id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
197k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
RHSA-2017:1422
Red Hat Security Advisory: Red Hat Directory Server 9 - Final Day Of Retirement Notice
This is the final day of notification for the retirement of Red Hat Directory Server 9.
[ "cpe:/a:redhat:directory_server:9" ]
null
null
null
null
CVE-2017-4898
VMware Workstation Pro/Player 12.x before 12.5.3 contains a DLL loading vulnerability that occurs due to the "vmware-vmx" process loading DLLs from a path defined in the local environment-variable. Successful exploitation of this issue may allow normal users to escalate privileges to System in the host machine where VMware Workstation is installed.
[ "cpe:2.3:a:vmware:workstation_player:12.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:workstation_player:12.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:workstation_player:12.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:workstation_player:12.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:workstation_player:12.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:workstation_player:12.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:workstation_pro:12.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:workstation_pro:12.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:workstation_pro:12.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:workstation_pro:12.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:workstation_pro:12.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:workstation_pro:12.5.2:*:*:*:*:*:*:*" ]
null
null
8.8
6.9
RHSA-2020:0178
Red Hat Security Advisory: kernel security and enhancement update
kernel: use-after-free in fs/xfs/xfs_super.c
[ "cpe:/o:redhat:rhel_aus:7.3::server", "cpe:/o:redhat:rhel_e4s:7.3::server", "cpe:/o:redhat:rhel_tus:7.3::server" ]
null
null
7.8
null
GHSA-pr7f-w5w8-8mp6
Rukovoditel v3.2.1 was discovered to contain a SQL injection vulnerability via the order_by parameter at /rukovoditel/index.php?module=logs/view&type=php.
[]
null
8.8
null
null
CVE-2019-14682
The acf-better-search (aka ACF: Better Search) plugin before 3.3.1 for WordPress allows wp-admin/options-general.php?page=acfbs_admin_page CSRF.
[ "cpe:2.3:a:acf\\:_better_search_project:acf\\:_better_search:*:*:*:*:*:wordpress:*:*" ]
null
null
4.3
4.3
CVE-2025-46345
Auth0 Account Link Extension JWT Invalid Signature Validation
Auth0 Account Link Extension is an extension aimed to help link accounts easily. Versions 2.3.4 to 2.6.6 do not verify the signature of the provided JWT. This allows the user the ability to supply a forged token and the potential to access user information without proper authorization. This issue has been patched in versions 2.6.7, 2.7.0, and 3.0.0. It is recommended to upgrade to version 3.0.0 or greater.
[]
6.9
null
null
null
GHSA-rg3w-c6h2-jc6h
Vulnerability in the Oracle Hospitality OPERA 5 Property Services component of Oracle Hospitality Applications (subcomponent: Integration). The supported version that is affected is 5.5.x. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Hospitality OPERA 5 Property Services. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Hospitality OPERA 5 Property Services accessible data. CVSS 3.0 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).
[]
null
null
5.3
null
GHSA-g6j9-fwc6-jmgq
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in 沈唁 OSS Aliyun.This issue affects OSS Aliyun: from n/a through 1.4.10.
[]
null
7.6
null
null
GHSA-f7pg-m34f-mphj
Heap-based buffer overflow in the avcodec_default_get_buffer function (utils.c) in FFmpeg libavcodec 0.4.9-pre1 and earlier, as used in products such as (1) mplayer, (2) xine-lib, (3) Xmovie, and (4) GStreamer, allows remote attackers to execute arbitrary commands via small PNG images with palettes.
[]
null
null
null
null
RHSA-2016:2007
Red Hat Security Advisory: chromium-browser security update
chromium-browser: use after free in v8 chromium-browser: various fixes from internal audits
[ "cpe:/a:redhat:rhel_extras:6" ]
null
null
8.8
null
GHSA-f5w3-q6fx-5p9r
In the Linux kernel, the following vulnerability has been resolved:iio: adc: ti-ads8688: fix information leak in triggered bufferThe 'buffer' local array is used to push data to user space from a triggered buffer, but it does not set values for inactive channels, as it only uses iio_for_each_active_channel() to assign new values.Initialize the array to zero before using it to avoid pushing uninitialized information to userspace.
[]
null
7.1
null
null
CVE-2018-18552
ServersCheck Monitoring Software through 14.3.3 allows local users to cause a denial of service (menu functionality loss) by creating an LNK file that points to a second LNK file, if this second LNK file is associated with a Start menu. Ultimately, this behavior comes from a Directory Traversal bug (via the sensor_details.html id parameter) that allows creating empty files in arbitrary directories.
[ "cpe:2.3:a:serverscheck:monitoring_software:*:*:*:*:*:*:*:*" ]
null
null
6.5
5
CVE-2014-5589
The Now Browser (Material) (aka com.browser.nowbasic) 2.8.1 application Material for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[ "cpe:2.3:a:nowbrowser:now_browser_\\(material\\):2.8.1:*:*:*:*:android:*:*" ]
null
null
null
5.4
GHSA-9wv4-24w7-q589
LGSERVER.EXE in BrightStor Mobile Backup 4.0 allows remote attackers to cause a denial of service (disk consumption and daemon hang) via a value of 0xFFFFFF7F at a certain point in an authentication negotiation packet, which writes a large amount of data to a .USX file in CA_BABLDdata\Server\data\transfer\.
