id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
189k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
patch_commit_url
stringlengths
36
232
CVE-2022-46059
AeroCMS v0.0.1 is vulnerable to Cross Site Request Forgery (CSRF).
[ "cpe:2.3:a:aerocms_project:aerocms:0.0.1:*:*:*:*:*:*:*" ]
null
6.5
null
null
null
GHSA-qjqj-4cq6-6f2f
A remote code execution vulnerability was found in Shim. The Shim boot support trusts attacker-controlled values when parsing an HTTP response. This flaw allows an attacker to craft a specific malicious HTTP request, leading to a completely controlled out-of-bounds write primitive and complete system compromise.
[]
null
8.3
null
null
null
GHSA-42m5-rf78-8h9x
Potential Cross-Site Scripting in ArcSight Logger versions prior to 7.3.0
[]
null
6.1
null
null
null
CVE-2021-42365
Asgaros Forums <= 1.15.13 Authenticated Stored XSS
The Asgaros Forums WordPress plugin is vulnerable to Stored Cross-Site Scripting due to insufficient escaping via the name parameter found in the ~/admin/tables/admin-structure-table.php file which allowed attackers with administrative user access to inject arbitrary web scripts, in versions up to and including 1.15.13. This affects multi-site installations where unfiltered_html is disabled for administrators, and sites where unfiltered_html is disabled.
[ "cpe:2.3:a:asgaros:asgaros_forum:*:*:*:*:*:wordpress:*:*" ]
null
4.8
null
null
null
CVE-2025-2765
CarlinKit CPC200-CCPA Wireless Hotspot Hard-Coded Credentials Authentication Bypass Vulnerability
CarlinKit CPC200-CCPA Wireless Hotspot Hard-Coded Credentials Authentication Bypass Vulnerability. This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of CarlinKit CPC200-CCPA devices. Authentication is not required to exploit this vulnerability. The specific flaw exists within the configuration of the wireless hotspot. The issue results from the use of hard-coded credentials. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-24349.
[]
null
null
7.6
null
null
CVE-2023-40009
WordPress WP Pipes Plugin <= 1.4.0 is vulnerable to Cross Site Request Forgery (CSRF)
Cross-Site Request Forgery (CSRF) vulnerability in ThimPress WP Pipes plugin <= 1.4.0 versions.
[ "cpe:2.3:a:thimpress:wp_pipes:*:*:*:*:*:wordpress:*:*" ]
null
5.4
null
null
null
CVE-2019-0204
A specifically crafted Docker image running under the root user can overwrite the init helper binary of the container runtime and/or the command executor in Apache Mesos versions pre-1.4.x, 1.4.0 to 1.4.2, 1.5.0 to 1.5.2, 1.6.0 to 1.6.1, and 1.7.0 to 1.7.1. A malicious actor can therefore gain root-level code execution on the host.
[ "cpe:2.3:a:apache:mesos:*:*:*:*:*:*:*:*", "cpe:2.3:a:apache:mesos:1.8.0:dev:*:*:*:*:*:*", "cpe:2.3:a:redhat:fuse:7.5.0:*:*:*:*:*:*:*" ]
null
7.8
null
9.3
null
GHSA-m7qq-ch2w-w47w
Unspecified vulnerability in the update feature in Toolbar Uninstaller 1.0.2 allows remote attackers to force the download and execution of arbitrary files via attack vectors related to a "malformed update url and a malformed update website."
[]
null
null
null
null
null
CVE-2018-20987
The newsletters-lite plugin before 4.6.8.6 for WordPress has PHP object injection.
[ "cpe:2.3:a:tribulant:newsletters:*:*:*:*:*:wordpress:*:*" ]
null
null
9.8
7.5
null
GHSA-wm4r-97wr-6vw2
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Mark kStats Reloaded allows Reflected XSS. This issue affects kStats Reloaded: from n/a through 0.7.4.
[]
null
7.1
null
null
null
GHSA-h98x-wq59-p366
Adobe Bridge versions 13.0.4 (and earlier) and 14.0.0 (and earlier) are affected by an Access of Uninitialized Pointer vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[]
null
3.3
null
null
null
GHSA-v45r-rj5x-hpg2
Cleartext Transmission of Sensitive Information in Apache CXF
The SymmetricBinding in Apache CXF before 2.6.13 and 2.7.x before 2.7.10, when EncryptBeforeSigning is enabled and the UsernameToken policy is set to an EncryptedSupportingToken, transmits the UsernameToken in cleartext, which allows remote attackers to obtain sensitive information by sniffing the network.
[]
null
null
null
null
null
GHSA-c5qm-hvv2-h2gp
simple-php-captcha before commit 9d65a945029c7be7bb6bc893759e74c5636be694 allows remote attackers to automatically generate the captcha response by running the same code on the client-side.
[]
null
null
5.3
null
null
GHSA-rg93-gvp9-mv6g
The WebLaunch functionality of Cisco AnyConnect Secure Mobility Client Software contains a vulnerability that could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the affected software. The vulnerability is due to insufficient input validation of some parameters that are passed to the WebLaunch function of the affected software. An attacker could exploit this vulnerability by convincing a user to access a malicious link or by intercepting a user request and injecting malicious code into the request. Cisco Bug IDs: CSCvf12055. Known Affected Releases: 98.89(40).
[]
null
null
6.1
null
null
CVE-2024-21372
Windows OLE Remote Code Execution Vulnerability
Windows OLE Remote Code Execution Vulnerability
[ "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*" ]
null
8.8
null
null
null
GHSA-x4wg-qwmf-2p36
Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in WP Darko Responsive Pricing Table plugin <= 5.1.6 versions.
[]
null
5.4
null
null
null
GHSA-jw5r-h8gx-vxc9
IBM QRadar 7.2 and 7.3 does not require that users should have strong passwords by default, which makes it easier for attackers to compromise user accounts. IBM X-Force ID: 119783.
