id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
189k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
patch_commit_url
stringlengths
36
232
CVE-2021-45617
Certain NETGEAR devices are affected by command injection by an unauthenticated attacker. This affects CBR40 before 2.5.0.24, EAX20 before 1.0.0.48, EAX80 before 1.0.1.64, EX7500 before 1.0.0.72, R6400 before 1.0.1.68, R6900P before 1.3.2.132, R7000 before 1.0.11.116, R7000P before 1.3.2.132, R7900 before 1.0.4.38, R7960P before 1.4.1.66, R8000 before 1.0.4.66, RAX200 before 1.0.3.106, RS400 before 1.5.1.80, XR300 before 1.0.3.68, MK62 before 1.0.6.110, MR60 before 1.0.6.110, R6400v2 before 1.0.4.106, R8000P before 1.4.1.66, RAX20 before 1.0.2.64, RAX45 before 1.0.2.82, RAX80 before 1.0.3.106, MS60 before 1.0.6.110, R6700v3 before 1.0.4.106, R7900P before 1.4.1.66, RAX15 before 1.0.2.64, RAX50 before 1.0.2.82, RAX75 before 1.0.3.106, RBR750 before 3.2.16.22, RBR850 before 3.2.16.22, RBS750 before 3.2.16.22, RBS850 before 3.2.16.22, RBK752 before 3.2.16.22, and RBK852 before 3.2.16.22.
[ "cpe:2.3:o:netgear:cbr40_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:cbr40:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:eax20_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:eax20:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:eax80_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:eax80:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:ex7500_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:ex7500:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r6400_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r6400:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r6900p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r6900p:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r7000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r7000:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r7000p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r7000p:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r7900_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r7900:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r7960p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r7960p:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r8000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r8000:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:rax200_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:rax200:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:rs400_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:rs400:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:xr300_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:xr300:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:mk62_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:mk62:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:mr60_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:mr60:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r6400v2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r6400v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r8000p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r8000p:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:rax20_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:rax20:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:rax45_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:rax45:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:rax80_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:rax80:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:ms60_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:ms60:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r6700v3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r6700v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r7900p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r7900p:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:rax15_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:rax15:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:rax50_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:rax50:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:rax75_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:rax75:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:rbr750_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:rbr750:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:rbr850_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:rbr850:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:rbs750_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:rbs750:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:rbs850_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:rbs850:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:rbk752_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:rbk752:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:rbk852_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:rbk852:-:*:*:*:*:*:*:*" ]
null
9.8
null
null
null
GHSA-59vw-wx25-6mxm
Media Encoder versions 25.1, 24.6.4 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[]
null
7.8
null
null
null
GHSA-vfj8-5pj7-2f9g
OpenC3 Cross-site Scripting in Login functionality (`GHSL-2024-128`)
SummaryThe login functionality contains a reflected cross-site scripting (XSS) vulnerability.Note: This CVE only affects Open Source Edition, and not OpenC3 COSMOS Enterprise EditionImpactThis issue may lead up to Remote Code Execution (RCE).
[]
5.1
6.1
null
null
null
CVE-2022-41191
Due to lack of proper memory management, when a victim opens a manipulated Jupiter Tesselation (.jt, JTReader.x3d) file received from untrusted sources in SAP 3D Visual Enterprise Viewer - version 9, it is possible that a Remote Code Execution can be triggered when payload forces a stack-based overflow or a re-use of dangling pointer which refers to overwritten space in memory.
[ "cpe:2.3:a:sap:3d_visual_enterprise_viewer:*:*:*:*:*:*:*:*" ]
null
7.8
null
null
null
GHSA-jmrg-64rf-qpwj
The Sunshine Photo Cart plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.8.28 This is due to missing or incorrect nonce validation on the sunshine_products_quicksave_post() function. This makes it possible for unauthenticated attackers to save custom post data via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
[]
null
4.3
null
null
null
CVE-2022-2852
Use after free in FedCM in Google Chrome prior to 104.0.5112.101 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*" ]
null
8.8
null
null
null
CVE-2023-22705
WordPress Welcart e-Commerce Plugin <= 2.8.10 is vulnerable to Cross Site Scripting (XSS)
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Collne Inc. Welcart e-Commerce plugin <= 2.8.10 versions.
[ "cpe:2.3:a:collne:welcart_e-commerce:*:*:*:*:*:wordpress:*:*" ]
null
7.1
null
null
null
GHSA-4qrp-r28g-j2vf
A vulnerability in the TCP/IP traffic handling function of the Snort Detection Engine of Cisco Firepower Threat Defense (FTD) Software and Cisco FirePOWER Services could allow an unauthenticated, remote attacker to cause legitimate network traffic to be dropped, resulting in a denial of service (DoS) condition.This vulnerability is due to the improper handling of TCP/IP network traffic. An attacker could exploit this vulnerability by sending a large amount of TCP/IP network traffic through the affected device. A successful exploit could allow the attacker to cause the Cisco FTD device to drop network traffic, resulting in a DoS condition. The affected device must be rebooted to resolve the DoS condition.
[]
null
8.6
null
null
null
CVE-2023-37210
A website could prevent a user from exiting full-screen mode via alert and prompt calls. This could lead to user confusion and possible spoofing attacks. This vulnerability affects Firefox < 115.
[ "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" ]
null
6.5
null
null
null
RHSA-2021:4408
Red Hat Security Advisory: libsolv security and bug fix update
libsolv: heap-based buffer overflow in testcase_read() in src/testcase.c
[ "cpe:/a:redhat:enterprise_linux:8::crb", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
3.3
null
null
null
GHSA-75j9-xw79-qxqv
When run on commands with certain arguments set, explain may fail to validate these arguments before using them. This can lead to crashes in router servers. This affects MongoDB Server v5.0 prior to 5.0.31, MongoDB Server v6.0 prior to 6.0.20, MongoDB Server v7.0 prior to 7.0.16 and MongoDB Server v8.0 prior to 8.0.4
[]
null
6.5
null
null
null
CVE-2023-6939
Some Honor products are affected by type confusion vulnerability, successful exploitation could cause denial of service.
[ "cpe:2.3:o:hihonor:magic_ui:*:*:*:*:*:*:*:*" ]
null
4
null
null
null
RHSA-2025:10875
Red Hat Security Advisory: OpenJDK 21.0.8 Security Update for Windows Builds
openjdk: Better Glyph drawing (Oracle CPU 2025-07) openjdk: Enhance TLS protocol support (Oracle CPU 2025-07) openjdk: Improve HTTP client header handling (Oracle CPU 2025-07) openjdk: Glyph out-of-memory access and crash (Oracle CPU 2025-07)
[ "cpe:/a:redhat:openjdk:21" ]
null
8.1
null
null
null
GHSA-3m65-86mg-45wp
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley MicroStation CONNECT 10.16.02.034. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of OBJ files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-16171.