[]
null
null
null
null
GHSA-47f8-wcf5-f9q4
AVG Anti-Virus plus Firewall 7.5.431 relies on the Process Environment Block (PEB) to identify a process, which allows local users to bypass the product's controls on a process by spoofing the (1) ImagePathName, (2) CommandLine, and (3) WindowTitle fields in the PEB.
[]
null
null
null
null
GHSA-pj5m-7gqr-5h69
The WLST script generated by the configToScript command in BEA WebLogic Express and WebLogic Server 9.0 and 9.1 does not encrypt certain attributes in configuration files when creating a new domain, which allows remote authenticated users to obtain sensitive information.
[]
null
null
null
null
GHSA-238g-wwhc-fr8p
A cross-site scripting (XSS) vulnerability in the Settings section of WonderCMS v3.4.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the WEBSITE TITLE parameter under the Menu module.
[]
null
9.6
null
null
CVE-2025-20667
In Modem, there is a possible information disclosure due to incorrect error handling. This could lead to remote information disclosure, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01513293; Issue ID: MSV-2741.
[]
null
7.5
null
null
CVE-2025-37768
drm/amd/pm: Prevent division by zero
In the Linux kernel, the following vulnerability has been resolved: drm/amd/pm: Prevent division by zero The user can set any speed value. If speed is greater than UINT_MAX/8, division by zero is possible. Found by Linux Verification Center (linuxtesting.org) with SVACE.
[]
null
null
null
null
GHSA-wg7c-c82w-8v8f
Memory corruption while invoking IOCTL calls from user space to set generic private command inside WLAN driver.
[]
null
7.8
null
null
CVE-2004-2293
Multiple cross-site scripting (XSS) vulnerabilities in PHP-Nuke 6.0 to 7.3 allow remote attackers to inject arbitrary web script or HTML via the (1) eid parameter or (2) query parameter to the Encyclopedia module, (3) preview_review function in the Reviews module as demonstrated by the url, cover, rlanguage, and hits parameters, or (4) savecomment function in the Reviews module, as demonstrated using the uname parameter. NOTE: the Faq/categories and Encyclopedia/ltr issues are already covered by CVE-2005-1023.
[ "cpe:2.3:a:francisco_burzi:php-nuke:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:francisco_burzi:php-nuke:6.5:*:*:*:*:*:*:*", "cpe:2.3:a:francisco_burzi:php-nuke:6.5_beta1:*:*:*:*:*:*:*", "cpe:2.3:a:francisco_burzi:php-nuke:6.5_final:*:*:*:*:*:*:*", "cpe:2.3:a:francisco_burzi:php-nuke:6.5_rc1:*:*:*:*:*:*:*", "cpe:2.3:a:francisco_burzi:php-nuke:6.5_rc2:*:*:*:*:*:*:*", "cpe:2.3:a:francisco_burzi:php-nuke:6.5_rc3:*:*:*:*:*:*:*", "cpe:2.3:a:francisco_burzi:php-nuke:6.6:*:*:*:*:*:*:*", "cpe:2.3:a:francisco_burzi:php-nuke:6.7:*:*:*:*:*:*:*", "cpe:2.3:a:francisco_burzi:php-nuke:6.9:*:*:*:*:*:*:*", "cpe:2.3:a:francisco_burzi:php-nuke:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:francisco_burzi:php-nuke:7.0_final:*:*:*:*:*:*:*", "cpe:2.3:a:francisco_burzi:php-nuke:7.1:*:*:*:*:*:*:*", "cpe:2.3:a:francisco_burzi:php-nuke:7.2:*:*:*:*:*:*:*", "cpe:2.3:a:francisco_burzi:php-nuke:7.3:*:*:*:*:*:*:*" ]
null
null
null
4.3
GHSA-fg53-q2jq-9xxq
Improper Authentication of RemoteUI of Office / Small Office Multifunction Printers and Laser Printers(*) which may allow an attacker on the network segment to trigger unauthorized access to the product. *:Satera LBP660C Series/LBP620C Series/MF740C Series/MF640C Series firmware Ver.11.04 and earlier sold in Japan. Color imageCLASS LBP660C Series/LBP 620C Series/X LBP1127C/MF740C Series/MF640C Series/X MF1127C firmware Ver.11.04 and earlier sold in US. i-SENSYS LBP660C Series/LBP620C Series/MF740C Series/MF640C Series, C1127P, C1127iF, C1127i firmware Ver.11.04 and earlier sold in Europe.
[]
null
3.1
null
null
CVE-2023-49825
WordPress Soledad Theme <= 8.4.1 is vulnerable to SQL Injection
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in PenciDesign Soledad – Multipurpose, Newspaper, Blog & WooCommerce WordPress Theme.This issue affects Soledad – Multipurpose, Newspaper, Blog & WooCommerce WordPress Theme: from n/a through 8.4.1.
[ "cpe:2.3:a:pencidesign:soledad:*:*:*:*:*:wordpress:*:*" ]
null
8.5
null
null
GHSA-3vj3-3jw5-xpqc
A stack-based buffer overflow vulnerability exists in the httpd gwcfg.cgi get functionality of Yifan YF325 v1.0_20221108. A specially crafted network packet can lead to command execution. An attacker can send a network request to trigger this vulnerability.
