id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
189k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
patch_commit_url
stringlengths
36
232
CVE-2019-19769
In the Linux kernel 5.3.10, there is a use-after-free (read) in the perf_trace_lock_acquire function (related to include/trace/events/lock.h).
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*" ]
null
6.7
null
6.5
null
CVE-2018-1000193
A improper neutralization of control sequences vulnerability exists in Jenkins 2.120 and older, LTS 2.107.2 and older in HudsonPrivateSecurityRealm.java that allows users to sign up using user names containing control characters that can then appear to have the same name as other users, and cannot be deleted via the UI.
[ "cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*", "cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*", "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:1.9.0:*:*:*:*:*:*:*" ]
null
4.3
null
4
null
CVE-2021-1598
Cisco Video Surveillance 7000 Series IP Cameras Link Layer Discovery Protocol Memory Leak Vulnerabilities
Multiple vulnerabilities in the Link Layer Discovery Protocol (LLDP) implementation for Cisco Video Surveillance 7000 Series IP Cameras could allow an unauthenticated, adjacent attacker to cause a memory leak, which could lead to a denial of service (DoS) condition on an affected device. These vulnerabilities are due to incorrect processing of certain LLDP packets at ingress time. An attacker could exploit these vulnerabilities by sending crafted LLDP packets to an affected device. A successful exploit could allow the attacker to cause the affected device to continuously consume memory, which could cause the device to crash and reload, resulting in a DoS condition. Note: LLDP is a Layer 2 protocol. To exploit these vulnerabilities, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent).
[ "cpe:2.3:o:cisco:video_surveillance_7530pd_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:video_surveillance_7530pd:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:video_surveillance_7070_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:video_surveillance_7070:-:*:*:*:*:*:*:*" ]
null
6.5
null
null
null
CVE-2019-13511
Rockwell Automation Arena Simulation Software versions 16.00.00 and earlier contain an INFORMATION EXPOSURE CWE-200. A maliciously crafted Arena file opened by an unsuspecting user may result in the limited exposure of information related to the targeted workstation.
[ "cpe:2.3:a:rockwellautomation:arena:*:*:*:*:*:*:*:*" ]
null
3.3
null
4.3
null
GHSA-mgj9-j8fg-4qpr
In the Linux kernel, the following vulnerability has been resolved:drm/gma500: fix null pointer dereference in psb_intel_lvds_get_modesIn psb_intel_lvds_get_modes(), the return value of drm_mode_duplicate() is assigned to mode, which will lead to a possible NULL pointer dereference on failure of drm_mode_duplicate(). Add a check to avoid npd.
[]
null
5.5
null
null
null
GHSA-hjgh-vh3c-8rg8
Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used.
[]
null
null
7.8
null
null
CVE-2024-49089
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
[ "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*" ]
null
7.2
null
null
null
CVE-2023-1691
Vulnerability of failures to capture exceptions in the communication framework. Successful exploitation of this vulnerability may cause features to perform abnormally.
[ "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:emui:12.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*" ]
null
7.5
null
null
null
CVE-2015-4808
Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.5.0, 8.5.1, and 8.5.2 allows local users to affect availability via vectors related to Outside In Filters, a different vulnerability than CVE-2015-6013, CVE-2015-6014, CVE-2015-6015, and CVE-2016-0432.
[ "cpe:2.3:a:oracle:fusion_middleware:8.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:fusion_middleware:8.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:fusion_middleware:8.5.2:*:*:*:*:*:*:*" ]
null
null
null
1.9
null
GHSA-v784-rfch-9wq8
Information disclosure due to buffer over-read in modem while reading configuration parameters.
[]
null
7.5
null
null
null
GHSA-53q7-57w3-2j4r
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in takeover of MySQL Server. CVSS 3.1 Base Score 7.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H).
[]
null
7.2
null
null
null
GHSA-3xhx-7chp-7wq6
Leave Management System Project v1.0 is vulnerable to multiple Authenticated SQL Injection vulnerabilities. The 'setcasualleave' parameter of the admin/setleaves.php resource does not validate the characters received and they are sent unfiltered to the database.
[]
null
9.8
null
null
null
GHSA-m9h3-f3g9-fqrf
The slap_modrdn2mods function in modrdn.c in OpenLDAP 2.4.22 does not check the return value of a call to the smr_normalize function, which allows remote attackers to cause a denial of service (segmentation fault) and possibly execute arbitrary code via a modrdn call with an RDN string containing invalid UTF-8 sequences, which triggers a free of an invalid, uninitialized pointer in the slap_mods_free function, as demonstrated using the Codenomicon LDAPv3 test suite.
[]
null
9.8
null
null
null
GHSA-q62x-pq6x-fhvw
A SQL injection vulnerability exists in Suprema BioStar 2 before 2.9.1, which allows authenticated users to inject arbitrary SQL directives into an SQL statement and execute arbitrary SQL commands.
[]
null
8.8
null
null
null
CVE-2023-28656
NGINX Management Suite vulnerability
NGINX Management Suite may allow an authenticated attacker to gain access to configuration objects outside of their assigned environment.   Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
[ "cpe:2.3:a:f5:nginx_api_connectivity_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:nginx_instance_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:nginx_security_monitoring:*:*:*:*:*:*:*:*" ]
null
8.1
null
null
null
RHSA-2023:4415
Red Hat Security Advisory: iperf3 security update
iperf3: memory allocation hazard and crash
[ "cpe:/a:redhat:rhel_aus:8.2::appstream", "cpe:/a:redhat:rhel_e4s:8.2::appstream", "cpe:/a:redhat:rhel_tus:8.2::appstream" ]
null
7.5
null
null
null
GHSA-8v66-v52g-2mp3
The Metform Elementor Contact Form Builder plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 3.3.2. This is due to missing or incorrect nonce validation on the permalink_setup function. This makes it possible for unauthenticated attackers to change the permalink structure via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. While nonce verification is implemented, verification only takes place when a nonce is provided.
