id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
189k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
patch_commit_url
stringlengths
36
232
GHSA-r7h7-chh4-5rvm
Improper Access Control in Gitea
Gitea 0.9.99 through 1.12.x before 1.12.6 does not prevent a git protocol path that specifies a TCP port number and also contains newlines (with URL encoding) in ParseRemoteAddr in modules/auth/repo_form.go.
[]
null
9.8
null
null
null
GHSA-37r3-92cr-vf6c
Xerox AltaLink B80xx before 103.008.020.23120, C8030/C8035 before 103.001.020.23120, C8045/C8055 before 103.002.020.23120 and C8070 before 103.003.020.23120 provide the ability to set configuration attributes without administrative rights.
[]
null
7.5
null
null
null
GHSA-fp5j-7rg9-v2c7
WordPress before 4.2.3 does not properly verify the edit_posts capability, which allows remote authenticated users to bypass intended access restrictions and create drafts by leveraging the Subscriber role, as demonstrated by a post-quickdraft-save action to wp-admin/post.php.
[]
null
null
null
null
null
CVE-2016-6322
Red Hat QuickStart Cloud Installer (QCI) uses world-readable permissions for /etc/qci/answers, which allows local users to obtain the root password for the deployed system by reading the file.
[ "cpe:2.3:a:redhat:quickstart_cloud_installer:-:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:-:*:*:*:*:*:*:*" ]
null
null
8.4
7.2
null
CVE-2009-2782
SQL injection vulnerability in the JFusion (com_jfusion) component for Joomla! allows remote attackers to execute arbitrary SQL commands via the Itemid parameter to index.php.
[ "cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*", "cpe:2.3:a:jfusion:com_jfusion:-:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2024-45206
A vulnerability in Veeam Service Provider Console has been identified, which allows to perform arbitrary HTTP requests to arbitrary hosts of the network and get information about internal resources.
[ "cpe:2.3:a:veeam:service_provider_console:*:*:*:*:*:*:*:*" ]
null
null
6.5
null
null
GHSA-c69x-g4rf-5fp6
Multiple cross-site scripting (XSS) vulnerabilities in MySQL Eventum 1.5.5 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) id parameter to view.php, (2) release parameter to list.php, or (3) F parameter to get_jsrs_data.php.
[]
null
null
null
null
null
RHSA-2022:6252
Red Hat Security Advisory: OpenShift Container Platform 3.11.784 security update
grafana: Snapshot authentication bypass
[ "cpe:/a:redhat:openshift:3.11::el7" ]
null
7.3
null
null
null
CVE-2024-38421
Use After Free in Graphics Linux
Memory corruption while processing GPU commands.
[ "cpe:2.3:o:qualcomm:fastconnect_6200_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qam8255p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qam8295p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qam8620p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qam8650p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qam8775p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qamsrv1h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qamsrv1m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6574_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6574a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6595_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6678aq_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6688aq_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6797aq_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcm6125_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcs6125_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcs6490_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcs7230_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcs8250_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc1_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc3_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc5_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa7255p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa7775p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa8195p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa8255p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa8295p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa8620p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa8650p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa8770p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa8775p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa9000p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm4635_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm8635_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm8750_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm8750p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_4_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_480_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_695_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_8_gen_3_mobile_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:srv1h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:srv1l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:srv1m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sw5100_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sw5100p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9378_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9390_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9395_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn6755_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn7860_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn7861_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn7880_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn7881_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wsa8832_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wsa8840_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wsa8845_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wsa8845h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wsa8845h:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wsa8845:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wsa8840:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wsa8832:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wsa8815:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wsa8810:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn7881:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn7880:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn7861:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn7860:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn6755:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn3988:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn3980:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn3950:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9395:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9390:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9378:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9375:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sw5100p:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sw5100:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:srv1m:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:srv1l:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:srv1h:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_w5\\+_gen_1_wearable_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_w5\\+_gen_1_wearable_platform:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_8_gen_3_mobile_platform:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_695_5g_mobile_platform:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_480\\+_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_480\\+_5g_mobile_platform:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_480_5g_mobile_platform:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_4_gen_1_mobile_platform:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm8750p:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm8750:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm8635:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm4635:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa9000p:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa8775p:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa8770p:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa8650p:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa8620p:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa8295p:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa8255p:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa8195p:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa8155p:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa7775p:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa7255p:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa6155p:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:video_collaboration_vc5_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:video_collaboration_vc5_platform:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:video_collaboration_vc3_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:video_collaboration_vc3_platform:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:video_collaboration_vc1_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:video_collaboration_vc1_platform:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcs8250:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcs7230:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcs6490:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcs6125:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcm6125:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6797aq:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6698aq:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6696:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6688aq:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6678aq:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6595au:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6595:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6574a:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6574:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6391:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qamsrv1m:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qamsrv1h:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qam8775p:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qam8650p:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qam8620p:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qam8295p:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qam8255p:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:fastconnect_7800:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:fastconnect_6200:-:*:*:*:*:*:*:*" ]
null
7.8
null
null
null
GHSA-8j34-9cp8-62rj
Multiple untrusted search path vulnerabilities in ACDSee Photo Editor 2008 5.x build 291 allow local users to gain privileges via a Trojan horse (1) Wintab32.dll or (2) CV11-DialogEditor.dll file in the current working directory, as demonstrated by a directory that contains a .apd file. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
[]
null
null
null
null
null
CVE-2017-10840
Cross-site scripting vulnerability in WebCalendar 1.2.7 and earlier allows an attacker to inject arbitrary web script or HTML via unspecified vectors.
[ "cpe:2.3:a:webcalendar_project:webcalendar:1.2.7:*:*:*:*:*:*:*" ]
null
null
6.1
4.3
null
GHSA-j65p-mvw9-4x25
Adobe Shockwave Player before 11.6.5.635 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2029, CVE-2012-2030, CVE-2012-2031, and CVE-2012-2032.
[]
null
null
null
null
null
ICSA-24-179-06
Johnson Controls Illustra Essentials Gen 4 (Update A)
Under certain circumstances, unnecessary user details are provided within system logs
[]
null
6.8
null
null
null
GHSA-8ggf-qhcg-9vjr
Adobe Reader and Acrobat 9.x before 9.5.2 and 10.x before 10.1.4 on Windows and Mac OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2051, CVE-2012-4147, CVE-2012-4149, CVE-2012-4150, CVE-2012-4151, CVE-2012-4152, CVE-2012-4153, CVE-2012-4154, CVE-2012-4155, CVE-2012-4156, CVE-2012-4157, CVE-2012-4158, CVE-2012-4159, and CVE-2012-4160.
[]
null
null
null
null
null
GHSA-62qm-vc7f-rm93
The issue was addressed with improved UI handling. This issue is fixed in tvOS 17.4, macOS Sonoma 14.4, visionOS 1.1, iOS 17.4 and iPadOS 17.4, watchOS 10.4, Safari 17.4. A malicious website may exfiltrate audio data cross-origin.
[]
null
6.5
null
null
null
GHSA-w6p8-9w8x-8q7g
Windows Update Stack Elevation of Privilege Vulnerability.