[]
null
7.8
null
null
null
GHSA-8x8p-mfwv-9fjw
Jenkins Exposure of Sensitive Information to an Unauthorized Actor vulnerability
Jenkins before 1.583 and LTS before 1.565.3 allows remote authenticated users with the Job/READ permission to obtain the default value for the password field of a parameterized job by reading the DOM.
[]
null
null
null
null
null
GHSA-2vrc-ghfq-ww6x
Out-of-bounds write in accessing buffer storing the decoded video frames in libsthmbc.so prior to SMR Jan-2025 Release 1 allows local attackers to execute arbitrary code with privilege. User interaction is required for triggering this vulnerability.
[]
null
7
null
null
null
GHSA-rqph-qm8x-qrrf
When the app is put to the background and the user goes to the task switcher of iOS, the app snapshot is not blurred which may reveal sensitive information.
[]
null
3.3
null
null
null
GHSA-qw5g-qccp-wchw
Tenda FH1202 v1.2.0.14(408) has a stack overflow vulnerability in the security_5g parameter of the formWifiBasicSet function.
[]
null
6.5
null
null
null
CVE-2022-0381
Embed Swagger <= 1.0.0 Reflected Cross-Site Scripting
The Embed Swagger WordPress plugin is vulnerable to Reflected Cross-Site Scripting due to insufficient escaping/sanitization and validation via the url parameter found in the ~/swagger-iframe.php file which allows attackers to inject arbitrary web scripts onto the page, in versions up to and including 1.0.0.
[ "cpe:2.3:a:embed_swagger_project:embed_swagger:*:*:*:*:*:wordpress:*:*" ]
null
6.1
null
null
null
CVE-2022-33870
An improper neutralization of special elements used in an OS command vulnerability [CWE-78] in the command line interpreter of FortiTester 3.0.0 through 3.9.1, 4.0.0 through 4.2.0, 7.0.0 through 7.1.0 may allow an authenticated attacker to execute unauthorized commands via specifically crafted arguments to existing commands.
[ "cpe:2.3:a:fortinet:fortitester:3.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortitester:3.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortitester:3.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortitester:3.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortitester:3.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortitester:3.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortitester:3.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortitester:3.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortitester:3.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortitester:3.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortitester:3.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortitester:3.8.0:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortitester:3.9.0:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortitester:3.9.1:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortitester:4.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortitester:4.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortitester:4.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortitester:4.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortitester:7.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortitester:7.1.0:*:*:*:*:*:*:*" ]
null
7.8
null
null
null
RHSA-2024:1649
Red Hat Security Advisory: postgresql-jdbc: security update
pgjdbc: PostgreSQL JDBC Driver allows attacker to inject SQL if using PreferQueryMode=SIMPLE
[ "cpe:/a:redhat:rhel_eus:9.2::appstream" ]
null
9.8
null
null
null
CVE-2024-40689
IBM InfoSphere Information Server SQL injection
IBM InfoSphere Information Server 11.7 is vulnerable to SQL injection. A remote attacker could send specially crafted SQL statements, which could allow the attacker to view, add, modify, or delete information in the back-end database. IBM X-Force ID: 297719.
[ "cpe:2.3:a:ibm:infosphere_information_server:11.7:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:infosphere_information_server_on_cloud:11.7:*:*:*:*:*:*:*" ]
null
6
null
null
null
CVE-2021-22452
A component of the HarmonyOS has a Improper Input Validation vulnerability. Local attackers may exploit this vulnerability to read at any address.
[ "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*" ]
null
5.5
null
2.1
null
GHSA-qmwq-g6wj-vpwj
Unspecified vulnerability in HP Service Manager WebTier and Windows Client 9.20 and 9.21 before 9.21.661 p8 allows remote authenticated users to execute arbitrary code via unknown vectors.
[]
null
null
null
null
null
CVE-2019-7628
Pagure 5.2 leaks API keys by e-mailing them to users. Few e-mail servers validate TLS certificates, so it is easy for man-in-the-middle attackers to read these e-mails and gain access to Pagure on behalf of other users. This issue is found in the API token expiration reminder cron job in files/api_key_expire_mail.py; disabling that job is also a viable solution. (E-mailing a substring of the API key was an attempted, but rejected, solution.)
[ "cpe:2.3:a:redhat:pagure:5.2:*:*:*:*:*:*:*" ]
null
null
5.9
4.3
null
CVE-2024-27525
Cross Site Scripting vulnerability in Chamilo LMS v.1.11.26 allows a remote attacker to escalate privileges via a crafted script to the filename parameter of the home.php component.
[ "cpe:2.3:a:chamilo:chamilo_lms:*:*:*:*:*:*:*:*" ]
null
4.6
null
null
null
CVE-2025-6633
RBG File Parsing Out-of-Bounds Write Vulnerability
A maliciously crafted RBG file, when parsed through Autodesk 3ds Max, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process.
[ "cpe:2.3:a:autodesk:3ds_max:2026.2:*:*:*:*:*:*:*" ]
null
7.8
null
null
null
GHSA-gx25-vx95-m52w
Incorrect garbage collection interaction in IndexedDB could have led to a use-after-free. This vulnerability affects Firefox < 129 and Firefox ESR < 128.1.
[]
null
9.8
null
null
null
GHSA-c8pj-5cqm-hgg7
A vulnerability classified as critical has been found in DedeCMS 5.7.111. Affected is an unknown function of the file baidunews.php. The manipulation leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-240948.
[]
null
null
6.3
null
null
CVE-2020-1497
Microsoft Excel Information Disclosure Vulnerability
An information disclosure vulnerability exists when Microsoft Excel improperly discloses the contents of its memory. An attacker who exploited the vulnerability could use the information to compromise the user’s computer or data. To exploit the vulnerability, an attacker could craft a special document file and then convince the user to open it. An attacker must know the memory address location where the object was created. The update addresses the vulnerability by changing the way certain Excel functions handle objects in memory.
[ "cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:*:*", "cpe:2.3:a:microsoft:excel:2010:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:excel:2013:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:excel:2013:sp1:*:*:rt:*:*:*", "cpe:2.3:a:microsoft:excel:2016:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2010:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2013:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2013:sp1:*:*:rt:*:*:*", "cpe:2.3:a:microsoft:office:2016:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2019:*:*:*:*:-:*:*", "cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:excel:2016:*:*:*:*:*:x86:*", "cpe:2.3:a:microsoft:excel:2016:*:*:*:*:*:x64:*", "cpe:2.3:a:microsoft:office:2016:*:*:*:*:*:x86:*", "cpe:2.3:a:microsoft:office:2016:*:*:*:*:*:x64:*", "cpe:2.3:a:microsoft:excel:2013:sp1:*:*:*:*:x86:*", "cpe:2.3:a:microsoft:excel:2013:sp1:*:*:*:*:x64:*", "cpe:2.3:a:microsoft:office:2013:sp1:*:*:*:*:x86:*", "cpe:2.3:a:microsoft:office:2013:sp1:*:*:*:*:x64:*" ]
null
5.5
null
4.3
null
CVE-2015-0601
Cisco Unified IP 9900 phones with firmware 9.4(.1) and earlier allow local users to cause a denial of service (device reload) via crafted commands, aka Bug ID CSCup92790.
