id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
189k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
patch_commit_url
stringlengths
36
232
RHSA-2019:2004
Red Hat Security Advisory: icedtea-web security update
icedtea-web: unsigned code injection in a signed JAR file icedtea-web: path traversal while processing <jar/> elements of JNLP files results in arbitrary file overwrite icedtea-web: directory traversal in the nested jar auto-extraction leading to arbitrary file overwrite
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
null
8.2
null
null
CVE-2019-6784
An issue was discovered in GitLab Community and Enterprise Edition before 11.5.8, 11.6.x before 11.6.6, and 11.7.x before 11.7.1. It allows XSS (issue 1 of 2). Markdown fields contain a lack of input validation and output encoding when processing KaTeX that results in a persistent XSS.
[ "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*" ]
null
6.1
null
4.3
null
CVE-2022-31747
Mozilla developers Andrew McCreight, Nicolas B. Pierron, and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 100 and Firefox ESR 91.9. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird < 91.10, Firefox < 101, and Firefox ESR < 91.10.
[ "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*" ]
null
9.8
null
null
null
CVE-2024-39396
Adobe Indesign 2024 PCX File Parsing Out Of Bound Read
InDesign Desktop versions ID18.5.2, ID19.3 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[ "cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
5.5
null
null
null
GHSA-55vp-gmh3-7chh
A Blind SQL injection vulnerability exists in the /DataHandler/Handler_CFG.ashx endpoint of Delta Electronics DIAEnergie Version 1.7.5 and prior. The application does not properly validate the user-controlled value supplied through the parameter keyword before using it as part of an SQL query. A remote, unauthenticated attacker can exploit this issue to execute arbitrary code in the context of NT SERVICE\MSSQLSERVER.
[]
null
null
null
null
null
GHSA-79v6-pg2f-3mmc
FrontRange GoldMine mail agent 5.70 and 6.00 before 30503 directly sends HTML to the default browser without setting its security zone or otherwise labeling it untrusted, which allows remote attackers to execute arbitrary code via a message that is rendered in IE using a less secure zone.
[]
null
null
null
null
null
CVE-2025-23471
WordPress ECT Add to Cart Button plugin <= 1.4 - CSRF to Stored XSS vulnerability
Cross-Site Request Forgery (CSRF) vulnerability in Andy Chapman ECT Add to Cart Button allows Stored XSS.This issue affects ECT Add to Cart Button: from n/a through 1.4.
[]
null
7.1
null
null
null
GHSA-cqx5-p2pr-988q
A remote code execution vulnerability exists when Microsoft Edge PDF Reader improperly handles objects in memory, aka 'Microsoft Edge PDF Remote Code Execution Vulnerability'.
[]
null
7.5
null
null
null
CVE-2018-9344
In several functions of DescramblerImpl.cpp, there is a possible use after free due to improper locking. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
[ "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*" ]
null
7.8
null
null
null
CVE-2023-37435
Authenticated SQL Injection Vulnerabilities in EdgeConnect SD-WAN Orchestrator Web-based Management Interface
Multiple vulnerabilities in the web-based management interface of EdgeConnect SD-WAN Orchestrator could allow an authenticated remote attacker to conduct SQL injection attacks against the EdgeConnect SD-WAN Orchestrator instance. An attacker could exploit these vulnerabilities to     obtain and modify sensitive information in the underlying database potentially leading to the exposure and corruption of sensitive data controlled by the EdgeConnect SD-WAN Orchestrator host.
[ "cpe:2.3:a:hpe:edgeconnect_sd-wan_orchestrator:*:*:*:*:*:*:*:*", "cpe:2.3:a:arubanetworks:edgeconnect_sd-wan_orchestrator:*:*:*:*:*:*:*:*" ]
null
6.5
null
null
null
CVE-2005-1835
NEXTWEB (i)Site stores databases under the web document root with insufficient access control, which allows remote attackers to obtain sensitive information via a direct request to databases/Users.mdb.
[ "cpe:2.3:a:nextweb:nextweb_\\(i\\)site:*:*:*:*:*:*:*:*" ]
null
null
null
5
null
GHSA-gjc9-vw3q-w437
RSA Archer, versions prior to 6.7 P3 (6.7.0.3), contain an information exposure vulnerability. Users’ session information could potentially be stored in cache or log files. An authenticated malicious local user with access to the log files may obtain the exposed information to use it in further attacks.
[]
null
null
null
null
null
GHSA-cwr8-3mh6-89cx
foo.php3 in DotBr 0.1 allows remote attackers to obtain sensitive information via a direct request, which calls the phpinfo function.
[]
null
null
null
null
null
CVE-2021-33672
Due to missing encoding in SAP Contact Center's Communication Desktop component- version 700, an attacker could send malicious script in chat message. When the message is accepted by the chat recipient, the script gets executed in their scope. Due to the usage of ActiveX in the application, the attacker can further execute operating system level commands in the chat recipient's scope. This could lead to a complete compromise of their confidentiality, integrity, and could temporarily impact their availability.
