id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
189k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
patch_commit_url
stringlengths
38
232
GHSA-mg8f-gmvx-pvjj
In the Linux kernel, the following vulnerability has been resolved:drm/modes: Avoid divide by zero harder in drm_mode_vrefresh()drm_mode_vrefresh() is trying to avoid divide by zero by checking whether htotal or vtotal are zero. But we may still end up with a div-by-zero of vtotal*htotal*...
[]
null
5.5
null
null
null
GHSA-2g5r-h37m-8972
** UNSUPPPORTED WHEN ASSIGNED ** Uncontrolled resource consumption in ekorRCI, allowing an attacker with low-privileged access to the web server to send continuous legitimate web requests to a functionality that is not properly validated, in order to cause a denial of service (DoS) on the device.
[]
null
6.5
null
null
null
CVE-2020-2090
A cross-site request forgery vulnerability in Jenkins Amazon EC2 Plugin 1.47 and earlier allows attackers to connect to an attacker-specified URL within the AWS region using attacker-specified credentials IDs obtained through another method.
[ "cpe:2.3:a:jenkins:amazon_ec2:*:*:*:*:*:jenkins:*:*" ]
null
8.8
null
6.8
null
GHSA-65p9-86g3-vxrx
Unicorn Engine 1.0.2 has an out-of-bounds write in tb_flush_armeb (called from cpu_arm_exec_armeb and tcg_cpu_exec_armeb).
[]
null
null
null
null
null
GHSA-2c36-px5h-vq95
Easy Hosting Control Panel (EHCP) v0.37.12.b allows remote attackers to conduct cross-site request forgery (CSRF) attacks by leveraging lack of CSRF protection.
[]
null
null
8.8
null
null
CVE-2024-50766
SourceCodester Survey Application System 1.0 is vulnerable to SQL Injection in takeSurvey.php via the id parameter.
[ "cpe:2.3:a:sourcecodester:survey_application_system:1.0:*:*:*:*:*:*:*" ]
null
9.8
null
null
null
GHSA-f3mv-g3xr-fp7w
Restlet Arbitrary Java Code Execution via a serialized object
The default configuration of the ObjectRepresentation class in Restlet before 2.1.4 deserializes objects from untrusted sources, which allows remote attackers to execute arbitrary Java code via a serialized object, a different vulnerability than CVE-2013-4221.
[]
null
null
null
null
null
GHSA-gmvw-7v53-4794
Belkin F5D5230-4 4-Port Cable/DSL Gateway Router 1.20.000 modifies the source IP address of internal packets to that of the router's external interface when forwarding a request from an internal host to an internal web server, which allows remote attackers to hide which host is being used to access the web server.
[]
null
null
null
null
null
CVE-2025-26555
WordPress Debug-Bar-Extender Plugin <= 0.5 - Reflected Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Debug-Bar-Extender allows Reflected XSS. This issue affects Debug-Bar-Extender: from n/a through 0.5.
[]
null
7.1
null
null
null
RHSA-2024:1515
Red Hat Security Advisory: squid security and bug fix update
squid: Denial of Service in HTTP Chunked Decoding
[ "cpe:/a:redhat:rhel_eus:9.2::appstream" ]
null
8.6
null
null
null
GHSA-6hf2-chq7-2mhh
DESIGNA ABACUS v.18 and before allows an attacker to bypass the payment process via a crafted QR code.
[]
null
6.3
null
null
null
GHSA-7j86-mfh6-h4g2
Vulnerability in the JD Edwards EnterpriseOne Tools product of Oracle JD Edwards (component: Web Runtime SEC). Supported versions that are affected are Prior to 9.2.9.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise JD Edwards EnterpriseOne Tools. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of JD Edwards EnterpriseOne Tools. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
[]
null
6.5
null
null
null
GHSA-mhm6-7j2c-j5cm
Multiple incomplete blacklist vulnerabilities in the filemanager::isFileExclude method in the Media Manager in Dotclear before 2.6.3 allow remote authenticated users to execute arbitrary PHP code by uploading a file with a (1) double extension or (2) .php5, (3) .phtml, or some other PHP file extension.
[]
null
null
null
null
null
GHSA-v7f9-3v82-w67w
In NFC, there is a possible out of bounds read due to uninitialized data. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-148736216
[]
null
null
null
null
null
CVE-2021-27659
exacqVision Web Service CSS
exacqVision Web Service 21.03 does not sufficiently validate, filter, escape, and/or encode user-controllable input before it is placed in output that is used as a web page that is served to other users.
[ "cpe:2.3:a:johnsoncontrols:exacqvision_web_service:*:*:*:*:*:*:*:*" ]
null
5.3
null
null
null
CVE-2022-41661
A vulnerability has been identified in JT2Go (All versions < V14.1.0.4), Teamcenter Visualization V13.2 (All versions < V13.2.0.12), Teamcenter Visualization V13.3 (All versions < V13.3.0.7), Teamcenter Visualization V14.0 (All versions < V14.0.0.3), Teamcenter Visualization V14.1 (All versions < V14.1.0.4). The affected products contain an out of bounds read vulnerability when parsing a CGM file. An attacker can leverage this vulnerability to execute code in the context of the current process.
[ "cpe:2.3:a:siemens:jt2go:*:*:*:*:*:*:*:*", "cpe:2.3:a:siemens:teamcenter_visualization:*:*:*:*:*:*:*:*" ]
null
7.8
null
null
null
CVE-2024-36501
Memory management vulnerability in the boottime module Impact: Successful exploitation of this vulnerability can affect integrity.
