id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
139k
cpes
sequencelengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
GHSA-92mr-4w2q-4578
Exposure of Sensitive Information to an Unauthorized Actor in Jenkins
The re-key admin monitor was introduced in Jenkins 1.498 and re-encrypted all secrets in JENKINS_HOME with a new key. It also created a backup directory with all old secrets, and the key used to encrypt them. These backups were world-readable and not removed afterwards. Jenkins now deletes the backup directory, if present. Upgrading from before 1.498 will no longer create a backup directory. Administrators relying on file access permissions in their manually created backups are advised to check them for the directory $JENKINS_HOME/jenkins.security.RekeySecretAdminMonitor/backups, and delete it if present.
[]
null
null
9.8
null
GHSA-f9r5-j6qc-fj25
A Use After Free vulnerability exists in Artifex Software, Inc. MuPDF library 1.17.0-rc1 and earlier when a valid page was followed by a page with invalid pixmap dimensions, causing bander - a static - to point to previously freed memory instead of a newband_writer.
[]
null
null
null
null
GHSA-w8v3-j4vv-3q42
The Custom Add User WordPress plugin through 2.0.2 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
[]
null
6.1
null
null
CVE-2011-0944
Cisco IOS 12.4, 15.0, and 15.1 allows remote attackers to cause a denial of service (device reload) via malformed IPv6 packets, aka Bug ID CSCtj41194.
[ "cpe:2.3:o:cisco:ios:12.4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.1:*:*:*:*:*:*:*" ]
null
null
null
7.8
RHSA-2010:0061
Red Hat Security Advisory: gzip security update
gzip: (64 bit) Integer underflow by decompressing LZW format files
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
GHSA-2vg5-gq78-m2fx
Cross-site scripting (XSS) vulnerability in SourceCodester Fantastic-Blog-CMS V 1.0 allows remote attackers to inject arbitrary web script or HTML via the search field to search.php.
[]
null
null
null
null
CVE-2024-32472
excalidraw vulnerable to a Stored XSS in excalidraw's web embed component
excalidraw is an open source virtual hand-drawn style whiteboard. A stored XSS vulnerability in Excalidraw's web embeddable component. This allows arbitrary JavaScript to be run in the context of the domain where the editor is hosted. There were two vectors. One rendering untrusted string as iframe's `srcdoc` without properly sanitizing against HTML injection. Second by improperly sanitizing against attribute HTML injection. This in conjunction with allowing `allow-same-origin` sandbox flag (necessary for several embeds) resulted in the XSS. This vulnerability is fixed in 0.17.6 and 0.16.4.
[ "cpe:2.3:a:excalidraw:excalidraw:*:*:*:*:*:*:*:*" ]
null
6.1
null
null
CVE-2021-30297
Possible out of bound read due to improper validation of packet length while handling data transfer in VR service in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Wearables
[ "cpe:2.3:o:qualcomm:apq8017_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:apq8017:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:apq8053_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:apq8053:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:apq8096au_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:apq8096au:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:aqt1000_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:aqt1000:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:msm8917_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:msm8917:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:msm8953_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:msm8953:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:msm8996au:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6310_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6310:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6320_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6320:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6335_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6335:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6390_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6390:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6391:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6420_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6420:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6426_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6426:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6430_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6430:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6436_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6436:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6564a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6564a:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6564au_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6564au:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6574a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6574a:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcm2290_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcm2290:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcm4290_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcm4290:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcm6125_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcm6125:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcs2290_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcs2290:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcs4290_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcs4290:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcs603_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcs603:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcs605_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcs605:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcs610_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcs610:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcs6125_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcs6125:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qualcomm215_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qualcomm215:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_636_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_636:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_675_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_675:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd205_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd205:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd210_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd210:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd429_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd429:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd439_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd439:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd460_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd460:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd632_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd632:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd662_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd662:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd665_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd665:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd675_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd675:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd678_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd678:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd690_5g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd690_5g:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd720g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd720g:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd730_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd730:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd750g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd750g:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd765_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd765:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd765g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd765g:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd768g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd768g:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd778g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd778g:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd780g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd780g:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd855_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd855:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd865_5g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd865_5g:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd870_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd870:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd888_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd888:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd888_5g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd888_5g:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdm630_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm630:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdx50m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdx50m:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdx55:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdx55m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdx55m:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdxr1_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdxr1:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdxr2_5g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdxr2_5g:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm4125_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm4125:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm6250_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm6250:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm6250p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm6250p:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm7250_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm7250:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm7325_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm7325:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9375:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn3610_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn3610:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn3615_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn3615:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn3660b_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn3660b:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn3680_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn3680:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn3680b_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn3680b:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn3910_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn3910:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn3950:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn3988:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn3991_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn3991:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn3998_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn3998:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn6740_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn6740:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn6750_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn6750:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn6850_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn6850:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn6851_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn6851:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn6855_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn6855:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn6856_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn6856:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*" ]
null
8.4
null
null
GHSA-w844-jc94-9fpw
Pre-Auth RCE via Path Traversal
[]
null
8.3
null
null
GHSA-j979-qq9c-28r6
Buffer overflow in the isdn_net_setcfg function in isdn_net.c in Linux kernel 2.6.23 allows local users to have an unknown impact via a crafted argument to the isdn_ioctl function.
[]
null
null
null
null
GHSA-8c63-c298-4546
libming v0.4.8 was discovered to contain a memory leak via the parseSWF_MORPHFILLSTYLES function.
[]
null
6.5
null
null
GHSA-72gc-hjc8-g277
Windows 95, 98, and NT 4.0 allow remote attackers to cause a denial of service by spoofing ICMP redirect messages from a router, which causes Windows to change its routing tables.
[]
null
null
null
null
CVE-2006-3574
Multiple cross-site scripting (XSS) vulnerabilities in Hitachi Groupmax Collaboration Portal and Web Client before 07-20-/D, and uCosminexus Collaboration Portal and Forum/File Sharing before 06-20-/C, allow remote attackers to "execute malicious scripts" via unknown vectors (aka HS06-014-01).
