id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
189k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
patch_commit_url
stringlengths
36
232
GHSA-w95r-6gjg-73xh
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
[]
null
null
null
null
null
GHSA-hh8x-xr4m-qghx
Smart Parking Management System from Honding Technology has a Missing Authorization vulnerability, allowing remote attackers with regular privileges to access a specific functionality to create administrator accounts, and subsequently log into the system using those accounts.
[]
8.7
8.8
null
null
null
CVE-2022-22954
VMware Workspace ONE Access and Identity Manager contain a remote code execution vulnerability due to server-side template injection. A malicious actor with network access can trigger a server-side template injection that may result in remote code execution.
[ "cpe:2.3:a:vmware:identity_manager:3.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:identity_manager:3.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:identity_manager:3.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:identity_manager:3.3.6:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:vrealize_automation:*:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:vrealize_automation:7.6:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:workspace_one_access:20.10.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:workspace_one_access:20.10.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:workspace_one_access:21.08.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:workspace_one_access:21.08.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:linux:linux_kernel:-:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:vrealize_suite_lifecycle_manager:*:*:*:*:*:*:*:*" ]
null
9.8
null
10
null
GHSA-rmj9-q58g-9qgg
go-unzip vulnerable to Path Traversal
Due to improper path santization, archives containing relative file paths can cause files to be written (or overwritten) outside of the target directory.
[]
null
9.1
null
null
null
CVE-2019-8699
A logic issue existed in the handling of answering phone calls. The issue was addressed with improved state management. This issue is fixed in iOS 12.4. The initiator of a phone call may be able to cause the recipient to answer a simultaneous Walkie-Talkie connection.
[ "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" ]
null
7.5
null
5
null
GHSA-9gph-v8wv-c92v
unzip 6.0 allows remote attackers to cause a denial of service (out-of-bounds read or write and crash) via an extra field with an uncompressed size smaller than the compressed field size in a zip archive that advertises STORED method compression.
[]
null
null
null
null
null
GHSA-q5v8-pxhm-3vh3
The eHDR CTMS from Sunnet has a SQL Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary SQL command to read, modify, and delete database contents.
[]
null
9.8
null
null
null
GHSA-qfmr-mqxf-7859
IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 11.5 is vulnerable to a denial of service with a specially crafted query on certain columnar tables. IBM X-Force ID: 280905.
[]
null
5.3
null
null
null
GHSA-j65x-pp5m-j68h
In various functions of RecentLocationApps.java, DevicePolicyManagerService.java, and RecognitionService.java, there is an incorrect warning indicating an app accessed the user's location. This could dissolve the trust in the platform's permission system, with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-141028068
[]
null
null
null
null
null
GHSA-c26r-vw7p-2m7h
OpenVPN version 2.4.0 through 2.6.10 on Windows allows an external, lesser privileged process to create a named pipe which the OpenVPN GUI component would connect to allowing it to escalate its privileges
[]
null
8.8
null
null
null
CVE-2012-2241
scripts/dget.pl in devscripts before 2.12.3 allows remote attackers to delete arbitrary files via a crafted (1) .dsc or (2) .changes file, probably related to a NULL byte in a filename.
[ "cpe:2.3:a:devscripts_devel_team:devscripts:*:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.8.14:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.9.21:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.9.22:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.9.23:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.9.24:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.9.25:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.9.26:etch1:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.9.26:etch2:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.9.26:etch4:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.9.26:etch5:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.9.27:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.0:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.1:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.3:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.6:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.7:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.8:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.9:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.10:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.11:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.12:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.13:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.14:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.15:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.16:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.17:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.18:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.18.1:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.19:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.20:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.21:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.22:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.23:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.24:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.25:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.26:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.27:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.28:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.29:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.30:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.31:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.32:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.33:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.34:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.35:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.36:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.38:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.39:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.40:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.41:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.42:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.43:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.44:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.45:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.46:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.47:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.48:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.49:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.50:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.51:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.52:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.53:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.54:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.55:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.56:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.57:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.58:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.59:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.60:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.61:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.62:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.63:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.64:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.65.1:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.66:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.67:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.10.68:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.11.0:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.11.1:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.11.2:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.11.3:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.11.4:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.11.5:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.11.6:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.11.7:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.11.8:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.11.9:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.12.0:*:*:*:*:*:*:*", "cpe:2.3:a:devscripts_devel_team:devscripts:2.12.1:*:*:*:*:*:*:*" ]
null
null
null
5
null
CVE-2009-4182
Multiple unspecified vulnerabilities in HP Web Jetadmin 10.2, when a remote SQL server is used, allow remote attackers to obtain access to data or cause a denial of service, possibly by leveraging authentication and encryption weaknesses on the SQL server.
[ "cpe:2.3:a:hp:web_jetadmin:10.2:*:*:*:*:*:*:*" ]
null
null
null
9
null
RHSA-2018:3852
Red Hat Security Advisory: java-1.8.0-ibm security update
OpenJDK: Incorrect handling of unsigned attributes in signed Jar manifests (Security, 8194534) OpenJDK: Leak of sensitive header data via HTTP redirect (Networking, 8196902) OpenJDK: Incomplete enforcement of the trustURLCodebase restriction (JNDI, 8199177) OpenJDK: Improper field access checks (Hotspot, 8199226) OpenJDK: Missing endpoint identification algorithm check during TLS session resumption (JSSE, 8202613) OpenJDK: Unrestricted access to scripting engine (Scripting, 8202936) OpenJDK: Infinite loop in RIFF format reader (Sound, 8205361) libpng: Integer overflow and resultant divide-by-zero in pngrutil.c:png_check_chunk_length() allows for denial of service
[ "cpe:/a:redhat:network_satellite:5.8::el6" ]
null
null
6.5
null
null
GHSA-gv23-rrw9-jxh8
Multiple Read overflows issue due to improper length check while decoding Identity Request in CSdomain/Authentication Reject in CS domain/ PRAU accept/while logging DL message in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in APQ8009, APQ8017, APQ8053, APQ8096, APQ8096AU, APQ8098, MDM9150, MDM9205, MDM9206, MDM9607, MDM9615, MDM9625, MDM9635M, MDM9640, MDM9645, MDM9650, MDM9655, MSM8905, MSM8909, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8939, MSM8940, MSM8953, MSM8996AU, MSM8998, Nicobar, QCM2150, QCS605, QM215, Rennell, SC8180X, SDA660, SDA845, SDM429, SDM429W, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, SDX20, SDX24, SDX55, SM6150, SM7150, SM8150, SXR1130
[]
null
null
null
null
null
CVE-2020-0104
In onShowingStateChanged of KeyguardStateMonitor.java, there is a possible inappropriate read due to a logic error. This could lead to local information disclosure of keyguard-protected data with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10Android ID: A-144430870
[ "cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*" ]
null
5.5
null
2.1
null
CVE-2016-6811
In Apache Hadoop 2.x before 2.7.4, a user who can escalate to yarn user can possibly run arbitrary commands as root user.