[]
null
9.8
null
null
CVE-2017-9870
The III_i_stereo function in layer3.c in mpglib, as used in libmpgdecoder.a in LAME 3.99.5 and other products, allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted audio file that is mishandled in the code for the "block_type == 2" case, a similar issue to CVE-2017-11126.
[ "cpe:2.3:a:lame_project:lame:3.99.5:*:*:*:*:*:*:*" ]
null
null
5.5
4.3
CVE-2022-25841
Uncontrolled search path elements in the Intel(R) Datacenter Group Event Android application, all versions, may allow an authenticated user to potentially enable escalation of privilege via local access.
[ "cpe:2.3:a:intel:datacenter_group_event:*:*:*:*:*:android:*:*" ]
null
7.8
null
null
CVE-2021-24801
WP Survey Plus <= 1.0 - Subscriber+ AJAX Calls
The WP Survey Plus WordPress plugin through 1.0 does not have any authorisation and CSRF checks in place in its AJAX actions, allowing any user to call them and add/edit/delete Surveys. Furthermore, due to the lack of sanitization in the Surveys' Title, this could also lead to Stored Cross-Site Scripting issues
[ "cpe:2.3:a:wp_survey_plus_project:wp_survey_plus:*:*:*:*:*:wordpress:*:*" ]
null
4.3
null
4.3
CVE-2017-13235
A other vulnerability in the Android media framework (n/a). Product: Android. Versions: 7.0, 7.1.1, 7.1.2, 8.0, 8.1. ID: A-68342866.
[ "cpe:2.3:o:google:android:5.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*" ]
null
null
6.5
4.3
CVE-2024-53809
WordPress Namaste! LMS plugin <= 2.6.4.1 - Cross Site Request Forgery (CSRF) vulnerability
Cross-Site Request Forgery (CSRF) vulnerability in Kiboko Labs Namaste! LMS allows Cross Site Request Forgery.This issue affects Namaste! LMS: from n/a through 2.6.4.1.
[]
null
4.3
null
null
GHSA-ww5r-mvp5-3f4g
IBM Informix Dynamic Server 12.1 could allow an authenticated user to cause a buffer overflow that would write large assertion fail files to the server. Done enough times, this could use large parts of the file system and cause the server to crash. IBM X-Force ID: 125569.
[]
null
null
6.5
null
CVE-2021-43412
An issue was discovered in GNU Hurd before 0.9 20210404-9. libports accepts fake notification messages from any client on any port, which can lead to port use-after-free. This can be exploited for local privilege escalation to get full root access.
[ "cpe:2.3:a:gnu:hurd:*:*:*:*:*:*:*:*" ]
null
7.8
null
7.2
CVE-2024-44570
RELY-PCIe v22.2.1 to v23.1.0 was discovered to contain a code injection vulnerability via the getParams function in phpinf.php.
[ "cpe:2.3:o:relyum:rely-pcie_firmware:*:*:*:*:*:*:*:*" ]
null
8.8
null
null
RHSA-2024:9016
Red Hat Security Advisory: thunderbird security update
firefox: thunderbird: Permission leak via embed or object elements firefox: thunderbird: Use-after-free in layout with accessibility firefox: thunderbird: Confusing display of origin for external protocol handler prompt firefox: thunderbird: XSS due to Content-Disposition being ignored in multipart/x-mixed-replace response firefox: thunderbird: Origin of permission prompt could be spoofed by long URL firefox: thunderbird: Cross origin video frame leak firefox: thunderbird: History interface could have been used to cause a Denial of Service condition in the browser firefox: thunderbird: Clipboard "paste" button persisted across tabs firefox: DOM push subscription message could hang Firefox firefox: thunderbird: Memory safety bugs fixed in Firefox 132, Thunderbird 132, Firefox ESR 128.4, and Thunderbird 128.4
[ "cpe:/a:redhat:rhel_aus:8.2::appstream" ]
null
8.8
null
null
GHSA-784p-f8qg-9fqj
Multiple cross-site request forgery (CSRF) vulnerabilities in Drupal 5.x before 5.2 allow remote attackers to (1) delete comments, (2) delete content revisions, and (3) disable menu items as privileged users, related to improper use of HTTP GET and the Forms API.
[]
null
null
null
null
CVE-2005-4240
SQL injection vulnerability in search.php in VCD-db 0.98 and earlier allows remote attackers to execute arbitrary SQL commands via the by parameter.
[ "cpe:2.3:a:vcd-db:vcd-db:0.97:*:*:*:*:*:*:*", "cpe:2.3:a:vcd-db:vcd-db:0.98:*:*:*:*:*:*:*", "cpe:2.3:a:vcd-db:vcd-db:0.961:*:*:*:*:*:*:*", "cpe:2.3:a:vcd-db:vcd-db:0.971:*:*:*:*:*:*:*", "cpe:2.3:a:vcd-db:vcd-db:0.972:*:*:*:*:*:*:*", "cpe:2.3:a:vcd-db:vcd-db:0.973:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-8fvc-gf7v-rjqg
A vulnerability has been found in wanglongcn ltcms 1.0.20 and classified as critical. This vulnerability affects the function download of the file /api/test/download of the component API Endpoint. The manipulation of the argument url leads to server-side request forgery. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
[]
6.9
7.3
null
null
GHSA-qh9q-34h6-hcv9
Directory traversal in mkdocs
The mkdocs 1.2.2 built-in dev-server allows directory traversal using the port 8000, enabling remote exploitation to obtain :sensitive information.