[ "cpe:2.3:a:hitachi:cosminexus_collaboration_portal:*:*:*:*:*:*:*:*", "cpe:2.3:a:hitachi:cosminexus_collaboration_portal:6.2:*:*:*:*:*:*:*", "cpe:2.3:a:hitachi:cosminexus_collaboration_portal:06_00:*:*:*:*:*:*:*", "cpe:2.3:a:hitachi:groupmax_collaboration_portal:*:*:*:*:*:*:*:*", "cpe:2.3:a:hitachi:groupmax_collaboration_portal:7.2:*:*:*:*:*:*:*", "cpe:2.3:a:hitachi:groupmax_collaboration_portal:07_00:*:*:*:*:*:*:*", "cpe:2.3:a:hitachi:groupmax_collaboration_web_client:*:*:*:*:*:*:*:*", "cpe:2.3:a:hitachi:groupmax_collaboration_web_client:7.2:*:*:*:*:*:*:*", "cpe:2.3:a:hitachi:groupmax_collaboration_web_client:07_00:*:*:*:*:*:*:*" ]
null
null
null
6.8
GHSA-fgmr-rcwc-wh2p
The OKLOK (3.1.1) mobile companion app for Fingerprint Bluetooth Padlock FB50 (2.3) allows remote attackers to submit API requests using authenticated but unauthorized tokens, resulting in IDOR issues. A remote attacker can use their own token to make unauthorized API requests on behalf of arbitrary user IDs. Valid and current user IDs are trivial to guess because of the user ID assignment convention used by the app. A remote attacker could harvest email addresses, unsalted MD5 password hashes, owner-assigned lock names, and owner-assigned fingerprint names for any range of arbitrary user IDs.
[]
null
null
null
null
CVE-2018-17179
An issue was discovered in OpenEMR before 5.0.1 Patch 7. There is SQL Injection in the make_task function in /interface/forms/eye_mag/php/taskman_functions.php via /interface/forms/eye_mag/taskman.php.
[ "cpe:2.3:a:open-emr:openemr:*:*:*:*:*:*:*:*" ]
null
null
9.8
7.5
GHSA-pwmr-3mwq-gcmr
cPanel before 68.0.15 allows unprivileged users to access restricted directories during account restores (SEC-311).
[]
null
null
5.5
null
CVE-2009-4505
Multiple cross-site scripting (XSS) vulnerabilities in OpenCMS OAMP Comments Module 1.0.1 allow remote attackers to inject arbitrary web script or HTML via the name field in a comment, and other unspecified vectors.
[ "cpe:2.3:a:alkacon:oamp_comments:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:alkacon:opencms:*:*:*:*:*:*:*:*" ]
null
null
null
4.3
GHSA-6rh4-jr4q-29gx
IBM Db2 JDBC Driver for Db2 for Linux, UNIX and Windows 10.5, 11.1, and 11.5 could allow a remote authenticated attacker to execute arbitrary code via JNDI Injection. By sending a specially crafted request using the property clientRerouteServerListJNDIName, an attacker could exploit this vulnerability to execute arbitrary code on the system. IBM X-Force ID: 249514.
[]
null
6.3
null
null
CVE-2023-41213
D-Link DAP-1325 setDhcpAssignRangeUpdate lan_ipaddr Stack-based Buffer Overflow Remote Code Execution Vulnerability
D-Link DAP-1325 setDhcpAssignRangeUpdate lan_ipaddr Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DAP-1325 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of XML data provided to the HNAP1 SOAP endpoint. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-18840.
[ "cpe:2.3:o:dlink:dap-1325_firmware:1.07b01:*:*:*:*:*:*:*" ]
null
null
8.8
null
GHSA-3x7r-v44p-242p
Ecava IntegraXor SCADA Server Stable 4.1.4360 and earlier and Beta 4.1.4392 and earlier allows remote attackers to discover full pathnames via an application tag.
[]
null
null
null
null
GHSA-x7xv-3f7c-pp2m
An Improper Authentication issue was discovered in Siemens SIMATIC CP 44x-1 RNA, all versions prior to 1.4.1. An unauthenticated remote attacker may be able to perform administrative actions on the Communication Process (CP) of the RNA series module, if network access to Port 102/TCP is available and the configuration file for the CP is stored on the RNA's CPU.
[]
null
null
8.1
null
GHSA-r777-4879-hrqc
Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in WPmanage Uji Popup plugin <= 1.4.3 versions.
[]
null
6.5
null
null
CVE-2018-17183
Artifex Ghostscript before 9.25 allowed a user-writable error exception table, which could be used by remote attackers able to supply crafted PostScript to potentially overwrite or replace error handlers to inject code.
[ "cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*" ]
null
null
7.8
6.8
GHSA-mvrp-8x9x-4cvr
An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. macOS before 10.12.6 is affected. tvOS before 10.2.2 is affected. watchOS before 3.2.3 is affected. The issue involves the "Kernel" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app.
[]
null
null
7.8
null
GHSA-mprw-jcqm-8qg2
Online Car Wash Booking System v1.0 by oretnom23 has SQL injection in /ocwbs/admin/services/manage_service.php?id=.
[]
null
9.8
null
null
CVE-2019-7220
X-Cart V5 is vulnerable to XSS via the CategoryFilter2 parameter.
[ "cpe:2.3:a:qualiteam:x-cart:*:*:*:*:*:*:*:*" ]
null
null
6.1
4.3
CVE-2010-2790
Multiple cross-site scripting (XSS) vulnerabilities in the formatQuery function in frontends/php/include/classes/class.curl.php in Zabbix before 1.8.3rc1 allow remote attackers to inject arbitrary web script or HTML via the (1) filter_set, (2) show_details, (3) filter_rst, or (4) txt_select parameters to the triggers page (tr_status.php). NOTE: some of these details are obtained from third party information.