[]
null
7
null
null
null
GHSA-gqx4-7r84-32m6
A select option could partially obscure the confirmation prompt shown before launching external apps. This could be used to trick a user in to launching an external app unexpectedly. *This issue only affects Android versions of Firefox.* This vulnerability affects Firefox < 136.
[]
null
7.1
null
null
null
GHSA-j69m-4pr5-vvwg
Directory traversal vulnerability in install.php in FluxBB before 1.5.8 allows remote attackers to include and execute arbitrary local install.php files via a .. (dot dot) in the install_lang parameter.
[]
null
null
null
null
null
GHSA-8r54-hq49-gq6m
An issue was discovered in the Core and Portal modules in Polaris FT Intellect Core Banking 9.7.1. An open redirect exists via a /IntellectMain.jsp?IntellectSystem= URI.
[]
null
null
6.1
null
null
CVE-2006-0804
Off-by-one error in TIN 1.8.0 and earlier might allow attackers to execute arbitrary code via unknown vectors that trigger a buffer overflow.
[ "cpe:2.3:a:tin:tin:1.0_pl0:*:*:*:*:*:*:*", "cpe:2.3:a:tin:tin:1.0_pl1:*:*:*:*:*:*:*", "cpe:2.3:a:tin:tin:1.0_pl2:*:*:*:*:*:*:*", "cpe:2.3:a:tin:tin:1.0_pl3:*:*:*:*:*:*:*", "cpe:2.3:a:tin:tin:1.0_pl4:*:*:*:*:*:*:*", "cpe:2.3:a:tin:tin:1.0_pl5:*:*:*:*:*:*:*", "cpe:2.3:a:tin:tin:1.1_pl0:*:*:*:*:*:*:*", "cpe:2.3:a:tin:tin:1.1_pl1:*:*:*:*:*:*:*", "cpe:2.3:a:tin:tin:1.1_pl2:*:*:*:*:*:*:*", "cpe:2.3:a:tin:tin:1.1_pl3:*:*:*:*:*:*:*", "cpe:2.3:a:tin:tin:1.1_pl4:*:*:*:*:*:*:*", "cpe:2.3:a:tin:tin:1.1_pl5:*:*:*:*:*:*:*", "cpe:2.3:a:tin:tin:1.1_pl6:*:*:*:*:*:*:*", "cpe:2.3:a:tin:tin:1.1_pl7:*:*:*:*:*:*:*", "cpe:2.3:a:tin:tin:1.1_pl8:*:*:*:*:*:*:*", "cpe:2.3:a:tin:tin:1.1_pl9:*:*:*:*:*:*:*", "cpe:2.3:a:tin:tin:1.2_pl0:*:*:*:*:*:*:*", "cpe:2.3:a:tin:tin:1.2_pl1:*:*:*:*:*:*:*", "cpe:2.3:a:tin:tin:1.2_pl2:*:*:*:*:*:*:*", "cpe:2.3:a:tin:tin:1.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:tin:tin:1.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:tin:tin:1.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:tin:tin:1.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:tin:tin:1.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:tin:tin:1.4.5:*:*:*:*:*:*:*", "cpe:2.3:a:tin:tin:1.4.6:*:*:*:*:*:*:*", "cpe:2.3:a:tin:tin:1.4.7:*:*:*:*:*:*:*", "cpe:2.3:a:tin:tin:1.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:tin:tin:1.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:tin:tin:1.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:tin:tin:1.8.0:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
GHSA-2pm2-cpjx-462g
Webedition CMS 9.2.2.0 has a Stored XSS vulnerability via /webEdition/we_cmd.php.
[]
null
6.3
null
null
null
GHSA-6229-3fh2-qhp3
scripts/grep-excuses.pl in Debian devscripts through 2.18.3 allows code execution through unsafe YAML loading because YAML::Syck is used without a configuration that prevents unintended blessing.
[]
null
null
9.8
null
null
CVE-2008-6146
SQL injection vulnerability in pm.php in DeluxeBB 1.2 and earlier, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary SQL commands via a delete##### parameter in a Delete action, a different vector than CVE-2005-2989.
[ "cpe:2.3:a:deluxebb:deluxebb:*:*:*:*:*:*:*:*", "cpe:2.3:a:deluxebb:deluxebb:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:deluxebb:deluxebb:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:deluxebb:deluxebb:1.05:*:*:*:*:*:*:*", "cpe:2.3:a:deluxebb:deluxebb:1.06:*:*:*:*:*:*:*", "cpe:2.3:a:deluxebb:deluxebb:1.07:*:*:*:*:*:*:*", "cpe:2.3:a:deluxebb:deluxebb:1.08:*:*:*:*:*:*:*", "cpe:2.3:a:deluxebb:deluxebb:1.09:*:*:*:*:*:*:*" ]
null
null
null
6.8
null
CVE-2015-7268
Samsung 850 Pro and PM851 solid-state drives and Seagate ST500LT015 and ST500LT025 hard disk drives, when used on Windows and operating in Opal mode on Lenovo ThinkPad T440s laptops with BIOS 2.32 or ThinkPad W541 laptops with BIOS 2.21, or in Opal or eDrive mode on Dell Latitude E6410 laptops with BIOS A16 or Latitude E6430 laptops with BIOS A16, allow physically proximate attackers to bypass self-encrypting drive (SED) protection by triggering a soft reset and booting from an alternative OS, aka a "Forced Restart Attack."
[ "cpe:2.3:o:samsung:850_pro_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:samsung:850_pro:-:*:*:*:*:*:*:*", "cpe:2.3:o:samsung:pm851_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:samsung:pm851:-:*:*:*:*:*:*:*", "cpe:2.3:o:seagate:st500lt015_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:seagate:st500lt015:-:*:*:*:*:*:*:*", "cpe:2.3:o:seagate:st500lt025_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:seagate:st500lt025:-:*:*:*:*:*:*:*" ]
null
null
4.2
1.9
null
GHSA-p9rf-64qj-22rw
There exists a denial of service through Data corruption in gRPC-C++ - gRPC-C++ servers with transmit zero copy enabled through the channel arg GRPC_ARG_TCP_TX_ZEROCOPY_ENABLED can experience data corruption issues. The data sent by the application may be corrupted before transmission over the network thus leading the receiver to receive an incorrect set of bytes causing RPC requests to fail. We recommend upgrading past commit e9046b2bbebc0cb7f5dc42008f807f6c7e98e791
[]
6.9
7.5
null
null
null
CVE-2018-12795
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
[ "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
null
7.5
5
null
GHSA-3vqq-m58h-g5f5
Windows Installer Spoofing Vulnerability
[]
null
5.5
null
null
null
GHSA-wv8g-68m4-8hv5
SQL injection vulnerability in the SAV Filter Selectors (sav_filter_selectors) extension before 1.0.5 for TYPO3 allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
[]
null
null
null
null
null
GHSA-q677-wggg-h4hr
A cross-site scripting (XSS) vulnerability AntSword v2.0.7 can remotely execute system commands.