[ "cpe:2.3:a:apache:hadoop:*:*:*:*:*:*:*:*" ]
null
null
8.8
9
null
GHSA-2hgp-5crx-6xc9
Microsoft Word 2007, Office 2010 SP2, Word 2010 SP2, Word for Mac 2011, Excel for Mac 2011, and Office Compatibility Pack SP3 allow remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Office Memory Corruption Vulnerability."
[]
null
null
7.8
null
null
GHSA-jc68-x2f2-3x93
PHP remote file inclusion vulnerability in upgrade.php in Coalescent Systems freePBX 2.1.3 allows remote attackers to execute arbitrary PHP code via a URL in the amp_conf[AMPWEBROOT] parameter.
[]
null
null
null
null
null
GHSA-vjgj-v6jh-4c36
The ELEX WooCommerce Advanced Bulk Edit Products, Prices & Attributes plugin for WordPress is vulnerable to SQL Injection via the 'attribute_value_filter' parameter in all versions up to, and including, 1.4.9 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
[]
null
6.5
null
null
null
GHSA-75rf-hx73-vjfr
Directory traversal vulnerability in the Send Screen Capture implementation in Cisco Jabber 9.2(.1) and earlier on Windows allows remote attackers to upload arbitrary types of files, and consequently execute arbitrary code, via modified packets, aka Bug ID CSCug48056.
[]
null
null
null
null
null
GHSA-23x9-2qmf-qr95
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in ExtendThemes Kubio AI Page Builder.This issue affects Kubio AI Page Builder: from n/a through 2.2.4.
[]
null
6.5
null
null
null
CVE-2023-21840
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: PS). Supported versions that are affected are 5.7.40 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
[ "cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*" ]
null
4.9
null
null
null
PYSEC-2020-177
null
In SaltStack Salt through 2019.2.0, the salt-api NET API with the ssh client enabled is vulnerable to command injection. This allows an unauthenticated attacker with network access to the API endpoint to execute arbitrary code on the salt-api host.
[]
null
null
null
null
null
GHSA-88r2-xrwf-mvhm
An authenticated RCE vulnerability in the ClearPass Policy Manager web-based management interface allows remote authenticated users to run arbitrary commands on the underlying host. Successful exploitation could allow an attacker to execute arbitrary commands on the underlying operating system.
[]
null
6.4
null
null
null
GHSA-mvh8-j583-3mwc
A vulnerability, which was classified as critical, was found in kylin-system-updater up to 1.4.20kord. Affected is the function InstallSnap of the component Update Handler. The manipulation leads to command injection. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-222600.
[]
null
7.8
null
null
null
GHSA-hq6f-9m26-g47r
A password-disclosure issue in the web interface on certain TP-Link devices allows a remote attacker to get full administrative access to the web panel. This affects WA901ND devices before 3.16.9(201211) beta, and Archer C5, Archer C7, MR3420, MR6400, WA701ND, WA801ND, WDR3500, WDR3600, WE843N, WR1043ND, WR1045ND, WR740N, WR741ND, WR749N, WR802N, WR840N, WR841HP, WR841N, WR842N, WR842ND, WR845N, WR940N, WR941HP, WR945N, WR949N, and WRD4300 devices.
[]
null
null
null
null
null
CVE-2021-37471
Cradlepoint IBR900-600 devices running versions < 7.21.10 are vulnerable to a restricted shell escape sequence that provides an attacker the capability to simultaneously deny availability to the device's NetCloud Manager console, local console and SSH command-line.
[ "cpe:2.3:o:cradlepoint:ibr600c_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cradlepoint:ibr600c:-:*:*:*:*:*:*:*", "cpe:2.3:o:cradlepoint:ibr600_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cradlepoint:ibr600:-:*:*:*:*:*:*:*", "cpe:2.3:o:cradlepoint:ibr900_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cradlepoint:ibr900:-:*:*:*:*:*:*:*" ]
null
7.5
null
7.8
null
RHSA-2020:3504
Red Hat Security Advisory: Red Hat Ceph Storage 3.3 security and bug fix update
ceph: radosgw: HTTP header injection via CORS ExposeHeader tag
[ "cpe:/a:redhat:ceph_storage:3::el7" ]
null
5.4
null
null
null
GHSA-pcqv-c46v-2p4v
Ansible Arbitrary File Overwrite Vulnerability
`lib/ansible/playbook/__init__.py` in Ansible 1.2.x before 1.2.3, when playbook does not run due to an error, allows local users to overwrite arbitrary files via a symlink attack on a retry file with a predictable name in `/var/tmp/ansible/`.
[]
6.9
6.2
null
null
null
CVE-2005-1679
Stack-based buffer overflow in the error directive in picasm 1.12b and earlier allows attackers to execute arbitrary code via a long error message.
