id
string
title
string
description
string
cpes
list
cvss_v4_0
float64
cvss_v3_1
float64
cvss_v3_0
float64
cvss_v2_0
float64
patch_commit_url
string
GHSA-3g36-gf7c-75qw
Mattermost Playbooks fails to properly validate the props used by the RetrospectivePost custom post type
Mattermost versions 10.4.x <= 10.4.2, 10.5.x <= 10.5.0, 9.11.x <= 9.11.10 fail to properly validate the props used by the RetrospectivePost custom post type in the Playbooks plugin, which allows an attacker to create a specially crafted post with maliciously crafted props and cause a denial of service (DoS) of the web app for all users.
[]
null
6.5
null
null
null
CVE-2023-29290
Adobe Commerce Guest Cart Shipping Address Overwrite IDOR
Adobe Commerce versions 2.4.6 (and earlier), 2.4.5-p2 (and earlier) and 2.4.4-p3 (and earlier) are affected by an Incorrect Authorization vulnerability that could result in a security feature bypass. An attacker could leverage this vulnerability to bypass a minor functionality. Exploitation of this issue does not require user interaction.
[ "cpe:2.3:a:adobe:commerce:2.3.7:-:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.3.7:p1:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.3.7:p2:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.3.7:p3:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.3.7:p4:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.3.7:p4-ext1:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.3.7:p4-ext2:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.0:-:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.0:ext-1:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.0:ext-2:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.1:-:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.1:ext-1:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.1:ext-2:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.2:-:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.2:ext-1:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.2:ext-2:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.3:-:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.3:ext-1:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.3:ext-2:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.4:-:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.4:p1:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.4:p2:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.4:p3:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.5:-:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.5:p1:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.5:p2:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.6:-:*:*:*:*:*:*", "cpe:2.3:a:adobe:magento:2.4.4:-:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.4:p1:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.4:p2:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.4:p3:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.5:-:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.5:p1:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.5:p2:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.6:-:*:*:open_source:*:*:*" ]
null
5.3
null
null
null
GHSA-4xcq-53qf-r7r5
Rukovoditel Project Management app 2.6 is affected by: Cross Site Scripting (XSS). An attacker can add JavaScript code to the filename.
[]
null
null
null
null
null
GHSA-f5gx-hrrr-h7q3
WordPress 3.1 before 3.1.3 and 3.2 before Beta 2 treats unattached attachments as published, which might allow remote attackers to obtain sensitive data via vectors related to wp-includes/post.php.
[]
null
null
null
null
null
GHSA-6c68-97qr-gp9g
Adobe Experience Manager versions 6.5.20 and earlier are affected by a DOM-based Cross-Site Scripting (XSS) vulnerability that could be exploited by an attacker to execute arbitrary code in the context of the victim's browser session. By manipulating a DOM element through a crafted URL or user input, the attacker can inject malicious scripts that run when the page is rendered. This type of attack requires user interaction, as the victim would need to access a manipulated URL or provide specific input to trigger the vulnerability.
[]
null
5.4
null
null
null
CVE-2014-10031
Buffer overflow in the IMAPd service in Qualcomm Eudora WorldMail 9.0.333.0 allows remote attackers to execute arbitrary code via a long string in a UID command.
[ "cpe:2.3:a:qualcomm:eudora_worldmail:9.0.333.0:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
RHSA-2023:7323
Red Hat Security Advisory: OpenShift Container Platform 4.13.23 bug fix and security update
rekor: compressed archives can result in OOM conditions golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)
[ "cpe:/a:redhat:openshift:4.13::el8", "cpe:/a:redhat:openshift:4.13::el9" ]
null
7.5
null
null
null
GHSA-8vf6-c57g-m574
Sendmail before 8.6.7 allows local users to gain root access via a large value in the debug (-d) command line option.
[]
null
null
null
null
null
RHSA-2024:9281
Red Hat Security Advisory: python-jwcrypto security update
JWCrypto: denail of service Via specifically crafted JWE
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
5.3
null
null
null
GHSA-485m-923f-95wx
VMware ESXi contains an authentication bypass vulnerability. A malicious actor with sufficient Active Directory (AD) permissions can gain full access to an ESXi host that was previously configured to use AD for user management https://blogs.vmware.com/vsphere/2012/09/joining-vsphere-hosts-to-active-directory.html by re-creating the configured AD group ('ESXi Admins' by default) after it was deleted from AD.
[]
null
6.8
null
null
null
GHSA-mxjm-2qgc-vv69
The LearnDash LMS plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 4.10.1 via API. This makes it possible for unauthenticated attackers to obtain access to quizzes.
[]
null
5.3
null
null
null
CVE-2022-21447
Vulnerability in the PeopleSoft Enterprise CS Academic Advisement product of Oracle PeopleSoft (component: Advising Notes). The supported version that is affected is 9.2. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise CS Academic Advisement. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all PeopleSoft Enterprise CS Academic Advisement accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).
[ "cpe:2.3:a:oracle:peoplesoft_enterprise_cs_academic_advisement:9.2:*:*:*:*:*:*:*" ]
null
6.5
null
null
null
CVE-2022-21808
Path traversal vulnerability exists in CAMS for HIS Server contained in the following Yokogawa Electric products: CENTUM CS 3000 versions from R3.08.10 to R3.09.00, CENTUM VP versions from R4.01.00 to R4.03.00, from R5.01.00 to R5.04.20, and from R6.01.00 to R6.08.00, Exaopc versions from R3.72.00 to R3.79.00.
[ "cpe:2.3:o:yokogawa:centum_cs_3000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:yokogawa:centum_cs_3000:-:*:*:*:*:*:*:*", "cpe:2.3:o:yokogawa:centum_cs_3000_entry_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:yokogawa:centum_cs_3000_entry:-:*:*:*:*:*:*:*", "cpe:2.3:o:yokogawa:centum_vp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:yokogawa:centum_vp:-:*:*:*:*:*:*:*", "cpe:2.3:o:yokogawa:centum_vp_entry_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:yokogawa:centum_vp_entry:-:*:*:*:*:*:*:*", "cpe:2.3:a:yokogawa:exaopc:*:*:*:*:*:*:*:*" ]
null
8.8
null
6
null
GHSA-mfrv-jgvv-x4mc
OX App Suite before 7.10.6-rev30 allows XSS via an upsell trigger.