[]
8.7
7.5
null
null
GHSA-68gp-7m2f-pch3
Authentication Bypass Using an Alternate Path or Channel vulnerability in Envato Security Team Woffice allows Authentication Bypass.This issue affects Woffice: from n/a through 5.4.14.
[]
null
9.8
null
null
CVE-2009-2635
PHP remote file inclusion vulnerability in toolbar_ext.php in the RealEstateManager (com_realestatemanager) component 1.0 Basic for Joomla! allows remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter.
[ "cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*", "cpe:2.3:a:ordasoft:com_realestatemanager:1.0:*:basic:*:*:*:*:*" ]
null
null
null
7.5
RHSA-2018:2469
Red Hat Security Advisory: Red Hat JBoss Web Server 3.1.0 Service Pack 4 security and bug fix update
tomcat: Insecure defaults in CORS filter enable 'supportsCredentials' for all origins tomcat-native: Mishandled OCSP invalid response tomcat-native: Mishandled OCSP responses can allow clients to authenticate with revoked certificates
[ "cpe:/a:redhat:jboss_enterprise_web_server:3.1::el6", "cpe:/a:redhat:jboss_enterprise_web_server:3.1::el7" ]
null
null
7.1
null
CVE-2025-4775
WordPress Infinite Scroll – Ajax Load More <= 7.4.0.1 - Authenticated(Contributor+) Stored Cross-Site Scripting
The WordPress Infinite Scroll – Ajax Load More plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the data-button-label HTML attribute in all versions up to, and including, 7.4.0.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
6.4
null
null
CVE-2019-6750
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Studio Photo 3.6.6. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of EZI files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated structure. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-7639.
[ "cpe:2.3:a:foxitsoftware:foxit_studio_photo:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
null
7.8
null
GHSA-v47j-qgrw-jfmf
The web management interface for Mitel 3300 Integrated Communications Platform (ICP) before 4.2.2.11 allows remote authenticated users to cause a denial of service (resource exhaustion) via a large number of active sessions, which exceeds ICP's maximum.
[]
null
null
null
null
CVE-2017-11766
Microsoft Edge in Microsoft Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to the way that Microsoft Edge accesses objects in memory, aka "Microsoft Edge Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8731, CVE-2017-8734, and CVE-2017-8751.
[ "cpe:2.3:a:microsoft:edge:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*" ]
null
null
7.5
7.6
CVE-2008-2136
Memory leak in the ipip6_rcv function in net/ipv6/sit.c in the Linux kernel 2.4 before 2.4.36.5 and 2.6 before 2.6.25.3 allows remote attackers to cause a denial of service (memory consumption) via network traffic to a Simple Internet Transition (SIT) tunnel interface, related to the pskb_may_pull and kfree_skb functions, and management of an skb reference count.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*" ]
null
null
null
7.8
GHSA-wwmp-j24j-c23h
Use after free in V8 in Google Chrome prior to 95.0.4638.54 allowed a remote attacker who had convinced a user to allow for connection to debugger to potentially exploit heap corruption via a crafted HTML page.
[]
null
null
null
null
GHSA-9mx7-g5mq-8w76
A vulnerability was found in Totolink N350RT 9.3.5u.6255. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /cgi-bin/cstecgi.cgi. The manipulation leads to session expiration. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-252187. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
[]
null
3.7
null
null
CVE-2009-4990
Cross-site scripting (XSS) vulnerability in the Webform report module 5.x and 6.x for Drupal allows remote attackers to inject arbitrary web script or HTML via a submission.
[ "cpe:2.3:a:jrbcs:webform_report:5.x-1.x:dev:*:*:*:*:*:*", "cpe:2.3:a:jrbcs:webform_report:5.x-2.0:*:*:*:*:*:*:*", "cpe:2.3:a:jrbcs:webform_report:5.x-2.4:*:*:*:*:*:*:*", "cpe:2.3:a:jrbcs:webform_report:5.x-2.5:*:*:*:*:*:*:*", "cpe:2.3:a:jrbcs:webform_report:5.x-2.6:*:*:*:*:*:*:*", "cpe:2.3:a:jrbcs:webform_report:6.x-1.9:*:*:*:*:*:*:*", "cpe:2.3:a:jrbcs:webform_report:6.x-1.10:*:*:*:*:*:*:*", "cpe:2.3:a:jrbcs:webform_report:6.x-1.11:*:*:*:*:*:*:*", "cpe:2.3:a:jrbcs:webform_report:6.x-1.x-dev:*:*:*:*:*:*:*", "cpe:2.3:a:jrbcs:webform_report:6.x-2.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:jrbcs:webform_report:6.x-2.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:jrbcs:webform_report:6.x-2.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:jrbcs:webform_report:6.x-2.0:beta4:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*" ]
null
null
null
4.3
GHSA-w399-vx6v-6gr5
The get_portfolios() and get_portfolio_attributes() functions in the class-portfolio-responsive-gallery-list-table.php and class-portfolio-responsive-gallery-attributes-list-table.php files of the Portfolio Responsive Gallery WordPress plugin before 1.1.8 did not use whitelist or validate the orderby parameter before using it in SQL statements passed to the get_results() DB calls, leading to SQL injection issues in the admin dashboard
[]
null
null
null
null
CVE-2021-26229
SQL injection vulnerability in SourceCodester CASAP Automated Enrollment System v 1.0 allows remote attackers to execute arbitrary SQL statements, via the id parameter to edit_stud.php.