[ "cpe:2.3:a:sap:contact_center:700:*:*:*:*:*:*:*" ]
null
null
9.6
null
null
GHSA-x3p6-6j82-7c7q
A vulnerability in the CLI of Cisco FXOS Software and Cisco UCS Manager Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system (OS). The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by including crafted arguments to specific commands. A successful exploit could allow the attacker to execute arbitrary commands on the underlying OS with the privileges of the currently logged-in user for all affected platforms excluding Cisco UCS 6400 Series Fabric Interconnects. On Cisco UCS 6400 Series Fabric Interconnects, the injected commands are executed with root privileges.
[]
null
7.8
null
null
null
CVE-2023-25022
WordPress Watu Quiz Plugin <= 3.3.8 is vulnerable to Cross Site Scripting (XSS)
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Kiboko Labs Watu Quiz plugin <= 3.3.8 versions.
[ "cpe:2.3:a:kibokolabs:watu_quiz:*:*:*:*:*:wordpress:*:*" ]
null
5.9
null
null
null
GHSA-hhph-jxcg-589h
FreezeX 1.00.100.0666 allows local users with administrator privileges to cause a denial of service (FreezeX application) by overwriting the db.fzx file.
[]
null
null
null
null
null
GHSA-q9mc-ghc5-mv47
Buffer overflow in the Windows Redirector function in Microsoft Windows XP allows local users to execute arbitrary code via a long parameter.
[]
null
null
null
null
null
CVE-2006-3299
Cross-site scripting (XSS) vulnerability in index.php in Usenet Script 0.5 allows remote attackers to inject arbitrary web script or HTML via the group parameter.
[ "cpe:2.3:a:metalheadws:usenet:0.5:*:*:*:*:*:*:*" ]
null
null
null
2.6
null
GHSA-wfxf-3935-5jgv
A flaw was found in the Ansible Automation Platform's Event-Driven Ansible. In configurations where verbosity is set to "debug", inventory passwords are exposed in plain text when starting a rulebook activation. This issue exists for any "debug" action in a rulebook and also affects Event Streams.
[]
null
6.5
null
null
null
GHSA-2rh2-8h38-pqp8
Directory traversal vulnerability in index.php in Firewolf Technologies Synergiser 1.2 RC1 and earlier allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the page parameter. NOTE: this can be leveraged to obtain the path by including a local PHP script with a duplicate function declaration.
[]
null
null
null
null
null
RHSA-2005:329
Red Hat Security Advisory: XFree86 security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws" ]
null
null
null
null
null
GHSA-w9hm-m2x5-5x42
A vulnerability has been identified in SIMATIC S7-300 CPUs (All versions < V3.X.16). The affected CPUs improperly validate S7 communication packets which could cause a Denial-of-Service condition of the CPU. The CPU will remain in DEFECT mode until manual restart. Successful exploitation requires an attacker to be able to send a specially crafted S7 communication packet to a communication interface of the CPU. This includes Ethernet, PROFIBUS, and Multi Point Interfaces (MPI). No user interaction or privileges are required to exploit the security vulnerability. The vulnerability could allow causing a Denial-of-Service condition of the core functionality of the CPU, compromising the availability of the system. At the time of advisory publication no public exploitation of this security vulnerability was known. Siemens confirms the security vulnerability and provides mitigations to resolve the security issue.
[]
null
null
7.5
null
null
CVE-2019-12680
Cisco Firepower Management Center SQL Injection Vulnerabilities
Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to execute arbitrary SQL injections on an affected device. These vulnerabilities exist due to improper input validation. An attacker could exploit these vulnerabilities by sending crafted SQL queries to an affected device. A successful exploit could allow the attacker to view information that they are not authorized to view, make changes to the system that they are not authorized to make, and execute commands within the underlying operating system that may affect the availability of the device.
[ "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3:*:*:*:*:*:*:*" ]
null
null
8.8
null
null
GHSA-j395-pgw8-whr3
Unspecified vulnerability in the Bluetooth RFCOMM dissector in Wireshark 0.99.7 through 1.0.3 allows remote attackers to cause a denial of service (application crash or abort) via unknown packets.
[]
null
null
null
null
null
CVE-2005-1857
Format string vulnerability in simpleproxy before 3.4 allows remote malicious HTTP proxies to execute arbitrary code via format string specifiers in a reply.
[ "cpe:2.3:a:simpleproxy:simpleproxy:2.2b:*:*:*:*:*:*:*", "cpe:2.3:a:simpleproxy:simpleproxy:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:simpleproxy:simpleproxy:3.1:*:*:*:*:*:*:*", "cpe:2.3:a:simpleproxy:simpleproxy:3.2:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
RHSA-2014:2023
Red Hat Security Advisory: glibc security and bug fix update
glibc: command execution in wordexp() with WRDE_NOCMD specified
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
null
ICSA-18-331-02
Rockwell Automation FactoryTalk Services Platform
A remote unauthenticated attacker could send numerous crafted packets to service ports resulting in memory consumption that could lead to a partial or complete denial-of-service condition to the affected services. CVE-2018-18981 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
[]
null
null
7.5
null
null
GHSA-p495-jrpq-p66g
MantisBT XSS when uploading an attachment
The proj_doc_edit_page.php Project Documentation feature in MantisBT before 2.21.3 has a stored cross-site scripting (XSS) vulnerability, allowing execution of arbitrary code (if CSP settings permit it) after uploading an attachment with a crafted filename. The code is executed when editing the document's page.