[ "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*", "cpe:2.3:a:zabbix:zabbix:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:zabbix:zabbix:1.1:beta10:*:*:*:*:*:*", "cpe:2.3:a:zabbix:zabbix:1.1:beta11:*:*:*:*:*:*", "cpe:2.3:a:zabbix:zabbix:1.1:beta12:*:*:*:*:*:*", "cpe:2.3:a:zabbix:zabbix:1.1:beta2:*:*:*:*:*:*", "cpe:2.3:a:zabbix:zabbix:1.1:beta3:*:*:*:*:*:*", "cpe:2.3:a:zabbix:zabbix:1.1:beta4:*:*:*:*:*:*", "cpe:2.3:a:zabbix:zabbix:1.1:beta5:*:*:*:*:*:*", "cpe:2.3:a:zabbix:zabbix:1.1:beta6:*:*:*:*:*:*", "cpe:2.3:a:zabbix:zabbix:1.1:beta7:*:*:*:*:*:*", "cpe:2.3:a:zabbix:zabbix:1.1:beta8:*:*:*:*:*:*", "cpe:2.3:a:zabbix:zabbix:1.1:beta9:*:*:*:*:*:*", "cpe:2.3:a:zabbix:zabbix:1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:zabbix:zabbix:1.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:zabbix:zabbix:1.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:zabbix:zabbix:1.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:zabbix:zabbix:1.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:zabbix:zabbix:1.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:zabbix:zabbix:1.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:zabbix:zabbix:1.3:beta:*:*:*:*:*:*", "cpe:2.3:a:zabbix:zabbix:1.3.1:beta:*:*:*:*:*:*", "cpe:2.3:a:zabbix:zabbix:1.3.2:beta:*:*:*:*:*:*", "cpe:2.3:a:zabbix:zabbix:1.3.3:beta:*:*:*:*:*:*", "cpe:2.3:a:zabbix:zabbix:1.3.4:beta:*:*:*:*:*:*", "cpe:2.3:a:zabbix:zabbix:1.3.5:beta:*:*:*:*:*:*", "cpe:2.3:a:zabbix:zabbix:1.3.6:beta:*:*:*:*:*:*", "cpe:2.3:a:zabbix:zabbix:1.3.7:beta:*:*:*:*:*:*", "cpe:2.3:a:zabbix:zabbix:1.3.8:beta:*:*:*:*:*:*", "cpe:2.3:a:zabbix:zabbix:1.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:zabbix:zabbix:1.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:zabbix:zabbix:1.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:zabbix:zabbix:1.4.5:*:*:*:*:*:*:*", "cpe:2.3:a:zabbix:zabbix:1.4.6:*:*:*:*:*:*:*", "cpe:2.3:a:zabbix:zabbix:1.5:beta:*:*:*:*:*:*", "cpe:2.3:a:zabbix:zabbix:1.5.1:beta:*:*:*:*:*:*", "cpe:2.3:a:zabbix:zabbix:1.5.2:beta:*:*:*:*:*:*", "cpe:2.3:a:zabbix:zabbix:1.5.3:beta:*:*:*:*:*:*", "cpe:2.3:a:zabbix:zabbix:1.5.4:beta:*:*:*:*:*:*", "cpe:2.3:a:zabbix:zabbix:1.6:*:*:*:*:*:*:*", "cpe:2.3:a:zabbix:zabbix:1.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:zabbix:zabbix:1.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:zabbix:zabbix:1.6.3:*:*:*:*:*:*:*", "cpe:2.3:a:zabbix:zabbix:1.6.4:*:*:*:*:*:*:*", "cpe:2.3:a:zabbix:zabbix:1.6.5:*:*:*:*:*:*:*", "cpe:2.3:a:zabbix:zabbix:1.6.6:*:*:*:*:*:*:*", "cpe:2.3:a:zabbix:zabbix:1.6.7:*:*:*:*:*:*:*", "cpe:2.3:a:zabbix:zabbix:1.6.8:*:*:*:*:*:*:*", "cpe:2.3:a:zabbix:zabbix:1.6.9:*:*:*:*:*:*:*", "cpe:2.3:a:zabbix:zabbix:1.7:*:*:*:*:*:*:*", "cpe:2.3:a:zabbix:zabbix:1.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:zabbix:zabbix:1.7.2:*:*:*:*:*:*:*", "cpe:2.3:a:zabbix:zabbix:1.7.3:*:*:*:*:*:*:*", "cpe:2.3:a:zabbix:zabbix:1.7.4:*:*:*:*:*:*:*", "cpe:2.3:a:zabbix:zabbix:1.8:*:*:*:*:*:*:*", "cpe:2.3:a:zabbix:zabbix:1.8.1:*:*:*:*:*:*:*" ]
null
null
null
4.3
CVE-2023-26599
XSS vulnerability in TripleSign in Tripleplay Platform releases prior to Caveman 3.4.0 allows attackers to inject client-side code to run as an authenticated user via a crafted link.
[ "cpe:2.3:a:uniguest:tripleplay:3.4.0:*:*:*:*:*:*:*" ]
null
6.1
null
null
CVE-2019-9660
Stored XSS exists in YzmCMS 5.2 via the admin/category/edit.html "catname" parameter.
[ "cpe:2.3:a:yzmcms:yzmcms:5.2:*:*:*:*:*:*:*" ]
null
null
4.8
3.5
GHSA-4xv7-93mm-vwcp
The WP Quick FrontEnd Editor plugin for WordPress is vulnerable to page content injection in versions up to, and including, 5.5. This is due to missing capability checks in the plugin's page-editing functionality. This makes it possible for low-authenticated attackers, such as subscribers, to edit/create any page or post on the blog.
[]
null
8.1
null
null
CVE-2023-39113
ngiflib commit fb271 was discovered to contain a segmentation violation via the function "main" at gif2tag.c. This vulnerability is triggered when running the program gif2tga.
[ "cpe:2.3:a:miniupnp_project:ngiflib:*:*:*:*:*:*:*:*" ]
null
5.5
null
null
GHSA-3fvq-f7qm-q85x
IBM Sterling Partner Engagement Manager 6.1.2, 6.2, and Cloud/SasS 22.2 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 223127.
[]
null
5.4
null
null
GHSA-fhv6-q583-cm6q
The WP Fastest Cache plugin for WordPress is vulnerable to unauthorized data loss due to a missing capability check on the deleteCssAndJsCacheToolbar function in versions up to, and including, 1.1.2. This makes it possible for authenticated attackers with subscriber-level access to perform cache deletion.