[]
null
null
null
null
null
CVE-2008-3789
Samba 3.2.0 uses weak permissions (0666) for the (1) group_mapping.tdb and (2) group_mapping.ldb files, which allows local users to modify the membership of Unix groups.
[ "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*" ]
null
null
null
2.1
null
RHSA-2008:0206
Red Hat Security Advisory: cups security update
cups: buffer overflows in HP-GL/2 filter cups: overflow in gif image filter cups: incomplete fix for CVE-2004-0888 / CVE-2005-0206
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
null
GHSA-hm95-xc86-pqpj
A Stored Cross Site Scripting (XSS) vulnerability exists in Sourcecodester Student Attendance Management System 1.0 via the couse filed in index.php.
[]
null
5.4
null
null
null
GHSA-f7mx-7w94-fgrm
Unspecified vulnerability in the Siebel UI Framework component in Oracle Siebel CRM 8.1.1, 8.2.2, IP2014, IP2015, and IP2016 allows remote authenticated users to affect confidentiality and integrity via vectors related to EAI, a different vulnerability than CVE-2016-5468.
[]
null
null
8.1
null
null
GHSA-jpph-v56f-mxcx
The Admin side data storage for Contact Form 7 plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the zt_dcfcf_change_bookmark() function in all versions up to, and including, 1.1.1. This makes it possible for unauthenticated attackers to alter bookmark statuses.
[]
null
4.3
null
null
null
CVE-2023-43045
IBM Sterling Partner Engagement Manager security bypass
IBM Sterling Partner Engagement Manager 6.1.2, 6.2.0, and 6.2.2 could allow a remote user to perform unauthorized actions due to improper authentication. IBM X-Force ID: 266896.
[ "cpe:2.3:a:ibm:sterling_partner_engagement_manager:6.1.2:*:*:*:essentials:*:*:*", "cpe:2.3:a:ibm:sterling_partner_engagement_manager:6.1.2:*:*:*:standard:*:*:*", "cpe:2.3:a:ibm:sterling_partner_engagement_manager:6.2.0:*:*:*:essentials:*:*:*", "cpe:2.3:a:ibm:sterling_partner_engagement_manager:6.2.0:*:*:*:standard:*:*:*", "cpe:2.3:a:ibm:sterling_partner_engagement_manager:6.2.2:*:*:*:essentials:*:*:*", "cpe:2.3:a:ibm:sterling_partner_engagement_manager:6.2.2:*:*:*:standard:*:*:*" ]
null
5.9
null
null
null
RHSA-2025:9322
Red Hat Security Advisory: libblockdev security update
libblockdev: LPE from allow_active to root in libblockdev via udisks
[ "cpe:/a:redhat:rhel_aus:8.6::appstream", "cpe:/a:redhat:rhel_e4s:8.6::appstream", "cpe:/a:redhat:rhel_tus:8.6::appstream" ]
null
7
null
null
null
GHSA-c665-2rvm-477f
Microsoft AutoUpdate (MAU) Elevation of Privilege Vulnerability
[]
null
7.8
null
null
null
CVE-2016-7785
The avi_read_seek function in libavformat/avidec.c in FFmpeg before 3.1.4 allows remote attackers to cause a denial of service (assert fault) via a crafted AVI file.
[ "cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*" ]
null
null
5.5
4.3
null
CVE-2022-47732
In Yeastar N412 and N824 Configuration Panel 42.x and 45.x, an unauthenticated attacker can create backup file and download it, revealing admin hash, allowing, once cracked, to login inside the Configuration Panel, otherwise, replacing the hash in the archive and restoring it on the device which will change admin password granting access to the device.
[ "cpe:2.3:o:yeastar:n824_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:yeastar:n824:-:*:*:*:*:*:*:*", "cpe:2.3:o:yeastar:n412_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:yeastar:n412:-:*:*:*:*:*:*:*" ]
null
7.5
null
null
null
GHSA-m278-843w-6753
CRLF injection vulnerability in the HMI web server in Siemens WinCC flexible 2004, 2005, 2007, and 2008 before SP3; WinCC V11 (aka TIA portal) before SP2 Update 1; the TP, OP, MP, Comfort Panels, and Mobile Panels SIMATIC HMI panels; WinCC V11 Runtime Advanced; and WinCC flexible Runtime allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via unspecified vectors.
[]
null
null
null
null
null
RHSA-2024:3552
Red Hat Security Advisory: python-idna security and bug fix update
python-idna: potential DoS via resource consumption via specially crafted inputs to idna.encode()
[ "cpe:/o:redhat:rhel_aus:8.6::baseos", "cpe:/o:redhat:rhel_e4s:8.6::baseos", "cpe:/o:redhat:rhel_tus:8.6::baseos" ]
null
6.5
null
null
null
CVE-2025-29481
Buffer Overflow vulnerability in libbpf 1.5.0 allows a local attacker to execute arbitrary code via the bpf_object__init_prog` function of libbpf.
[]
null
6.2
null
null
null
CVE-2022-40030
SourceCodester Simple Task Managing System v1.0 was discovered to contain a SQL injection vulnerability via the bookId parameter at changeStatus.php.
[ "cpe:2.3:a:simple_task_managing_system_project:simple_task_managing_system:1.0:*:*:*:*:*:*:*" ]
null
9.8
null
null
null
CVE-2008-3543
Unspecified vulnerability in NFS / ONCplus B.11.31_04 and earlier on HP-UX B.11.31 allows remote attackers to cause a denial of service via unknown attack vectors.
[ "cpe:2.3:o:hp:hpux:b.11.31:*:*:*:*:*:*:*", "cpe:2.3:a:hp:oncplus:*:*:*:*:*:*:*:*", "cpe:2.3:a:hp:oncplus:b.11.31_01:*:*:*:*:*:*:*", "cpe:2.3:a:hp:oncplus:b.11.31_02:*:*:*:*:*:*:*", "cpe:2.3:a:hp:oncplus:b.11.31_03:*:*:*:*:*:*:*" ]
null
null
null
7.8
null
CVE-2024-13349
Stockdio Historical Chart <= 2.8.18 - Authenticated (Contributor+) Stored Cross-Site Scripting
The Stockdio Historical Chart plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'stockdio-historical-chart' shortcode in all versions up to, and including, 2.8.18 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
6.4
null
null
null
GHSA-xv46-hhwp-vf34
A vulnerability in the internal Kubernetes agent api in GitLab CE/EE version 13.3 and above allows unauthorized access to private projects. Affected versions are: >=13.4, <13.4.5,>=13.3, <13.3.9,>=13.5, <13.5.2.
[]
null
null
null
null
null
CVE-2008-2964
SQL injection vulnerability in guide.php in ResearchGuide 0.5 allows remote attackers to execute arbitrary SQL commands via the id parameter.
[ "cpe:2.3:a:researchguide:researchguide:0.5:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2024-23034
Cross Site Scripting vulnerability in the input parameter in eyoucms v.1.6.5 allows a remote attacker to run arbitrary code via crafted URL.
