id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
189k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
patch_commit_url
stringlengths
36
232
GHSA-qq7p-4pp5-vpwx
Multiple PHP remote file inclusion vulnerabilities in Valdersoft Shopping Cart 3.0 and earlier allow remote attackers to execute arbitrary PHP code via a URL in the commonIncludePath parameter to (1) admin/include/common.php, (2) include/common.php, or (3) common_include/common.php.
[]
null
null
null
null
null
CVE-2024-7916
nafisulbari/itsourcecode Insurance Management System Add Nominee Page addNominee.php cross site scripting
A vulnerability classified as problematic was found in nafisulbari/itsourcecode Insurance Management System 1.0. Affected by this vulnerability is an unknown functionality of the file addNominee.php of the component Add Nominee Page. The manipulation of the argument Nominee-Client ID leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
[ "cpe:2.3:a:sourcecodester:insurance_management_system:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:insurance_management_system_project:insurance_management_system:1.0:*:*:*:*:*:*:*" ]
5.3
3.5
3.5
4
null
GHSA-hmcq-66vp-c2gv
LAME 3.99, 3.99.1, 3.99.2, 3.99.3, 3.99.4, 3.99.5, 3.98.4, 3.98.2 and 3.98 has a heap-based buffer over-read in fill_buffer in libmp3lame/util.c, related to lame_encode_buffer_sample_t in libmp3lame/lame.c, a different vulnerability than CVE-2017-9410.
[]
null
null
5.5
null
null
CVE-2020-22987
Cross-Site Scripting (XSS) vulnerability in MicroStrategy Web SDK 10.11 and earlier, allows remote unauthenticated attackers to execute arbitrary code via the fileToUpload parameter to the uploadFile task.
[ "cpe:2.3:a:microstrategy:microstrategy_web_sdk:*:*:*:*:*:*:*:*" ]
null
6.1
null
4.3
null
CVE-2017-8222
Wireless IP Camera (P2P) WIFICAM devices have an "Apple Production IOS Push Services" private RSA key and certificate stored in /system/www/pem/ck.pem inside the firmware, which allows attackers to obtain sensitive information.
[ "cpe:2.3:o:wificam:wireless_ip_camera_\\(p2p\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:wificam:wireless_ip_camera_\\(p2p\\):-:*:*:*:*:*:*:*" ]
null
null
7.5
5
null
CVE-2024-37208
WordPress WP Scraper plugin <= 5.7 - Server Side Request Forgery (SSRF) vulnerability
Server-Side Request Forgery (SSRF) vulnerability in Robert Macchi WP Scraper.This issue affects WP Scraper: from n/a through 5.7.
[]
null
4.9
null
null
null
CVE-2012-2383
Integer overflow in the i915_gem_execbuffer2 function in drivers/gpu/drm/i915/i915_gem_execbuffer.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.3.5 on 32-bit platforms allows local users to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via a crafted ioctl call.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.3:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.3:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.3:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.3:rc4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.3:rc5:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.3:rc6:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.3:rc7:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.3.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.3.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.3.3:*:*:*:*:*:*:*" ]
null
null
null
4.9
null
GHSA-x6r4-f94j-335g
A cross-site scripting (XSS) vulnerability in the component /framework/cron/action/humanize of Pleasant Solutions Pleasant Password Server v7.11.41.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the cronString parameter.
[]
null
6.1
null
null
null
GHSA-538h-6rv2-wmj3
ChakraCore RCE Vulnerability
The Chakra JavaScript engine in Microsoft Edge allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Scripting Engine Memory Corruption Vulnerability," a different vulnerability than CVE-2016-3199.
[]
null
null
8.8
null
null
CVE-2020-1160
An information disclosure vulnerability exists when the Microsoft Windows Graphics Component improperly handles objects in memory, aka 'Microsoft Graphics Component Information Disclosure Vulnerability'.
[ "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*" ]
null
5.5
null
2.1
null
CVE-2019-14028
Buffer overwrite during memcpy due to lack of check on SSID length validation in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking in APQ8009, APQ8017, APQ8053, APQ8064, APQ8096, APQ8096AU, APQ8098, IPQ6018, IPQ8074, MDM9206, MDM9207C, MDM9607, MDM9640, MDM9650, MSM8996AU, MSM8998, Nicobar, QCA4531, QCA6174A, QCA6564, QCA6574, QCA6574AU, QCA6584, QCA6584AU, QCA8081, QCA9377, QCA9379, QCA9886, QCN7605, QCS404, QCS405, QCS605, Rennell, SA6155P, SC8180X, SDA660, SDA845, SDM630, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, SDX20, SDX24, SM6150, SM7150, SM8150, SM8250, SXR1130, SXR2130
[ "cpe:2.3:o:qualcomm:apq8009_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:apq8009:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:apq8017_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:apq8017:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:apq8053_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:apq8053:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:apq8064_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:apq8064:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:apq8096_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:apq8096:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:apq8096au_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:apq8096au:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:apq8098_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:apq8098:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ipq6018_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ipq6018:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ipq8074_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ipq8074:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9206_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9206:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9207c_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9207c:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9607_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9607:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9640_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9640:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9650:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:msm8996au:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:msm8998_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:msm8998:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:nicobar_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:nicobar:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca4531_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca4531:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6174a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6174a:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6564_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6564:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6574_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6574:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6584_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6584:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6584au:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca8081:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca9377_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca9377:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca9379_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca9379:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca9886_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca9886:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn7605_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn7605:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcs404_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcs404:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcs405_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcs405:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcs605_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcs605:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:rennell_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:rennell:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa6155p:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sc8180x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sc8180x:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sda660_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sda660:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sda845_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sda845:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdm630_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm630:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdm636_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm636:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdm660_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm660:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdm670_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm670:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdm710_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm710:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdm845_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm845:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdm850_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm850:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdx20_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdx20:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdx24_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdx24:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm6150_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm6150:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm7150_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm7150:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm8150_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm8150:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm8250_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm8250:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sxr1130_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sxr1130:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sxr2130_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sxr2130:-:*:*:*:*:*:*:*" ]
null
7.8
null
7.2
null
GHSA-383j-f5vg-3hcm
In the Linux kernel, the following vulnerability has been resolved:ext4: check stripe size compatibility on remount as wellWe disable stripe size in __ext4_fill_super if it is not a multiple of the cluster ratio however this check is missed when trying to remount. This can leave us with cases where stripe < cluster_ratio after remount:set making EXT4_B2C(sbi->s_stripe) become 0 that can cause some unforeseen bugs like divide by 0.Fix that by adding the check in remount path as well.