[]
null
5.4
null
null
null
CVE-2023-40111
In setMediaButtonReceiver of MediaSessionRecord.java, there is a possible way to send a pending intent on behalf of system_server due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.
[ "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*" ]
null
7.8
null
null
null
GHSA-ffv6-5mrv-qxf3
Tableau Server fails to validate certain URLs that are embedded in emails sent to Tableau Server users.
[]
null
null
null
null
null
GHSA-hcp3-6p74-64v4
Directory traversal vulnerability in TFTPdWin 0.4.2 allows remote attackers to read or modify arbitrary files outside the TFTP root via unspecified vectors.
[]
null
null
null
null
null
CVE-2023-0751
GELI silently omits the keyfile if read from stdin
When GELI reads a key file from standard input, it does not reuse the key file to initialize multiple providers at once resulting in the second and subsequent devices silently using a NULL key as the user key file. If a user only uses a key file without a user passphrase, the master key is encrypted with an empty key file allowing trivial recovery of the master key.
[ "cpe:2.3:o:freebsd:freebsd:12.3:-:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:12.3:p1:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:12.3:p2:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:12.3:p3:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:12.3:p4:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:12.3:p5:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:12.4:-:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:12.4:rc2-p1:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:12.4:rc2-p2:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:13.1:-:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:13.1:b1-p1:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:13.1:b2-p2:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:13.1:p1:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:13.1:p2:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:13.1:p3:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:13.1:p4:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:13.1:p5:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:13.1:rc1-p1:*:*:*:*:*:*" ]
null
6.5
null
null
null
GHSA-hv55-4hhf-gp33
Unspecified vulnerability in CrawlTrack before 3.2.7, when a public stats page is provided, allows remote attackers to execute arbitrary PHP code via unknown vectors.
[]
null
null
null
null
null
CVE-2001-0355
Novell Groupwise 5.5 (sp1 and sp2) allows a remote user to access arbitrary files via an implementation error in Groupwise system policies.
[ "cpe:2.3:a:novell:groupwise:5.5:*:*:*:*:*:*:*" ]
null
null
null
5
null
CVE-2022-50108
mfd: max77620: Fix refcount leak in max77620_initialise_fps
In the Linux kernel, the following vulnerability has been resolved: mfd: max77620: Fix refcount leak in max77620_initialise_fps of_get_child_by_name() returns a node pointer with refcount incremented, we should use of_node_put() on it when not need anymore. Add missing of_node_put() to avoid refcount leak.
[]
null
null
null
null
null
GHSA-wj9g-5wf3-5pxf
An issue was discovered in osTicket before 1.10.7 and 1.12.x before 1.12.1. Stored XSS exists in setup/install.php. It was observed that no input sanitization was provided in the firstname and lastname fields of the application. The insertion of malicious queries in those fields leads to the execution of those queries. This can further lead to cookie stealing or other malicious actions.
[]
null
null
6.1
null
null
CVE-2020-9492
In Apache Hadoop 3.2.0 to 3.2.1, 3.0.0-alpha1 to 3.1.3, and 2.0.0-alpha to 2.10.0, WebHDFS client might send SPNEGO authorization header to remote URL without proper verification.
[ "cpe:2.3:a:apache:hadoop:*:*:*:*:*:*:*:*", "cpe:2.3:a:apache:solr:8.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:solr:8.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:financial_services_crime_and_compliance_management_studio:8.0.8.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:financial_services_crime_and_compliance_management_studio:8.0.8.3.0:*:*:*:*:*:*:*" ]
null
8.8
null
6.5
null
GHSA-fx4x-ppc2-pxxf
Multiple stack-based buffer overflows in Final Draft 8 before 8.02 allow remote attackers to execute arbitrary code via a .fdx or .fdxt file with long (1) Word, (2) Transition, (3) Location, (4) Extension, (5) SceneIntro, (6) TimeOfDay, and (7) Character elements.
[]
null
null
null
null
null
CVE-2023-29207
Improper Neutralization of Script-Related HTML Tags (XSS) in the LiveTable Macro
XWiki Commons are technical libraries common to several other top level XWiki projects. The Livetable Macro wasn't properly sanitizing column names, thus allowing the insertion of raw HTML code including JavaScript. This vulnerability was also exploitable via the Documents Macro that is included since XWiki 3.5M1 and doesn't require script rights, this can be demonstrated with the syntax `{{documents id="example" count="5" actions="false" columns="doc.title, before<script>alert(1)</script>after"/}}`. Therefore, this can also be exploited by users without script right and in comments. With the interaction of a user with more rights, this could be used to execute arbitrary actions in the wiki, including privilege escalation, remote code execution, information disclosure, modifying or deleting content. This has been patched in XWiki 14.9, 14.4.6, and 13.10.10.
[ "cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*", "cpe:2.3:a:xwiki:xwiki:1.9:milestone2:*:*:*:*:*:*" ]
null
8.9
null
null
null
CVE-2012-1677
Unspecified vulnerability in the Oracle Application Server Single Sign-On component in Oracle Fusion Middleware allows remote attackers to affect integrity via unknown vectors.