[]
null
6.1
null
null
null
GHSA-m25r-3fx6-w626
In Siren Investigate before 11.1.4, when enabling the cluster feature of the Siren Alert application, TLS verifications are disabled globally in the Siren Investigate main process.
[]
null
null
null
null
null
CVE-2025-49283
WordPress Anti-spam, Spam protection, ReCaptcha for all forms and GDPR-compliant <= 4.1.1 - Cross Site Request Forgery (CSRF) Vulnerability
Cross-Site Request Forgery (CSRF) vulnerability in Matthias Nordwig Anti-spam, Spam protection, ReCaptcha for all forms and GDPR-compliant allows Cross Site Request Forgery. This issue affects Anti-spam, Spam protection, ReCaptcha for all forms and GDPR-compliant: from n/a through 4.1.1.
[]
null
4.3
null
null
null
CVE-2021-4318
Object corruption in Blink in Google Chrome prior to 94.0.4606.54 allowed a remote attacker to potentially exploit object corruption via a crafted HTML page. (Chromium security severity: High)
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" ]
null
8.8
null
null
null
CVE-2024-41038
firmware: cs_dsp: Prevent buffer overrun when processing V2 alg headers
In the Linux kernel, the following vulnerability has been resolved: firmware: cs_dsp: Prevent buffer overrun when processing V2 alg headers Check that all fields of a V2 algorithm header fit into the available firmware data buffer. The wmfw V2 format introduced variable-length strings in the algorithm block header. This means the overall header length is variable, and the position of most fields varies depending on the length of the string fields. Each field must be checked to ensure that it does not overflow the firmware data buffer. As this ia bugfix patch, the fixes avoid making any significant change to the existing code. This makes it easier to review and less likely to introduce new bugs.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
null
5.5
null
null
null
GHSA-3vrx-9pq3-23gp
Compaq TruCluster 1.5 allows remote attackers to cause a denial of service via a port scan from a system that does not have a DNS PTR record, which causes the cluster to enter a "split-brain" state.
[]
null
null
null
null
null
GHSA-6x87-qx9j-65qp
Abantecart through 1.3.2 allows remote authenticated administrators to execute arbitrary code by uploading an executable file, because the Catalog>Media Manager>Images settings can be changed by an administrator (e.g., by configuring .php to be a valid image file type).
[]
null
7.2
null
null
null
GHSA-hrcx-g752-fgp2
A command injection (missing input validation) issue in the remote phonebook configuration URI in the web interface of the Atcom A10W VoIP phone with firmware 2.6.1a2421 allows an authenticated remote attacker in the same network to trigger OS commands via shell metacharacters in a POST request.
[]
null
null
null
null
null
CVE-2024-57998
OPP: add index check to assert to avoid buffer overflow in _read_freq()
In the Linux kernel, the following vulnerability has been resolved: OPP: add index check to assert to avoid buffer overflow in _read_freq() Pass the freq index to the assert function to make sure we do not read a freq out of the opp->rates[] table when called from the indexed variants: dev_pm_opp_find_freq_exact_indexed() or dev_pm_opp_find_freq_ceil/floor_indexed(). Add a secondary parameter to the assert function, unused for assert_single_clk() then add assert_clk_index() which will check for the clock index when called from the _indexed() find functions.
[]
null
null
null
null
null
PYSEC-2021-544
null
TensorFlow is an end-to-end open source platform for machine learning. The implementation of TrySimplify(https://github.com/tensorflow/tensorflow/blob/c22d88d6ff33031aa113e48aa3fc9aa74ed79595/tensorflow/core/grappler/optimizers/arithmetic_optimizer.cc#L390-L401) has undefined behavior due to dereferencing a null pointer in corner cases that result in optimizing a node with no inputs. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
[]
null
null
null
null
null
GHSA-cvxv-g5fg-rfwf
** DISPUTED ** PHP remote file inclusion vulnerability in index.php in phpWebFileManager 0.5 allows remote attackers to execute arbitrary PHP code via a URL in the PN_PathPrefix parameter. NOTE: this issue is disputed by a reliable third party, who demonstrates that PN_PathPrefix is defined before use.
[]
null
null
null
null
null
CVE-2022-1427
Out-of-bounds Read in mrb_obj_is_kind_of in in mruby/mruby
Out-of-bounds Read in mrb_obj_is_kind_of in in GitHub repository mruby/mruby prior to 3.2. # Impact: Possible arbitrary code execution if being exploited.
[ "cpe:2.3:a:mruby:mruby:*:*:*:*:*:ruby:*:*" ]
null
null
7.7
null
null
CVE-2024-10707
Local File Inclusion in gaizhenbiao/chuanhuchatgpt
gaizhenbiao/chuanhuchatgpt version git d4ec6a3 is affected by a local file inclusion vulnerability due to the use of the gradio component gr.JSON, which has a known issue (CVE-2024-4941). This vulnerability allows unauthenticated users to access arbitrary files on the server by uploading a specially crafted JSON file and exploiting the improper input validation in the handle_dataset_selection function.
[]
null
null
6.5
null
null
CVE-2024-40487
A Stored Cross Site Scripting (XSS) vulnerability was found in "/view_type.php" of Kashipara Live Membership System v1.0, which allows remote attackers to execute arbitrary code via membershipType parameter.