[ "cpe:2.3:a:timo_rossi:picasm:*:*:*:*:*:*:*:*" ]
null
null
null
5.1
null
CVE-2024-30386
Junos OS and Junos OS Evolved: In a EVPN-VXLAN scenario state changes on adjacent systems can cause an l2ald process crash
A Use-After-Free vulnerability in the Layer 2 Address Learning Daemon (l2ald) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent attacker to cause l2ald to crash leading to a Denial-of-Service (DoS). In an EVPN-VXLAN scenario, when state updates are received and processed by the affected system, the correct order of some processing steps is not ensured, which can lead to an l2ald crash and restart. Whether the crash occurs depends on system internal timing which is outside the attackers control. This issue affects: Junos OS:  * All versions before 20.4R3-S8, * 21.2 versions before 21.2R3-S6, * 21.3 versions before 21.3R3-S5, * 21.4 versions before 21.4R3-S4, * 22.1 versions before 22.1R3-S3, * 22.2 versions before 22.2R3-S1, * 22.3 versions before 22.3R3,, * 22.4 versions before 22.4R2; Junos OS Evolved:  * All versions before 20.4R3-S8-EVO, * 21.2-EVO versions before 21.2R3-S6-EVO,  * 21.3-EVO versions before 21.3R3-S5-EVO, * 21.4-EVO versions before 21.4R3-S4-EVO, * 22.1-EVO versions before 22.1R3-S3-EVO, * 22.2-EVO versions before 22.2R3-S1-EVO, * 22.3-EVO versions before 22.3R3-EVO, * 22.4-EVO versions before 22.4R2-EVO.
[]
7.1
5.3
null
null
null
CVE-2022-27446
MariaDB Server v10.9 and below was discovered to contain a segmentation fault via the component sql/item_cmpfunc.h.
[ "cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*" ]
null
7.5
null
5
null
CVE-2019-6610
On BIG-IP versions 14.0.0-14.0.0.4, 13.0.0-13.1.1.1, 12.1.0-12.1.4, 11.6.0-11.6.3.4, and 11.5.1-11.5.8, the system is vulnerable to a denial of service attack when performing URL classification.
[ "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_access_policy_manager:14.0.0:*:*:*:*:*:*:*" ]
null
null
8.6
9
null
GHSA-986g-4mqr-vp66
The HydFM (aka com.apheliontechnologies.hydfm) application 1.1.9 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[]
null
null
null
null
null
CVE-2004-2394
Off-by-one error in passwd 0.68 and earlier, when using the --stdin option, causes passwd to use the first 78 characters of a password instead of the first 79, which results in a small reduction of the search space required for brute force attacks.
[ "cpe:2.3:a:mandrakesoft:mandrake_multi_network_firewall:8.2:*:*:*:*:*:*:*", "cpe:2.3:o:mandrakesoft:mandrake_linux:8.2:*:*:*:*:*:*:*", "cpe:2.3:o:mandrakesoft:mandrake_linux:8.2:*:ppc:*:*:*:*:*", "cpe:2.3:o:mandrakesoft:mandrake_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:mandrakesoft:mandrake_linux:9.1:*:*:*:*:*:*:*", "cpe:2.3:o:mandrakesoft:mandrake_linux:9.1:*:ppc:*:*:*:*:*", "cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:*:*:*:*:*:*", "cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:amd64:*:*:*:*:*", "cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*", "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:x86_64:*:*:*:*:*" ]
null
null
null
2.1
null
CVE-2024-6436
Rockwell Automation Input Validation Vulnerability exists in the SequenceManager™ Server
An input validation vulnerability exists in the Rockwell Automation Sequence Manager™ which could allow a malicious user to send malformed packets to the server and cause a denial-of-service condition. If exploited, the device would become unresponsive, and a manual restart will be required for recovery. Additionally, if exploited, there could be a loss of view for the downstream equipment sequences in the controller. Users would not be able to view the status or command the equipment sequences, however the equipment sequence would continue to execute uninterrupted.
[ "cpe:2.3:a:rockwellautomation:sequencemanager:*:*:*:*:*:*:*:*" ]
8.7
null
null
null
null
RHSA-2002:297
Red Hat Security Advisory: : : : Updated vim packages fix modeline vulnerability
security flaw
[ "cpe:/o:redhat:linux:6.2", "cpe:/o:redhat:linux:7.0", "cpe:/o:redhat:linux:7.1", "cpe:/o:redhat:linux:7.2", "cpe:/o:redhat:linux:7.3", "cpe:/o:redhat:linux:8.0" ]
null
null
null
null
null
GHSA-3qgh-vv5w-v35w
UCOPIA Wi-Fi appliances 6.0.5 allow arbitrary code execution with root privileges using chroothole_client's PHP call, a related issue to CVE-2017-11322.
[]
null
null
null
null
null
GHSA-82v7-gj6q-fj5r
An issue was discovered on Samsung mobile devices with P(9.0) and Q(10.0) software. There is a stack overflow in the kperfmon driver. The Samsung ID is SVE-2019-15876 (January 2020).
[]
null
null
null
null
null
GHSA-hh27-ffr2-f2jc
Open redirect in url-parse
OverviewAffected versions of npm `url-parse` are vulnerable to URL Redirection to Untrusted Site.ImpactDepending on library usage and attacker intent, impacts may include allow/block list bypasses, SSRF attacks, open redirects, or other undesired behavior.