[]
null
6.1
null
null
null
CVE-2020-25053
An issue was discovered on Samsung mobile devices with Q(10.0) (exynos9830 chipsets) software. RKP allows arbitrary code execution. The Samsung ID is SVE-2020-17435 (August 2020).
[ "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*", "cpe:2.3:h:samsung:exynos_9830:-:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
null
GHSA-99v2-69vc-4ph6
NETGEAR R7800 devices before 1.0.2.60 are affected by command injection by an authenticated user.
[]
null
null
null
null
null
GHSA-qw68-4398-p6jw
The Pixidou Image Editor in Exponent CMS prior to v2.3.9 patch 2 could be used to perform an fid SQL Injection.
[]
null
null
9.8
null
null
CVE-2016-1081
Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-1037, CVE-2016-1063, CVE-2016-1064, CVE-2016-1071, CVE-2016-1072, CVE-2016-1073, CVE-2016-1074, CVE-2016-1076, CVE-2016-1077, CVE-2016-1078, CVE-2016-1080, CVE-2016-1082, CVE-2016-1083, CVE-2016-1084, CVE-2016-1085, CVE-2016-1086, CVE-2016-1088, CVE-2016-1093, CVE-2016-1095, CVE-2016-1116, CVE-2016-1118, CVE-2016-1119, CVE-2016-1120, CVE-2016-1123, CVE-2016-1124, CVE-2016-1125, CVE-2016-1126, CVE-2016-1127, CVE-2016-1128, CVE-2016-1129, CVE-2016-1130, CVE-2016-4088, CVE-2016-4089, CVE-2016-4090, CVE-2016-4093, CVE-2016-4094, CVE-2016-4096, CVE-2016-4097, CVE-2016-4098, CVE-2016-4099, CVE-2016-4100, CVE-2016-4101, CVE-2016-4103, CVE-2016-4104, and CVE-2016-4105.
[ "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:reader:*:*:*:*:*:*:*:*" ]
null
null
9.8
10
null
CVE-2024-4375
Master Slider – Responsive Touch Slider <= 3.9.10 - Authenticated (Contributor+) Stored Cross-Site Scripting via ms_layer Shortcode
The Master Slider – Responsive Touch Slider plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'ms_layer' shortcode in all versions up to, and including, 3.9.10 due to insufficient input sanitization and output escaping on the 'css_id' user supplied attribute. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[ "cpe:2.3:a:averta:master_slider:*:*:*:*:*:wordpress:*:*" ]
null
6.4
null
null
null
CVE-2022-36246
Shop Beat Services Vulnerable To Insecure Permissions
Shop Beat Solutions (Pty) LTD Shop Beat Media Player 2.5.95 up to 3.2.57 is vulnerable to Insecure Permissions.
[ "cpe:2.3:a:shopbeat:shop_beat_media_player:*:*:*:*:*:*:arm:*" ]
null
9.8
null
null
null
GHSA-wxcp-cj39-pgjw
An issue was discovered in Big Switch Big Monitoring Fabric 6.2 through 6.2.4, 6.3 through 6.3.9, 7.0 through 7.0.3, and 7.1 through 7.1.3; Big Cloud Fabric 4.5 through 4.5.5, 4.7 through 4.7.7, 5.0 through 5.0.1, and 5.1 through 5.1.4; and Multi-Cloud Director through 1.1.0. An unauthenticated attacker may inject stored arbitrary JavaScript (XSS), and execute it in the content of authenticated administrators.
[]
null
null
null
null
null
GHSA-p594-6vp8-jxxj
Multiple SQL injection vulnerabilities in the MySQL back-end in Advanced Website Creator (AWC) before 1.9.0 might allow remote attackers to execute arbitrary SQL commands via unspecified parameters, related to use of mysql_escape_string instead of mysql_real_escape_string.
[]
null
null
null
null
null
CVE-2024-10623
ForumEngine <= 1.8 - Reflected Cross-Site Scripting
The ForumEngine theme for WordPress is vulnerable to Reflected Cross-Site Scripting via a URL in all versions up to, and including, 1.8 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
[]
null
6.1
null
null
null
ICSA-24-095-01
Hitachi Energy Asset Suite 9
REST service authentication anomaly with "valid username/no password" credential combination for batch job processing may result in successful service invocation. The anomaly doesn't exist with other credential combinations.
[]
null
5.3
null
null
null
CVE-2012-0029
Heap-based buffer overflow in the process_tx_desc function in the e1000 emulation (hw/e1000.c) in qemu-kvm 0.12, and possibly other versions, allows guest OS users to cause a denial of service (QEMU crash) and possibly execute arbitrary code via crafted legacy mode packets.
[ "cpe:2.3:a:kvm_group:qemu-kvm:0.12:*:*:*:*:*:*:*" ]
null
null
null
7.4
null
RHSA-2020:5138
Red Hat Security Advisory: firefox security update
Mozilla: Write side effects in MCallGetProperty opcode not accounted for
[ "cpe:/a:redhat:rhel_e4s:8.0::appstream" ]
null
null
8.8
null
null
RHSA-2021:4057
Red Hat Security Advisory: python3 security update
python: urllib: Regular expression DoS in AbstractBasicAuthHandler
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
6.5
null
null
null
CVE-2016-6375
Cisco Wireless LAN Controller (WLC) devices before 8.0.140.0, 8.1.x and 8.2.x before 8.2.121.0, and 8.3.x before 8.3.102.0 allow remote attackers to cause a denial of service (device reload) by sending crafted Inter-Access Point Protocol (IAPP) packets and then sending a traffic stream metrics (TSM) information request over SNMP, aka Bug ID CSCuz40221.
