_user.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-226984.
[]
null
null
6.3
null
GHSA-wjmw-g7qq-g6h2
A remote code execution vulnerability in Remote Desktop Manager 2023.2.33 and earlier on Windows allows an attacker to remotely execute code from another windows user session on the same host via a specially crafted TCP packet.
[]
null
9.8
null
null
GHSA-jwf4-7gp8-34rw
LinuxMint as of 2012-03-19 has temporary file creation vulnerabilities in mintUpdate.
[]
null
null
null
null
CVE-2014-1876
The unpacker::redirect_stdio function in unpack.cpp in unpack200 in OpenJDK 6, 7, and 8; Oracle Java SE 5.0u61, 6u71, 7u51, and 8; JRockit R27.8.1 and R28.3.1; and Java SE Embedded 7u51 does not securely create temporary files when a log file cannot be opened, which allows local users to overwrite arbitrary files via a symlink attack on /tmp/unpack.log.
[ "cpe:2.3:a:oracle:openjdk:1.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:1.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:1.8.0:*:*:*:*:*:*:*" ]
null
null
null
4.4
GHSA-x6vq-vc9q-792p
An exploitable double free vulnerability exists in the mdnscap binary of the CUJO Smart Firewall. When parsing mDNS packets, a memory space is freed twice if an invalid query name is encountered, leading to arbitrary code execution in the context of the mdnscap process. An unauthenticated attacker can send an mDNS message to trigger this vulnerability.
[]
null
null
9.8
null
CVE-2018-9385
In driver_override_store of bus.c, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-74128061 References: Upstream kernel.
[ "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*" ]
null
null
7.8
4.6
GHSA-h59w-6mm4-73p7
IBM InfoSphere Information Server 11.7 stores potentially sensitive information in log files that could be read by a local user. IBM X-Force ID: 280361.
[]
null
6.5
null
null
GHSA-7gpf-385q-5h48
Unspecified vulnerability in the Oracle Mobile Application Servlet component in Oracle E-Business Suite 12.1 and 12.2 allows local users to affect confidentiality via vectors related to MWA Server Manager.
[]
null
null
null
null
CVE-2018-14724
In the Ban List plugin 1.0 for MyBB, any forum user with mod privileges can ban users and input an XSS payload into the ban reason, which is executed on the bans.php page.
[ "cpe:2.3:a:mybb:ban_list:1.0:*:*:*:*:mybb:*:*" ]
null
null
5.4
3.5
GHSA-gxgx-2mvf-9gh5
Joda Time v2.12.5 was discovered to contain a NullPointerException via the component org.joda.time.format.PeriodFormat::wordBased(Locale).
[]
null
9.1
null
null
GHSA-62qw-r234-68pp
EMC ESRS VE 3.18 or earlier contains Authentication Bypass that could potentially be exploited by malicious users to compromise the affected system.
[]
null
null
5.3
null
CVE-2021-41063
SQL injection vulnerability was discovered in Aanderaa GeoView Webservice prior to version 2.1.3 that could allow an unauthenticated attackers to execute arbitrary commands.
[ "cpe:2.3:a:xylem:aanderaa_geoview:*:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
GHSA-794h-xvgw-ww58
Cross-site scripting (XSS) vulnerability in the IBM Tivoli Monitoring (ITM) Java servlet container in Cisco Prime Central for Hosted Collaboration Solution allows remote attackers to inject arbitrary web script or HTML via an unspecified parameter, aka Bug ID CSCud51068.
[]
null
null
null
null
CVE-2023-47463
Insecure Permissions vulnerability in GL.iNet AX1800 version 4.0.0 before 4.5.0 allows a remote attacker to execute arbitrary code via a crafted script to the gl_nas_sys authentication function.
[ "cpe:2.3:o:gl-inet:gl-ax1800_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:gl-inet:gl-ax1800:-:*:*:*:*:*:*:*" ]
null
9.8
null
null
GHSA-9r4x-xm82-3v6p
Vulnerability in the Oracle Hospitality Simphony component of Oracle Hospitality Applications (subcomponent: POS). Supported versions that are affected are 2.7, 2.8 and 2.9. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Hospitality Simphony. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Hospitality Simphony. CVSS 3.0 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
[]
null
null
7.5
null
GHSA-3m9p-gg83-8m75
A vulnerability has been identified in PADS Standard/Plus Viewer (All versions). The affected application contains an out of bounds write past the end of an allocated structure while parsing specially crafted PCB files. This could allow an attacker to execute code in the context of the current process. (FG-VD-22-038)
[]
null
7.8
null
null
GHSA-868g-c3hc-28w2
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0045.
