id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
189k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
patch_commit_url
stringlengths
36
232
CVE-2014-0652
Cross-site scripting (XSS) vulnerability in the Mappings page in Cisco Context Directory Agent (CDA) allows remote attackers to inject arbitrary web script or HTML via a crafted URL, aka Bug ID CSCuj45358.
[ "cpe:2.3:a:cisco:context_directory_agent:-:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
GHSA-r2cc-gvv2-cfgr
Joomla! Core is prone to an information disclosure vulnerability. Attackers can exploit this issue to obtain sensitive information that may help in launching further attacks. Joomla! Core versions 1.5.x ranging from 1.5.0 and up to and including 1.5.15 are vulnerable.
[]
null
null
null
null
null
GHSA-h5p6-p2x9-xj23
In Jspxcms 9.0.0, a vulnerable URL routing implementation allows remote code execution after logging in as web admin.
[]
null
null
7.2
null
null
CVE-2004-1099
Cisco Secure Access Control Server for Windows (ACS Windows) and Cisco Secure Access Control Server Solution Engine (ACS Solution Engine) 3.3.1, when the EAP-TLS protocol is enabled, does not properly handle expired or untrusted certificates, which allows remote attackers to bypass authentication and gain unauthorized access via a "cryptographically correct" certificate with valid fields such as the username.
[ "cpe:2.3:a:cisco:secure_access_control_server:3.3\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_access_control_server:3.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_acs_solution_engine:*:*:*:*:*:*:*:*" ]
null
null
null
10
null
CVE-2021-41403
flatCore-CMS version 2.0.8 calls dangerous functions, causing server-side request forgery vulnerabilities.
[ "cpe:2.3:a:flatcore:flatcore-cms:2.0.8:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
null
GHSA-636h-mxq5-vj54
Buffer overflow in the text editor functionality in HP-UX 10.01 through 11.04 on HP9000 Series 700 and Series 800 allows local users to cause a denial of service ("system availability") via text editors such as (1) e, (2) ex, (3) vi, (4) edit, (5) view, and (6) vedit.
[]
null
null
null
null
null
CVE-2025-47730
The TeleMessage archiving backend through 2025-05-05 accepts API calls (to request an authentication token) from the TM SGNL (aka Archive Signal) app with the credentials of logfile for the user and enRR8UVVywXYbFkqU#QDPRkO for the password.
[]
null
4.8
null
null
null
GHSA-qxqg-ggrj-3mjf
A vulnerability in the web-based management interface of the Wireless LAN Controller feature of Cisco IOS XE Software could allow an authenticated, remote attacker with a lobby ambassador user account to perform a command injection attack against an affected device.This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending crafted input to the web-based management interface. A successful exploit could allow the attacker to execute arbitrary Cisco IOS XE Software CLI commands with privilege level 15.Note: This vulnerability is exploitable only if the attacker obtains the credentials for a lobby ambassador account. This account is not configured by default.
[]
null
8.8
null
null
null
GHSA-prg8-f8c5-v3hj
Huawei PCManager with versions earlier than 10.0.1.36 has a privilege escalation vulnerability. Due to improper permission management of specific files, local attackers with low permissions can inject commands to exploit this vulnerability. Successful exploit may cause privilege escalation.
[]
null
null
null
null
null
GHSA-qwff-3j78-f8jm
In applyCustomDescription of SaveUi.java, there is a possible way to view images belonging to a different user due to a missing permission check. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.
[]
null
3.3
null
null
null
CVE-2024-13193
SEMCMS Image Library Management Page SEMCMS_Images.php sql injection
A vulnerability has been found in SEMCMS up to 4.8 and classified as critical. Affected by this vulnerability is an unknown functionality of the file SEMCMS_Images.php of the component Image Library Management Page. The manipulation leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
[]
5.3
6.3
6.3
6.5
https://github.com/Upgradeextension/SEMCMS/blob/main/README.md
CVE-2007-0642
SQL injection vulnerability in tForum 2.00 in the Raymond BERTHOU script collection (aka RBL - ASP) allows remote attackers to execute arbitrary SQL commands via the (1) id and (2) pass to user_confirm.asp.
[ "cpe:2.3:a:rbl:tforum:2.00:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2006-2486
SQL injection vulnerability in find.php in YapBB 1.2 Beta2 and earlier allows remote attackers to execute arbitrary SQL commands via the userID parameter.
[ "cpe:2.3:a:yapbb:yapbb:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:yapbb:yapbb:1.2:*:*:*:*:*:*:*", "cpe:2.3:a:yapbb:yapbb:1.2_beta2:*:*:*:*:*:*:*" ]
null
null
null
6.4
null
PYSEC-2024-98
null
** UNSUPPORTED WHEN ASSIGNED ** Incorrect Authorization vulnerability in Apache Submarine Server Core. This issue affects Apache Submarine Server Core: from 0.8.0. As this project is retired, we do not plan to release a version that fixes this issue. Users are recommended to find an alternative or restrict access to the instance to trusted users. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
[]
null
9.8
null
null
null
GHSA-84x2-p8rx-5q4g
Tinxy WiFi Lock Controller v1 RF was discovered to be configured to transmit on an open Wi-Fi network, allowing attackers to join the network without authentication.
[]
null
9.1
null
null
null
CVE-2021-40239
A Buffer Overflow vulnerability exists in the latest version of Miniftpd in the do_retr function in ftpproto.c
[ "cpe:2.3:a:miniftpd_project:miniftpd:1.0:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
null
GHSA-rfx3-ffrp-6875
Duplicate Advisory: sequoia-openpgp vulnerable to out-of-bounds array access leading to panic
Duplicate AdvisoryThis advisory has been withdrawn because it is a duplicate of GHSA-25mx-8f3v-8wh7. This link is maintained to preserve external references.Original DescriptionThe sequoia-openpgp crate before 1.16.0 for Rust allows out-of-bounds array access and a panic.
[]
null
2.9
null
null
null
GHSA-qxrr-wrhx-j83r
User invites for Funkwhale v1.2.8 do not permanently expire after being used for signup and can be used again after an account has been deleted.
[]
null
5.3
null
null
null
CVE-2010-4253
Heap-based buffer overflow in Impress in OpenOffice.org (OOo) 2.x and 3.x before 3.3 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PNG file in an ODF or Microsoft Office document, as demonstrated by a PowerPoint (aka PPT) document.
[ "cpe:2.3:a:apache:openoffice:*:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*" ]
null
null
null
9.3
null
RHSA-2021:0318
Red Hat Security Advisory: Red Hat Single Sign-On 7.4.5 security update on RHEL 6
keycloak: Default Client configuration is vulnerable to SSRF using "request_uri" parameter
[ "cpe:/a:redhat:red_hat_single_sign_on:7::el6" ]
null
5.8
null
null
null
CVE-2019-12679
Cisco Firepower Management Center SQL Injection Vulnerabilities
Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to execute arbitrary SQL injections on an affected device. These vulnerabilities exist due to improper input validation. An attacker could exploit these vulnerabilities by sending crafted SQL queries to an affected device. A successful exploit could allow the attacker to view information that they are not authorized to view, make changes to the system that they are not authorized to make, and execute commands within the underlying operating system that may affect the availability of the device.