[ "cpe:2.3:a:cisco:wireless_lan_controller_software:8.0.72.140:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wireless_lan_controller_software:3.0_base:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wireless_lan_controller_software:3.1.59.24:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wireless_lan_controller_software:3.1.105.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wireless_lan_controller_software:3.1.111.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wireless_lan_controller_software:3.2.78.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wireless_lan_controller_software:3.2.116.21:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wireless_lan_controller_software:3.2.150.6:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wireless_lan_controller_software:3.2.150.10:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wireless_lan_controller_software:3.2.171.5:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wireless_lan_controller_software:3.2.171.6:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wireless_lan_controller_software:3.2.185.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wireless_lan_controller_software:3.2.193.5:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wireless_lan_controller_software:3.2.195.10:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wireless_lan_controller_software:3.6.0e:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wireless_lan_controller_software:4.0.108:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wireless_lan_controller_software:4.0.155.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wireless_lan_controller_software:4.0.155.5:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wireless_lan_controller_software:4.0.179.8:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wireless_lan_controller_software:4.0.179.11:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wireless_lan_controller_software:4.0.196:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wireless_lan_controller_software:4.0.206.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wireless_lan_controller_software:4.0.217.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wireless_lan_controller_software:4.0.219.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wireless_lan_controller_software:4.1.171.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wireless_lan_controller_software:4.1.181.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wireless_lan_controller_software:4.1.185.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wireless_lan_controller_software:4.1_base:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.61.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.99.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.112.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.117.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.130.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.173.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.174.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.176.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.182.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2_base:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wireless_lan_controller_software:5.0.148.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wireless_lan_controller_software:5.0.148.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wireless_lan_controller_software:5.1.151.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wireless_lan_controller_software:5.1.152.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wireless_lan_controller_software:5.1.160.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wireless_lan_controller_software:5.2.157.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wireless_lan_controller_software:5.2.169.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wireless_lan_controller_software:6.0_base:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wireless_lan_controller_software:7.0_base:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wireless_lan_controller_software:7.1_base:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wireless_lan_controller_software:7.2_base:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wireless_lan_controller_software:7.3.101.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wireless_lan_controller_software:7.3.103.8:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wireless_lan_controller_software:7.3.112:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wireless_lan_controller_software:7.3_base:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wireless_lan_controller_software:7.4.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wireless_lan_controller_software:7.4.100:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wireless_lan_controller_software:7.4.100.60:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wireless_lan_controller_software:7.4.110.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wireless_lan_controller_software:7.4.121.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wireless_lan_controller_software:7.4_base:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wireless_lan_controller_software:7.5.102.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wireless_lan_controller_software:7.5.102.11:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wireless_lan_controller_software:7.5_base:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wireless_lan_controller_software:7.6.1.62:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wireless_lan_controller_software:7.6.100.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wireless_lan_controller_software:7.6.110.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wireless_lan_controller_software:7.6.120.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wireless_lan_controller_software:7.6.130.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wireless_lan_controller_software:8.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wireless_lan_controller_software:8.0.0.30220.385:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wireless_lan_controller_software:8.0.100:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wireless_lan_controller_software:8.0.115.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wireless_lan_controller_software:8.0.120.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wireless_lan_controller_software:8.0.121.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wireless_lan_controller_software:8.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wireless_lan_controller_software:8.1.104.37:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wireless_lan_controller_software:8.1.111.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wireless_lan_controller_software:8.1.122.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wireless_lan_controller_software:8.1.130.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wireless_lan_controller_software_6.0:182.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wireless_lan_controller_software_6.0:188.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wireless_lan_controller_software_6.0:196.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wireless_lan_controller_software_6.0:199.4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wireless_lan_controller_software_6.0:202.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wireless_lan_controller_software_7.0:98.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wireless_lan_controller_software_7.0:98.218:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wireless_lan_controller_software_7.0:116.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wireless_lan_controller_software_7.0:220.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wireless_lan_controller_software_7.0:240.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wireless_lan_controller_software_7.0:250.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wireless_lan_controller_software_7.0:252.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wireless_lan_controller_software_7.1:91.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wireless_lan_controller_software_7.2:103.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wireless_lan_controller_software_7.4:1.19:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wireless_lan_controller_software_7.4:1.54:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wireless_lan_controller_software_7.4:140.0:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:wireless_lan_controller:*:*:*:*:*:*:*:*" ]
null
null
5.3
5.7
null
CVE-2022-24023
A buffer overflow vulnerability exists in the GetValue functionality of TCL LinkHub Mesh Wi-Fi MS1G_00_01.00_14. A specially-crafted configuration value can lead to a buffer overflow. An attacker can modify a configuration value to trigger this vulnerability.This vulnerability represents all occurances of the buffer overflow vulnerability within the pppd binary.
[ "cpe:2.3:o:tcl:linkhub_mesh_wifi_ac1200:ms1g_00_01.00_14:*:*:*:*:*:*:*", "cpe:2.3:h:tcl:linkhub_mesh_wifi_ac1200:-:*:*:*:*:*:*:*" ]
null
null
9.6
null
null
GHSA-vc2q-4cj5-hv85
The TagLib::Ogg::FLAC::File::scan function in oggflacfile.cpp in TagLib 1.11.1 allows remote attackers to cause information disclosure (heap-based buffer over-read) via a crafted audio file.
[]
null
6.5
null
null
null
CVE-2019-1010258
nanosvg library nanosvg after commit c1f6e209c16b18b46aa9f45d7e619acf42c29726 is affected by: Buffer Overflow. The impact is: Memory corruption leading to at least DoS. More severe impact vectors need more investigation. The component is: it's part of a svg processing library. function nsvg__parseColorRGB in src/nanosvg.h / line 1227. The attack vector is: It depends library usage. If input is passed from the network, then network connectivity is enough. Most likely an attack will require opening a specially crafted .svg file.
[ "cpe:2.3:a:nanosvg_project:nanosvg:-:*:*:*:*:*:*:*" ]
null
null
6.5
4.3
null
PYSEC-2022-134
null
Tensorflow is an Open Source Machine Learning Framework. When decoding a tensor from protobuf, TensorFlow might do a null-dereference if attributes of some mutable arguments to some operations are missing from the proto. This is guarded by a `DCHECK`. However, `DCHECK` is a no-op in production builds and an assertion failure in debug builds. In the first case execution proceeds to the dereferencing of the null pointer, whereas in the second case it results in a crash due to the assertion failure. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, and TensorFlow 2.6.3, as these are also affected and still in supported range.
[]
null
null
null
null
null
GHSA-rxvq-gr74-jvpj
A reflected cross-site scripting (XSS) vulnerability in Proxmox Virtual Environment prior to v7.2-3 allows remote attackers to execute arbitrary web scripts or HTML via non-existent endpoints under path /api2/html/.