[]
null
null
7.5
null
null
GHSA-g75v-mhrr-qmm9
In the Linux kernel, the following vulnerability has been resolved:tcp_bpf: fix return value of tcp_bpf_sendmsg()When we cork messages in psock->cork, the last message triggers the flushing will result in sending a sk_msg larger than the current message size. In this case, in tcp_bpf_send_verdict(), 'copied' becomes negative at least in the following case:468 case __SK_DROP: 469 default: 470 sk_msg_free_partial(sk, msg, tosend); 471 sk_msg_apply_bytes(psock, tosend); 472 *copied -= (tosend + delta); // <==== HERE 473 return -EACCES;Therefore, it could lead to the following BUG with a proper value of 'copied' (thanks to syzbot). We should not use negative 'copied' as a return value here.------------[ cut here ]------------ kernel BUG at net/socket.c:733! Internal error: Oops - BUG: 00000000f2000800 [#1] PREEMPT SMP Modules linked in: CPU: 0 UID: 0 PID: 3265 Comm: syz-executor510 Not tainted 6.11.0-rc3-syzkaller-00060-gd07b43284ab3 #0 Hardware name: linux,dummy-virt (DT) pstate: 61400009 (nZCv daif +PAN -UAO -TCO +DIT -SSBS BTYPE=--) pc : sock_sendmsg_nosec net/socket.c:733 [inline] pc : sock_sendmsg_nosec net/socket.c:728 [inline] pc : __sock_sendmsg+0x5c/0x60 net/socket.c:745 lr : sock_sendmsg_nosec net/socket.c:730 [inline] lr : __sock_sendmsg+0x54/0x60 net/socket.c:745 sp : ffff800088ea3b30 x29: ffff800088ea3b30 x28: fbf00000062bc900 x27: 0000000000000000 x26: ffff800088ea3bc0 x25: ffff800088ea3bc0 x24: 0000000000000000 x23: f9f00000048dc000 x22: 0000000000000000 x21: ffff800088ea3d90 x20: f9f00000048dc000 x19: ffff800088ea3d90 x18: 0000000000000001 x17: 0000000000000000 x16: 0000000000000000 x15: 000000002002ffaf x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000 x11: 0000000000000000 x10: ffff8000815849c0 x9 : ffff8000815b49c0 x8 : 0000000000000000 x7 : 000000000000003f x6 : 0000000000000000 x5 : 00000000000007e0 x4 : fff07ffffd239000 x3 : fbf00000062bc900 x2 : 0000000000000000 x1 : 0000000000000000 x0 : 00000000fffffdef Call trace: sock_sendmsg_nosec net/socket.c:733 [inline] __sock_sendmsg+0x5c/0x60 net/socket.c:745 ____sys_sendmsg+0x274/0x2ac net/socket.c:2597 ___sys_sendmsg+0xac/0x100 net/socket.c:2651 __sys_sendmsg+0x84/0xe0 net/socket.c:2680 __do_sys_sendmsg net/socket.c:2689 [inline] __se_sys_sendmsg net/socket.c:2687 [inline] __arm64_sys_sendmsg+0x24/0x30 net/socket.c:2687 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x48/0x110 arch/arm64/kernel/syscall.c:49 el0_svc_common.constprop.0+0x40/0xe0 arch/arm64/kernel/syscall.c:132 do_el0_svc+0x1c/0x28 arch/arm64/kernel/syscall.c:151 el0_svc+0x34/0xec arch/arm64/kernel/entry-common.c:712 el0t_64_sync_handler+0x100/0x12c arch/arm64/kernel/entry-common.c:730 el0t_64_sync+0x19c/0x1a0 arch/arm64/kernel/entry.S:598 Code: f9404463 d63f0060 3108441f 54fffe81 (d4210000) ---[ end trace 0000000000000000 ]---
[]
null
5.5
null
null
null
GHSA-8f93-437m-m53h
SQL injection vulnerability in Cacti 0.8.6i and earlier, when register_argc_argv is enabled, allows remote attackers to execute arbitrary SQL commands via the (1) second or (2) third arguments to cmd.php. NOTE: this issue can be leveraged to execute arbitrary commands since the SQL query results are later used in the polling_items array and popen function.
[]
null
null
null
null
null
CVE-2013-10044
OpenEMR ≤ 4.1.1 SQL Injection Privilege Escalation and RCE
An authenticated SQL injection vulnerability exists in OpenEMR ≤ 4.1.1 Patch 14 that allows a low-privileged attacker to extract administrator credentials and subsequently escalate privileges. Once elevated, the attacker can exploit an unrestricted file upload flaw to achieve remote code execution, resulting in full compromise of the application and its host system.
[]
8.7
null
null
null
null
GHSA-3jfr-j9w4-px6x
In ImageMagick before 7.0.8-25, a memory leak exists in WritePSDChannel in coders/psd.c.
[]
null
7.5
null
null
null
CVE-2023-32981
An arbitrary file write vulnerability in Jenkins Pipeline Utility Steps Plugin 2.15.2 and earlier allows attackers able to provide crafted archives as parameters to create or replace arbitrary files on the agent file system with attacker-specified content.
[ "cpe:2.3:a:jenkins:pipeline_utility_steps:*:*:*:*:*:jenkins:*:*" ]
null
8.8
null
null
null
CVE-2023-37900
Crossplane vulnerable to denial of service from large image
Crossplane is a framework for building cloud native control planes without needing to write code. In versions prior to 1.11.5, 1.12.3, and 1.13.0, a high-privileged user could create a Package referencing an arbitrarily large image containing that Crossplane would then parse, possibly resulting in exhausting all the available memory and therefore in the container being OOMKilled. The impact is limited due to the high privileges required to be able to create the Package and the eventually consistency nature of controller. This issue is fixed in versions 1.11.5, 1.12.3, and 1.13.0.
[ "cpe:2.3:a:cncf:crossplane:*:*:*:*:*:*:*:*" ]
null
3.4
null
null
null
GHSA-7m84-rrgp-r594
Adobe Flash Player before 10.3.183.86 and 11.x before 11.7.700.202 on Windows and Mac OS X, before 10.3.183.86 and 11.x before 11.2.202.285 on Linux, before 11.1.111.54 on Android 2.x and 3.x, and before 11.1.115.58 on Android 4.x; Adobe AIR before 3.7.0.1860; and Adobe AIR SDK & Compiler before 3.7.0.1860 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-2728, CVE-2013-3324, CVE-2013-3325, CVE-2013-3326, CVE-2013-3327, CVE-2013-3328, CVE-2013-3329, CVE-2013-3330, CVE-2013-3332, CVE-2013-3333, CVE-2013-3334, and CVE-2013-3335.
[]
null
null
null
null
null
GHSA-vcrj-h233-mj6m
The AXN-NET Ethernet module accessory 3.04 for the Accuenergy Acuvim II allows remote attackers to discover passwords and modify settings via vectors involving JavaScript.
[]
null
null
null
null
null
GHSA-7w34-327x-439v
Unspecified vulnerability in the Drag Drop Mass Upload (ameos_dragndropupload) extension 2.0.2 and earlier for TYPO3 allows remote attackers to upload arbitrary files via unknown vectors.
[]
null
null
null
null
null
CVE-2021-26589
A potential security vulnerability has been identified in HPE Superdome Flex Servers. The vulnerability could be remotely exploited to allow Cross Site Scripting (XSS) because the Session Cookie is missing an HttpOnly Attribute. HPE has provided a firmware update to resolve the vulnerability in HPE Superdome Flex Servers.
[ "cpe:2.3:o:hpe:superdome_flex_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hpe:superdome_flex:-:*:*:*:*:*:*:*", "cpe:2.3:o:hpe:superdome_flex_280_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hpe:superdome_flex_280:-:*:*:*:*:*:*:*" ]
null
6.1
null
4.3
null
CVE-2025-0223
IObit Protected Folder IOCTL IURegistryFilter.sys 0x8001E010 null pointer dereference
A vulnerability was found in IObit Protected Folder up to 13.6.0.5. It has been classified as problematic. Affected is the function 0x8001E000/0x8001E00C/0x8001E004/0x8001E010 in the library IURegistryFilter.sys of the component IOCTL Handler. The manipulation leads to null pointer dereference. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
[]
6.8
5.5
5.5
4.6
null
CVE-2021-33945
RICOH Printer series SP products 320DN, SP 325DNw, SP 320SN, SP 320SFN, SP 325SNw, SP 325SFNw, SP 330SN, Aficio SP 3500SF, SP 221S, SP 220SNw, SP 221SNw, SP 221SF, SP 220SFNw, SP 221SFNw v1.06 were discovered to contain a stack buffer overflow in the file /etc/wpa_supplicant.conf. This vulnerability allows attackers to cause a Denial of Service (DoS) via crafted overflow data.