[ "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2:*:*:*:*:*:*:*" ]
null
null
8.8
null
null
CVE-2018-13400
Several administrative resources in Atlassian Jira before version 7.6.9, from version 7.7.0 before version 7.7.5, from version 7.8.0 before version 7.8.5, from version 7.9.0 before version 7.9.3, from version 7.10.0 before version 7.10.3, from version 7.11.0 before version 7.11.3, from version 7.12.0 before version 7.12.3, and before version 7.13.1 allow remote attackers who have obtained access to administrator's session to access certain administrative resources without needing to re-authenticate to pass "WebSudo" through an improper access control vulnerability.
[ "cpe:2.3:a:atlassian:jira:*:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:jira_server:*:*:*:*:*:*:*:*" ]
null
null
4.7
6.5
null
RHSA-2021:1245
Red Hat Security Advisory: gnutls and nettle security update
nettle: Out of bounds memory access in signature verification
[ "cpe:/a:redhat:rhel_eus:8.1::appstream", "cpe:/o:redhat:rhel_eus:8.1::baseos" ]
null
8.1
null
null
null
CVE-2025-54569
In Malwarebytes Binisoft Windows Firewall Control before 6.16.0.0, the installer is vulnerable to local privilege escalation.
[]
null
4.5
null
null
null
GHSA-2mjp-jj8g-xrmh
Vulnerability of improper permission control in the window management module Impact: Successful exploitation of this vulnerability may affect service confidentiality.
[]
null
7.8
null
null
null
CVE-2024-7460
OSWAPP Warehouse Inventory System change_password.php cross-site request forgery
A vulnerability was found in OSWAPP Warehouse Inventory System 1.0/2.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /change_password.php. The manipulation leads to cross-site request forgery. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-273553 was assigned to this vulnerability.
[ "cpe:2.3:a:oswapp:warehouse_inventory_system:*:*:*:*:*:*:*:*", "cpe:2.3:a:siamonhasan:warehouse_inventory_system:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:siamonhasan:warehouse_inventory_system:2.0:*:*:*:*:*:*:*" ]
6.9
4.3
4.3
5
null
GHSA-c4m9-c23m-m88f
SGUDA U-Lock central lock control service’s lock management function has incorrect authorization. A remote attacker with general privilege can exploit this vulnerability to call privileged APIs to acquire information, manipulate or disrupt the functionality of arbitrary electronic locks.
[]
null
8.8
null
null
null
CVE-2021-31532
NXP LPC55S6x microcontrollers (0A and 1B), i.MX RT500 (silicon rev B1 and B2), i.MX RT600 (silicon rev A0, B0), LPC55S6x, LPC55S2x, LPC552x (silicon rev 0A, 1B), LPC55S1x, LPC551x (silicon rev 0A) and LPC55S0x, LPC550x (silicon rev 0A) include an undocumented ROM patch peripheral that allows unsigned, non-persistent modification of the internal ROM.
[ "cpe:2.3:o:nxp:lpc55s69jbd100_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:nxp:lpc55s69jbd100:0a:*:*:*:*:*:*:*", "cpe:2.3:h:nxp:lpc55s69jbd100:1b:*:*:*:*:*:*:*", "cpe:2.3:o:nxp:lpc55s66jbd100_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:nxp:lpc55s66jbd100:0a:*:*:*:*:*:*:*", "cpe:2.3:h:nxp:lpc55s66jbd100:1b:*:*:*:*:*:*:*", "cpe:2.3:o:nxp:lpc55s69jev98_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:nxp:lpc55s69jev98:0a:*:*:*:*:*:*:*", "cpe:2.3:h:nxp:lpc55s69jev98:1b:*:*:*:*:*:*:*", "cpe:2.3:o:nxp:lpcs66jev98_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:nxp:lpcs66jev98:0a:*:*:*:*:*:*:*", "cpe:2.3:h:nxp:lpcs66jev98:1b:*:*:*:*:*:*:*", "cpe:2.3:o:nxp:lpc55s69jbd64_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:nxp:lpc55s69jbd64:0a:*:*:*:*:*:*:*", "cpe:2.3:h:nxp:lpc55s69jbd64:1b:*:*:*:*:*:*:*", "cpe:2.3:o:nxp:lpcs66jbd64_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:nxp:lpcs66jbd64:0a:*:*:*:*:*:*:*", "cpe:2.3:h:nxp:lpcs66jbd64:1b:*:*:*:*:*:*:*", "cpe:2.3:o:nxp:i.mx_rt500_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:nxp:i.mx_rt500:b1:*:*:*:*:*:*:*", "cpe:2.3:h:nxp:i.mx_rt500:b2:*:*:*:*:*:*:*", "cpe:2.3:o:nxp:i.mx_rt600_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:nxp:i.mx_rt600:a0:*:*:*:*:*:*:*", "cpe:2.3:h:nxp:i.mx_rt600:b0:*:*:*:*:*:*:*", "cpe:2.3:o:nxp:lpc55s28_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:nxp:lpc55s28:0a:*:*:*:*:*:*:*", "cpe:2.3:h:nxp:lpc55s28:1b:*:*:*:*:*:*:*", "cpe:2.3:o:nxp:lpc55s26_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:nxp:lpc55s26:0a:*:*:*:*:*:*:*", "cpe:2.3:h:nxp:lpc55s26:1b:*:*:*:*:*:*:*", "cpe:2.3:o:nxp:lpc5528_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:nxp:lpc5528:0a:*:*:*:*:*:*:*", "cpe:2.3:h:nxp:lpc5528:1b:*:*:*:*:*:*:*", "cpe:2.3:o:nxp:lpc5526_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:nxp:lpc5526:0a:*:*:*:*:*:*:*", "cpe:2.3:h:nxp:lpc5526:1b:*:*:*:*:*:*:*", "cpe:2.3:o:nxp:lpc55s16jbd100_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:nxp:lpc55s16jbd100:0a:*:*:*:*:*:*:*", "cpe:2.3:o:nxp:lpc55s16jev98_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:nxp:lpc55s16jev98:0a:*:*:*:*:*:*:*", "cpe:2.3:o:nxp:lpc55s16jbd64_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:nxp:lpc55s16jbd64:0a:*:*:*:*:*:*:*", "cpe:2.3:o:nxp:lpc55s14jbd100_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:nxp:lpc55s14jbd100:0a:*:*:*:*:*:*:*", "cpe:2.3:o:nxp:lpc55s14jbd64_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:nxp:lpc55s14jbd64:0a:*:*:*:*:*:*:*", "cpe:2.3:o:nxp:lpc5516jbd100_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:nxp:lpc5516jbd100:0a:*:*:*:*:*:*:*", "cpe:2.3:o:nxp:lpc5516jev98_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:nxp:lpc5516jev98:0a:*:*:*:*:*:*:*", "cpe:2.3:o:nxp:lpc5516jbd64_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:nxp:lpc5516jbd64:0a:*:*:*:*:*:*:*", "cpe:2.3:o:nxp:lpc5514jbd100_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:nxp:lpc5514jbd100:0a:*:*:*:*:*:*:*", "cpe:2.3:o:nxp:lpc5514jbd64_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:nxp:lpc5514jbd64:0a:*:*:*:*:*:*:*", "cpe:2.3:o:nxp:lpc5512jbd100_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:nxp:lpc5512jbd100:0a:*:*:*:*:*:*:*", "cpe:2.3:o:nxp:lpc5512jbd64_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:nxp:lpc5512jbd64:0a:*:*:*:*:*:*:*" ]
null
6.8
null
4.6
null
GHSA-9f46-5r25-5wfm
Time-of-check Time-of-use (TOCTOU) Race Condition in league/flysystem