[ "cpe:2.3:a:oracle:fusion_middleware:-:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:fusion_middleware:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:fusion_middleware:6.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:fusion_middleware:6.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:fusion_middleware:6.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:fusion_middleware:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:fusion_middleware:7.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:fusion_middleware:7.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:fusion_middleware:7.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:fusion_middleware:7.5:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:fusion_middleware:7.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:fusion_middleware:7.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:fusion_middleware:7.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:fusion_middleware:8.3.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:fusion_middleware:8.3.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:fusion_middleware:8.3.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:fusion_middleware:9.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:fusion_middleware:10.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:fusion_middleware:10.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:fusion_middleware:10.1.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:fusion_middleware:10.1.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:fusion_middleware:10.1.3.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:fusion_middleware:10.1.3.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:fusion_middleware:10.1.3.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:fusion_middleware:10.1.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:fusion_middleware:10.1.3.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:fusion_middleware:10.1.3.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:fusion_middleware:10.1.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:fusion_middleware:10.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:fusion_middleware:10.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:fusion_middleware:10.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:fusion_middleware:11.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:fusion_middleware:11.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:fusion_middleware:11.1.1.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:fusion_middleware:11.1.1.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:fusion_middleware:11.1.1.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:fusion_middleware:11.1.1.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:fusion_middleware:11.1.1.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:fusion_middleware:11.1.1.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:fusion_middleware:11.1.1.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:fusion_middleware:11.1.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:fusion_middleware:27.7.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:fusion_middleware:27.7.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:fusion_middleware:28.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:fusion_middleware:28.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:fusion_middleware:28.2.4:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
GHSA-rc5c-4c27-cg98
Under certain conditions, the SAP Host Agent logfile shows information which would otherwise be restricted.
[]
null
5.5
null
null
null
CVE-2010-3641
Unspecified vulnerability in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris, and 10.1.95.1 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, a different vulnerability than CVE-2010-3640, CVE-2010-3642, CVE-2010-3643, CVE-2010-3644, CVE-2010-3645, CVE-2010-3646, CVE-2010-3647, CVE-2010-3648, CVE-2010-3649, CVE-2010-3650, and CVE-2010-3652.
[ "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "cpe:2.3:o:sun:solaris:-:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*" ]
null
null
null
9.3
null
CVE-2015-2841
Citrix NetScaler AppFirewall, as used in NetScaler 10.5, allows remote attackers to bypass intended firewall restrictions via a crafted Content-Type header, as demonstrated by the application/octet-stream and text/xml Content-Types.
[ "cpe:2.3:a:citrix:netscaler:10.5:*:*:*:*:*:*:*" ]
null
null
null
5
null
GHSA-q43q-mp42-75vm
Insufficient Session Expiration vulnerability in Progress Software Corporation Sitefinity under some specific and uncommon circumstances allows reusing Session IDs (Session Replay Attacks).This issue affects Sitefinity: from 14.0 through 14.3, from 14.4 before 14.4.8145, from 15.0 before 15.0.8231, from 15.1 before 15.1.8332, from 15.2 before 15.2.8429.
[]
null
7.7
null
null
null
CVE-2016-10830
cPanel before 55.9999.141 allows ACL bypass for AppConfig applications via magic_revision (SEC-100).
[ "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*" ]
null
null
8.1
5.5
null
GHSA-vvhp-c548-j66x
Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
[]
null
5.4
null
null
null
GHSA-62mf-g244-32xg
Four format string injection vulnerabilities exist in the web interface /action/wirelessConnect functionality of Abode Systems, Inc. iota All-In-One Security Kit 6.9Z and 6.9X. A specially-crafted HTTP request can lead to memory corruption, information disclosure and denial of service. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.This vulnerability arises from format string injection via the `ssid_hex` HTTP parameter, as used within the `/action/wirelessConnect` handler.
[]
null
8.8
null
null
null
CVE-2025-23294
NVIDIA WebDataset for all platforms contains a vulnerability where an attacker could execute arbitrary code with elevated permissions. A successful exploit of this vulnerability might lead to escalation of privileges, data tampering, information disclosure, and denial of service.
[]
null
7.8
null
null
null
GHSA-3hfj-pw8w-wj22
Open Solution Quick.Cart 5.0 allows remote attackers to obtain sensitive information via (1) a long string or (2) invalid characters in a cookie, which reveals the installation path in an error message.
[]
null
null
null
null
null
GHSA-43ff-4wjr-j993
An Improper Access Control issue was discovered in Smiths Medical Medfusion 4000 Wireless Syringe Infusion Pump, Version 1.1, 1.5, and 1.6. The FTP server on the pump does not require authentication if the pump is configured to allow FTP connections.
[]
null
null
8.1
null
null
GHSA-q2wp-r77c-3cw8
SSRF in Apache HTTP Server with mod_proxy loaded allows an attacker to send outbound proxy requests to a URL controlled by the attacker.  Requires an unlikely configuration where mod_headers is configured to modify the Content-Type request or response header with a value provided in the HTTP request.Users are recommended to upgrade to version 2.4.64 which fixes this issue.
[]
null
7.5
null
null
null
CVE-2025-44658
In Netgear RAX30 V1.0.10.94, a PHP-FPM misconfiguration vulnerability is caused by not following the specification to only limit FPM to .php extensions. An attacker may exploit this by uploading malicious scripts disguised with alternate extensions and tricking the web server into executing them as PHP, bypassing security mechanisms based on file extension filtering. This may lead to remote code execution (RCE), information disclosure, or full system compromise.
[]
null
9.8
null
null
null
CVE-2013-2326
Unspecified vulnerability in HP Storage Data Protector 6.20, 6.21, 7.00, and 7.01 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1634.