[ "cpe:2.3:o:ricoh:sp_320dn_firmware:1.06:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:sp_320dn:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:sp_325dnw_firmware:1.06:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:sp_325dnw:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:sp_320sn_firmware:1.06:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:sp_320sn:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:sp_320sfn_firmware:1.06:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:sp_320sfn:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:sp_325snw_firmware:1.06:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:sp_325snw:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:sp_325sfnw_firmware:1.06:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:sp_325sfnw:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:sp_330sn_firmware:1.06:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:sp_330sn:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:aficio_sp_3500sf_firmware:1.06:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:aficio_sp_3500sf:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:sp_221s_firmware:1.06:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:sp_221s:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:sp_220snw_firmware:1.06:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:sp_220snw:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:sp_221snw_firmware:1.06:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:sp_221snw:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:sp_221sf_firmware:1.06:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:sp_221sf:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:sp_220sfnw_firmware:1.06:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:sp_220sfnw:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:sp_221sfnw_firmware:1.06:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:sp_221sfnw:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:m_c2000_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:m_c2000:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:m_c250fwb_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:m_c250fwb:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:m_c250fw_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:m_c250fw:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:sp_c260sfnw_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:sp_c260sfnw:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:sp_c262sfnw_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:sp_c262sfnw:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:sp_c261sfnw_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:sp_c261sfnw:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:sp_c250sf_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:sp_c250sf:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:sp_c252sf_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:sp_c252sf:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:p_c300w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:p_c300w:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:p_c301w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:p_c301w:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:sp_c260dnw_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:sp_c260dnw:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:sp_c262dnw_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:sp_c262dnw:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:sp_c261dnw_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:sp_c261dnw:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:sp_c250dn_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:sp_c250dn:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:sp_c252dn_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:sp_c252dn:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:m_320_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:m_320:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:m_320fb_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:m_320fb:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:m_320f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:m_320f:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:m_2700_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:m_2700:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:m_2701_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:m_2701:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:sp_330sn_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:sp_330sfn_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:sp_330sfn:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:sp_3710sf_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:sp_3710sf:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:sp_220snw_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:sp_221snw_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:sp_220sfnw_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:sp_221sfnw_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:sp_277snwx_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:sp_277snwx:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:sp_277sfnwx_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:sp_277sfnwx:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:sp_325snw_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:sp_325sfnw_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:sp_377snwx_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:sp_377snwx:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:sp_377sfnwx_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:sp_377sfnwx:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:sp_212sfnw_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:sp_212sfnw:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:sp_212sfw_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:sp_212sfw:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:sp_212snw_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:sp_212snw:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:sp_212suw_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:sp_212suw:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:sp_213sfnw_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:sp_213sfnw:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:sp_213sfw_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:sp_213sfw:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:sp_213snw_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:sp_213snw:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:sp_213suw_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:sp_213suw:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:sp_311sfnw_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:sp_311sfnw:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:sp_310sfnw_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:sp_310sfnw:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:sp_312sfnw_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:sp_312sfnw:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:p_310_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:p_310:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:p_311_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:p_311:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:sp_330dn_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:sp_330dn:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:sp_3710dn_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:sp_3710dn:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:sp_220nw_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:sp_220nw:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:sp_221nw_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:sp_221nw:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:sp_277nwx_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:sp_277nwx:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:sp_325dnw_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:sp_377dnwx_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:sp_377dnwx:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:sp_212nw_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:sp_212nw:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:sp_212w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:sp_212w:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:sp_213nw_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:sp_213nw:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:sp_213w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:sp_213w:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:sp_311dnw_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:sp_311dnw:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:sp_310dnw_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:sp_310dnw:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:sp_312dnw_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:sp_312dnw:-:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
null
RHSA-2025:12525
Red Hat Security Advisory: kernel-rt security update
kernel: writeback: avoid use-after-free after removing device kernel: media: uvcvideo: Fix double free in error path kernel: wifi: iwlwifi: limit printed string from FW file kernel: ext4: avoid journaling sb update on error if journal is destroying kernel: ext4: fix off-by-one error in do_split kernel: mm/huge_memory: fix dereferencing invalid pmd migration entry
[ "cpe:/a:redhat:rhel_e4s:9.0::nfv", "cpe:/a:redhat:rhel_e4s:9.0::realtime" ]
null
4.7
null
null
null
GHSA-2xg4-3vp8-p43f
upload_template() in system/changeskin.php in DocCms 2016.5.12 allows remote attackers to execute arbitrary PHP code via a template file.
[]
null
null
9.8
null
null
CVE-2013-6171
checkpassword-reply in Dovecot before 2.2.7 performs setuid operations to a user who is authenticating, which allows local users to bypass authentication and access virtual email accounts by attaching to the process and using a restricted file descriptor to modify account information in the response to the dovecot-auth server.
[ "cpe:2.3:a:dovecot:dovecot:*:*:*:*:*:*:*:*", "cpe:2.3:a:dovecot:dovecot:2.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:dovecot:dovecot:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:dovecot:dovecot:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:dovecot:dovecot:2.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:dovecot:dovecot:2.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:dovecot:dovecot:2.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:dovecot:dovecot:2.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:dovecot:dovecot:2.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:dovecot:dovecot:2.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:dovecot:dovecot:2.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:dovecot:dovecot:2.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:dovecot:dovecot:2.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:dovecot:dovecot:2.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:dovecot:dovecot:2.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:dovecot:dovecot:2.0.13:*:*:*:*:*:*:*", "cpe:2.3:a:dovecot:dovecot:2.0.14:*:*:*:*:*:*:*", "cpe:2.3:a:dovecot:dovecot:2.0.15:*:*:*:*:*:*:*", "cpe:2.3:a:dovecot:dovecot:2.1:rc1:*:*:*:*:*:*", "cpe:2.3:a:dovecot:dovecot:2.1:rc2:*:*:*:*:*:*", "cpe:2.3:a:dovecot:dovecot:2.1:rc3:*:*:*:*:*:*", "cpe:2.3:a:dovecot:dovecot:2.1:rc5:*:*:*:*:*:*", "cpe:2.3:a:dovecot:dovecot:2.1:rc6:*:*:*:*:*:*", "cpe:2.3:a:dovecot:dovecot:2.1:rc7:*:*:*:*:*:*", "cpe:2.3:a:dovecot:dovecot:2.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:dovecot:dovecot:2.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:dovecot:dovecot:2.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:dovecot:dovecot:2.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:dovecot:dovecot:2.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:dovecot:dovecot:2.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:dovecot:dovecot:2.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:dovecot:dovecot:2.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:dovecot:dovecot:2.1.10:*:*:*:*:*:*:*", "cpe:2.3:a:dovecot:dovecot:2.1.11:*:*:*:*:*:*:*", "cpe:2.3:a:dovecot:dovecot:2.1.12:*:*:*:*:*:*:*", "cpe:2.3:a:dovecot:dovecot:2.1.13:*:*:*:*:*:*:*", "cpe:2.3:a:dovecot:dovecot:2.1.14:*:*:*:*:*:*:*", "cpe:2.3:a:dovecot:dovecot:2.1.15:*:*:*:*:*:*:*", "cpe:2.3:a:dovecot:dovecot:2.2:rc1:*:*:*:*:*:*", "cpe:2.3:a:dovecot:dovecot:2.2:rc2:*:*:*:*:*:*", "cpe:2.3:a:dovecot:dovecot:2.2:rc3:*:*:*:*:*:*", "cpe:2.3:a:dovecot:dovecot:2.2:rc4:*:*:*:*:*:*", "cpe:2.3:a:dovecot:dovecot:2.2:rc5:*:*:*:*:*:*", "cpe:2.3:a:dovecot:dovecot:2.2:rc6:*:*:*:*:*:*", "cpe:2.3:a:dovecot:dovecot:2.2:rc7:*:*:*:*:*:*", "cpe:2.3:a:dovecot:dovecot:2.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:dovecot:dovecot:2.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:dovecot:dovecot:2.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:dovecot:dovecot:2.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:dovecot:dovecot:2.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:dovecot:dovecot:2.2.5:*:*:*:*:*:*:*" ]
null
null
null
5.8
null
CVE-2020-4039
Directory Traversal Vulnerability in SUSI.AI Server
SUSI.AI is an intelligent Open Source personal assistant. SUSI.AI Server before version d27ed0f has a directory traversal vulnerability due to insufficient input validation. Any admin config and file readable by the app can be retrieved by the attacker. Furthermore, some files can also be moved or deleted.