[]
null
7.8
null
null
GHSA-3rfh-9f52-4ppx
Cross-site Scripting (XSS) - Stored in GitHub repository orchardcms/orchardcore prior to 1.2.2.
[]
null
null
null
null
GHSA-2hwf-hm8p-fc5c
A Cross-Site Request Forgery (CSRF) in Codeigniter 3.1.13 allows attackers to arbitrarily change the Administrator password and escalate privileges.
[]
null
7.5
null
null
CVE-2022-2768
SourceCodester Library Management System cross site scripting
A vulnerability classified as problematic was found in SourceCodester Library Management System. This vulnerability affects unknown code of the file /qr/I/. The manipulation of the argument error leads to cross site scripting. The attack can be initiated remotely. The identifier of this vulnerability is VDB-206164.
[ "cpe:2.3:a:library_management_system_project:library_management_system:-:*:*:*:*:*:*:*" ]
null
3.5
null
null
GHSA-mpcj-733c-h3vq
Online Sports Complex Booking System 1.0 is vulnerable to SQL Injection via /scbs/classes/Users.php?f=save_client.
[]
null
6.1
null
null
CVE-2010-5253
Untrusted search path vulnerability in WinImage 8.50 allows local users to gain privileges via a Trojan horse wnaspi32.dll file in the current working directory, as demonstrated by a directory that contains a .imz file. NOTE: some of these details are obtained from third party information.
[ "cpe:2.3:a:winimage:winimage:8.50:*:*:*:*:*:*:*" ]
null
null
null
6.9
ICSA-23-206-03
Emerson ROC800 Series RTU and DL8000 Preset Controller
ROC800-Series RTU devices are vulnerable to an authentication bypass, which could allow an attacker to gain unauthorized access to data or control of the device and cause a denial-of-service condition.
[]
null
null
9.4
null
GHSA-mr75-899x-qcxq
Missing permission checks in Jenkins Chaos Monkey Plugin
Jenkins Chaos Monkey Plugin 0.3 and earlier does not perform permission checks in several HTTP endpoints.This allows attackers with Overall/Read permission to generate load and to generate memory leaks.Jenkins Chaos Monkey Plugin 0.4 requires Overall/Administer permission to generate load and to generate memory leaks.
[]
null
7.5
null
null
GHSA-67fw-w8f2-88wp
casdoor's use of`ssh.InsecureIgnoreHostKey()` disables host key verification
An issue discovered in casdoor v1.636.0 allows attackers to obtain sensitive information via the `ssh.InsecureIgnoreHostKey()` method.
[]
6.9
3.7
null
null
GHSA-3wrv-h289-483m
In the Linux kernel, the following vulnerability has been resolved:btrfs: fix memory ordering between normal and ordered work functionsOrdered work functions aren't guaranteed to be handled by the same thread which executed the normal work functions. The only way execution between normal/ordered functions is synchronized is via the WORK_DONE_BIT, unfortunately the used bitops don't guarantee any ordering whatsoever.This manifested as seemingly inexplicable crashes on ARM64, where async_chunk::inode is seen as non-null in async_cow_submit which causes submit_compressed_extents to be called and crash occurs because async_chunk::inode suddenly became NULL. The call trace was similar to:Fix this by adding respective barrier calls which ensure that all accesses preceding setting of WORK_DONE_BIT are strictly ordered before setting the flag. At the same time add a read barrier after reading of WORK_DONE_BIT in run_ordered_work which ensures all subsequent loads would be strictly ordered after reading the bit. This in turn ensures are all accesses before WORK_DONE_BIT are going to be strictly ordered before any access that can occur in ordered_func.
[]
null
6.3
null
null
RHSA-2016:1781
Red Hat Security Advisory: rh-postgresql94-postgresql security update
postgresql: CASE/WHEN with inlining can cause untrusted pointer dereference postgresql: privilege escalation via crafted database and role names
[ "cpe:/a:redhat:rhel_software_collections:2::el6", "cpe:/a:redhat:rhel_software_collections:2::el7" ]
null
null
7.6
null
CVE-2018-3131
Vulnerability in the Oracle Hospitality Gift and Loyalty component of Oracle Food and Beverage Applications. The supported version that is affected is 9.0. Easily exploitable vulnerability allows low privileged attacker having Report privilege with logon to the infrastructure where Oracle Hospitality Gift and Loyalty executes to compromise Oracle Hospitality Gift and Loyalty. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Hospitality Gift and Loyalty accessible data as well as unauthorized update, insert, or delete access to some of Oracle Hospitality Gift and Loyalty accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N).