[ "cpe:2.3:a:hp:storage_data_protector:6.20:-:*:*:*:hp-ux:*:*", "cpe:2.3:a:hp:storage_data_protector:6.20:-:*:*:*:redhat_enterprise_linux:*:*", "cpe:2.3:a:hp:storage_data_protector:6.20:-:*:*:*:sunos:*:*", "cpe:2.3:a:hp:storage_data_protector:6.20:-:*:*:*:suse_linux:*:*", "cpe:2.3:a:hp:storage_data_protector:6.20:-:*:*:*:windows_server_2003:*:*", "cpe:2.3:a:hp:storage_data_protector:6.20:-:*:*:*:windows_server_2008:*:*", "cpe:2.3:a:hp:storage_data_protector:6.21:-:*:*:*:hp-ux:*:*", "cpe:2.3:a:hp:storage_data_protector:6.21:-:*:*:*:redhat_enterprise_linux:*:*", "cpe:2.3:a:hp:storage_data_protector:6.21:-:*:*:*:sunos:*:*", "cpe:2.3:a:hp:storage_data_protector:6.21:-:*:*:*:suse_linux:*:*", "cpe:2.3:a:hp:storage_data_protector:6.21:-:*:*:*:windows_server_2003:*:*", "cpe:2.3:a:hp:storage_data_protector:6.21:-:*:*:*:windows_server_2008:*:*", "cpe:2.3:a:hp:storage_data_protector:7.00:-:*:*:*:hp-ux:*:*", "cpe:2.3:a:hp:storage_data_protector:7.00:-:*:*:*:redhat_enterprise_linux:*:*", "cpe:2.3:a:hp:storage_data_protector:7.00:-:*:*:*:suse_linux:*:*", "cpe:2.3:a:hp:storage_data_protector:7.00:-:*:*:*:windows_server_2003:*:*", "cpe:2.3:a:hp:storage_data_protector:7.00:-:*:*:*:windows_server_2008:*:*", "cpe:2.3:a:hp:storage_data_protector:7.01:-:*:*:*:hp-ux:*:*", "cpe:2.3:a:hp:storage_data_protector:7.01:-:*:*:*:redhat_enterprise_linux:*:*", "cpe:2.3:a:hp:storage_data_protector:7.01:-:*:*:*:suse_linux:*:*", "cpe:2.3:a:hp:storage_data_protector:7.01:-:*:*:*:windows_server_2003:*:*", "cpe:2.3:a:hp:storage_data_protector:7.01:-:*:*:*:windows_server_2008:*:*" ]
null
null
null
10
null
GHSA-7m6w-6686-g729
The SiteOrigin Widgets Bundle plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's SiteOrigin Blog Widget in all versions up to, and including, 1.61.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
6.4
null
null
null
GHSA-hjxm-p5wf-9v7p
Integer underflow in lzhsr.dll in Autonomy KeyView, as used in IBM Lotus Notes before 8.5.2 FP3, allows remote attackers to execute arbitrary code via a crafted header in a .lzh attachment that triggers a stack-based buffer overflow, aka SPR PRAD88MJ2W.
[]
null
null
null
null
null
GHSA-79xx-p4p4-fv5q
Heap-based buffer overflow in the Distributed Component Object Model (DCOM) interface in the RPCSS Service allows remote attackers to execute arbitrary code via a malformed DCERPC DCOM object activation request packet with modified length fields, a different vulnerability than CVE-2003-0352 (Blaster/Nachi) and CVE-2003-0528.
[]
null
null
null
null
null
GHSA-3m7v-3ggq-789x
A vulnerability in the web-based management interface of Cisco Industrial Network Director (IND) could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface of an affected application. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected application. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
[]
null
null
null
null
null
CVE-2023-3399
Insertion of Sensitive Information Into Sent Data in GitLab
An issue has been discovered in GitLab EE affecting all versions starting from 11.6 before 16.3.6, all versions starting from 16.4 before 16.4.2, all versions starting from 16.5 before 16.5.1. It was possible for an unauthorised project or group member to read the CI/CD variables using the custom project templates.
[ "cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*", "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:13.0.0:*:*:*:community:*:*:*", "cpe:2.3:a:gitlab:gitlab:13.0.0:*:*:*:enterprise:*:*:*" ]
null
8.5
null
null
null
GHSA-52qf-8fcc-9f9g
Online Shopping Portal Project 3.1 allows remote attackers to execute arbitrary SQL commands/queries via the login form, leading to unauthorized access and potential data manipulation. This vulnerability arises due to insufficient validation of user-supplied input in the username field, enabling SQL Injection attacks.
[]
null
8.8
null
null
null
RHSA-2015:0016
Red Hat Security Advisory: glibc security and bug fix update
glibc: crash in code page decoding functions (IBM933, IBM935, IBM937, IBM939, IBM1364) glibc: command execution in wordexp() with WRDE_NOCMD specified
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
null
CVE-2021-29449
Multiple Privilege Escalation Vulnerabilities Pihole
Pi-hole is a Linux network-level advertisement and Internet tracker blocking application. Multiple privilege escalation vulnerabilities were discovered in version 5.2.4 of Pi-hole core. See the referenced GitHub security advisory for details.
[ "cpe:2.3:a:pi-hole:pi-hole:*:*:*:*:*:*:*:*" ]
null
6.3
null
null
null
GHSA-4wpp-22r3-jr8g
An issue was discovered in MediaWiki before 1.35.9, 1.36.x through 1.38.x before 1.38.5, and 1.39.x before 1.39.1. SpecialMobileHistory allows remote attackers to cause a denial of service because database queries are slow.
[]
null
5.3
null
null
null
ICSA-19-337-01
Reliable Controls LicenseManager
An authenticated user may be able to insert malicious code into the system root path, which may allow execution of code with elevated privileges of the application.CVE-2019-18245 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).
[]
null
null
7.8
null
null
CVE-2023-47620
Scrypted reflected Cross-site Scripting vulnerability
Scrypted is a home video integration and automation platform. In versions 0.55.0 and prior, a reflected cross-site scripting vulnerability exists in the plugin-http.ts file via the `owner' and 'pkg` parameters. An attacker can run arbitrary JavaScript code.