[ "cpe:2.3:o:cisco:unified_ip_phones_9971_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:unified_ip_phone_9971:*:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:unified_ip_phones_9951_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:unified_ip_phone_9951:*:*:*:*:*:*:*:*" ]
null
null
null
4.6
null
GHSA-2cj9-r6h5-6jwg
ServerDocs Server in Apple OS X Server before 5.2 supports the RC4 cipher, which might allow remote attackers to defeat cryptographic protection mechanisms via unspecified vectors.
[]
null
null
7.5
null
null
GHSA-22rq-8f3w-579w
The Samsung J7 Neo Android device with a build fingerprint of samsung/j7velteub/j7velte:8.1.0/M1AJQ/J701MUBS6BSB4:user/release-keys contains a pre-installed app with a package name of com.samsung.android.themecenter app (versionCode=7000100, versionName=7.0.1.0) that allows other pre-installed apps to perform app installation via an accessible app component. This capability can be accessed by any pre-installed app on the device which can obtain signatureOrSystem permissions that are required by other other pre-installed apps that exported their capabilities to other pre-installed app.
[]
null
null
null
null
null
CVE-2011-5056
The authoritative server in MaraDNS through 2.0.04 computes hash values for DNS data without restricting the ability to trigger hash collisions predictably, which might allow local users to cause a denial of service (CPU consumption) via crafted records in zone files, a different vulnerability than CVE-2012-0024.
[ "cpe:2.3:a:maradns:maradns:*:*:*:*:*:*:*:*" ]
null
null
null
2.1
null
GHSA-8xqw-f37j-96v8
Protection mechanism failure in the Intel(R) Ethernet 500 Series Controller drivers for VMware before version 1.10.0.13 may allow an authenticated user to potentially enable escalation of privilege via local access.
[]
null
7.8
null
null
null
RHSA-2020:3194
Red Hat Security Advisory: Container-native Virtualization security, bug fix, and enhancement update
containernetworking/plugins: IPv6 router advertisements allow for MitM attacks on IPv4 clusters kubevirt: VMIs can be used to access host files
[ "cpe:/a:redhat:container_native_virtualization:2.4::el8" ]
null
9.9
null
null
null
GHSA-9wv2-mrrp-v8g7
RMI was not requiring authentication when calling ChronosRMIService:setEventOrganizer. Attackers with local or adjacent network access could abuse the RMI service to modify calendar items using RMI. RMI access is restricted to localhost by default. The interface has been updated to require authenticated requests. No publicly available exploits are known.
[]
null
5.6
null
null
null
CVE-2015-0363
Unspecified vulnerability in the Siebel Core EAI component in Oracle Siebel CRM 8.1.1 and 8.2.2 allows remote authenticated users to affect availability via unknown vectors related to Integration Business Services.
[ "cpe:2.3:a:oracle:siebel_crm:8.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:siebel_crm:8.2.2:*:*:*:*:*:*:*" ]
null
null
null
4
null
CVE-2014-8639
Mozilla Firefox before 35.0, Firefox ESR 31.x before 31.4, Thunderbird before 31.4, and SeaMonkey before 2.32 do not properly interpret Set-Cookie headers within responses that have a 407 (aka Proxy Authentication Required) status code, which allows remote HTTP proxy servers to conduct session fixation attacks by providing a cookie name that corresponds to the session cookie of the origin server.
[ "cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:31.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:31.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox_esr:31.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*" ]
null
null
null
6.8
null
GHSA-28j3-x77x-9653
IP-COM M50 V15.11.0.33(10768) was discovered to contain a buffer overflow via the rules parameter in the formAddDnsHijack function.
[]
null
9.8
null
null
null
CVE-2009-2035
Unspecified vulnerability in Services 6.x before 6.x-0.14, a module for Drupal, when key-based access is enabled, allows remote attackers to read or add keys and access unauthorized services via unspecified vectors.
[ "cpe:2.3:a:drupal:services_module_for_drupal:*:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:services_module_for_drupal:6.x-0.12:*:*:*:*:*:*:*" ]
null
null
null
6.4
null
GHSA-q788-3q72-cgx4
Teamtek Universal FTP Server 1.0.50 allows remote attackers to cause a denial of service (daemon crash or hang) via (1) multiple STOR (aka PUT) commands, or an MKD command followed by (2) a '*' argument, (3) a '|' argument, (4) spaces, or (5) a long string. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
[]
null
null
null
null
null
GHSA-9j82-qgpc-g3mq
The Auto-hyperlink URLs WordPress plugin through 5.4.1 does not set rel="noopener noreferer" on generated links, which can lead to Tab Nabbing by giving the target site access to the source tab through the window.opener DOM object.
[]
null
5.4
null
null
null
RHSA-2024:3781
Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.4 Product Security and Bug Fix Update
pip: Mercurial configuration injectable in repo revision when installing via pip golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS golang: net/http: golang: mime/multipart: golang: net/textproto: memory exhaustion in Request.ParseMultipartForm python-cryptography: NULL-dereference when loading PKCS7 certificates pillow: Arbitrary Code Execution via the environment parameter python-gunicorn: HTTP Request Smuggling due to improper validation of Transfer-Encoding headers python-idna: potential DoS via resource consumption via specially crafted inputs to idna.encode() python-pydantic: regular expression denial of service via crafted email string sqlparse: parsing heavily nested list leads to denial of service psf/black: ReDoS via the lines_with_leading_tabs_expanded() function in strings.py file golang: crypto/x509: Verify panics on certificates with an unknown public key algorithm python-cryptography: NULL pointer dereference with pkcs12.serialize_key_and_certificates when called with a non-matching certificate and private key and an hmac_hash override aiohttp: XSS on index pages for static file handling python-django: Potential regular expression denial-of-service in django.utils.text.Truncator.words() python-pillow: buffer overflow in _imagingcms.c follow-redirects: Possible credential leak aiohttp: DoS when trying to parse malformed POST requests python-social-auth: Improper Handling of Case Sensitivity in social-auth-app-django jinja2: accepts keys containing non-attribute characters requests: subsequent requests to the same host ignore cert verification
[ "cpe:/a:redhat:ansible_automation_platform:2.4::el8", "cpe:/a:redhat:ansible_automation_platform:2.4::el9", "cpe:/a:redhat:ansible_automation_platform_developer:2.4::el8", "cpe:/a:redhat:ansible_automation_platform_developer:2.4::el9", "cpe:/a:redhat:ansible_automation_platform_inside:2.4::el8", "cpe:/a:redhat:ansible_automation_platform_inside:2.4::el9" ]
null
5.6
7.5
null
null
GHSA-4xcq-vmqm-999q
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Kienso Co-marquage service-public.Fr allows Reflected XSS.This issue affects Co-marquage service-public.Fr: from n/a through 0.5.72.