[ "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:emui:14.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:2.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:4.2.0:*:*:*:*:*:*:*" ]
null
5.6
null
null
null
CVE-2006-7182
PHP remote file inclusion vulnerability in noticias.php in MNews 2.0 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the inc parameter.
[ "cpe:2.3:a:mnews:mnews:*:*:*:*:*:*:*:*" ]
null
null
null
10
null
RHSA-2012:1187
Red Hat Security Advisory: katello security update
Katello: Application.config.secret_token is not generated properly
[ "cpe:/a:rhel_sam:1.1::el6" ]
null
null
null
null
null
GHSA-r7gc-vqj2-3qmm
Buffer overflow in pgpwded.sys in Symantec PGP Desktop 10.x and Encryption Desktop 10.3.0 before MP1 on Windows XP and Server 2003 allows local users to gain privileges via a crafted application.
[]
null
null
null
null
null
CVE-2018-16407
An issue was discovered in Mayan EDMS before 3.0.3. The Tags app has XSS because tag label values are mishandled.
[ "cpe:2.3:a:mayan-edms:mayan_edms:*:*:*:*:*:*:*:*" ]
null
null
6.1
4.3
null
GHSA-x96j-9h97-w3qm
Dirapi.dll in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0317, CVE-2011-0319, CVE-2011-0320, CVE-2011-0335, CVE-2011-2119, and CVE-2011-2122.
[]
null
null
null
null
null
CVE-2018-6777
In Jiangmin Antivirus 16.0.0.100, the driver file (KVFG.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x220400.
[ "cpe:2.3:a:jiangmin:antivirus:16.0.0.100:*:*:*:*:*:*:*" ]
null
null
7.8
6.1
null
CVE-2016-10063
Buffer overflow in coders/tiff.c in ImageMagick before 6.9.5-1 allows remote attackers to cause a denial of service (application crash) or have other unspecified impact via a crafted file, related to extend validity.
[ "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*" ]
null
7.8
null
6.8
null
CVE-1999-1112
Buffer overflow in IrfanView32 3.07 and earlier allows attackers to execute arbitrary commands via a long string after the "8BPS" image type in a Photo Shop image header.
[ "cpe:2.3:a:irfanview:irfanview:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
GHSA-gf6v-v2m7-4pr4
An attacker could obtain firmware files and reverse engineer their intended use leading to loss of confidentiality and integrity of the hardware devices enabled by the Qardio iOS and Android applications.
[]
6.9
6.4
null
null
null
GHSA-9x7r-56w7-953w
Bay Technical Associates RPC-3 Telnet Host 3.05 allows remote attackers to bypass authentication by pressing the escape and enter keys at the username prompt.
[]
null
null
null
null
null
GHSA-vqv8-v28v-329v
Checkmk before 1.6.0p17 allows local users to obtain SYSTEM privileges via a Trojan horse shell script in the %PROGRAMDATA%\checkmk\agent\local directory.
[]
null
7.8
null
null
null
GHSA-96vw-8v59-qqm9
The HUSKY – Products Filter Professional for WooCommerce plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the really_curr_tax parameter in all versions up to, and including, 1.3.6.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
[]
null
6.1
null
null
null
GHSA-f9ww-v5mx-p9gf
XSS exists in Enphase Envoy R3.*.* via the profileName parameter to the /home URI on TCP port 8888.
[]
null
null
6.1
null
null
GHSA-j34c-3gp7-29jp
A vulnerability in the web-based management interface of Cisco Unified Intelligence Center could allow an unauthenticated, remote attacker to conduct a reflected cross-site scripting (XSS) attack against a user of the interface. This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive browser-based information.
[]
null
6.1
null
null
null
CVE-2013-4544
hw/net/vmxnet3.c in QEMU 2.0.0-rc0, 1.7.1, and earlier allows local guest users to cause a denial of service or possibly execute arbitrary code via vectors related to (1) RX or (2) TX queue numbers or (3) interrupt indices. NOTE: some of these details are obtained from third party information.
[ "cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:1.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:1.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:1.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:1.0:rc4:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:1.1:rc1:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:1.1:rc2:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:1.1:rc3:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:1.1:rc4:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:1.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:1.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:1.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:1.5.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:1.5.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:1.5.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:1.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:1.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:1.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:1.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:1.6.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:1.6.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:1.6.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:1.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:1.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:2.0.0:rc0:*:*:*:*:*:*" ]
null
null
null
4.9
null
GHSA-jxp8-fv2c-c5vh
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Repute InfoSystems ARMember plugin <= 4.0.1 versions.
[]
null
7.1
null
null
null
CVE-2006-6614
The save_log_local function in Fully Automatic Installation (FAI) 2.10.1, and possibly 3.1.2, when verbose mode is enabled, stores the root password hash in /var/log/fai/current/fai.log, whose file permissions allow it to be copied to other hosts when fai-savelog is called and allows attackers to obtain the hash.
[ "cpe:2.3:a:thomas_lange:fully_automated_installation:2.1:*:*:*:*:*:*:*", "cpe:2.3:a:thomas_lange:fully_automated_installation:3.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:3.1:*:alpha:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:3.1:*:amd64:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:3.1:*:arm:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:3.1:*:hppa:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:3.1:*:ia-32:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:3.1:*:ia-64:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:3.1:*:m68k:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:3.1:*:mips:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:3.1:*:mipsel:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:3.1:*:ppc:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:3.1:*:s-390:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:3.1:*:sparc:*:*:*:*:*" ]
null
null
null
1.9
null
GHSA-cg99-p6r9-c75p
GL.iNET GL-AR750S-Ext firmware v3.215 inserts the admin authentication token into a GET request when the OpenVPN Server config file is downloaded. The token is then left in the browser history or access logs, potentially allowing attackers to bypass authentication via session replay.