[ "cpe:2.3:a:clockworkmod:scrypted:*:*:*:*:*:*:*:*" ]
null
6.1
null
null
null
GHSA-6mcp-rmfc-cqp5
Under special integration scenario of SAP Business one and SAP HANA - version 10.0, an attacker can exploit HANA cockpit?s data volume to gain access to highly sensitive information (e.g., high privileged account credentials)
[]
null
7.5
null
null
null
GHSA-v9r7-j9px-3j3q
Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via mjs_stack_size at mjs/src/mjs_core.c. This vulnerability can lead to a Denial of Service (DoS).
[]
null
null
null
null
null
CVE-2021-20844
Improper neutralization of HTTP request headers for scripting syntax vulnerability in the Web GUI of RTX830 Rev.15.02.17 and earlier, NVR510 Rev.15.01.18 and earlier, NVR700W Rev.15.00.19 and earlier, and RTX1210 Rev.14.01.38 and earlier allows a remote authenticated attacker to obtain sensitive information via a specially crafted web page.
[ "cpe:2.3:o:yamaha:rtx830_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:yamaha:rtx830:-:*:*:*:*:*:*:*", "cpe:2.3:o:yamaha:nvr510_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:yamaha:nvr510:-:*:*:*:*:*:*:*", "cpe:2.3:o:yamaha:nvr700w_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:yamaha:nvr700w:-:*:*:*:*:*:*:*", "cpe:2.3:o:yamaha:rtx1210_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:yamaha:rtx1210:-:*:*:*:*:*:*:*", "cpe:2.3:o:ntt-west:biz_box_rtx830_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ntt-west:biz_box_rtx830:-:*:*:*:*:*:*:*", "cpe:2.3:o:ntt-west:biz_box_nvr510_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ntt-west:biz_box_nvr510:-:*:*:*:*:*:*:*", "cpe:2.3:o:ntt-west:biz_box_nvr700w_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ntt-west:biz_box_nvr700w:-:*:*:*:*:*:*:*", "cpe:2.3:o:ntt-west:biz_box_rtx1210_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ntt-west:biz_box_rtx1210:-:*:*:*:*:*:*:*" ]
null
5.7
null
3.5
null
CVE-2024-7101
ForIP Tecnologia Administração PABX Authentication Form login sql injection
A vulnerability, which was classified as critical, has been found in ForIP Tecnologia Administração PABX 1.x. This issue affects some unknown processing of the file /login of the component Authentication Form. The manipulation of the argument usuario leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-272423. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
[ "cpe:2.3:a:forip:pabx:1.0:*:*:*:*:*:*:*" ]
6.9
7.3
7.3
7.5
null
GHSA-j3ch-wr39-62m3
TP-Link WVR, WAR and ER devices allow remote authenticated administrators to execute arbitrary commands via command injection in the new-enable variable in the pptp_client.lua file.
[]
null
null
7.2
null
null
RHSA-2022:1354
Red Hat Security Advisory: rh-dotnet31-curl security update
curl: Leak of authentication credentials in URL via automatic Referer curl: Bad connection reuse due to flawed path name checks curl: Requirement to use TLS not properly enforced for IMAP, POP3, and FTP protocols curl: Server responses received before STARTTLS processed after TLS handshake
[ "cpe:/a:redhat:rhel_dotnet:3.1::el7" ]
null
6.1
null
null
null
CVE-2019-10301
A missing permission check in Jenkins GitLab Plugin 1.5.11 and earlier in the GitLabConnectionConfig#doTestConnection form validation method allowed attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
[ "cpe:2.3:a:jenkins:gitlab:*:*:*:*:*:jenkins:*:*" ]
null
8.8
null
4
null
GHSA-6fpv-q3vm-j4gh
D-LINK DI-8200 16.07.26A1 is vulnerable to Buffer Overflow in the ipsec_road_asp function via the host_ip parameter.
[]
null
3.5
null
null
null
CVE-2015-0665
The Hostscan module in Cisco AnyConnect Secure Mobility Client 4.0(.00051) and earlier allows local users to write to arbitrary files via crafted IPC messages, aka Bug ID CSCus79173.
[ "cpe:2.3:a:cisco:anyconnect_secure_mobility_client:*:*:*:*:*:*:*:*" ]
null
null
null
6.6
null
CVE-2023-5391
A CWE-502: Deserialization of untrusted data vulnerability exists that could allow an attacker to execute arbitrary code on the targeted system by sending a specifically crafted packet to the application.
[ "cpe:2.3:a:schneider-electric:ecostruxure_power_monitoring_expert:*:*:*:*:*:*:*:*", "cpe:2.3:a:schneider-electric:ecostruxure_power_operation_with_advanced_reports:*:*:*:*:*:*:*:*", "cpe:2.3:a:schneider-electric:ecostruxure_power_scada_operation_with_advanced_reports:*:*:*:*:*:*:*:*" ]
null
9.8
null
null
null
GHSA-rm2v-wh2x-rj6w
An SQL injection vulnerability was found in Cloudera Data Science Workbench (CDSW) 1.4.0 through 1.4.2. This would allow any authenticated user to run arbitrary queries against CDSW's internal database. The database contains user contact information, encrypted CDSW passwords (in the case of local authentication), API keys, and stored Kerberos keytabs.
[]
null
null
9.9
null
null
GHSA-xw43-24rr-hxcr
Cross-site scripting (XSS) vulnerability in Google Chrome before 22.0.1229.79 allows remote attackers to inject arbitrary web script or HTML via vectors involving frames, aka "Universal XSS (UXSS)."
[]
null
null
null
null
null
CVE-2024-42337
CyberArk - CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CyberArk - CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
[ "cpe:2.3:a:cyberark:identity:*:*:*:*:*:*:*:*" ]
null
4.3
null
null
null
CVE-2014-3738
Cross-site scripting (XSS) vulnerability in Zenoss 4.2.5 allows remote attackers to inject arbitrary web script or HTML via the title of a device.