[]
null
9
null
null
null
GHSA-pv6g-wrhh-xffr
IBM QRadar SIEM 7.3 and 7.4 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 196017.
[]
null
null
null
null
null
CVE-2018-18373
In the Schiocco "Support Board - Chat And Help Desk" plugin 1.2.3 for WordPress, a Stored XSS vulnerability has been discovered in file upload areas in the Chat and Help Desk sections via the msg parameter in a /wp-admin/admin-ajax.php sb_ajax_add_message action.
[ "cpe:2.3:a:schiocco:support_board_-_chat_and_help_desk:1.2.3:*:*:*:*:wordpress:*:*" ]
null
null
5.4
3.5
null
CVE-2025-30324
Photoshop Desktop | Integer Underflow (Wrap or Wraparound) (CWE-191)
Photoshop Desktop versions 26.5, 25.12.2 and earlier are affected by an Integer Underflow (Wrap or Wraparound) vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[]
null
7.8
null
null
null
CVE-2024-20927
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. While the vulnerability is in Oracle WebLogic Server, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle WebLogic Server accessible data. CVSS 3.1 Base Score 8.6 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N).
[ "cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:weblogic_server:14.1.1.0.0:*:*:*:*:*:*:*" ]
null
8.6
null
null
null
CVE-2025-21570
Vulnerability in the Oracle Life Sciences Argus Safety product of Oracle Health Sciences Applications (component: Login). The supported version that is affected is 8.2.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Life Sciences Argus Safety. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Life Sciences Argus Safety, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Life Sciences Argus Safety accessible data as well as unauthorized read access to a subset of Oracle Life Sciences Argus Safety accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).
[ "cpe:2.3:a:oracle:life_sciences_argus_safety:8.2.3:*:*:*:*:*:*:*" ]
null
6.1
null
null
null
GHSA-6486-qv2g-xg8h
The state-machine implementation in OpenSSL 1.1.0 before 1.1.0a allocates memory before checking for an excessive length, which might allow remote attackers to cause a denial of service (memory consumption) via crafted TLS messages, related to statem/statem.c and statem/statem_lib.c.
[]
null
null
5.9
null
null
CVE-2019-12155
interface_release_resource in hw/display/qxl.c in QEMU 3.1.x through 4.0.0 has a NULL pointer dereference.
[ "cpe:2.3:a:qemu:qemu:4.0.0:*:*:*:*:*:*:*" ]
null
null
7.5
5
null
CVE-2024-46870
drm/amd/display: Disable DMCUB timeout for DCN35
In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Disable DMCUB timeout for DCN35 [Why] DMCUB can intermittently take longer than expected to process commands. Old ASIC policy was to continue while logging a diagnostic error - which works fine for ASIC without IPS, but with IPS this could lead to a race condition where we attempt to access DCN state while it's inaccessible, leading to a system hang when the NIU port is not disabled or register accesses that timeout and the display configuration in an undefined state. [How] We need to investigate why these accesses take longer than expected, but for now we should disable the timeout on DCN35 to avoid this race condition. Since the waits happen only at lower interrupt levels the risk of taking too long at higher IRQ and causing a system watchdog timeout are minimal.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
null
4.7
null
null
null
GHSA-2rfv-rvpp-5prp
Multiple unspecified vulnerabilities in Oracle Database 10.1.0.5 and 10.2.0.2 have unknown impact and remote authenticated attack vectors, related to (1) Change Data Capture (CDC), aka DB08, and (2) Oracle Instant Client, aka DB11. NOTE: as of 20070424, oracle has not disputed reliable claims that these issues are buffer overflows using a long CHANGE_TABLE_NAME parameter to the DBMS_CDC_IPUBLISH.CHGTAB_CACHE procedure (DB08) and Oracle Instant Client genezi utility (DB11).
[]
null
null
null
null
null
GHSA-j6p9-hm3q-hwmj
CSRF vulnerability in MongoDB Plugin
Jenkins MongoDB Plugin 1.3 and earlier does not perform permission checks in methods implementing form validation.This allows attackers with Overall/Read permission to gain access to some metadata of any arbitrary files on the Jenkins controller.Additionally, these form validation methods do not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability.As of publication of this advisory, there is no fix.
[]
null
5.3
null
null
null
GHSA-mmmh-wcxm-2wr4
Spring Security authorization rules can be bypassed via forward or include dispatcher types
Spring Security, versions 5.7 prior to 5.7.5 and 5.6 prior to 5.6.9 could be susceptible to authorization rules bypass via forward or include dispatcher types. Specifically, an application is vulnerable when all of the following are true: The application expects that Spring Security applies security to forward and include dispatcher types. The application uses the AuthorizationFilter either manually or via the authorizeHttpRequests() method. The application configures the FilterChainProxy to apply to forward and/or include requests (e.g. spring.security.filter.dispatcher-types = request, error, async, forward, include). The application may forward or include the request to a higher privilege-secured endpoint.The application configures Spring Security to apply to every dispatcher type via authorizeHttpRequests().shouldFilterAllDispatcherTypes(true)
[]
null
9.8
null
null
null
CVE-2022-40648
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ansys SpaceClaim 2022 R1. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of X_B files. The issue results from the lack of proper validation of user-supplied data, which can result in a write before the start of an allocated data structure. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-17563.
[ "cpe:2.3:a:ansys:spaceclaim:2022:r1:*:*:*:*:*:*" ]
null
null
7.8
null
null
RHSA-2022:1894
Red Hat Security Advisory: rust-toolset:rhel8 security, bug fix, and enhancement update
rust: Race condition in remove_dir_all leading to removal of files outside of the directory being removed
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
5.3
null
null
null
RHSA-2022:0401
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.3 security update
undertow: client side invocation timeout raised when calling over HTTP2 7: Incomplete fix of CVE-2016-4978 in HornetQ library
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el8" ]
null
6.6
null
null
null
GHSA-7cp6-q2fv-7m82
Telepad allows remote unauthenticated users to send instructions to the server to execute arbitrary code without any previous authorization or authentication. CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
[]
null
9.8
null
null
null
CVE-2009-2045
The Cisco Video Surveillance Stream Manager firmware before 5.3, as used on Cisco Video Surveillance Services Platforms and Video Surveillance Integrated Services Platforms, allows remote attackers to cause a denial of service (reboot) via a malformed payload in a UDP packet to port 37000, related to the xvcrman process, aka Bug ID CSCsj47924.