[]
null
7.1
null
null
null
GHSA-6hq3-f3rw-pvjc
A Denial-of-Service (DoS) vulnerability was discovered in F-Secure Atlant whereby the aerdl.dll component used in certain WithSecure products unpacker function crashes which leads to scanning engine crash. The exploit can be triggered remotely by an attacker.
[]
null
7.5
null
null
null
cisco-sa-20190904-unified-ccx-ssrf
Cisco Unified Contact Center Express Request Processing Server-Side Request Forgery Vulnerability
A vulnerability in Cisco Unified Contact Center Express (Unified CCX) could allow an unauthenticated, remote attacker to bypass access controls and conduct a server-side request forgery (SSRF) attack on a targeted system. The vulnerability is due to improper validation of user-supplied input on the affected system. An attacker could exploit this vulnerability by sending the user of the web application a crafted request. If the request is processed, the attacker could access the system and perform unauthorized actions. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190904-unified-ccx-ssrf ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190904-unified-ccx-ssrf"]
[]
null
null
5.3
null
null
CVE-2024-0417
DeShang DSShop MemberAuth.php path traversal
A vulnerability, which was classified as critical, was found in DeShang DSShop up to 2.1.5. This affects an unknown part of the file application/home/controller/MemberAuth.php. The manipulation of the argument member_info leads to path traversal: '../filedir'. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-250437 was assigned to this vulnerability.
[ "cpe:2.3:a:csdeshang:dsshop:*:*:*:*:*:*:*:*" ]
null
5.4
5.4
5.5
null
GHSA-hrfh-7j5f-8ccr
Pivotal RabbitMQ is vulnerable to a denial of service attack
Pivotal RabbitMQ, versions 3.7.x prior to 3.7.21 and 3.8.x prior to 3.8.1, and RabbitMQ for Pivotal Platform, 1.16.x versions prior to 1.16.7 and 1.17.x versions prior to 1.17.4, contain a web management plugin that is vulnerable to a denial of service attack. The "X-Reason" HTTP Header can be leveraged to insert a malicious Erlang format string that will expand and consume the heap, resulting in the server crashing.
[]
null
7.5
null
null
null
GHSA-gv6j-2v3m-7374
StarTrinity Softswitch version 2023-02-16 - Multiple Reflected XSS (CWE-79)
[]
null
8.8
null
null
null
GHSA-x2wx-h55f-89c3
An issue was discovered in DonLinkage 6.6.8. It allows remote attackers to obtain potentially sensitive information via a direct request for files/temporary.txt.
[]
null
null
5.4
null
null
GHSA-q9mg-7cq7-w5cm
SQL injection vulnerability in Ecava IntegraXor SCADA Server Stable 4.1.4360 and earlier and Beta 4.1.4392 and earlier allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
[]
null
null
null
null
null
CVE-2013-2784
Triangle Research International (aka Tri) Nano-10 PLC devices with firmware before r81 use an incorrect algorithm for bounds checking of data in Modbus/TCP packets, which allows remote attackers to cause a denial of service (networking outage) via a crafted packet to TCP port 502.
[ "cpe:2.3:o:triplc:nano-10_plc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:triplc:nano-10_plc:-:*:*:*:*:*:*:*" ]
null
null
null
7.8
null
GHSA-9f3p-cpj2-496g
Stack-based buffer overflow in the FindConfigChildeKeyList method in the XNSSDKDEVICE.XnsSdkDeviceCtrlForIpInstaller.1 ActiveX control in Samsung iPOLiS Device Manager before 1.8.7 allows remote attackers to execute arbitrary code via a long value.
[]
null
null
null
null
null
CVE-2023-2076
Campcodes Online Traffic Offense Management System Users.phpp cross site scripting
A vulnerability classified as problematic was found in Campcodes Online Traffic Offense Management System 1.0. This vulnerability affects unknown code of the file /classes/Users.phpp. The manipulation of the argument id leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-226054 is the identifier assigned to this vulnerability.
[ "cpe:2.3:a:online_traffic_offense_management_system_project:online_traffic_offense_management_system:1.0:*:*:*:*:*:*:*" ]
null
3.5
3.5
4
null
GHSA-hw28-2wwc-xj8m
ActiveX Control in MyBuilder before 6.2.2019.814 allow an attacker to execute arbitrary command via the ShellOpen method. This can be leveraged for code execution
[]
null
9.8
null
null
null
GHSA-xwjf-v823-v896
drivers/hid/hid-pl.c in the Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_HID_PANTHERLORD is enabled, allows physically proximate attackers to cause a denial of service (heap-based out-of-bounds write) via a crafted device.
[]
null
null
null
null
null
CVE-2014-8079
Cross-site scripting (XSS) vulnerability in the MAYO theme 7.x-1.x before 7.x-1.3 for Drupal allows remote authenticated users with the "administer themes" permission to inject arbitrary web script or HTML via vectors related to header background setting.
[ "cpe:2.3:a:drupal:mayo:7.x-1.1:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:mayo:7.x-1.2:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:mayo:7.x-1.x-dev:*:*:*:*:*:*:*" ]
null
null
null
4
null
GHSA-7w8v-5fcq-pvqw
Apache Shenyu Server Side Request Forgery vulnerability
There exists an SSRF (Server-Side Request Forgery) vulnerability located at the `/sandbox/proxyGateway` endpoint. This vulnerability allows us to manipulate arbitrary requests and retrieve corresponding responses by inputting any URL into the requestUrl parameter.Of particular concern is our ability to exert control over the HTTP method, cookies, IP address, and headers. This effectively grants us the capability to dispatch complete HTTP requests to hosts of our choosing.This issue affects Apache ShenYu: 2.5.1.Upgrade to Apache ShenYu 2.6.0 or apply patch  https://github.com/apache/shenyu/pull/4776  .
[]
null
6.5
null
null
null
RHSA-2015:0074
Red Hat Security Advisory: jasper security update
jasper: dec->numtiles off-by-one check in jpc_dec_process_sot() (oCERT-2015-001) jasper: unrestricted stack memory use in jpc_qmfb.c (oCERT-2015-001)
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation", "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
null
CVE-2015-0204
The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote SSL servers to conduct RSA-to-EXPORT_RSA downgrade attacks and facilitate brute-force decryption by offering a weak ephemeral RSA key in a noncompliant role, related to the "FREAK" issue. NOTE: the scope of this CVE is only client code based on OpenSSL, not EXPORT_RSA issues associated with servers or other TLS implementations.