[]
null
6.1
null
null
null
GHSA-v226-jv33-4v79
Multiple PHP remote file inclusion vulnerabilities in SolidState 0.4 and earlier allow remote attackers to execute arbitrary PHP code via a URL in the base_path parameter in manager/pages/ scripts including (1) AccountsPage.class.php, (2) AddInvoicePage.class.php, (3) AddIPAddressPage.class.php, (4) AddPaymentPage.class.php, (5) AddTaxRulePage.class.php, (6) AssignDomainPage.class.php, (7) AssignHostingPage.class.php, (8) AssignProductPage.class.php, (9) BillingPage.class.php, (10) BillingPaymentPage.class.php, (11) BrowseAccountsPage.class.php, (12) BrowseInvoicesPage.class.php, (13) ConfigureEditUserPage.class.php, (14) ConfigureNewUserPage.class.php, (15) ConfigureNewUserReceiptPage.class.php, (16) ConfigureUsersPage.class.php, (17) DeleteAccountPage.class.php, (18) DeleteDomainServicePage.class.php, (19) DeleteHostingServicePage.class.php, (20) DeleteInvoicePage.class.php, (21) DeleteProductPage.class.php, (22) DeleteServerPage.class.php, (23) DomainServicesPage.class.php, (24) DomainsPage.class.php, (25) EditAccountPage.class.php, (26) EditDomainPage.class.php, (27) EditDomainServicePage.class.php, (28) EditHostingServicePage.class.php, (29) EditPaymentPage.class.php, (30) EditProductPage.class.php, (31) EditServerPage.class.php, (32) EmailInvoicePage.class.php, (33) ExecuteOrderPage.class.php, (34) ExpiredDomainsPage.class.php, (35) FulfilledOrdersPage.class.php, (36) GenerateInvoicesPage.class.php, (37) HomePage.class.php, (38) InactiveAccountsPage.class.php, (39) IPManagerPage.class.php, (40) LoginPage.class.php, (41) LogPage.class.php, (42) ModulesPage.class.php, (43) NewAccountPage.class.php, (44) NewDomainServicePage.class.php, (45) NewProductPage.class.php, (46) OutstandingInvoicesPage.class.php, (47) PendingAccountsPage.class.php, (48) PendingOrdersPage.class.php, (49) PrintInvoicePage.class.php, (50) ProductsPage.class.php, (51) RegisterDomainPage.class.php, (52) RegisteredDomainsPage.class.php, (53) ServersPage.class.php, (54) ServicesHostingServicesPage.class.php, (55) ServicesNewHostingPage.class.php, (56) ServicesPage.class.php, (57) ServicesWebHostingPage.class.php, (58) SettingsPage.class.php, (59) TaxesPage.class.php, (60) TransferDomainPage.class.php, (61) ViewAccountPage.class.php, (62) ViewDomainServicePage.class.php, (63) ViewHostingServicePage.class.php, (64) ViewInvoicePage.class.php, (65) ViewLogMessagePage.class.php, (66) ViewOrderPage.class.php, (67) ViewProductPage.class.php, (68) ViewServerPage.class.php, (69) WelcomeEmailPage.class.php; and (70) modules/RegistrarModule.class.php, (71) modules/SolidStateModule.class.php, (72) modules/authorizeaim/authorizeaim.class.php, and (73) modules/authorizeaim/pages/AAIMConfigPage.class.php.
[]
null
null
null
null
null
GHSA-v885-gqcv-cj29
IBM Robotic Process Automation 21.0.1, 21.0.2, and 21.0.3 could allow a user with psychical access to the system to obtain sensitive information due to insufficiently protected credentials.
[]
null
4.6
null
null
null
GHSA-qg6p-r4hj-3683
An issue was discovered in nos client version 0.6.6, allows remote attackers to escalate privileges via getRPCEndpoint.js.
[]
null
9.8
null
null
null
GHSA-m5r3-7h55-8p6v
An attacker may obtain the user credentials from file servers, backup repositories, or ZLD files saved in SD cards. As a result, the PLC user program may be uploaded, altered, and/or downloaded.
[]
null
null
null
null
null
CVE-2010-1524
The SpreadSheet Lotus 123 reader (wkssr.dll) in Autonomy KeyView 10.4 and 10.9, as used in multiple IBM, Symantec, and other products, allows remote attackers to execute arbitrary code via unspecified vectors related to allocation of an array of pointers and "string indexing," which triggers memory corruption.
[ "cpe:2.3:a:autonomy:keyview_export_sdk:10.4:*:*:*:*:*:*:*", "cpe:2.3:a:autonomy:keyview_export_sdk:10.9:*:*:*:*:*:*:*", "cpe:2.3:a:autonomy:keyview_filter_sdk:10.4:*:*:*:*:*:*:*", "cpe:2.3:a:autonomy:keyview_filter_sdk:10.9:*:*:*:*:*:*:*", "cpe:2.3:a:autonomy:keyview_viewer_sdk:10.4:*:*:*:*:*:*:*", "cpe:2.3:a:autonomy:keyview_viewer_sdk:10.9:*:*:*:*:*:*:*" ]
null
null
null
9.3
null
CVE-2017-1126
IBM WebSphere Message Broker (IBM Integration Bus 9.0 and 10.0) could allow an unauthorized user to obtain sensitive information about software versions that could lead to further attacks. IBM X-Force ID: 121341.
[ "cpe:2.3:a:ibm:integration_bus:9.0.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:integration_bus:9.0.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:integration_bus:9.0.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:integration_bus:9.0.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:integration_bus:9.0.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:integration_bus:9.0.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:integration_bus:9.0.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:integration_bus:9.0.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:integration_bus:10.0.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:integration_bus:10.0.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:integration_bus:10.0.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:integration_bus:10.0.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:integration_bus:10.0.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:integration_bus:10.0.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:integration_bus:10.0.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:integration_bus:10.0.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:integration_bus:10.0.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:integration_bus:10.0.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_message_broker:8.0.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_message_broker:8.0.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_message_broker:8.0.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_message_broker:8.0.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_message_broker:8.0.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_message_broker:8.0.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_message_broker:8.0.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_message_broker:8.0.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_message_broker:8.0.0.8:*:*:*:*:*:*:*" ]
null
null
5.3
5
null
CVE-2023-3118
Export All URLs < 4.6 - Reflected XSS
The Export All URLs WordPress plugin before 4.6 does not sanitise and escape a parameter before outputting them back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
[ "cpe:2.3:a:atlasgondal:export_all_urls:*:*:*:*:*:wordpress:*:*" ]
null
6.1
null
null
null
CVE-2024-34397
An issue was discovered in GNOME GLib before 2.78.5, and 2.79.x and 2.80.x before 2.80.1. When a GDBus-based client subscribes to signals from a trusted system service such as NetworkManager on a shared computer, other users of the same computer can send spoofed D-Bus signals that the GDBus-based client will wrongly interpret as having been sent by the trusted system service. This could lead to the GDBus-based client behaving incorrectly, with an application-dependent impact.