[ "cpe:2.3:a:cisco:video_surveillance_stream_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:video_surveillance_stream_manager:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:video_surveillance_stream_manager:5.1:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:video_surveillance_integrated_services_platform:*:*:*:*:*:*:*:*" ]
null
null
null
7.8
null
CVE-2018-15665
An issue was discovered in Cloudera Data Science Workbench (CDSW) 1.2.x through 1.4.0. Unauthenticated users can get a list of user accounts.
[ "cpe:2.3:a:cloudera:data_science_workbench:*:*:*:*:*:*:*:*" ]
null
null
5.3
5
null
CVE-2021-36898
WordPress Quiz And Survey Master plugin <= 7.3.4 - Auth. SQL Injection (SQLi) vulnerability
Auth. SQL Injection (SQLi) vulnerability in Quiz And Survey Master plugin <= 7.3.4 on WordPress.
[ "cpe:2.3:a:expresstech:quiz_and_survey_master:*:*:*:*:*:wordpress:*:*" ]
null
9.1
null
null
null
RHSA-2018:1827
Red Hat Security Advisory: flash-plugin security update
flash-plugin: Arbitrary Code Execution vulnerability (APSB18-19) flash-plugin: Information Disclosure vulnerabilities (APSB18-19) flash-plugin: Information Disclosure vulnerabilities (APSB18-19) flash-plugin: Arbitrary Code Execution vulnerability (APSB18-19)
[ "cpe:/a:redhat:rhel_extras:6" ]
null
null
8.8
null
null
CVE-2021-25786
An issue was discovered in QPDF version 10.0.4, allows remote attackers to execute arbitrary code via crafted .pdf file to Pl_ASCII85Decoder::write parameter in libqpdf.
[ "cpe:2.3:a:qpdf_project:qpdf:10.0.4:*:*:*:*:*:*:*" ]
null
5.3
null
null
null
CVE-2007-0490
index.php in Open-Realty 2.3.4 allows remote attackers to obtain sensitive information (the full path) via an invalid listingID parameter in a listingview action.
[ "cpe:2.3:a:open-realty:open-realty:2.3.4:*:*:*:*:*:*:*" ]
null
null
null
5
null
GHSA-rp49-xv9m-r6w5
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than other CVEs listed in the February 2013 CPU.
[]
null
null
null
null
null
GHSA-87gh-g484-3wp7
The iBMC (Intelligent Baseboard Management Controller) of some Huawei servers have an authentication bypass vulnerability. An unauthenticated, remote attacker may send some specially crafted messages to the affected products. Due to improper authentication design, successful exploit may cause some information leak.
[]
null
null
7.5
null
null
GHSA-44m4-7qrm-jgrm
Integer overflow in Adobe Reader 9.x before 9.4.6 on Linux allows attackers to execute arbitrary code via unspecified vectors.
[]
null
null
null
null
null
CVE-2017-20125
Online Hotel Booking System Pro roomtype-details.php sql injection
A vulnerability classified as critical was found in Online Hotel Booking System Pro 1.2. Affected by this vulnerability is an unknown functionality of the file /roomtype-details.php. The manipulation of the argument tid leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
[ "cpe:2.3:a:bestsoftinc:online_hotel_booking_system:1.2:*:*:*:pro:-:*:*" ]
null
6.3
null
null
null
GHSA-4g79-8pmr-hjx2
Untrusted search path vulnerability in VMware Workstation 8.x before 8.0.5 and VMware Player 4.x before 4.0.5 on Windows allows host OS users to gain host OS privileges via a Trojan horse DLL in a "system folder."
[]
null
null
null
null
null
GHSA-3mw5-7hq7-6p5w
NVIDIA Nemo Framework contains a vulnerability where a user could cause a relative path traversal issue by arbitrary file write. A successful exploit of this vulnerability may lead to code execution and data tampering.
[]
null
7.1
null
null
null
GHSA-chrw-h7h9-vx3f
Buffer overflow in Adobe Audition 3.0.1 and earlier allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via a crafted Audition Session (aka .ses) file.
[]
null
null
null
null
null
GHSA-xg28-jx54-8mvj
Multiple vulnerabilities in the implementation of a specific CLI command for Cisco NX-OS Software could allow an authenticated, local attacker with administrator credentials to cause a buffer overflow condition or perform command injection. This could allow the attacker to execute arbitrary commands with elevated privileges on the underlying operating system of an affected device. The vulnerabilities are due to insufficient validation of arguments passed to a certain CLI command. An attacker could exploit these vulnerabilities by including malicious input as the argument of the affected CLI command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with root privileges. An attacker would need valid administrator credentials to exploit these vulnerabilities.
[]
null
null
null
null
null
CVE-2024-1090
The ImageRecycle pdf & image compression plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the stopOptimizeAll function in all versions up to, and including, 3.1.13. This makes it possible for authenticated attackers, with subscriber-level access and above, to modify image optimization settings.
[ "cpe:2.3:a:imagerecycle:imagerecycle_pdf_\\&_image_compression:*:*:*:*:*:wordpress:*:*" ]
null
4.3
null
null
null
CVE-2022-22151
CAMS for HIS Log Server contained in the following Yokogawa Electric products fails to properly neutralize log outputs: CENTUM CS 3000 versions from R3.08.10 to R3.09.00, CENTUM VP versions from R4.01.00 to R4.03.00, from R5.01.00 to R5.04.20, and from R6.01.00 to R6.08.00, and Exaopc versions from R3.72.00 to R3.79.00.
[ "cpe:2.3:o:yokogawa:centum_cs_3000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:yokogawa:centum_cs_3000:-:*:*:*:*:*:*:*", "cpe:2.3:o:yokogawa:centum_cs_3000_entry_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:yokogawa:centum_cs_3000_entry:-:*:*:*:*:*:*:*", "cpe:2.3:o:yokogawa:centum_vp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:yokogawa:centum_vp:-:*:*:*:*:*:*:*", "cpe:2.3:o:yokogawa:centum_vp_entry_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:yokogawa:centum_vp_entry:-:*:*:*:*:*:*:*", "cpe:2.3:a:yokogawa:exaopc:*:*:*:*:*:*:*:*" ]
null
8.1
null
4.9
null
GHSA-fqq3-cpcq-8fhc
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WP Hosting Pay with Vipps and MobilePay for WooCommerce allows Stored XSS.This issue affects Pay with Vipps and MobilePay for WooCommerce: from n/a through 1.14.13.