[ "cpe:2.3:a:fossasia:susi.ai:*:*:*:*:*:*:*:*" ]
null
8.6
null
null
null
CVE-2024-33939
WordPress LMS by Masteriyo plugin <= 1.7.3 - Broken Authentication vulnerability
Authentication Bypass Using an Alternate Path or Channel vulnerability in Masteriyo Masteriyo - LMS. Unauth access to course progress.This issue affects Masteriyo - LMS: from n/a through 1.7.3.
[]
null
5.3
null
null
null
GHSA-hr7p-jmcg-rv72
The Sugar Calendar – Simple Event Management plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg & remove_query_arg without appropriate escaping on the URL in all versions up to, and including, 3.3.0. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
[]
null
6.1
null
null
null
CVE-2005-3569
INSO service in IBM DB2 Content Manager before 8.2 Fix Pack 10 on AIX allows attackers to cause a denial of service (application crash) via unknown attack vectors involving LZH files.
[ "cpe:2.3:a:ibm:db2_content_manager:8.2:*:fp1:*:*:*:*:*", "cpe:2.3:a:ibm:db2_content_manager:8.2:*:fp2:*:*:*:*:*", "cpe:2.3:a:ibm:db2_content_manager:8.2:*:fp3:*:*:*:*:*", "cpe:2.3:a:ibm:db2_content_manager:8.2:*:fp4:*:*:*:*:*", "cpe:2.3:a:ibm:db2_content_manager:8.2:*:fp5:*:*:*:*:*", "cpe:2.3:a:ibm:db2_content_manager:8.2:*:fp6:*:*:*:*:*", "cpe:2.3:a:ibm:db2_content_manager:8.2:*:fp7:*:*:*:*:*", "cpe:2.3:a:ibm:db2_content_manager:8.2:*:fp8:*:*:*:*:*", "cpe:2.3:a:ibm:db2_content_manager:8.2:*:fp9:*:*:*:*:*" ]
null
null
null
5
null
GHSA-7xpj-h3mq-wxqm
Missing Authorization vulnerability in czater Czater.pl – live chat i telefon allows Cross Site Request Forgery. This issue affects Czater.pl – live chat i telefon: from n/a through 1.0.5.
[]
null
7.1
null
null
null
GHSA-xj7w-r753-vj8v
Exposure of vSphere's CPI and CSI credentials in Rancher
ImpactA vulnerability has been identified in the way that Rancher stores vSphere's CPI (Cloud Provider Interface) and CSI (Container Storage Interface) credentials used to deploy clusters through the vSphere cloud provider. This issue leads to the vSphere CPI and CSI passwords being stored in a plaintext object inside Rancher. This vulnerability is only applicable to users that deploy clusters in vSphere environments.The exposed passwords were accessible in the following objects:Can be accessed by users that are cluster members of the provisioned clusters:When provisioning a new cluster with the vSphere cloud provider through Rancher's UI (user interface), Cluster Templates and Terraform on the object `provisioning.cattle.io` in `spec.rkeConfig.chartValues.rancher-vsphere-cpi` and `spec.rkeConfig.chartValues.rancher-vsphere-csi`.On the object `rke.cattle.io.rkecontrolplane` in `spec.chartValues.rancher-vsphere-cpi` and `spec.chartValues.rancher-vsphere-csi`.Can be accessed by users with privileged access to the clusters' infrastructure (host OS):Inside the `plan` files in the provisioned downstream clusters' filesystems.**Note:** if you believe that the vSphere credentials might have been accessed by unauthorized users, it's highly recommended to change them, after updating Rancher to a patched version.Please consult the associated [MITRE ATT&CK - Technique - Credential Access](https://attack.mitre.org/tactics/TA0006/) for further information about this category of attack.PatchesPatched versions include Rancher releases **2.8.9 and 2.9.3**.After updating your environment to one of the patched Rancher's versions, it's mandatory to execute [this script](https://github.com/rancherlabs/support-tools/tree/master/migrate-vsphere-clusters) that provides an automated way to mitigate any vulnerable leftover vSphere clusters' credentials within Rancher's local cluster. This script doesn't need to be executed in case you are installing a fresh and new environment.The script will fetch all objects in Rancher's local cluster, loops through them, if the affected vSphere charts are present, then it extracts the `username` and `password` parameters into a secret in the `fleet-default` namespace for both with the appropriate annotation to synchronize them to the downstream clusters. Finally, it updates the cluster's `chartValues` to reference those secrets rather than existing plaintext values.The script confirms on write operations, as well as backs up configurations of the cluster objects before operating so rolling back is simple.To run the script, fetch the `kubeconfig` for your local cluster and run with `KUBECONFIG=/path/to/kubeconfig.yml bash migrate.sh`. The script is idempotent and can be run multiple times safely if you want to validate just one at a time.**Notes:**The [feature flag](https://ranchermanager.docs.rancher.com/getting-started/installation-and-upgrade/installation-references/feature-flags) `provisioningprebootstrap` must be enabled after updating to one of the patched versions. This feature flag is also mandatory when installing a new cluster.**Rancher 2.7 release line is not receiving a backport security patch for this vulnerability.** For users running Rancher 2.7 with vSphere provisioning and that are concerned with this security issue, the recommendation is to update Rancher to one of the patched versions by following the standard update procedure based on the 2.7 version that is being used. Refer to the release notes for the proper update process for [2.8.9](https://github.com/rancher/rancher/releases/tag/v2.8.9) and [2.9.3](https://github.com/rancher/rancher/releases/tag/v2.9.3).WorkaroundsBesides only granting access to Rancher to trusted users and not allowing direct access to untrusted users to the clusters' infrastructure, there is no direct workaround for this security issue, except updating Rancher to one of the patched versions.ReferencesIf you have any questions or comments about this advisory:Reach out to the [SUSE Rancher Security team](https://github.com/rancher/rancher/security/policy) for security related inquiries.Open an issue in the [Rancher](https://github.com/rancher/rancher/issues/new/choose) repository.Verify with our [support matrix](https://www.suse.com/suse-rancher/support-matrix/all-supported-versions/) and [product support lifecycle](https://www.suse.com/lifecycle/).
[]
8.5
9.1
null
null
null
GHSA-p3w4-g6w7-3v89
Tungsten Automation Power PDF JPF File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Tungsten Automation Power PDF. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of JPF files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-25560.
[]
null
null
7.8
null
null
GHSA-xx49-72mm-f757
Windows NT 4.0 beta allows users to read and delete shares.
[]
null
null
null
null
null
GHSA-pggf-4mfg-vr7g
HTTP File Server (HFS) before 2.2c allows remote attackers to append arbitrary text to the log file by using the base64 representation of this text during HTTP Basic Authentication.
[]
null
null
null
null
null
CVE-2014-3015
Cross-site request forgery (CSRF) vulnerability in the Web player in IBM Sametime Proxy Server and Web Client 9.0 through 9.0.0.1 allows remote attackers to hijack the authentication of arbitrary users for requests that insert XSS sequences.
[ "cpe:2.3:a:ibm:sametime_proxy_server_and_web_client:9.0.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:sametime_proxy_server_and_web_client:9.0.0.1:*:*:*:*:*:*:*" ]
null
null
null
6.8
null
CVE-2017-17635
MLM Forex Market Plan Script 2.0.4 has SQL Injection via the news_detail.php newid parameter or the event_detail.php eventid parameter.