[ "cpe:2.3:a:oracle:hospitality_gift_and_loyalty:9.0:*:*:*:*:*:*:*" ]
null
null
6.1
3.6
GHSA-5f85-54q8-wff9
A vulnerability, which was classified as critical, was found in 1000 Projects Portfolio Management System MCA 1.0. Affected is an unknown function of the file /update_ach_details.php. The manipulation of the argument q leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
[]
6.9
7.3
null
null
CVE-2021-34981
Linux Kernel Bluetooth CMTP Module Double Free Privilege Escalation Vulnerability
Linux Kernel Bluetooth CMTP Module Double Free Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Linux Kernel. An attacker must first obtain the ability to execute high-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the CMTP module. The issue results from the lack of validating the existence of an object prior to performing further free operations on the object. An attacker can leverage this vulnerability to escalate privileges and execute code in the context of the kernel. Was ZDI-CAN-11977.
[ "cpe:2.3:a:linux:kernel:4.15.0-118-generic:*:*:*:*:*:*:*" ]
null
null
7.5
null
GHSA-xg2f-wm4r-9wpr
The Qualcomm RF driver in Android 6.x before 2016-04-01 does not properly restrict access to socket ioctl calls, which allows attackers to gain privileges via a crafted application, aka internal bug 26324307.
[]
null
null
8.4
null
GHSA-6h6j-8576-v4xg
GFI MailEssentials prior to version 21.8 is vulnerable to a local privilege escalation issue. A local attacker can escalate to NT Authority/SYSTEM by sending a crafted serialized payload to a .NET Remoting Service.
[]
null
7.8
null
null
CVE-2022-1682
Reflected Xss using url based payload in neorazorx/facturascripts
Reflected Xss using url based payload in GitHub repository neorazorx/facturascripts prior to 2022.07. Xss can use to steal user's cookies which lead to Account takeover or do any malicious activity in victim's browser
[ "cpe:2.3:a:facturascripts:facturascripts:*:*:*:*:*:*:*:*" ]
null
null
9.4
null
ICSA-23-313-02
Hitachi Energy eSOMS
The response messages received from the eSOMS report generation using certain parameter queries with full file path can be abused for enumerating the local file system structure. The responses for web queries with certain parameters disclose internal path of resources. This information can be used to learn internal structure of the application and to further plot attacks against web servers and deployed web applications. Poorly constructed webap requests and URI components with special characters trigger unhandled errors and exceptions, disclosing information about the underlying technology and other sensitive information details. The website unintentionally reveals sensitive information including technical details like version Info, endpoints, backend server, Internal IP. etc., which could expose additional attack surface containing other vulnerabilities.
[]
null
5.3
null
null
GHSA-5722-v5wc-x7h8
Jenkins veracode-scanner Plugin stores credentials in plain text
Jenkins veracode-scanner Plugin stores credentials unencrypted in its global configuration file `org.jenkinsci.plugins.veracodescanner.VeracodeNotifier.xml` on the Jenkins controller. These credentials can be viewed by users with access to the Jenkins controller file system.
[]
null
null
3.3
null
CVE-2022-48459
In TeleService, there is a possible system crash due to improper input validation. This could lead to local denial of service with no additional execution privileges needed
[ "cpe:2.3:o:google:android:11.0:-:*:*:*:*:*:*", "cpe:2.3:o:google:android:12.0:-:*:*:*:*:*:*", "cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:sc7731e:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:sc9832e:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t310:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*" ]
null
5.5
null
null
GHSA-qh5f-x6pg-3r4j
Heap-based buffer overflow in Lhaplus.exe in Lhaplus 1.52, and possibly earlier versions, allows remote attackers to execute arbitrary code via an LZH archive with a long header, as specified by the extendedHeaderSize.