[]
null
5.9
null
null
null
GHSA-f2x5-xv5g-cxfh
The web console in CA (formerly Computer Associates) eTrust ITM (Threat Manager) 8.1 allows remote attackers to redirect users to arbitrary web sites via a crafted HTTP URL on port 6689.
[]
null
null
null
null
null
GHSA-pfq2-x69w-983r
The Newsletter, SMTP, Email marketing and Subscribe forms by Sendinblue WordPress plugin before 3.1.25 does not escape the sib-statistics-date parameter before outputting it back in an attribute, leading to a Reflected Cross-Site Scripting issue
[]
null
6.1
null
null
null
GHSA-c7f9-gprv-h5hq
Cross-site scripting (XSS) vulnerability on D-Link DIR-615 routers 20.07 allows an attacker to inject JavaScript into the "Status -> Active Client Table" page via the hostname field in a DHCP request.
[]
null
6.1
null
null
null
RHSA-2024:6137
Red Hat Security Advisory: postgresql:12 security update
postgresql: PostgreSQL relation replacement during pg_dump executes arbitrary SQL
[ "cpe:/a:redhat:rhel_eus:8.8::appstream" ]
null
7.5
null
null
null
CVE-2025-28892
WordPress FTP Sync plugin <= 1.1.6 - CSRF to Stored XSS vulnerability
Cross-Site Request Forgery (CSRF) vulnerability in a2rocklobster FTP Sync allows Stored XSS. This issue affects FTP Sync: from n/a through 1.1.6.
[]
null
7.1
null
null
null
GHSA-jmqv-hx9g-2j64
An issue was discovered on Samsung mobile devices with P(9.0) and Q(10.0) software. Attackers can view notifications by entering many PINs in Lockdown mode. The Samsung ID is SVE-2019-16590 (March 2020).
[]
null
null
null
null
null
RHSA-2021:3328
Red Hat Security Advisory: kernel-rt security and bug fix update
kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c kernel: Local privilege escalation due to incorrect BPF JIT branch displacement computation kernel: lack a full memory barrier upon the assignment of a new table value in net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h may lead to DoS kernel: race condition for removal of the HCI controller
[ "cpe:/a:redhat:rhel_extras_rt:7" ]
null
7
null
null
null
GHSA-xffv-hvpr-87v7
Unrestricted file upload vulnerability in Visual Mining NetCharts Server allows remote attackers to execute arbitrary code by uploading a file with an executable extension, then accessing it via unspecified vectors.
[]
null
null
null
null
null
CVE-2017-7017
An issue was discovered in certain Apple products. macOS before 10.12.6 is affected. The issue involves the "Intel Graphics Driver" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app.
[ "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*" ]
null
null
7.8
9.3
null
GHSA-hc62-cr99-v89f
J2EEFAST v2.7.0 was discovered to contain a SQL injection vulnerability via the findPage function in SysMsgPushMapper.xml.
[]
null
9.8
null
null
null
GHSA-h4g8-q9cc-gpgj
A vulnerability has been identified in Tecnomatix Plant Simulation V2302 (All versions < V2302.0011). The affected application contains an out of bounds write past the end of an allocated buffer while parsing a specially crafted MODEL file. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-22974)
[]
null
7.8
null
null
null
CVE-2010-2656
The IBM BladeCenter with Advanced Management Module (AMM) firmware build ID BPET48L, and possibly other versions before 4.7 and 5.0, stores sensitive information under the web root with insufficient access control, which allows remote attackers to download (1) logs or (2) core files via direct requests, as demonstrated by a request for private/sdc.tgz.
[ "cpe:2.3:h:ibm:advanced_management_module:*:l:*:*:*:*:*:*", "cpe:2.3:h:ibm:advanced_management_module:1.00:*:*:*:*:*:*:*", "cpe:2.3:h:ibm:advanced_management_module:1.01:*:*:*:*:*:*:*", "cpe:2.3:h:ibm:advanced_management_module:1.20:*:*:*:*:*:*:*", "cpe:2.3:h:ibm:advanced_management_module:1.20:f:*:*:*:*:*:*", "cpe:2.3:h:ibm:advanced_management_module:1.25:*:*:*:*:*:*:*", "cpe:2.3:h:ibm:advanced_management_module:1.25:e:*:*:*:*:*:*", "cpe:2.3:h:ibm:advanced_management_module:1.25:i:*:*:*:*:*:*", "cpe:2.3:h:ibm:advanced_management_module:1.26:b:*:*:*:*:*:*", "cpe:2.3:h:ibm:advanced_management_module:1.26:e:*:*:*:*:*:*", "cpe:2.3:h:ibm:advanced_management_module:1.26:h:*:*:*:*:*:*", "cpe:2.3:h:ibm:advanced_management_module:1.26:i:*:*:*:*:*:*", "cpe:2.3:h:ibm:advanced_management_module:1.26:k:*:*:*:*:*:*", "cpe:2.3:h:ibm:advanced_management_module:1.28:g:*:*:*:*:*:*", "cpe:2.3:h:ibm:advanced_management_module:1.32:d:*:*:*:*:*:*", "cpe:2.3:h:ibm:advanced_management_module:1.34:b:*:*:*:*:*:*", "cpe:2.3:h:ibm:advanced_management_module:1.34:e:*:*:*:*:*:*", "cpe:2.3:h:ibm:advanced_management_module:1.36:d:*:*:*:*:*:*", "cpe:2.3:h:ibm:advanced_management_module:1.36:g:*:*:*:*:*:*", "cpe:2.3:h:ibm:advanced_management_module:1.36:h:*:*:*:*:*:*", "cpe:2.3:h:ibm:advanced_management_module:1.36:k:*:*:*:*:*:*", "cpe:2.3:h:ibm:advanced_management_module:1.42:d:*:*:*:*:*:*", "cpe:2.3:h:ibm:advanced_management_module:1.42:f:*:*:*:*:*:*", "cpe:2.3:h:ibm:advanced_management_module:1.42:i:*:*:*:*:*:*", "cpe:2.3:h:ibm:advanced_management_module:1.42:n:*:*:*:*:*:*", "cpe:2.3:h:ibm:advanced_management_module:1.42:o:*:*:*:*:*:*", "cpe:2.3:h:ibm:advanced_management_module:1.42:t:*:*:*:*:*:*", "cpe:2.3:h:ibm:advanced_management_module:2.46:c:*:*:*:*:*:*", "cpe:2.3:h:ibm:advanced_management_module:2.46:j:*:*:*:*:*:*", "cpe:2.3:h:ibm:advanced_management_module:2.48:c:*:*:*:*:*:*", "cpe:2.3:h:ibm:advanced_management_module:2.48:d:*:*:*:*:*:*", "cpe:2.3:h:ibm:advanced_management_module:2.48:g:*:*:*:*:*:*", "cpe:2.3:h:ibm:advanced_management_module:2.48:n:*:*:*:*:*:*", "cpe:2.3:h:ibm:advanced_management_module:2.50:c:*:*:*:*:*:*", "cpe:2.3:h:ibm:advanced_management_module:2.50:g:*:*:*:*:*:*", "cpe:2.3:h:ibm:advanced_management_module:2.50:k:*:*:*:*:*:*", "cpe:2.3:h:ibm:advanced_management_module:2.50:p:*:*:*:*:*:*", "cpe:2.3:h:ibm:bladecenter:*:*:*:*:*:*:*:*" ]