[ "cpe:2.3:a:mlm_forex_market_plan_script_project:mlm_forex_market_plan_script:2.0.4:*:*:*:*:*:*:*" ]
null
null
9.8
7.5
null
ICSA-19-225-01
Delta Industrial Automation DOPSoft
Processing a specially crafted project file may trigger multiple out-of-bounds read vulnerabilities, which may allow information disclosure, remote code execution, or crash of the application.CVE-2019-13513 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). Processing a specially crafted project file may trigger a use-after-free vulnerability, which may allow information disclosure, remote code execution, or crash of the application.CVE-2019-13514 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).
[]
null
null
7.8
null
null
CVE-2012-6147
Cross-site scripting (XSS) vulnerability in the tree render API (TCA-Tree) in the Backend API in TYPO3 4.5.x before 4.5.21, 4.6.x before 4.6.14, and 4.7.x before 4.7.6 allows remote authenticated backend users to inject arbitrary web script or HTML via unspecified vectors.
[ "cpe:2.3:a:typo3:typo3:4.5:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:4.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:4.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:4.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:4.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:4.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:4.5.5:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:4.5.6:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:4.5.7:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:4.5.8:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:4.5.9:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:4.5.10:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:4.5.11:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:4.5.12:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:4.5.13:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:4.5.14:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:4.5.15:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:4.5.16:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:4.5.17:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:4.5.18:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:4.5.19:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:4.5.20:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:4.6:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:4.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:4.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:4.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:4.6.3:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:4.6.4:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:4.6.5:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:4.6.6:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:4.6.7:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:4.6.8:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:4.6.9:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:4.6.10:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:4.6.11:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:4.6.12:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:4.6.13:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:4.7:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:4.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:4.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:4.7.2:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:4.7.3:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:4.7.4:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:4.7.5:*:*:*:*:*:*:*" ]
null
null
null
3.5
null
CVE-2007-1863
cache_util.c in the mod_cache module in Apache HTTP Server (httpd), when caching is enabled and a threaded Multi-Processing Module (MPM) is used, allows remote attackers to cause a denial of service (child processing handler crash) via a request with the (1) s-maxage, (2) max-age, (3) min-fresh, or (4) max-stale Cache-Control headers without a value.
[ "cpe:2.3:o:apple:mac_os_x_server:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.1.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.1.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.1.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.2.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.2.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.2.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.2.6:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.2.7:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.2.8:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.3.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.3.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.3.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.3.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.3.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.3.6:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.3.7:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.3.8:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.3.9:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.4.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.4.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.4.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.4.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.4.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.4.6:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.4.7:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.4.8:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.4.9:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*" ]
null
null
null
5
null
CVE-2013-1872
The Intel drivers in Mesa 8.0.x and 9.0.x allow context-dependent attackers to cause a denial of service (reachable assertion and crash) and possibly execute arbitrary code via vectors involving 3d graphics that trigger an out-of-bounds array access, related to the fs_visitor::remove_dead_constants function. NOTE: this issue might be related to CVE-2013-0796.
[ "cpe:2.3:a:mesa3d:mesa:9.0:*:*:*:*:*:*:*", "cpe:2.3:a:mesa3d:mesa:9.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mesa3d:mesa:9.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mesa3d:mesa:9.0.3:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:mesa3d:mesa:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:mesa3d:mesa:8.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mesa3d:mesa:8.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mesa3d:mesa:8.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mesa3d:mesa:8.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mesa3d:mesa:8.0.5:*:*:*:*:*:*:*" ]
null
null
null
6.8
null
GHSA-hmm6-p5gh-p2h9
Microsoft SQL Server Integration Service (VS extension) Remote Code Execution Vulnerability
[]
null
7.3
null
null
null
CVE-2020-9006
The Popup Builder plugin 2.2.8 through 2.6.7.6 for WordPress is vulnerable to SQL injection (in the sgImportPopups function in sg_popup_ajax.php) via PHP Deserialization on attacker-controlled data with the attachmentUrl POST variable. This allows creation of an arbitrary WordPress Administrator account, leading to possible Remote Code Execution because Administrators can run PHP code on Wordpress instances. (This issue has been fixed in the 3.x branch of popup-builder.)
[ "cpe:2.3:a:sygnoos:popup_builder:*:*:*:*:*:wordpress:*:*" ]
null
9.8
null
7.5
null
CVE-2024-49665
WordPress Web Bricks Addons for Elementor plugin <= 1.1.1 - Stored Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Web Bricks Web Bricks Addons for Elementor allows Stored XSS.This issue affects Web Bricks Addons for Elementor: from n/a through 1.1.1.
[ "cpe:2.3:a:webbricks:web_bricks_addons:*:*:*:*:*:wordpress:*:*" ]
null
6.5
null
null
null
GHSA-p88h-866g-7w72
ecrire/public/assembler.php in SPIP before 4.1.3 and 4.2.x before 4.2.7 allows XSS because input from _request() is not restricted to safe characters such as alphanumerics.
[]
null
6.1
null
null
null
GHSA-5qrx-9vpc-57pm
The Bluetooth subsystem in QEMU mishandles negative values for length variables, leading to memory corruption.
[]
null
5.7
null
null
null
GHSA-jvhm-gjrh-3h93
Nuxt allows DOS via cache poisoning with payload rendering response
SummaryBy sending a crafted HTTP request to a server behind an CDN, it is possible in some circumstances to poison the CDN cache and highly impacts the availability of a site.It is possible to craft a request, such as `https://mysite.com/?/_payload.json` which will be rendered as JSON. If the CDN in front of a Nuxt site ignores the query string when determining whether to cache a route, then this JSON response could be served to future visitors to the site.ImpactAn attacker can perform this attack to a vulnerable site in order to make a site unavailable indefinitely. It is also possible in the case where the cache will be reset to make a small script to send a request each X seconds (=caching duration) so that the cache is permanently poisoned making the site completely unavailable.Conclusion :This is similar to a vulnerability in Next.js that resulted in CVE-2024-46982 (and see [this article](https://zhero-web-sec.github.io/research-and-things/nextjs-cache-and-chains-the-stale-elixir), in particular the "Internal URL parameter and pageProps" part, the latter being very similar to the one concerning us here.)
[]
null
7.5
null
null
null
GHSA-9q5f-7fh4-3hgx
PHP remote file inclusion vulnerability in koesubmit.php in the koeSubmit (com_koesubmit) component 1.0 for Mambo allows remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter.
[]
null
null
null
null
null
CVE-2022-27874
Improper authentication in some Intel(R) XMM(TM) 7560 Modem software before version M2_7560_R_01.2146.00 may allow a privileged user to potentially enable escalation of privilege via physical access.
[ "cpe:2.3:o:intel:xmm_7560_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xmm_7560:m.2:*:*:*:*:*:*:*" ]
null
6.8
null
null
null
GHSA-f9wh-r74m-7mrv
IBM Lenovo firmware 7CETB5WW 2.05 stores pre-boot authentication passwords in the BIOS Keyboard buffer and does not clear this buffer after use, which allows local users to obtain sensitive information by reading the physical memory locations associated with this buffer.
[]
null
null
null
null
null
CVE-2020-7126
A remote server-side request forgery (ssrf) vulnerability was discovered in Aruba Airwave Software version(s): Prior to 1.3.2.
[ "cpe:2.3:a:arubanetworks:airwave_glass:*:*:*:*:*:*:*:*" ]
null
5.8
null
5
null
GHSA-fgm5-wx7c-v696
Search Guard versions before 24.3 had an issue when Cross Cluster Search (CCS) was enabled, authenticated users are always authorized on the local cluster ignoring their roles on the remote cluster(s).
[]
null
null
null
null
null
CVE-2021-28963
Shibboleth Service Provider before 3.2.1 allows content injection because template generation uses attacker-controlled parameters.