[ "cpe:2.3:a:casap_automated_enrollment_system_project:casap_automated_enrollment_system:1.0:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
GHSA-p7fh-hvqc-m963
Mozilla Firefox 3.5.1 and SeaMonkey 1.1.17, and Flock 2.5.1, allow context-dependent attackers to spoof the address bar, via window.open with a relative URI, to show an arbitrary file: URL after a victim has visited any file: URL, as demonstrated by a visit to a file: document written by the attacker.
[]
null
null
null
null
GHSA-ww2r-cpjx-g6vr
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Basix NEX-Forms – Ultimate Form Builder allows Stored XSS.This issue affects NEX-Forms – Ultimate Form Builder: from n/a through 8.5.10.
[]
null
6.5
null
null
GHSA-53xj-v576-3ch2
OS Command Injection in giting
giting version prior to 0.0.8 allows execution of arbritary commands. The first argument `repo` of function `pull()` is executed by the package without any validation.
[]
null
9.8
null
null
CVE-2024-26466
A DOM based cross-site scripting (XSS) vulnerability in the component /dom/ranges/Range-test-iframe.html of web-platform-tests/wpt before commit 938e843 allows attackers to execute arbitrary Javascript via sending a crafted URL.
[]
null
6.1
null
null
CVE-2024-51609
WordPress Emoji Shortcode plugin <= 1.0.0 - Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Elsner Technologies Pvt. Ltd. Emoji Shortcode allows Stored XSS.This issue affects Emoji Shortcode: from n/a through 1.0.0.
[ "cpe:2.3:a:elsner:emoji_shortcode:*:*:*:*:*:wordpress:*:*" ]
null
6.5
null
null
CVE-2021-24860
BSK PDF Manager < 3.1.2 - Admin+ SQL Injection
The BSK PDF Manager WordPress plugin before 3.1.2 does not validate and escape the orderby and order parameters before using them in a SQL statement, leading to a SQL injection issue
[ "cpe:2.3:a:bannersky:bsk_pdf_manager:*:*:*:*:*:wordpress:*:*" ]
null
7.2
null
6.5
GHSA-rhf4-g6xh-53vf
The ElementsKit Elementor addons plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 3.1.0 via the generate_navigation_markup function of the Onepage Scroll module. This makes it possible for authenticated attackers, with contributor-level access and above, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included.
[]
null
8.8
null
null
GHSA-vvfq-8hwr-qm4m
Nokogiri updates packaged libxml2 to 2.13.6 to resolve CVE-2025-24928 and CVE-2024-56171
SummaryNokogiri v1.18.3 upgrades its dependency libxml2 to [v2.13.6](https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.13.6).libxml2 v2.13.6 addresses:CVE-2025-24928described at https://gitlab.gnome.org/GNOME/libxml2/-/issues/847CVE-2024-56171described at https://gitlab.gnome.org/GNOME/libxml2/-/issues/828ImpactCVE-2025-24928Stack-buffer overflow is possible when reporting DTD validation errors if the input contains a long (~3kb) QName prefix.CVE-2024-56171Use-after-free is possible during validation against untrusted XML Schemas (.xsd) and, potentially, validation of untrusted documents against trusted Schemas if they make use of `xsd:keyref` in combination with recursively defined types that have additional identity constraints.
[]
null
null
null
null
CVE-2023-30940
In telephony service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed.
[ "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:sc7731e:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:sc9832e:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t310:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*" ]
null
5.5
null
null
GHSA-3j94-c55m-42mx
Cross-site scripting (XSS) vulnerability in openreport.jsp in IBM Maximo Asset Management 7.x before 7.1.1.12 IFIX.20140321-1336 and 7.5.x before 7.5.0.5 IFIX006; SmartCloud Control Desk 7.x before 7.5.0.3 and 7.5.1.x before 7.5.1.2; and Tivoli IT Asset Management for IT, Tivoli Service Request Manager, Maximo Service Desk, and Change and Configuration Management Database (CCMDB) 7.x before 7.1.1.12 IFIX.20140218-1510 allows remote authenticated users to inject arbitrary web script or HTML via a crafted report parameter.
[]
null
null
null
null
GHSA-7gj9-33j5-c3xx
Adobe Photoshop CC 2019 versions 20.0.8 and earlier, and Photoshop 2020 versions 21.1 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
[]
null
null
null
null
CVE-2009-2393
admin/index.php in Virtuenetz Virtue Online Test Generator does not require administrative privileges, which allows remote authenticated users to have an unknown impact via unspecified vectors.