[]
null
5.5
null
null
null
GHSA-p48h-366j-m3qx
Multiple SQL injection vulnerabilities in SergiDs Top Music module 3.0 PR3 and earlier for PHP-Nuke allow remote attackers to execute arbitrary SQL commands via the (1) idartist, (2) idsong, and (3) idalbum parameters to modules.php.
[]
null
null
null
null
null
GHSA-36pc-jp6h-c84c
Multiple cross-site scripting (XSS) vulnerabilities submit.asp in ASPScriptz Guest Book 2.0 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) GBOOK_UNAME, (2) GBOOK_EMAIL, (3) GBOOK_CITY, (4) GBOOK_COU, (5) GBOOK_WWW, and (6) GBOOK_MESS form fields.
[]
null
null
null
null
null
GHSA-v5q7-9q8w-8w86
A vulnerability classified as critical has been found in code-projects Blood Bank Management System 1.0. Affected is an unknown function of the file /admin/blood/update/B+.php. The manipulation of the argument Bloodname leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
[]
5.3
6.3
null
null
null
CVE-2018-12366
An invalid grid size during QCMS (color profile) transformations can result in the out-of-bounds read interpreted as a float value. This could leak private data into the output. This vulnerability affects Thunderbird < 60, Thunderbird < 52.9, Firefox ESR < 60.1, Firefox ESR < 52.9, and Firefox < 61.
[ "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*" ]
null
null
6.5
4.3
null
CVE-2021-31836
Improper Privilege Management in MA for Windows
Improper privilege management vulnerability in maconfig for McAfee Agent for Windows prior to 5.7.4 allows a local user to gain access to sensitive information. The utility was able to be run from any location on the file system and by a low privileged user.
[ "cpe:2.3:a:mcafee:mcafee_agent:*:*:*:*:*:windows:*:*" ]
null
5.6
null
null
null
GHSA-m54w-9xr6-4jg3
Photo Organizer 2.32b and earlier does not properly check the ownership of certain objects, which allows remote attackers to gain unauthorized access via vectors related to (1) camera del, (2) camera edit, (3) folder/album deletion, (4) photo.move, (5) content.indexer, (6) folder.content, and possibly other operations.
[]
null
null
null
null
null
CVE-2022-1474
WP Event Manager < 3.1.28 - Reflected Cross-Site Scripting
The WP Event Manager WordPress plugin before 3.1.28 does not sanitise and escape its search before outputting it back in an attribute on the event dashboard, leading to a Reflected Cross-Site Scripting
[ "cpe:2.3:a:wp-eventmanager:wp_event_manager:*:*:*:*:*:wordpress:*:*" ]
null
6.1
null
4.3
null
CVE-2021-42977
NoMachine Enterprise Desktop is affected by Integer Overflow. IOCTL Handler 0x22001B in the NoMachine Enterprise Desktop above 4.0.346 and below 7.7.4 allow local attackers to execute arbitrary code in kernel mode or cause a denial of service (memory corruption and OS crash) via specially crafted I/O Request Packet.
[ "cpe:2.3:a:nomachine:enterprise_desktop:*:*:*:*:*:*:*:*" ]
null
8.8
null
7.2
null
CVE-2018-10694
An issue was discovered on Moxa AWK-3121 1.14 devices. The device provides a Wi-Fi connection that is open and does not use any encryption mechanism by default. An administrator who uses the open wireless connection to set up the device can allow an attacker to sniff the traffic passing between the user's computer and the device. This can allow an attacker to steal the credentials passing over the HTTP connection as well as TELNET traffic. Also an attacker can MITM the response and infect a user's computer very easily as well.
[ "cpe:2.3:o:moxa:awk-3121_firmware:1.14:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:awk-3121:-:*:*:*:*:*:*:*" ]
null
8.1
null
4.3
null
CVE-2023-23991
WordPress Booking Calendar plugin <= 9.4.3 - SQL Injection
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in WPdevelop / Oplugins Booking Calendar allows SQL Injection.This issue affects Booking Calendar: from n/a through 9.4.3.
[]
null
7.6
null
null
null
CVE-2007-4089
Vikingboard 0.1.2 allows remote attackers to obtain sensitive information via the debug parameter to (1) forum.php, (2) cp.php, and possibly other unspecified components.
[ "cpe:2.3:a:vikingboard:vikingboard:0.1.2:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
CVE-2018-9139
On Samsung mobile devices with N(7.x) software, a buffer overflow in the vision service allows code execution in a privileged process via a large frame size, aka SVE-2017-11165.
[ "cpe:2.3:o:samsung:samsung_mobile:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:samsung:samsung_mobile:7.1:*:*:*:*:*:*:*", "cpe:2.3:o:samsung:samsung_mobile:7.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:samsung:samsung_mobile:7.1.2:*:*:*:*:*:*:*" ]
null
null
9.8
10
null
CVE-2014-2080
Cross-site scripting (XSS) vulnerability in manager/templates/default/header.tpl in ModX Revolution before 2.2.11 allows remote attackers to inject arbitrary web script or HTML via the "a" parameter.
[ "cpe:2.3:a:modx:modx_revolution:*:*:*:*:*:*:*:*", "cpe:2.3:a:modx:modx_revolution:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:modx:modx_revolution:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:modx:modx_revolution:2.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:modx:modx_revolution:2.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:modx:modx_revolution:2.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:modx:modx_revolution:2.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:modx:modx_revolution:2.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:modx:modx_revolution:2.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:modx:modx_revolution:2.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:modx:modx_revolution:2.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:modx:modx_revolution:2.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:modx:modx_revolution:2.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:modx:modx_revolution:2.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:modx:modx_revolution:2.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:modx:modx_revolution:2.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:modx:modx_revolution:2.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:modx:modx_revolution:2.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:modx:modx_revolution:2.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:modx:modx_revolution:2.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:modx:modx_revolution:2.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:modx:modx_revolution:2.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:modx:modx_revolution:2.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:modx:modx_revolution:2.2.7:*:*:*:*:*:*:*", "cpe:2.3:a:modx:modx_revolution:2.2.8:*:*:*:*:*:*:*", "cpe:2.3:a:modx:modx_revolution:2.2.9:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
CVE-2024-43229
WordPress WP Search Analytics plugin <= 1.4.9 - Broken Access Control vulnerability
Missing Authorization vulnerability in Cornel Raiu WP Search Analytics allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP Search Analytics: from n/a through 1.4.9.
[]
null
4.3
null
null
null
GHSA-v8fp-cfw6-2j9w
An issue was discovered in FIS GT.M through V7.0-000 (related to the YottaDB code base). Using crafted input, an attacker can control the size of a memset that occurs in calls to util_format in sr_unix/util_output.c.