ImpactThe whitespace normalisation using in 1.x and 2.x removes any unicode whitespace. Under certain specific conditions this could potentially allow a malicious user to execute code remotely.The conditions:A user is allowed to supply the path or filename of an uploaded file.The supplied path or filename is not checked against unicode chars.The supplied pathname checked against an extension deny-list, not an allow-list.The supplied path or filename contains a unicode whitespace char in the extension.The uploaded file is stored in a directory that allows PHP code to be executed.Given these conditions are met a user can upload and execute arbitrary code on the system under attack.PatchesThe unicode whitespace removal has been replaced with a rejection (exception).The library has been patched in:1.x: https://github.com/thephpleague/flysystem/commit/f3ad69181b8afed2c9edf7be5a2918144ff4ea322.x: https://github.com/thephpleague/flysystem/commit/a3c694de9f7e844b76f9d1b61296ebf6e8d89d74WorkaroundsFor 1.x users, upgrade to 1.1.4. For 2.x users, upgrade to 2.1.1.
[]
null
9.8
null
null
null
CVE-2012-1987
Unspecified vulnerability in Puppet 2.6.x before 2.6.15 and 2.7.x before 2.7.13, and Puppet Enterprise (PE) Users 1.0, 1.1, 1.2.x, 2.0.x, and 2.5.x before 2.5.1 allows remote authenticated users with agent SSL keys to (1) cause a denial of service (memory consumption) via a REST request to a stream that triggers a thread block, as demonstrated using CVE-2012-1986 and /dev/random; or (2) cause a denial of service (filesystem consumption) via crafted REST requests that use "a marshaled form of a Puppet::FileBucket::File object" to write to arbitrary file locations.
[ "cpe:2.3:a:puppet:puppet:2.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet:2.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet:2.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet:2.6.3:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet:2.6.4:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet:2.6.5:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet:2.6.6:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet:2.6.7:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet:2.6.8:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet:2.6.9:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet:2.6.10:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet:2.6.11:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet:2.6.12:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet:2.6.13:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet:2.6.14:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet:2.7.2:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet:2.7.3:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet:2.7.4:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet:2.7.5:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet:2.7.6:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet:2.7.7:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet:2.7.8:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet:2.7.9:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet:2.7.10:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet:2.7.11:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet_enterprise:2.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:puppetlabs:puppet:2.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:puppetlabs:puppet:2.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet_enterprise:1.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet_enterprise:1.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet_enterprise:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet_enterprise:1.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet_enterprise:1.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet_enterprise:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet_enterprise:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet_enterprise:2.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:puppetlabs:puppet_enterprise_users:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:puppetlabs:puppet_enterprise_users:1.1:*:*:*:*:*:*:*" ]
null
null
null
3.5
null
GHSA-hj5x-qxpc-fwvm
Improper input validation in the installer for Zoom for Windows clients before 5.14.0 may allow an authenticated user to potentially enable an escalation of privilege via local access.
[]
null
7.3
null
null
null
GHSA-gj46-3ff3-vj53
The frag3 preprocessor in Snort 2.6.1.1, 2.6.1.2, and 2.7.0 beta, when configured for inline use on Linux without the ip_conntrack module loaded, allows remote attackers to cause a denial of service (segmentation fault and application crash) via certain UDP packets produced by send_morefrag_packet and send_overlap_packet.
[]
null
null
null
null
null
GHSA-f445-jjfc-wcm9
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in AAM Advanced Access Manager allows Reflected XSS.This issue affects Advanced Access Manager: from n/a through 6.9.20.
[]
null
7.1
null
null
null
GHSA-m28q-9cc4-gj6h
A guest can trigger an infinite loop in the hda audio driver.
[]
null
null
null
null
null
GHSA-2gf8-x72h-g57r
** UNSUPPORTED WHEN ASSIGNED ** Improper neutralization of a SQL Command leading to SQL Injection vulnerability impacting end-of-life Secure Remote Access (SRA) products, specifically the SRA appliances running all 8.x firmware and 9.0.0.9-26sv or earlier.
[]
null
9.8
null
null
null
GHSA-87qj-crf6-m933
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in gavias Enzio - Responsive Business WordPress Theme allows PHP Local File Inclusion. This issue affects Enzio - Responsive Business WordPress Theme: from n/a through 1.1.8.
[]
null
8.1
null
null
null
CVE-2012-3847
slssvc.exe in Invensys Wonderware SuiteLink in Invensys InTouch 2012 and Wonderware Application Server 2012 allows remote attackers to cause a denial of service (resource consumption) via a long Unicode string, a different vulnerability than CVE-2012-3007.
[ "cpe:2.3:a:invensys:intouch:2012:*:*:*:*:*:*:*", "cpe:2.3:a:invensys:wonderware_application_server:2012:*:*:*:*:*:*:*" ]
null
null
null
5
null
CVE-2017-0866
An elevation of privilege vulnerability in the Direct rendering infrastructure of the NVIDIA Tegra X1 where an unchecked input from userspace is passed as a pointer to kfree. This could lead to kernel memory corruption and possible code execution. This issue is rated as moderate. Product: Pixel. Version: N/A. Android ID: A-38415808. References: N-CVE-2017-0866.
[ "cpe:2.3:o:nvidia:tegra_x1_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:nvidia:tegra_x1:-:*:*:*:*:*:*:*" ]
null
null
7.8
7.2
null
CVE-2014-8514
Buffer overflow in an ActiveX control in MDraw30.ocx in Schneider Electric ProClima before 6.1.7 allows remote attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2014-8513 and CVE-2014-9188. NOTE: this may be clarified later based on details provided by researchers.
