id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
189k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
patch_commit_url
stringlengths
36
232
GHSA-7h3w-v9hh-hp55
An issue has been discovered in GitLab CE/EE affecting all versions starting from 15.4 before 15.9.7, all versions starting from 15.10 before 15.10.6, all versions starting from 15.11 before 15.11.2. Under certain conditions, a malicious unauthorized GitLab user may use a GraphQL endpoint to attach a malicious runner to any project.
[]
null
9.6
null
null
null
GHSA-p9xp-4jv8-8r8f
Unspecified vulnerability in the JAX-WS client and service in Sun Java Runtime Environment (JRE) in JDK and JRE 6 Update 6 and earlier allows remote attackers to access URLs or cause a denial of service via unknown vectors involving "processing of XML data" by a trusted application.
[]
null
null
null
null
null
GHSA-p6g4-5hgj-p576
The Cost Calculator WordPress plugin before 1.6 allows users with a role as low as Contributor to perform Stored Cross-Site Scripting attacks via the Description fields of a Cost Calculator > Price Settings (which gets injected on the edit page as well as any page that embeds the calculator using the shortcode), as well as the Text Preview field of a Project (injected on the edit project page)
[]
null
5.4
null
null
null
CVE-2025-2672
code-projects Payroll Management System add_deductions.php sql injection
A vulnerability was found in code-projects Payroll Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /add_deductions.php. The manipulation of the argument bir leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.
[]
5.3
6.3
6.3
6.5
null
GHSA-6qw9-g8rh-fwxf
Buffer overflow in the SQLXML ISAPI extension of Microsoft SQL Server 2000 allows remote attackers to execute arbitrary code via data queries with a long content-type parameter, aka "Unchecked Buffer in SQLXML ISAPI Extension."
[]
null
null
null
null
null
GHSA-7rx2-769v-hrwf
HashiCorp Vault ldap auth method may not have correctly enforced MFA
Vault and Vault Enterprise’s (“Vault”) ldap auth method may not have correctly enforced MFA if username_as_alias was set to true and a user had multiple CNs that are equal but with leading or trailing spaces. Fixed in Vault Community Edition 1.20.2 and Vault Enterprise 1.20.2, 1.19.8, 1.18.13, and 1.16.24.
[]
null
6.5
null
null
null
GHSA-p7qf-74jx-f6jj
Deserialization of Untrusted Data vulnerability in BoldThemes Amwerk allows Object Injection. This issue affects Amwerk: from n/a through 1.2.0.
[]
null
9.8
null
null
null
CVE-2024-27171
Insecure permissions
A remote attacker using the insecure upload functionality will be able to overwrite any Python file and get Remote Code Execution. As for the affected products/models/versions, see the reference URL.
[ "cpe:2.3:h:toshibatec:e-studio-2521_ac:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-2020_ac:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-2520_nc:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-2021_ac:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-2525_ac:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-3025_ac:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-3525_ac:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-3525_acg:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-4525_ac:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-5525_ac:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-5525_acg:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-6525_ac:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-6525_acg:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-2528-a:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-3028-a:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-3528-a:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-3528-ag:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-4528-a:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-4528-ag:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-5528-a:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-6528-a:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-6526-ac:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-6527-ac:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-7527-ac:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-6529-a:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-7529-a:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-9029-a:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-330-ac:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-400-ac:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-2010-ac:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-2110-ac:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-2510-ac:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-2610-ac:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-2015-nc:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-2515-nc:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-2615-nc:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-3015-nc:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-3115-nc:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-3515-nc:-:*:*:*:*:*:*:*", "cpe:2.3:h:toshibatec:e-studio-3615-nc:-:*:*:*:*:*:*:*" ]
null
7.4
null
null
null
CVE-2024-7926
ZZCMS about_edit.php path traversal
A vulnerability classified as critical has been found in ZZCMS 2023. Affected is an unknown function of the file /admin/about_edit.php?action=modify. The manipulation of the argument skin leads to path traversal. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
[ "cpe:2.3:a:zzcms:zzcms:2023:*:*:*:*:*:*:*" ]
6.9
7.3
7.3
7.5
null
RHSA-2008:0826
Red Hat Security Advisory: JBoss Enterprise Application Platform 4.3.0.CP01 security update
Cross-site scripting (XSS) vulnerability in Sun Java Server Faces JBossEAP status servlet info leak
[ "cpe:/a:redhat:jboss_enterprise_application_platform:4.3.0::el4" ]
null
null
null
null
null
ICSA-18-025-02B
Siemens Desigo PXC (Update C)
A remote attacker with network access to the device could potentially upload a new firmware image to the devices without prior authentication.
