Datasets:

id
stringlengths
13
19
title
stringlengths
0
256
description
stringlengths
3
12.4k
cpes
sequencelengths
0
5.42k
GHSA-3j9p-q7w7-2gcf
A vulnerability was found in TRENDnet TEW-815DAP 1.0.2.0. It has been classified as critical. This affects the function do_setNTP of the component POST Request Handler. The manipulation of the argument NtpDstStart/NtpDstEnd leads to command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-252123. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
[]
GHSA-rj77-m66j-h24w
Removing an XSLT parameter during processing could have lead to an exploitable use-after-free. We have had reports of attacks in the wild abusing this flaw. This vulnerability affects Firefox < 97.0.2, Firefox ESR < 91.6.1, Firefox for Android < 97.3.0, Thunderbird < 91.6.2, and Focus < 97.3.0.
[]
CVE-2011-4136
django.contrib.sessions in Django before 1.2.7 and 1.3.x before 1.3.1, when session data is stored in the cache, uses the root namespace for both session identifiers and application-data keys, which allows remote attackers to modify a session by triggering use of a key that is equal to that session's identifier.
[ "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:0.91:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:0.95:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:0.95.1:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:0.96:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.2:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.2.1:2:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.3:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.3:alpha1:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.3:alpha2:*:*:*:*:*:*" ]
CVE-2013-1136
The crypto engine process in Cisco IOS on Aggregation Services Router (ASR) Route Processor 2 does not properly manage memory, which allows local users to cause a denial of service (route processor crash) by creating multiple tunnels and then examining encryption statistics, aka Bug ID CSCuc52193.
[ "cpe:2.3:o:cisco:ios:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:aggregation_services_router_route_processor:2:*:*:*:*:*:*:*" ]
CVE-2006-3244
Multiple SQL injection vulnerabilities in Anthill 0.2.6 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) order parameter in buglist.php and the (2) bug parameter in query.php.
[ "cpe:2.3:a:anthill:anthill:*:*:*:*:*:*:*:*", "cpe:2.3:a:anthill:anthill:0.3.0:*:*:*:*:*:*:*" ]
CVE-2018-5490
Read-Only export policy rules are not correctly enforced in Clustered Data ONTAP 8.3 Release Candidate versions and therefore may allow more than "read-only" access from authenticated SMBv2 and SMBv3 clients. This behavior has been resolved in the GA release. Customers running prior release candidates (RCs) are requested to update their systems to the NetApp Data ONTAP 8.3 GA release.
[ "cpe:2.3:a:netapp:clustered_data_ontap:*:*:*:*:*:*:*:*" ]
GHSA-hfhc-vgmh-5hf8
Multiple unspecified vulnerabilities in Microsoft Office Publisher allow user-assisted remote attackers to cause a denial of service (application crash) via a crafted PUB file, possibly involving wordart.
[]
CVE-2022-25345
Denial of Service (DoS)
All versions of package @discordjs/opus are vulnerable to Denial of Service (DoS) when trying to encode using an encoder with zero channels, or a non-initialized buffer. This leads to a hard crash.
[ "cpe:2.3:a:discordjs:opus:*:*:*:*:*:node.js:*:*" ]
CVE-2020-12339
Insufficient control flow management in the API for the Intel(R) Collaboration Suite for WebRTC before version 4.3.1 may allow an authenticated user to potentially enable escalation of privilege via network access.
[ "cpe:2.3:a:intel:collaboration_suite:*:*:*:*:*:webrtc:*:*" ]
CVE-2004-2381
HttpRequest.java in Jetty HTTP Server before 4.2.19 allows remote attackers to cause denial of service (memory usage and application crash) via HTTP requests with a large Content-Length.
[ "cpe:2.3:a:jetty:jetty_http_server:4.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:jetty:jetty_http_server:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:jetty:jetty_http_server:4.0.1_rc0:*:*:*:*:*:*:*", "cpe:2.3:a:jetty:jetty_http_server:4.0.1_rc1:*:*:*:*:*:*:*", "cpe:2.3:a:jetty:jetty_http_server:4.0.1_rc2:*:*:*:*:*:*:*", "cpe:2.3:a:jetty:jetty_http_server:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:jetty:jetty_http_server:4.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:jetty:jetty_http_server:4.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:jetty:jetty_http_server:4.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:jetty:jetty_http_server:4.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:jetty:jetty_http_server:4.0.b0:*:*:*:*:*:*:*", "cpe:2.3:a:jetty:jetty_http_server:4.0.b1:*:*:*:*:*:*:*", "cpe:2.3:a:jetty:jetty_http_server:4.0.b2:*:*:*:*:*:*:*", "cpe:2.3:a:jetty:jetty_http_server:4.0.d0:*:*:*:*:*:*:*", "cpe:2.3:a:jetty:jetty_http_server:4.0.d1:*:*:*:*:*:*:*", "cpe:2.3:a:jetty:jetty_http_server:4.0.d2:*:*:*:*:*:*:*", "cpe:2.3:a:jetty:jetty_http_server:4.0.d3:*:*:*:*:*:*:*", "cpe:2.3:a:jetty:jetty_http_server:4.0.d4:*:*:*:*:*:*:*", "cpe:2.3:a:jetty:jetty_http_server:4.0_rc1:*:*:*:*:*:*:*", "cpe:2.3:a:jetty:jetty_http_server:4.0_rc2:*:*:*:*:*:*:*", "cpe:2.3:a:jetty:jetty_http_server:4.0_rc3:*:*:*:*:*:*:*", "cpe:2.3:a:jetty:jetty_http_server:4.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:jetty:jetty_http_server:4.1.0_rc0:*:*:*:*:*:*:*", "cpe:2.3:a:jetty:jetty_http_server:4.1.0_rc1:*:*:*:*:*:*:*", "cpe:2.3:a:jetty:jetty_http_server:4.1.0_rc2:*:*:*:*:*:*:*", "cpe:2.3:a:jetty:jetty_http_server:4.1.0_rc3:*:*:*:*:*:*:*", "cpe:2.3:a:jetty:jetty_http_server:4.1.0_rc4:*:*:*:*:*:*:*", "cpe:2.3:a:jetty:jetty_http_server:4.1.0_rc5:*:*:*:*:*:*:*", "cpe:2.3:a:jetty:jetty_http_server:4.1.0_rc6:*:*:*:*:*:*:*", "cpe:2.3:a:jetty:jetty_http_server:4.