[ "cpe:2.3:a:schneider_electric:proclima:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
GHSA-qf8p-gpw6-r52g
Cloud Foundry UAA Release, versions prior to 71.0, allows clients to be configured with an insecure redirect uri. Given a UAA client was configured with a wildcard in the redirect uri's subdomain, a remote malicious unauthenticated user can craft a phishing link to get a UAA access code from the victim.
[]
null
null
6.1
null
null
GHSA-7www-mq2f-45h7
The Codeeta Coupons (aka com.codeeta.promos) application 1.0.5 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[]
null
null
null
null
null
CVE-2011-4314
message/ax/AxMessage.java in OpenID4Java before 0.9.6 final, as used in JBoss Enterprise Application Platform 5.1 before 5.1.2, Step2, Kay Framework before 1.0.2, and possibly other products does not verify that Attribute Exchange (AX) information is signed, which allows remote attackers to modify potentially sensitive AX information without detection via a man-in-the-middle (MITM) attack.
[ "cpe:2.3:a:kay_framework_project:kay_framework:*:*:*:*:*:*:*:*", "cpe:2.3:a:kay_framework_project:kay_framework:0.0.0:-:*:*:*:*:*:*", "cpe:2.3:a:kay_framework_project:kay_framework:0.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:kay_framework_project:kay_framework:0.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:kay_framework_project:kay_framework:0.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:kay_framework_project:kay_framework:0.8.0:*:*:*:*:*:*:*", "cpe:2.3:a:kay_framework_project:kay_framework:1.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:openid:openid4java:*:*:*:*:*:*:*:*", "cpe:2.3:a:openid:openid4java:0.9.2:*:*:*:*:*:*:*", "cpe:2.3:a:openid:openid4java:0.9.3:*:*:*:*:*:*:*", "cpe:2.3:a:openid:openid4java:0.9.4.339:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:jboss_enterprise_application_platform:5.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:jboss_enterprise_application_platform:5.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:jboss_enterprise_application_platform:5.1.2:*:*:*:*:*:*:*" ]
null
null
null
5.8
null
CVE-2014-4648
Unspecified vulnerability in Piwigo before 2.6.3 has unknown impact and attack vectors, related to a "security failure."
[ "cpe:2.3:a:piwigo:piwigo:*:*:*:*:*:*:*:*", "cpe:2.3:a:piwigo:piwigo:2.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:piwigo:piwigo:2.6.1:*:*:*:*:*:*:*" ]
null
null
null
10
null
CVE-2022-22050
Windows Fax Service Elevation of Privilege Vulnerability
Windows Fax Service Elevation of Privilege Vulnerability
[ "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*" ]
null
7.8
null
null
null
GHSA-4cqp-8pqq-phx4
Cross-Site Request Forgery (CSRF) vulnerability in Abu Bakar TWB Woocommerce Reviews allows Cross Site Request Forgery. This issue affects TWB Woocommerce Reviews: from n/a through 1.7.7.
[]
null
4.3
null
null
null
GHSA-7hp6-577h-hcgr
python before versions 2.7.15, 3.4.9, 3.5.6rc1, 3.6.5rc1 and 3.7.0 is vulnerable to catastrophic backtracking in pop3lib's apop() method. An attacker could use this flaw to cause denial of service.
[]
null
null
7.5
null
null
CVE-2011-4528
Unbound before 1.4.13p2 attempts to free unallocated memory during processing of duplicate CNAME records in a signed zone, which allows remote DNS servers to cause a denial of service (daemon crash) via a crafted response.
[ "cpe:2.3:a:unbound:unbound:*:*:*:*:*:*:*:*", "cpe:2.3:a:unbound:unbound:0.0:*:*:*:*:*:*:*", "cpe:2.3:a:unbound:unbound:0.1:*:*:*:*:*:*:*", "cpe:2.3:a:unbound:unbound:0.2:*:*:*:*:*:*:*", "cpe:2.3:a:unbound:unbound:0.3:*:*:*:*:*:*:*", "cpe:2.3:a:unbound:unbound:0.4:*:*:*:*:*:*:*", "cpe:2.3:a:unbound:unbound:0.5:*:*:*:*:*:*:*", "cpe:2.3:a:unbound:unbound:0.6:*:*:*:*:*:*:*", "cpe:2.3:a:unbound:unbound:0.7:*:*:*:*:*:*:*", "cpe:2.3:a:unbound:unbound:0.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:unbound:unbound:0.7.2:*:*:*:*:*:*:*", "cpe:2.3:a:unbound:unbound:0.8:*:*:*:*:*:*:*", "cpe:2.3:a:unbound:unbound:0.09:*:*:*:*:*:*:*", "cpe:2.3:a:unbound:unbound:0.10:*:*:*:*:*:*:*", "cpe:2.3:a:unbound:unbound:0.11:*:*:*:*:*:*:*", "cpe:2.3:a:unbound:unbound:1.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:unbound:unbound:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:unbound:unbound:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:unbound:unbound:1.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:unbound:unbound:1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:unbound:unbound:1.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:unbound:unbound:1.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:unbound:unbound:1.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:unbound:unbound:1.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:unbound:unbound:1.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:unbound:unbound:1.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:unbound:unbound:1.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:unbound:unbound:1.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:unbound:unbound:1.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:unbound:unbound:1.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:unbound:unbound:1.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:unbound:unbound:1.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:unbound:unbound:1.4.5:*:*:*:*:*:*:*", "cpe:2.3:a:unbound:unbound:1.4.6:*:*:*:*:*:*:*", "cpe:2.3:a:unbound:unbound:1.4.7:*:*:*:*:*:*:*", "cpe:2.3:a:unbound:unbound:1.4.8:*:*:*:*:*:*:*", "cpe:2.3:a:unbound:unbound:1.4.9:*:*:*:*:*:*:*", "cpe:2.3:a:unbound:unbound:1.4.10:*:*:*:*:*:*:*", "cpe:2.3:a:unbound:unbound:1.4.11:*:*:*:*:*:*:*", "cpe:2.3:a:unbound:unbound:1.4.12:*:*:*:*:*:*:*", "cpe:2.3:a:unbound:unbound:1.4.14:rc1:*:*:*:*:*:*" ]
null
null
null
5
null
GHSA-7c3x-jf6m-c94r
Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used.
[]
null
null
null
null
null
CVE-2024-1656
Affected versions of Octopus Server had a weak content security policy.
[]
null
2.6
null
null
null
GHSA-24q5-v927-9w6j
Missing Authorization vulnerability in Mitchell Bennis Simple File List allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Simple File List: from n/a through 6.1.13.