[]
null
9.8
null
null
null
CVE-2024-5451
The7 — Website and eCommerce Builder for WordPress <= 11.13.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via url Attribute
The The7 — Website and eCommerce Builder for WordPress theme for WordPress is vulnerable to Stored Cross-Site Scripting via the 'url' attribute within the plugin's Icon and Heading widgets in all versions up to, and including, 11.13.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
6.4
null
null
null
CVE-2010-2384
Unspecified vulnerability in Oracle Solaris 9 and 10 allows local users to affect confidentiality and integrity via unknown vectors related to Solaris Management Console.
[ "cpe:2.3:o:oracle:solaris:9:*:*:*:*:*:*:*", "cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*" ]
null
null
null
3.2
null
GHSA-45fw-7wjh-qgj9
Draytek Vigor 3910 v4.3.2.6 was discovered to contain a buffer overflow in the newProname parameter at v2x00.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.
[]
null
7.5
null
null
null
GHSA-89mx-ch25-5256
otool in Apple Xcode before 7.3 allows local users to gain privileges or cause a denial of service (memory corruption and application crash) via unspecified vectors.
[]
null
null
7.8
null
null
CVE-2000-0129
Buffer overflow in the SHGetPathFromIDList function of the Serv-U FTP server allows attackers to cause a denial of service by performing a LIST command on a malformed .lnk file.
[ "cpe:2.3:o:microsoft:windows_95:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_98:*:gold:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*" ]
null
null
null
2.1
null
CVE-2023-21846
Vulnerability in the Oracle BI Publisher product of Oracle Fusion Middleware (component: Security). Supported versions that are affected are 5.9.0.0.0, 6.4.0.0.0 and 12.2.1.4.0. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise Oracle BI Publisher. Successful attacks of this vulnerability can result in takeover of Oracle BI Publisher. CVSS 3.1 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).
[ "cpe:2.3:a:oracle:bi_publisher:5.9.0.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:bi_publisher:6.4.0.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:bi_publisher:12.2.1.4.0:*:*:*:*:*:*:*" ]
null
8.8
null
null
null
GHSA-4wf3-x44x-f4f7
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.34. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. Note: This vulnerability applies to Windows systems only. CVSS 3.1 Base Score 7.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).
[]
null
7.8
null
null
null
GHSA-h5w6-cmx7-x823
Dell EMC iDRAC9 versions prior to 3.21.21.21 did not enforce the use of TLS/SSL for a connection to iDRAC web server for certain URLs. A man-in-the-middle attacker could use this vulnerability to strip the SSL/TLS protection from a connection between a client and a server.
[]
null
null
5.9
null
null
CVE-2023-25131
Use of default password vulnerability in CyberPower PowerPanel Business
Use of default password vulnerability in PowerPanel Business Local/Remote for Windows v4.8.6 and earlier, PowerPanel Business Management for Windows v4.8.6 and earlier, PowerPanel Business Local/Remote for Linux 32bit v4.8.6 and earlier, PowerPanel Business Local/Remote for Linux 64bit v4.8.6 and earlier, PowerPanel Business Management for Linux 32bit v4.8.6 and earlier, PowerPanel Business Management for Linux 64bit v4.8.6 and earlier, PowerPanel Business Local/Remote for MacOS v4.8.6 and earlier, and PowerPanel Business Management for MacOS v4.8.6 and earlier allows remote attackers to log in to the server directly to perform administrative functions. Upon installation or upon first login, the application does not ask the user to change the 'admin' password.
[ "cpe:2.3:a:cyberpower:powerpanel:*:*:*:*:business:linux:*:*", "cpe:2.3:a:cyberpower:powerpanel:*:*:*:*:business:macos:*:*", "cpe:2.3:a:cyberpower:powerpanel:*:*:*:*:business:virtual_machine:*:*", "cpe:2.3:a:cyberpower:powerpanel:*:*:*:*:business:windows:*:*" ]
null
9.4
null
null
null
CVE-2025-21774
can: rockchip: rkcanfd_handle_rx_fifo_overflow_int(): bail out if skb cannot be allocated
In the Linux kernel, the following vulnerability has been resolved: can: rockchip: rkcanfd_handle_rx_fifo_overflow_int(): bail out if skb cannot be allocated Fix NULL pointer check in rkcanfd_handle_rx_fifo_overflow_int() to bail out if skb cannot be allocated.