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:jetty:jetty_http_server:4.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:jetty:jetty_http_server:4.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:jetty:jetty_http_server:4.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:jetty:jetty_http_server:4.1.b0:*:*:*:*:*:*:*", "cpe:2.3:a:jetty:jetty_http_server:4.1.b1:*:*:*:*:*:*:*", "cpe:2.3:a:jetty:jetty_http_server:4.1.d0:*:*:*:*:*:*:*", "cpe:2.3:a:jetty:jetty_http_server:4.1.d1:*:*:*:*:*:*:*", "cpe:2.3:a:jetty:jetty_http_server:4.1.d2:*:*:*:*:*:*:*", "cpe:2.3:a:jetty:jetty_http_server:4.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:jetty:jetty_http_server:4.2.0_beta0:*:*:*:*:*:*:*", "cpe:2.3:a:jetty:jetty_http_server:4.2.0_rc0:*:*:*:*:*:*:*", "cpe:2.3:a:jetty:jetty_http_server:4.2.0_rc1:*:*:*:*:*:*:*", "cpe:2.3:a:jetty:jetty_http_server:4.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:jetty:jetty_http_server:4.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:jetty:jetty_http_server:4.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:jetty:jetty_http_server:4.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:jetty:jetty_http_server:4.2.4_rc0:*:*:*:*:*:*:*", "cpe:2.3:a:jetty:jetty_http_server:4.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:jetty:jetty_http_server:4.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:jetty:jetty_http_server:4.2.7:*:*:*:*:*:*:*", "cpe:2.3:a:jetty:jetty_http_server:4.2.8_01:*:*:*:*:*:*:*", "cpe:2.3:a:jetty:jetty_http_server:4.2.9:*:*:*:*:*:*:*", "cpe:2.3:a:jetty:jetty_http_server:4.2.9_rc1:*:*:*:*:*:*:*", "cpe:2.3:a:jetty:jetty_http_server:4.2.9_rc2:*:*:*:*:*:*:*", "cpe:2.3:a:jetty:jetty_http_server:4.2.10:*:*:*:*:*:*:*", "cpe:2.3:a:jetty:jetty_http_server:4.2.10_pre0:*:*:*:*:*:*:*", "cpe:2.3:a:jetty:jetty_http_server:4.2.10_pre1:*:*:*:*:*:*:*", "cpe:2.3:a:jetty:jetty_http_server:4.2.11:*:*:*:*:*:*:*", "cpe:2.3:a:jetty:jetty_http_server:4.2.12:*:*:*:*:*:*:*", "cpe:2.3:a:jetty:jetty_http_server:4.2.14:*:*:*:*:*:*:*", "cpe:2.3:a:jetty:jetty_http_server:4.2.14_rc0:*:*:*:*:*:*:*", "cpe:2.3:a:jetty:jetty_http_server:4.2.14_rc1:*:*:*:*:*:*:*", "cpe:2.3:a:jetty:jetty_http_server:4.2.15:*:*:*:*:*:*:*", "cpe:2.3:a:jetty:jetty_http_server:4.2.15_rc0:*:*:*:*:*:*:*", "cpe:2.3:a:jetty:jetty_http_server:4.2.16:*:*:*:*:*:*:*", "cpe:2.3:a:jetty:jetty_http_server:4.2.17:*:*:*:*:*:*:*", "cpe:2.3:a:jetty:jetty_http_server:4.2.18:*:*:*:*:*:*:*" ]
CVE-2006-6556
The eyeHome function in apps/eyeHome.eyeapp/aplic.php in EyeOS before 0.9.3-3 allows remote attackers to upload and execute arbitrary code via dangerous file extensions that are not all lowercase, which bypasses a cleansing operation.
[ "cpe:2.3:o:eyeos:eyeos:0.9.2:*:*:*:*:*:*:*" ]
GHSA-xqqh-8g96-r9wj
A vulnerability in the MiCollab Client API of Mitel MiCollab through 9.5.0.101 could allow an authenticated attacker to modify their profile parameters due to improper authorization controls. A successful exploit could allow the authenticated attacker to impersonate another user's name.
[]
CVE-2023-6208
When using X11, text selected by the page using the Selection API was erroneously copied into the primary selection, a temporary storage not unlike the clipboard. *This bug only affects Firefox on X11. Other systems are unaffected.* This vulnerability affects Firefox < 120, Firefox ESR < 115.5.0, and Thunderbird < 115.5.
[ "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*" ]
CVE-2021-27431
ARM CMSIS RTOS2 Integer Overflow or Wraparound
ARM CMSIS RTOS2 versions prior to 2.1.3 are vulnerable to integer wrap-around inosRtxMemoryAlloc (local malloc equivalent) function, which can lead to arbitrary memory allocation, resulting in unexpected behavior such as a crash or injected code execution.
[ "cpe:2.3:o:arm:cmsis-rtos:*:*:*:*:*:*:*:*" ]
GHSA-36pf-cqvc-w9hx
Tenable Appliance 4.4.0, and possibly prior, contains a flaw in the Web UI that allows for the unauthorized manipulation of the admin password.
[]
GHSA-2p29-98c8-mc4x
The TeraWallet plugin for WordPress is vulnerable to Insecure Direct Object Reference in versions up to, and including, 1.4.3. This is due to insufficient validation of the user-controlled key on the lock_unlock_terawallet AJAX action. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to lock/unlock other users wallets.
[]
CVE-2024-12993
Location information exposure in Infinix Weather app
Infinix devices contain a pre-loaded "com.rlk.weathers" application, that exposes an unsecured content provider. An attacker can communicate with the provider and reveal the user’s location without any privileges.  After multiple attempts to contact the vendor we did not receive any answer. We suppose this issue affects all Infinix Mobile devices.
[]
GHSA-w5fh-xc33-v3f8
Multiple SQL injection vulnerabilities in index.php in NeLogic Nephp Publisher 4.5.2 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) id and (2) nnet_catid parameters.
[]
GHSA-hhgx-2m78-2p9v
The multi-block feature in the ssl3_write_bytes function in s3_pkt.c in OpenSSL 1.0.2 before 1.0.2a on 64-bit x86 platforms with AES NI support does not properly handle certain non-blocking I/O cases, which allows remote attackers to cause a denial of service (pointer corruption and application crash) via unspecified vectors.
[]
CVE-2021-34568
WAGO I/O-Check Service prone to Allocation of Resources Without Limits or Throttling
In WAGO I/O-Check Service in multiple products an unauthenticated remote attacker can send a specially crafted packet containing OS commands to provoke a denial of service.