[]
null
5.2
null
null
null
GHSA-g3q9-p77m-rp7m
BigProf Online Invoicing System before 4.0 fails to adequately sanitize fields for HTML characters upon an administrator using admin/pageEditGroup.php to create a new group, resulting in Stored XSS. The caveat here is that an attacker would need administrative privileges in order to create the payload. One might think this completely mitigates the privilege-escalation impact as there is only one high-privileged role. However, it was discovered that the endpoint responsible for creating the group lacks CSRF protection.
[]
null
null
null
null
null
CVE-2021-31531
Zoho ManageEngine ServiceDesk Plus MSP before 10521 is vulnerable to Server-Side Request Forgery (SSRF).
[ "cpe:2.3:a:zohocorp:manageengine_servicedesk_plus_msp:*:*:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_servicedesk_plus_msp:10.5:*:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_servicedesk_plus_msp:10.5:10500:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_servicedesk_plus_msp:10.5:10501:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_servicedesk_plus_msp:10.5:10502:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_servicedesk_plus_msp:10.5:10503:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_servicedesk_plus_msp:10.5:10504:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_servicedesk_plus_msp:10.5:10505:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_servicedesk_plus_msp:10.5:10506:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_servicedesk_plus_msp:10.5:10507:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_servicedesk_plus_msp:10.5:10508:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_servicedesk_plus_msp:10.5:10509:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_servicedesk_plus_msp:10.5:10510:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_servicedesk_plus_msp:10.5:10511:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_servicedesk_plus_msp:10.5:10512:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_servicedesk_plus_msp:10.5:10513:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_servicedesk_plus_msp:10.5:10514:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_servicedesk_plus_msp:10.5:10515:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_servicedesk_plus_msp:10.5:10516:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_servicedesk_plus_msp:10.5:10517:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_servicedesk_plus_msp:10.5:10518:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_servicedesk_plus_msp:10.5:10519:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_servicedesk_plus_msp:10.5:10520:*:*:*:*:*:*" ]
null
9.8
null
7.5
null
GHSA-g58p-hgrm-327x
A vulnerability has been identified that, if exploited, could result in a local user elevating their privilege level to NT AUTHORITY\SYSTEM on a Citrix Virtual Apps and Desktops Windows VDA.
[]
null
7.8
null
null
null
GHSA-pmjq-9rhw-g9xw
Microsoft Edge in Microsoft Windows 10 1703 allows an attacker to elevate privileges due to the way that Microsoft Edge validates JavaScript under specific conditions, aka "Microsoft Edge Elevation of Privilege Vulnerability". This CVE ID is unique from CVE-2017-8503.
[]
null
null
6.1
null
null
CVE-2019-14723
In CentOS-WebPanel.com (aka CWP) CentOS Web Panel 0.9.8.851, an insecure object reference allows an attacker to delete a victim's e-mail account via an attacker account.
[ "cpe:2.3:a:control-webpanel:webpanel:0.9.8.851:*:*:*:*:*:*:*" ]
null
4.3
null
4
null
GHSA-c6g2-9gg2-5hq8
EMC RSA BSAFE Micro Edition Suite (MES) 4.0.x before 4.0.6 and RSA BSAFE SSL-J before 6.1.4 do not ensure that a server's X.509 certificate is the same during renegotiation as it was before renegotiation, which allows man-in-the-middle attackers to obtain sensitive information or modify TLS session data via a "triple handshake attack."
[]
null
null
null
null
null
GHSA-2424-5f9c-864m
Multiple cross-site scripting (XSS) vulnerabilities in DeltaScripts Pro Publish allow remote attackers to inject arbitrary web script or HTML via the (1) artid parameter in art.php and the (2) catname parameter in cat.php.
[]
null
null
null
null
null
CVE-2006-5985
Multiple cross-site scripting (XSS) vulnerabilities in admin/options.php in Extreme CMS 0.9, and possibly earlier, allow remote attackers to inject arbitrary web script or HTML via the (1) bg1, (2) bg2, (3) text, or (4) size parameters. NOTE: the provenance of this information is unknown; details are obtained from third party sources.
[ "cpe:2.3:a:extreme_cms:extreme_cms:*:*:*:*:*:*:*:*" ]
null
null
null
6.8
null
CVE-2021-45735
TOTOLINK X5000R v9.1.0u.6118_B20201102 was discovered to use the HTTP protocol for authentication into the admin interface, allowing attackers to intercept user credentials via packet capture software.
[ "cpe:2.3:o:totolink:x5000r_firmware:9.1.0u.6118_b20201102:*:*:*:*:*:*:*", "cpe:2.3:h:totolink:x5000r:-:*:*:*:*:*:*:*" ]
null
7.5
null
5
null
CVE-2009-4820
Angelo-Emlak 1.0 stores sensitive information under the web root with insufficient access control, which allows remote attackers to download a database via a direct request for veribaze/angelo.mdb.
[ "cpe:2.3:a:aspindir:angelo-emlak:1.0:*:*:*:*:*:*:*" ]
null
null
null
5
null
GHSA-mpj8-rpjw-gv2w
Cross-site scripting (XSS) vulnerability in SVG file handling in Lutim 0.7.1 and earlier allows remote attackers to inject arbitrary web script.