[]
null
5.3
null
null
null
GHSA-q7rx-w656-fwmv
Mattermost notified all users in the channel when using WebSockets to respond individually
Mattermost fails to scope the WebSocket response around notified users to a each user separately resulting in the WebSocket broadcasting the information about who was notified about a post to everyone else in the channel.
[]
5.3
4.3
null
null
null
CVE-2025-3430
3DPrint Lite <=2.1.3.6 - Authenticated (Admin+) SQL Injection via 'printer_text'
The 3DPrint Lite plugin for WordPress is vulnerable to SQL Injection via the 'printer_text' parameter in all versions up to, and including, 2.1.3.6 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
[]
null
4.9
null
null
null
GHSA-pjfg-v5mv-4jmm
In the Linux kernel, the following vulnerability has been resolved:net: ena: Fix incorrect descriptor free behaviorENA has two types of TX queues:queues which only process TX packets arriving from the network stackqueues which only process TX packets forwarded to it by XDP_REDIRECT or XDP_TX instructionsThe ena_free_tx_bufs() cycles through all descriptors in a TX queue and unmaps + frees every descriptor that hasn't been acknowledged yet by the device (uncompleted TX transactions). The function assumes that the processed TX queue is necessarily from the first category listed above and ends up using napi_consume_skb() for descriptors belonging to an XDP specific queue.This patch solves a bug in which, in case of a VF reset, the descriptors aren't freed correctly, leading to crashes.
[]
null
5.5
null
null
null
GHSA-h4hc-rm3c-w49f
Unspecified vulnerability in the TimesTen Data Server component in Oracle Database 7.0.5.0.0 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the January 2009 CPU. Oracle has not commented on reliable researcher claims that this is a format string vulnerability via the msg parameter in the evtdump CGI module.
[]
null
null
null
null
null
CVE-2020-20813
Control Channel in OpenVPN 2.4.7 and earlier allows remote attackers to cause a denial of service via crafted reset packet.
[ "cpe:2.3:a:openvpn:openvpn:*:*:*:*:*:*:*:*" ]
null
7.5
null
null
null
CVE-2024-57924
fs: relax assertions on failure to encode file handles
In the Linux kernel, the following vulnerability has been resolved: fs: relax assertions on failure to encode file handles Encoding file handles is usually performed by a filesystem >encode_fh() method that may fail for various reasons. The legacy users of exportfs_encode_fh(), namely, nfsd and name_to_handle_at(2) syscall are ready to cope with the possibility of failure to encode a file handle. There are a few other users of exportfs_encode_{fh,fid}() that currently have a WARN_ON() assertion when ->encode_fh() fails. Relax those assertions because they are wrong. The second linked bug report states commit 16aac5ad1fa9 ("ovl: support encoding non-decodable file handles") in v6.6 as the regressing commit, but this is not accurate. The aforementioned commit only increases the chances of the assertion and allows triggering the assertion with the reproducer using overlayfs, inotify and drop_caches. Triggering this assertion was always possible with other filesystems and other reasons of ->encode_fh() failures and more particularly, it was also possible with the exact same reproducer using overlayfs that is mounted with options index=on,nfs_export=on also on kernels < v6.6. Therefore, I am not listing the aforementioned commit as a Fixes commit. Backport hint: this patch will have a trivial conflict applying to v6.6.y, and other trivial conflicts applying to stable kernels < v6.6.
[]
null
null
null
null
null
CVE-2017-5635
In Apache NiFi before 0.7.2 and 1.x before 1.1.2 in a cluster environment, if an anonymous user request is replicated to another node, the originating node identity is used rather than the "anonymous" user.
[ "cpe:2.3:a:apache:nifi:0.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:nifi:0.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:nifi:1.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:nifi:1.1.1:*:*:*:*:*:*:*" ]
null
null
7.5
5
null
GHSA-ggw9-q2xm-2xhm
The MasterStudy LMS WordPress Plugin – for Online Courses and Education plugin for WordPress is vulnerable to union based SQL Injection via the 'user' parameter of the /lms/stm-lms/order/items REST route in all versions up to, and including, 3.2.5 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
[]
null
9.8
null
null
null
RHSA-2024:0408
Red Hat Security Advisory: edk2 security update
edk2: Function GetEfiGlobalVariable2() return value not checked in DxeImageVerificationHandler() openssl: Excessive time spent checking DH keys and parameters
[ "cpe:/a:redhat:rhel_eus:8.6::appstream" ]
null
5.3
null
null
null
RHSA-2023:3540
Red Hat Security Advisory: OpenShift Container Platform 4.13.3 bug fix and security update
golang: net/http, net/textproto: denial of service from excessive memory allocation golang: net/http, net/textproto, mime/multipart: denial of service from excessive resource consumption golang: go/parser: Infinite loop in parsing golang: html/template: backticks not treated as string delimiters golang: html/template: improper sanitization of CSS values golang: html/template: improper handling of empty HTML attributes
[ "cpe:/a:redhat:openshift:4.13::el9" ]
null
7.3
null
null
null
CVE-2005-1588
SQL injection vulnerability in index.php for Quick.cart 0.3.0 allows remote attackers to execute arbitrary SQL commands via the iCategory parameter. NOTE: the vendor has privately disputed this issue, saying that Quick.cart does not even use SQL and therefore can not be vulnerable to SQL injection
[ "cpe:2.3:a:open_solution:quick.cart:0.3:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2017-0182
A denial of service vulnerability exists when Microsoft Hyper-V Network Switch running on a Windows 10, Windows Server 2008 R2, Windows 8.1, Windows Server 2012 R2, or Windows Server 2016 host server fails to properly validate input from a privileged user on a guest operating system, aka "Hyper-V Denial of Service Vulnerability." This CVE ID is unique from CVE-2017-0178, CVE-2017-0179, CVE-2017-0183, CVE-2017-0184, CVE-2017-0185, and CVE-2017-0186.
[ "cpe:2.3:o:microsoft:windows_10:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*" ]
null
null
5.8
6.3
null
CVE-2024-32780
WordPress VikRentCar Car Rental Management System plugin <= 1.3.2 - Sensitive Data Exposure via Invoices vulnerability
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in E4J s.R.L. VikRentCar.This issue affects VikRentCar: from n/a through 1.3.2.
[ "cpe:2.3:a:e4j:vikrentcar_car_rental_management_system:*:*:*:*:*:wordpress:*:*" ]
null
5.9
null
null
null
GHSA-fqp8-j3rg-x5gf
Buffer overflow in the Steema TeeChart ActiveX control, as used in Schneider Electric Vijeo Historian 4.30 and earlier, CitectHistorian 4.30 and earlier, and CitectSCADAReports 4.10 and earlier, allows remote attackers to execute arbitrary code or cause a denial of service via unspecified vectors.