[]
null
4.3
null
null
CVE-2014-4253
Unspecified vulnerability in the Oracle WebLogic Server component in Oracle Fusion Middleware 10.0.2.0, 10.3.6.0, 12.1.1.0, and 12.1.2.0 allows remote attackers to affect availability via vectors related to WebLogic Server JVM.
[ "cpe:2.3:a:oracle:fusion_middleware:10.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:fusion_middleware:10.3.6:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:fusion_middleware:12.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:fusion_middleware:12.1.2.0.0:*:*:*:*:*:*:*" ]
null
null
null
5
CVE-2015-1640
Cross-site scripting (XSS) vulnerability in Microsoft Project Server 2010 SP2 and 2013 SP1 allows remote attackers to inject arbitrary web script or HTML via a crafted request, aka "Microsoft SharePoint XSS Vulnerability."
[ "cpe:2.3:a:microsoft:project_server:2010:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:project_server:2013:sp1:*:*:*:*:*:*" ]
null
null
null
4.3
GHSA-2h47-9gv9-rq2w
The musica de barrios sonideros (aka com.nobexinc.wls_93155702.rc) application 3.3.10 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[]
null
null
null
null
RHSA-2015:0118
Red Hat Security Advisory: mariadb security update
mysql: unspecified vulnerability related to Server:InnoDB:DML (CPU Jan 2015) mysql: unspecified vulnerability related to Server:Security:Privileges:Foreign Key (CPU Jan 2015) mysql: unspecified vulnerability related to Server:Replication (CPU Jan 2015) mysql: unspecified vulnerability related to Server:Replication (CPU Jan 2015) mysql: unspecified vulnerability related to Server:DDL (CPU Jan 2015) mysql: unspecified vulnerability related to Server:Security:Encryption (CPU Jan 2015) mysql: unspecified vulnerability related to Server:InnoDB:DDL:Foreign Key (CPU Jan 2015)
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
GHSA-57qp-9rcf-vpfx
A vulnerability was found in ZHENFENG13/code-projects My-Blog-layui 1.0. It has been declared as critical. This vulnerability affects the function Upload of the file /admin/upload/authorImg/. The manipulation of the argument File leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
[]
5.3
6.3
null
null
RHSA-2025:0166
Red Hat Security Advisory: thunderbird security update
firefox: thunderbird: WebChannel APIs susceptible to confused deputy attack firefox: thunderbird: Use-after-free when breaking lines in text firefox: Alt-Svc ALPN validation failure when redirected firefox: Compartment mismatch when parsing JavaScript JSON module firefox: Memory corruption when using JavaScript Text Segmentation firefox: thunderbird: Memory safety bugs fixed in Firefox 134, Thunderbird 134, Firefox ESR 115.19, Firefox ESR 128.6, Thunderbird 115.19, and Thunderbird 128.6 firefox: thunderbird: Memory safety bugs fixed in Firefox 134, Thunderbird 134, Firefox ESR 128.6, and Thunderbird 128.6
[ "cpe:/a:redhat:rhel_eus:9.4::appstream" ]
null
7.5
null
null
GHSA-g2fw-hxwc-j3px
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Camoo Sarl CAMOO SMS allows Reflected XSS. This issue affects CAMOO SMS: from n/a through 3.0.1.
[]
null
7.1
null
null
RHBA-2021:1365
Red Hat Bug Fix Advisory: OpenShift Container Platform 4.7.9 bug fix update
gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation
[ "cpe:/a:redhat:openshift:4.7::el8" ]
null
8.6
null
null
GHSA-2hff-34p4-2jhh
In bta_scan_results_cb_impl of btif_ble_scanner.cc, there is possible resource exhaustion if a large number of repeated BLE scan results are received. This could lead to a remote denial of service of a critical system process with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: 8.0. Android ID: A-65174158.
[]
null
null
7.5
null
CVE-2018-19587
In Cesanta Mongoose 6.13, a SIGSEGV exists in the mongoose.c mg_mqtt_add_session() function.
[ "cpe:2.3:a:cesanta:mongoose:6.13:*:*:*:*:*:*:*" ]
null
null
6.5
4.3
GHSA-xr6w-643f-4rpc
A cross-site scripting (XSS) vulnerability in UJCMS v4.1.3 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the URL parameter under the Add New Articles function.
[]
null
6.1
null
null
GHSA-8727-34w8-v299
nagios.upgrade_to_v3.sh, as distributed by Red Hat and possibly others for Nagios Core 3.4.4, 3.5.1, and earlier, allows local users to overwrite arbitrary files via a symlink attack on a temporary nagioscfg file with a predictable name in /tmp/.
[]
null
null
null
null
GHSA-w763-qv46-5p55
An issue was discovered on XIAOMI AI speaker MDZ-25-DT 1.34.36, and 1.40.14. Attackers can get root shell by accessing the UART interface and then they can read Wi-Fi SSID or password, read the dialogue text files between users and XIAOMI AI speaker, use Text-To-Speech tools pretend XIAOMI speakers' voice achieve social engineering attacks, eavesdrop on users and record what XIAOMI AI speaker hears, delete the entire XIAOMI AI speaker system, modify system files, stop voice assistant service, start the XIAOMI AI speaker’s SSH service as a backdoor
[]
null
null
null
null
GHSA-mhfp-6mc3-v4q5
Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4272, CVE-2016-4279, CVE-2016-6923, CVE-2016-6925, CVE-2016-6926, CVE-2016-6927, CVE-2016-6929, CVE-2016-6930, CVE-2016-6931, and CVE-2016-6932.
[]
null
null
9.8
null
GHSA-v6ph-92jm-6cmp
Icecast 1.3.7, and other versions before 1.3.11 with HTTP server file streaming support enabled allows remote attackers to cause a denial of service (crash) via a URL that ends in . (dot), / (forward slash), or \ (backward slash).
[]
null
null
null
null
CVE-2007-1203
Unspecified vulnerability in Microsoft Excel 2000 SP3, 2002 SP3, 2003 SP2, 2003 Viewer, 2004 for Mac, and 2007 allows user-assisted remote attackers to execute arbitrary code via a crafted set font value in an Excel file, which results in memory corruption.