null
null
null
5
null
GHSA-qvw5-r2q2-rmh2
Microsoft Windows XP Explorer allows local users to execute arbitrary code via a system folder with a Desktop.ini file containing a .ShellClassInfo specifier with a CLSID value that is associated with an executable file.
[]
null
null
null
null
null
CVE-2021-25670
A vulnerability has been identified in Tecnomatix RobotExpert (All versions < V16.1). Affected applications lack proper validation of user-supplied data when parsing CELL files. This could result in an out of bounds write past the end of an allocated structure. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-12608)
[ "cpe:2.3:a:siemens:tecnomatix_robotexpert:*:*:*:*:*:*:*:*" ]
null
7.8
null
6.8
null
CVE-2006-1668
newimage.php in Eric Gerdes Crafty Syntax Image Gallery (CSIG) (aka PHP thumbnail Photo Gallery) 3.1g and earlier allows remote authenticated users to upload and execute arbitrary PHP code via a multipart/form-data POST with a .jpg filename in the fullimage parameter and the ext parameter set to .php.
[ "cpe:2.3:a:crafty_syntax_image_gallery:crafty_syntax_image_gallery:*:*:*:*:*:*:*:*" ]
null
null
null
9
null
CVE-2025-54747
WordPress Templatera Plugin <= 2.3.0 - Cross Site Scripting (XSS) Vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in wpbakery Templatera allows DOM-Based XSS. This issue affects Templatera: from n/a through 2.3.0.
[]
null
6.5
null
null
null
GHSA-9jm6-6j35-x89g
A RootCA vulnerability found in Trend Micro Password Manager for Windows and macOS exists where the localhost.key of RootCA.crt might be improperly accessed by an unauthorized party and could be used to create malicious self-signed SSL certificates, allowing an attacker to misdirect a user to phishing sites.
[]
null
5.5
null
null
null
GHSA-cr5m-c8fx-9pvc
Buffer overflow in Linux cdrecord allows local users to gain privileges via the dev parameter.
[]
null
null
null
null
null
CVE-2018-12794
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have a Type Confusion vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
[ "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
null
8.8
6.8
null
cisco-sa-sdwclici-cvrQpH9v
Cisco SD-WAN Solution Command Injection Vulnerability
A vulnerability in the CLI of Cisco SD-WAN Solution software could allow an authenticated, local attacker to inject arbitrary commands that are executed with root privileges. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by authenticating to the device and submitting crafted input to the CLI utility. The attacker must be authenticated to access the CLI utility. A successful exploit could allow the attacker to execute commands with root privileges. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwclici-cvrQpH9v ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwclici-cvrQpH9v"]
[]
null
null
7.8
null
null
GHSA-p56h-5fx4-p722
importbuddy.php in the BackupBuddy plugin 2.2.25 for WordPress allows remote attackers to obtain configuration information via a step 0 phpinfo action, which calls the phpinfo function.
[]
null
null
null
null
null
RHSA-2011:0310
Red Hat Security Advisory: firefox security and bug fix update
javascript: URLs in chrome documents (MFSA 2011-08) Mozilla recursive eval call causes confirm dialog to evaluate to true (MFSA 2011-02) Mozilla miscellaneous memory safety hazards (MFSA 2011-01) Mozilla Buffer overflow in JavaScript upvarMap (MFSA 2011-04) Mozilla use-after-free error in JSON.stringify (MFSA2011-03) Mozilla Buffer overflow in JavaScript atom map (MFSA 2011-05) Mozilla use-after-free error using Web Workers (MFSA 2011-06) Mozilla memory corruption during text run construction (MFSA 2011-07) Mozilla CSRF risk with plugins and 307 redirects (MFSA 2011-10) Mozilla crash caused by corrupted JPEG image (MFSA 2011-09) Mozilla miscellaneous memory safety hazards (MFSA 2011-01)
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
null
CVE-2025-30290
ColdFusion | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') (CWE-22)
ColdFusion versions 2023.12, 2021.18, 2025.0 and earlier are affected by an Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability that could lead to a security feature bypass. A high privileged attacker could exploit this vulnerability to bypass security protections and gain unauthorized write and delete access. Exploitation of this issue does not require user interaction and scope is changed.