[ "cpe:2.3:o:wago:750-8100_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8100_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8100_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8100_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:750-8100:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8101_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8101_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8101_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8101_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:750-8101:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8101\\/025-000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8101\\/025-000_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8101\\/025-000_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8101\\/025-000_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:750-8101\\/025-000:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8102_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8102_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8102_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8102_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:750-8102:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8102\\/025-000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8102\\/025-000_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8102\\/025-000_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8102\\/025-000_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:750-8102\\/025-000:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:750-8202:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/000-011_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/000-011_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/000-011_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/000-011_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:750-8202\\/000-011:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/000-012_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/000-012_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/000-012_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/000-012_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:750-8202\\/000-012:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/000-022_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/000-022_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/000-022_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/000-022_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:750-8202\\/000-022:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/025-000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/025-000_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/025-000_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/025-000_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:750-8202\\/025-000:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/025-001_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/025-001_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/025-001_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/025-001_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:750-8202\\/025-001:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/025-002_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/025-002_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/025-002_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/025-002_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:750-8202\\/025-002:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/040-000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/040-000_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/040-000_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/040-000_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:750-8202\\/040-000:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/040-001_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/040-001_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/040-001_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/040-001_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:750-8202\\/040-001:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:752-8303\\/8000-002_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:752-8303\\/8000-002_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:752-8303\\/8000-002_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:752-8303\\/8000-002_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:752-8303\\/8000-002:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4101_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4101_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4101_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4101_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-4101:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4102_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4102_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4102_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4102_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-4102:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4103_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4103_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4103_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4103_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-4103:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4104_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4104_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4104_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4104_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-4104:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4201\\/8000-001_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4201\\/8000-001_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4201\\/8000-001_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4201\\/8000-001_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-4201\\/8000-001:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4202\\/8000-001_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4202\\/8000-001_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4202\\/8000-001_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4202\\/8000-001_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-4202\\/8000-001:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4203\\/8000-001_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4203\\/8000-001_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4203\\/8000-001_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4203\\/8000-001_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-4203\\/8000-001:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4204\\/8000-001_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4204\\/8000-001_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4204\\/8000-001_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4204\\/8000-001_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-4204\\/8000-001:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4205\\/8000-001_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4205\\/8000-001_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4205\\/8000-001_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4205\\/8000-001_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-4205\\/8000-001:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4205\\/8000-002_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4205\\/8000-002_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4205\\/8000-002_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4205\\/8000-002_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-4205\\/8000-002:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4206\\/8000-001_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4206\\/8000-001_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4206\\/8000-001_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4206\\/8000-001_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-4206\\/8000-001:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4206\\/8000-002_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4206\\/8000-002_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4206\\/8000-002_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4206\\/8000-002_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-4206\\/8000-002:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4301\\/8000-002_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4301\\/8000-002_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4301\\/8000-002_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4301\\/8000-002_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-4301\\/8000-002:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4302\\/8000-002_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4302\\/8000-002_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4302\\/8000-002_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4302\\/8000-002_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-4302\\/8000-002:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4303\\/8000-002_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4303\\/8000-002_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4303\\/8000-002_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4303\\/8000-002_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-4303\\/8000-002:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4304\\/8000-002_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4304\\/8000-002_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4304\\/8000-002_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4304\\/8000-002_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-4304\\/8000-002:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4305\\/8000-002_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4305\\/8000-002_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4305\\/8000-002_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4305\\/8000-002_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-4305\\/8000-002:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4306\\/8000-002_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4306\\/8000-002_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4306\\/8000-002_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4306\\/8000-002_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-4306\\/8000-002:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5203\\/8000-001_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5203\\/8000-001_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5203\\/8000-001_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5203\\/8000-001_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-5203\\/8000-001:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5204\\/8000-001_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5204\\/8000-001_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5204\\/8000-001_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5204\\/8000-001_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-5204\\/8000-001:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5205\\/8000-001_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5205\\/8000-001_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5205\\/8000-001_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5205\\/8000-001_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-5205\\/8000-001:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5206\\/8000-001_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5206\\/8000-001_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5206\\/8000-001_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5206\\/8000-001_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-5206\\/8000-001:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5303\\/8000-002_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5303\\/8000-002_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5303\\/8000-002_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5303\\/8000-002_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-5303\\/8000-002:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5304\\/8000-002_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5304\\/8000-002_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5304\\/8000-002_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5304\\/8000-002_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-5304\\/8000-002:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5305\\/8000-002_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5305\\/8000-002_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5305\\/8000-002_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5305\\/8000-002_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-5305\\/8000-002:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5306\\/8000-002_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5306\\/8000-002_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5306\\/8000-002_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5306\\/8000-002_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-5306\\/8000-002:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6201\\/8000-001_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6201\\/8000-001_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6201\\/8000-001_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6201\\/8000-001_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-6201\\/8000-001:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6202\\/8000-001_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6202\\/8000-001_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6202\\/8000-001_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6202\\/8000-001_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-6202\\/8000-001:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6203\\/8000-001_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6203\\/8000-001_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6203\\/8000-001_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6203\\/8000-001_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-6203\\/8000-001:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6204\\/8000-001_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6204\\/8000-001_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6204\\/8000-001_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6204\\/8000-001_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-6204\\/8000-001:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6301\\/8000-002_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6301\\/8000-002_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6301\\/8000-002_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6301\\/8000-002_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-6301\\/8000-002:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6302\\/8000-002_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6302\\/8000-002_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6302\\/8000-002_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6302\\/8000-002_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-6302\\/8000-002:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6303\\/8000-002_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6303\\/8000-002_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6303\\/8000-002_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6303\\/8000-002_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-6303\\/8000-002:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6304\\/8000-002_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6304\\/8000-002_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6304\\/8000-002_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6304\\/8000-002_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-6304\\/8000-002:-:*:*:*:*:*:*:*" ]
GHSA-m22p-rxw5-75fw
A cross-site scripting (XSS) vulnerability in the component /management/settings of School Fees Management System v1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the name parameter.
[]
GHSA-c7m5-9695-pwwr
CMS Made Simple (aka CMSMS) 2.2.7 has CSRF in admin/siteprefs.php.
[]
CVE-2018-19917
Microweber 1.0.8 has reflected cross-site scripting (XSS) vulnerabilities.
[ "cpe:2.3:a:microweber:microweber:1.0.8:*:*:*:*:*:*:*" ]
GHSA-8fmg-xgjm-9r26
Vulnerability in the Oracle Configurator product of Oracle E-Business Suite (component: Orders). Supported versions that are affected are 12.2.3-12.2.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Configurator. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Configurator, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Configurator accessible data as well as unauthorized read access to a subset of Oracle Configurator accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).