[ "cpe:2.3:a:zenoss:zenoss:4.2.5:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
GHSA-qqj4-453q-5665
The One Click Demo Import WordPress plugin before 3.1.0 does not validate the imported file, allowing high privilege users such as admin to upload arbitrary files (such as PHP) even when FILE_MODS and FILE_EDIT are disallowed
[]
null
7.2
null
null
null
CVE-2024-31613
BOSSCMS v3.10 is vulnerable to Cross Site Request Forgery (CSRF) in name="head_code" or name="foot_code."
[ "cpe:2.3:a:bosscms:bosscms:*:*:*:*:*:*:*:*" ]
null
5.4
null
null
null
CVE-2006-0791
PHP remote file inclusion vulnerability in index.php in DreamCost HostAdmin allows remote attackers to include arbitrary files via the $path variable, which is not initialized before use.
[ "cpe:2.3:a:dreamcost:hostadmin:3.0:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2019-13552
In WebAccess versions 8.4.1 and prior, multiple command injection vulnerabilities are caused by a lack of proper validation of user-supplied data and may allow arbitrary file deletion and remote code execution.
[ "cpe:2.3:a:advantech:webaccess:*:*:*:*:*:*:*:*" ]
null
8.8
null
6.5
null
RHSA-2021:0497
Red Hat Security Advisory: openvswitch2.13 security and bug fix update
lldp/openvswitch: denial of service via externally triggered memory leak openvswitch: limitation in the OVS packet parsing in userspace leads to DoS
[ "cpe:/o:redhat:enterprise_linux:8::fastdatapath" ]
null
7.5
null
null
null
CVE-2007-2989
The libike library in Sun Solaris 9 before 20070529 contains a logic error related to a certain pointer, which allows remote attackers to cause a denial of service (in.iked daemon crash) by sending certain UDP packets with a source port different from 500. NOTE: this issue might overlap CVE-2006-2298.
[ "cpe:2.3:o:sun:solaris:9.0:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:solaris:9.0:*:x86:*:*:*:*:*" ]
null
null
null
7.8
null
CVE-2025-38368
misc: tps6594-pfsm: Add NULL pointer check in tps6594_pfsm_probe()
In the Linux kernel, the following vulnerability has been resolved: misc: tps6594-pfsm: Add NULL pointer check in tps6594_pfsm_probe() The returned value, pfsm->miscdev.name, from devm_kasprintf() could be NULL. A pointer check is added to prevent potential NULL pointer dereference. This is similar to the fix in commit 3027e7b15b02 ("ice: Fix some null pointer dereference issues in ice_ptp.c"). This issue is found by our static analysis tool.
[]
null
null
null
null
null
GHSA-8hqg-3q4j-8px9
In FreeBSD 12.1-STABLE before r356089, 12.1-RELEASE before 12.1-RELEASE-p3, 11.3-STABLE before r356090, and 11.3-RELEASE before 11.3-RELEASE-p7, driver specific ioctl command handlers in the oce network driver failed to check whether the caller has sufficient privileges allowing unprivileged users to send passthrough commands to the device firmware.
[]
null
null
null
null
null
GHSA-m467-x355-47w9
There are several endpoints in the Store Locator Plus for WordPress plugin through 5.5.15 that could allow unauthenticated attackers the ability to inject malicious JavaScript into pages.
[]
null
null
null
null
null
CVE-2013-2392
Unspecified vulnerability in Oracle MySQL 5.1.68 and earlier, 5.5.30 and earlier, and 5.6.10 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer.
[ "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_eus:6.4:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*" ]
null
null
null
4
null
CVE-2016-6536
The /setup URI on AVer Information EH6108H+ devices with firmware X9.03.24.00.07l allows remote attackers to bypass intended page-access restrictions or modify passwords by leveraging knowledge of a handle parameter value.
[ "cpe:2.3:o:aver:eh6108h\\+_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:aver:eh6108h\\+:-:*:*:*:*:*:*:*" ]
null
null
9.8
10
null
GHSA-4cr4-j8fx-567m
Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2014-4132 and CVE-2014-4138.
[]
null
null
null
null
null
GHSA-4w67-4rr6-54cg
PHP remote file inclusion vulnerability in admin/admin_news_bot.php in Drunken:Golem Gaming Portal 0.5.1 alpha 2 allows remote attackers to execute arbitrary PHP code via a URL in the root_path parameter, a different vector than CVE-2007-0572.
[]
null
null
null
null
null
CVE-2025-5510
quequnlong shiyi-blog optimize server-side request forgery
A vulnerability classified as critical was found in quequnlong shiyi-blog up to 1.2.1. This vulnerability affects unknown code of the file /app/sys/article/optimize. The manipulation of the argument url leads to server-side request forgery. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
[]
5.3
6.3
6.3
6.5
null
GHSA-c8w7-vpqv-v7f3
The kernel in Apple Mac OS X before 10.7.2 does not properly implement the sticky bit for directories, which might allow local users to bypass intended permissions and delete files via an unlink system call.
[]
null
null
null
null
null
GHSA-r234-xxf3-j66w
A Blind SQL Injection vulnerability in Kronos WebTA 3.8.x and later before 4.0 (affecting the com.threeis.webta.H352premPayRequest servlet's SortBy parameter) allows an attacker with the Employee, Supervisor, or Timekeeper role to read sensitive data from the database.
[]
null
null
null
null
null
GHSA-hggh-f6m4-4c3w
An attacker with local access the to medical office computer can escalate his Windows user privileges to "NT AUTHORITY\SYSTEM" by exploiting a command injection vulnerability in the Elefant Update Service. The command injection can be exploited by communicating with the Elefant Update Service which is running as "SYSTEM" via Windows Named Pipes.The Elefant Software Updater (ESU) consists of two components. An ESU service which runs as "NT AUTHORITY\SYSTEM" and an ESU tray client which communicates with the service to update or repair the installation and is running with user permissions. The communication is implemented using named pipes. A crafted message of type "MessageType.SupportServiceInfos" can be sent to the local ESU service to inject commands, which are then executed as "NT AUTHORITY\SYSTEM".