[ "cpe:2.3:a:virtuenetz:virtue_online_test_generator:*:*:*:*:*:*:*:*" ]
null
null
null
6.5
CVE-2024-42604
Pligg CMS v2.0.2 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/admin_group.php?mode=delete&group_id=3
[ "cpe:2.3:a:pligg:pligg_cms:2.0.2:*:*:*:*:*:*:*" ]
null
8.8
null
null
CVE-2016-5361
programs/pluto/ikev1.c in libreswan before 3.17 retransmits in initial-responder states, which allows remote attackers to cause a denial of service (traffic amplification) via a spoofed UDP packet. NOTE: the original behavior complies with the IKEv1 protocol, but has a required security update from the libreswan vendor; as of 2016-06-10, it is expected that several other IKEv1 implementations will have vendor-required security updates, with separate CVE IDs assigned to each.
[ "cpe:2.3:a:libreswan:libreswan:*:*:*:*:*:*:*:*" ]
null
null
7.5
5
GHSA-26gr-c7rc-wwqj
Drupal 6.x before 6.34 and 7.x before 7.34 allows remote attackers to hijack sessions via a crafted request, as demonstrated by a crafted request to a server that supports both HTTP and HTTPS sessions.
[]
null
null
null
null
GHSA-p39c-84x2-h365
PHP before 5.3.10 does not properly perform a temporary change to the magic_quotes_gpc directive during the importing of environment variables, which makes it easier for remote attackers to conduct SQL injection attacks via a crafted request, related to main/php_variables.c, sapi/cgi/cgi_main.c, and sapi/fpm/fpm/fpm_main.c.
[]
null
null
null
null
GHSA-783p-hc52-7xhh
The default configuration of the administrative interface on the Canon MG3100, MG5300, MG6100, MP495, MX340, MX870, MX890, MX920, and MX922 printers does not require authentication, which allows remote attackers to modify the configuration by visiting the Advanced page. NOTE: the vendor has apparently responded by stating "for user convenience, the default setting does not require a password. However, if a user has a particular concern about third parties accessing the user's home printer, the default setting can be changed to add a password."
[]
null
null
null
null
CVE-2024-8583
SourceCodester Online Bank Management System Feedback mfeedback.php cross site scripting
A vulnerability was found in SourceCodester Online Bank Management System and Online Bank Management System - 1.0. It has been classified as problematic. This affects an unknown part of the file /mfeedback.php of the component Feedback Handler. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
[ "cpe:2.3:a:sourcecodester:online_bank_management_system:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:oretnom23:online_bank_management_system:1.0:*:*:*:*:*:*:*" ]
5.3
3.5
3.5
4
GHSA-44hj-4cvh-q8j8
Insufficient input validation in firmware update software for Intel(R) CSME before versions 12.0.45,13.0.10 and 14.0.10 may allow an authenticated user to potentially enable escalation of privilege via local access.
[]
null
null
null
null
GHSA-gw37-g74p-jfg6
White Shark System (WSS) 1.3.2 has a SQL injection vulnerability. The vulnerability stems from the control_task.php, control_project.php, default_user.php files failing to filter the sort parameter. Remote attackers can exploit the vulnerability to obtain database sensitive information.
[]
null
null
null
null
CVE-2007-0949
Stack-based buffer overflow in iTinySoft Studio Total Video Player 1.03, and possibly earlier, allows remote attackers to execute arbitrary code via a M3U playlist file that contains a long file name. NOTE: it was later reported that 1.20 and 1.30 are also affected.
[ "cpe:2.3:a:itinysoft_studio:total_video_player:*:*:*:*:*:*:*:*" ]
null
null
null
10
GHSA-mr2f-hp4h-x4x7
Cisco Application Velocity System (AVS) before 5.1.0 is installed with default passwords for some system accounts, which allows remote attackers to gain privileges.
[]
null
null
null
null
CVE-2000-0480
Dragon telnet server allows remote attackers to cause a denial of service via a long username.
[ "cpe:2.3:a:shadow_op_software:dragon_server:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:shadow_op_software:dragon_server:2.0:*:*:*:*:*:*:*" ]
null
null
null
5
RHSA-2023:6785
Red Hat Security Advisory: Machine Deletion Remediation Operator 0.2.1 security update
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
[ "cpe:/a:redhat:workload_availability_mdr:0.2::el8" ]
null
7.5
null
null
GHSA-rpx3-33f7-v6hv
The Responsive Blocks – WordPress Gutenberg Blocks plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘section_tag’ parameter in all versions up to, and including, 1.9.9 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
6.4
null
null
GHSA-qrxg-6w43-8h52
In the Linux kernel, the following vulnerability has been resolved:IB/hfi1: Restore allocated resources on failed copyoutFix a resource leak if an error occurs.
[]
null
null
null
null
CVE-2023-25833
BUG-000155004 HTML injection issue in Portal for ArcGIS.
There is an HTML injection vulnerability in Esri Portal for ArcGIS versions 11.0 and below that may allow a remote, authenticated attacker to create a crafted link which when clicked could render arbitrary HTML in the victim’s browser (no stateful change made or customer data rendered).