[]
null
null
6.1
null
null
CVE-2021-0537
In onCreate of WiFiInstaller.java, there is a possible way to install a malicious Hotspot 2.0 configuration due to a tapjacking/overlay attack. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-176756141
[ "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*" ]
null
7.3
null
4.4
null
GHSA-rr9j-62f6-whm3
Improper access control in secure message component in Devolutions Server allows an authenticated user to steal unauthorized entries via the secure message entry attachment featureThis issue affects the following versions :Devolutions Server 2025.2.2.0 through 2025.2.4.0Devolutions Server 2025.1.11.0 and earlier
[]
null
7.7
null
null
null
CVE-2024-1972
SourceCodester Online Job Portal EditProfile.php cross site scripting
A vulnerability was found in SourceCodester Online Job Portal 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file /Employer/EditProfile.php. The manipulation of the argument Address leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-255128.
[ "cpe:2.3:a:sourcecodester:online_job_portal:*:*:*:*:*:*:*:*", "cpe:2.3:a:oretnom23:online_job_portal:1.0:*:*:*:*:*:*:*" ]
null
3.5
3.5
4
null
GHSA-28c3-wp2j-prjr
The Kibana fix for CVE-2017-8451 was found to be incomplete. With X-Pack installed, Kibana versions before 6.0.1 and 5.6.5 have an open redirect vulnerability on the login page that would enable an attacker to craft a link that redirects to an arbitrary website.
[]
null
null
6.1
null
null
GHSA-3gp9-h8hw-pxpw
Denial of service in .NET core
.NET Core and Visual Studio Denial of Service Vulnerability due to a vulnerability which exists when creating HTTPS web request during X509 certificate chain building.
[]
null
6.5
null
null
null
GHSA-p3q7-qq4w-p579
Unspecified vulnerability in HP Application Lifecycle Management (aka Quality Center) 11.5x and 12.0x allows local users to gain privileges via unknown vectors, aka ZDI-CAN-2138.
[]
null
null
null
null
null
GHSA-v5q9-w576-r6ph
In wlan driver, there is a possible missing permission check, This could lead to local information disclosure.
[]
null
5.5
null
null
null
GHSA-5jr9-r58p-jc88
An exploitable cross-site request forgery vulnerability exists in the web server functionality of Moxa EDR-810 V4.1 build 17030317. A specially crafted HTTP packet can cause cross-site request forgery. An attacker can create malicious HTML to trigger this vulnerability.
[]
null
null
8.8
null
null
CVE-2023-2028
Call Now Accessibility Button < 1.1 - Admin+ Stored Cross Site Scripting
The Call Now Accessibility Button WordPress plugin before 1.1 does not properly sanitize some of its settings, which could allow high-privilege users to perform Stored Cross-Site Scripting (XSS) attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
[ "cpe:2.3:a:stpetedesign:call_now_accessibility_button:*:*:*:*:*:wordpress:*:*" ]
null
4.8
null
null
null
CVE-2006-0861
Michael Salzer Guestbox 0.6, and other versions before 0.8, allows remote attackers to obtain the source IP addresses of guestbook entries via a direct request to /gb/gblog.
[ "cpe:2.3:a:michael_salzer:guestbox:0.6:*:*:*:*:*:*:*" ]
null
null
null
5
null
CVE-2014-9270
Cross-site scripting (XSS) vulnerability in the projax_array_serialize_for_autocomplete function in core/projax_api.php in MantisBT 1.1.0a3 through 1.2.17 allows remote attackers to inject arbitrary web script or HTML via the "profile/Platform" field.
[ "cpe:2.3:a:mantisbt:mantisbt:1.0.0:a3:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc4:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc5:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.1.0:a1:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.1.0:a2:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.1.0:a3:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.1.0:a4:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.1.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.1.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.1.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.1.8:*:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.1.9:*:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.2.0:alpha1:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.2.0:alpha2:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.2.0:alpha3:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.2.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.2.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.2.10:*:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.2.11:*:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.2.12:*:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.2.13:*:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.2.14:*:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.2.15:*:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.2.16:*:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.2.17:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
CVE-2023-24857
Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability
Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability
[ "cpe:2.3:o:microsoft:windows_10:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*" ]
null
6.5
null
null
null
CVE-2014-0793
Multiple cross-site scripting (XSS) vulnerabilities in the StackIdeas Komento (com_komento) component before 1.7.3 for Joomla! allow remote attackers to inject arbitrary web script or HTML via the (1) website or (2) latitude parameter in a comment to the default URI.
[ "cpe:2.3:a:stackideas:komento:*:*:*:*:*:*:*:*", "cpe:2.3:a:stackideas:komento:1.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:stackideas:komento:1.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:*:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
CVE-2020-7559
A CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability exists in PLC Simulator on EcoStruxureª Control Expert (now Unity Pro) (all versions) that could cause a crash of the PLC simulator present in EcoStruxureª Control Expert software when receiving a specially crafted request over Modbus.
[ "cpe:2.3:a:schneider-electric:ecostruxure_control_expert:*:*:*:*:*:*:*:*" ]
null
7.5
null
5
null
CVE-2021-41415
Subscription-Manager v1.0 /main.js has a cross-site scripting (XSS) vulnerability in the machineDetail parameter.
[ "cpe:2.3:a:subscription-manager_project:subscription-manager:1.0:*:*:*:*:*:*:*" ]
null
6.1
null
4.3
null
RHSA-2019:3419
Red Hat Security Advisory: libtiff security update
libtiff: Heap-based buffer overflow in the cpSeparateBufToContigBuf function resulting in a denial of service or possibly code execution
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
null
5.3
null
null
CVE-2010-0804
Cross-site scripting (XSS) vulnerability in index.php in iBoutique 4.0 allows remote attackers to inject arbitrary web script or HTML via the key parameter in a products action.
[ "cpe:2.3:a:netartmedia:iboutique:4.0:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
GHSA-8rpj-mgcc-4hwx
A CSV injection vulnerability exists in the web UI of SolarWinds Serv-U FTP Server v15.1.7.