[]
null
8.7
null
null
null
ICSA-21-007-02
Omron CX-One
The affected product may allow an attacker to supply a pointer to arbitrary memory locations, which may allow an attacker to remotely execute arbitrary code. The affected product is vulnerable to a stack-based buffer overflow, which may allow an attacker to remotely execute arbitrary code. This vulnerability allows local attackers to execute arbitrary code due to the lack of proper validation of user-supplied data, which can result in a type-confusion condition.
[]
null
null
6.6
null
null
CVE-2017-14995
The Management Console in WSO2 Application Server 5.3.0, WSO2 Business Process Server 3.6.0, WSO2 Business Rules Server 2.2.0, WSO2 Complex Event Processor 4.2.0, WSO2 Dashboard Server 2.0.0, WSO2 Data Analytics Server 3.1.0, WSO2 Data Services Server 3.5.1, and WSO2 Machine Learner 1.2.0 is affected by stored XSS.
[ "cpe:2.3:a:wso2:application_server:5.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:wso2:business_process_server:3.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:wso2:business_rules_server:2.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:wso2:complex_event_processor:4.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:wso2:dashboard_server:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:wso2:data_analytics_server:3.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:wso2:data_services_server:3.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:wso2:machine_learner:1.2.0:*:*:*:*:*:*:*" ]
null
null
6.1
4.3
null
CVE-2018-17797
An issue was discovered in zzcms 8.3. user/zssave.php allows remote attackers to delete arbitrary files via directory traversal sequences in the oldimg parameter in an action=modify request. This can be leveraged for database access by deleting install.lock.
[ "cpe:2.3:a:zzcms:zzcms:8.3:*:*:*:*:*:*:*" ]
null
null
6.5
5.5
null
CVE-2007-1488
Unspecified vulnerability in Sun Java System Web Server 6.0 and 6.1 before 20070315 allows remote attackers to "gain unauthorized access to data", possibly involving a sample application.
[ "cpe:2.3:a:sun:java_system_web_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:sun:java_system_web_server:6.0:sp1:*:*:*:*:*:*", "cpe:2.3:a:sun:java_system_web_server:6.0:sp10:*:*:*:*:*:*", "cpe:2.3:a:sun:java_system_web_server:6.0:sp2:*:*:*:*:*:*", "cpe:2.3:a:sun:java_system_web_server:6.0:sp3:*:*:*:*:*:*", "cpe:2.3:a:sun:java_system_web_server:6.0:sp4:*:*:*:*:*:*", "cpe:2.3:a:sun:java_system_web_server:6.0:sp5:*:*:*:*:*:*", "cpe:2.3:a:sun:java_system_web_server:6.0:sp6:*:*:*:*:*:*", "cpe:2.3:a:sun:java_system_web_server:6.0:sp7:*:*:*:*:*:*", "cpe:2.3:a:sun:java_system_web_server:6.0:sp8:*:*:*:*:*:*", "cpe:2.3:a:sun:java_system_web_server:6.0:sp9:*:*:*:*:*:*", "cpe:2.3:a:sun:java_system_web_server:6.1:*:*:*:*:*:*:*", "cpe:2.3:a:sun:java_system_web_server:6.1:sp1:*:*:*:*:*:*", "cpe:2.3:a:sun:java_system_web_server:6.1:sp2:*:*:*:*:*:*", "cpe:2.3:a:sun:java_system_web_server:6.1:sp3:*:*:*:*:*:*", "cpe:2.3:a:sun:java_system_web_server:6.1:sp4:*:*:*:*:*:*", "cpe:2.3:a:sun:java_system_web_server:6.1:sp5:*:*:*:*:*:*", "cpe:2.3:a:sun:java_system_web_server:6.1:sp6:*:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2024-31893
IBM App Connect Enterprise information disclosure
IBM App Connect Enterprise 12.0.1.0 through 12.0.12.1 could allow an authenticated user to obtain sensitive calendar information using an expired access token. IBM X-Force ID: 288174.