[]
null
7.8
null
null
null
CVE-2024-3165
Database Credential Exposure in the Logs
System->Maintenance-> Log Files in dotCMS dashboard is providing the username/password for database connections in the log output. Nevertheless, this is a moderate issue as it requires a backend admin as well as that dbs are locked down by environment.   OWASP Top 10 - A05) Insecure Design OWASP Top 10 - A05) Security Misconfiguration OWASP Top 10 - A09) Security Logging and Monitoring Failure
[ "cpe:2.3:a:dotcms:dotcms:*:*:*:*:*:*:*:*" ]
null
4.5
null
null
null
GHSA-x939-2wmx-j42c
Unspecified vulnerability in the Network Layer component in Oracle Database Server 10.2.0.4, 10.2.0.5, 11.1.0.7, 11.2.0.2, 11.2.0.3, and 12.1.0.1 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
[]
null
null
null
null
null
GHSA-f8x4-74pw-c6pm
Nanoleaf Desktop App before v1.3.1 was discovered to contain a command injection vulnerability which is exploited via a crafted HTTP request.
[]
null
9.8
null
null
null
CVE-2024-22103
Out-of-Bounds Write vulnerability in Jungo WinDriver before 12.6.0 allows local attackers to cause a Windows blue screen error and Denial of Service (DoS).
[ "cpe:2.3:a:jungo:windriver:*:*:*:*:*:*:*:*", "cpe:2.3:a:mitsubishielectric:cpu_module_logging_configuration_tool:*:*:*:*:*:*:*:*", "cpe:2.3:a:mitsubishielectric:cw_configurator:*:*:*:*:*:*:*:*", "cpe:2.3:a:mitsubishielectric:data_transfer:*:*:*:*:*:*:*:*", "cpe:2.3:a:mitsubishielectric:data_transfer_classic:*:*:*:*:*:*:*:*", "cpe:2.3:a:mitsubishielectric:ezsocket:*:*:*:*:*:*:*:*", "cpe:2.3:a:mitsubishielectric:fr_configurator_sw3:*:*:*:*:*:*:*:*", "cpe:2.3:a:mitsubishielectric:fr_configurator2:*:*:*:*:*:*:*:*", "cpe:2.3:a:mitsubishielectric:genesis64:*:*:*:*:*:*:*:*", "cpe:2.3:a:mitsubishielectric:gt_got1000:*:*:*:*:*:*:*:*", "cpe:2.3:a:mitsubishielectric:gt_got2000:*:*:*:*:*:*:*:*", "cpe:2.3:a:mitsubishielectric:gt_softgot1000:*:*:*:*:*:*:*:*", "cpe:2.3:a:mitsubishielectric:gt_softgot2000:*:*:*:*:*:*:*:*", "cpe:2.3:a:mitsubishielectric:gx_developer:*:*:*:*:*:*:*:*", "cpe:2.3:a:mitsubishielectric:gx_logviewer:*:*:*:*:*:*:*:*", "cpe:2.3:a:mitsubishielectric:gx_works2:*:*:*:*:*:*:*:*", "cpe:2.3:a:mitsubishielectric:gx_works3:*:*:*:*:*:*:*:*", "cpe:2.3:a:mitsubishielectric:iq_works:*:*:*:*:*:*:*:*", "cpe:2.3:a:mitsubishielectric:mi_configurator:*:*:*:*:*:*:*:*", "cpe:2.3:a:mitsubishielectric:mr_configurator:*:*:*:*:*:*:*:*", "cpe:2.3:a:mitsubishielectric:mr_configurator2:*:*:*:*:*:*:*:*", "cpe:2.3:a:mitsubishielectric:mx_component:*:*:*:*:*:*:*:*", "cpe:2.3:a:mitsubishielectric:mx_opc_server_da\\/ua:*:*:*:*:*:*:*:*", "cpe:2.3:a:mitsubishielectric:numerical_control_device_communication:*:*:*:*:*:*:*:*", "cpe:2.3:a:mitsubishielectric:px_developer\\/monitor_tool:*:*:*:*:*:*:*:*", "cpe:2.3:a:mitsubishielectric:rt_toolbox3:*:*:*:*:*:*:*:*", "cpe:2.3:a:mitsubishielectric:rt_visualbox:*:*:*:*:*:*:*:*", "cpe:2.3:o:mitsubishielectric:mrzjw3-mc2-utl_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:mitsubishielectric:mrzjw3-mc2-utl:-:*:*:*:*:*:*:*", "cpe:2.3:o:mitsubishielectric:sw0dnc-mneth-b_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:mitsubishielectric:sw0dnc-mneth-b:-:*:*:*:*:*:*:*", "cpe:2.3:o:mitsubishielectric:sw1dnc-ccbd2-b_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:mitsubishielectric:sw1dnc-ccbd2-b:-:*:*:*:*:*:*:*", "cpe:2.3:o:mitsubishielectric:sw1dnc-ccief-j_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:mitsubishielectric:sw1dnc-ccief-j:-:*:*:*:*:*:*:*", "cpe:2.3:o:mitsubishielectric:sw1dnc-ccief-b_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:mitsubishielectric:sw1dnc-ccief-b:-:*:*:*:*:*:*:*", "cpe:2.3:o:mitsubishielectric:sw1dnc-mnetg-b_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:mitsubishielectric:sw1dnc-mnetg-b:-:*:*:*:*:*:*:*", "cpe:2.3:o:mitsubishielectric:sw1dnc-qsccf-b_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:mitsubishielectric:sw1dnc-qsccf-b:-:*:*:*:*:*:*:*", "cpe:2.3:o:mitsubishielectric:sw1dnd-emsdk-b_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:mitsubishielectric:sw1dnd-emsdk-b:-:*:*:*:*:*:*:*" ]
null
4.4
null
null
null
CVE-2024-35112
IBM Control Center cross-site scripting
IBM Control Center 6.2.1 and 6.3.1 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system.