[ "cpe:2.3:a:kashipara:live_membership_system:1.0:*:*:*:*:*:*:*" ]
null
7.6
null
null
null
CVE-2023-21982
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.32 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
[ "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*" ]
null
4.9
null
null
null
CVE-2006-3647
Integer overflow in Microsoft Word 2000, 2002, 2003, 2004 for Mac, and v.X for Mac allows remote user-assisted attackers to execute arbitrary code via a crafted string in a Word document, which overflows a 16-bit integer length value, aka "Memmove Code Execution," a different vulnerability than CVE-2006-3651 and CVE-2006-4693.
[ "cpe:2.3:a:microsoft:office:2000:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2000:*:*:ja:*:*:*:*", "cpe:2.3:a:microsoft:office:2000:*:*:ko:*:*:*:*", "cpe:2.3:a:microsoft:office:2000:*:*:zh:*:*:*:*", "cpe:2.3:a:microsoft:office:2000:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2000:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2000:sp3:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2001:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2001:*:*:*:*:mac_os_x:*:*", "cpe:2.3:a:microsoft:office:2001:sr1:*:*:*:mac_os_x:*:*", "cpe:2.3:a:microsoft:office:2003:*:*:*:student_teacher:*:*:*", "cpe:2.3:a:microsoft:office:2003:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2003:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2003:sp3:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2004:*:*:*:*:mac_os_x:*:*", "cpe:2.3:a:microsoft:office:v.x:*:*:*:*:*:*:*" ]
null
null
null
9.3
null
CVE-2022-2948
GE CIMPLICITY Heap-based Buffer Overflow
GE CIMPICITY versions 2022 and prior is vulnerable to a heap-based buffer overflow, which could allow an attacker to execute arbitrary code.
[ "cpe:2.3:a:ge:cimplicity:*:*:*:*:*:*:*:*" ]
null
7.8
null
null
null
RHSA-2021:2258
Red Hat Security Advisory: rh-nginx118-nginx security update
nginx: Off-by-one in ngx_resolver_copy() when labels are followed by a pointer to a root domain name
[ "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
8.1
null
null
null
CVE-2024-40721
CHANGING Information Technology TCBServiSign Windows Version - Improper Input Validation
The specific API in TCBServiSign Windows Version from CHANGING Information Technology does not properly validate server-side input. When a user visits a spoofed website, unauthenticated remote attackers can cause the TCBServiSign to load a DLL from an arbitrary path.
[ "cpe:2.3:a:changingtec:servisign:*:*:*:*:*:windows:*:*", "cpe:2.3:a:changingtec:tcb_servisign:*:*:*:*:*:windows:*:*" ]
null
8.8
null
null
null
GHSA-46pv-vq66-38gm
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the mandatory property of a TimeField. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-6502.
[]
null
null
8.8
null
null
GHSA-g6vh-gx55-qf59
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Jakub Glos Sparkle Elementor Kit allows PHP Local File Inclusion. This issue affects Sparkle Elementor Kit: from n/a through 2.0.9.
[]
null
7.5
null
null
null
GHSA-95mw-pcq6-5qg2
Unspecified vulnerability in the RDBMS Security component in Oracle Database Server 11.2.0.4 and 12.1.0.2 allows local users to affect confidentiality via unknown vectors, a different vulnerability than CVE-2016-5499.
[]
null
null
3.3
null
null
GHSA-9xg8-22rr-c6vh
Pivotal Concourse, all versions prior to 4.2.2, puts the user access token in a url during the login flow. A remote attacker who gains access to a user's browser history could obtain the access token and use it to authenticate as the user.
[]
null
null
7.5
null
null
GHSA-ch8f-f5g7-vhhr
Stolen credentials from SSH clients via ssh-agent program, allowing other local users to access remote accounts belonging to the ssh-agent user.
[]
null
8.4
null
null
null
GHSA-3h94-p827-w44r
A /shell?cmd= XSS issue exists in the HTTPD component of NAT32 v2.2 Build 22284 devices that can be exploited for Remote Code Execution in conjunction with CSRF.
[]
null
null
6.1
null
null
GHSA-3x82-hxvx-2rv2
In the Linux kernel, the following vulnerability has been resolved:net: bcmasp: fix potential memory leak in bcmasp_xmit()The bcmasp_xmit() returns NETDEV_TX_OK without freeing skb in case of mapping fails, add dev_kfree_skb() to fix it.
[]
null
5.5
null
null
null
CVE-2025-26558
WordPress Aparat Responsive plugin <= 1.3 - Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in mkkmail Aparat Responsive allows DOM-Based XSS. This issue affects Aparat Responsive: from n/a through 1.3.
[]
null
6.5
null
null
null
CVE-2025-50059
Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Networking). Supported versions that are affected are Oracle Java SE: 8u451-perf, 11.0.27, 17.0.15, 21.0.7, 24.0.1; Oracle GraalVM for JDK: 17.0.15, 21.0.7 and 24.0.1; Oracle GraalVM Enterprise Edition: 21.3.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. While the vulnerability is in Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 8.6 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N).
[]
null
8.6
null
null
null
GHSA-79m3-vm8c-387r
Denial of service in Windows NT IIS server using ..\..