[]
GHSA-w899-x298-m75w
WS-WN572HP3 V230525 was discovered to contain a buffer overflow in the component /www/cgi-bin/upload.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted HTTP request.
[]
CVE-2013-4073
The OpenSSL::SSL.verify_certificate_identity function in lib/openssl/ssl.rb in Ruby 1.8 before 1.8.7-p374, 1.9 before 1.9.3-p448, and 2.0 before 2.0.0-p247 does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
[ "cpe:2.3:a:ruby-lang:ruby:1.8.6-26:*:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.7:*:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.7:p160:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.7:p17:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.7:p173:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.7:p174:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.7:p22:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.7:p248:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.7:p249:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.7:p299:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.7:p301:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.7:p302:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.7:p330:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.7:p334:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.7:p352:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.7:p357:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.7:p358:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.7:p370:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.7:p371:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.7:p373:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.7:p71:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.7:p72:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.7:preview1:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.7:preview2:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.7:preview3:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.8.7:preview4:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.9.3:*:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.9.3:p0:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.9.3:p125:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.9.3:p194:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.9.3:p286:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.9.3:p383:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.9.3:p385:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.9.3:p392:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.9.3:p426:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.9.3:p429:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:2.0.0:p0:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:2.0.0:p195:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:2.0.0:preview1:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:2.0.0:preview2:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:2.0.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:2.0.0:rc2:*:*:*:*:*:*" ]
CVE-2022-38687
In messaging service, there is a missing permission check. This could lead to local denial of service in messaging service with no additional execution privileges needed.
[ "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:sc7731e:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:sc9832e:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t310:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*" ]
CVE-2001-0855
Buffer overflow in db_loader in ClearCase 4.2 and earlier allows local users to gain root privileges via a long TERM environment variable.
[ "cpe:2.3:a:rational_software:clearcase:3.2_plus:*:*:*:*:*:*:*", "cpe:2.3:a:rational_software:clearcase:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:rational_software:clearcase:4.1:*:*:*:*:*:*:*", "cpe:2.3:a:rational_software:clearcase:4.2:*:*:*:*:*:*:*" ]
CVE-2014-8310
The CMS CORBA listener in SAP BusinessObjects BI Edge 4.0 allows remote attackers to cause a denial of service (server shutdown) via crafted OSCAFactory::Session ORB message.
[ "cpe:2.3:a:sap:businessobjects:4.0:*:*:*:*:*:*:*" ]
CVE-2006-6495
Stack-based buffer overflow in ld.so.1 in Sun Solaris 8, 9, and 10 allows local users to execute arbitrary code via large precision padding values in a format string specifier in the format parameter of the doprf function. NOTE: this issue normally does not cross privilege boundaries, except in cases of external introduction of malicious message files, or if it is leveraged with other vulnerabilities such as CVE-2006-6494.
[ "cpe:2.3:o:sun:solaris:9.0:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:solaris:10.0:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*" ]
CVE-2023-44397
CloudExplorer Lite permission bypass vulnerability
CloudExplorer Lite is an open source, lightweight cloud management platform. Prior to version 1.4.1, the gateway filter of CloudExplorer Lite uses a controller with path starting with `matching/API/`, which can cause a permission bypass. Version 1.4.1 contains a patch for this issue.
[ "cpe:2.3:a:fit2cloud:cloudexplorer_lite:*:*:*:*:*:*:*:*" ]
GHSA-p2v4-hxgw-m9v7
Buffer overflow in the Still Image Service in Windows 2000 allows local users to gain additional privileges via a long WM_USER message, aka the "Still Image Service Privilege Escalation" vulnerability.
[]
CVE-2019-11325
An issue was discovered in Symfony before 4.2.12 and 4.3.x before 4.3.8. The VarExport component incorrectly escapes strings, allowing some specially crafted ones to escalate to execution of arbitrary PHP code. This is related to symfony/var-exporter.
[ "cpe:2.3:a:sensiolabs:symfony:*:*:*:*:*:*:*:*" ]
CVE-2019-14280
In some circumstances, Craft 2 before 2.7.10 and 3 before 3.2.6 wasn't stripping EXIF data from user-uploaded images when it was configured to do so, potentially exposing personal/geolocation data to the public.
[ "cpe:2.3:a:craftcms:craft_cms:*:*:*:*:*:*:*:*" ]
GHSA-59fp-j85q-63j4
In the Linux kernel, the following vulnerability has been resolved:drm/msm/dpu: cleanup FB if dpu_format_populate_layout failsIf the dpu_format_populate_layout() fails, then FB is prepared, but not cleaned up. This ends up leaking the pin_count on the GEM object and causes a splat during DRM file closure:msm_obj->pin_count WARNING: CPU: 2 PID: 569 at drivers/gpu/drm/msm/msm_gem.c:121 update_lru_locked+0xc4/0xcc [...] Call trace: update_lru_locked+0xc4/0xcc put_pages+0xac/0x100 msm_gem_free_object+0x138/0x180 drm_gem_object_free+0x1c/0x30 drm_gem_object_handle_put_unlocked+0x108/0x10c drm_gem_object_release_handle+0x58/0x70 idr_for_each+0x68/0xec drm_gem_release+0x28/0x40 drm_file_free+0x174/0x234 drm_release+0xb0/0x160 __fput+0xc0/0x2c8 __fput_sync+0x50/0x5c __arm64_sys_close+0x38/0x7c invoke_syscall+0x48/0x118 el0_svc_common.constprop.0+0x40/0xe0 do_el0_svc+0x1c/0x28 el0_svc+0x4c/0x120 el0t_64_sync_handler+0x100/0x12c el0t_64_sync+0x190/0x194 irq event stamp: 129818 hardirqs last enabled at (129817): [<ffffa5f6d953fcc0>] console_unlock+0x118/0x124 hardirqs last disabled at (129818): [<ffffa5f6da7dcf04>] el1_dbg+0x24/0x8c softirqs last enabled at (129808): [<ffffa5f6d94afc18>] handle_softirqs+0x4c8/0x4e8 softirqs last disabled at (129785): [<ffffa5f6d94105e4>] __do_softirq+0x14/0x20Patchwork: https://patchwork.freedesktop.org/patch/600714/
[]
GHSA-fhc7-95hq-9w87
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.56 and earlier, 5.6.36 and earlier and 5.7.18 and earlier. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N).