[]
null
7.5
null
null
null
CVE-2023-37520
HCL BigFix Platform is affected by Unathenticated Stored Cross-Site Scripting (XSS)
Unauthenticated Stored Cross-Site Scripting (XSS) vulnerability identified in BigFix Server version 9.5.12.68, allowing for potential data exfiltration. This XSS vulnerability is in the Gather Status Report, which is served by the BigFix Relay.
[ "cpe:2.3:a:hcltech:bigfix_platform:*:*:*:*:*:*:*:*", "cpe:2.3:a:hcltech:bigfix_platform:11.0.0:*:*:*:*:*:*:*" ]
null
7.7
null
null
null
GHSA-fmjx-hmcg-x6hg
FactoryTalk Linx versions 6.00, 6.10, and 6.11, RSLinx Classic v4.11.00 and prior,Connected Components Workbench: Version 12 and prior, ControlFLASH: Version 14 and later, ControlFLASH Plus: Version 1 and later, FactoryTalk Asset Centre: Version 9 and later, FactoryTalk Linx CommDTM: Version 1 and later, Studio 5000 Launcher: Version 31 and later Stud, 5000 Logix Designer software: Version 32 and prior is vulnerable. An exposed API call allows users to provide files to be processed without sanitation. This may allow an attacker to use specially crafted requests to traverse the file system and expose sensitive data on the local hard drive.
[]
null
null
null
null
null
GHSA-h9f2-jxcx-f5wh
Unspecified vulnerability in Oracle MySQL Server 5.5.42 and earlier, and 5.6.23 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : Federated.
[]
null
null
null
null
null
GHSA-ch7x-55jf-9fgx
libxml2, as used in Red Hat JBoss Core Services and when in recovery mode, allows context-dependent attackers to cause a denial of service (stack consumption) via a crafted XML document. NOTE: this vulnerability exists because of an incorrect fix for CVE-2016-3627.
[]
null
6.5
null
null
null
GHSA-c787-p47f-ccwq
Deserialization of Untrusted Data vulnerability in Phan An AJAX Random Posts allows Object Injection.This issue affects AJAX Random Posts: from n/a through 0.3.3.
[]
null
9.8
null
null
null
GHSA-hh6r-xc8x-f53f
In the Linux kernel 6.0.8, there is a use-after-free in run_unpack in fs/ntfs3/run.c, related to a difference between NTFS sector size and media sector size.
[]
null
7.8
null
null
null
CVE-2020-28715
An issue was discovered in kdmserver service in LeEco LeTV X43 version V2401RCN02C080080B04121S, allows attackers to execute arbitrary code, escalate privileges, and cause a denial of service (DoS).
[ "cpe:2.3:h:leeco:letv_x43:-:*:*:*:*:*:*:*", "cpe:2.3:o:leeco:letv_x43_firmware:v2401rcn02c080080b04121s:*:*:*:*:*:*:*" ]
null
9.8
null
null
null
GHSA-r75v-8c97-7xvm
openflights commit 5234b5b is vulnerable to Cross-Site Scripting (XSS) via php/submit.php
[]
null
6.1
null
null
null
GHSA-87jv-77j5-g3gv
IBM Tivoli Storage Manager discloses unencrypted login credentials to Vmware vCenter that could be obtained by a local user.
[]
null
null
6.5
null
null
CVE-2024-20884
Incorrect use of privileged API vulnerability in getSemBatteryUsageStats in BatteryStatsService prior to SMR Jun-2024 Release 1 allows local attackers to use privileged API.
[]
null
6.2
null
null
null
CVE-2015-6946
Multiple stack-based buffer overflows in the Reprise License Manager service in Borland AccuRev allow remote attackers to execute arbitrary code via the (1) akey or (2) actserver parameter to the activate_doit function or (3) licfile parameter to the service_startup_doit functionality.
[ "cpe:2.3:a:microfocus:accurev:-:*:*:*:*:*:*:*" ]
null
null
null
9.3
null
GHSA-c5q5-64hr-5mwm
Remote Code Execution has been discovered in OpenText™ iManager 3.2.6.0200. The vulnerability can trigger remote code execution using custom file upload task.
[]
null
7.8
null
null
null
CVE-2023-6110
Openstack: deleting a non existing access rule deletes another existing access rule in it's scope
A flaw was found in OpenStack. When a user tries to delete a non-existing access rule in it's scope, it deletes other existing access rules which are not associated with any application credentials.
[ "cpe:/a:redhat:openstack:17.1::el8", "cpe:/a:redhat:openstack:17.1::el9", "cpe:/a:redhat:openstack:16.1", "cpe:/a:redhat:openstack:16.2", "cpe:/a:redhat:openstack:17.0", "cpe:/a:redhat:openstack:18.0" ]
null
5.5
null
null
null
RHSA-2017:1390
Red Hat Security Advisory: samba security update
samba: Loading shared modules from any path in the system leading to RCE (SambaCry)
[ "cpe:/o:redhat:rhel_aus:6.4::server", "cpe:/o:redhat:rhel_aus:6.5::server", "cpe:/o:redhat:rhel_aus:6.6::server", "cpe:/o:redhat:rhel_eus:6.7::computenode", "cpe:/o:redhat:rhel_eus:6.7::server", "cpe:/o:redhat:rhel_eus:7.1::server", "cpe:/o:redhat:rhel_eus:7.2::computenode", "cpe:/o:redhat:rhel_eus:7.2::server", "cpe:/o:redhat:rhel_mission_critical:6.2::server", "cpe:/o:redhat:rhel_tus:6.5::server", "cpe:/o:redhat:rhel_tus:6.6::server" ]
null
null
7.5
null
null
GHSA-8q58-8vm2-mf3q
A vulnerability was found in Samba's "rpcecho" development server, a non-Windows RPC server used to test Samba's DCE/RPC stack elements. This vulnerability stems from an RPC function that can be blocked indefinitely. The issue arises because the "rpcecho" service operates with only one worker in the main RPC task, allowing calls to the "rpcecho" server to be blocked for a specified time, causing service disruptions. This disruption is triggered by a "sleep()" call in the "dcesrv_echo_TestSleep()" function under specific conditions. Authenticated users or attackers can exploit this vulnerability to make calls to the "rpcecho" server, requesting it to block for a specified duration, effectively disrupting most services and leading to a complete denial of service on the AD DC. The DoS affects all other services as "rpcecho" runs in the main RPC task.
[]
null
6.5
null
null
null
CVE-2002-2240
Directory traversal vulnerability in MyServer 0.11 and 0.2 allows remote attackers to read arbitrary files via a ".." (dot dot) in an HTTP GET request.