[ "cpe:2.3:a:eyoucms:eyoucms:1.6.5:*:*:*:*:*:*:*" ]
null
6.1
null
null
null
GHSA-xf2j-pr94-q4g4
Symmetricom SyncServer S100 2.90.70.3, S200 1.30, S250 1.25, S300 2.65.0, and S350 2.80.1 devices allow Directory Traversal via the FileName parameter to messagelog.php.
[]
null
null
null
null
null
GHSA-qq99-p57r-g3v7
code injection vulnerability exists in the huggingface/text-generation-inference repository
A code injection vulnerability exists in the huggingface/text-generation-inference repository, specifically within the `autodocs.yml` workflow file. The vulnerability arises from the insecure handling of the `github.head_ref` user input, which is used to dynamically construct a command for installing a software package. An attacker can exploit this by forking the repository, creating a branch with a malicious payload as the name, and then opening a pull request to the base repository. Successful exploitation could lead to arbitrary code execution within the context of the GitHub Actions runner. This issue affects versions up to and including v2.0.0 and was fixed in version 2.0.0.
[]
null
null
4.4
null
null
GHSA-xqwg-mwmp-6pp4
SQL injection vulnerability in OrbitScripts Orbit Open Ad Server before 1.1.1 allows remote attackers to execute arbitrary SQL commands via the site_directory_sort_field parameter to guest/site_directory.
[]
null
null
null
null
null
GHSA-jr74-ph2w-qpmv
Vulnerability in the Oracle iStore product of Oracle E-Business Suite (component: User Management). Supported versions that are affected are 12.2.3-12.2.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle iStore. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle iStore accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
[]
null
7.5
null
null
null
GHSA-xxxw-3j6h-q7h6
Grafana plugin SDK Information Leakage
The grafana plugin SDK bundles build metadata into the binaries it compiles; this metadata includes the repository URI for the plugin being built, as retrieved by running `git remote get-url origin`.If credentials are included in the repository URI (for instance, to allow for fetching of private dependencies), the final binary will contain the full URI, including said credentials.
[]
9.1
5.9
null
null
null
CVE-2020-14782
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
[ "cpe:2.3:a:oracle:jdk:1.7.0:update271:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.8.0:update261:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:11.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:15:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.8.0:update261:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*", "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*", "cpe:2.3:a:netapp:e-series_performance_analyzer:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*", "cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:santricity_unified_manager:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*", "cpe:2.3:a:mcafee:epolicy_orchestrator:5.9.0:*:*:*:*:*:*:*", "cpe:2.3:a:mcafee:epolicy_orchestrator:5.9.1:*:*:*:*:*:*:*", "cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:-:*:*:*:*:*:*", "cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_1:*:*:*:*:*:*", "cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_2:*:*:*:*:*:*", "cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_3:*:*:*:*:*:*", "cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_4:*:*:*:*:*:*", "cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_5:*:*:*:*:*:*", "cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_6:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*" ]
null
3.7
null
null
null
CVE-2013-4378
Cross-site scripting (XSS) vulnerability in HtmlSessionInformationsReport.java in JavaMelody 1.46 and earlier allows remote attackers to inject arbitrary web script or HTML via a crafted X-Forwarded-For header.
[ "cpe:2.3:a:emeric_vernat:javamelody:*:*:*:*:*:*:*:*", "cpe:2.3:a:emeric_vernat:javamelody:1.6:*:*:*:*:*:*:*", "cpe:2.3:a:emeric_vernat:javamelody:1.7:*:*:*:*:*:*:*", "cpe:2.3:a:emeric_vernat:javamelody:1.8:*:*:*:*:*:*:*", "cpe:2.3:a:emeric_vernat:javamelody:1.9:*:*:*:*:*:*:*", "cpe:2.3:a:emeric_vernat:javamelody:1.10:*:*:*:*:*:*:*", "cpe:2.3:a:emeric_vernat:javamelody:1.11:*:*:*:*:*:*:*", "cpe:2.3:a:emeric_vernat:javamelody:1.12:*:*:*:*:*:*:*", "cpe:2.3:a:emeric_vernat:javamelody:1.13:*:*:*:*:*:*:*", "cpe:2.3:a:emeric_vernat:javamelody:1.14:*:*:*:*:*:*:*", "cpe:2.3:a:emeric_vernat:javamelody:1.15:*:*:*:*:*:*:*", "cpe:2.3:a:emeric_vernat:javamelody:1.16:*:*:*:*:*:*:*", "cpe:2.3:a:emeric_vernat:javamelody:1.17:*:*:*:*:*:*:*", "cpe:2.3:a:emeric_vernat:javamelody:1.18:*:*:*:*:*:*:*", "cpe:2.3:a:emeric_vernat:javamelody:1.19:*:*:*:*:*:*:*", "cpe:2.3:a:emeric_vernat:javamelody:1.20:*:*:*:*:*:*:*", "cpe:2.3:a:emeric_vernat:javamelody:1.21:*:*:*:*:*:*:*", "cpe:2.3:a:emeric_vernat:javamelody:1.22:*:*:*:*:*:*:*", "cpe:2.3:a:emeric_vernat:javamelody:1.23:*:*:*:*:*:*:*", "cpe:2.3:a:emeric_vernat:javamelody:1.24:*:*:*:*:*:*:*", "cpe:2.3:a:emeric_vernat:javamelody:1.25:*:*:*:*:*:*:*", "cpe:2.3:a:emeric_vernat:javamelody:1.26:*:*:*:*:*:*:*", "cpe:2.3:a:emeric_vernat:javamelody:1.27:*:*:*:*:*:*:*", "cpe:2.3:a:emeric_vernat:javamelody:1.28:*:*:*:*:*:*:*", "cpe:2.3:a:emeric_vernat:javamelody:1.29:*:*:*:*:*:*:*", "cpe:2.3:a:emeric_vernat:javamelody:1.30:*:*:*:*:*:*:*", "cpe:2.3:a:emeric_vernat:javamelody:1.31:*:*:*:*:*:*:*", "cpe:2.3:a:emeric_vernat:javamelody:1.32:*:*:*:*:*:*:*", "cpe:2.3:a:emeric_vernat:javamelody:1.32.1:*:*:*:*:*:*:*", "cpe:2.3:a:emeric_vernat:javamelody:1.33:*:*:*:*:*:*:*", "cpe:2.3:a:emeric_vernat:javamelody:1.34:*:*:*:*:*:*:*", "cpe:2.3:a:emeric_vernat:javamelody:1.35:*:*:*:*:*:*:*", "cpe:2.3:a:emeric_vernat:javamelody:1.36:*:*:*:*:*:*:*", "cpe:2.3:a:emeric_vernat:javamelody:1.37:*:*:*:*:*:*:*", "cpe:2.3:a:emeric_vernat:javamelody:1.38:*:*:*:*:*:*:*", "cpe:2.3:a:emeric_vernat:javamelody:1.39:*:*:*:*:*:*:*", "cpe:2.3:a:emeric_vernat:javamelody:1.40:*:*:*:*:*:*:*", "cpe:2.3:a:emeric_vernat:javamelody:1.41:*:*:*:*:*:*:*", "cpe:2.3:a:emeric_vernat:javamelody:1.42:*:*:*:*:*:*:*", "cpe:2.3:a:emeric_vernat:javamelody:1.43:*:*:*:*:*:*:*", "cpe:2.3:a:emeric_vernat:javamelody:1.44:*:*:*:*:*:*:*", "cpe:2.3:a:emeric_vernat:javamelody:1.45:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
CVE-2014-1888
Cross-site scripting (XSS) vulnerability in the BuddyPress plugin before 1.9.2 for WordPress allows remote authenticated users to inject arbitrary web script or HTML via the name field to groups/create/step/group-details. NOTE: this can be exploited without authentication by leveraging CVE-2014-1889.