[]
null
null
null
null
GHSA-34xf-292h-46f4
In the Linux kernel, the following vulnerability has been resolved:mlxsw: thermal: Fix out-of-bounds memory accessesCurrently, mlxsw allows cooling states to be set above the maximum cooling state supported by the driver:cat /sys/class/thermal/thermal_zone2/cdev0/typemlxsw_fancat /sys/class/thermal/thermal_zone2/cdev0/max_state10echo 18 > /sys/class/thermal/thermal_zone2/cdev0/cur_stateecho $?0This results in out-of-bounds memory accesses when thermal state transition statistics are enabled (CONFIG_THERMAL_STATISTICS=y), as the transition table is accessed with a too large index (state) [1].According to the thermal maintainer, it is the responsibility of the driver to reject such operations [2].Therefore, return an error when the state to be set exceeds the maximum cooling state supported by the driver.To avoid dead code, as suggested by the thermal maintainer [3], partially revert commit a421ce088ac8 ("mlxsw: core: Extend cooling device with cooling levels") that tried to interpret these invalid cooling states (above the maximum) in a special way. The cooling levels array is not removed in order to prevent the fans going below 20% PWM, which would cause them to get stuck at 0% PWM.[1] BUG: KASAN: slab-out-of-bounds in thermal_cooling_device_stats_update+0x271/0x290 Read of size 4 at addr ffff8881052f7bf8 by task kworker/0:0/5CPU: 0 PID: 5 Comm: kworker/0:0 Not tainted 5.15.0-rc3-custom-45935-gce1adf704b14 #122 Hardware name: Mellanox Technologies Ltd. "MSN2410-CB2FO"/"SA000874", BIOS 4.6.5 03/08/2016 Workqueue: events_freezable_power_ thermal_zone_device_check Call Trace: dump_stack_lvl+0x8b/0xb3 print_address_description.constprop.0+0x1f/0x140 kasan_report.cold+0x7f/0x11b thermal_cooling_device_stats_update+0x271/0x290 __thermal_cdev_update+0x15e/0x4e0 thermal_cdev_update+0x9f/0xe0 step_wise_throttle+0x770/0xee0 thermal_zone_device_update+0x3f6/0xdf0 process_one_work+0xa42/0x1770 worker_thread+0x62f/0x13e0 kthread+0x3ee/0x4e0 ret_from_fork+0x1f/0x30Allocated by task 1: kasan_save_stack+0x1b/0x40 __kasan_kmalloc+0x7c/0x90 thermal_cooling_device_setup_sysfs+0x153/0x2c0 __thermal_cooling_device_register.part.0+0x25b/0x9c0 thermal_cooling_device_register+0xb3/0x100 mlxsw_thermal_init+0x5c5/0x7e0 __mlxsw_core_bus_device_register+0xcb3/0x19c0 mlxsw_core_bus_device_register+0x56/0xb0 mlxsw_pci_probe+0x54f/0x710 local_pci_probe+0xc6/0x170 pci_device_probe+0x2b2/0x4d0 really_probe+0x293/0xd10 __driver_probe_device+0x2af/0x440 driver_probe_device+0x51/0x1e0 __driver_attach+0x21b/0x530 bus_for_each_dev+0x14c/0x1d0 bus_add_driver+0x3ac/0x650 driver_register+0x241/0x3d0 mlxsw_sp_module_init+0xa2/0x174 do_one_initcall+0xee/0x5f0 kernel_init_freeable+0x45a/0x4de kernel_init+0x1f/0x210 ret_from_fork+0x1f/0x30The buggy address belongs to the object at ffff8881052f7800 which belongs to the cache kmalloc-1k of size 1024 The buggy address is located 1016 bytes inside of 1024-byte region [ffff8881052f7800, ffff8881052f7c00) The buggy address belongs to the page: page:0000000052355272 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1052f0 head:0000000052355272 order:3 compound_mapcount:0 compound_pincount:0 flags: 0x200000000010200(slab|head|node=0|zone=2) raw: 0200000000010200 ffffea0005034800 0000000300000003 ffff888100041dc0 raw: 0000000000000000 0000000000100010 00000001ffffffff 0000000000000000 page dumped because: kasan: bad access detectedMemory state around the buggy address: ffff8881052f7a80: 00 00 00 00 00 00 04 fc fc fc fc fc fc fc fc fc ffff8881052f7b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fcffff8881052f7b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc ^ ffff8881052f7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc ffff8881052f7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc[2] https://lore.kernel.org/linux-pm/9aca37cb-1629-5c67- ---truncated---
[]
null
7.3
null
null
CVE-2022-3111
An issue was discovered in the Linux kernel through 5.16-rc6. free_charger_irq() in drivers/power/supply/wm8350_power.c lacks free of WM8350_IRQ_CHG_FAST_RDY, which is registered in wm8350_init_charger().
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:5.16.0:-:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:5.16.0:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:5.16.0:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:5.16.0:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:5.16.0:rc4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:5.16.0:rc5:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:5.16.0:rc6:*:*:*:*:*:*" ]
null
5.5
null
null
CVE-2022-1825
Cross-site Scripting (XSS) - Reflected in collectiveaccess/providence
Cross-site Scripting (XSS) - Reflected in GitHub repository collectiveaccess/providence prior to 1.8.