[]
null
null
null
null
null
GHSA-ggj7-gjcg-p52j
Multiple buffer overflows in php_iisfunc.dll in the iisfunc extension for PHP 5.2.0 and earlier allow context-dependent attackers to execute arbitrary code, probably during Unicode conversion, as demonstrated by a long string in the first argument to the iis_getservicestate function, related to the ServiceId argument to the (1) fnStartService, (2) fnGetServiceState, (3) fnStopService, and possibly other functions.
[]
null
null
null
null
null
GHSA-962x-cm53-4293
Luxion KeyShot Viewer KSP File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Luxion KeyShot Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of KSP files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-22267.
[]
null
null
7.8
null
null
CVE-2024-33904
In plugins/HookSystem.cpp in Hyprland through 0.39.1 (before 28c8561), through a race condition, a local attacker can cause execution of arbitrary assembly code by writing to a predictable temporary file.
[ "cpe:2.3:a:hyprland:hyprland:*:*:*:*:*:*:*:*" ]
null
7
null
null
null
GHSA-93p6-9cxv-5rpq
juzawebCMS Incorrect Access Control vulnerability
juzaweb <= 3.4 is vulnerable to Incorrect Access Control, resulting in an application outage after a 500 HTTP status code. The payload in the timezone field was not correctly validated.
[]
null
4.9
null
null
null
GHSA-jfcv-jv9g-2vx2
Bouncy Castle for Java has Uncontrolled Resource Consumption Vulnerability
Uncontrolled Resource Consumption vulnerability in Legion of the Bouncy Castle Inc. Bouncy Castle for Java FIPS bc-fips on All (API modules) allows Excessive Allocation. This vulnerability is associated with program files org/bouncycastle/crypto/fips/AESNativeCBC.Java.This issue affects Bouncy Castle for Java FIPS: from BC-FJA 2.1.0 through 2.1.0.
[]
5.9
null
null
null
null
GHSA-w35c-2369-qfrj
Heap-based buffer overflow in isakmpd on OpenBSD 3.4 through 3.6 allows local users to cause a denial of service (panic) and corrupt memory via IPSEC credentials on a socket.
[]
null
null
null
null
null
CVE-2021-3652
A flaw was found in 389-ds-base. If an asterisk is imported as password hashes, either accidentally or maliciously, then instead of being inactive, any password will successfully match during authentication. This flaw allows an attacker to successfully authenticate as a user whose password was disabled.
[ "cpe:2.3:a:port389:389-ds-base:*:*:*:*:*:*:*:*" ]
null
6.5
null
6.4
null
CVE-2025-29789
OpenEMR Has Directory Traversal in Load Code feature
OpenEMR is a free and open source electronic health records and medical practice management application. Versions prior to 7.3.0 are vulnerable to Directory Traversal in the Load Code feature. Version 7.3.0 contains a patch for the issue.
[]
4.6
null
null
null
null
CVE-2016-10729
An issue was discovered in Amanda 3.3.1. A user with backup privileges can trivially compromise a client installation. The "runtar" setuid root binary does not check for additional arguments supplied after --create, allowing users to manipulate commands and perform command injection as root.
[ "cpe:2.3:a:zmanda:amanda:3.3.1:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*" ]
null
null
7.8
7.2
null
GHSA-9r4h-2cr5-xvhv
An issue was discovered on Mitsubishi Electric ME-RTU devices through 2.02 and INEA ME-RTU devices through 3.0. Stored cleartext passwords could allow an unauthenticated attacker to obtain configured username and password combinations on the RTU due to the weak credentials management on the RTU. An unauthenticated user can obtain the exposed password credentials to gain access to the following services: DDNS service, Mobile Network Provider, and OpenVPN service.
[]
null
9.8
null
null
null
CVE-2013-0679
Directory traversal vulnerability in the web server in Siemens WinCC before 7.2, as used in SIMATIC PCS7 before 8.0 SP1 and other products, allows remote authenticated users to read arbitrary files via vectors involving a query for a pathname.
[ "cpe:2.3:a:siemens:simatic_pcs7:*:*:*:*:*:*:*:*", "cpe:2.3:a:siemens:simatic_pcs7:7.1:sp3:*:*:*:*:*:*", "cpe:2.3:a:siemens:wincc:*:*:*:*:*:*:*:*", "cpe:2.3:a:siemens:wincc:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:siemens:wincc:5.0:sp1:*:*:*:*:*:*", "cpe:2.3:a:siemens:wincc:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:siemens:wincc:6.0:sp2:*:*:*:*:*:*", "cpe:2.3:a:siemens:wincc:6.0:sp3:*:*:*:*:*:*", "cpe:2.3:a:siemens:wincc:6.0:sp4:*:*:*:*:*:*", "cpe:2.3:a:siemens:wincc:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:siemens:wincc:7.0:sp1:*:*:*:*:*:*", "cpe:2.3:a:siemens:wincc:7.0:sp2:*:*:*:*:*:*", "cpe:2.3:a:siemens:wincc:7.0:sp3:*:*:*:*:*:*" ]
null
null
null
4
null
GHSA-xwrr-h965-6hx9
A vulnerability has been identified in Teamcenter Visualization V14.3 (All versions < V14.3.0.13), Teamcenter Visualization V2312 (All versions < V2312.0009), Teamcenter Visualization V2406 (All versions < V2406.0007), Teamcenter Visualization V2412 (All versions < V2412.0002), Tecnomatix Plant Simulation V2302 (All versions < V2302.0021), Tecnomatix Plant Simulation V2404 (All versions < V2404.0010). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted WRL files. This could allow an attacker to execute code in the context of the current process.