[ "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.0a:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.0b:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.0c:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.0d:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.0e:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.0f:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.0g:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.0h:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.0i:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.0j:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.0k:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.0l:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.0m:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.0n:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.0o:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.1a:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.1b:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.1c:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.1d:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.1e:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.1f:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.1g:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.1h:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.1i:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.1j:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
GHSA-x2m8-38gf-mf66
Infopop UBB.Threads before 6.5.2 Beta allows remote attackers to include arbitrary files via the language parameter in a cookie followed by a null (%00) byte.
[]
null
null
null
null
null
CVE-2018-2488
It is possible for a malware application installed on an Android device to send local push notifications with an empty message to SAP Fiori Client and cause the application to crash. SAP Fiori Client version 1.11.5 in Google Play store addresses these issues and users must update to that version.
[ "cpe:2.3:a:sap:fiori_client:*:*:*:*:*:*:*:*" ]
null
null
7.8
6.8
null
CVE-2025-37768
drm/amd/pm: Prevent division by zero
In the Linux kernel, the following vulnerability has been resolved: drm/amd/pm: Prevent division by zero The user can set any speed value. If speed is greater than UINT_MAX/8, division by zero is possible. Found by Linux Verification Center (linuxtesting.org) with SVACE.
[]
null
null
null
null
null
CVE-2023-32646
Uncontrolled search path element in some Intel(R) VROC software before version 8.0.8.1001 may allow an authenticated user to potentially enable escalation of privilege via local access.
[ "cpe:2.3:a:intel:virtual_raid_on_cpu:*:*:*:*:*:*:*:*" ]
null
6.7
null
null
null
GHSA-h68m-73wg-339q
SQL injection vulnerability in index.php in IceBB 1.0-rc9.3 and earlier allows remote attackers to execute arbitrary SQL commands via the skin parameter, probably related to an incorrect protection mechanism in the clean_string function in includes/functions.php.
[]
null
null
null
null
null
CVE-2017-1622
IBM QRadar SIEM 7.2.8 and 7.3 does not validate, or incorrectly validates, a certificate. This weakness might allow an attacker to spoof a trusted entity by using a man-in-the-middle (MITM) attack. IBM X-force ID: 133120.
[ "cpe:2.3:a:ibm:qradar_incident_forensics:*:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:qradar_incident_forensics:7.2.8:-:*:*:*:*:*:*", "cpe:2.3:a:ibm:qradar_incident_forensics:7.2.8:p1:*:*:*:*:*:*", "cpe:2.3:a:ibm:qradar_incident_forensics:7.2.8:p10:*:*:*:*:*:*", "cpe:2.3:a:ibm:qradar_incident_forensics:7.2.8:p11:*:*:*:*:*:*", "cpe:2.3:a:ibm:qradar_incident_forensics:7.2.8:p12:*:*:*:*:*:*", "cpe:2.3:a:ibm:qradar_incident_forensics:7.2.8:p13:*:*:*:*:*:*", "cpe:2.3:a:ibm:qradar_incident_forensics:7.2.8:p3:*:*:*:*:*:*", "cpe:2.3:a:ibm:qradar_incident_forensics:7.2.8:p4:*:*:*:*:*:*", "cpe:2.3:a:ibm:qradar_incident_forensics:7.2.8:p5:*:*:*:*:*:*", "cpe:2.3:a:ibm:qradar_incident_forensics:7.2.8:p6:*:*:*:*:*:*", "cpe:2.3:a:ibm:qradar_incident_forensics:7.2.8:p7:*:*:*:*:*:*", "cpe:2.3:a:ibm:qradar_incident_forensics:7.2.8:p8:*:*:*:*:*:*", "cpe:2.3:a:ibm:qradar_incident_forensics:7.2.8:p9:*:*:*:*:*:*", "cpe:2.3:a:ibm:qradar_incident_forensics:7.3.1:-:*:*:*:*:*:*", "cpe:2.3:a:ibm:qradar_incident_forensics:7.3.1:p1:*:*:*:*:*:*", "cpe:2.3:a:ibm:qradar_incident_forensics:7.3.1:p2:*:*:*:*:*:*", "cpe:2.3:a:ibm:qradar_incident_forensics:7.3.1:p3:*:*:*:*:*:*", "cpe:2.3:a:ibm:qradar_incident_forensics:7.3.1:p4:*:*:*:*:*:*", "cpe:2.3:a:ibm:qradar_incident_forensics:7.3.1:p5:*:*:*:*:*:*", "cpe:2.3:a:ibm:qradar_incident_forensics:7.3.1:p6:*:*:*:*:*:*" ]
null
null
3.7
null
null
GHSA-mhq7-m27c-9qjm
Memory leak in the dissection engine in Wireshark 3.4.0 allows denial of service via packet injection or crafted capture file.
[]
null
5.3
null
null
null
CVE-2015-0105
Cross-site scripting (XSS) vulnerability in the Process Portal in IBM Business Process Manager (BPM) 8.0 through 8.0.1.3, 8.5.0 through 8.5.0.1, and 8.5.5 through 8.5.5.0 allows remote attackers to inject arbitrary web script or HTML via a crafted URL.
[ "cpe:2.3:a:ibm:business_process_manager:8.0.0.0:*:*:*:advanced:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.0.0.0:*:*:*:express:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.0.0.0:*:*:*:standard:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.0.1.0:*:*:*:advanced:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.0.1.0:*:*:*:express:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.0.1.0:*:*:*:standard:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.0.1.1:*:*:*:advanced:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.0.1.1:*:*:*:express:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.0.1.1:*:*:*:standard:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.0.1.2:*:*:*:advanced:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.0.1.2:*:*:*:express:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.0.1.2:*:*:*:standard:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.0.1.3:*:*:*:advanced:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.0.1.3:*:*:*:express:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.0.1.3:*:*:*:standard:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.5.0.0:*:*:*:advanced:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.5.0.0:*:*:*:express:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.5.0.0:*:*:*:standard:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.5.0.1:*:*:*:advanced:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.5.0.1:*:*:*:express:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.5.0.1:*:*:*:standard:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.5.5.0:*:*:*:advanced:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.5.5.0:*:*:*:express:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.5.5.0:*:*:*:standard:*:*:*" ]
null
null
null
4.3
null
GHSA-xxpc-j5ph-gmp8
There is a command injection vulnerability in the underlying Central Communications service that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's Access Point management protocol) UDP port (8211). Successful exploitation of this vulnerability results in the ability to execute arbitrary code as a privileged user on the underlying operating system.
[]
null
9.8
null
null
null
CVE-2024-44062
WordPress Custom Field Template plugin <= 2.6.5 - Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Hiroaki Miyashita Custom Field Template allows Stored XSS.This issue affects Custom Field Template: from n/a through 2.6.5.
[ "cpe:2.3:a:wpgogo:custom_field_template:*:*:*:*:*:wordpress:*:*" ]
null
6.5
null
null
null
CVE-2024-28046
Uncontrolled search path in some Intel(R) GPA software before version 2024.1 may allow an authenticated user to potentially enable escalation of privilege via local access.