[ "cpe:2.3:a:ibm:app_connect_enterprise:12.0.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:app_connect_enterprise:12.0.12.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:app_connect_enterprise:*:*:*:*:*:*:*:*" ]
null
4.3
null
null
null
ICSA-17-180-02
Schneider Electric U.motion Builder (Update A)
Unauthenticated users can use calls to various paths in order to perform arbitrary SQL statements against the underlying database.CVE-2017-7973 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). The vulnerability exists within processing of track_import_export.php. The underlying SQLite database query is subject to SQL injection on the object_id input parameter.CVE-2018-7765 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). The vulnerability exists within processing of track_getdata.php. The underlying SQLite database query is subject to SQL injection on the id input parameter.CVE-2018-7766 has been assigned to this vulnerability. A CVSS v3 base score of 6.3 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L). The vulnerability exists within processing of editobject.php. The underlying SQLite database query is subject to SQL injection on the type input parameter.CVE-2018-7767 has been assigned to this vulnerability. A CVSS v3 base score of 6.3 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L). The vulnerability exists within processing of loadtemplate.php. The underlying SQLite database query is subject to SQL injection on the tpl input parameter.CVE-2018-7768 has been assigned to this vulnerability. A CVSS v3 base score of 6.3 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L). The vulnerability exists within processing of xmlserver.php. The underlying SQLite database query is subject to SQL injection on the id input parameter.CVE-2018-7769 has been assigned to this vulnerability. A CVSS v3 base score of 6.3 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L). The vulnerability exists within processing of applets that are exposed on the web service. The underlying SQLite database query to determine whether a user is logged in is subject to SQL injection on the loginSeed parameter, which can be embedded in the HTTP cookie of the request.CVE-2018-7772 has been assigned to this vulnerability. A CVSS v3 base score of 6.3 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L). The vulnerability exists within processing of nfcserver.php. The underlying SQLite database query is subject to SQL injection on the sessionid input parameter.CVE-2018-7773 has been assigned to this vulnerability. A CVSS v3 base score of 6.3 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L). The vulnerability exists within processing of localize.php. The underlying SQLite database query is subject to SQL injection on the username input parameter.CVE-2018-7774 has been assigned to this vulnerability. A CVSS v3 base score of 6.3 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L). Unauthenticated users can execute arbitrary code and exfiltrate files.CVE-2017-7974 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N). The vulnerability exists within css.inc.php. The 'css' parameter contains a directory traversal vulnerability.CVE-2018-7763 has been assigned to this vulnerability. A CVSS v3 base score of 4.3 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N). The vulnerability exists within runscript.php applet. There is a directory traversal vulnerability in the processing of the 's' parameter of the applet.CVE-2018-7764 has been assigned to this vulnerability. A CVSS v3 base score of 4.3 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N). The vulnerability exists within processing of sendmail.php. The applet allows callers to select arbitrary files to send to an arbitrary email address.CVE-2018-7770 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N). The vulnerability exists within processing of editscript.php. A directory traversal vulnerability allows a caller with standard user privileges to write arbitrary php files anywhere in the web service directory tree.CVE-2018-7771 has been assigned to this vulnerability. A CVSS v3 base score of 5.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L). The system includes a hard-coded valid session. If an attacker uses that session ID as part of the HTTP cookie of a web request, then authentication is bypassed.CVE-2017-9956 has been assigned to this vulnerability. A CVSS v3 base score of 7.3 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L). The system comes with a system web access account hard-coded.CVE-2017-9957 has been assigned to this vulnerability. A CVSS v3 base score of 7.3 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L). Improper handling of the system configuration can allow an attacker to execute arbitrary code under the context of root.CVE-2017-9958 has been assigned to this vulnerability. A CVSS v3 base score of 7.3 has been assigned; the CVSS vector string is (AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H). The system accepts reboot in session from unauthenticated user causing a denial of service.CVE-2017-9959 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been assigned; the CVSS vector string is (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). The system returns more information than should be passed to an unauthenticated caller who might be an attacker.CVE-2017-9960 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N). The vulnerability exists within externalframe.php. Exception information is returned to the attacker that contains sensitive path information.CVE-2018-7776 has been assigned to this vulnerability. A CVSS v3 base score of 4.3 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N). The vulnerability is due to insufficient handling of update_file request parameter on update_module.php. A remote, authenticated attacker can exploit this vulnerability by sending a crafted request to the target server.CVE-2018-7777 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). Samba since Version 3.5.0 and before 4.6.4, 4.5.10 and 4.4.14 is vulnerable to remote code execution vulnerability, allowing a malicious client to upload a shared library to a writable share, and then cause the server to load and execute it.CVE-2017-7494 has been assigned to this vulnerability. A CVSS v3 base score of 10.0 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H).
[]
null
null
10
null
null
GHSA-663h-c67h-phf7
The Crash Reporter (crash_reporter.php) component of OPNsense before 23.7 mishandles input sanitization.
[]
null
5.4
null
null
null
GHSA-7pv4-f272-hv95
The BGP daemon (bgpd) in Quagga 0.99.11 and earlier allows remote attackers to cause a denial of service (crash) via an AS path containing ASN elements whose string representation is longer than expected, which triggers an assert error.
[]
null
null
null
null
null
CVE-2009-1868
Heap-based buffer overflow in Adobe Flash Player before 9.0.246.0 and 10.x before 10.0.32.18, and Adobe AIR before 1.5.2, allows attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unspecified vectors involving URL parsing.
[ "cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air:1.01:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air:1.5:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:7.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:7.0.25:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:7.0.63:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:7.0.63:*:linux:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:7.0.69.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:7.0.70.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:7.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:7.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:7.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:8.0:*:basic:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:8.0:*:pro:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:8.0.24.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:8.0.34.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:8.0.35.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:8.0.39.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.16:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.20:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.20.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.28:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.28.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.31.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.45.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.47.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.48.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.112.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.124.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.0.0.584:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.0.12.10:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.0.12.36:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flex:3.0:*:*:*:*:*:*:*" ]
null
null
null
9.3
null
GHSA-q89p-g62h-mmhr
IBM Rational Quality Manager and IBM Rational Collaborative Lifecycle Management 5.0 through 5.0.2 and 6.0 through 6.0.5 are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 125729.
[]
null
null
5.4
null
null
CVE-2021-34426
Arbitrary command execution in Keybase Client for Windows
A vulnerability was discovered in the Keybase Client for Windows before version 5.6.0 when a user executed the "keybase git lfs-config" command on the command-line. In versions prior to 5.6.0, a malicious actor with write access to a user\'s Git repository could leverage this vulnerability to potentially execute arbitrary Windows commands on a user\'s local system.
[ "cpe:2.3:a:keybase:keybase:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
5.3
null
null
null
GHSA-3jxh-7h2g-h6mg
AOL Instant Messenger (AIM) 4.7.2480 and earlier allows remote attackers to cause a denial of service (application crash) via an instant message that contains a large amount of "<!--" HTML comments.