[ "cpe:2.3:a:microsoft:excel:2000:sp3:*:*:*:*:*:*", "cpe:2.3:a:microsoft:excel:2002:sp3:*:*:*:*:*:*", "cpe:2.3:a:microsoft:excel:2003:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:excel:2004:*:mac:*:*:*:*:*", "cpe:2.3:a:microsoft:excel:2007:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:excel_viewer:2003:*:*:*:*:*:*:*" ]
null
null
null
9.3
CVE-2010-2170
Integer overflow in Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, might allow attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-2181 and CVE-2010-2183.
[ "cpe:2.3:a:adobe:flash_player:9.0.16:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.20:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.20.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.28:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.28.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.31:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.31.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.45.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.47.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.48.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.124.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.125.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.151.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.152.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.159.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.246.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.260.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.262.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.0.0.584:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.0.12.10:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.0.12.36:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.0.15.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.0.22.87:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.0.32.18:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.0.42.34:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:6.0.79:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:7.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:7.0.14.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:7.0.19.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:7.0.24.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:7.0.25:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:7.0.53.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:7.0.60.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:7.0.61.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:7.0.63:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:7.0.66.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:7.0.67.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:7.0.68.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:7.0.69.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:7.0.70.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:7.0.73.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:7.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:7.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:7.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:8.0.22.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:8.0.24.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:8.0.33.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:8.0.34.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:8.0.35.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:8.0.39.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:8.0.42.0:*:*:*:*:*:*:*", "cpe:2.3:a:macromedia:flash_player:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:macromedia:flash_player:5.0.30.0:*:*:*:*:*:*:*", "cpe:2.3:a:macromedia:flash_player:5.0.41.0:*:*:*:*:*:*:*", "cpe:2.3:a:macromedia:flash_player:5.0.42.0:*:*:*:*:*:*:*", "cpe:2.3:a:macromedia:flash_player:5.0.58.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air:1.5:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air:1.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air:1.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air:1.5.3:*:*:*:*:*:*:*" ]
null
null
null
9.3
CVE-2024-31452
OpenFGA Authorization Bypass
OpenFGA is a high-performance and flexible authorization/permission engine. Some end users of OpenFGA v1.5.0 or later are vulnerable to authorization bypass when calling Check or ListObjects APIs. You are very likely affected if your model involves exclusion (e.g. `a but not b`) or intersection (e.g. `a and b`). This vulnerability is fixed in v1.5.3.
[ "cpe:2.3:a:openfga:openfga:1.5.0:*:*:*:*:*:*:*" ]
null
8.1
null
null
GHSA-x7fr-8wvg-vxxf
SQL injection vulnerability in adrotate/adrotate-out.php in the AdRotate plugin 3.6.6, and other versions before 3.6.8, for WordPress allows remote attackers to execute arbitrary SQL commands via the track parameter (aka redirect URL).
[]
null
null
null
null
CVE-2021-38130
A potential Information leakage vulnerability has been identified in versions of Micro Focus Voltage SecureMail Mail Relay prior to 7.3.0.1. The vulnerability could be exploited to create an information leakage attack.
[ "cpe:2.3:a:microfocus:voltage_securemail:*:*:*:*:*:*:*:*" ]
null
6.5
null
4
GHSA-3xmr-5wwh-fr8m
The issue was addressed with improved memory handling. This issue is fixed in iOS 17.5 and iPadOS 17.5, macOS Sonoma 14.5. An attacker may be able to cause unexpected app termination or arbitrary code execution.
[]
null
7.8
null
null
GHSA-4658-qgx5-q5g3
Rejected reason: Not used
[]
null
null
null
null
CVE-2024-9679
A Hardcoded Cryptographic key vulnerability existed in DLP Extension 11.11.1.3 which allowed the decryption of previously encrypted user credentials.
[]
null
5.3
null
null
GHSA-29fq-m65q-8gqc
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Performance Schema). Supported versions that are affected are 5.6.38 and prior and 5.7.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data. CVSS 3.0 Base Score 4.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N).
[]
null
null
4.9
null
GHSA-r3gp-gxr6-hfg5
In telephony service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed.
[]
null
5.5
null
null
GHSA-qm3v-8cq5-mxv7
In NFC, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure. System execution privileges, a Firmware compromise, and User interaction are needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-144506224
[]
null
null
null
null
GHSA-hcxq-x77q-3469
Improper Limitation of a Pathname to a Restricted Directory in plexus-archiver
plexus-archiver before 3.6.0 is vulnerable to directory traversal, allowing attackers to write to arbitrary files via a ../ (dot dot slash) in an archive entry that is mishandled during extraction. This vulnerability is also known as 'Zip-Slip'.
[]
null
null
5.5
null
GHSA-h895-jpgg-q54p
A stack-based buffer over-read exists in FoFiTrueType::dumpString in fofi/FoFiTrueType.cc in Xpdf 4.01.01. It can, for example, be triggered by sending crafted TrueType data in a PDF document to the pdftops tool. It might allow an attacker to cause Denial of Service or leak memory data into dump content.
[]
null
null
null
null
GHSA-qpf2-w648-mr69
InHand Networks InRouter 900 Industrial 4G Router before v1.0.0.r11700 was discovered to contain a remote code execution (RCE) vulnerability via the function sub_1791C. This vulnerability is triggered via a crafted packet.
[]
null
9.8
null
null
GHSA-4v3f-x74x-h275
A vulnerability was found in madgicweb BuddyStream Plugin up to 3.2.7. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file ShareBox.php. The manipulation of the argument content/link/shares leads to cross site scripting. The attack can be launched remotely. Upgrading to version 3.2.8 is able to address this issue. The name of the patch is 7d5b9a89a27711aad76fd55ab4cc4185b545a1d0. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-221479.