[]
null
null
null
null
null
GHSA-jrq4-jwcw-x9x4
Cross Site Scripting vulnerability in CMSmadesimple v.2.2.18 allows a local attacker to execute arbitrary code via a crafted script to the extra parameter in the news menu component.
[]
null
5.4
null
null
null
GHSA-574v-3xxh-gwh5
TP-Link Tapo C200 IP camera, on its 1.1.15 firmware version and below, is affected by an unauthenticated RCE vulnerability, present in the uhttpd binary running by default as root. The exploitation of this vulnerability allows an attacker to take full control of the camera.
[]
null
9.8
null
null
null
CVE-2007-1721
Multiple PHP remote file inclusion vulnerabilities in C-Arbre 0.6PR7 and earlier allow remote attackers to execute arbitrary PHP code via a URL in the root_path parameter to (1) Richtxt_functions.inc.php, (2) adddocfile.php, (3) auth_check.php, (4) browse_current_category.inc.php, (5) docfile_details.php, (6) main.php, (7) mainarticle.php, (8) maindocfile.php, (9) modify.php, (10) new.php, (11) resource_details.php, or (12) smallsearch.php in lib/; or (13) mwiki/LocalSettings.php.
[ "cpe:2.3:a:realink:c-arbre:*:*:*:*:*:*:*:*" ]
null
null
null
10
null
CVE-2018-5212
The Simple Download Monitor plugin before 3.5.4 for WordPress has XSS via the sdm_upload_thumbnail (aka File Thumbnail) parameter in an edit action to wp-admin/post.php.
[ "cpe:2.3:a:simple_download_monitor_project:simple_download_monitor:3.5.4:*:*:*:*:wordpress:*:*" ]
null
null
5.4
3.5
null
CVE-2019-11178
Stack overflow in Intel(R) Baseboard Management Controller firmware may allow an authenticated user to potentially enable information disclosure and/or denial of service via network access.
[ "cpe:2.3:o:intel:baseboard_management_controller_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:bbs2600bpb:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:bbs2600bpbr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:bbs2600bpq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:bbs2600bpqr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:bbs2600bps:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:bbs2600bpsr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:bbs2600stb:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:bbs2600stbr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:bbs2600stq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:bbs2600stqr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:hns2600bpb:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:hns2600bpb24:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:hns2600bpb24r:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:hns2600bpb24rx:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:hns2600bpblc:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:hns2600bpblc24:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:hns2600bpblc24r:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:hns2600bpblcr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:hns2600bpbr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:hns2600bpbrx:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:hns2600bpq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:hns2600bpq24:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:hns2600bpq24r:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:hns2600bpqr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:hns2600bps:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:hns2600bps24:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:hns2600bps24r:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:hns2600bpsr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:hpchns2600bpbr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:hpchns2600bpqr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:hpchns2600bpsr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:hpcr1208wfqysr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:hpcr1208wftysr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:hpcr1304wf0ysr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:hpcr1304wftysr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:hpcr2208wf0zsr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:hpcr2208wfqzsr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:hpcr2208wftzsr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:hpcr2208wftzsrx:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:hpcr2224wftzsr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:hpcr2308wftzsr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:hpcr2312wf0npr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:hpcr2312wftzsr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:r1208wfqysr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:r1208wftys:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:r1208wftysr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:r1304wf0ys:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:r1304wf0ysr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:r1304wftys:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:r1304wftysr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:r2208wf0zs:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:r2208wf0zsr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:r2208wfqzs:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:r2208wfqzsr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:r2208wftzs:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:r2208wftzsr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:r2208wftzsrx:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:r2224wfqzs:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:r2224wftzs:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:r2224wftzsr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:r2308wftzs:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:r2308wftzsr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:r2312wf0np:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:r2312wf0npr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:r2312wfqzs:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:r2312wftzs:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:r2312wftzsr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:s2600stb:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:s2600stbr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:s2600stq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:s2600stqr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:s2600wf0:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:s2600wf0r:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:s2600wfq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:s2600wfqr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:s2600wft:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:s2600wftr:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:s9232wk1hlc:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:s9232wk2hac:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:s9232wk2hlc:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:s9248wk1hlc:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:s9248wk2hac:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:s9248wk2hlc:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:s9256wk1hlc:-:*:*:*:*:*:*:*" ]
null
8.1
null
5.5
null
CVE-2022-41581
The HW_KEYMASTER module has a vulnerability of not verifying the data read.Successful exploitation of this vulnerability may cause malicious construction of data, which results in out-of-bounds access.
[ "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*" ]
null
9.1
null
null
null
CVE-2019-8246
Adobe Media Encoder versions 13.1 and earlier have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution .
[ "cpe:2.3:a:adobe:media_encoder:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
9.8
null
10
null
CVE-2024-20277
A vulnerability in the web-based management interface of Cisco ThousandEyes Enterprise Agent, Virtual Appliance installation type, could allow an authenticated, remote attacker to perform a command injection and elevate privileges to root. This vulnerability is due to insufficient validation of user-supplied input for the web interface. An attacker could exploit this vulnerability by sending a crafted HTTP packet to the affected device. A successful exploit could allow the attacker to execute arbitrary commands and elevate privileges to root.
[ "cpe:2.3:a:cisco:thousandeyes_enterprise_agent:*:*:*:*:*:*:*:*" ]
null
6.8
null
null
null
CVE-2024-2716
Campcodes Complete Online DJ Booking System contactus.php cross site scripting
A vulnerability was found in Campcodes Complete Online DJ Booking System 1.0. It has been classified as problematic. This affects an unknown part of the file /admin/contactus.php. The manipulation of the argument email leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-257469 was assigned to this vulnerability.