[]
7.3
7.8
null
null
null
GHSA-32fj-r8qw-r8w8
MindsDB Cross-site Scripting vulnerability
A cross-site scripting (XSS) vulnerability exists in all versions of the MindsDB platform, enabling the execution of a JavaScript payload whenever a user enumerates an ML Engine, database, project, or dataset containing arbitrary JavaScript code within the web UI.
[]
6.4
9
null
null
null
CVE-2024-5895
SourceCodester Employee and Visitor Gate Pass Logging System delete_users sql injection
A vulnerability, which was classified as critical, has been found in SourceCodester Employee and Visitor Gate Pass Logging System 1.0. This issue affects the function delete_users of the file /classes/Users.php?f=delete. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-268139.
[ "cpe:2.3:a:sourcecodester:employee_visitor_gatepass_logging_system:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:oretnom23:employee_and_visitor_gate_pass_logging_system:1.0:*:*:*:*:*:*:*" ]
5.3
6.3
6.3
6.5
null
GHSA-76wm-4p7c-3hw9
Use-after-free vulnerability in OptiPNG 0.6.4 allows remote attackers to execute arbitrary code via a crafted PNG file.
[]
null
null
8.8
null
null
CVE-2021-47577
io-wq: check for wq exit after adding new worker task_work
In the Linux kernel, the following vulnerability has been resolved: io-wq: check for wq exit after adding new worker task_work We check IO_WQ_BIT_EXIT before attempting to create a new worker, and wq exit cancels pending work if we have any. But it's possible to have a race between the two, where creation checks exit finding it not set, but we're in the process of exiting. The exit side will cancel pending creation task_work, but there's a gap where we add task_work after we've canceled existing creations at exit time. Fix this by checking the EXIT bit post adding the creation task_work. If it's set, run the same cancelation that exit does.
[]
null
null
null
null
null
GHSA-r9jv-2mm6-4c79
Microsoft Office 2007 SP3, Word 2007 SP3, Office 2010 SP1 and SP2, Word 2010 SP1 and SP2, Office for Mac 2011, Office Compatibility Pack SP3, Word Automation Services on SharePoint Server 2010 SP1 and SP2, and Word Web Apps 2010 Gold, SP1, and SP2 allow remote attackers to execute arbitrary code via crafted properties in a Word document, aka "Microsoft Word File Format Vulnerability."
[]
null
null
null
null
null
GHSA-qf26-f55x-v3rc
Ericsson RAN Compute and Site Controller 6610 contains a vulnerability in the Control System where Improper Input Validation can lead to arbitrary code execution, for example to obtain a Linux Shell with the same privileges as the attacker. The attacker would require elevated privileges for example a valid OAM user having the system administrator role to exploit the vulnerability.
[]
null
6.8
null
null
null
GHSA-r22c-45h9-6v6v
A heap-based buffer overflow vulnerability exists in GPAC v1.0.1 in the gf_isom_dovi_config_get function in MP4Box, which causes a denial of service or execute arbitrary code via a crafted file.
[]
null
7.8
null
null
null
GHSA-5278-x3fc-5hx6
VMware vSphere Client 5.5 before U3e and 6.0 before U2a allows remote vCenter Server and ESXi instances to read arbitrary files via an XML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.
[]
null
null
5.8
null
null
RHSA-2024:9451
Red Hat Security Advisory: python3.12 security update
python: cpython: tarfile: ReDos via excessive backtracking while parsing header values
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
7.5
null
null
null
CVE-2023-52154
File Upload vulnerability in pmb/camera_upload.php in PMB 7.4.7 and earlier allows attackers to run arbitrary code via upload of crafted PHTML files.
[ "cpe:2.3:a:pmb_project:pmb:7.4.7:*:*:*:*:*:*:*" ]
null
7.2
null
null
null
CVE-2023-25980
WordPress Optimize Database after Deleting Revisions Plugin <= 5.1 is vulnerable to Cross Site Request Forgery (CSRF)
Cross-Site Request Forgery (CSRF) vulnerability in CAGE Web Design | Rolf van Gelder Optimize Database after Deleting Revisions plugin <= 5.1 versions.
[ "cpe:2.3:a:cagewebdev:optimize_database_after_deleting_revisions:*:*:*:*:*:wordpress:*:*" ]
null
4.3
null
null
null
CVE-2023-43845
Aten PE6208 2.3.228 and 2.4.232 have default credentials for the privileged telnet account. The user is not asked to change the credentials after first login. If not changed, attackers can log in to the telnet console and gain administrator privileges.
[ "cpe:2.3:a:aten:pe6208:2.3.228:*:*:*:*:*:*:*", "cpe:2.3:a:aten:pe6208:2.4.232:*:*:*:*:*:*:*" ]
null
9.8
null
null
null
CVE-2006-0552
Unspecified vulnerability in the Net Listener component of Oracle Database server 8.1.7.4, 9.0.1.5, 9.0.1.5 FIPS, and 9.2.0.7 has unspecified impact and attack vectors, as identified by Oracle Vuln# DB11.