[ "cpe:2.3:a:collectiveaccess:providence:*:*:*:*:*:*:*:*" ]
null
null
5.5
null
CVE-2024-9219
WordPress Social Share Buttons <= 1.19 - Reflected Cross-Site Scripting
The WordPress Social Share Buttons plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 1.19. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
[ "cpe:2.3:a:maxfoundry:social_share_buttons:*:*:*:*:*:wordpress:*:*" ]
null
6.1
null
null
GHSA-8h6x-c8rf-g4xj
It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-16 package apport hooks, it could expose private data to other local users.
[]
null
null
null
null
CVE-2017-18599
The Pinfinity theme before 2.0 for WordPress has XSS via the s parameter.
[ "cpe:2.3:a:pinfinity_project:pinfinity:*:*:*:*:*:wordpress:*:*" ]
null
6.1
null
4.3
CVE-2019-7006
Avaya one-X Communicator Weak Encryption
Avaya one-X Communicator uses weak cryptographic algorithms in the client authentication component that could allow a local attacker to decrypt sensitive information. Affected versions include all 6.2.x versions prior to 6.2 SP13.
[ "cpe:2.3:a:avaya:one-x_communicator:6.2:-:*:*:*:*:*:*", "cpe:2.3:a:avaya:one-x_communicator:6.2:fp10:*:*:*:*:*:*", "cpe:2.3:a:avaya:one-x_communicator:6.2:fp3:*:*:*:*:*:*", "cpe:2.3:a:avaya:one-x_communicator:6.2:fp4:*:*:*:*:*:*", "cpe:2.3:a:avaya:one-x_communicator:6.2:fp6:*:*:*:*:*:*", "cpe:2.3:a:avaya:one-x_communicator:6.2:sp1:*:*:*:*:*:*", "cpe:2.3:a:avaya:one-x_communicator:6.2:sp12:*:*:*:*:*:*", "cpe:2.3:a:avaya:one-x_communicator:6.2:sp2:*:*:*:*:*:*", "cpe:2.3:a:avaya:one-x_communicator:6.2:sp5:*:*:*:*:*:*", "cpe:2.3:a:avaya:one-x_communicator:6.2:sp7:*:*:*:*:*:*" ]
null
null
6.5
null
GHSA-gf9j-vw99-34gv
Insufficient policy enforcement in trusted types in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to bypass content security policy via a crafted HTML page.
[]
null
6.5
null
null
GHSA-9v9j-h73g-wgrg
Cisco Unified MeetingPlace 8.6(1.9) allows remote attackers to read arbitrary files via a crafted resource request, aka Bug ID CSCus95603.
[]
null
null
null
null
GHSA-h87h-f59q-c882
SQL injection vulnerability in CafeEngine allows remote attackers to execute arbitrary SQL commands via the id parameter to (1) dish.php and (2) menu.php.
[]
null
null
null
null
CVE-2022-25301
Prototype Pollution
All versions of package jsgui-lang-essentials are vulnerable to Prototype Pollution due to allowing all Object attributes to be altered, including their magical attributes such as proto, constructor and prototype.
[ "cpe:2.3:a:jsgui-lang-essentials_project:jsgui-lang-essentials:*:*:*:*:*:*:*:*" ]
null
7.7
null
null
CVE-2009-1027
SQL injection vulnerability in OpenCart 1.1.8 allows remote attackers to execute arbitrary SQL commands via the order parameter.
[ "cpe:2.3:a:opencart:opencart:1.1.8:*:*:*:*:*:*:*" ]
null
null
null
7.5
RHSA-2022:4896
Red Hat Security Advisory: Red Hat Virtualization security, bug fix, and enhancement update [ovirt-4.5.0]
zlib: A flaw found in zlib when compressing (not decompressing) certain inputs kernel: use-after-free in RDMA listen() kernel: fget: check that the fd still exists after getting a ref to it openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates gzip: arbitrary-file-write vulnerability rsyslog: Heap-based overflow in TCP syslog server kernel: heap out of bounds write in nf_dup_netdev.c
[ "cpe:/o:redhat:rhev_hypervisor:4.4::el8" ]
null
7.8
null
null
CVE-2024-34678
Out-of-bounds write in libsapeextractor.so prior to SMR Nov-2024 Release 1 allows local attackers to cause memory corruption.