[]
CVE-2018-4366
A memory corruption issue was addressed with improved input validation. This issue affected versions prior to iOS 12.1.
[ "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" ]
CVE-2025-27201
Animate | Out-of-bounds Read (CWE-125)
Animate versions 24.0.7, 23.0.10 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[]
CVE-2016-5038
The dwarf_get_macro_startend_file function in dwarf_macro5.c in libdwarf before 20160923 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted string offset for .debug_str.
[ "cpe:2.3:a:libdwarf_project:libdwarf:*:*:*:*:*:*:*:*" ]
GHSA-c9w7-6h37-hp7j
Vulnerability in the PeopleSoft Enterprise PeopleTools component of Oracle PeopleSoft Products (subcomponent: Security). Supported versions that are affected are 8.54 and 8.55. Easily "exploitable" vulnerability allows low privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise PeopleTools accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.0 Base Score 4.6 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N).
[]
GHSA-fvjg-5365-f9jr
Deserialization of Untrusted Data vulnerability in Averta Master Slider.This issue affects Master Slider: from n/a through 3.9.5.
[]
GHSA-p5r9-x3h7-6828
flatCore-CMS v2.0.8 has a code execution vulnerability, which could let a remote malicious user execute arbitrary PHP code.
[]
GHSA-c63w-8fc3-4cfc
Vulnerability in the Enterprise Manager Base Platform product of Oracle Enterprise Manager (component: Connector Framework). Supported versions that are affected are 12.1.0.5, 13.2.0.0 and 13.3.0.0. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Enterprise Manager Base Platform. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Enterprise Manager Base Platform accessible data as well as unauthorized update, insert or delete access to some of Enterprise Manager Base Platform accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Enterprise Manager Base Platform. CVSS 3.0 Base Score 6.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:L).
[]
GHSA-2p74-qpqc-x284
NETGEAR R7000 devices before 1.0.11.126 are affected by stored XSS.
[]
GHSA-gpqc-5qx7-8qm2
Memory leak in the v9fs_write function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption) by leveraging failure to free an IO vector.
[]
CVE-2022-41182
Due to lack of proper memory management, when a victim opens manipulated Parasolid Part and Assembly (.x_b, CoreCadTranslator.exe) file received from untrusted sources in SAP 3D Visual Enterprise Author - version 9, it is possible for the application to crash and becomes temporarily unavailable to the user until restart of the application.
[ "cpe:2.3:a:sap:3d_visual_enterprise_author:9.0:*:*:*:*:*:*:*" ]
CVE-2015-2320
The TLS stack in Mono before 3.12.1 allows remote attackers to have unspecified impact via vectors related to client-side SSLv2 fallback.
[ "cpe:2.3:a:mono-project:mono:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*" ]
GHSA-c4jr-vjm4-27hq
Veracode Scan Jenkins Plugin vulnerable to information disclosure
Veracode Scan Jenkins Plugin before 23.3.19.0 is vulnerable to information disclosure of proxy credentials in job logs under specific configurations.Users are potentially affected if they:are using Veracode Scan Jenkins Plugin prior to 23.3.19.0AND have configured Veracode Scan to run on remote agent jobsAND have enabled the "Connect using proxy" optionAND have configured the proxy settings with proxy credentialsAND a Jenkins admin has enabled debug in global system settings.By default, even in this configuration only the job owner or Jenkins admin can view the job log.
[]
GHSA-hqq6-wqq7-jgjq
Drupal 6.x before 6.35 and 7.x before 7.35 allows remote authenticated users to reset the password of other accounts by leveraging an account with the same password hash as another account and a crafted password reset URL.
[]
GHSA-xrr7-3cjg-r4vj
Unspecified vulnerability in Apple QuickTime 7.2 on Windows XP allows remote attackers to execute arbitrary code via unknown attack vectors, probably a different vulnerability than CVE-2007-6166. NOTE: this information is based upon a vague advisory by a vulnerability information sales organization that does not coordinate with vendors or release advisories with actionable information. A CVE has been assigned for tracking purposes, but duplicates with other CVEs are difficult to determine. However, the organization has stated that this is different than CVE-2007-6166.
[]
GHSA-r2q7-7qph-56qr
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Popup Box Team Popup box plugin <= 3.4.4 versions.
[]
CVE-2022-48688
i40e: Fix kernel crash during module removal
In the Linux kernel, the following vulnerability has been resolved: i40e: Fix kernel crash during module removal The driver incorrectly frees client instance and subsequent i40e module removal leads to kernel crash. Reproducer: 1. Do ethtool offline test followed immediately by another one host# ethtool -t eth0 offline; ethtool -t eth0 offline 2. Remove recursively irdma module that also removes i40e module host# modprobe -r irdma Result: [ 8675.035651] i40e 0000:3d:00.0 eno1: offline testing starting [ 8675.193774] i40e 0000:3d:00.0 eno1: testing finished [ 8675.201316] i40e 0000:3d:00.0 eno1: offline testing starting [ 8675.358921] i40e 0000:3d:00.0 eno1: testing finished [ 8675.496921] i40e 0000:3d:00.0: IRDMA hardware initialization FAILED init_state=2 status=-110 [ 8686.188955] i40e 0000:3d:00.1: i40e_ptp_stop: removed PHC on eno2 [ 8686.943890] i40e 0000:3d:00.1: Deleted LAN device PF1 bus=0x3d dev=0x00 func=0x01 [ 8686.952669] i40e 0000:3d:00.0: i40e_ptp_stop: removed PHC on eno1 [ 8687.761787] BUG: kernel NULL pointer dereference, address: 0000000000000030 [ 8687.768755] #PF: supervisor read access in kernel mode [ 8687.773895] #PF: error_code(0x0000) - not-present page [ 8687.779034] PGD 0 P4D 0 [ 8687.781575] Oops: 0000 [#1] PREEMPT SMP NOPTI [ 8687.785935] CPU: 51 PID: 172891 Comm: rmmod Kdump: loaded Tainted: G W I 5.19.0+ #2 [ 8687.794800] Hardware name: Intel Corporation