[]
null
null
null
null
null
RHSA-2021:2724
Red Hat Security Advisory: systemd security update
systemd: uncontrolled allocation on the stack in function unit_name_path_escape leads to crash
[ "cpe:/o:redhat:rhel_eus:8.1::baseos" ]
null
5.5
null
null
null
CVE-2024-25978
Msa-24-0001: denial of service risk in file picker unzip functionality
Insufficient file size checks resulted in a denial of service risk in the file picker's unzip functionality.
[]
null
7.5
null
null
null
CVE-2022-33985
DMA transactions which are targeted at input buffers used for the NvmExpressDxe software SMI handler could cause SMRAM corruption through a TOCTOU attack. DMA transactions which are targeted at input buffers used for the software SMI handler used by the NvmExpressDxe driver could cause SMRAM corruption through a TOCTOU attack. This issue was discovered by Insyde engineering based on the general description provided by Intel's iSTARE group. This issue was fixed in kernel 5.2: 05.27.25, kernel 5.3: 05.36.25, kernel 5.4: 05.44.25, kernel 5.5: 05.52.25 https://www.insyde.com/security-pledge/SA-2022055
[ "cpe:2.3:a:insyde:kernel:*:*:*:*:*:*:*:*" ]
null
7
null
null
null
GHSA-6m6j-x3x6-grw2
Microsoft Excel 2000 SP3, 2002 SP3, 2003 SP2, 2004 for Mac, and v.X for Mac allows user-assisted remote attackers to execute arbitrary code via a malformed string, aka "Excel Malformed String Vulnerability."
[]
null
null
null
null
null
CVE-2022-0198
Improper Restriction of XML External Entity Reference in stanfordnlp/corenlp
corenlp is vulnerable to Improper Restriction of XML External Entity Reference
[ "cpe:2.3:a:stanford:corenlp:*:*:*:*:*:*:*:*" ]
null
null
6.1
null
null
CVE-2015-2337
TPInt.dll in VMware Workstation 10.x before 10.0.6 and 11.x before 11.1.1, VMware Player 6.x before 6.0.6 and 7.x before 7.1.1, and VMware Horizon Client 3.2.x before 3.2.1, 3.3.x, and 5.x local-mode before 5.4.2 on Windows does not properly allocate memory, which allows guest OS users to execute arbitrary code on the host OS via unspecified vectors.
[ "cpe:2.3:a:vmware:fusion:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:fusion:6.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:fusion:6.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:fusion:6.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:fusion:6.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:fusion:6.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:fusion:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:fusion:7.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:player:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:player:6.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:player:6.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:player:6.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:player:6.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:player:6.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:player:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:player:7.1:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:workstation:10.0:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:workstation:10.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:workstation:10.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:workstation:10.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:workstation:10.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:workstation:10.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:workstation:11.0:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:workstation:11.1:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:horizon_client:3.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:horizon_client:3.3:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:horizon_view_client:5.4:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:horizon_view_client:5.4.1:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*" ]
null
null
null
5.8
null
CVE-2025-4927
PHPGurukul Online Marriage Registration System between-dates-application-report.php sql injection
A vulnerability was found in PHPGurukul Online Marriage Registration System 1.0. It has been classified as critical. This affects an unknown part of the file /admin/between-dates-application-report.php. The manipulation of the argument fromdate/todate leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
[]
6.9
7.3
7.3
7.5
null
CVE-2025-46190
SourceCodester Client Database Management System 1.0 is vulnerable to SQL Injection in user_delivery_update.php via the order_id POST parameter.
[]
null
9.8
null
null
null
CVE-2024-30629
Tenda FH1205 v2.0.0.7(775) has a stack overflow vulnerability in the list1 parameter from fromDhcpListClient function.
[ "cpe:2.3:o:tenda:fh1205_firmware:*:*:*:*:*:*:*:*" ]
null
5.7
null
null
null
GHSA-84x9-ph3v-mc23
GibbonEdu Gibbon through version 25.0.0 allows /modules/Planner/resources_addQuick_ajaxProcess.php file upload with resultant XSS. The imageAsLinks parameter must be set to Y to return HTML code. The filename attribute of the bodyfile1 parameter is reflected in the response.
[]
null
6.1
null
null
null
CVE-2022-43983
Browsershot version 3.57.2 allows an external attacker to remotely obtain arbitrary local files. This is possible because the application does not validate that the HTML content passed to the Browsershot::html method does not contain URL's that use the file:// protocol.
[ "cpe:2.3:a:spatie:browsershot:3.57.2:*:*:*:*:*:*:*" ]
null
8.2
null
null
null
GHSA-fm48-g92r-6m48
Multiple cross-site scripting (XSS) vulnerabilities in chathead.php in MM Chat 1.5 allow remote attackers to inject arbitrary web script or HTML via the (1) sitename and (2) wmessage parameters.
[]
null
null
null
null
null
CVE-2017-17750
Bose SoundTouch devices allow XSS via a crafted public playlist from Spotify.
[ "cpe:2.3:a:bose:soundtouch:-:*:*:*:*:android:*:*", "cpe:2.3:a:bose:soundtouch:-:*:*:*:*:iphone_os:*:*" ]
null
null
5.4
3.5
null
GHSA-7j4q-97pw-5p6r
An issue was discovered in swftools through 20200710. A NULL pointer dereference exists in the function callcode() located in code.c. It allows an attacker to cause Denial of Service.
[]
null
null
null
null
null
GHSA-4w3m-xm3w-43g9
In Modicon Quantum all firmware versions, CWE-264: Permissions, Privileges, and Access Control vulnerabilities could cause a denial of service or unauthorized modifications of the PLC configuration when using Ethernet/IP protocol.