[]
null
5.5
null
null
null
CVE-2011-3636
Cross-site request forgery (CSRF) vulnerability in the management interface in FreeIPA before 2.1.4 allows remote attackers to hijack the authentication of administrators for requests that make configuration changes.
[ "cpe:2.3:a:redhat:freeipa:*:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:freeipa:0.99:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:freeipa:0.99698-20080228:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:freeipa:0.99698641-20080218:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:freeipa:1.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:freeipa:1.0.0:a:*:*:*:*:*:*", "cpe:2.3:a:redhat:freeipa:1.0.0:b:*:*:*:*:*:*", "cpe:2.3:a:redhat:freeipa:1.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:freeipa:1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:freeipa:1.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:freeipa:1.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:freeipa:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:freeipa:1.9.0:pre1:*:*:*:*:*:*", "cpe:2.3:a:redhat:freeipa:1.9.0:pre2:*:*:*:*:*:*", "cpe:2.3:a:redhat:freeipa:1.9.0:pre3:*:*:*:*:*:*", "cpe:2.3:a:redhat:freeipa:1.9.0:pre4:*:*:*:*:*:*", "cpe:2.3:a:redhat:freeipa:1.9.0:pre5:*:*:*:*:*:*", "cpe:2.3:a:redhat:freeipa:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:freeipa:2.0.0:pre1:*:*:*:*:*:*", "cpe:2.3:a:redhat:freeipa:2.0.0:pre2:*:*:*:*:*:*", "cpe:2.3:a:redhat:freeipa:2.0.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:redhat:freeipa:2.0.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:redhat:freeipa:2.0.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:redhat:freeipa:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:freeipa:2.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:freeipa:2.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:freeipa:2.1.2:*:*:*:*:*:*:*" ]
null
null
null
6.8
null
GHSA-6fjr-m7v6-fpg9
jquey is malware
The `jquey` package is malware that attempts to discover and exfiltrate sensitive data such as a user's private SSH key and bash history, sending them to attacker controlled locations.All versions have been unpublished from the npm registry.RecommendationIf you have found `jquey` installed in your environment, you should:Delete the packageClear your npm cacheEnsure it is not present in any other package.json files on your systemRegenerate your SSH keys, registry credentials, tokens, and any other sensitive credentials that may have been present in your bash history.Additionally, any service which may have been exposed via credentials in your bash history or accessible via your ssh keys, such as a database, should be reviewed for indicators of compromise as well.
[]
null
null
null
null
null
CVE-2021-47407
KVM: x86: Handle SRCU initialization failure during page track init
In the Linux kernel, the following vulnerability has been resolved: KVM: x86: Handle SRCU initialization failure during page track init Check the return of init_srcu_struct(), which can fail due to OOM, when initializing the page track mechanism. Lack of checking leads to a NULL pointer deref found by a modified syzkaller. [Move the call towards the beginning of kvm_arch_init_vm. - Paolo]
[]
null
null
null
null
null
GHSA-m445-w3xr-vp2f
soft-serve vulnerable to arbitrary code execution by crafting git-lfs requests
ImpactAny servers using soft-serve server and gitPatches0.7.5WorkaroundsNone.Referencesn/a.It is possible for a user who can commit files to a repository hosted by Soft Serve to execute arbitrary code via environment manipulation and Git.The issue is that Soft Serve passes all environment variables given by the client to git subprocesses. This includes environment variables that control program execution, such as `LD_PRELOAD`.This can be exploited to execute arbitrary code by, for example, uploading a malicious shared object file to Soft Serve via Git LFS (uploading it via LFS ensures that it is not compressed on disk and easier to work with). The file will be stored under its SHA256 hash, so it has a predictable name.This file can then be referenced in `LD_PRELOAD` via a Soft Serve SSH session that causes git to be invoked. For example:The example LFS file patches a shared library function called by git to execute a shell.