[ "cpe:2.3:a:buddypress:buddypress:*:*:*:*:*:*:*:*", "cpe:2.3:a:buddypress:buddypress:1.5:*:*:*:*:*:*:*", "cpe:2.3:a:buddypress:buddypress:1.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:buddypress:buddypress:1.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:buddypress:buddypress:1.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:buddypress:buddypress:1.5.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:buddypress:buddypress:1.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:buddypress:buddypress:1.5.5:*:*:*:*:*:*:*", "cpe:2.3:a:buddypress:buddypress:1.5.6:*:*:*:*:*:*:*", "cpe:2.3:a:buddypress:buddypress:1.5.7:*:*:*:*:*:*:*", "cpe:2.3:a:buddypress:buddypress:1.6:*:*:*:*:*:*:*", "cpe:2.3:a:buddypress:buddypress:1.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:buddypress:buddypress:1.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:buddypress:buddypress:1.6.3:*:*:*:*:*:*:*", "cpe:2.3:a:buddypress:buddypress:1.6.4:*:*:*:*:*:*:*", "cpe:2.3:a:buddypress:buddypress:1.6.5:*:*:*:*:*:*:*", "cpe:2.3:a:buddypress:buddypress:1.7:*:*:*:*:*:*:*", "cpe:2.3:a:buddypress:buddypress:1.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:buddypress:buddypress:1.7.2:*:*:*:*:*:*:*", "cpe:2.3:a:buddypress:buddypress:1.7.3:*:*:*:*:*:*:*", "cpe:2.3:a:buddypress:buddypress:1.8:*:*:*:*:*:*:*", "cpe:2.3:a:buddypress:buddypress:1.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:-:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
CVE-2021-3469
Foreman versions before 2.3.4 and before 2.4.0 is affected by an improper authorization handling flaw. An authenticated attacker can impersonate the foreman-proxy if product enable the Puppet Certificate authority (CA) to sign certificate requests that have subject alternative names (SANs). Foreman do not enable SANs by default and `allow-authorization-extensions` is set to `false` unless user change `/etc/puppetlabs/puppetserver/conf.d/ca.conf` configuration explicitly.
[ "cpe:2.3:a:theforeman:foreman:*:*:*:*:*:*:*:*" ]
null
5.4
null
3.5
null
CVE-2018-16556
A vulnerability has been identified in SIMATIC S7-400 CPU 412-1 DP V7 (All versions), SIMATIC S7-400 CPU 412-2 DP V7 (All versions), SIMATIC S7-400 CPU 414-2 DP V7 (All versions), SIMATIC S7-400 CPU 414-3 DP V7 (All versions), SIMATIC S7-400 CPU 414-3 PN/DP V7 (All versions < V7.0.3), SIMATIC S7-400 CPU 414F-3 PN/DP V7 (All versions < V7.0.3), SIMATIC S7-400 CPU 416-2 DP V7 (All versions), SIMATIC S7-400 CPU 416-3 DP V7 (All versions), SIMATIC S7-400 CPU 416-3 PN/DP V7 (All versions < V7.0.3), SIMATIC S7-400 CPU 416F-2 DP V7 (All versions), SIMATIC S7-400 CPU 416F-3 PN/DP V7 (All versions < V7.0.3), SIMATIC S7-400 CPU 417-4 DP V7 (All versions), SIMATIC S7-400 CPU 412-2 PN V7 (All versions < V7.0.3), SIMATIC S7-400 H V4.5 and below CPU family (incl. SIPLUS variants) (All versions), SIMATIC S7-400 H V6 CPU family (incl. SIPLUS variants) (All versions < V6.0.9), SIMATIC S7-400 PN/DP V6 and below CPU family (incl. SIPLUS variants) (All versions), SIMATIC S7-410 CPU family (incl. SIPLUS variants) (All versions < V8.2.1), SIPLUS S7-400 CPU 414-3 PN/DP V7 (All versions < V7.0.3), SIPLUS S7-400 CPU 416-3 PN/DP V7 (All versions < V7.0.3), SIPLUS S7-400 CPU 416-3 V7 (All versions), SIPLUS S7-400 CPU 417-4 V7 (All versions). Specially crafted packets sent to port 102/tcp via Ethernet interface, via PROFIBUS, or via Multi Point Interfaces (MPI) could cause the affected devices to go into defect mode. Manual reboot is required to resume normal operation. Successful exploitation requires an attacker to be able to send specially crafted packets to port 102/tcp via Ethernet interface, via PROFIBUS or Multi Point Interfaces (MPI). No user interaction and no user privileges are required to exploit the security vulnerability. The vulnerability could allow causing a denial of service condition of the core functionality of the CPU, compromising the availability of the system.
[ "cpe:2.3:o:siemens:simatic_s7-400_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_s7-400:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_s7-400_pn\\/dp_v7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_s7-400_pn\\/dp_v7:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_s7-400h_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_s7-400h:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_s7-410_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_s7-410:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_s7-400h_v6_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_s7-400h_v6:-:*:*:*:*:*:*:*" ]
null
7.5
null
null
null
CVE-2022-47717
Last Yard 22.09.8-1 is vulnerable to Cross-origin resource sharing (CORS).
[ "cpe:2.3:a:lastyard:last_yard:22.09.8-1:*:*:*:*:*:*:*" ]
null
7.5
null
null
null
CVE-2017-16521
In Inedo BuildMaster before 5.8.2, XslTransform was used where XslCompiledTransform should have been used.
[ "cpe:2.3:a:inedo:buildmaster:*:*:*:*:*:*:*:*" ]
null
null
9.8
7.5
null
GHSA-x2jq-8m8h-c762
WebKit, as used in Apple iTunes before 10.5, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-10-11-1.
[]
null
null
null
null
null
CVE-2016-3800
The MediaTek video driver in Android before 2016-07-05 on Android One devices allows attackers to gain privileges via a crafted application, aka Android internal bug 28175027 and MediaTek internal bug ALPS02693739.
[ "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*" ]
null
null
7.8
9.3
null
CVE-2024-8522
LearnPress – WordPress LMS Plugin <= 4.2.7 - Unauthenticated SQL Injection via 'c_only_fields'
The LearnPress – WordPress LMS Plugin plugin for WordPress is vulnerable to SQL Injection via the 'c_only_fields' parameter of the /wp-json/learnpress/v1/courses REST API endpoint in all versions up to, and including, 4.2.7 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
[ "cpe:2.3:a:thimpress:learnpress:*:*:*:*:*:wordpress:*:*" ]
null
10
null
null
null
GHSA-xw7v-pcmp-g44q
Cross-site scripting (XSS) vulnerability in Open Ticket Request System (OTRS) 3.1.x before 3.1.21, 3.2.x before 3.2.16, and 3.3.x before 3.3.6 allows remote authenticated users to inject arbitrary web script or HTML via vectors related to dynamic fields.