[ "cpe:2.3:o:samsung:android:12.0:-:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-apr-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-apr-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-apr-2024-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-aug-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-aug-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-aug-2024-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-dec-2021-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-dec-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-dec-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-feb-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-feb-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-feb-2024-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-jan-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-jan-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-jan-2024-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-jul-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-jul-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-jul-2024-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-jun-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-jun-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-jun-2024-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-mar-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-mar-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-mar-2024-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-may-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-may-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-may-2024-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-nov-2021-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-nov-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-nov-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-oct-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-oct-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-oct-2024-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-sep-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-sep-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr_sep-2024-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:-:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-apr-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-apr-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-apr-2024-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-aug-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-aug-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-aug-2024-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-dec-2021-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-dec-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-dec-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-feb-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-feb-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-feb-2024-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-jan-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-jan-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-jan-2024-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-jul-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-jul-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-jul-2024-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-jun-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-jun-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-jun-2024-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-mar-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-mar-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-mar-2024-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-may-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-may-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-may-2024-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-nov-2021-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-nov-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-nov-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-oct-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-oct-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-oct-2024-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-sep-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-sep-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-sep-2024-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:-:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-apr-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-apr-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-apr-2024-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-aug-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-aug-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-aug-2024-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-dec-2021-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-dec-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-dec-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-feb-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-feb-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-feb-2024-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-jan-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-jan-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-jan-2024-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-jul-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-jul-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-jul-2024-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-jun-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-jun-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-jun-2024-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-mar-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-mar-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-mar-2024-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-may-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-may-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-may-2024-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-nov-2021-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-nov-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-nov-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-oct-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-oct-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-oct-2024-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-sep-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-sep-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-sep-2024-r1:*:*:*:*:*:*" ]
null
5.9
null
null
CVE-2002-1260
The Java Database Connectivity (JDBC) APIs in Microsoft Virtual Machine (VM) 5.0.3805 and earlier allow remote attackers to bypass security checks and access database contents via an untrusted Java applet.
[ "cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2000:*:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2000:*:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2000:*:sp3:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2000_terminal_services:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2000_terminal_services:*:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2000_terminal_services:*:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2000_terminal_services:*:sp3:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_95:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_95:*:sr2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_98:*:gold:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_98se:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_me:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_nt:4.0:sp1:enterprise_server:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_nt:4.0:sp1:server:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_nt:4.0:sp1:terminal_server:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_nt:4.0:sp1:workstation:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_nt:4.0:sp2:enterprise_server:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_nt:4.0:sp2:server:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_nt:4.0:sp2:terminal_server:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_nt:4.0:sp2:workstation:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_nt:4.0:sp3:enterprise_server:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_nt:4.0:sp3:server:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_nt:4.0:sp3:terminal_server:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_nt:4.0:sp3:workstation:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_nt:4.0:sp4:enterprise_server:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_nt:4.0:sp4:server:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_nt:4.0:sp4:terminal_server:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_nt:4.0:sp4:workstation:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_nt:4.0:sp5:enterprise_server:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_nt:4.0:sp5:server:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_nt:4.0:sp5:terminal_server:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_nt:4.0:sp5:workstation:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_nt:4.0:sp6:enterprise_server:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_nt:4.0:sp6:server:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_nt:4.0:sp6:terminal_server:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_nt:4.0:sp6:workstation:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:enterprise_server:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:server:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:terminal_server:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:workstation:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:gold:professional:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:sp1:home:*:*:*:*:*" ]
null
null
null
7.5
GHSA-mj56-5v5w-4p88
Cross-Site Request Forgery (CSRF) vulnerability in topplugins Vignette Ads allows Stored XSS. This issue affects Vignette Ads: from n/a through 0.2.
[]
null
7.1
null
null
GHSA-q9rx-4j7q-qf5g
Adobe Flash Player before 9.0.246.0 and 10.x before 10.0.32.18, and Adobe AIR before 1.5.2, allows attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unspecified vectors, related to a "null pointer vulnerability."
[]
null
null
null
null
CVE-2025-26936
WordPress Fresh Framework plugin <= 1.70.0 - Unauthenticated Remote Code Execution (RCE) vulnerability
Improper Control of Generation of Code ('Code Injection') vulnerability in NotFound Fresh Framework allows Code Injection. This issue affects Fresh Framework: from n/a through 1.70.0.
[]
null
10
null
null
CVE-1999-0528
A router or firewall forwards external packets that claim to come from inside the network that the router/firewall is in front of.
[]
null
null
null
7.5
GHSA-chmc-gg3m-2h26
A permissions issue existed. This issue was addressed with improved permission validation. This issue is fixed in iOS 13.4 and iPadOS 13.4, macOS Catalina 10.15.4, watchOS 6.2. A malicious application may be able to elevate privileges.
[]
null
null
null
null
CVE-2025-20323
Missing Access Control of Saved Searches in the Splunk Archiver app
In Splunk Enterprise versions below 9.4.3, 9.3.5, 9.2.7, and 9.1.10, a low-privileged user that does not hold the "admin" or "power" Splunk roles could turn off the scheduled search `Bucket Copy Trigger` within the Splunk Archiver application. This is because of missing access controls in the saved searches for this app.