[]
null
6.1
null
null
CVE-2023-41331
SOFARPC Remote Command Execution (RCE) Vulnerability
SOFARPC is a Java RPC framework. Versions prior to 5.11.0 are vulnerable to remote command execution. Through a carefully crafted payload, an attacker can achieve JNDI injection or system command execution. In the default configuration of the SOFARPC framework, a blacklist is used to filter out dangerous classes encountered during the deserialization process. However, the blacklist is not comprehensive, and an actor can exploit certain native JDK classes and common third-party packages to construct gadget chains capable of achieving JNDI injection or system command execution attacks. Version 5.11.0 contains a fix for this issue. As a workaround, users can add `-Drpc_serialize_blacklist_override=javax.sound.sampled.AudioFileFormat` to the blacklist.
[ "cpe:2.3:a:sofastack:sofarpc:*:*:*:*:*:*:*:*" ]
null
9.8
null
null
GHSA-63wg-rrpw-6rxq
Mishandling of '>' on the Jooan JA-Q1H Wi-Fi camera with firmware 21.0.0.91 allows remote attackers to cause a denial of service (crash and reboot) via certain ONVIF methods such as CreateUsers, SetImagingSettings, GetStreamUri, and so on.
[]
null
null
7.5
null
CVE-2017-2224
Cross-site scripting vulnerability in Event Calendar WD prior to version 1.0.94 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
[ "cpe:2.3:a:web-dorado:event_calendar_wd:*:*:*:*:*:wordpress:*:*" ]
null
null
6.1
4.3
CVE-2007-5906
Xen 3.1.1 allows virtual guest system users to cause a denial of service (hypervisor crash) by using a debug register (DR7) to set certain breakpoints.
[ "cpe:2.3:a:xensource_inc:xen:3.1.1:*:*:*:*:*:*:*" ]
null
null
null
4.7
CVE-2024-26262
EBM Technologies Uniweb/SoliPACS WebServer - SQL Injection
EBM Technologies Uniweb/SoliPACS WebServer's query functionality lacks proper restrictions of user input, allowing remote attackers authenticated as regular user to inject SQL commands for reading, modifying, and deleting database records, as well as executing system commands. Attackers may even leverage the dbo privilege in the database for privilege escalation, elevating their privileges to administrator .
[ "cpe:2.3:a:ebm_technologies:uniweb:*:*:*:*:*:*:*:*" ]
null
8.8
null
null
GHSA-v6wx-rx33-54f5
Directory traversal vulnerability in libtransmission/metainfo.c in Transmission 1.22, 1.34, 1.75, and 1.76 allows remote attackers to overwrite arbitrary files via a .. (dot dot) in a pathname within a .torrent file.
[]
null
8.8
null
null
CVE-2019-12139
An XSS issue was discovered in the Admin UI in eZ Platform 2.x. This affects ezplatform-admin-ui 1.3.x before 1.3.5 and 1.4.x before 1.4.4, and ezplatform-page-builder 1.1.x before 1.1.5 and 1.2.x before 1.2.4.
[ "cpe:2.3:a:ez:ezplatform-admin-ui:*:*:*:*:*:*:*:*", "cpe:2.3:a:ez:ezplatform-page-builder:*:*:*:*:*:*:*:*" ]
null
null
6.1
4.3
CVE-2009-0569
Buffer overflow in Becky! Internet Mail 2.48.02 and earlier allows remote attackers to execute arbitrary code via a mail message with a crafted return receipt request.
[ "cpe:2.3:a:rimarts:becky\\!_internet_mail:*:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:1.26.3:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:1.26.4:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:1.26.5:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.00.0:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.00.01:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.00.02:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.00.03:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.00.04:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.00.05:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.00.06:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.00.07:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.00.08:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.00.09:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.00.10:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.00.11:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.05.00:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.05.01:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.05.02:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.05.03:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.05.04:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.05.05:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.05.06:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.05.07:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.05.08:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.05.09:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.05.10:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.05.11:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.06:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.06.02:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.07:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.07.01:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.07.02:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.07.03:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.07.04:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.08:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.08.01:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.09:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.09.01:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.10:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.10.01:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.10.02:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.10.03:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.10.04:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.11:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.11.01:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.11.02:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.12:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.12.01:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.20:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.20.01:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.20.02:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.20.03:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.20.04:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.20.05:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.20.06:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.20.07:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.21:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.21.01:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.21.02:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.21.03:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.21.04:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.22:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.22.01:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.22.02:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.23:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.24:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.24.01:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.24.02:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.25:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.25.01:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.25.02:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.26:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.27:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.28:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.28.01:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.29:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.30:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.30.01:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.30.02:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.30.03:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.30.04:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.31.00:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.40.00:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.40.01:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.40.02:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.40.03:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.40.04:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.41.00:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.42.00:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.43.00:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.44.00:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.45.00:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.45.01:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.45.02:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.46:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.47:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.47.01:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.48:*:*:*:*:*:*:*", "cpe:2.3:a:rimarts:becky\\!_internet_mail:2.48.01:*:*:*:*:*:*:*" ]
null
null
null
9.3
CVE-2017-8364
The read_buf function in stream.c in rzip 2.1 allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted archive.
[ "cpe:2.3:a:rzip_project:rzip:2.1:*:*:*:*:*:*:*" ]
null
null
7.8
6.8
GHSA-rv4p-c2hf-pcw7
Buffer overflow in the Intelligent Platform Management Interface (IPMI) functionality in the Manager component in Cisco Unified Computing System (UCS) 1.0 and 1.1 before 1.1(1j) and 1.2 before 1.2(1b) allows remote attackers to execute arbitrary code via malformed data in a UDP packet, aka Bug ID CSCtd32371.
[]
null
null
null
null
GHSA-7x73-763j-hw4v
A remote code execution vulnerability exists when the Windows font library improperly handles specially crafted embedded fonts, aka 'Microsoft Graphics Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-1145, CVE-2019-1149, CVE-2019-1150, CVE-2019-1151, CVE-2019-1152.
[]
null
null
null
null
CVE-2025-23026
HTML templates containing Javascript template strings are subject to XSS in jte
jte (Java Template Engine) is a secure and lightweight template engine for Java and Kotlin. In affected versions Jte HTML templates with `script` tags or script attributes that include a Javascript template string (backticks) are subject to XSS. The `javaScriptBlock` and `javaScriptAttribute` methods in the `Escape` class do not escape backticks, which are used for Javascript template strings. Dollar signs in template strings should also be escaped as well to prevent undesired interpolation. HTML templates rendered by Jte's `OwaspHtmlTemplateOutput` in versions less than or equal to `3.1.15` with `script` tags or script attributes that contain Javascript template strings (backticks) are vulnerable. Users are advised to upgrade to version 3.1.16 or later to resolve this issue. There are no known workarounds for this vulnerability.