[ "cpe:2.3:a:shibboleth:service_provider:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*" ]
null
5.3
null
5
null
GHSA-gw44-f6p9-qmm4
Directory traversal vulnerability in AFP Server in Apple Mac OS X 10.5.8 and 10.6.x before 10.6.5 allows remote authenticated users to execute arbitrary code by creating files that are outside the bounds of a share.
[]
null
null
null
null
null
CVE-2008-7198
Multiple unspecified vulnerabilities in phpns before 2.1.1beta1 have unknown impact and attack vectors.
[ "cpe:2.3:a:alecwh:phpns:*:*:*:*:*:*:*:*", "cpe:2.3:a:alecwh:phpns:2.1.1_b1:*:*:*:*:*:*:*", "cpe:2.3:a:alecwh:phpns:2.1.1alpha1_b1:*:*:*:*:*:*:*" ]
null
null
null
10
null
CVE-2023-48710
iTop limit pages/exec.php script to PHP files
iTop is an IT service management platform. Files from the `env-production` folder can be retrieved even though they should have restricted access. Hopefully, there is no sensitive files stored in that folder natively, but there could be from a third-party module. The `pages/exec.php` script as been fixed to limit execution of PHP files only. Other file types won't be retrieved and exposed. The vulnerability is fixed in 2.7.10, 3.0.4, 3.1.1, and 3.2.0.
[ "cpe:2.3:a:combodo:itop:*:*:*:*:*:*:*:*" ]
null
9.8
null
null
null
CVE-2024-51377
An issue in Ladybird Web Solution Faveo Helpdesk & Servicedesk (On-Premise and Cloud) 9.2.0 allows a remote attacker to execute arbitrary code via the Subject and Identifier fields
[ "cpe:2.3:a:ladybirdweb:faveo_helpdesk:*:*:*:*:*:*:*:*", "cpe:2.3:a:ladybirdweb:faveo_helpdesk:9.2.0:*:*:*:*:*:*:*" ]
null
8.8
null
null
null
GHSA-9ppr-hv62-39w2
Palo Alto Networks PAN-OS before 6.1.19, 7.0.x before 7.0.19, 7.1.x before 7.1.14, and 8.0.x before 8.0.6 allows remote attackers to execute arbitrary code via vectors involving the management interface.
[]
null
null
9.8
null
null
GHSA-w58p-9fj9-w99w
admin/infolist_add.php in PHPMyWind 5.6 has stored XSS.
[]
null
null
null
null
null
CVE-2016-8691
The jpc_dec_process_siz function in libjasper/jpc/jpc_dec.c in JasPer before 1.900.4 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted XRsiz value in a BMP image to the imginfo command.
[ "cpe:2.3:a:jasper_project:jasper:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:25:*:*:*:*:*:*:*" ]
null
null
5.5
4.3
null
CVE-2023-1049
A CWE-94: Improper Control of Generation of Code ('Code Injection') vulnerability exists that could cause execution of malicious code when an unsuspicious user loads a project file from the local filesystem into the HMI.
[ "cpe:2.3:a:schneider-electric:ecostruxure_operator_terminal_expert:*:*:*:*:*:*:*:*", "cpe:2.3:a:schneider-electric:ecostruxure_operator_terminal_expert:3.3:-:*:*:*:*:*:*", "cpe:2.3:a:schneider-electric:ecostruxure_operator_terminal_expert:3.3:sp1:*:*:*:*:*:*", "cpe:2.3:a:schneider-electric:pro-face_blue:*:*:*:*:*:*:*:*", "cpe:2.3:a:schneider-electric:pro-face_blue:3.3:-:*:*:*:*:*:*", "cpe:2.3:a:schneider-electric:pro-face_blue:3.3:sp1:*:*:*:*:*:*" ]
null
7.8
null
null
null
ICSA-17-278-02
Siemens 7KT PAC1200 Data Manager
The integrated web server (Port 80/TCP) of the affected devices could allow an unauthenticated remote attacker to perform administrative operations over the network.CVE-2017-9944 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
[]
null
null
9.8
null
null
GHSA-px9v-f56w-8qv4
The websimon-tables plugin through 1.3.4 for WordPress has wp-admin/tools.php edit_style id XSS.
[]
null
null
null
null
null
GHSA-2hgm-xvx6-w372
Netwrix Password Secure through 9.2 allows command injection.
[]
null
9.8
null
null
null
CVE-2001-0745
Netscape 4.7x allows remote attackers to obtain sensitive information such as the user's login, mailbox location and installation path via Javascript that accesses the mailbox: URL in the document.referrer property.
[ "cpe:2.3:a:netscape:messanger:4.7x:*:*:*:*:*:*:*" ]
null
null
null
5
null
GHSA-pj3p-g86x-695g
Multiple SQL injection vulnerabilities in photogallery.php in PHP-Fusion allow remote attackers to execute arbitrary SQL commands via the (1) album and (2) photo parameters.
[]
null
null
null
null
null
CVE-2010-0248
Microsoft Internet Explorer 6, 6 SP1, 7, and 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, leading to memory corruption, aka "HTML Object Memory Corruption Vulnerability."
[ "cpe:2.3:a:microsoft:ie:6:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:ie:6:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:ie:7:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:ie:8:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:8.0.6001:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:*:x32:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:*:x64:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:r2:itanium:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:r2:x64:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x32:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:*:*:x64:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:7.0.5730:unknown:gold:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:7.0.5730.11:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:7.00.5730.1100:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:7.00.6000.16386:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:7.00.6000.16441:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:6:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:6:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:6.00.2462.0000:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:6.00.2479.0006:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:6.0.2600:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:6.00.2600.0000:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:6.0.2800:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:6.0.2800.1106:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:6.00.2800.1106:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:6.0.2900:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:6.0.2900.2180:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:6.00.2900.2180:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:6.00.3663.0000:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:6.00.3718.0000:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:6.00.3790.0000:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:6.00.3790.1830:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:6.00.3790.3959:*:*:*:*:*:*:*" ]
null
8.1
null
9.3
null
RHSA-2003:086
Red Hat Security Advisory: : : : Updated file packages fix vulnerability
security flaw
[ "cpe:/o:redhat:linux:6.2", "cpe:/o:redhat:linux:7.0", "cpe:/o:redhat:linux:7.1", "cpe:/o:redhat:linux:7.2", "cpe:/o:redhat:linux:7.3", "cpe:/o:redhat:linux:8.0" ]
null
null
null
null
null
CVE-2016-3375
The OLE Automation mechanism and VBScript scripting engine in Microsoft Internet Explorer 9 through 11, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold, 1511, and 1607 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Scripting Engine Memory Corruption Vulnerability."
[ "cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*" ]
null
null
7.5
7.6
null
GHSA-mfv3-pwqp-278q
Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to a buffer overflow. An attacker can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the set_qos function with the dest variable.
[]
null
7.2
null
null
null
PYSEC-2016-40
null
Tryton 3.x before 3.2.17, 3.4.x before 3.4.14, 3.6.x before 3.6.12, 3.8.x before 3.8.8, and 4.x before 4.0.4 allow remote authenticated users to discover user password hashes via unspecified vectors.
[]
null
null
5.3
null
null
CVE-2017-3896
Unvalidated parameter vulnerability in the remote log viewing capability in Intel Security McAfee Agent 5.0.x versions prior to 5.0.4.449 allows remote attackers to pass unexpected input parameters via a URL that was not completely validated.
[ "cpe:2.3:a:mcafee:mcafee_agent:5.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:mcafee:mcafee_agent:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mcafee:mcafee_agent:5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mcafee:mcafee_agent:5.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mcafee:mcafee_agent:5.0.4:*:*:*:*:*:*:*" ]
null
null
5.9
4.3
null
GHSA-546p-247r-9672
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in Bolt CMS 3.7.1. It has been rated as problematic. This issue affects some unknown processing of the file /preview/page of the component Entry Preview Handler. The manipulation of the argument body leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-273167. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed that the affected release tree is end-of-life.