[ "cpe:2.3:a:myserver:myserver:0.2:*:*:*:*:*:*:*", "cpe:2.3:a:myserver:myserver:0.11:*:*:*:*:*:*:*" ]
null
null
null
5
null
GHSA-m95q-pxcq-5m5r
phpList 3.6.0 allows CSV injection, related to the email parameter, and /lists/admin/ exports.
[]
null
null
null
null
null
GHSA-q6xm-78fh-vq57
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Emraan Cheema CubeWP Framework allows DOM-Based XSS. This issue affects CubeWP Framework: from n/a through 1.1.23.
[]
null
6.5
null
null
null
GHSA-5x63-mggh-9qxw
Vulnerability in the Oracle GraalVM Enterprise Edition product of Oracle GraalVM (component: GraalVM Compiler). Supported versions that are affected are 19.3.1 and 20.0.0. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise Oracle GraalVM Enterprise Edition. While the vulnerability is in Oracle GraalVM Enterprise Edition, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle GraalVM Enterprise Edition. CVSS 3.0 Base Score 7.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H).
[]
null
null
null
null
null
GHSA-w2j3-vrwq-vgh5
The SHA-2 digest support in the sudoers plugin in sudo after 1.8.7 allows local users with write permissions to parts of the called command to replace them before it is executed.
[]
null
null
7
null
null
CVE-2023-25212
Tenda AC5 US_AC5V1.0RTL_V15.03.06.28 was discovered to contain a stack overflow via the fromSetWirelessRepeat function. This vulnerability allows attackers to cause a Denial of Service (DoS) or execute arbitrary code via a crafted payload.
[ "cpe:2.3:o:tenda:ac5_firmware:15.03.06.28:*:*:*:*:*:*:*", "cpe:2.3:h:tenda:ac5:1.0:*:*:*:*:*:*:*" ]
null
9.8
null
null
null
GHSA-mh56-vfvr-8vx4
SQL injection vulnerability in directory.php in Scripts for Sites (SFS) SFS EZ Affiliate allows remote attackers to execute arbitrary SQL commands via the cat_id parameter in a list action.
[]
null
null
null
null
null
CVE-2024-30000
Windows Mobile Broadband Driver Remote Code Execution Vulnerability
Windows Mobile Broadband Driver Remote Code Execution Vulnerability
[ "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*" ]
null
6.8
null
null
null
CVE-2024-30493
WordPress Church Admin plugin <= 4.1.7 - Cross Site Request Forgery (CSRF) vulnerability
Cross-Site Request Forgery (CSRF) vulnerability in Andy Moyle Church Admin.This issue affects Church Admin: from n/a through 4.1.7.
[]
null
4.3
null
null
null
ICSA-16-231-01
Navis WebAccess SQL Injection Vulnerability
SQL injection vulnerability in news pages in Cargotec Navis WebAccess before 2016-08-10 allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
[]
null
null
7.3
null
null
CVE-2022-32560
An issue was discovered in Couchbase Server before 7.0.4. XDCR lacks role checking when changing internal settings.
[ "cpe:2.3:a:couchbase:couchbase_server:*:*:*:*:*:*:*:*" ]
null
7.5
null
5
null
CVE-2016-2833
Mozilla Firefox before 47.0 ignores Content Security Policy (CSP) directives for cross-domain Java applets, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via a crafted applet.
[ "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*" ]
null
null
6.1
4.3
null
GHSA-rx9x-86vg-h4cr
An issue was discovered in Delta RM 1.2. The /risque/risque/workflow/reset endpoint is lacking access controls, and it is possible for an unprivileged user to reopen a risk with a POST request, using the risqueID parameter to identify the risk to be re-opened.
[]
null
4.3
null
null
null
CVE-2020-25219
url::recvline in url.cpp in libproxy 0.4.x through 0.4.15 allows a remote HTTP server to trigger uncontrolled recursion via a response composed of an infinite stream that lacks a newline character. This leads to stack exhaustion.
[ "cpe:2.3:a:libproxy_project:libproxy:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*" ]
null
7.5
null
5
null
CVE-2022-31836
The leafInfo.match() function in Beego v2.0.3 and below uses path.join() to deal with wildcardvalues which can lead to cross directory risk.
[ "cpe:2.3:a:beego:beego:*:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
null
CVE-2019-9703
Symantec Endpoint Encryption, prior to SEE 11.3.0, may be susceptible to a privilege escalation vulnerability, which is a type of issue that allows a user to gain elevated access to resources that are normally protected at lower access levels.
[ "cpe:2.3:a:symantec:endpoint_encryption:*:*:*:*:*:*:*:*" ]
null
null
7.8
4.6
null
CVE-2022-1242
Apport can be tricked into connecting to arbitrary sockets as the root user
[]
null
7.8
null
null
null
CVE-2024-6307
WordPress Core < 6.5.5 - Authenticated (Contributor+) Stored Cross-Site Scripting via HTML API
WordPress Core is vulnerable to Stored Cross-Site Scripting via the HTML API in various versions prior to 6.5.5 due to insufficient input sanitization and output escaping on URLs. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
6.4
null
null
null
CVE-2024-38567
wifi: carl9170: add a proper sanity check for endpoints
In the Linux kernel, the following vulnerability has been resolved: wifi: carl9170: add a proper sanity check for endpoints Syzkaller reports [1] hitting a warning which is caused by presence of a wrong endpoint type at the URB sumbitting stage. While there was a check for a specific 4th endpoint, since it can switch types between bulk and interrupt, other endpoints are trusted implicitly. Similar warning is triggered in a couple of other syzbot issues [2]. Fix the issue by doing a comprehensive check of all endpoints taking into account difference between high- and full-speed configuration. [1] Syzkaller report: ... WARNING: CPU: 0 PID: 4721 at drivers/usb/core/urb.c:504 usb_submit_urb+0xed6/0x1880 drivers/usb/core/urb.c:504 ... Call Trace: <TASK> carl9170_usb_send_rx_irq_urb+0x273/0x340 drivers/net/wireless/ath/carl9170/usb.c:504 carl9170_usb_init_device drivers/net/wireless/ath/carl9170/usb.c:939 [inline] carl9170_usb_firmware_finish drivers/net/wireless/ath/carl9170/usb.c:999 [inline] carl9170_usb_firmware_step2+0x175/0x240 drivers/net/wireless/ath/carl9170/usb.c:1028 request_firmware_work_func+0x130/0x240 drivers/base/firmware_loader/main.c:1107 process_one_work+0x9bf/0x1710 kernel/workqueue.c:2289 worker_thread+0x669/0x1090 kernel/workqueue.c:2436 kthread+0x2e8/0x3a0 kernel/kthread.c:376 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:308 </TASK> [2] Related syzkaller crashes:
[]
null
null
null
null
null
CVE-2023-1563
SourceCodester Student Study Center Desk Management System assign.php sql injection
A vulnerability has been found in SourceCodester Student Study Center Desk Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /admin/assign/assign.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-223555.