[]
null
null
null
null
null
CVE-2013-1488
The Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, and OpenJDK 6 and 7, allows remote attackers to execute arbitrary code via unspecified vectors involving reflection, Libraries, "improper toString calls," and the JDBC driver manager, as demonstrated by James Forshaw during a Pwn2Own competition at CanSecWest 2013.
[ "cpe:2.3:a:oracle:jdk:1.7.0:update17:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update17:*:*:*:*:*:*" ]
null
null
null
10
null
RHSA-2020:2431
Red Hat Security Advisory: microcode_ctl security, bug fix and enhancement update
hw: Special Register Buffer Data Sampling (SRBDS) hw: Vector Register Data Sampling hw: L1D Cache Eviction Sampling
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
6.5
6.5
null
null
GHSA-4ww6-4g26-gh9j
A vulnerability was found in GZ Scripts Availability Booking Calendar PHP 1.8. It has been classified as problematic. This affects an unknown part of the file load.php of the component HTTP POST Request Handler. The manipulation of the argument cid/first_name/second_name/address_1/country leads to cross site scripting. It is possible to initiate the attack remotely. The associated identifier of this vulnerability is VDB-233295. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
[]
null
null
3.5
null
null
RHSA-2022:5115
Red Hat Security Advisory: Red Hat OpenStack Platform 16.2 (python-django20) security update
Django: SQL injection in QuerySet.annotate(),aggregate() and extra()
[ "cpe:/a:redhat:openstack:16.2::el8" ]
null
9.4
null
null
null
GHSA-v9mp-q7cv-6qc5
Affected versions of Atlassian Jira Server and Data Center allow remote attackers to inject arbitrary HTML or JavaScript via a Cross-Site Scripting (XSS) vulnerability in the ViewWorkflowSchemes.jspa and ListWorkflows.jspa endpoints. The affected versions are before version 8.5.11, from version 8.6.0 before 8.13.3, and from version 8.14.0 before 8.15.0.
[]
null
6.1
null
null
null
CVE-2013-4810
HP ProCurve Manager (PCM) 3.20 and 4.0, PCM+ 3.20 and 4.0, Identity Driven Manager (IDM) 4.0, and Application Lifecycle Management allow remote attackers to execute arbitrary code via a marshalled object to (1) EJBInvokerServlet or (2) JMXInvokerServlet, aka ZDI-CAN-1760. NOTE: this is probably a duplicate of CVE-2007-1036, CVE-2010-0738, and/or CVE-2012-0874.
[ "cpe:2.3:a:hp:application_lifecycle_management:-:*:*:*:*:*:*:*", "cpe:2.3:a:hp:identity_driven_manager:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:hp:procurve_manager:3.20:*:*:*:*:*:*:*", "cpe:2.3:a:hp:procurve_manager:3.20:*:*:*:*:plus:*:*", "cpe:2.3:a:hp:procurve_manager:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:hp:procurve_manager:4.0:*:*:*:*:plus:*:*" ]
null
9.8
null
10
null
CVE-2020-7260
MACC installer DLL side loading
DLL Side Loading vulnerability in the installer for McAfee Application and Change Control (MACC) prior to 8.3 allows local users to execute arbitrary code via execution from a compromised folder.
[ "cpe:2.3:a:mcafee:application_and_change_control:*:*:*:*:*:*:*:*" ]
null
7.3
null
null
null
CVE-2016-3815
The NVIDIA camera driver in Android before 2016-07-05 on Nexus 9 devices allows attackers to obtain sensitive information via a crafted application, aka Android internal bug 28522274.
[ "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*" ]
null
null
5.5
4.3
null
GHSA-qpq8-7ff2-687p
Within the Open-AudIT up to version 3.5.3 application, the web interface hides SSH secrets, Windows passwords, and SNMP strings from users using HTML 'password field' obfuscation. By using Developer tools or similar, it is possible to change the obfuscation so that the credentials are visible.
[]
null
5.9
null
null
null
CVE-2008-5429
Incredimail build 5853710 does not properly handle (1) multipart/mixed e-mail messages with many MIME parts and possibly (2) e-mail messages with many "Content-type: message/rfc822;" headers, which allows remote attackers to cause a denial of service (stack consumption or other resource consumption) via a large e-mail message, a related issue to CVE-2006-1173.
[ "cpe:2.3:a:incredimail:incredimail:5.85:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
GHSA-264q-f23m-4cfj
Cross-Site Request Forgery (CSRF) vulnerability in Pagelayer PopularFX.This issue affects PopularFX: from n/a through 1.2.4.
[]
null
4.3
null
null
null
GHSA-gcx9-rwpp-wvvr
In the Linux kernel, the following vulnerability has been resolved:drm: xlnx: zynqmp_disp: layer may be null while releasinglayer->info can be null if we have an error on the first layer in zynqmp_disp_create_layers
[]
null
5.5
null
null
null
GHSA-jv4g-4fp2-cgjp
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Eric Franklin Video Embed Optimizer allows Stored XSS.This issue affects Video Embed Optimizer: from n/a through 1.0.0.
[]
null
6.5
null
null
null
CVE-2005-2777
Looking Glass 20040427 allows remote attackers to execute arbitrary commands via shell metacharacters in the DNS lookup query field.
[ "cpe:2.3:a:looking_glass:looking_glass:2004-04-27:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2024-23317
External Control of File Name or Path (CWE-73) in the Controller 6000 and Controller 7000 allows an attacker with local access to the Controller to perform arbitrary code execution. This issue affects: 9.10 prior to vCR9.10.240520a (distributed in 9.10.1268(MR1)), 9.00 prior to vCR9.00.240521a (distributed in 9.00.1990(MR3)), 8.90 prior to vCR8.90.240520a (distributed in 8.90.1947 (MR4)), 8.80 prior to vCR8.80.240520a (distributed in 8.80.1726 (MR5)), 8.70 prior to vCR8.70.240520a (distributed in 8.70.2824 (MR7)), all versions of 8.60 and prior.
[ "cpe:2.3:o:gallagher:controller_6000_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:gallagher:controller_6000_firmware:8.70:*:*:*:*:*:*:*", "cpe:2.3:o:gallagher:controller_6000_firmware:8.80:*:*:*:*:*:*:*", "cpe:2.3:o:gallagher:controller_6000_firmware:8.90:*:*:*:*:*:*:*", "cpe:2.3:o:gallagher:controller_6000_firmware:9.00:*:*:*:*:*:*:*", "cpe:2.3:o:gallagher:controller_6000_firmware:9.10:*:*:*:*:*:*:*", "cpe:2.3:o:gallagher:controller_7000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:gallagher:controller_7000_firmware:8.70:*:*:*:*:*:*:*", "cpe:2.3:o:gallagher:controller_7000_firmware:8.80:*:*:*:*:*:*:*", "cpe:2.3:o:gallagher:controller_7000_firmware:8.90:*:*:*:*:*:*:*", "cpe:2.3:o:gallagher:controller_7000_firmware:9.00:*:*:*:*:*:*:*", "cpe:2.3:o:gallagher:controller_7000_firmware:9.10:*:*:*:*:*:*:*" ]
null
6.3
null
null
null
GHSA-x86q-3xjx-wg89
Net::Dropbear versions through 0.16 for Perl contains a dependency that may be susceptible to an integer overflow.Net::Dropbear embeds a version of the libtommath library that is susceptible to an integer overflow associated with CVE-2023-36328.