[ "cpe:2.3:a:esri:portal_for_arcgis:*:*:*:*:*:*:*:*" ]
null
5.4
null
null
RHSA-2025:3698
Red Hat Security Advisory: opentelemetry-collector security update
golang-jwt/jwt: jwt-go allows excessive memory allocation during header parsing
[ "cpe:/a:redhat:rhel_eus:9.4::appstream" ]
null
7.5
null
null
CVE-2023-20891
VMware Tanzu Application Service for VMs and Isolation Segment information disclosure vulnerability
The VMware Tanzu Application Service for VMs and Isolation Segment contain an information disclosure vulnerability due to the logging of credentials in hex encoding in platform system audit logs. A malicious non-admin user who has access to the platform system audit logs can access hex encoded CF API admin credentials and can push new malicious versions of an application. In a default deployment non-admin users do not have access to the platform system audit logs.
[ "cpe:2.3:a:vmware:isolation_segment:*:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:tanzu_application_service_for_virtual_machines:*:*:*:*:*:*:*:*" ]
null
6.5
null
null
GHSA-7v39-pqxg-4xwf
The issue was addressed with improved checks. This issue is fixed in iOS 17.2 and iPadOS 17.2. An attacker in a privileged network position may be able to perform a denial-of-service attack using crafted Bluetooth packets.
[]
null
4.8
null
null
GHSA-9pg2-h843-82vg
The HT Mega – Absolute Addons For Elementor plugin for WordPress is vulnerable to DOM-Based Stored Cross-Site Scripting via the plugin's Countdown widget in all versions up to, and including, 2.8.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. NOTE: This vulnerability exists due to an incomplete fix for CVE-2024-3307.
[]
null
6.4
null
null
GHSA-hw6h-8grh-49hp
Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability in OpenNebula OpenNebula core on Linux allows Remote Code Inclusion.
[]
null
9.8
null
null
CVE-2025-38266
pinctrl: mediatek: eint: Fix invalid pointer dereference for v1 platforms
In the Linux kernel, the following vulnerability has been resolved: pinctrl: mediatek: eint: Fix invalid pointer dereference for v1 platforms Commit 3ef9f710efcb ("pinctrl: mediatek: Add EINT support for multiple addresses") introduced an access to the 'soc' field of struct mtk_pinctrl in mtk_eint_do_init() and for that an include of pinctrl-mtk-common-v2.h. However, pinctrl drivers relying on the v1 common driver include pinctrl-mtk-common.h instead, which provides another definition of struct mtk_pinctrl that does not contain an 'soc' field. Since mtk_eint_do_init() can be called both by v1 and v2 drivers, it will now try to dereference an invalid pointer when called on v1 platforms. This has been observed on Genio 350 EVK (MT8365), which crashes very early in boot (the kernel trace can only be seen with earlycon). In order to fix this, since 'struct mtk_pinctrl' was only needed to get a 'struct mtk_eint_pin', make 'struct mtk_eint_pin' a parameter of mtk_eint_do_init() so that callers need to supply it, removing mtk_eint_do_init()'s dependency on any particular 'struct mtk_pinctrl'.
[]
null
null
null
null
CVE-2025-31080
WordPress HTML Forms plugin <= 1.5.1 - Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Link Software LLC HTML Forms allows Stored XSS. This issue affects HTML Forms: from n/a through 1.5.1.
[]
null
7.1
null
null
CVE-2010-5140
wxBitcoin and bitcoind before 0.3.13 do not properly handle bitcoins associated with Bitcoin transactions that have zero confirmations, which allows remote attackers to cause a denial of service (invalid-transaction flood) by sending low-valued transactions without transaction fees.
[ "cpe:2.3:a:bitcoin:bitcoin_core:*:*:*:*:*:*:*:*", "cpe:2.3:a:bitcoin:bitcoin_core:0.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:bitcoin:bitcoin_core:0.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:bitcoin:bitcoin_core:0.3.8:*:*:*:*:*:*:*", "cpe:2.3:a:bitcoin:bitcoin_core:0.3.10:*:*:*:*:*:*:*", "cpe:2.3:a:bitcoin:bitcoin_core:0.3.11:*:*:*:*:*:*:*", "cpe:2.3:a:bitcoin:wxbitcoin:*:*:*:*:*:*:*:*", "cpe:2.3:a:bitcoin:wxbitcoin:0.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:bitcoin:wxbitcoin:0.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:bitcoin:wxbitcoin:0.3.8:*:*:*:*:*:*:*", "cpe:2.3:a:bitcoin:wxbitcoin:0.3.10:*:*:*:*:*:*:*", "cpe:2.3:a:bitcoin:wxbitcoin:0.3.11:*:*:*:*:*:*:*" ]
null
null
null
5
GHSA-3qxr-2r44-6w45
An issue in the component /logins of oasys v1.1 allows attackers to access sensitive information via a burst attack.
[]
null
7.5
null
null
CVE-2011-3100
Google Chrome before 19.0.1084.46 does not properly draw dash paths, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" ]
null
null
null
5
GHSA-j622-84gv-vx9m
Software installed and run as a non-privileged user may conduct improper GPU system calls to access OOB kernel memory.