[]
null
6.1
null
null
RHSA-2020:4223
Red Hat Security Advisory: OpenShift Container Platform 3.11.306 jenkins security update
jetty: double release of resource can lead to information disclosure jenkins: user-specified tooltip values leads to stored cross-site scripting jenkins: stored XSS vulnerability in project naming strategy jenkins: stored XSS vulnerability in 'trigger builds remotely'
[ "cpe:/a:redhat:openshift:3.11::el7" ]
null
5.4
null
null
GHSA-vfjc-2qcw-j95j
The DefaultLinuxSpec function in oci/defaults.go in Docker Moby through 17.03.2-ce does not block /proc/scsi pathnames, which allows attackers to trigger data loss (when certain older Linux kernels are used) by leveraging Docker container access to write a "scsi remove-single-device" line to /proc/scsi/scsi, aka SCSI MICDROP.
[]
null
null
5.9
null
CVE-2024-4683
Campcodes Complete Web-Based School Management System exam_timetable_insert_form.php cross site scripting
A vulnerability was found in Campcodes Complete Web-Based School Management System 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file /view/exam_timetable_insert_form.php. The manipulation of the argument exam leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-263624.
[]
5.3
3.5
3.5
4
GHSA-ccqr-9gqg-2rgq
Unrestricted Upload of File with Dangerous Type vulnerability in Themify Themify Ultra.This issue affects Themify Ultra: from n/a through 7.3.5.
[]
null
9.9
null
null
GHSA-mfx7-6x75-v7hg
A vulnerability, which was classified as critical, has been found in PHPGurukul Human Metapneumovirus Testing Management System 1.0. This issue affects some unknown processing of the file /profile.php. The manipulation of the argument aid/adminname/mobilenumber/email leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
[]
5.3
6.3
null
null
GHSA-769j-489v-6c4g
Directory traversal vulnerability in the JA News (com_janews) component 1.0 for Joomla! allows remote attackers to read arbitrary local files via a .. (dot dot) in the controller parameter to index.php. NOTE: some of these details are obtained from third party information.
[]
null
null
null
null
GHSA-2prh-76mq-h4gx
DexLoader function get_stringidx_fromdex() in Redex prior to commit 3b44c64 can load an out of bound address when loading the string index table, potentially allowing remote code execution during processing of a 3rd party Android APK file.
[]
null
9.8
null
null
GHSA-2h35-g555-434h
Certain NETGEAR devices are affected by command injection by an authenticated user. This affects RBK752 before 3.2.16.6, RBR750 before 3.2.16.6, RBS750 before 3.2.16.6, RBK852 before 3.2.16.6, RBR850 before 3.2.16.6, and RBS850 before 3.2.16.6.
[]
null
null
null
null
RHSA-2011:1248
Red Hat Security Advisory: ca-certificates security update
An updated ca-certificates package that fixes one security issue is now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having important security impact.
[ "cpe:/o:redhat:enterprise_linux:6::server" ]
null
null
null
null
CVE-2023-49156
WordPress GoDaddy Email Marketing plugin <= 1.4.3 - Broken Access Control vulnerability
Missing Authorization vulnerability in GoDaddy GoDaddy Email Marketing allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects GoDaddy Email Marketing: from n/a through 1.4.3.
[]
null
4.3
null
null
CVE-2018-15680
An issue was discovered in BTITeam XBTIT 2.5.4. The hashed passwords stored in the xbtit_users table are stored as unsalted MD5 hashes, which makes it easier for context-dependent attackers to obtain cleartext values via a brute-force attack.
[ "cpe:2.3:a:btiteam:xbtit:2.5.4:*:*:*:*:*:*:*" ]
null
null
9.8
5
GHSA-9f6v-44r7-qh3r
An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in macOS Catalina 10.15.6. A malicious application may be able to execute arbitrary code with kernel privileges.
[]
null
null
null
null
CVE-2013-1769
A certain hashing algorithm in Telepathy Gabble 0.16.x before 0.16.5 and 0.17.x before 0.17.3 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted message.
[ "cpe:2.3:a:simon_mcvittie:telepathy_gabble:0.16.0:*:*:*:*:*:*:*", "cpe:2.3:a:simon_mcvittie:telepathy_gabble:0.16.1:*:*:*:*:*:*:*", "cpe:2.3:a:simon_mcvittie:telepathy_gabble:0.16.2:*:*:*:*:*:*:*", "cpe:2.3:a:simon_mcvittie:telepathy_gabble:0.16.3:*:*:*:*:*:*:*", "cpe:2.3:a:simon_mcvittie:telepathy_gabble:0.16.4:*:*:*:*:*:*:*", "cpe:2.3:a:simon_mcvittie:telepathy_gabble:0.17.0:*:*:*:*:*:*:*", "cpe:2.3:a:simon_mcvittie:telepathy_gabble:0.17.1:*:*:*:*:*:*:*", "cpe:2.3:a:simon_mcvittie:telepathy_gabble:0.17.2:*:*:*:*:*:*:*" ]
null
null
null
5
CVE-2024-9434
WPGlobus Translate Options <= 2.2.0 - Cross-Site Request Forgery to Stored Cross-Site Scripting
The WPGlobus Translate Options plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.2.0. This is due to missing or incorrect nonce validation on the on__translate_options_page() function. This makes it possible for unauthenticated attackers to inject malicious web scripts and update plugin settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
[]
null
6.1
null
null
GHSA-75c4-q3jm-gq6h
A vulnerability has been found in FFmpeg 2.0 and classified as problematic. This vulnerability affects the function decode_hextile of the file libavcodec/vmnc.c. The manipulation leads to memory corruption. The attack can be initiated remotely. It is recommended to apply a patch to fix this issue.