[ "cpe:2.3:a:oracle:10g_enterprise_manager_grid_control:10.1_.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:10g_enterprise_manager_grid_control:10.1_.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:application_server:1.0.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:application_server:1.0.2.2:r1:*:*:*:*:*:*", "cpe:2.3:a:oracle:application_server:9.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:application_server:9.0.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:application_server:9.0.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:application_server:10.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:application_server:10.1.2.0.0:r2:*:*:*:*:*:*", "cpe:2.3:a:oracle:application_server:10.1.2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:application_server:10.1.2.0.1:r2:*:*:*:*:*:*", "cpe:2.3:a:oracle:application_server:10.1.2.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:application_server:10.1.2.0.2:r2:*:*:*:*:*:*", "cpe:2.3:a:oracle:application_server:10.1.2.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:collaboration_suite:9.0.4.2:r2:*:*:*:*:*:*", "cpe:2.3:a:oracle:collaboration_suite:10.1.1:r1:*:*:*:*:*:*", "cpe:2.3:a:oracle:collaboration_suite:10.1.2:r1:*:*:*:*:*:*", "cpe:2.3:a:oracle:collaboration_suite:release_1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:database_server:8.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:database_server:8.0.6.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:database_server:8.1.7.4:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:developer_suite:9.0.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:developer_suite:9.0.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:developer_suite:9.0.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:developer_suite:10.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:e-business_suite:11.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:e-business_suite:11.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:e-business_suite:11.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:e-business_suite:11.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:e-business_suite:11.5.5:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:e-business_suite:11.5.6:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:e-business_suite:11.5.7:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:e-business_suite:11.5.8:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:e-business_suite:11.5.9:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:e-business_suite:11.5.10:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:enterpriseone:8.95.f1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:enterpriseone:sp23_l1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:oracle10g:enterprise_10.1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:oracle10g:enterprise_10.1.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:oracle10g:personal_10.1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:oracle10g:personal_10.1.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:oracle10g:standard_10.1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:oracle10g:standard_10.1.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:oracle10g:standard_10.1.0.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:oracle10g:standard_10.1.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:oracle10g:standard_10.2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:oracle8i:enterprise_8.1.7.4:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:oracle8i:standard_8.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:oracle8i:standard_8.0.6.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:oracle8i:standard_8.1.7.4:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:oracle9i:enterprise_9.0.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:oracle9i:enterprise_9.0.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:oracle9i:enterprise_9.0.1.5_fips:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:oracle9i:standard_9.2.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:oracle9i:standard_9.2.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:peoplesoft_enterprise_portal:8.4:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:peoplesoft_enterprise_portal:8.8:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:peoplesoft_enterprise_portal:8.9:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:workflow:11.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:workflow:11.5.9.5:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
GHSA-g4mg-gr2v-j36g
kicq IRC client 1.0.0, and possibly later versions, allows remote attackers to execute arbitrary commands via shell metacharacters in a URL.
[]
null
null
null
null
null
CVE-2025-30475
Dell PowerScale InsightIQ, versions 5.0 through 5.2, contains an improper privilege management vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to elevation of privileges.
[]
null
8.1
null
null
null
CVE-2015-6146
Microsoft Internet Explorer 7 and 8 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-6145.
[ "cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*" ]
null
null
null
9.3
null
CVE-2018-7186
Leptonica before 1.75.3 does not limit the number of characters in a %s format argument to fscanf or sscanf, which allows remote attackers to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a long string, as demonstrated by the gplotRead and ptaReadStream functions.
[ "cpe:2.3:a:leptonica:leptonica:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*" ]
null
null
9.8
7.5
null
GHSA-hqc2-r8jq-7rg7
Multiple vulnerabilities in Cisco Expressway Series and Cisco TelePresence Video Communication Server (VCS) could allow an authenticated attacker with Administrator-level read-only credentials to elevate their privileges to Administrator with read-write credentials on an affected system. Note: "Cisco Expressway Series" refers to Cisco Expressway Control (Expressway-C) devices and Cisco Expressway Edge (Expressway-E) devices. For more information about these vulnerabilities, see the Details section of this advisory.
[]
null
null
9.6
null
null
RHSA-2017:0698
Red Hat Security Advisory: subscription-manager security, bug fix, and enhancement update
subscription-manager: sensitive world readable files in /var/lib/rhsm/
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
3.3
null
null
CVE-2018-4833
A vulnerability has been identified in RFID 181EIP (All versions), RUGGEDCOM Win (V4.4, V4.5, V5.0, and V5.1), SCALANCE X-200 switch family (incl. SIPLUS NET variants) (All versions < V5.2.3), SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) (All versions < V5.4.1), SCALANCE X-200RNA switch family (All versions < V3.2.6), SCALANCE X-300 switch family (incl. SIPLUS NET variants) (All versions < V4.1.3), SCALANCE X408 (All versions < V4.1.3), SCALANCE X414 (All versions), SIMATIC RF182C (All versions). Unprivileged remote attackers located in the same local network segment (OSI Layer 2) could gain remote code execution on the affected products by sending a specially crafted DHCP response to a client's DHCP request.