[]
null
null
null
null
null
GHSA-8x28-7c5h-458j
Heap-based overflow vulnerability in TFTP Server SP 1.66 and earlier allows remote attackers to perform a denial of service or possibly execute arbitrary code via a long TFTP error packet, a different vulnerability than CVE-2008-2161.
[]
null
null
null
null
null
RHSA-2023:7734
Red Hat Security Advisory: kpatch-patch security update
kernel: use-after-free vulnerability in the smb client component kernel: IGB driver inadequate buffer size for frames larger than MTU
[ "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
7.5
null
null
null
CVE-2017-2996
Adobe Flash Player versions 24.0.0.194 and earlier have an exploitable memory corruption vulnerability in Primetime SDK. Successful exploitation could lead to arbitrary code execution.
[ "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:chrome:*:*", "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:edge:*:*", "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:internet_explorer:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player_desktop_runtime:*:*:*:*:*:*:*:*" ]
null
8.8
null
9.3
null
CVE-2024-8780
The SYSCOM Group OMFLOW - Improper Authorization for Data Query Function
OMFLOW from The SYSCOM Group does not properly restrict the query range of its data query functionality, allowing remote attackers with regular privileges to obtain accounts and password hashes of other users.
[ "cpe:2.3:a:syscomgo:omflow:*:*:*:*:*:*:*:*" ]
null
6.5
null
null
null
CVE-2023-49298
OpenZFS through 2.1.13 and 2.2.x through 2.2.1, in certain scenarios involving applications that try to rely on efficient copying of file data, can replace file contents with zero-valued bytes and thus potentially disable security mechanisms. NOTE: this issue is not always security related, but can be security related in realistic situations. A possible example is cp, from a recent GNU Core Utilities (coreutils) version, when attempting to preserve a rule set for denying unauthorized access. (One might use cp when configuring access control, such as with the /etc/hosts.deny file specified in the IBM Support reference.) NOTE: this issue occurs less often in version 2.2.1, and in versions before 2.1.4, because of the default configuration in those versions.
[ "cpe:2.3:a:openzfs:openzfs:*:*:*:*:*:*:*:*", "cpe:2.3:a:openzfs:openzfs:2.2.0:-:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:14.0:-:*:*:*:*:*:*" ]
null
7.5
null
null
null
RHSA-2022:0561
Red Hat Security Advisory: OpenShift Container Platform 4.9.22 security update
golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet golang: net/http/httputil: panic due to racy read of persistConn after handler panic
[ "cpe:/a:redhat:openshift:4.9::el8" ]
null
5.9
null
null
null
GHSA-365p-m6g8-hhgp
A vulnerability has been identified in JT2Go (All versions < V13.2.0.5), Teamcenter Visualization (All versions < V13.2.0.5). The Tiff_Loader.dll is vulnerable to use of uninitialized memory while parsing user supplied TIFF files. This could allow an attacker to cause a denial-of-service condition.
[]
null
5.5
null
null
null
GHSA-mvfv-hmwr-6c9m
libreport 2.0.7 before 2.6.3 only saves changes to the first file when editing a crash report, which allows remote attackers to obtain sensitive information via unspecified vectors related to the (1) backtrace, (2) cmdline, (3) environ, (4) open_fds, (5) maps, (6) smaps, (7) hostname, (8) remote, (9) ks.cfg, or (10) anaconda-tb file attachment included in a Red Hat Bugzilla bug report.
[]
null
null
null
null
null
GHSA-hjm7-v5pw-x89r
Use after free in Web Audio in Google Chrome prior to 121.0.6167.85 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
[]
null
8.8
null
null
null
GHSA-2pcg-35vc-fm72
Multiple cross-site scripting (XSS) vulnerabilities in the Webee Comments (com_webeecomment) component 1.1.1, 1.2, and 2.0 for Joomla! allow remote attackers to inject arbitrary web script or HTML via the (1) color, (2) img, or (3) url BBCode tags in unspecified vectors.
[]
null
null
null
null
null
GHSA-3fg7-rwvx-xrf8
ONTAP 9 versions prior to 9.9.1P18, 9.10.1P16, 9.11.1P13, 9.12.1P10 and 9.13.1P4 are susceptible to a vulnerability which could allow an authenticated user with multiple remote accounts with differing roles to perform actions via REST API beyond their intended privilege. Possible actions include viewing limited configuration details and metrics or modifying limited settings, some of which could result in a Denial of Service (DoS).
[]
null
7.6
null
null
null
GHSA-9c6p-3cm9-mxv6
Improper access control in SamsungAccount for Galaxy Watch prior to SMR Jul-2025 Release 1 allows local attackers to access phone number.
[]
null
5.5
null
null
null
GHSA-q58j-fmvf-9rq6
Cross site scripting in actionpack Rubygem
A cross-site scripting vulnerability flaw was found in the `auto_link` function in Rails before version 3.0.6.
[]
null
6.1
null
null
null
CVE-2025-49761
Windows Kernel Elevation of Privilege Vulnerability
Use after free in Windows Kernel allows an authorized attacker to elevate privileges locally.
[]
null
7.8
null
null
null
CVE-2021-35616
Vulnerability in the Oracle Transportation Management product of Oracle Supply Chain (component: UI Infrastructure). The supported version that is affected is 6.4.3. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Transportation Management. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Transportation Management accessible data as well as unauthorized read access to a subset of Oracle Transportation Management accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N).
[ "cpe:2.3:a:oracle:transportation_management:6.4.3:*:*:*:*:*:*:*" ]
null
5.4
null
null
null