[ "cpe:2.3:a:intel:graphics_performance_analyzer:*:*:*:*:*:*:*:*", "cpe:2.3:a:intel:graphics_performance_analyzers:*:*:*:*:*:*:*:*" ]
5.4
6.7
null
null
null
CVE-2019-19229
admincgi-bin/service.fcgi on Fronius Solar Inverter devices before 3.14.1 (HM 1.12.1) allows action=download&filename= Directory Traversal.
[ "cpe:2.3:o:fronius:datamanager_box_2.0_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:fronius:datamanager_box_2.0:-:*:*:*:*:*:*:*", "cpe:2.3:o:fronius:eco_25.0-3-s_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:fronius:eco_25.0-3-s:-:*:*:*:*:*:*:*", "cpe:2.3:o:fronius:eco_27.0-3-s_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:fronius:eco_27.0-3-s:-:*:*:*:*:*:*:*", "cpe:2.3:o:fronius:galvo_1.5-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:fronius:galvo_1.5-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:fronius:galvo_1.5-1_208-240_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:fronius:galvo_1.5-1_208-240:-:*:*:*:*:*:*:*", "cpe:2.3:o:fronius:galvo_2.0-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:fronius:galvo_2.0-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:fronius:galvo_2.0-1_208-240_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:fronius:galvo_2.0-1_208-240:-:*:*:*:*:*:*:*", "cpe:2.3:o:fronius:galvo_2.5-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:fronius:galvo_2.5-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:fronius:galvo_2.5-1_208-240_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:fronius:galvo_2.5-1_208-240:-:*:*:*:*:*:*:*", "cpe:2.3:o:fronius:galvo_3.0-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:fronius:galvo_3.0-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:fronius:galvo_3.1-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:fronius:galvo_3.1-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:fronius:galvo_3.1-1_208-240_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:fronius:galvo_3.1-1_208-240:-:*:*:*:*:*:*:*", "cpe:2.3:o:fronius:primo_10.0-1_208-240_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:fronius:primo_10.0-1_208-240:-:*:*:*:*:*:*:*", "cpe:2.3:o:fronius:primo_11.4-1_208-240_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:fronius:primo_11.4-1_208-240:-:*:*:*:*:*:*:*", "cpe:2.3:o:fronius:primo_12.5-1_208-240_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:fronius:primo_12.5-1_208-240:-:*:*:*:*:*:*:*", "cpe:2.3:o:fronius:primo_15.0-1_208-240_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:fronius:primo_15.0-1_208-240:-:*:*:*:*:*:*:*", "cpe:2.3:o:fronius:primo_3.0-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:fronius:primo_3.0-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:fronius:primo_3.5-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:fronius:primo_3.5-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:fronius:primo_3.6-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:fronius:primo_3.6-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:fronius:primo_3.8-1_208-240_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:fronius:primo_3.8-1_208-240:-:*:*:*:*:*:*:*", "cpe:2.3:o:fronius:primo_4.0-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:fronius:primo_4.0-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:fronius:primo_4.6-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:fronius:primo_4.6-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:fronius:primo_5.0-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:fronius:primo_5.0-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:fronius:primo_5.0-1_208-240_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:fronius:primo_5.0-1_208-240:-:*:*:*:*:*:*:*", "cpe:2.3:o:fronius:primo_5.0-1_aus_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:fronius:primo_5.0-1_aus:-:*:*:*:*:*:*:*", "cpe:2.3:o:fronius:primo_5.0-1_sc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:fronius:primo_5.0-1_sc:-:*:*:*:*:*:*:*", "cpe:2.3:o:fronius:primo_6.0-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:fronius:primo_6.0-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:fronius:primo_6.0-1_208-240_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:fronius:primo_6.0-1_208-240:-:*:*:*:*:*:*:*", "cpe:2.3:o:fronius:primo_7.6-1_208-240_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:fronius:primo_7.6-1_208-240:-:*:*:*:*:*:*:*", "cpe:2.3:o:fronius:primo_8.2-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:fronius:primo_8.2-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:fronius:primo_8.2-1_208-240_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:fronius:primo_8.2-1_208-240:-:*:*:*:*:*:*:*", "cpe:2.3:o:fronius:symo_10.0-3-m_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:fronius:symo_10.0-3-m:-:*:*:*:*:*:*:*", "cpe:2.3:o:fronius:symo_10.0-3-m-os_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:fronius:symo_10.0-3-m-os:-:*:*:*:*:*:*:*", "cpe:2.3:o:fronius:symo_10.0-3_208-240_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:fronius:symo_10.0-3_208-240:-:*:*:*:*:*:*:*", "cpe:2.3:o:fronius:symo_10.0-3_480_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:fronius:symo_10.0-3_480:-:*:*:*:*:*:*:*", "cpe:2.3:o:fronius:symo_12.0-3_208-240_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:fronius:symo_12.0-3_208-240:-:*:*:*:*:*:*:*", "cpe:2.3:o:fronius:symo_12.5-3-m_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:fronius:symo_12.5-3-m:-:*:*:*:*:*:*:*", "cpe:2.3:o:fronius:symo_12.5-3_480_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:fronius:symo_12.5-3_480:-:*:*:*:*:*:*:*", "cpe:2.3:o:fronius:symo_15.0-3-m_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:fronius:symo_15.0-3-m:-:*:*:*:*:*:*:*", "cpe:2.3:o:fronius:symo_15.0-3_107_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:fronius:symo_15.0-3_107:-:*:*:*:*:*:*:*", "cpe:2.3:o:fronius:symo_15.0-3_480_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:fronius:symo_15.0-3_480:-:*:*:*:*:*:*:*", "cpe:2.3:o:fronius:symo_17.5-3-m_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:fronius:symo_17.5-3-m:-:*:*:*:*:*:*:*", "cpe:2.3:o:fronius:symo_17.5-3_480_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:fronius:symo_17.5-3_480:-:*:*:*:*:*:*:*", "cpe:2.3:o:fronius:symo_20.0-3-m_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:fronius:symo_20.0-3-m:-:*:*:*:*:*:*:*", "cpe:2.3:o:fronius:symo_20.0-3_480_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:fronius:symo_20.0-3_480:-:*:*:*:*:*:*:*", "cpe:2.3:o:fronius:symo_22.7-3_480_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:fronius:symo_22.7-3_480:-:*:*:*:*:*:*:*", "cpe:2.3:o:fronius:symo_24.0-3_480_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:fronius:symo_24.0-3_480:-:*:*:*:*:*:*:*", "cpe:2.3:o:fronius:symo_3.0-3-m_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:fronius:symo_3.0-