[]
null
4.3
null
null
GHSA-rq2v-wcr2-phxj
SAP Business Objects Business Intelligence Platform (BI Launchpad and CMC), versions 4.1, 4.2, allows to an attacker to embed malicious scripts in the application while uploading images, which gets executed when the victim opens these files, leading to Stored Cross Site Scripting
[]
null
null
null
null
CVE-2020-12375
Heap overflow in the BMC firmware for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.47 may allow an authenticated user to potentially enable escalation of privilege via local access.
[ "cpe:2.3:o:intel:bmc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:hns2600bpb:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:hns2600bpb24:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:hns2600bpb24r:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:hns2600bpblc:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:hns2600bpblc24:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:hns2600bpblc24r:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:hns2600bpbr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:hns2600bpq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:hns2600bpq24:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:hns2600bpq24r:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:hns2600bpqr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:hns2600bps:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:hns2600bps24:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:hns2600bps24r:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:hns2600bpsr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:r1000wf:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:r1208wfqysr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:r1208wftys:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:r1208wftysr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:r1304wf0ys:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:r1304wf0ysr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:r1304wftys:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:r1304wftysr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:r2208wf0zs:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:r2208wf0zsr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:r2208wfqzs:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:r2208wfqzsr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:r2208wftzs:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:r2208wftzsr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:r2224wfqzs:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:r2224wftzs:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:r2224wftzsr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:r2308wftzs:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:r2308wftzsr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:r2312wf0np:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:r2312wf0npr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:r2312wfqzs:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:r2312wftzs:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:r2312wftzsr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:s2600bpbr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:s2600bpqr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:s2600bpsr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:s2600stb:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:s2600stq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:s2600wf0:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:s2600wfq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:s2600wft:-:*:*:*:*:*:*:*" ]
null
6.7
null
4.6
CVE-2008-0285
ngIRCd 0.10.x before 0.10.4 and 0.11.0 before 0.11.0-pre2 allows remote attackers to cause a denial of service (crash) via crafted IRC PART message, which triggers an invalid dereference.
[ "cpe:2.3:a:ngircd:ngircd:*:*:*:*:*:*:*:*" ]
null
null
null
5
CVE-2022-27572
Heap-based buffer overflow vulnerability in parser_ipma function of libsimba library prior to SMR Apr-2022 Release 1 allows code execution by remote attackers.
[ "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*" ]
null
8.1
null
null
CVE-2020-9902
An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in iOS 13.6 and iPadOS 13.6, macOS Catalina 10.15.6, tvOS 13.4.8, watchOS 6.2.8. A malicious application may be able to determine kernel memory layout.
[ "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*" ]
null
5.5
null
7.1
GHSA-6mc7-mrrx-8h7m
Unrestricted Upload of File with Dangerous Type in GitHub repository unilogies/bumsys prior to v1.0.3-beta.
[]
null
8.8
null
null
CVE-2025-37937
objtool, media: dib8000: Prevent divide-by-zero in dib8000_set_dds()
In the Linux kernel, the following vulnerability has been resolved: objtool, media: dib8000: Prevent divide-by-zero in dib8000_set_dds() If dib8000_set_dds()'s call to dib8000_read32() returns zero, the result is a divide-by-zero. Prevent that from happening. Fixes the following warning with an UBSAN kernel: drivers/media/dvb-frontends/dib8000.o: warning: objtool: dib8000_tune() falls through to next function dib8096p_cfg_DibRx()
[]
null
null
null
null
CVE-2020-4686
IBM Spectrum Virtualize 8.3.1 could allow a remote user authenticated via LDAP to escalate their privileges and perform actions they should not have access to. IBM X-Force ID: 186678.