[]
null
6.5
null
null
null
GHSA-vw6x-c5rg-jmjp
SQL injection in funadmin
Funadmin v5.0.2 has an arbitrary file deletion vulnerability in `/curd/index/delfile`.
[]
7.8
9.1
null
null
null
GHSA-vc89-2rr6-2h4r
Cross-site scripting (XSS) vulnerability in Goollery 0.03 allows remote attackers to inject arbitrary HTML or web script via the (1) page parameter to viewalbum.php or (2) btopage parameter to viewpic.php.
[]
null
null
null
null
null
CVE-2021-23838
An issue was discovered in flatCore before 2.0.0 build 139. A reflected XSS vulnerability was identified in the media_filter HTTP request body parameter for the acp interface. The affected parameter accepts malicious client-side script without proper input sanitization. For example, a malicious user can leverage this vulnerability to steal cookies from a victim user and perform a session-hijacking attack, which may then lead to unauthorized access to the site.
[ "cpe:2.3:a:flatcore:flatcore:*:*:*:*:*:*:*:*" ]
null
4.8
null
3.5
null
CVE-2014-5922
The ga6748 (aka com.g.ga6748) application 1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[ "cpe:2.3:a:ga6748_project:ga6748:1:*:*:*:*:android:*:*" ]
null
null
null
5.4
null
GHSA-7vc8-hf39-6395
Improper serialization of message queue client registration can lead to race condition allowing multiple gunyah message clients to register with same label in Snapdragon Connectivity, Snapdragon Mobile
[]
null
7
null
null
null
GHSA-7grf-83vw-6f5x
OpenZeppelin Contracts ERC165Checker unbounded gas consumption
ImpactThe target contract of an EIP-165 `supportsInterface` query can cause unbounded gas consumption by returning a lot of data, while it is generally assumed that this operation has a bounded cost.PatchesThe issue has been fixed in v4.7.2.Referenceshttps://github.com/OpenZeppelin/openzeppelin-contracts/pull/3587For more informationIf you have any questions or comments about this advisory, or need assistance deploying a fix, email us at [[email protected]](mailto:[email protected]).
[]
null
5.3
null
null
null
CVE-2024-2362
Path Traversal in parisneo/lollms-webui
A path traversal vulnerability exists in the parisneo/lollms-webui version 9.3 on the Windows platform. Due to improper validation of file paths between Windows and Linux environments, an attacker can exploit this vulnerability to delete any file on the system. The issue arises from the lack of adequate sanitization of user-supplied input in the 'del_preset' endpoint, where the application fails to prevent the use of absolute paths or directory traversal sequences ('..'). As a result, an attacker can send a specially crafted request to the 'del_preset' endpoint to delete files outside of the intended directory.
[ "cpe:2.3:a:parisneo:lollms-webui:9.3:*:*:*:*:*:*:*", "cpe:2.3:a:lollms:lollms_web_ui:9.3:*:*:*:*:linux:*:*", "cpe:2.3:a:lollms:lollms_web_ui:9.3:*:*:*:*:windows:*:*" ]
null
null
9.1
null
null
RHSA-2020:1080
Red Hat Security Advisory: evolution security and bug fix update
evolution: specially crafted email leading to OpenPGP signatures being spoofed for arbitrary messages evolution-ews: all certificate errors ignored if error is ignored during initial account setup in gnome-online-accounts
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
8.1
null
null
CVE-2011-1728
Stack-based buffer overflow in OmniInet.exe in the Backup Client Service in HP OpenView Storage Data Protector 6.00, 6.10, and 6.11 allows remote attackers to execute arbitrary code via a malformed EXEC_BAR message.
[ "cpe:2.3:a:hp:openview_storage_data_protector:6.00:*:*:*:*:*:*:*", "cpe:2.3:a:hp:openview_storage_data_protector:6.10:*:*:*:*:*:*:*", "cpe:2.3:a:hp:openview_storage_data_protector:6.11:*:*:*:*:*:*:*" ]
null
null
null
10
null
CVE-2019-2730
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Privileges). Supported versions that are affected are 5.6.44 and prior and 5.7.18 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 2.7 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N).
[ "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*" ]
null
null
2.7
4
null
CVE-2018-1987
IBM Spectrum Protect for Enterprise Resource Planning 7.1 and 8.1, if tracing is activated, the IBM Spectrum Protect node password may be displayed in plain text in the ERP trace file. IBM X-Force ID: 154280.
[ "cpe:2.3:a:ibm:data_protection:*:*:*:*:*:sap_for_db2:*:*", "cpe:2.3:a:ibm:data_protection:*:*:*:*:*:sap_for_oracle:*:*", "cpe:2.3:a:ibm:data_protection:*:*:*:*:*:sap_hana:*:*" ]
null
null
5.1
null
null
CVE-2023-3933
The Your Journey theme for WordPress is vulnerable to Reflected Cross-Site Scripting via prototype pollution in versions up to, and including, 1.9.8 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
[ "cpe:2.3:a:wiloke:your_journey:*:*:*:*:*:wordpress:*:*" ]
null
6.1
null
null
null
cisco-sa-c9800-fnf-dos-bOL5vLge
Cisco IOS XE Software for Catalyst 9800 Series Wireless Controllers Application Visibility and Control Denial of Service Vulnerability
A vulnerability in the Application Visibility and Control (AVC-FNF) feature of Cisco IOS XE Software for Cisco Catalyst 9800 Series Wireless Controllers could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient packet verification for traffic inspected by the AVC feature. An attacker could exploit this vulnerability by sending crafted packets from the wired network to a wireless client, resulting in the crafted packets being processed by the wireless controller. A successful exploit could allow the attacker to cause a crash and reload of the affected device, resulting in a DoS condition. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is part of the April 2022 release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: April 2022 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication. ["https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-74561"]
[]
null
8.6
null
null
null
GHSA-3fhv-q33v-8j9m
Improper access control in Azure SaaS Resources allows an authorized attacker to disclose information over a network.