[]
null
null
null
null
null
GHSA-9hh8-9m39-758p
Trend Micro Security 2020 (Consumer) contains a vulnerability in the installer package that could be exploited by placing a malicious DLL in a non-protected location with high privileges (symlink attack) which can lead to obtaining administrative privileges during the installation of the product.
[]
null
7.8
null
null
null
CVE-2016-4231
Use-after-free vulnerability in Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4173, CVE-2016-4174, CVE-2016-4222, CVE-2016-4226, CVE-2016-4227, CVE-2016-4228, CVE-2016-4229, CVE-2016-4230, and CVE-2016-4248.
[ "cpe:2.3:a:adobe:flash_player_desktop_runtime:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:*:*:*:*:esr:*:*:*", "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:chrome:*:*", "cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:edge:*:*", "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:internet_explorer:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*" ]
null
8.8
null
9.3
null
CVE-2023-44405
D-Link DAP-1325 get_value_of_key Stack-based Buffer Overflow Remote Code Execution Vulnerability
D-Link DAP-1325 get_value_of_key Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DAP-1325 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of XML data provided to the HNAP1 SOAP endpoint. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-18824.
[ "cpe:2.3:o:dlink:dap-1325_firmware:1.07b01:*:*:*:*:*:*:*" ]
null
null
8.8
null
null
CVE-2024-34416
WordPress Pk Favicon Manager plugin <= 2.1 - Arbitrary File Upload vulnerability
Unrestricted Upload of File with Dangerous Type vulnerability in Pk Favicon Manager.This issue affects Pk Favicon Manager: from n/a through 2.1.
[]
null
9.1
null
null
null
CVE-2009-4472
Multiple PHP remote file inclusion vulnerabilities in PHPope 1.0.0 and earlier allow remote attackers to execute arbitrary PHP code via a URL in the (1) GLOBALS[config][dir][plugins] parameter to plugins/address/admin/index.php, (2) GLOBALS[config][dir][functions] parameter to plugins/im/compose.php, and (3) GLOBALS[config][dir][classes] parameter to plugins/cssedit/admin/index.php.
[ "cpe:2.3:a:phpope:phpope:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
GHSA-pfr3-j9r8-5229
Go before 1.14.8 and 1.15.x before 1.15.1 allows XSS because text/html is the default for CGI/FCGI handlers that lack a Content-Type header.
[]
null
null
null
null
null
GHSA-qpjh-5v68-gc8g
In Joomla! 3.2.0 through 3.6.5 (fixed in 3.7.0), inadequate MIME type checks allowed low-privilege users to upload swf files even if they were explicitly forbidden.
[]
null
null
6.5
null
null
GHSA-9g3p-5mff-vc5c
Multiple SQL injection vulnerabilities in login.php in ScriptsFeed Business Directory Software allow remote attackers to execute arbitrary SQL commands via the (1) us and (2) ps parameters.
[]
null
null
null
null
null
CVE-2023-2599
The Active Directory Integration plugin for WordPress is vulnerable to Cross-Site Request Forgery leading to time-based SQL Injection via the orderby and order parameters in versions up to, and including, 4.1.4 due to missing nonce verification on the get_users function and insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to cause resource exhaustion via a forged request granted they can trick an administrator into performing an action such as clicking on a link.
[ "cpe:2.3:a:miniorange:active_directory_integration_\\/_ldap_integration:*:*:*:*:*:wordpress:*:*" ]
null
3.1
null
null
null
CVE-2016-1642
Multiple unspecified vulnerabilities in Google Chrome before 49.0.2623.75 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" ]
null
null
9.8
10
null
CVE-2020-2651
Vulnerability in the Oracle CRM Technical Foundation product of Oracle E-Business Suite (component: Preferences). Supported versions that are affected are 12.1.3 and 12.2.3-12.2.9. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle CRM Technical Foundation. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle CRM Technical Foundation, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle CRM Technical Foundation accessible data as well as unauthorized update, insert or delete access to some of Oracle CRM Technical Foundation accessible data. CVSS 3.0 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N).
[ "cpe:2.3:a:oracle:customer_relationship_management_technical_foundation:*:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:customer_relationship_management_technical_foundation:12.1.3:*:*:*:*:*:*:*" ]
null
null
8.2
null
null
GHSA-fc3r-8rf7-j47f
UserProfile.cs in Ultraapps Issue Manager before 2.1 allows remote authenticated users to gain administrator privileges by modifying the original (1) p_User_user_id and (2) User_user_id parameters to UserProfile.aspx, then modifying the password field.
[]
null
null
null
null
null
GHSA-m22w-qpwr-jxrj
QEMU, when built with the Pseudo Random Number Generator (PRNG) back-end support, allows local guest OS users to cause a denial of service (process crash) via an entropy request, which triggers arbitrary stack based allocation and memory corruption.
[]
null
6.5
null
null
null
GHSA-3857-6763-x46q
Working Resources Inc. BadBlue Enterprise Edition 1.7 through 1.74 attempts to restrict administrator actions to the IP address of the local host, but does not provide additional authentication, which allows remote attackers to execute arbitrary code via a web page containing an HTTP POST request that accesses the dir.hts page on the localhost and adds an entire hard drive to be shared.
[]
null
null
null
null
null
GHSA-85h7-g6vm-p392
In the Linux kernel, the following vulnerability has been resolved:ACPI: fix NULL pointer dereferenceCommit 71f642833284 ("ACPI: utils: Fix reference counting in for_each_acpi_dev_match()") started doing "acpi_dev_put()" on a pointer that was possibly NULL. That fails miserably, because that helper inline function is not set up to handle that case.Just make acpi_dev_put() silently accept a NULL pointer, rather than calling down to put_device() with an invalid offset off that NULL pointer.
[]
null
5.5
null
null
null
CVE-2014-7565
The Rando Noeux (aka com.gmteditions.NoeuxLesMinesDistrib) application 1.0.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[ "cpe:2.3:a:gmt-editions:rando_noeux:1.0.0:*:*:*:*:android:*:*" ]
null
null
null
5.4
null
GHSA-j3w7-32p3-pr7w
Unspecified vulnerability in HP LoadRunner before 11.52 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1705.
[]
null
null
null
null
null
GHSA-wg7g-4jwx-j6rf
The Passster – Password Protect Pages and Content plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 4.2.10 via the WordPress core search feature. This makes it possible for unauthenticated attackers to extract sensitive data from posts that have been restricted to higher-level roles such as administrator.