[]
5.3
3.5
null
null
null
GHSA-6c7w-5xfj-j2mc
heap-buffer-overflow in mrb_vm_exec in mruby/mruby in GitHub repository mruby/mruby prior to 3.2. Possible arbitrary code execution if being exploited.
[]
null
9.8
null
null
null
GHSA-jm7r-f6v6-6cpx
The Duplicate Page WordPress plugin through 4.4.2 does not sanitise or escape the Duplicate Post Suffix settings before outputting it, which could allow high privilege users to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.
[]
null
null
null
null
null
GHSA-92ww-86qp-x82q
Tinxy WiFi Lock Controller v1 RF was discovered to store users' sensitive information, including credentials and mobile phone numbers, in plaintext.
[]
null
7.5
null
null
null
GHSA-h92q-7rp5-87xc
MiniTool Partition Wizard 12.8 contains an insecure installation mechanism that allows attackers to achieve remote code execution through a man in the middle attack.
[]
null
8.1
null
null
null
GHSA-qpcp-22v6-2253
Heap-based buffer overflow in the SetConnectInfo function in the WESPPTZ.WESPPTZCtrl.1 ActiveX control in WebGate eDVR Manager allows remote attackers to execute arbitrary code via crafted arguments.
[]
null
null
null
null
null
CVE-2024-24819
icingaweb2-module-incubator base implementation for HTML forms is susceptible to CSRF
icingaweb2-module-incubator is a working project of bleeding edge Icinga Web 2 libraries. In affected versions the class `gipfl\Web\Form` is the base for various concrete form implementations [1] and provides protection against cross site request forgery (CSRF) by default. This is done by automatically adding an element with a CSRF token to any form, unless explicitly disabled, but even if enabled, the CSRF token (sent during a client's submission of a form relying on it) is not validated. This enables attackers to perform changes on behalf of a user which, unknowingly, interacts with a prepared link or website. The version 0.22.0 is available to remedy this issue. Users are advised to upgrade. There are no known workarounds for this vulnerability.
[ "cpe:2.3:a:icinga:icingaweb2-module-incubator:*:*:*:*:*:*:*:*" ]
null
5.3
null
null
null
GHSA-5837-3xvj-5g8r
A flaw was found in Undertow. A potential security issue in flow control handling by the browser over HTTP/2 may cause overhead or a denial of service in the server. This flaw exists because of an incomplete fix for CVE-2021-3629.
[]
null
7.5
null
null
null
CVE-2021-29875
IBM InfoSphere Information Server 11.7 could allow an attacker to obtain sensitive information due to a insecure third party domain access vulnerability. IBM X-Force ID: 206572.
[ "cpe:2.3:a:ibm:infosphere_information_server:11.7:*:*:*:*:*:*:*" ]
null
null
5.9
null
null
CVE-2018-15865
The Pulse Secure Desktop (macOS) has a Privilege Escalation Vulnerability.
[ "cpe:2.3:a:pulsesecure:pulse_secure_desktop_client:5.1r1.0:*:*:*:*:macos:*:*", "cpe:2.3:a:pulsesecure:pulse_secure_desktop_client:5.1r1.1:*:*:*:*:macos:*:*", "cpe:2.3:a:pulsesecure:pulse_secure_desktop_client:5.1r2.0:*:*:*:*:macos:*:*", "cpe:2.3:a:pulsesecure:pulse_secure_desktop_client:5.1r3.0:*:*:*:*:macos:*:*", "cpe:2.3:a:pulsesecure:pulse_secure_desktop_client:5.1r3.1:*:*:*:*:macos:*:*", "cpe:2.3:a:pulsesecure:pulse_secure_desktop_client:5.1r3.2:*:*:*:*:macos:*:*", "cpe:2.3:a:pulsesecure:pulse_secure_desktop_client:5.1r4.0:*:*:*:*:macos:*:*", "cpe:2.3:a:pulsesecure:pulse_secure_desktop_client:5.1r5.0:*:*:*:*:macos:*:*", "cpe:2.3:a:pulsesecure:pulse_secure_desktop_client:5.1r5.1:*:*:*:*:macos:*:*", "cpe:2.3:a:pulsesecure:pulse_secure_desktop_client:5.1r6.0:*:*:*:*:macos:*:*", "cpe:2.3:a:pulsesecure:pulse_secure_desktop_client:5.1r7.0:*:*:*:*:macos:*:*", "cpe:2.3:a:pulsesecure:pulse_secure_desktop_client:5.1r8.0:*:*:*:*:macos:*:*", "cpe:2.3:a:pulsesecure:pulse_secure_desktop_client:5.1r9.0:*:*:*:*:macos:*:*", "cpe:2.3:a:pulsesecure:pulse_secure_desktop_client:5.1r9.1:*:*:*:*:macos:*:*", "cpe:2.3:a:pulsesecure:pulse_secure_desktop_client:5.1r10.0:*:*:*:*:macos:*:*", "cpe:2.3:a:pulsesecure:pulse_secure_desktop_client:5.1rx:*:*:*:*:mac_os_x:*:*", "cpe:2.3:a:pulsesecure:pulse_secure_desktop_client:5.3r1:*:*:*:*:macos:*:*", "cpe:2.3:a:pulsesecure:pulse_secure_desktop_client:5.3r1.1:*:*:*:*:macos:*:*", "cpe:2.3:a:pulsesecure:pulse_secure_desktop_client:5.3r2:*:*:*:*:macos:*:*", "cpe:2.3:a:pulsesecure:pulse_secure_desktop_client:5.3r3:*:*:*:*:macos:*:*", "cpe:2.3:a:pulsesecure:pulse_secure_desktop_client:5.3r4:*:*:*:*:macos:*:*", "cpe:2.3:a:pulsesecure:pulse_secure_desktop_client:5.3r4.1:*:*:*:*:macos:*:*", "cpe:2.3:a:pulsesecure:pulse_secure_desktop_client:5.3r4.2:*:*:*:*:macos:*:*", "cpe:2.3:a:pulsesecure:pulse_secure_desktop_client:5.3r5:*:*:*:*:macos:*:*", "cpe:2.3:a:pulsesecure:pulse_secure_desktop_client:5.3r5.2:*:*:*:*:macos:*:*" ]
null
null
7.8
4.6
null
CVE-2019-8072
ColdFusion 2018- update 4 and earlier and ColdFusion 2016- update 11 and earlier have a Security bypass vulnerability. Successful exploitation could lead to Information Disclosure in the context of the current user.
[ "cpe:2.3:a:adobe:coldfusion:2016:-:*:*:*:*:*:*", "cpe:2.3:a:adobe:coldfusion:2016:update1:*:*:*:*:*:*", "cpe:2.3:a:adobe:coldfusion:2016:update10:*:*:*:*:*:*", "cpe:2.3:a:adobe:coldfusion:2016:update11:*:*:*:*:*:*", "cpe:2.3:a:adobe:coldfusion:2016:update2:*:*:*:*:*:*", "cpe:2.3:a:adobe:coldfusion:2016:update3:*:*:*:*:*:*", "cpe:2.3:a:adobe:coldfusion:2016:update4:*:*:*:*:*:*", "cpe:2.3:a:adobe:coldfusion:2016:update5:*:*:*:*:*:*", "cpe:2.3:a:adobe:coldfusion:2016:update6:*:*:*:*:*:*", "cpe:2.3:a:adobe:coldfusion:2016:update7:*:*:*:*:*:*", "cpe:2.3:a:adobe:coldfusion:2016:update8:*:*:*:*:*:*", "cpe:2.3:a:adobe:coldfusion:2016:update9:*:*:*:*:*:*", "cpe:2.3:a:adobe:coldfusion:2018:-:*:*:*:*:*:*", "cpe:2.3:a:adobe:coldfusion:2018:update1:*:*:*:*:*:*", "cpe:2.3:a:adobe:coldfusion:2018:update2:*:*:*:*:*:*", "cpe:2.3:a:adobe:coldfusion:2018:update3:*:*:*:*:*:*", "cpe:2.3:a:adobe:coldfusion:2018:update4:*:*:*:*:*:*" ]
null
7.5
null
5
null
GHSA-63h7-pm69-6v2j
React Native Bluetooth Scan in Bluezone 1.0.0 uses six-character alphanumeric IDs, which might make it easier for remote attackers to interfere with COVID-19 contact tracing by using many IDs.