[ "cpe:2.3:a:oretnom23:student_study_center_desk_management_system:1.0:*:*:*:*:*:*:*" ]
null
6.3
6.3
6.5
null
CVE-2020-14185
Affected versions of Jira Server allow remote unauthenticated attackers to enumerate issue keys via a missing permissions check in the ActionsAndOperations resource. The affected versions are before 7.13.18, from version 8.0.0 before 8.5.9, and from version 8.6.0 before version 8.12.2.
[ "cpe:2.3:a:atlassian:jira:*:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:jira_server:*:*:*:*:*:*:*:*" ]
null
5.3
null
5
null
CVE-2020-10799
The svglib package through 0.9.3 for Python allows XXE attacks via an svg2rlg call.
[ "cpe:2.3:a:svglib_project:svglib:*:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
null
CVE-2020-5555
Shihonkanri Plus GOOUT Ver1.5.8 and Ver2.2.10 allows remote attackers to read and write data of the files placed in the same directory where it is placed via unspecified vector due to the improper input validation issue.
[ "cpe:2.3:a:shihonkanri_plus_goout_project:shihonkanri_plus_goout:1.5.8:*:*:*:*:*:*:*", "cpe:2.3:a:shihonkanri_plus_goout_project:shihonkanri_plus_goout:2.2.10:*:*:*:*:*:*:*" ]
null
9.1
null
6.4
null
CVE-2022-47144
WordPress Mediamatic – Media Library Folders Plugin <= 2.8.1 is vulnerable to Cross Site Request Forgery (CSRF)
Cross-Site Request Forgery (CSRF) vulnerability in Plugincraft Mediamatic – Media Library Folders plugin <= 2.8.1 versions.
[ "cpe:2.3:a:frenify:mediamatic:*:*:*:*:*:wordpress:*:*" ]
null
4.3
null
null
null
CVE-2021-29563
CHECK-fail in `tf.raw_ops.RFFT`
TensorFlow is an end-to-end open source platform for machine learning. An attacker can cause a denial of service by exploiting a `CHECK`-failure coming from the implementation of `tf.raw_ops.RFFT`. Eigen code operating on an empty matrix can trigger on an assertion and will cause program termination. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
[ "cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*" ]
null
2.5
null
null
null
ICSA-23-222-12
Siemens RUGGEDCOM ROS
The affected products insufficiently block data from being forwarded over the mirror port into the mirrored network. An attacker could use this behavior to transmit malicious packets to systems in the mirrored network, possibly influencing their configuration and runtime behavior.
[]
null
9.1
null
null
null
CVE-2025-4707
Campcodes Sales and Inventory System transaction_add.php sql injection
A vulnerability was found in Campcodes Sales and Inventory System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /pages/transaction_add.php. The manipulation of the argument prod_name leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
[]
6.9
7.3
7.3
7.5
null
CVE-2008-6716
homeadmin/adminhome.php in Pre ADS Portal 2.0 and earlier does not require administrative authentication, which allows remote attackers to have an unspecified impact via a direct request.
[ "cpe:2.3:a:preprojects:pre_ads_portal:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2016-10449
In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Mobile and Snapdragon Wear MDM9206, MDM9607, MDM9640, MDM9650, MSM8909W, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 430, SD 450, SD 615/16/SD 415, SD 625, SD 650/52, SD 800, SD 810, SD 820, and SD 835, in a GNSS API function, a NULL pointer dereference can occur.
[ "cpe:2.3:o:qualcomm:mdm9206_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9206:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9607_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9607:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9640_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9640:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9650:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:msm8909w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:msm8909w:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_210_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_210:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_212_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_212:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_205_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_205:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_400_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_400:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_410_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_410:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_412_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_412:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_425_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_425:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_430_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_430:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_450_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_450:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_615_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_615:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_616_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_616:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_415_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_415:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_625_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_625:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_650_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_650:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_652_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_652:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_800_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_800:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_810_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_810:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_820_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_820:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_835_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_835:-:*:*:*:*:*:*:*" ]
null
null
9.8
10
null
GHSA-8pjh-cf85-78cc
Transient DOS due to uncontrolled resource consumption in Linux kernel when malformed messages are sent from the Gunyah Resource Manager message queue.
[]
null
5.5
null
null
null
CVE-2024-0571
Totolink LR1200GB cstecgi.cgi setSmsCfg stack-based overflow
A vulnerability, which was classified as critical, has been found in Totolink LR1200GB 9.1.0u.6619_B20230130. This issue affects the function setSmsCfg of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument text leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-250787. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
[ "cpe:2.3:o:totolink:lr1200gb_firmware:9.1.0u.6619_b20230130:*:*:*:*:*:*:*", "cpe:2.3:h:totolink:lr1200gb:-:*:*:*:*:*:*:*" ]
null
8.8
8.8
9
null
CVE-2008-1382
libpng 1.0.6 through 1.0.32, 1.2.0 through 1.2.26, and 1.4.0beta01 through 1.4.0beta19 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a PNG file with zero length "unknown" chunks, which trigger an access of uninitialized memory.