[]
null
6.5
null
null
null
CVE-2022-0575
Cross-site Scripting (XSS) - Stored in librenms/librenms
Cross-site Scripting (XSS) - Stored in Packagist librenms/librenms prior to 22.2.0.
[ "cpe:2.3:a:librenms:librenms:*:*:*:*:*:*:*:*" ]
null
null
5.4
null
null
CVE-2024-48845
Weak Password Rules/Strength
Weak Password Reset Rules vulnerabilities where found providing a potiential for the storage of weak passwords that could facilitate unauthorized admin/application access.  Affected products: ABB ASPECT - Enterprise v3.07.02; NEXUS Series v3.07.02; MATRIX Series v3.07.02
[ "cpe:2.3:a:abb:aspect_enterprise:*:*:*:*:*:*:*:*", "cpe:2.3:a:abb:nexus_series:*:*:*:*:*:*:*:*", "cpe:2.3:a:abb:matrix_series:*:*:*:*:*:*:*:*" ]
9.3
9.4
null
null
null
GHSA-7733-wh9m-x4gj
IBM Security Guardium Key Lifecycle Manager 3.0, 3.0.1, 4.0, 4.1, and 4.1.1 could allow an authenticated user to perform actions that they should not have access to due to improper authorization. IBM X-Force ID: 247630.
[]
null
8.8
null
null
null
CVE-2020-21252
Cross Site Request Forgery vulnerability in Neeke HongCMS 3.0.0 allows a remote attacker to execute arbitrary code and escalate privileges via the updateusers parameter.
[ "cpe:2.3:a:hongcms_project:hongcms:3.0.0:*:*:*:*:*:*:*" ]
null
8.8
null
null
null
GHSA-rmf2-pwfq-h75j
OS Command Injection in Apache Airflow
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in Apache Airflow Pig Provider, Apache Airflow allows an attacker to control commands executed in the task execution context, without write access to DAG files. This issue affects Pig Provider versions prior to 4.0.0. It also impacts any Apache Airflow versions prior to 2.3.0 in case Pig Provider is installed (Pig Provider 4.0.0 can only be installed for Airflow 2.3.0+). Note that you need to manually install the Pig Provider version 4.0.0 in order to get rid of the vulnerability on top of Airflow 2.3.0+ version.
[]
null
9.8
null
null
null
CVE-2005-3144
httpAdapter.c in sblim-sfcb before 0.9.2 allows remote attackers to cause a denial of service via long HTTP headers.
[ "cpe:2.3:a:standards_based_linux_instrumentation:sblim-sfcb:*:*:*:*:*:*:*:*", "cpe:2.3:a:standards_based_linux_instrumentation:sblim-sfcb:0.9.1:*:*:*:*:*:*:*" ]
null
null
null
5
null
CVE-2021-39362
An XSS issue was discovered in ReCaptcha Solver 5.7. A response from Anti-Captcha.com, RuCaptcha.com, 2captcha.com, DEATHbyCAPTCHA.com, ImageTyperz.com, or BestCaptchaSolver.com in setCaptchaCode() is inserted into the DOM as HTML, resulting in full control over the user's browser by these servers.
[ "cpe:2.3:a:recaptcha_solver_project:recaptcha_solver:5.7:*:*:*:*:*:*:*" ]
null
6.1
null
4.3
null
CVE-2024-32736
CyberPower PowerPanel Enterprise SQL Injection
A sql injection vulnerability exists in CyberPower PowerPanel Enterprise prior to v2.8.3. An unauthenticated remote attacker can leak sensitive information via the "query_utask_verbose" function within MCUDBHelper.
[ "cpe:2.3:a:cyberpower:powerpanel_enterprise:*:*:*:*:*:*:*:*" ]
null
7.5
null
null
null
CVE-2020-15525
GitLab EE 11.3 through 13.1.2 has Incorrect Access Control because of the Maven package upload endpoint.
[ "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*" ]
null
5.3
null
5
null
GHSA-3jq5-h4jx-qrg6
A command injection in the parsing_xml_stasurvey function inside libcgifunc.so of the D-Link DAP-X1860 repeater 1.00 through 1.01b05-01 allows attackers (within range of the repeater) to run shell commands as root during the setup process of the repeater, via a crafted SSID. Also, network names containing single quotes (in the range of the repeater) can result in a denial of service.
[]
null
8.8
null
null
null
GHSA-5mfq-9688-q734
SQL injection vulnerability in index.php in the Arthur Konze AkoGallery (com_akogallery) 2.5 beta component for Mambo and Joomla! allows remote attackers to execute arbitrary SQL commands via the id parameter in a detail action.
[]
null
null
null
null
null
GHSA-pqr5-9v2j-44xg
Apache Tomcat DoS via Malicious Get Request
Tomcat 4.0 through 4.1.12, using mod_jk 1.2.1 module on Apache 1.3 through 1.3.27, allows remote attackers to cause a denial of service (desynchronized communications) via an HTTP GET request with a Transfer-Encoding chunked field with invalid values.
[]
null
null
null
null
null
CVE-2021-38709
In ocProducts Composr CMS before 10.0.38, an attacker can inject JavaScript via the staff_messaging messaging system for XSS.
[ "cpe:2.3:a:compo:composr_cms:*:*:*:*:*:*:*:*" ]
null
6.1
null
4.3
null
CVE-2023-5568
Samba: heap buffer overflow with freshness tokens in the heimdal kdc
A heap-based Buffer Overflow flaw was discovered in Samba. It could allow a remote, authenticated attacker to exploit this vulnerability to cause a denial of service.