[]
null
3.5
3.5
4
null
GHSA-mpm5-mv3x-34x2
Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK & Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
[]
null
null
null
null
null
CVE-2024-2060
SourceCodester Petrol Pump Management Software login_crud.php sql injection
A vulnerability classified as critical has been found in SourceCodester Petrol Pump Management Software 1.0. This affects an unknown part of the file /admin/app/login_crud.php. The manipulation of the argument email leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-255375.
[ "cpe:2.3:a:sourcecodester:petrol_pump_management:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:mayurik:petrol_pump_management:1.0:*:*:*:*:*:*:*" ]
null
4.7
4.7
5.8
null
CVE-2023-22254
AEM Reflected XSS Arbitrary code execution
Experience Manager versions 6.5.15.0 (and earlier) are affected by a reflected Cross-Site Scripting (XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
[ "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:experience_manager_cloud_service:*:*:*:*:*:*:*:*" ]
null
5.4
null
null
null
GHSA-6x5f-79qf-m4q2
Cross-site scripting (XSS) vulnerability in album.php in Atomic Photo Album (APA) 1.1.0pre4 allows remote attackers to inject arbitrary web script or HTML via the apa_album_ID parameter.
[]
null
null
null
null
null
GHSA-ppc4-w5f5-v2jw
TOTOLINK X5000R V9.1.0cu.2350_B20230313 was discovered to contain a command injection vulnerability via the 'port' parameter in the setSSServer function at /cgi-bin/cstecgi.cgi.
[]
null
9.8
null
null
null
CVE-2001-1193
Directory traversal vulnerability in EFTP 2.0.8.346 allows local users to read directories via a ... (modified dot dot) in the CWD command.
[ "cpe:2.3:a:khamil_landross_and_zack_jones:eftp:2.0.8.346:*:*:*:*:*:*:*" ]
null
null
null
5
null
GHSA-w5wj-83wg-9p94
The Aztech DSL600EU router, when WAN access to the web interface is disabled, does not properly block inbound traffic on TCP port 80, which allows remote attackers to connect to the web interface by guessing a TCP sequence number, possibly involving spoofing of an ARP packet, a related issue to CVE-1999-0077.
[]
null
null
null
null
null
RHSA-2018:1664
Red Hat Security Advisory: libvirt security update
hw: cpu: speculative store bypass
[ "cpe:/o:redhat:rhel_aus:6.4::server" ]
null
null
5.6
null
null
CVE-2025-44072
SeaCMS v13.3 was discovered to contain a SQL injection vulnerability via the component admin_manager.php.
[]
null
9.8
null
null
null
GHSA-33pv-vcgh-jfg9
Wagtail vulnerable to denial-of-service via memory exhaustion when uploading large files
ImpactA memory exhaustion bug exists in Wagtail's handling of uploaded images and documents. For both images and documents, files are loaded into memory during upload for additional processing. A user with access to upload images or documents through the Wagtail admin interface could upload a file so large that it results in a crash or denial of service.The vulnerability is not exploitable by an ordinary site visitor without access to the Wagtail admin. It can only be exploited by admin users with permission to upload images or documents.Image uploads are [restricted to 10MB by default](https://docs.wagtail.org/en/stable/reference/settings.html#wagtailimages-max-upload-size), however this validation only happens on the frontend and on the backend after the vulnerable code.PatchesPatched versions have been released as Wagtail 4.1.4 (for the LTS 4.1 branch) and Wagtail 4.2.2 (for the current 4.2 branch).WorkaroundsSite owners who are unable to upgrade to the new versions are encouraged to add extra protections outside of Wagtail to limit the size of uploaded files. Exactly how this is done will vary based on your hosting environment, but here are a few references for common setups:Nginx: [`client_max_body_size`](https://nginx.org/en/docs/http/ngx_http_core_module.html#client_max_body_size)Apache: [`LimitRequestBody`](https://httpd.apache.org/docs/2.4/mod/core.html#limitrequestbody)Cloudflare: Already [imposes a limit of 100MB - 500MB](https://developers.cloudflare.com/cache/about/default-cache-behavior#customization-options-and-limitations) depending on planCloudFront: [`SizeConstraint`](https://docs.aws.amazon.com/waf/latest/APIReference/API_SizeConstraintStatement.html)Traefik: [`traefik.http.middlewares.limit.buffering.maxRequestBodyBytes`](https://doc.traefik.io/traefik/middlewares/http/buffering/#maxrequestbodybytes)The changes themselves are deep inside Wagtail, making patching incredibly difficult.
[]
5.9
4.4
null
null
null
CVE-2023-52679
of: Fix double free in of_parse_phandle_with_args_map
In the Linux kernel, the following vulnerability has been resolved: of: Fix double free in of_parse_phandle_with_args_map In of_parse_phandle_with_args_map() the inner loop that iterates through the map entries calls of_node_put(new) to free the reference acquired by the previous iteration of the inner loop. This assumes that the value of "new" is NULL on the first iteration of the inner loop. Make sure that this is true in all iterations of the outer loop by setting "new" to NULL after its value is assigned to "cur". Extend the unittest to detect the double free and add an additional test case that actually triggers this path.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*" ]
null
7.8
null
null
null
GHSA-39v2-wqcx-xc5w
pscal in xcal 4.1 allows local users to overwrite arbitrary files via a symlink attack on a /tmp/pscal##### temporary file.
[]
null
null
null
null
null
GHSA-93x6-67rm-2qff
Multiple code execution vulnerabilities exists in the Nef polygon-parsing functionality of CGAL libcgal CGAL-5.1.1. A specially crafted malformed file can lead to an out-of-bounds read and type confusion, which could lead to code execution. An attacker can provide malicious input to trigger any of these vulnerabilities. An oob read vulnerability exists in Nef_S2/SNC_io_parser.h SNC_io_parser<EW>::read_edge() eh->out_sedge().
[]
null
8.8
null
null
null
CVE-2025-49760
Windows Storage Spoofing Vulnerability
External control of file name or path in Windows Storage allows an authorized attacker to perform spoofing over a network.
[]
null
3.5
null
null
null