[ "cpe:2.3:a:ibm:spectrum_virtualize:8.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:spectrum_virtualize:8.3.1:*:*:*:public_cloud:*:*:*", "cpe:2.3:o:ibm:flashsystem_v5000_firmware:8.3.1:*:*:*:*:*:*:*", "cpe:2.3:h:ibm:flashsystem_v5000:-:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:flashsystem_v7200_firmware:8.3.1:*:*:*:*:*:*:*", "cpe:2.3:h:ibm:flashsystem_v7200:-:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:flashsystem_v9000_firmware:8.3.1:*:*:*:*:*:*:*", "cpe:2.3:h:ibm:flashsystem_v9000:-:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:flashsystem_v9100_firmware:8.3.1:*:*:*:*:*:*:*", "cpe:2.3:h:ibm:flashsystem_v9100:-:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:flashsystem_v9200_firmware:8.3.1:*:*:*:*:*:*:*", "cpe:2.3:h:ibm:flashsystem_v9200:-:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:san_volume_controller_firmware:8.3.1:*:*:*:*:*:*:*", "cpe:2.3:h:ibm:san_volume_controller:-:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:storwize_v5000_firmware:8.3.1:*:*:*:*:*:*:*", "cpe:2.3:h:ibm:storwize_v5000:-:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:storwize_v5000e_firmware:8.3.1:*:*:*:*:*:*:*", "cpe:2.3:h:ibm:storwize_v5000e:-:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:storwize_v5100_firmware:8.3.1:*:*:*:*:*:*:*", "cpe:2.3:h:ibm:storwize_v5100:-:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:storwize_v7000_firmware:8.3.1:*:*:*:*:*:*:*", "cpe:2.3:h:ibm:storwize_v7000:-:*:*:*:*:*:*:*" ]
null
null
6.8
null
GHSA-vvhw-w8wg-x5wc
Windows Graphics Component Remote Code Execution Vulnerability
[]
null
7.8
null
null
RHSA-2023:7547
Red Hat Security Advisory: firefox security update
Mozilla: Out-of-bound memory access in WebGL2 blitFramebuffer Mozilla: Use-after-free in MessagePort::Entangled Mozilla: Clickjacking permission prompts using the fullscreen transition Mozilla: Use-after-free in ReadableByteStreamQueueEntry::Buffer Mozilla: Using Selection API would copy contents into X11 primary selection. Mozilla: Incorrect parsing of relative URLs starting with "///" Mozilla: Memory safety bugs fixed in Firefox 120, Firefox ESR 115.5, and Thunderbird 115.5
[ "cpe:/a:redhat:rhel_e4s:8.1::appstream" ]
null
8.8
null
null
GHSA-h933-4qv8-27xj
In Teltonika Networks RUTOS devices, running on versions 7.0 to 7.8 (excluding) and TSWOS devices running on versions 1.0 to 1.3 (excluding), due to incorrect permission handling a vulnerability exists which allows a lower privileged user with default permissions to access critical device resources via the API.
[]
5.9
null
null
null
GHSA-qxx3-fwc4-2mv7
A “CWE-256: Plaintext Storage of a Password” affecting the administrative account allows an attacker with physical access to the machine to retrieve the password in cleartext.
[]
null
4.2
null
null
GHSA-8c97-v7gf-p365
PHP remote file inclusion vulnerability in info.php in Easy Banner Pro 2.8 allows remote attackers to execute arbitrary PHP code via a URL in the s[phppath] parameter.
[]
null
null
null
null
CVE-2006-4686
Buffer overflow in the Extensible Stylesheet Language Transformations (XSLT) processing in Microsoft XML Parser 2.6 and XML Core Services 3.0 through 6.0 allows remote attackers to execute arbitrary code via a crafted Web page.
[ "cpe:2.3:a:microsoft:xml_core_services:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:xml_core_services:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:xml_core_services:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:xml_parser:2.6:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2023-2694
SourceCodester Online Exam System POST Parameter data sql injection
A vulnerability was found in SourceCodester Online Exam System 1.0. It has been classified as critical. This affects an unknown part of the file /dosen/data of the component POST Parameter Handler. The manipulation of the argument columns[1][data] leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-228975.
[ "cpe:2.3:a:online_exam_system_project:online_exam_system:1.0:*:*:*:*:*:*:*" ]
null
6.3
6.3
6.5
GHSA-26jc-2mw8-4jp3
All versions of OnCommand API Services prior to 2.1 and NetApp Service Level Manager prior to 1.0RC4 log a privileged database user account password. All users are urged to move to a fixed version. Since the affected password is changed during every upgrade/installation no further action is required.
[]
null
7.8
null
null
ICSA-24-193-18
Rockwell Automation ThinManager ThinServer
Due to an improper input validation, an unauthenticated threat actor can send a malicious message to invoke a local or remote executable and cause a remote code execution condition on the affected device. Due to an improper input validation, an unauthenticated threat actor can send a malicious message to invoke SQL injection into the program and cause a remote code execution condition on the affected device. Due to an improper input validation, an unauthenticated threat actor can send a malicious message to a monitor thread within ThinServer and cause a denial-of-service condition on the affected device.
[]
null
7.5
null
null
GHSA-4pfc-4qw7-wq28
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in TaskMeister Accessibility Task Manager allows Reflected XSS. This issue affects Accessibility Task Manager: from n/a through 1.2.1.
[]
null
7.1
null
null