[ "cpe:/o:redhat:enterprise_linux:6", "cpe:/o:redhat:enterprise_linux:7", "cpe:/o:redhat:enterprise_linux:8", "cpe:/o:redhat:enterprise_linux:9", "cpe:/a:redhat:storage:3", "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*" ]
null
5.9
null
null
null
CVE-2023-27389
Inadequate encryption strength vulnerability in CONPROSYS IoT Gateway products allows a remote authenticated attacker with an administrative privilege to apply a specially crafted Firmware update file, alter the information, cause a denial-of-service (DoS) condition, and/or execute arbitrary code. The affected products and versions are as follows: M2M Gateway with the firmware Ver.3.7.10 and earlier (CPS-MG341-ADSC1-111, CPS-MG341-ADSC1-931, CPS-MG341G-ADSC1-111, CPS-MG341G-ADSC1-930, and CPS-MG341G5-ADSC1-931), M2M Controller Integrated Type with firmware Ver.3.7.6 and earlier versions (CPS-MC341-ADSC1-111, CPS-MC341-ADSC1-931, CPS-MC341-ADSC2-111, CPS-MC341G-ADSC1-110, CPS-MC341Q-ADSC1-111, CPS-MC341-DS1-111, CPS-MC341-DS11-111, CPS-MC341-DS2-911, and CPS-MC341-A1-111), and M2M Controller Configurable Type with firmware Ver.3.8.8 and earlier versions (CPS-MCS341-DS1-111, CPS-MCS341-DS1-131, CPS-MCS341G-DS1-130, CPS-MCS341G5-DS1-130, and CPS-MCS341Q-DS1-131).
[ "cpe:2.3:o:contec:cps-mg341-adsc1-111_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:contec:cps-mg341-adsc1-111:-:*:*:*:*:*:*:*", "cpe:2.3:o:contec:cps-mg341-adsc1-931_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:contec:cps-mg341-adsc1-931:-:*:*:*:*:*:*:*", "cpe:2.3:o:contec:cps-mg341g-adsc1-111_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:contec:cps-mg341g-adsc1-111:-:*:*:*:*:*:*:*", "cpe:2.3:o:contec:cps-mg341g-adsc1-930_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:contec:cps-mg341g-adsc1-930:-:*:*:*:*:*:*:*", "cpe:2.3:o:contec:cps-mg341g5-adsc1-931_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:contec:cps-mg341g5-adsc1-931:-:*:*:*:*:*:*:*", "cpe:2.3:o:contec:cps-mc341-adsc1-111_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:contec:cps-mc341-adsc1-111:-:*:*:*:*:*:*:*", "cpe:2.3:o:contec:cps-mc341-adsc1-931_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:contec:cps-mc341-adsc1-931:-:*:*:*:*:*:*:*", "cpe:2.3:o:contec:cps-mc341-adsc2-111_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:contec:cps-mc341-adsc2-111:-:*:*:*:*:*:*:*", "cpe:2.3:o:contec:cps-mc341g-adsc1-110_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:contec:cps-mc341g-adsc1-110:-:*:*:*:*:*:*:*", "cpe:2.3:o:contec:cps-mc341q-adsc1-111_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:contec:cps-mc341q-adsc1-111:-:*:*:*:*:*:*:*", "cpe:2.3:o:contec:cps-mc341-ds1-111_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:contec:cps-mc341-ds1-111:-:*:*:*:*:*:*:*", "cpe:2.3:o:contec:cps-mc341-ds11-111_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:contec:cps-mc341-ds11-111:-:*:*:*:*:*:*:*", "cpe:2.3:o:contec:cps-mc341-ds2-911_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:contec:cps-mc341-ds2-911:-:*:*:*:*:*:*:*", "cpe:2.3:o:contec:cps-mc341-a1-111_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:contec:cps-mc341-a1-111:-:*:*:*:*:*:*:*", "cpe:2.3:o:contec:cps-mcs341-ds1-111_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:contec:cps-mcs341-ds1-111:-:*:*:*:*:*:*:*", "cpe:2.3:o:contec:cps-mcs341-ds1-131_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:contec:cps-mcs341-ds1-131:-:*:*:*:*:*:*:*", "cpe:2.3:o:contec:cps-mcs341g-ds1-130_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:contec:cps-mcs341g-ds1-130:-:*:*:*:*:*:*:*", "cpe:2.3:o:contec:cps-mcs341g5-ds1-130_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:contec:cps-mcs341g5-ds1-130:-:*:*:*:*:*:*:*", "cpe:2.3:o:contec:cps-mcs341q-ds1-131_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:contec:cps-mcs341q-ds1-131:-:*:*:*:*:*:*:*" ]
null
7.2
null
null
null
CVE-2025-2079
Optigo Networks Visual BACnet Capture Tool and Optigo Visual Networks Capture Tool version 3.1.2rc11 contain a hard coded secret key. This could allow an attacker to generate valid JWT (JSON Web Token) sessions.
[]
8.7
null
null
null
null
RHSA-2024:1653
Red Hat Security Advisory: kernel security and bug fix update
kernel: ext4: kernel bug in ext4_write_inline_data_end() kernel: use-after-free in drivers/media/rc/ene_ir.c due to race condition kernel: sched/membarrier: reduce the ability to hammer on sys_membarrier
[ "cpe:/a:redhat:rhel_eus:8.6::crb", "cpe:/o:redhat:rhel_eus:8.6::baseos", "cpe:/o:redhat:rhev_hypervisor:4.4::el8" ]
null
4.7
null
null
null
CVE-2023-4397
A buffer overflow vulnerability in the Zyxel ATP series firmware version 5.37, USG FLEX series firmware version 5.37, USG FLEX 50(W) series firmware version 5.37, and USG20(W)-VPN series firmware version 5.37, could allow an authenticated local attacker with administrator privileges to cause denial-of-service (DoS) conditions by executing the CLI command with crafted strings on an affected device.
[ "cpe:2.3:o:zyxel:zld:5.37:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:atp100:-:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:atp100w:-:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:atp200:-:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:atp500:-:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:atp700:-:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:atp800:-:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:usg_flex_100:-:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:usg_flex_100w:-:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:usg_flex_200:-:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:usg_flex_50:-:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:usg_flex_500:-:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:usg_flex_50w:-:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:usg_flex_700:-:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:usg_20w-vpn:-:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:vpn50w:-:*:*:*:*:*:*:*" ]
null
4.4
null
null
null
RHSA-2013:1460
Red Hat Security Advisory: rhev-hypervisor6 security and bug fix update
spice: stack buffer overflow in reds_handle_ticket() function
[ "cpe:/o:redhat:enterprise_linux:6::hypervisor" ]
null
null
null
null
null
CVE-2009-2302
Cross-site scripting (XSS) vulnerability in index.php in Aardvark Topsites PHP 5.2.0 and earlier allows remote attackers to inject arbitrary web script or HTML via the q parameter in a search action. NOTE: it was later reported that 5.2.1 is also affected.
[ "cpe:2.3:a:avatic:aardvark_topsites_php:*:*:*:*:*:*:*:*", "cpe:2.3:a:avatic:aardvark_topsites_php:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:avatic:aardvark_topsites_php:4.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:avatic:aardvark_topsites_php:4.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:avatic:aardvark_topsites_php:5:*:*:*:*:*:*:*", "cpe:2.3:a:avatic:aardvark_topsites_php:5.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:avatic:aardvark_topsites_php:5.1.2:*:*:*:*:*:*:*" ]
null
null
null
4.3
null