[]
null
7.8
null
null
GHSA-p9q3-w9jq-7p9j
gnome-screensaver 2.28.0 does not resume adherence to its activation settings after an inhibiting application becomes unavailable on the session bus, which allows physically proximate attackers to access an unattended workstation on which screen locking had been intended.
[]
null
null
null
null
CVE-2018-20895
In cPanel before 71.9980.37, API tokens retain ACLs after those ACLs are removed from the corresponding accounts (SEC-393).
[ "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*" ]
null
null
7.2
6.5
GHSA-7r46-fpc4-h7v3
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in PluginOps Landing Page Builder allows PHP Local File Inclusion.This issue affects Landing Page Builder: from n/a through 1.5.2.0.
[]
null
7.5
null
null
CVE-2023-42363
A use-after-free vulnerability was discovered in xasprintf function in xfuncs_printf.c:344 in BusyBox v.1.36.1.
[ "cpe:2.3:a:busybox:busybox:1.36.1:*:*:*:*:*:*:*" ]
null
5.5
null
null
CVE-2013-4947
Unspecified vulnerability in the update and build database page in Sawmill before 8.6.3 allows remote attackers to have unknown impact and attack vectors.
[ "cpe:2.3:a:sawmill:sawmill:*:*:*:*:*:*:*:*", "cpe:2.3:a:sawmill:sawmill:8.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:sawmill:sawmill:8.0.0:b1:*:*:*:*:*:*", "cpe:2.3:a:sawmill:sawmill:8.0.0:b2:*:*:*:*:*:*", "cpe:2.3:a:sawmill:sawmill:8.0.0:b3:*:*:*:*:*:*", "cpe:2.3:a:sawmill:sawmill:8.0.0:b4:*:*:*:*:*:*", "cpe:2.3:a:sawmill:sawmill:8.0.0:b5:*:*:*:*:*:*", "cpe:2.3:a:sawmill:sawmill:8.0.0:b6:*:*:*:*:*:*", "cpe:2.3:a:sawmill:sawmill:8.0.0:b7:*:*:*:*:*:*", "cpe:2.3:a:sawmill:sawmill:8.0.0:b8:*:*:*:*:*:*", "cpe:2.3:a:sawmill:sawmill:8.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:sawmill:sawmill:8.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:sawmill:sawmill:8.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:sawmill:sawmill:8.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:sawmill:sawmill:8.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:sawmill:sawmill:8.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:sawmill:sawmill:8.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:sawmill:sawmill:8.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:sawmill:sawmill:8.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:sawmill:sawmill:8.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:sawmill:sawmill:8.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:sawmill:sawmill:8.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:sawmill:sawmill:8.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:sawmill:sawmill:8.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:sawmill:sawmill:8.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:sawmill:sawmill:8.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:sawmill:sawmill:8.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:sawmill:sawmill:8.1.8:*:*:*:*:*:*:*", "cpe:2.3:a:sawmill:sawmill:8.1.9:*:*:*:*:*:*:*", "cpe:2.3:a:sawmill:sawmill:8.1.10:*:*:*:*:*:*:*", "cpe:2.3:a:sawmill:sawmill:8.5:b3:*:*:*:*:*:*", "cpe:2.3:a:sawmill:sawmill:8.5:b4:*:*:*:*:*:*", "cpe:2.3:a:sawmill:sawmill:8.5:b5:*:*:*:*:*:*", "cpe:2.3:a:sawmill:sawmill:8.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:sawmill:sawmill:8.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:sawmill:sawmill:8.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:sawmill:sawmill:8.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:sawmill:sawmill:8.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:sawmill:sawmill:8.5.5:*:*:*:*:*:*:*", "cpe:2.3:a:sawmill:sawmill:8.5.6:*:*:*:*:*:*:*", "cpe:2.3:a:sawmill:sawmill:8.5.7:*:*:*:*:*:*:*", "cpe:2.3:a:sawmill:sawmill:8.5.8:*:*:*:*:*:*:*", "cpe:2.3:a:sawmill:sawmill:8.5.9:*:*:*:*:*:*:*", "cpe:2.3:a:sawmill:sawmill:8.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:sawmill:sawmill:8.6.1:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-8jqr-962c-69rw
IBM Security Verify Access 10.0.0.0 through 10.0.7.1, under certain configurations, could allow an unauthenticated attacker to cause a denial of service due to asymmetric resource consumption. IBM X-Force ID: 287615.
[]
null
5.3
null
null
CVE-2022-41184
Due to lack of proper memory management, when a victim opens a manipulated Windows Cursor File (.cur, ico.x3d) file received from untrusted sources in SAP 3D Visual Enterprise Author - version 9, it is possible that a Remote Code Execution can be triggered when payload forces a stack-based overflow or a re-use of dangling pointer which refers to overwritten space in memory.
[ "cpe:2.3:a:sap:3d_visual_enterprise_author:9.0:*:*:*:*:*:*:*" ]
null
7.8
null
null
RHSA-2006:0749
Red Hat Security Advisory: tar security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws", "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
CVE-2006-0477
Buffer overflow in git-checkout-index in GIT before 1.1.5 allows remote attackers to execute arbitrary code via an index file with a long symbolic link.
[ "cpe:2.3:a:git:git:1.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.0.0b:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.1.4:*:*:*:*:*:*:*" ]
null
null
null
7.5