[ "cpe:2.3:a:libpng:libpng:1.0.6:a:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.6:d:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.6:e:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.6:f:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.6:g:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.6:h:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.6:i:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.6:j:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.7:beta11:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.7:beta12:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.7:beta13:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.7:beta14:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.7:beta15:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.7:beta16:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.7:beta17:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.7:beta18:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.7:rc1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.7:rc2:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.8:beta1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.8:beta2:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.8:beta3:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.8:beta4:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.8:rc1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.9:beta1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.9:beta10:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.9:beta2:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.9:beta3:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.9:beta4:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.9:beta5:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.9:beta6:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.9:beta7:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.9:beta8:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.9:beta9:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.9:rc1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.9:rc2:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.10:beta1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.10:rc1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.11:beta1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.11:beta2:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.11:beta3:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.11:rc1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.12:beta1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.12:rc1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.13:*:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.14:*:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.15:*:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.15:rc1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.15:rc2:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.15:rc3:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.16:*:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.17:*:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.18:*:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.19:*:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.19:rc1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.19:rc2:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.19:rc3:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.19:rc5:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.20:*:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.21:*:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.21:rc1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.21:rc2:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.22:*:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.22:rc1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.23:*:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.23:rc1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.23:rc2:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.23:rc3:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.23:rc4:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.23:rc5:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.24:*:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.24:rc1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.25:*:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.25:rc1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.25:rc2:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.26:*:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.27:*:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.27:rc1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.27:rc2:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.27:rc3:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.27:rc4:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.27:rc5:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.27:rc6:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.28:*:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.28:rc2:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.28:rc3:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.28:rc4:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.28:rc5:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.28:rc6:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.29:*:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.29:beta1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.29:rc1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.29:rc2:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.29:rc3:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.30:*:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.30:rc1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.31:*:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.31:rc01:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.32:*:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.0:beta4:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.0:beta5:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.1:beta1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.1:beta2:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.1:beta3:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.1:beta4:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.1:rc1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.1:rc2:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.2:beta1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.2:beta2:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.2:beta3:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.2:beta4:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.2:beta5:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.2:beta6:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.2:rc1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.3:rc1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.3:rc2:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.3:rc3:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.3:rc4:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.3:rc5:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.3:rc6:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.4:beta1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.4:beta2:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.4:beta3:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.4:rc1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.5:beta1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.5:beta2:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.5:rc1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.5:rc2:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.5:rc3:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.6:beta1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.6:beta2:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.6:beta3:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.6:beta4:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.6:rc1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.6:rc2:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.6:rc3:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.6:rc4:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.6:rc5:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.7:beta1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.7:beta2:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.8:beta1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.8:beta2:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.8:beta3:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.8:beta4:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.8:beta5:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.8:rc1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.8:rc2:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.8:rc3:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.8:rc4:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.8:rc5:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.9:beta1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.9:beta10:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.9:beta2:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.9:beta3:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.9:beta4:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.9:beta5:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.9:beta6:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.9:beta7:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.9:beta8:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.9:beta9:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.9:rc1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.10:beta1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.10:beta2:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.10:beta3:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.10:beta4:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.10:beta5:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.10:beta6:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.10:beta7:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.10:rc1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.10:rc2:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.10:rc3:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.11:beta1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.11:beta2:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.11:beta3:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.11:beta4:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.11:rc1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.11:rc2:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.11:rc3:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.11:rc5:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.13:beta1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.13:rc1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.13:rc2:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.14:beta1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.14:beta2:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.14:rc1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.15:beta1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.15:beta2:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.15:beta3:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.15:beta4:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.15:beta5:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.15:beta6:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.15:rc1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.15:rc2:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.15:rc3:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.15:rc4:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.15:rc5:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.16:beta1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.16:beta2:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.16:rc1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.17:beta1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.17:beta2:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.17:rc1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.17:rc2:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.17:rc3:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.17:rc4:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.19:beta1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.19:beta10:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.19:beta11:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.19:beta12:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.19:beta13:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.19:beta14:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.19:beta15:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.19:beta16:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.19:beta17:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.19:beta18:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.19:beta19:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.19:beta2:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.19:beta20:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.19:beta21:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.19:beta22:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.19:beta23:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.19:beta24:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.19:beta25:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.19:beta26:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.19:beta27:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.19:beta28:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.19:beta29:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.19:beta3:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.19:beta30:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.19:beta31:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.19:beta4:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.19:beta5:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.19:beta6:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.19:beta7:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.19:beta8:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.19:beta9:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.19:rc1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.19:rc2:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.19:rc3:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.19:rc4:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.19:rc5:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.19:rc6:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.20:beta01:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.20:beta02:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.20:beta03:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.20:beta04:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.20:rc1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.20:rc2:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.20:rc3:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.20:rc4:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.20:rc5:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.20:rc6:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.21:rc3:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.22:beta1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.22:beta2:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.22:beta2-1.2.21:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.22:beta3:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.22:beta3-1.2.21:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.22:beta4:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.22:beta4-1.2.21:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.22:rc1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.22:rc1-1.2.21:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.23:beta01:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.23:beta02:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.23:beta03:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.23:beta04:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.23:beta05:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.23:rc01:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.24:beta01:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.24:beta02:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.24:beta03:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.24:rc01:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.25:beta01:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.25:beta02:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.25:beta03:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.25:beta04:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.25:beta05:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.25:beta06:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.25:rc01:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.25:rc02:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.26:beta01:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.26:beta02:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.26:beta03:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.26:beta04:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.26:beta05:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.26:beta06:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.26:rc01:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.4:beta1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.4:beta10:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.4:beta11:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.4:beta12:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.4:beta13:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.4:beta14:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.4:beta15:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.4:beta16:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.4:beta17:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.4:beta18:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.4:beta19:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.4:beta2:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.4:beta3:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.4:beta4:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.4:beta5:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.4:beta6:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.4:beta7:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.4:beta8:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.4:beta9:*:*:*:*:*:*" ]
null
null
null
7.5
null
GHSA-99jx-6342-9vjm
Belong Software Site Builder 0.1 beta allows remote attackers to bypass intended access restrictions and perform administrative actions via a direct request to admin/home.php.
[]
null
null
null
null
null
GHSA-wh76-4mjv-gqjw
The Websense V10000 appliance before 1.0.1 allows remote attackers to cause a denial of service (intermittent LDAP authentication outage) via a login attempt with an incorrect password.
[]
null
null
null
null
null
CVE-2020-15423
This vulnerability allows remote attackers to execute arbitrary code on affected installations of CentOS Web Panel cwp-e17.0.9.8.923. Authentication is not required to exploit this vulnerability. The specific flaw exists within ajax_mod_security.php. When parsing the dominio parameter, the process does not properly validate a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-9732.
[ "cpe:2.3:a:control-webpanel:webpanel:0.9.8.923:*:*:*:*:*:*:*" ]
null
null
9.8
null
null
GHSA-5993-2g85-9fjv
The xenmem_add_to_physmap_one function in arch/arm/mm.c in Xen 4.5.x, 4.4.x, and earlier does not limit the number of printk console messages when reporting a failure to retrieve a reference on a foreign page, which allows remote domains to cause a denial of service by leveraging permissions to map the memory of a foreign guest.
[]
null
null
null
null
null
CVE-2022-22793
Cybonet - PineApp Mail Relay Local File Inclusion
Cybonet - PineApp Mail Relay Local File Inclusion. Attacker can send a request to : /manage/mailpolicymtm/log/eml_viewer/email.content.body.php?filesystem_path=ENCDODED PATH and by doing that, the attacker can read Local Files inside the server.
[ "cpe:2.3:a:cybonet:pineapp_mail_secure:-:*:*:*:*:*:*:*" ]
null
6.1
null
null
null
GHSA-7qjr-qph2-rjqv
Cross-site scripting (XSS) vulnerability in unspecified administration pages in the Password Policy module 6.x-1.x before 6.x-1.11 and 7.x-1.x before 7.x-1.11 for Drupal, when a site has a policy that uses the username constraint, allows remote attackers to inject arbitrary web script or HTML via a crafted username that is imported from an external source.