[]
8.6
8.1
null
null
null
CVE-2019-14093
Array out of bound access can occur in display module due to lack of bound check on input parcel received in Snapdragon Auto, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in APQ8009, APQ8017, APQ8053, APQ8096AU, APQ8098, MDM9206, MDM9207C, MDM9607, MDM9650, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8996, MSM8996AU, QCM2150, QCS405, QCS605, QM215, SDA660, SDA845, SDM429, SDM429W, SDM439, SDM450, SDM632, SDM636, SDM660, SDX20
[ "cpe:2.3:o:qualcomm:apq8009_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:apq8009:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:apq8017_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:apq8017:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:apq8053_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:apq8053:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:apq8096au_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:apq8096au:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:apq8098_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:apq8098:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9206_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9206:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9207c_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9207c:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9607_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9607:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9650:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:msm8909w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:msm8909w:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:msm8917_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:msm8917:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:msm8920_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:msm8920:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:msm8937_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:msm8937:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:msm8940_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:msm8940:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:msm8953_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:msm8953:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:msm8996_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:msm8996:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:msm8996au:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcm2150_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcm2150:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcs405_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcs405:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcs605_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcs605:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qm215_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qm215:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sda660_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sda660:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sda845_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sda845:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdm429_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm429:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdm429w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm429w:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdm439_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm439:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdm450_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm450:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdm632_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm632:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdm636_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm636:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdm660_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm660:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdx20_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdx20:-:*:*:*:*:*:*:*" ]
null
7.8
null
4.6
null
GHSA-m758-wc7v-8xpg
A vulnerability was found in Beijing Baichuo Smart S45F Multi-Service Secure Gateway Intelligent Management Platform up to 20230822. It has been rated as critical. Affected by this issue is some unknown functionality of the file /importexport.php. The manipulation leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-238634 is the identifier assigned to this vulnerability.
[]
null
null
6.3
null
null
GHSA-7q2j-gh72-pjrj
A file-upload vulnerability exists in Rukovoditel 2.3.1. index.php?module=configuration/save allows the user to upload a background image, and mishandles extension checking. It accepts uploads of PHP content if the first few characters match GIF data, and the filename ends in ".php" with mixed case, such as the .pHp extension.
[]
null
null
8.8
null
null
CVE-2025-5219
FreeFloat FTP Server ASCII Command buffer overflow
A vulnerability has been found in FreeFloat FTP Server 1.0.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the component ASCII Command Handler. The manipulation leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
[]
6.9
7.3
7.3
7.5
null
GHSA-gjvw-h4x8-x57w
In rw_i93_sm_detect_ndef of rw_i93.cc, there is a possible out-of-bound read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android. Versions: Android-7.0 Android-7.1.1 Android-7.1.2 Android-8.0 Android-8.1 Android-9. Android ID: A-121260197.
[]
null
null
5
null
null
CVE-2025-20979
Out-of-bounds write in libsavscmn prior to Android 15 allows local attackers to execute arbitrary code.
[]
null
8.4
null
null
null
GHSA-f7h5-c625-3795
Eclipse GlassFish is vulnerable to Server Side Request Forgery attacks through specific endpoints
In Eclipse GlassFish version 6.2.5, it is possible to perform a Server Side Request Forgery attack using specific endpoints.
[]
8.9
null
null
null
null
GHSA-3256-58fp-785h
Cross Site Scripting (XSS) vulnerability in EasyEmail v.4.12.2 and before allows a local attacker to execute arbitrary code via the user input parameter(s). NOTE: Researcher claims issue is present in all versions prior and later than tested version.
[]
null
6.1
null
null
null
CVE-2025-30726
Vulnerability in the Oracle Application Object Library product of Oracle E-Business Suite (component: Core). Supported versions that are affected are 12.2.3-12.2.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Application Object Library. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Application Object Library accessible data. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).
[]
null
5.3
null
null
null
CVE-2023-4243
The FULL - Customer plugin for WordPress is vulnerable to Arbitrary File Upload via the /install-plugin REST route in versions up to, and including, 2.2.3 due to improper authorization. This allows authenticated attackers with subscriber-level permissions and above to execute code by installing plugins from arbitrary remote locations including non-repository sources onto the site, granted they are packaged as a valid WordPress plugin.
[ "cpe:2.3:a:full:full_-_customer:*:*:*:*:*:wordpress:*:*" ]
null
8.8
null
null
null
CVE-2007-4170
Multiple PHP remote file inclusion vulnerabilities in AL-Athkar 2.0 allow remote attackers to execute arbitrary PHP code via a URL in the (1) include parameter to (a) Main.php and (b) get.php and the (2) exec parameter to (c) count.php.
[ "cpe:2.3:a:al-athkar:al-athkar:2.0:*:*:*:*:*:*:*" ]
null
null
null
10
null
CVE-2021-20245
A flaw was found in ImageMagick in coders/webp.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability.