S2600WFD/S2600WFD, BIOS SE5C620.86B.0X.02.0001.051420190324 05/14/2019 [ 8687.805222] RIP: 0010:i40e_lan_del_device+0x13/0xb0 [i40e] [ 8687.810719] Code: d4 84 c0 0f 84 b8 25 01 00 e9 9c 25 01 00 41 bc f4 ff ff ff eb 91 90 0f 1f 44 00 00 41 54 55 53 48 8b 87 58 08 00 00 48 89 fb <48> 8b 68 30 48 89 ef e8 21 8a 0f d5 48 89 ef e8 a9 78 0f d5 48 8b [ 8687.829462] RSP: 0018:ffffa604072efce0 EFLAGS: 00010202 [ 8687.834689] RAX: 0000000000000000 RBX: ffff8f43833b2000 RCX: 0000000000000000 [ 8687.841821] RDX: 0000000000000000 RSI: ffff8f4b0545b298 RDI: ffff8f43833b2000 [ 8687.848955] RBP: ffff8f43833b2000 R08: 0000000000000001 R09: 0000000000000000 [ 8687.856086] R10: 0000000000000000 R11: 000ffffffffff000 R12: ffff8f43833b2ef0 [ 8687.863218] R13: ffff8f43833b2ef0 R14: ffff915103966000 R15: ffff8f43833b2008 [ 8687.870342] FS: 00007f79501c3740(0000) GS:ffff8f4adffc0000(0000) knlGS:0000000000000000 [ 8687.878427] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 8687.884174] CR2: 0000000000000030 CR3: 000000014276e004 CR4: 00000000007706e0 [ 8687.891306] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 8687.898441] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 8687.905572] PKRU: 55555554 [ 8687.908286] Call Trace: [ 8687.910737] <TASK> [ 8687.912843] i40e_remove+0x2c0/0x330 [i40e] [ 8687.917040] pci_device_remove+0x33/0xa0 [ 8687.920962] device_release_driver_internal+0x1aa/0x230 [ 8687.926188] driver_detach+0x44/0x90 [ 8687.929770] bus_remove_driver+0x55/0xe0 [ 8687.933693] pci_unregister_driver+0x2a/0xb0 [ 8687.937967] i40e_exit_module+0xc/0xf48 [i40e] Two offline tests cause IRDMA driver failure (ETIMEDOUT) and this failure is indicated back to i40e_client_subtask() that calls i40e_client_del_instance() to free client instance referenced by pf->cinst and sets this pointer to NULL. During the module removal i40e_remove() calls i40e_lan_del_device() that dereferences pf->cinst that is NULL -> crash. Do not remove client instance when client open callbacks fails and just clear __I40E_CLIENT_INSTANCE_OPENED bit. The driver also needs to take care about this situation (when netdev is up and client is NOT opened) in i40e_notify_client_of_netdev_close() and calls client close callback only when __I40E_CLIENT_INSTANCE_OPENED is set.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
GHSA-mgf5-9wxh-8rj7
Directory traversal vulnerability in a_getlog.cgi in Polycom HDX Video End Points before 3.0.4 and UC APL before 2.7.1.J allows remote attackers to read arbitrary files via a .. (dot dot) in the name parameter.
[]
CVE-2009-0820
Multiple eval injection vulnerabilities in phpScheduleIt before 1.2.11 allow remote attackers to execute arbitrary code via (1) the end_date parameter to reserve.php and (2) the start_date and end_date parameters to check.php. NOTE: the start_date/reserve.php vector is already covered by CVE-2008-6132.
[ "cpe:2.3:a:php.brickhost:phpscheduleit:*:*:*:*:*:*:*:*", "cpe:2.3:a:php.brickhost:phpscheduleit:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:php.brickhost:phpscheduleit:1.0.0rc1:*:*:*:*:*:*:*", "cpe:2.3:a:php.brickhost:phpscheduleit:1.0_rc1:*:*:*:*:*:*:*", "cpe:2.3:a:php.brickhost:phpscheduleit:1.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:php.brickhost:phpscheduleit:1.2.0:beta:*:*:*:*:*:*", "cpe:2.3:a:php.brickhost:phpscheduleit:1.2.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:php.brickhost:phpscheduleit:1.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:php.brickhost:phpscheduleit:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:php.brickhost:phpscheduleit:1.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:php.brickhost:phpscheduleit:1.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:php.brickhost:phpscheduleit:1.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:php.brickhost:phpscheduleit:1.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:php.brickhost:phpscheduleit:1.2.7:*:*:*:*:*:*:*", "cpe:2.3:a:php.brickhost:phpscheduleit:1.2.8:*:*:*:*:*:*:*", "cpe:2.3:a:php.brickhost:phpscheduleit:1.2.9:*:*:*:*:*:*:*" ]
GHSA-m3pp-jcpm-2vr9
TeamPass Cross-site Scripting (XSS)
An issue was discovered in TeamPass 2.1.27.35. From the sources/items.queries.php "Import items" feature, it is possible to load a crafted CSV file with an XSS payload.
[]
GHSA-r62p-gp92-7444
An out-of-bounds read flaw was found on grub2's NTFS filesystem driver. This issue may allow a physically present attacker to present a specially crafted NTFS file system image to read arbitrary memory locations. A successful attack allows sensitive data cached in memory or EFI variable values to be leaked, presenting a high Confidentiality risk.
[]
CVE-2024-49893
drm/amd/display: Check stream_status before it is used
In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Check stream_status before it is used [WHAT & HOW] dc_state_get_stream_status can return null, and therefore null must be checked before stream_status is used. This fixes 1 NULL_RETURNS issue reported by Coverity.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
CVE-2018-12989
The report-viewing feature in Pearson VUE Certiport Console 8 and IQSystem 7 before 2018-06-26 mishandles child processes and consequently launches Internet Explorer or Microsoft Edge as Administrator, which allows local users to gain privileges.
[ "cpe:2.3:a:pearsonvue:console_8:*:*:*:*:*:*:*:*", "cpe:2.3:a:pearsonvue:iqsystem_7:*:*:*:*:*:*:*:*" ]
GHSA-8j96-m43p-rp5v
The official notary docker images before signer-0.6.1-1 contain a blank password for a root user. System using the notary docker container deployed by affected versions of the docker image may allow an remote attacker to achieve root access with a blank password.
[]
GHSA-f48q-x5hr-3772
Rejected reason: This is unused.
[]
CVE-2017-1242
IBM Quality Manager (RQM) 5.0.x and 6.0 through 6.0.5 are vulnerable to HTML injection. A remote attacker could inject malicious HTML code, which when viewed, would be executed in the victim's Web browser within the security context of the hosting site. IBM X-Force ID: 124524.