[]
null
8.8
null
null
null
CVE-2024-7595
GRE and GRE6 Protocols (RFC2784) do not validate or verify the source of a network packet
GRE and GRE6 Protocols (RFC2784) do not validate or verify the source of a network packet allowing an attacker to spoof and route arbitrary traffic via an exposed network interface that can lead to spoofing, access control bypass, and other unexpected network behaviors. This can be considered similar to CVE-2020-10136.
[]
null
5.3
null
null
null
CVE-2023-31093
WordPress Chronosly Events Calendar Plugin <= 2.6.2 is vulnerable to Cross Site Request Forgery (CSRF)
Cross-Site Request Forgery (CSRF) vulnerability in Chronosly Chronosly Events Calendar plugin <= 2.6.2 versions.
[ "cpe:2.3:a:chronosly-events-calendar_project:chronosly-events-calendar:*:*:*:*:*:wordpress:*:*" ]
null
8.8
null
null
null
ICSA-24-226-02
Rockwell Automation AADvance Standalone OPC-DA Server
An arbitrary code execution vulnerability exists in the affected product. The log4net config file does not disable XML external entities. An arbitrary code execution vulnerability exists in the affected product. The vulnerability occurs due to a vulnerable component, the format string in log4net.
[]
null
5.3
null
null
null
GHSA-r277-xmwj-g4jv
Cross-site scripting (XSS) vulnerability in the Menubook plugin before 0.9.3 for baserCMS allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
[]
null
null
6.1
null
null
CVE-2022-0703
GD Mylist <= 1.1.1 - Admin+ Stored Cross-Site Scripting
The GD Mylist WordPress plugin through 1.1.1 does not sanitise and escape some of its settings, allowing high privilege users such as admin to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed
[ "cpe:2.3:a:gd-mylist_project:gd-mylist:*:*:*:*:*:wordpress:*:*" ]
null
4.8
null
3.5
null
GHSA-6gp4-p4jv-2f32
A Remote Unauthorized Access vulnerability was identified in HPE Smart Update Manager (SUM) earlier than version 8.3.5.
[]
null
null
null
null
null
GHSA-4q6h-rgw3-24wp
An issue was discovered in Avast Antivirus before 20. The aswTask RPC endpoint for the TaskEx library in the Avast Service (AvastSvc.exe) allows attackers to launch the Repair App RPC call from a Low Integrity process.
[]
null
null
null
null
null
CVE-2013-4220
The bad_mode function in arch/arm64/kernel/traps.c in the Linux kernel before 3.9.5 on the ARM64 platform allows local users to cause a denial of service (system crash) via vectors involving an attempted register access that triggers an unexpected value in the Exception Syndrome Register (ESR).
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:linux:linux_kernel:3.9.0:*:*:*:*:*:arm64:*", "cpe:2.3:o:linux:linux_kernel:3.9.1:*:*:*:*:*:arm64:*", "cpe:2.3:o:linux:linux_kernel:3.9.2:*:*:*:*:*:arm64:*", "cpe:2.3:o:linux:linux_kernel:3.9.3:*:*:*:*:*:arm64:*" ]
null
null
null
4.9
null
CVE-2008-1030
Integer overflow in the CFDataReplaceBytes function in the CFData API in CoreFoundation in Apple Mac OS X before 10.5.3 allows context-dependent attackers to execute arbitrary code or cause a denial of service (crash) via an invalid length argument, which triggers a heap-based buffer overflow.
[ "cpe:2.3:o:apple:mac_os_x:10.4.11:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.5.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.5.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.4.11:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.5.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.5.2:*:*:*:*:*:*:*" ]
null
null
null
10
null
CVE-2017-17953
PHP Scripts Mall PHP Multivendor Ecommerce has XSS via the category.php chid1 parameter.
[ "cpe:2.3:a:php_multivendor_ecommerce_project:php_multivendor_ecommerce:-:*:*:*:*:*:*:*" ]
null
null
6.1
4.3
null
CVE-2024-38230
Windows Standards-Based Storage Management Service Denial of Service Vulnerability
Windows Standards-Based Storage Management Service Denial of Service Vulnerability
[ "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*" ]
null
6.5
null
null
null
CVE-2010-4746
Multiple memory leaks in the normalization functionality in 389 Directory Server before 1.2.7.5 allow remote attackers to cause a denial of service (memory consumption) via "badly behaved applications," related to (1) Slapi_Attr mishandling in the DN normalization code and (2) pointer mishandling in the syntax normalization code, a different issue than CVE-2011-0019.
[ "cpe:2.3:a:fedoraproject:389_directory_server:*:alpha3:*:*:*:*:*:*", "cpe:2.3:a:fedoraproject:389_directory_server:1.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:fedoraproject:389_directory_server:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:fedoraproject:389_directory_server:1.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:fedoraproject:389_directory_server:1.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:fedoraproject:389_directory_server:1.2.5:rc1:*:*:*:*:*:*", "cpe:2.3:a:fedoraproject:389_directory_server:1.2.5:rc2:*:*:*:*:*:*", "cpe:2.3:a:fedoraproject:389_directory_server:1.2.5:rc3:*:*:*:*:*:*", "cpe:2.3:a:fedoraproject:389_directory_server:1.2.5:rc4:*:*:*:*:*:*", "cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:a2:*:*:*:*:*:*", "cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:a3:*:*:*:*:*:*", "cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:a4:*:*:*:*:*:*", "cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:rc1:*:*:*:*:*:*", "cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:rc2:*:*:*:*:*:*", "cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:rc3:*:*:*:*:*:*", "cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:rc6:*:*:*:*:*:*", "cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:rc7:*:*:*:*:*:*", "cpe:2.3:a:fedoraproject:389_directory_server:1.2.6.1:*:*:*:*:*:*:*" ]
null
null
null
5
null
RHSA-2011:1330
Red Hat Security Advisory: JBoss Enterprise Web Server 1.0.2 security update
httpd: multiple ranges DoS
[ "cpe:/a:redhat:jboss_enterprise_web_server:1.0" ]
null
null
null
null
null
GHSA-rfj2-fvg8-68x5
A vulnerability was found in Axiomatic Bento4 and classified as problematic. Affected by this issue is the function ParseCommandLine of the file Mp4Tag/Mp4Tag.cpp of the component mp4tag. The manipulation leads to denial of service. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-212666 is the identifier assigned to this vulnerability.