[]
null
null
null
null
null
CVE-2000-0507
Imate Webmail Server 2.5 allows remote attackers to cause a denial of service via a long HELO command.
[ "cpe:2.3:a:concatus:imate_webmail_server:2.5:*:*:*:*:*:*:*" ]
null
null
null
5
null
CVE-2013-1667
The rehash mechanism in Perl 5.8.2 through 5.16.x allows context-dependent attackers to cause a denial of service (memory consumption and crash) via a crafted hash key.
[ "cpe:2.3:a:perl:perl:5.8.2:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.8.3:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.8.4:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.8.5:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.8.6:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.8.7:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.8.8:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.8.9:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.8.10:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.10:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.10.0:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.10.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.10.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.10.1:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.10.1:rc1:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.10.1:rc2:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.11.0:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.11.1:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.11.2:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.11.3:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.11.4:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.11.5:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.12.0:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.12.0:rc0:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.12.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.12.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.12.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.12.0:rc4:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.12.0:rc5:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.12.1:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.12.1:rc1:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.12.1:rc2:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.12.2:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.12.2:rc1:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.12.3:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.12.3:rc1:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.12.3:rc2:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.12.3:rc3:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.12.4:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.13.0:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.13.1:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.13.2:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.13.3:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.13.4:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.13.5:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.13.6:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.13.7:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.13.8:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.13.9:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.13.10:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.13.11:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.14.0:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.14.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.14.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.14.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.14.1:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.14.2:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.14.3:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.16.0:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.16.1:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.16.2:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2022-45768
Command Injection vulnerability in Edimax Technology Co., Ltd. Wireless Router N300 Firmware BR428nS v3 allows attacker to execute arbitrary code via the formWlanMP function.
[ "cpe:2.3:o:edimax:br-6428ns_firmware:1.20:*:*:*:*:*:*:*", "cpe:2.3:h:edimax:br-6428ns:v3:*:*:*:*:*:*:*" ]
null
8.8
null
null
null
GHSA-wq58-8783-f3c6
A vulnerability has been identified in Tecnomatix Plant Simulation V2201 (All versions < V2201.0009), Tecnomatix Plant Simulation V2302 (All versions < V2302.0003). The affected application contains an out of bounds write past the end of an allocated buffer while parsing a specially crafted SPP file. This could allow an attacker to execute code in the context of the current process.
[]
null
7.8
null
null
null
CVE-2004-0393
Format string vulnerability in the msg function for rlpr daemon (rlprd) 2.0.4 allows remote attackers to execute arbitrary code via format string specifiers in a buffer that can not be resolved, which is provided to the syslog function.
[ "cpe:2.3:a:rlpr:rlpr:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:rlpr:rlpr:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:rlpr:rlpr:2.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:rlpr:rlpr:2.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:rlpr:rlpr:2.0.4:*:*:*:*:*:*:*" ]
null
null
null
10
null
CVE-2021-37443
NCH IVM Attendant v5.12 and earlier allows path traversal via the logdeleteselected check0 parameter for file deletion.
[ "cpe:2.3:a:nchsoftware:ivm_attendant:*:*:*:*:*:*:*:*" ]
null
8.1
null
5.5
null
CVE-2017-14459
An exploitable OS Command Injection vulnerability exists in the Telnet, SSH, and console login functionality of Moxa AWK-3131A Industrial IEEE 802.11a/b/g/n wireless AP/bridge/client in firmware versions 1.4 to 1.7 (current). An attacker can inject commands via the username parameter of several services (SSH, Telnet, console), resulting in remote, unauthenticated, root-level operating system command execution.
[ "cpe:2.3:o:moxa:awk-3131a_firmware:1.4:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:awk-3131a_firmware:1.5:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:awk-3131a_firmware:1.6:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:awk-3131a_firmware:1.7:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:awk-3131a:-:*:*:*:*:*:*:*" ]
null
null
10
null
null
GHSA-3q59-83xj-cggf
A remote unauthorized read access to files vulnerability was discovered in Aruba Instant version(s): 6.4.x.x: 6.4.4.8-4.2.4.18 and below; Aruba Instant 6.5.x.x: 6.5.4.19 and below; Aruba Instant 8.5.x.x: 8.5.0.12 and below; Aruba Instant 8.6.x.x: 8.6.0.11 and below; Aruba Instant 8.7.x.x: 8.7.1.3 and below; Aruba Instant 8.8.x.x: 8.8.0.0 and below. Aruba has released patches for Aruba Instant (IAP) that address this security vulnerability.
[]
null
6.5
null
null
null
GHSA-66vh-4g4j-7x2q
The administrative interface in the embedded web server on the BreakingPoint Storm appliance before 3.0 does not require authentication for the gwt/BugReport script, which allows remote attackers to obtain sensitive information by downloading a .tgz file.