3-m:-:*:*:*:*:*:*:*", "cpe:2.3:o:fronius:symo_3.0-3-s_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:fronius:symo_3.0-3-s:-:*:*:*:*:*:*:*", "cpe:2.3:o:fronius:symo_3.7-3-m_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:fronius:symo_3.7-3-m:-:*:*:*:*:*:*:*", "cpe:2.3:o:fronius:symo_3.7-3-s_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:fronius:symo_3.7-3-s:-:*:*:*:*:*:*:*", "cpe:2.3:o:fronius:symo_4.5-3-m_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:fronius:symo_4.5-3-m:-:*:*:*:*:*:*:*", "cpe:2.3:o:fronius:symo_4.5-3-s_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:fronius:symo_4.5-3-s:-:*:*:*:*:*:*:*", "cpe:2.3:o:fronius:symo_5.0-3-m_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:fronius:symo_5.0-3-m:-:*:*:*:*:*:*:*", "cpe:2.3:o:fronius:symo_6.0-3-m_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:fronius:symo_6.0-3-m:-:*:*:*:*:*:*:*", "cpe:2.3:o:fronius:symo_7.0-3-m_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:fronius:symo_7.0-3-m:-:*:*:*:*:*:*:*", "cpe:2.3:o:fronius:symo_8.2-3-m_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:fronius:symo_8.2-3-m:-:*:*:*:*:*:*:*", "cpe:2.3:o:fronius:symo_advanced_10.0-3_208-240_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:fronius:symo_advanced_10.0-3_208-240:-:*:*:*:*:*:*:*", "cpe:2.3:o:fronius:symo_advanced_12.0-3_208-240_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:fronius:symo_advanced_12.0-3_208-240:-:*:*:*:*:*:*:*", "cpe:2.3:o:fronius:symo_advanced_15.0-3_480_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:fronius:symo_advanced_15.0-3_480:-:*:*:*:*:*:*:*", "cpe:2.3:o:fronius:symo_advanced_20.0-3_480_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:fronius:symo_advanced_20.0-3_480:-:*:*:*:*:*:*:*", "cpe:2.3:o:fronius:symo_advanced_22.7-3_480_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:fronius:symo_advanced_22.7-3_480:-:*:*:*:*:*:*:*", "cpe:2.3:o:fronius:symo_advanced_24.0-3_480_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:fronius:symo_advanced_24.0-3_480:-:*:*:*:*:*:*:*", "cpe:2.3:o:fronius:symo_hybrid_3.0-3-m_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:fronius:symo_hybrid_3.0-3-m:-:*:*:*:*:*:*:*", "cpe:2.3:o:fronius:symo_hybrid_4.0-3-m_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:fronius:symo_hybrid_4.0-3-m:-:*:*:*:*:*:*:*", "cpe:2.3:o:fronius:symo_hybrid_5.0-3-m_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:fronius:symo_hybrid_5.0-3-m:-:*:*:*:*:*:*:*" ]
null
6.5
null
4
null
CVE-2019-5809
Use after free in file chooser in Google Chrome prior to 74.0.3729.108 allowed a remote attacker who had compromised the renderer process to perform privilege escalation via a crafted HTML page.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:backports:sle-15:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*" ]
null
8.8
null
6.8
null
CVE-2024-28001
WordPress Favicon Rotator plugin <= 1.2.10 - Reflected Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Archetyped Favicon Rotator allows Reflected XSS.This issue affects Favicon Rotator: from n/a through 1.2.10.
[]
null
7.1
null
null
null
cisco-sa-prime-info-disc-nTU9FJ2
Cisco Prime Infrastructure and Cisco Evolved Programmable Network Manager Information Disclosure Vulnerability
A vulnerability in the CLI of Cisco Prime Infrastructure and Cisco Evolved Programmable Network (EPN) Manager could allow an authenticated, local attacker to access sensitive information stored on the underlying file system of an affected system. This vulnerability exists because sensitive information is not sufficiently secured when it is stored. An attacker could exploit this vulnerability by gaining unauthorized access to sensitive information on an affected system. A successful exploit could allow the attacker to create forged authentication requests and gain unauthorized access to the affected system. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
[]
null
5.5
null
null
null
GHSA-grxv-g75f-w57w
Horde Internet Messaging Program (IMP) before 2.2.6 allows local users to read IMP configuration files and steal the Horde database password by placing the prefs.lang file containing PHP code on the server.
[]
null
null
null
null
null
CVE-2009-1231
Unspecified vulnerability in the eClient in IBM DB2 Content Manager 8.4.1 before 8.4.1.1 has unknown impact and attack vectors.
[ "cpe:2.3:a:ibm:db2_content_manager:8.4.1:*:*:*:*:*:*:*" ]
null
null
null
10
null
GHSA-2c3h-v9r3-w28r
index.php in Rhadrix If-CMS, possibly 1.01 and 2.07, allows remote attackers to obtain the full path of the web server via empty (1) rns[] or (2) pag[] arguments, which reveals the path in an error message.
[]
null
null
null
null
null
GHSA-ch2p-249c-2vf6
Cross-site scripting (XSS) vulnerability in wp-admin/wp-blogs.php in Wordpress MU (WPMU) before 2.6 allows remote attackers to inject arbitrary web script or HTML via the (1) s and (2) ip_address parameters.
[]
null
null
null
null
null
RHSA-2012:1605
Red Hat Security Advisory: Fuse MQ Enterprise 7.1.0 update
jetty: hash table collisions CPU usage DoS (oCERT-2011-003)
[ "cpe:/a:redhat:fuse_mq_enterprise:7.1.0" ]
null
null
null
null
null
RHSA-2010:0787
Red Hat Security Advisory: glibc security update
glibc: ld.so insecure handling of $ORIGIN in LD_AUDIT for setuid/setgid programs
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
null
GHSA-4x2j-vmv4-3qc3
The DHCPv6 server in Cisco IOS on ASR 9000 devices with software 5.2.0 Base allows remote attackers to cause a denial of service (process reset) via crafted packets, aka Bug ID CSCun36525.
[]
null
null
null
null
null
CVE-2023-25121
Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to arbitrary code execution. An attacker with high privileges can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the set_ike_profile function with the secrets_local variable.
[ "cpe:2.3:h:milesight:ur32l:-:*:*:*:*:*:*:*", "cpe:2.3:o:milesight:ur32l_firmware:32.3.0.5:*:*:*:*:*:*:*" ]
null
7.2
null
null
null
GHSA-qrxg-rv92-28fv
The WOOF WordPress plugin before 1.2.6.3 does not sanitise and escape the woof_redraw_elements before outputing back in an admin page, leading to a Reflected Cross-Site Scripting
[]
null
null
null
null
null
CVE-2020-12858
Non-reinitialisation of random data in the advertising payload in COVIDSafe v1.0.15 and v1.0.16 allows a remote attacker to re-identify Android devices running COVIDSafe by scanning for their advertising beacons.
[ "cpe:2.3:a:health:covidsafe:*:*:*:*:*:android:*:*" ]
null
7.5
null
5
null
CVE-2023-50829
WordPress Loan Repayment Calculator and Application Form Plugin <= 2.9.3 is vulnerable to Cross Site Scripting (XSS)
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Aerin Loan Repayment Calculator and Application Form allows Stored XSS.This issue affects Loan Repayment Calculator and Application Form: from n/a through 2.9.3.