[]
null
6.5
null
null
null
CVE-2021-32699
Asymmetric Resource Consumption (Amplification) in Docker containers created by Wings
Wings is the control plane software for the open source Pterodactyl game management system. All versions of Pterodactyl Wings prior to `1.4.4` are vulnerable to system resource exhaustion due to improper container process limits being defined. A malicious user can consume more resources than intended and cause downstream impacts to other clients on the same hardware, eventually causing the physical server to stop responding. Users should upgrade to `1.4.4` to mitigate the issue. There is no non-code based workaround for impacted versions of the software. Users running customized versions of this software can manually set a PID limit for containers created.
[ "cpe:2.3:a:pterodactyl:wings:*:*:*:*:*:*:*:*" ]
null
6.5
null
null
null
CVE-2021-44095
A SQL injection vulnerability exists in ProjectWorlds Hospital Management System in php 1.0 on login page that allows a remote attacker to compromise Application SQL database.
[ "cpe:2.3:a:hospital_management_system_project:hospital_management_system:1.0:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
null
GHSA-mrjp-wxf4-27w7
A CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability exists in C-Bus Toolkit (V1.15.7 and prior) that could allow a remote code execution when restoring a project.
[]
null
null
null
null
null
CVE-2020-8475
ABB Central Licensing System - Denial of Service Vulnerability
For the Central Licensing Server component used in ABB products ABB Ability™ System 800xA and related system extensions versions 5.1, 6.0 and 6.1, Compact HMI versions 5.1 and 6.0, Control Builder Safe 1.0, 1.1 and 2.0, Symphony Plus -S+ Operations 3.0 to 3.2 Symphony Plus -S+ Engineering 1.1 to 2.2, Composer Harmony 5.1, 6.0 and 6.1, Melody Composer 5.3, 6.1/6.2 and SPE for Melody 1.0SPx (Composer 6.3), Harmony OPC Server (HAOPC) Standalone 6.0, 6.1 and 7.0, ABB Ability™ System 800xA/ Advant® OCS Control Builder A 1.3 and 1.4, Advant® OCS AC100 OPC Server 5.1, 6.0 and 6.1, Composer CTK 6.1 and 6.2, AdvaBuild 3.7 SP1 and SP2, OPCServer for MOD 300 (non-800xA) 1.4, OPC Data Link 2.1 and 2.2, Knowledge Manager 8.0, 9.0 and 9.1, Manufacturing Operations Management 1812 and 1909, ABB AbilityTM SCADAvantage versions 5.1 to 5.6.5, a weakness in validation of input exists that allows an attacker to block license handling by sending specially crafted messages to the CLS web service.
[ "cpe:2.3:a:abb:800xa_system:5.1:-:*:*:*:*:*:*", "cpe:2.3:a:abb:800xa_system:5.1:feature_pack_4:*:*:*:*:*:*", "cpe:2.3:a:abb:800xa_system:5.1:feature_pack_4_revision_d:*:*:*:*:*:*", "cpe:2.3:a:abb:800xa_system:5.1:revision_a:*:*:*:*:*:*", "cpe:2.3:a:abb:800xa_system:5.1:revision_b:*:*:*:*:*:*", "cpe:2.3:a:abb:800xa_system:5.1:revision_c:*:*:*:*:*:*", "cpe:2.3:a:abb:800xa_system:5.1:revision_d:*:*:*:*:*:*", "cpe:2.3:a:abb:800xa_system:5.1:revision_e:*:*:*:*:*:*", "cpe:2.3:a:abb:800xa_system:5.1:revision_e_feature_pack_4:*:*:*:*:*:*", "cpe:2.3:a:abb:800xa_system:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:abb:800xa_system:6.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:abb:800xa_system:6.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:abb:800xa_system:6.0.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:abb:800xa_system:6.1:*:*:*:*:*:*:*", "cpe:2.3:a:abb:compact_hmi:5.1:-:*:*:*:*:*:*", "cpe:2.3:a:abb:compact_hmi:5.1:feature_pack_4_revision_d:*:*:*:*:*:*", "cpe:2.3:a:abb:compact_hmi:5.1:revision_b:*:*:*:*:*:*", "cpe:2.3:a:abb:compact_hmi:5.1:revision_d:*:*:*:*:*:*", "cpe:2.3:a:abb:compact_hmi:6.0.1-1:*:*:*:*:*:*:*", "cpe:2.3:a:abb:compact_hmi:6.0.3-2:*:*:*:*:*:*:*", "cpe:2.3:a:abb:control_builder_safe:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:abb:control_builder_safe:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:abb:control_builder_safe:2.0:*:*:*:*:*:*:*" ]
null
5.3
null
null
null
GHSA-3vv9-8w9f-p9ff
Kernel software installed and running inside a Guest VM may post improper commands to the GPU Firmware to subvert reconstruction activities to trigger a write of data outside the Guest's virtualised GPU memory.
[]
null
7.8
null
null
null
CVE-2019-19479
An issue was discovered in OpenSC through 0.19.0 and 0.20.x through 0.20.0-rc3. libopensc/card-setcos.c has an incorrect read operation during parsing of a SETCOS file attribute.
[ "cpe:2.3:a:opensc_project:opensc:*:*:*:*:*:*:*:*", "cpe:2.3:a:opensc_project:opensc:0.20.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:opensc_project:opensc:0.20.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:opensc_project:opensc:0.20.0:rc3:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*" ]
null
5.5
null
2.1
null
GHSA-vr34-x9hq-jg6j
Heap-based buffer overflow in the WWCabFile ActiveX component in the Wonderware System Platform in Invensys Wonderware Application Server 2012 and earlier, Foxboro Control Software 3.1 and earlier, InFusion CE/FE/SCADA 2.5 and earlier, Wonderware Information Server 4.5 and earlier, ArchestrA Application Object Toolkit 3.2 and earlier, and InTouch 10.0 through 10.5 might allow remote attackers to execute arbitrary code via a long string to the AddFile member.
[]
null
null
null
null
null