[ "cpe:2.3:o:siemens:rfid_181-eip_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:rfid_181-eip:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:ruggedcom_wimax_firmware:4.4:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:ruggedcom_wimax_firmware:4.5:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:ruggedcom_wimax:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_x200_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_x200:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_x200irt_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_x200irt:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_x204rna_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_x204rna:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_x300_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_x300:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_x408_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_x408:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_x414_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_x414:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_rf182c_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_rf182c:-:*:*:*:*:*:*:*" ]
null
null
8.8
5.8
null
CVE-2017-18794
Certain NETGEAR devices are affected by command injection. This affects R6300v2 before 1.0.4.8_10.0.77, R6400 before 1.0.1.24, R6700 before 1.0.1.26, R7000 before 1.0.9.10, R7100LG before 1.0.0.32, R7900 before 1.0.1.18, R8000 before 1.0.3.54, R8500 before 1.0.2.100, and D6100 before 1.0.0.50_0.0.50.
[ "cpe:2.3:o:netgear:r6300_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r6300:v2:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r6400_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r6400:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r6700_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r6700:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r7000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r7000:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r7100lg_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r7100lg:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r7900_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r7900:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r8000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r8000:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r8500_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r8500:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:d6100_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:d6100:-:*:*:*:*:*:*:*" ]
null
null
8.4
null
null
GHSA-3hhc-gfj2-qgg7
Tablet Windows User Interface Application Core Remote Code Execution Vulnerability
[]
null
7.8
null
null
null
GHSA-x788-3f4q-pfrc
Totolink A3600R_Firmware V4.1.2cu.5182_B20201102 contains a hard code password for root in /etc/shadow.sample.
[]
null
9.8
null
null
null
GHSA-6q3f-wf4j-86jw
Buffer overflow in the make_http_soap_request function in PHP before 5.2.2 has unknown impact and remote attack vectors, possibly related to "/" (slash) characters.
[]
null
null
null
null
null
CVE-2025-2394
Ecovacs Home Android and iOS Mobile Applications up to version 3.3.0 contained embedded access keys and secrets for Alibaba Object Storage Service (OSS), leading to sensitive data disclosure.
[]
4.7
null
null
null
null
GHSA-gh38-h668-j7v8
lunary-ai/lunary versions prior to 1.9.24 are vulnerable to stored cross-site scripting (XSS). An unauthenticated attacker can inject malicious JavaScript into the `v1/runs/ingest` endpoint by adding an empty `citations` field, triggering a code path where `dangerouslySetInnerHTML` is used to render attacker-controlled text. This vulnerability allows the execution of arbitrary JavaScript in the context of the user's browser, potentially leading to session hijacking, data theft, or other malicious actions.
[]
null
null
9.1
null
null
CVE-2008-6904
Multiple unspecified vulnerabilities in Sophos SAVScan 4.33.0 for Linux, and possibly other products and versions, allow remote attackers to cause a denial of service (segmentation fault) and possibly execute arbitrary code via crafted files that have been packed with (1) armadillo, (2) asprotect, or (3) asprotectSKE.
[ "cpe:2.3:a:sophos:anti-virus:4.7.18:*:windows-nt:*:*:*:*:*", "cpe:2.3:a:sophos:anti-virus:4.7.18:*:windows_9x:*:*:*:*:*", "cpe:2.3:a:sophos:anti-virus:4.9.18:*:os_x:*:*:*:*:*", "cpe:2.3:a:sophos:anti-virus:4.37.0:*:netware:*:*:*:*:*", "cpe:2.3:a:sophos:anti-virus:6.4.5:*:linux:*:*:*:*:*", "cpe:2.3:a:sophos:anti-virus:7.0.5:*:unix:*:*:*:*:*", "cpe:2.3:a:sophos:anti-virus7.6.3:*:windows:*:*:*:*:*:*" ]
null
null
null
10
null
RHSA-2013:1815
Red Hat Security Advisory: php security update
php: memory corruption in openssl_x509_parse()
[ "cpe:/a:redhat:rhel_software_collections:1::el6" ]
null
null
null
null
null
RHSA-2023:6154
Red Hat Security Advisory: Secondary Scheduler Operator for Red Hat OpenShift 1.2.0
golang: html/template: improper handling of HTML-like comments within script contexts golang: html/template: improper handling of special tags within script contexts golang: crypto/tls: panic when processing post-handshake message on QUIC connections golang: crypto/tls: lack of a limit on buffered post-handshake golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
[ "cpe:/a:redhat:openshift_secondary_scheduler:1.2::el8" ]
null
7.5
null
null
null
GHSA-cxfx-p56g-q7q5
An attacker could send an authenticated HTTP request to trigger this vulnerability in Insteon Hub running firmware version 1012. At 0x9d01c318 the value for the s_port key is copied using strcpy to the buffer at 0xa00017f4. This buffer is 6 bytes large, sending anything longer will cause a buffer overflow. The destination can also be shifted by using an sn_speaker parameter between "0" and "3".
[]
null
null
9.9
null
null
CVE-2025-33020
IBM Engineering Systems Design Rhapsody information disclosure
IBM Engineering Systems Design Rhapsody 9.0.2, 10.0, and 10.0.1 transmits sensitive information without encryption that could allow an attacker to obtain highly sensitive information.
[ "cpe:2.3:a:ibm:rhapsody_design_manager:9.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rhapsody_design_manager:10.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rhapsody_design_manager:10.0.1:*:*:*:*:*:*:*" ]
null
5.9
null
null
null