[]
null
5.3
null
null
null
GHSA-9p43-hj5j-96h5
esphome vulnerable to stored Cross-site Scripting in edit configuration file API
SummaryEdit configuration file API in dashboard component of ESPHome version 2023.12.9 (command line installation and Home Assistant add-on) serves unsanitized data with “Content-Type: text/html; charset=UTF-8”, allowing remote authenticated user to inject arbitrary web script and exfiltrate session cookies via Cross-Site scripting (XSS).CreditsSpike Reply Cybersecurity TeamsDetailsIt is possible for a malicious authenticated user to inject arbitrary Javascript in configuration files using a POST request to the /edit endpoint, the configuration parameter allows to specify the file to write.To trigger the XSS vulnerability, the victim must visit the page /edit?configuration=[xss file].PoCTo reproduce the issue, it is possible to perform a POST request to inject the payload:request: POST /edit?configuration=xss.yaml HTTP/1.1 Host: localhost:6052 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/116.0 Accept: */* Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate, br Referer: http://localhost:6052/ Connection: close Cookie: authenticated=[replace with valid cookie] Sec-Fetch-Dest: empty Sec-Fetch-Mode: cors Sec-Fetch-Site: same-origin Content-Length: 40response: HTTP/1.1 200 OK Server: TornadoServer/6.3.3 Content-Type: text/html; charset=UTF-8 Date: Thu, 30 Nov 2023 11:02:27 GMT Content-Length: 0 Connection: closeAnd subsequently trigger the XSS with a GET request to the same endpoint:request: GET /edit?configuration=xss.yaml HTTP/1.1 Host: localhost:6052 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/116.0 Accept: */* Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate, br Referer: http://localhost:6052/ Connection: close Cookie: authenticated=2|1:0|10:1701341719|13:authenticated|4:eWVz|0907127d7274094cc5a2490b95becf5c11fd52b8c3ee3655d65fe9fda099108c Sec-Fetch-Dest: empty Sec-Fetch-Mode: cors Sec-Fetch-Site: same-origin Content-Length: 0response: HTTP/1.1 200 OK Server: TornadoServer/6.3.3 Content-Type: text/html; charset=UTF-8 Date: Thu, 30 Nov 2023 11:04:12 GMT Etag: "ec6c9889f5c9a6c8e9d2d5e4ce1b1a85e6e7da2b" Content-Length: 40 Connection: closeImpactAbusing this vulnerability a malicious actor could perform operations on the dashboard on the behalf of a logged user, access sensitive information, create, edit and delete configuration files and flash firmware on managed boards. In addition to this, cookies are not correctly secured, allowing the exfiltration of session cookie values.CreditsSpike Reply Cybersecurity Team
[]
null
6.5
null
null
null
CVE-2022-38414
Adobe InDesign SVG File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability
Adobe InDesign versions 16.4.2 (and earlier) and 17.3 (and earlier) are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[ "cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
7.8
null
null
null
GHSA-vqvh-pcwc-5q74
Unspecified vulnerability in HP Performance Manager 9.00 allows remote attackers to execute arbitrary code via unknown vectors.
[]
null
null
null
null
null
GHSA-6wcp-m3mg-2q3f
An issue was discovered in BINOM3 Universal Multifunctional Electric Power Quality Meter. An INFORMATION EXPOSURE flaw can be used to gain privileged access to the device.
[]
null
null
9.8
null
null
GHSA-vhxc-xrx4-c2rp
SmarterTools SmarterMail 16.x before build 6985 has hardcoded secret keys. An unauthenticated attacker could access other users? emails and file attachments. It was also possible to interact with mailing lists.
[]
null
null
null
null
null
GHSA-93xv-c79w-9v73
Heap-based buffer overflow in httpAdapter.c in httpAdapter in SBLIM SFCB before 1.3.8 might allow remote attackers to execute arbitrary code via a Content-Length HTTP header that specifies a value too small for the amount of POST data, aka bug #3001896.
[]
null
null
null
null
null
CVE-2016-10431
In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Automobile, Snapdragon Mobile, and Snapdragon Wear MDM9206, MDM9650, SD 210/SD 212/SD 205, SD 425, SD 430, SD 450, SD 625, SD 650/52, SD 820, SD 820A, SD 835, SD 845, and SD 850, TZ applications are not properly validated.
[ "cpe:2.3:o:qualcomm:mdm9206_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9206:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9650:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_210_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_210:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_212_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_212:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_205_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_205:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_425_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_425:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_430_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_430:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_450_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_450:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_650_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_650:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_652_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_652:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_625_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_625:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_820_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_820:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_835_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_835:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_845_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_845:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_820a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_820a:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_850_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_850:-:*:*:*:*:*:*:*" ]
null
null
9.8
10
null
GHSA-v564-r5jq-5c36
Buffer overflow in the ppp_hdlc function in print-ppp.c in tcpdump 4.6.2 and earlier allows remote attackers to cause a denial of service (crash) cia a crafted PPP packet.
[]
null
null
null
null
null
CVE-2023-44221
Improper neutralization of special elements in the SMA100 SSL-VPN management interface allows a remote authenticated attacker with administrative privilege to inject arbitrary commands as a 'nobody' user, potentially leading to OS Command Injection Vulnerability.
[ "cpe:2.3:o:sonicwall:sma_200_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:sma_200:-:*:*:*:*:*:*:*", "cpe:2.3:o:sonicwall:sma_210_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:sma_210:-:*:*:*:*:*:*:*", "cpe:2.3:o:sonicwall:sma_400_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:sma_400:-:*:*:*:*:*:*:*", "cpe:2.3:o:sonicwall:sma_410_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:sma_410:-:*:*:*:*:*:*:*", "cpe:2.3:o:sonicwall:sma_500v_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:sma_500v:-:*:*:*:*:*:*:*" ]
null
7.2
null
null
null
CVE-2019-16226
An issue was discovered in py-lmdb 0.97. mdb_node_del does not validate a memmove in the case of an unexpected node->mn_hi, leading to an invalid write operation. NOTE: this outcome occurs when accessing a data.mdb file supplied by an attacker.
[ "cpe:2.3:a:py-lmdb_project:py-lmdb:*:*:*:*:*:*:*:*" ]
null
7.5
null
5
null
CVE-2007-1342
Cross-site scripting (XSS) vulnerability in admincp/index.php in Jelsoft vBulletin 3.6.5 and earlier allows remote attackers to inject arbitrary web script or HTML via the add rss url form.
[ "cpe:2.3:a:jelsoft:vbulletin:*:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
CVE-2014-1427
MAAS API vulnerable to CSRF attack
A vulnerability in the REST API of Ubuntu MAAS allows an attacker to cause a logged-in user to execute commands via cross-site scripting. This issue affects MAAS versions prior to 1.9.2.
[ "cpe:2.3:a:canonical:metal_as_a_service:*:*:*:*:*:*:*:*" ]
null
null
9.6
null
null
GHSA-m953-88vc-vwxj
Directory traversal vulnerability in FileDownload.jsp in ManageEngine ServiceDesk Plus 8.0 before Build 8012 allows remote attackers to read arbitrary files via unspecified vectors.
[]
null
null
null
null
null
CVE-2008-3335
Unspecified vulnerability in PunBB before 1.2.19 allows remote attackers to inject arbitrary SMTP commands via unknown vectors.