[]
null
5.5
null
null
CVE-2019-6773
This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader 9.4.1.16828. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the richValue property of a Field object within AcroForms. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the current process. Was ZDI-CAN-8272.
[ "cpe:2.3:a:foxitsoftware:foxit_reader:*:*:*:*:*:*:*:*", "cpe:2.3:a:foxitsoftware:phantompdf:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
null
3.3
null
CVE-2016-2522
The dissect_ber_constrained_bitstring function in epan/dissectors/packet-ber.c in the ASN.1 BER dissector in Wireshark 2.0.x before 2.0.2 does not verify that a certain length is nonzero, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet.
[ "cpe:2.3:a:wireshark:wireshark:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:2.0.1:*:*:*:*:*:*:*" ]
null
null
5.9
4.3
CVE-2019-7609
Kibana versions before 5.6.15 and 6.6.1 contain an arbitrary code execution flaw in the Timelion visualizer. An attacker with access to the Timelion application could send a request that will attempt to execute javascript code. This could possibly lead to an attacker executing arbitrary commands with permissions of the Kibana process on the host system.
[ "cpe:2.3:a:elastic:kibana:*:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:openshift_container_platform:4.1:*:*:*:*:*:*:*" ]
null
9.8
null
10
GHSA-xm2p-w62m-c2hg
SQL injection vulnerability in info.php in CMS Faethon 2.2.0 Ultimate allows remote attackers to execute arbitrary SQL commands via the item parameter.
[]
null
null
null
null
GHSA-4wvr-fq5p-2362
The mod_jk component of Apache Tomcat Connectors in some circumstances, such as when a configuration included "JkOptions +ForwardDirectories" but the configuration did not provide explicit mounts for all possible proxied requests, mod_jk would use an implicit mapping and map the request to the first defined worker. Such an implicit mapping could result in the unintended exposure of the status worker and/or bypass security constraints configured in httpd. As of JK 1.2.49, the implicit mapping functionality has been removed and all mappings must now be via explicit configuration. Only mod_jk is affected by this issue. The ISAPI redirector is not affected.This issue affects Apache Tomcat Connectors (mod_jk only): from 1.2.0 through 1.2.48.Users are recommended to upgrade to version 1.2.49, which fixes the issue.
[]
null
7.5
null
null
CVE-2017-17173
Due to insufficient parameters verification GPU driver of Mate 9 Pro Huawei smart phones with the versions before LON-AL00B 8.0.0.356(C00) has an arbitrary memory free vulnerability. An attacker can tricks a user into installing a malicious application on the smart phone, and send given parameter to driver to release special kernel memory resource. Successful exploit may result in phone crash or arbitrary code execution.
[ "cpe:2.3:o:huawei:mate_9_pro_fimware:*:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:mate_9_pro:-:*:*:*:*:*:*:*" ]
null
null
7.8
9.3
RHSA-2015:1666
Red Hat Security Advisory: httpd24-httpd security update
httpd: Possible mod_lua crash due to websocket bug httpd: NULL pointer dereference crash with ErrorDocument 400 pointing to a local URL-path httpd: HTTP request smuggling attack against chunked request parser httpd: ap_some_auth_required() does not properly indicate authenticated request in 2.4
[ "cpe:/a:redhat:rhel_software_collections:2::el6", "cpe:/a:redhat:rhel_software_collections:2::el7" ]
null
null
3.7
null
GHSA-wc73-qprf-6fv8
Improper privilege management in Zoom Rooms for macOS before version 5.16.0 may allow an authenticated user to conduct an escalation of privilege via local access.
[]
null
7.8
null
null
CVE-2004-1269
lppasswd in CUPS 1.1.22 does not remove the passwd.new file if it encounters a file-size resource limit while writing to passwd.new, which causes subsequent invocations of lppasswd to fail.
[ "cpe:2.3:a:easy_software_products:cups:1.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:easy_software_products:cups:1.0.4_8:*:*:*:*:*:*:*", "cpe:2.3:a:easy_software_products:cups:1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:easy_software_products:cups:1.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:easy_software_products:cups:1.1.4_2:*:*:*:*:*:*:*", "cpe:2.3:a:easy_software_products:cups:1.1.4_3:*:*:*:*:*:*:*", "cpe:2.3:a:easy_software_products:cups:1.1.4_5:*:*:*:*:*:*:*", "cpe:2.3:a:easy_software_products:cups:1.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:easy_software_products:cups:1.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:easy_software_products:cups:1.1.10:*:*:*:*:*:*:*", "cpe:2.3:a:easy_software_products:cups:1.1.12:*:*:*:*:*:*:*", "cpe:2.3:a:easy_software_products:cups:1.1.13:*:*:*:*:*:*:*", "cpe:2.3:a:easy_software_products:cups:1.1.14:*:*:*:*:*:*:*", "cpe:2.3:a:easy_software_products:cups:1.1.15:*:*:*:*:*:*:*", "cpe:2.3:a:easy_software_products:cups:1.1.16:*:*:*:*:*:*:*", "cpe:2.3:a:easy_software_products:cups:1.1.17:*:*:*:*:*:*:*", "cpe:2.3:a:easy_software_products:cups:1.1.18:*:*:*:*:*:*:*", "cpe:2.3:a:easy_software_products:cups:1.1.19:*:*:*:*:*:*:*", "cpe:2.3:a:easy_software_products:cups:1.1.19_rc5:*:*:*:*:*:*:*", "cpe:2.3:a:easy_software_products:cups:1.1.20:*:*:*:*:*:*:*", "cpe:2.3:a:easy_software_products:cups:1.1.21:*:*:*:*:*:*:*", "cpe:2.3:a:easy_software_products:cups:1.1.22_rc1:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*" ]
null
null
null
5
CVE-2021-42744
Philips MRI 1.5T and 3T Information Exposure
Philips MRI 1.5T and MRI 3T Version 5.x.x exposes sensitive information to an actor not explicitly authorized to have access.
[ "cpe:2.3:o:philips:mri_1.5t_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:philips:mri_1.5t:-:*:*:*:*:*:*:*", "cpe:2.3:o:philips:mri_3t_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:philips:mri_3t:-:*:*:*:*:*:*:*" ]
null
6.2
null
null