[ "cpe:2.3:a:ibm:control_center:6.2.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:control_center:6.3.1.0:*:*:*:*:*:*:*" ]
null
5.4
null
null
null
GHSA-pfpc-c982-xg3q
The FiWin SS28S WiFi VoIP SIP/Skype Phone, firmware version 01_02_07, has a hard-coded username and password, which allows remote attackers to gain administrative access via telnet.
[]
null
null
null
null
null
CVE-2014-9596
Panasonic Arbitrator Back-End Server (BES) MK 2.0 VPU before 9.3.1 build 4.08.003.0, when USB Wi-Fi or Direct LAN is enabled, and MK 3.0 VPU before 9.3.1 build 5.06.000.0, when Embedded Wi-Fi or Direct LAN is enabled, does not use encryption, which allows remote attackers to obtain sensitive information by sniffing the network for client-server traffic, as demonstrated by Active Directory credential information.
[ "cpe:2.3:o:panasonic:arbitrator_back-end_server_mk_3.0_vpu_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:panasonic:arbitrator_back-end_server_mk_3.0_vpu:-:*:*:*:*:*:*:*", "cpe:2.3:o:panasonic:arbitrator_back-end_server_mk_2.0_vpu_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:panasonic:arbitrator_back-end_server_mk_2.0_vpu:-:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
GHSA-5mwv-x2qc-g5cj
In the Linux kernel, the following vulnerability has been resolved:nvme: fix reconnection fail due to reserved tag allocationWe found a issue on production environment while using NVMe over RDMA, admin_q reconnect failed forever while remote target and network is ok. After dig into it, we found it may caused by a ABBA deadlock due to tag allocation. In my case, the tag was hold by a keep alive request waiting inside admin_q, as we quiesced admin_q while reset ctrl, so the request maked as idle and will not process before reset success. As fabric_q shares tagset with admin_q, while reconnect remote target, we need a tag for connect command, but the only one reserved tag was held by keep alive command which waiting inside admin_q. As a result, we failed to reconnect admin_q forever. In order to fix this issue, I think we should keep two reserved tags for admin queue.
[]
null
5.5
null
null
null
CVE-2017-9413
Multiple cross-site request forgery (CSRF) vulnerabilities in the Podcast feature in Subsonic 6.1.1 allow remote attackers to hijack the authentication of users for requests that (1) subscribe to a podcast via the add parameter to podcastReceiverAdmin.view or (2) update Internet Radio Settings via the urlRedirectCustomUrl parameter to networkSettings.view. NOTE: These vulnerabilities can be exploited to conduct server-side request forgery (SSRF) attacks.
[ "cpe:2.3:a:subsonic:subsonic:6.1.1:*:*:*:*:*:*:*" ]
null
null
8.8
6.8
null
GHSA-hq7p-p5vr-p695
A vulnerability was found in PHPGurukul Apartment Visitors Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /category.php. The manipulation of the argument categoryname leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
[]
6.9
7.3
null
null
null
RHSA-2023:6813
Red Hat Security Advisory: kernel security and bug fix update
kernel: netfilter: NULL pointer dereference in nf_tables due to zeroed list head kernel: net/sched: cls_u32 component reference counter leak if tcf_change_indev() fails kernel: net/sched: cls_fw component can be exploited as result of failure in tcf_change_indev function kernel: tun: bugs for oversize packet when napi frags enabled in tun_napi_alloc_frags
[ "cpe:/o:redhat:rhel_e4s:8.1::baseos" ]
null
7.8
null
null
null
CVE-2017-3116
Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable memory corruption vulnerability in the MakeAccessible plugin when parsing TrueType font data. Successful exploitation could lead to arbitrary code execution.
[ "cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:reader:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*" ]
null
null
8.8
9.3
null
GHSA-wwqj-cvrv-7w8x
The Intel 2200BG 802.11 Wireless Mini-PCI driver 9.0.3.9 (w29n51.sys) allows remote attackers to cause a denial of service (system crash) via crafted disassociation packets, which triggers memory corruption of "internal kernel structures," a different vulnerability than CVE-2006-6651. NOTE: this issue might overlap CVE-2006-3992.
[]
null
null
null
null
null
CVE-2014-0383
Unspecified vulnerability in the Oracle Identity Manager component in Oracle Fusion Middleware 11.1.2.0 and 11.1.2.1 allows remote authenticated users to affect confidentiality via unknown vectors related to Identity Console.
[ "cpe:2.3:a:oracle:fusion_middleware:11.1.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:fusion_middleware:11.1.2.1.0:*:*:*:*:*:*:*" ]
null
null
null
3.5
null
RHSA-2020:1288
Red Hat Security Advisory: haproxy security update
haproxy: malformed HTTP/2 requests can lead to out-of-bounds writes
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8.8
null
null
null
CVE-2020-1734
A flaw was found in the pipe lookup plugin of ansible. Arbitrary commands can be run, when the pipe lookup plugin uses subprocess.Popen() with shell=True, by overwriting ansible facts and the variable is not escaped by quote plugin. An attacker could take advantage and run arbitrary commands by overwriting the ansible facts.
[ "cpe:2.3:a:redhat:ansible_engine:*:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:ansible_engine:2.8.8:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:ansible_engine:2.9.5:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:ansible_tower:*:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:ansible_tower:3.4.5:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:ansible_tower:3.5.5:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:ansible_tower:3.6.3:*:*:*:*:*:*:*" ]
null
7.4
null
null
null