[ "cpe:2.3:a:punbb:punbb:*:*:*:*:*:*:*:*", "cpe:2.3:a:punbb:punbb:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:punbb:punbb:1.0:alpha:*:*:*:*:*:*", "cpe:2.3:a:punbb:punbb:1.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:punbb:punbb:1.0:beta1a:*:*:*:*:*:*", "cpe:2.3:a:punbb:punbb:1.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:punbb:punbb:1.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:punbb:punbb:1.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:punbb:punbb:1.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:punbb:punbb:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:punbb:punbb:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:punbb:punbb:1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:punbb:punbb:1.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:punbb:punbb:1.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:punbb:punbb:1.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:punbb:punbb:1.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:punbb:punbb:1.2:*:*:*:*:*:*:*", "cpe:2.3:a:punbb:punbb:1.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:punbb:punbb:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:punbb:punbb:1.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:punbb:punbb:1.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:punbb:punbb:1.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:punbb:punbb:1.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:punbb:punbb:1.2.7:*:*:*:*:*:*:*", "cpe:2.3:a:punbb:punbb:1.2.8:*:*:*:*:*:*:*", "cpe:2.3:a:punbb:punbb:1.2.9:*:*:*:*:*:*:*", "cpe:2.3:a:punbb:punbb:1.2.10:*:*:*:*:*:*:*", "cpe:2.3:a:punbb:punbb:1.2.11:*:*:*:*:*:*:*", "cpe:2.3:a:punbb:punbb:1.2.12:*:*:*:*:*:*:*", "cpe:2.3:a:punbb:punbb:1.2.13:*:*:*:*:*:*:*", "cpe:2.3:a:punbb:punbb:1.2.14:*:*:*:*:*:*:*", "cpe:2.3:a:punbb:punbb:1.2.15:*:*:*:*:*:*:*", "cpe:2.3:a:punbb:punbb:1.2.16:*:*:*:*:*:*:*", "cpe:2.3:a:punbb:punbb:1.2.17:*:*:*:*:*:*:*" ]
null
null
null
10
null
CVE-2007-1896
Directory traversal vulnerability in chat.php in Sky GUNNING MySpeach 3.0.7 and earlier allows remote attackers to include arbitrary local files via a .. (dot dot) and trailing %00 (NULL) in a my_ms[root] cookie.
[ "cpe:2.3:a:sky_gunning:myspeach:2.1_beta:*:*:*:*:*:*:*", "cpe:2.3:a:sky_gunning:myspeach:3.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:sky_gunning:myspeach:3.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:sky_gunning:myspeach:3.0.7:*:*:*:*:*:*:*" ]
null
null
null
5.8
null
CVE-2023-30768
Improper access control in the Intel(R) Server Board S2600WTT belonging to the Intel(R) Server Board S2600WT Family with the BIOS version 0016 may allow a privileged user to potentially enable escalation of privilege via local access.
[ "cpe:2.3:o:intel:server_board_s1200v3rpl_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s1200v3rpl:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:server_board_s1200v3rpm_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s1200v3rpm:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:server_board_s1200v3rpo_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s1200v3rpo:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:server_board_s1200v3rps_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s1200v3rps:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:server_board_s1400fp2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s1400fp2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:server_board_s1400fp4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s1400fp4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:server_board_s1400sp4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s1400sp4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:server_board_s1400sp2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s1400sp2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:server_board_s1600jp2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s1600jp2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:server_board_s1600jp4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s1600jp4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:server_board_s2400bb4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s2400bb4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:server_board_s2400ep2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s2400ep2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:server_board_s2400ep4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s2400ep4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:server_board_s2400sc2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s2400sc2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:server_board_s2600co4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s2600co4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:server_board_s2600coe_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s2600coe:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:server_board_s2600coeioc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s2600coeioc:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:server_board_s2600cp2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s2600cp2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:server_board_s2600cp2ioc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s2600cp2ioc:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:server_board_s2600cp2j_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s2600cp2j:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:server_board_s2600cp4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s2600cp4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:server_board_s2600cp4ioc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s2600cp4ioc:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:server_board_s2600gl_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s2600gl:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:server_board_s2600gz_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s2600gz:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:server_board_s2600ip4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s2600ip4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:server_board_s2600ip4l_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s2600ip4l:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:workstation_board_w2600cr2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:workstation_board_w2600cr2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:workstation_board_w2600cr2l_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:workstation_board_w2600cr2l:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:server_board_s2600jf_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s2600jf:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:server_board_s2600wp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s2600wp:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:server_board_s4600lh2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s4600lh2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:server_board_s4600lt2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s4600lt2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:server_board_s2600wpf_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s2600wpf:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:server_board_s2600wpq_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s2600wpq:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:server_board_s2600jff_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s2600jff:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:server_board_s2600jfq_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s2600jfq:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:server_board_s2600cw2r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s2600cw2r:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:server_board_s2600cw2sr_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s2600cw2sr:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:server_board_s2600cwtr_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s2600cwtr:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:server_board_s2600cwtsr_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s2600cwtsr:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:server_board_s2600cw2s_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s2600cw2s:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:server_board_s2600cwt_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s2600cwt:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:server_board_s2600cwts_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s2600cwts:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:server_board_s2600cw2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s2600cw2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:server_board_s2600kpfr_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s2600kpfr:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:server_board_s2600kpr_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s2600kpr:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:server_board_s2600kptr_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s2600kptr:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:server_board_s2600kp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s2600kp:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:server_board_s2600kpf_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s2600kpf:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:server_board_s2600tpnr_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s2600tpnr:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:server_board_s2600tpfr_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s2600tpfr:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:server_board_s2600tpr_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s2600tpr:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:server_board_s2600tpf_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s2600tpf:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:server_board_s2600tp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s2600tp:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:server_board_s2600wtts1r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s2600wtts1r:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:server_board_s2600wt2r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s2600wt2r:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:server_board_s2600wttr_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s2600wttr:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:server_board_s2600wt2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s2600wt2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:server_board_s2600wtt_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s2600wtt:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:server_board_s1200btlrm_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s1200btlrm:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:server_board_s1200btlr_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s1200btlr:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:server_board_s1200btsr_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s1200btsr:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:server_board_s1200btl_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s1200btl:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:server_board_s1200bts_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_board_s1200bts:-:*:*:*:*:*:*:*" ]
null
7.1
null
null
null
CVE-2014-0068
It was reported that watchman in openshift node-utils creates /var/run/watchman.pid and /var/log/watchman.ouput with world writable permission.
[ "cpe:2.3:a:redhat:openshift-origin-node-util:-:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:openshift:*:*:*:*:enterprise:*:*:*" ]
null
5.5
null
2.1
null
GHSA-2c8c-84w2-j38j
Improper Restriction of XML External Entity Reference in Plone
Plone before 5.2.3 allows XXE attacks via a feature that is protected by an unapplied permission of plone.schemaeditor.ManageSchemata (therefore, only available to the Manager role).
[]
8.7
8.8
null
null
null