[ "cpe:2.3:a:quick-plugins:loan_repayment_calculator_and_application_form:*:*:*:*:*:wordpress:*:*" ]
null
5.9
null
null
null
CVE-2021-47363
nexthop: Fix division by zero while replacing a resilient group
In the Linux kernel, the following vulnerability has been resolved: nexthop: Fix division by zero while replacing a resilient group The resilient nexthop group torture tests in fib_nexthop.sh exposed a possible division by zero while replacing a resilient group [1]. The division by zero occurs when the data path sees a resilient nexthop group with zero buckets. The tests replace a resilient nexthop group in a loop while traffic is forwarded through it. The tests do not specify the number of buckets while performing the replacement, resulting in the kernel allocating a stub resilient table (i.e, 'struct nh_res_table') with zero buckets. This table should never be visible to the data path, but the old nexthop group (i.e., 'oldg') might still be used by the data path when the stub table is assigned to it. Fix this by only assigning the stub table to the old nexthop group after making sure the group is no longer used by the data path. Tested with fib_nexthops.sh: Tests passed: 222 Tests failed: 0 [1] divide error: 0000 [#1] PREEMPT SMP KASAN CPU: 0 PID: 1850 Comm: ping Not tainted 5.14.0-custom-10271-ga86eb53057fe #1107 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-4.fc34 04/01/2014 RIP: 0010:nexthop_select_path+0x2d2/0x1a80 [...] Call Trace: fib_select_multipath+0x79b/0x1530 fib_select_path+0x8fb/0x1c10 ip_route_output_key_hash_rcu+0x1198/0x2da0 ip_route_output_key_hash+0x190/0x340 ip_route_output_flow+0x21/0x120 raw_sendmsg+0x91d/0x2e10 inet_sendmsg+0x9e/0xe0 __sys_sendto+0x23d/0x360 __x64_sys_sendto+0xe1/0x1b0 do_syscall_64+0x35/0x80 entry_SYSCALL_64_after_hwframe+0x44/0xae
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:5.15:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:5.15:rc2:*:*:*:*:*:*" ]
null
5.5
null
null
null
GHSA-3c5p-cwqv-4mx2
When processing IE set command, buffer overwrite may occur due to lack of input validation of the IE length in Snapdragon Mobile in version SD 835, SD 845, SD 850.
[]
null
null
7.8
null
null
CVE-2021-24489
Request a Quote < 2.3.9 - Admin+ Stored Cross-Site Scripting
The Request a Quote WordPress plugin before 2.3.9 does not sanitise, validate or escape some of its settings in the admin dashboard, leading to authenticated Stored Cross-Site Scripting issues even when the unfiltered_html capability is disallowed.
[ "cpe:2.3:a:emarketdesign:request_a_quote:*:*:*:*:*:wordpress:*:*" ]
null
4.8
null
3.5
null
CVE-2012-3286
Unspecified vulnerability in HP ArcSight Connector Appliance 6.3 and earlier and ArcSight Logger 5.2 and earlier allows remote authenticated users to obtain sensitive information, modify data, or cause a denial of service via unknown vectors.
[ "cpe:2.3:o:hp:arcsight_connector_appliance_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:hp:arcsight_connector_appliance_firmware:6.0.0.60023.2:*:*:*:*:*:*:*", "cpe:2.3:o:hp:arcsight_connector_appliance_firmware:6.2.0.6244.0:*:*:*:*:*:*:*", "cpe:2.3:h:hp:arcsight_connector_appliance:c1400:*:*:*:*:*:*:*", "cpe:2.3:h:hp:arcsight_connector_appliance:c3400:*:*:*:*:*:*:*", "cpe:2.3:h:hp:arcsight_connector_appliance:c5400:*:*:*:*:*:*:*", "cpe:2.3:a:hp:arcsight_logger:*:*:*:*:*:*:*:*" ]
null
null
null
6.5
null
GHSA-wrq6-8pjf-94rp
Mozilla Firefox before 2.0.0.12 and SeaMonkey before 1.1.8 allows user-assisted remote attackers to trick the user into uploading arbitrary files via label tags that shift focus to a file input field, aka "focus spoofing."
[]
null
null
null
null
null
GHSA-gcrv-9fp9-jhxr
The keep-alive mechanism for Microsoft SQL Server 2000 allows remote attackers to cause a denial of service (bandwidth consumption) via a "ping" style packet to the Resolution Service (UDP port 1434) with a spoofed IP address of another SQL Server system, which causes the two servers to exchange packets in an infinite loop.
[]
null
null
null
null
null
CVE-2024-5892
Divi Torque Lite – Divi Theme and Extra Theme <= 3.6.6 - Authenticated (Author+) Stored Cross-Site Scripting via SVG Upload
The Divi Torque Lite – Divi Theme and Extra Theme plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘support_unfiltered_files_upload’ function in all versions up to, and including, 3.6.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
6.4
null
null
null
GHSA-7p59-xqgx-w7p8
Stack-based buffer overflow in McPvDrv.sys 4.6.111.0 in McAfee File Lock 5.x in McAfee Total Protection allows attackers to cause a denial of service (system crash) via a long vault GUID in an ioctl call.
[]
null
null
7.5
null
null
CVE-2024-37816
Quectel EC25-EUX EC25EUXGAR08A05M1G was discovered to contain a stack overflow.
[]
null
4.2
null
null
null
GHSA-998p-xc25-r3jq
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: bnep: fix wild-memory-access in proto_unregisterThere's issue as follows: KASAN: maybe wild-memory-access in range [0xdead...108-0xdead...10f] CPU: 3 UID: 0 PID: 2805 Comm: rmmod Tainted: G W RIP: 0010:proto_unregister+0xee/0x400 Call Trace: <TASK> __do_sys_delete_module+0x318/0x580 do_syscall_64+0xc1/0x1d0 entry_SYSCALL_64_after_hwframe+0x77/0x7fAs bnep_init() ignore bnep_sock_init()'s return value, and bnep_sock_init() will cleanup all resource. Then when remove bnep module will call bnep_sock_cleanup() to cleanup sock's resource. To solve above issue just return bnep_sock_init()'s return value in bnep_exit().
[]
null
5.5
null
null
null
GHSA-cqc3-wp4c-vrcw
Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
[]
null
8.8
null
null
null
CVE-2023-0799
LibTIFF 4.4.0 has an out-of-bounds read in tiffcrop in tools/tiffcrop.c:3701, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit afaabc3e.
[ "cpe:2.3:a:libtiff:libtiff:*:*:*:*:*:*:*:*" ]
null
6.8
null
null
null
GHSA-72h3-f956-8mcr
D-Link DIR-823G A1V1.0.2B05 was discovered to contain a buffer overflow via the AdminPassword parameter in the SetDeviceSettings function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.
[]
null
7.5
null
null
null