[ "cpe:2.3:a:ibm:rational_quality_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:*:*:*:*:*:*:*:*" ]
CVE-2025-29770
vLLM denial of service via outlines unbounded cache on disk
vLLM is a high-throughput and memory-efficient inference and serving engine for LLMs. The outlines library is one of the backends used by vLLM to support structured output (a.k.a. guided decoding). Outlines provides an optional cache for its compiled grammars on the local filesystem. This cache has been on by default in vLLM. Outlines is also available by default through the OpenAI compatible API server. The affected code in vLLM is vllm/model_executor/guided_decoding/outlines_logits_processors.py, which unconditionally uses the cache from outlines. A malicious user can send a stream of very short decoding requests with unique schemas, resulting in an addition to the cache for each request. This can result in a Denial of Service if the filesystem runs out of space. Note that even if vLLM was configured to use a different backend by default, it is still possible to choose outlines on a per-request basis using the guided_decoding_backend key of the extra_body field of the request. This issue applies only to the V0 engine and is fixed in 0.8.0.
[]
GHSA-g9jf-3624-h7rw
GE Mark VIe, EX2100e, EX2100e_Reg, and LS2100e Versions 03.03.28C to 05.02.04C, EX2100e All versions prior to v04.09.00C, EX2100e_Reg All versions prior to v04.09.00C, and LS2100e All versions prior to v04.09.00C The affected versions of the application have a path traversal vulnerability that fails to restrict the ability of an attacker to gain access to restricted information.
[]
CVE-2023-44260
WordPress Woocommerce ESTO Plugin <= 2.23.1 is vulnerable to Cross Site Request Forgery (CSRF)
Cross-Site Request Forgery (CSRF) vulnerability in Mikk Mihkel Nurges, Rebing OÜ Woocommerce ESTO plugin <= 2.23.1 versions.
[ "cpe:2.3:a:rebing:woocommerce_esto:*:*:*:*:*:wordpress:*:*" ]
CVE-2001-1008
Java Plugin 1.4 for JRE 1.3 executes signed applets even if the certificate is expired, which could allow remote attackers to conduct unauthorized activities via an applet that has been signed by an expired certificate.
[ "cpe:2.3:a:sun:java_plug-in:1.4:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.3.0:*:*:*:*:*:*:*" ]
GHSA-wpcw-wgmc-jcg8
SQL Injection vulnerability in Exponent-CMS v.2.6.0 fixed in 2.7.0 allows attackers to gain access to sensitive information via the selectValue function in the expConfig class.
[]
CVE-2023-51467
Apache OFBiz: Pre-authentication Remote Code Execution (RCE) vulnerability
The vulnerability permits attackers to circumvent authentication processes, enabling them to remotely execute arbitrary code
[ "cpe:2.3:a:apache:ofbiz:*:*:*:*:*:*:*:*" ]
CVE-2024-43994
WordPress Kahuna theme <= 1.7.0 - Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in CryoutCreations Kahuna allows Stored XSS.This issue affects Kahuna: from n/a through 1.7.0.
[ "cpe:2.3:a:cryoutcreations:kahuna:*:*:*:*:*:wordpress:*:*" ]
GHSA-r58p-qjp8-xqvv
Vulnerability in the Oracle Solaris product of Oracle Systems (component: Kernel). The supported version that is affected is 11. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Solaris executes to compromise Oracle Solaris. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Solaris. CVSS 3.1 Base Score 5.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
[]
CVE-2022-25972
An out-of-bounds write vulnerability exists in the gif2h5 functionality of HDF5 Group libhdf5 1.10.4. A specially-crafted GIF file can lead to code execution. An attacker can provide a malicious file to trigger this vulnerability.
[ "cpe:2.3:a:hdfgroup:hdf5:1.10.4:*:*:*:*:*:*:*" ]
CVE-2024-40725
Apache HTTP Server: source code disclosure with handlers configured via AddType
A partial fix for  CVE-2024-39884 in the core of Apache HTTP Server 2.4.61 ignores some use of the legacy content-type based configuration of handlers. "AddType" and similar configuration, under some circumstances where files are requested indirectly, result in source code disclosure of local content. For example, PHP scripts may be served instead of interpreted. Users are recommended to upgrade to version 2.4.62, which fixes this issue.
[ "cpe:2.3:a:apache:http_server:2.4.60:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.4.61:*:*:*:*:*:*:*" ]
GHSA-gp35-882c-rhqq
The Caldera Forms WordPress plugin before 1.9.5 does not sanitise and escape the Form Name before outputting it in attributes, which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.
[]
GHSA-m29g-2pfv-37px
Stack-based buffer overflow in Apple QuickTime before 7.5.5 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a QuickTime Virtual Reality (QTVR) movie file with crafted (1) maxTilt, (2) minFieldOfView, and (3) maxFieldOfView elements in panorama track PDAT atoms.
[]
GHSA-f8fj-4gwg-crcc
NVIDIA GPU Display Driver for Linux, all versions, contains a vulnerability in the kernel mode layer (nvidia.ko) in which it does not completely honor operating system file system permissions to provide GPU device-level isolation, which may lead to denial of service or information disclosure.
[]
CVE-2023-49747
WordPress Guest Author Plugin <= 2.3 is vulnerable to Cross Site Scripting (XSS)
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WebFactory Ltd Guest Author allows Stored XSS.This issue affects Guest Author: from n/a through 2.3.
[ "cpe:2.3:a:webfactoryltd:guest_author:*:*:*:*:*:wordpress:*:*" ]
CVE-2024-53842
In cc_SendCcImsInfoIndMsg of cc_MmConManagement.c, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.
[]
CVE-2017-7447
HelpDEZk 1.1.1 has CSRF in admin/home#/logos/ with an impact of remote execution of arbitrary PHP code.
[ "cpe:2.3:a:helpdezk:helpdezk:1.1.1:*:*:*:*:*:*:*" ]
GHSA-qx95-cwh6-9mvq
TCPDF missing character escape on error messages
An issue was discovered in TCPDF before 6.8.0. The Error function lacks an htmlspecialchars call for the error message.
[]
GHSA-w349-67wp-7f3v
Lintian before 2.5.12 allows remote attackers to gather information about the "host" system using crafted symlinks.
[]
CVE-2015-5184
Console: CORS headers set to allow all in Red Hat AMQ.
[ "cpe:2.3:a:redhat:amq:*:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:jboss_enterprise_web_server:1.0.0:*:*:*:*:*:*:*" ]
GHSA-2ghm-cqrg-hhpv
IBM Security Directory Server 6.4.0 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the insecure link and the attacker can then obtain the cookie value by snooping the traffic. IBM X-Force ID: 166624.
[]
CVE-2014-6366
Microsoft Internet Explorer 6 and 7 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."