[]
null
null
null
null
null
GHSA-x6xq-whh3-gg32
Apollo Router Coprocessors may cause Denial-of-Service when handling request bodies
ImpactInstances of the Apollo Router using either of the following may be impacted by a denial-of-service vulnerability.External Coprocessing with specific configurations; orNative Rust Plugins accessing the Router request body in the RouterService layerRouter customizations using Rhai scripts are **not** impacted.When using External Coprocessing:Instances of the Apollo Router running versions >=1.21.0 and <1.52.1 are impacted by a denial-of-service vulnerability if **all** of the following are true:Router has been configured to support External Coprocessing.Router has been configured to send request bodies to coprocessors. This is a non-default configuration and must be configured intentionally by administrators.You can identify if you are impacted by reviewing your router's configuration YAML for the following config:External Coprocessing was initially made available as an experimental feature with [Router version 1.21.0](https://github.com/apollographql/router/releases/tag/v1.21.0) on 2023-06-20 and was made generally available with [Router version 1.38.0](https://github.com/apollographql/router/releases/tag/v1.38.0) on 2024-01-19. More information about the Router’s [External Coprocessing feature is available here](https://www.apollographql.com/docs/router/customizations/coprocessor).When using Native Rust Plugins:Instances of the Apollo Router running versions >=1.7.0 and <1.52.1 are impacted by a denial-of-service vulnerability if **all** of the following are true:Router has been configured to use a custom-developed Native Rust PluginThe plugin accesses `Request.router_request` in the `RouterService` layerYou are accumulating the body from `Request.router_request` into memoryTo use a plugin, you need to be running a customized Router binary. Additionally, you need to have a `plugins` section with at least one plugin defined in your Router’s configuration YAML. That plugin would also need to define a custom `router_service` method.You can check for a defined plugin by reviewing for the following in your Router’s configuration YAML:You can check for a custom `router_service` method in a plugin, by reviewing for the following function signature in your plugin’s source:More information about the Router’s [Native Rust Plugin feature is available here](https://www.apollographql.com/docs/router/customizations/native).Impact DetailIf using an impacted configuration, the Router will load entire HTTP request bodies into memory without respect to other HTTP request size-limiting configurations like `limits.http_max_request_bytes`. This can cause the Router to be out-of-memory (OOM) terminated if a sufficiently large request is sent to the Router.By default, the Router sets `limits.http_max_request_bytes` to 2 MB. More information about the Router’s [request limiting features is available here](https://www.apollographql.com/docs/router/configuration/overview/#request-limits).Patches[Apollo Router 1.52.1](https://github.com/apollographql/router/releases/tag/v1.52.1)If you have an impacted configuration as defined above, please upgrade to at least Apollo Router 1.52.1.WorkaroundsIf you cannot upgrade, you can mitigate the denial-of-service opportunity impacting External Coprocessors by setting the `coprocessor.router.request.body` configuration option to `false`. Please note that changing this configuration option will change the information sent to any coprocessors you have configured and may impact functionality implemented by those coprocessors.If you have developed a Native Rust Plugin and cannot upgrade, you can update your plugin to either not accumulate the request body or enforce a maximum body size limit.You can also mitigate this issue by limiting HTTP body payload sizes prior to the Router (e.g., in a proxy or web application firewall appliance).References[Apollo Router 1.52.1 Release Notes](https://github.com/apollographql/router/releases/tag/v1.52.1) [External Coprocessing documentation](https://www.apollographql.com/docs/router/customizations/coprocessor) [HTTP Request Limiting documentation](https://www.apollographql.com/docs/router/configuration/overview/#request-limits) [Native Rust Plugin documentation](https://www.apollographql.com/docs/router/customizations/native)
[]
8.7
7.5
null
null
null
CVE-2015-8005
MediaWiki before 1.23.11, 1.24.x before 1.24.4, and 1.25.x before 1.25.3 uses the thumbnail ImageMagick command line argument, which allows remote attackers to obtain the installation path by reading the metadata of a PNG thumbnail file.
[ "cpe:2.3:a:mediawiki:mediawiki:*:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.24.0:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.24.1:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.24.2:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.24.3:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.25.0:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.25.1:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.25.2:*:*:*:*:*:*:*" ]
null
null
null
5
null
GHSA-m84v-pjjq-fhh8
Advantech WISE-PaaS/RMM, Versions 3.3.29 and prior. XXE vulnerabilities exist that may allow disclosure of sensitive data.
[]
null
7.5
null
null
null
CVE-2006-3538
Multiple cross-site scripting (XSS) vulnerabilities in demo.php in BeatificFaith Eprayer Alpha allow remote attackers to inject arbitrary web script or HTML via the SRC attribute of a SCRIPT element in the (1) "Your name" field and (2) "Enter Prayer Request here" field.
[ "cpe:2.3:a:beatificfaith:eprayer:alpha:*:*:*:*:*:*:*" ]
null
null
null
5.8
null
CVE-2020-5967
NVIDIA Linux GPU Display Driver, all versions, contains a vulnerability in the UVM driver, in which a race condition may lead to a denial of service.
[ "cpe:2.3:o:nvidia:quadro_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:nvidia:quadro:-:*:*:*:*:*:*:*", "cpe:2.3:o:nvidia:tesla_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:nvidia:tesla:-:*:*:*:*:*:*:*", "cpe:2.3:o:nvidia:geforce_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:nvidia:geforce:-:*:*:*:*:*:*:*", "cpe:2.3:o:nvidia:nvs_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:nvidia:nvs:-:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*" ]
null
4.7
null
1.9
null
RHSA-2018:1350
Red Hat Security Advisory: kernel security and bug fix update
Kernel: error in exception handling leads to DoS
[ "cpe:/o:redhat:rhel_aus:6.5::server" ]
null
null
6.5
null
null
CVE-2024-38320
IBM Storage Protect for Virtual Environments: Data Protection for VMware information disclosure
IBM Storage Protect for Virtual Environments: Data Protection for VMware and Storage Protect Backup-Archive Client 8.1.0.0 through 8.1.23.0 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information.
[ "cpe:2.3:a:ibm:storage_protect_for_virtual_enviornments_data_protection_for_vmware:8.1.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:storage_protect_for_virtual_enviornments_data_protection_for_vmware:8.1.23.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:storage_protect_backup_archive_client:8.1.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:storage_protect_backup_archive_client:8.1.23.0:*:*:*:*:*:*:*" ]
null
5.9
null
null
null
CVE-2000-0386
FileMaker Pro 5 Web Companion allows remote attackers to send anonymous or forged email.
[ "cpe:2.3:a:filemaker:filemaker:5.0:*:pro:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2025-7644
Pixel Gallery Addons for Elementor – Easy Grid, Creative Gallery, Drag and Drop Grid, Custom Grid Layout, Portfolio Gallery <= 1.6.7 - Authenticated (Contributor+) Stored Cross-Site Scripting
The Pixel Gallery Addons for Elementor – Easy Grid, Creative Gallery, Drag and Drop Grid, Custom Grid Layout, Portfolio Gallery plugin for WordPress is vulnerable to Stored Cross-Site Scripting via URLs in all widgets in all versions up to, and including, 1.6.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
6.4
null
null
null
CVE-2013-3060
The web console in Apache ActiveMQ before 5.8.0 does not require authentication, which allows remote attackers to obtain sensitive information or cause a denial of service via HTTP requests.
[ "cpe:2.3:a:apache:activemq:*:*:*:*:*:*:*:*", "cpe:2.3:a:apache:activemq:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:activemq:4.0:m4:*:*:*:*:*:*", "cpe:2.3:a:apache:activemq:4.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:apache:activemq:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:activemq:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:apache:activemq:4.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:activemq:4.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:activemq:5.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:activemq:5.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:activemq:5.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:activemq:5.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:activemq:5.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:activemq:5.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:apache:activemq:5.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:activemq:5.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:activemq:5.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:apache:activemq:5.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:activemq:5.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:activemq:5.6.0:*:*:*:*:*:*:*" ]
null
null
null
6.4
null
CVE-2016-9840
inftrees.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact by leveraging improper pointer arithmetic.
[ "cpe:2.3:a:zlib:zlib:*:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "cpe:2.3:a:oracle:database_server:18c:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update161:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update151:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update161:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update151:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", "cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*", "cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*" ]
null
8.8
null
6.8
null