[]
null
6.5
null
null
null
cisco-sa-cucm-injection-g6MbwH2
Cisco Unified Communications Manager SQL Injection Vulnerability
A vulnerability in the web-based management interface of Cisco Unified Communications Manager (Unified CM) and Cisco Unified Communications Manager Session Management Edition (Unified CM SME) could allow an authenticated, remote attacker to conduct SQL injection attacks on an affected system. This vulnerability is due to improper validation of user-supplied input. An attacker could exploit this vulnerability by authenticating to the application as a user with read-only or higher privileges and sending crafted HTTP requests to an affected system. A successful exploit could allow the attacker to read or modify data in the underlying database or elevate their privileges. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
[]
null
8.1
null
null
null
GHSA-6vwf-gj43-wr9h
Cross-site scripting (XSS) vulnerability in Novell Identity Manager (aka IDM) User Application 3.5.0, 3.5.1, 3.6.0, 3.6.1, 3.7.0, and 4.0.0, and Identity Manager Roles Based Provisioning Module 3.6.0, 3.6.1, 3.7.0, and 4.0.0, allows remote attackers to inject arbitrary web script or HTML via the apwaDetail (aka apwaDetailId) parameter, aka Bug 709603.
[]
null
null
null
null
null
RHSA-2013:1508
Red Hat Security Advisory: java-1.6.0-ibm security update
OpenJDK: java.util.TimeZone does not restrict setting of default time zone (Libraries, 8001029) JDK: unspecified sandbox bypass (JVM) JDK: XML4J xml entity expansion excessive memory use (XML) JDK: unspecified sandbox bypass (XML) JDK: unspecified sandbox bypass (ORB) OpenJDK: insufficient html escaping in jhat (jhat, 8011081) OpenJDK: Inet6Address class IPv6 address processing errors (Libraries, 8015743) JDK: unspecified vulnerability fixed in 7u45 (Deployment) OpenJDK: image conversion out of bounds read (2D, 8014102) OpenJDK: key data leak via toString() methods (Libraries, 8011071) OpenJDK: Incorrect awt_getPixelByte/awt_getPixelShort/awt_setPixelByte/awt_setPixelShort image raster checks (2D, 8014093) OpenJDK: JTable not properly performing certain access checks (Swing, 8013744) OpenJDK: insufficient InterfaceImplementor security checks (Scripting, 8017299) JDK: unspecified vulnerability fixed in 7u45 (Deployment) JDK: unspecified vulnerability fixed in 7u45 (Deployment) OpenJDK: insufficient escaping of window title string (Javadoc, 8016675) JDK: unspecified vulnerability fixed in 7u45 (2D) OpenJDK: javax.xml.transform.TransformerFactory does not properly honor XMLConstants.FEATURE_SECURE_PROCESSING (JAXP, 8012425) OpenJDK: insufficient checks of KDC replies (JGSS, 8014341) OpenJDK: javac does not ignore certain ignorable characters (Javadoc, 8016653) OpenJDK: JPEGImageReader and JPEGImageWriter missing band size checks (2D, 8013510) JDK: unspecified vulnerability fixed in 7u45 (Deployment) OpenJDK: RMIConnection stub missing permission check (CORBA, 8011157) OpenJDK: VersionHelper12 does not honor modifyThreadGroup restriction (JNDI, 8013739) JDK: unspecified vulnerability fixed in 7u45 (Deployment) JDK: unspecified vulnerability fixed in 7u45 (Deployment) OpenJDK: insufficient security checks (JAXWS, 8017505) OpenJDK: com.sun.org.apache.xml.internal.security.utils.UnsyncByteArrayOutputStream Denial of Service (Security, 8021290) JDK: unspecified vulnerability fixed in 7u45 (Deployment) OpenJDK: XML parsing Denial of Service (JAXP, 8014530) OpenJDK: Java2d Disposer security bypass (2D, 8017287) OpenJDK: checkPackageAccess missing security check (Libraries, 8017291) JDK: unspecified vulnerability fixed in 7u45 (Deployment) JDK: unspecified vulnerability fixed in 7u45 (Deployment) OpenJDK: getDeclaringClass() information leak (Libraries, 8014349) OpenJDK: ObjectInputStream/ObjectOutputStream missing checks (Libraries, 8014987) JDK: unspecified vulnerability fixed in 7u45 (2D) JDK: unspecified vulnerability fixed in 7u45 (Deployment) OpenJDK: insufficient DataFlavor security checks (AWT, 8012277) OpenJDK: Missing CORBA security checks (Libraries, 8017196) OpenJDK: XML stream factory finder information leak (JAXP, 8013502)
[ "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server", "cpe:/a:redhat:rhel_extras:6" ]
null
null
null
null
null
RHSA-2021:0473
Red Hat Security Advisory: .NET 5.0 on Red Hat Enterprise Linux security and bugfix update
dotnet: certificate chain building recursion Denial of Service
[ "cpe:/a:redhat:rhel_dotnet:5.0::el7" ]
null
6.5
null
null
null
PYSEC-2021-517
null
TensorFlow is an end-to-end open source platform for machine learning. The reference implementation of the `GatherNd` TFLite operator is vulnerable to a division by zero error(https://github.com/tensorflow/tensorflow/blob/0d45ea1ca641b21b73bcf9c00e0179cda284e7e7/tensorflow/lite/kernels/internal/reference/reference_ops.h#L966). An attacker can craft a model such that `params` input would be an empty tensor. In turn, `params_shape.Dims(.)` would be zero, in at least one dimension. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
[]
null
null
null
null
null
GHSA-4f5x-9vpp-x3hw
Cross-site request forgery (CSRF) vulnerability in users_maint.html in KrisonAV CMS before 3.0.2 allows remote attackers to hijack the authentication of administrators for requests that create user accounts via a crafted request.
[]
null
null
null
null
null
RHSA-2024:1444
Red Hat Security Advisory: nodejs:16 security update
HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) nodejs: reading unprocessed HTTP request with unbounded chunk extension allows DoS attacks
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.5
null
null
null
RHSA-2007:0310
Red Hat Security Advisory: openldap security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
null
GHSA-r2xx-gprx-q489
Authorization Bypass Through User-Controlled Key vulnerability in Molongui.This issue affects Molongui: from n/a through 4.7.7.
[]
null
2.7
null
null
null
CVE-2021-32707
Bypass of image blocking in Nextcloud Mail
Nextcloud Mail is a mail app for Nextcloud. In versions prior to 1.9.6, the Nextcloud Mail application does not, by default, render images in emails to not leak the read state. The privacy filter failed to filter images with a `background-image` CSS attribute. Note that the images were still passed through the Nextcloud image proxy, and thus there was no IP leakage. The issue was patched in version 1.9.6 and 1.10.0. No workarounds are known to exist.
[ "cpe:2.3:a:nextcloud:mail:*:*:*:*:*:*:*:*" ]
null
4.3
null
null
null