[ "cpe:2.3:a:microsoft:internet_explorer:6:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*" ]
CVE-2010-1493
SQL injection vulnerability in the AWDwall (com_awdwall) component before 1.5.5 for Joomla! allows remote attackers to execute arbitrary SQL commands via the cbuser parameter in an awdwall action to index.php.
[ "cpe:2.3:a:awdsolution:com_awdwall:*:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:*:*:*:*:*:*:*:*" ]
CVE-2016-10615
curses is bindings for the native curses library, a full featured console IO library. curses downloads binary resources over HTTP, which leaves it vulnerable to MITM attacks. It may be possible to cause remote code execution (RCE) by swapping out the requested binary with an attacker controlled binary if the attacker is on the network or positioned in between the user and the remote server.
[ "cpe:2.3:a:curses_project:curses:*:*:*:*:*:node.js:*:*" ]
GHSA-vrvg-p87p-4fgg
An issue in the sqlo_preds_contradiction component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
[]
CVE-2008-2518
Cross-site scripting (XSS) vulnerability in the advanced search mechanism (webapps/search/advanced.jsp) in Sun Java System Web Server 6.1 before SP9 and 7.0 before Update 3 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, probably related to the next parameter.
[ "cpe:2.3:a:sun:java_system_web_server:6.1:*:*:*:*:*:*:*", "cpe:2.3:a:sun:java_system_web_server:6.1:sp1:*:*:*:*:*:*", "cpe:2.3:a:sun:java_system_web_server:6.1:sp2:*:*:*:*:*:*", "cpe:2.3:a:sun:java_system_web_server:6.1:sp3:*:*:*:*:*:*", "cpe:2.3:a:sun:java_system_web_server:6.1:sp4:*:*:*:*:*:*", "cpe:2.3:a:sun:java_system_web_server:6.1:sp5:*:*:*:*:*:*", "cpe:2.3:a:sun:java_system_web_server:6.1:sp6:*:*:*:*:*:*", "cpe:2.3:a:sun:java_system_web_server:6.1:sp7:*:*:*:*:*:*", "cpe:2.3:a:sun:java_system_web_server:6.1:sp8:*:*:*:*:*:*", "cpe:2.3:a:sun:java_system_web_server:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:sun:java_system_web_server:7.0:update_1:*:*:*:*:*:*", "cpe:2.3:a:sun:java_system_web_server:7.0:update_2:*:*:*:*:*:*" ]
GHSA-4j73-w5hq-8c5m
Unspecified vulnerability in the Oracle Application Object Library component in Oracle E-Business Suite 11.5.10.2, 12.0.6, 12.1.3, 12.2.3, and 12.2.4 allows remote authenticated users to affect integrity via unknown vectors related to Input validation.
[]
GHSA-4q7w-v4v6-fpg3
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in LionScripts.Com Webmaster Tools plugin <= 2.0 versions.
[]
GHSA-pgpv-wr92-vpj8
Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 20 of 46).
[]
GHSA-c6j8-r888-r854
The Taxonomy module in Drupal 7.x before 7.26, when upgraded from an earlier version of Drupal, does not properly restrict access to unpublished content, which allows remote authenticated users to obtain sensitive information via a listing page.
[]
GHSA-p2h2-c6c9-9wpx
HUAWEI P30 versions Versions earlier than 10.1.0.160(C00E160R2P11);HUAWEI P30 Pro versions Versions earlier than 10.1.0.160(C00E160R2P8) have a denial of service vulnerability. Certain system configuration can be modified because of improper authorization. The attacker could trick the user installing and executing a malicious application, successful exploit could cause a denial of service condition of PHONE function.
[]
GHSA-vcj4-948w-5pwr
HP Laserjet printers with JetDirect cards, when configured with TCP/IP, allow remote attackers to bypass print filters by directly sending PostScript documents to TCP ports 9099 and 9100.
[]
CVE-2022-27490
A exposure of sensitive information to an unauthorized actor in Fortinet FortiManager version 6.0.0 through 6.0.4, FortiAnalyzer version 6.0.0 through 6.0.4, FortiPortal version 6.0.0 through 6.0.9, 5.3.0 through 5.3.8, 5.2.x, 5.1.0, 5.0.x, 4.2.x, 4.1.x, FortiSwitch version 7.0.0 through 7.0.4, 6.4.0 through 6.4.10, 6.2.x, 6.0.x allows an attacker which has obtained access to a restricted administrative account to obtain sensitive information via `diagnose debug` commands.
[ "cpe:2.3:a:fortinet:fortianalyzer:*:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiportal:*:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortiswitch:*:*:*:*:*:*:*:*" ]
CVE-2015-4049
Unisys Libra 43xx, 63xx, and 83xx, and FS600 class systems with MCP-FIRMWARE 40.0 before 40.0IC4 Build 270 might allow remote authenticated users to cause a denial of service (data corruption or system crash) via vectors related to using program operators during EPSILON (level 5) based codefiles at peak memory usage, which triggers CPM stack corruption.
[ "cpe:2.3:o:unisys:mcp-firmware:40.0:*:*:*:*:*:*:*" ]
GHSA-56v7-v35x-736f
Cryptocat before 2.0.22 has weak encryption in the Socialist Millionnaire Protocol
[]
GHSA-hw2m-rcmq-r2rj
GNOME Evolution 2.4.2.1 and earlier allows remote attackers to cause a denial of service (CPU and memory consumption) via a text e-mail with a large number of URLs, possibly due to unknown problems in gtkhtml.
[]
CVE-2024-8921
Zita Elementor Site Library <= 1.6.3 - Authenticated (Author+) Stored Cross-Site Scripting via SVG File Upload
The Zita Elementor Site Library plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 1.6.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file.
[]
GHSA-6fjw-fw76-494w
Users with appropriate file access may be able to access unencrypted user credentials saved by MongoDB Extension for VS Code in a binary file. These credentials may be used by malicious attackers to perform unauthorized actions. This vulnerability affects all MongoDB Extension for VS Code including and prior to version 0.7.0
[]
GHSA-5v2v-rv23-5w86
Adobe Framemaker versions 2019.0.4 and below have a heap overflow vulnerability. Successful exploitation could lead to arbitrary code execution.
[]
GHSA-q5q9-xm97-jw68
Microsoft Edge in Microsoft Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an attacker to obtain information to further compromise the user's system when Microsoft Edge improperly handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8499, CVE-2017-8520, CVE-2017-8521, and CVE-2017-8549.
[]