[ "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" ]
null
5.5
null
7.1
null
CVE-2013-3608
The web interface in the Intelligent Platform Management Interface (IPMI) implementation on Supermicro H8DC*, H8DG*, H8SCM-F, H8SGL-F, H8SM*, X7SP*, X8DT*, X8SI*, X9DAX-*, X9DB*, X9DR*, X9QR*, X9SBAA-F, X9SC*, X9SPU-F, and X9SR* devices allows remote authenticated users to execute arbitrary commands via shell metacharacters, as demonstrated by the IP address field in config_date_time.cgi.
[ "cpe:2.3:h:supermicro:h8dcl-6f:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:h8dcl-if:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:h8dct-hibqf:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:h8dct-hln4f:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:h8dct-ibqf:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:h8dg6-f:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:h8dgg-qf:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:h8dgi-f:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:h8dgt-hf:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:h8dgt-hibqf:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:h8dgt-hlf:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:h8dgt-hlibqf:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:h8dgu-f:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:h8dgu-ln4f\\+:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:h8scm-f:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:h8sgl-f:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:h8sme-f:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:h8sml-7:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:h8sml-7f:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:h8sml-i:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:h8sml-if:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x7spa-hf:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x7spa-hf-d525:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x7spe-h-d525:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x7spe-hf:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x7spe-hf-d525:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x7spt-df-d525:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x7spt-df-d525\\+:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x8dtl-3f:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x8dtl-6f:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x8dtl-if:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x8dtn\\+-f:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x8dtn\\+-f-lr:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x8dtu-6f\\+:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x8dtu-6f\\+-lr:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x8dtu-6tf\\+:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x8dtu-6tf\\+-lr:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x8dtu-ln4f\\+:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x8dtu-ln4f\\+-lr:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x8si6-f:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x8sia-f:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x8sie-f:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x8sie-ln4f:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x8sil-f:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x8sit-f:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x8sit-hf:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x8siu-f:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x9dax-7f:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x9dax-7f-hft:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x9dax-7tf:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x9dax-if:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x9dax-if-hft:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x9dax-itf:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x9db3-f:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x9db3-tpf:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x9dbi-f:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x9dbi-tpf:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x9dbl-3f:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x9dbl-if:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x9dbu-3f:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x9dbu-if:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x9dr3-f:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x9dr3-ln4f\\+:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x9dr7-ln4f:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x9dr7-ln4f-jbod:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x9dr7-tf\\+:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x9drd-7jln4f:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x9drd-7ln4f:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x9drd-7ln4f-jbod:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x9drd-ef:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x9drd-if:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x9dre-ln4f:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x9dre-tf\\+:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x9drff:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x9drff-7:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x9drff-7\\+:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x9drff-7g\\+:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x9drff-7t\\+:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x9drff-7tg\\+:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x9drff-i\\+:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x9drff-ig\\+:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x9drff-it\\+:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x9drff-itg\\+:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x9drfr:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x9drg-hf:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x9drg-hf\\+:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x9drg-htf:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x9drg-htf\\+:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x9drh-7f:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x9drh-7tf:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x9drh-if:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x9drh-itf:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x9dri-f:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x9dri-ln4f\\+:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x9drl-3f:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x9drl-ef:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x9drl-if:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x9drt-f:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x9drt-h6f:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x9drt-h6ibff:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x9drt-h6ibqf:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x9drt-hf\\+:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x9drt-ibff:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x9drt-ibqf:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x9drw-3ln4f\\+:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x9drw-3tf\\+:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x9drw-7tpf\\+:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x9drw-itpf\\+:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x9drx\\+-f:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x9qr7-tf:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x9qr7-tf\\+:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x9qr7-tf-jbod:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x9qri-f:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x9qri-f\\+:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x9sbaa-f:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x9sca-f:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x9scd-f:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x9sce-f:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x9scff-f:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x9sci-ln4f:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x9scl\\+-f:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x9scl-f:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x9scm-f:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x9scm-iif:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x9spu-f:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x9srd-f:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x9sre-3f:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x9sre-f:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x9srg-f:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x9sri-3f:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x9sri-f:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x9srl-f:-:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x9srw-f:-:*:*:*:*:*:*:*" ]
null
null
null
10
null
CVE-2021-37742
app/View/Elements/GalaxyClusters/view_relation_tree.ctp in MISP 2.4.147 allows Stored XSS when viewing galaxy cluster relationships.
[ "cpe:2.3:a:misp:misp:2.4.147:*:*:*:*:*:*:*" ]
null
5.4
null
3.5
null
GHSA-9p84-g446-89ph
Multiple games developed by FUN labs, including 4X4 Off-road Adventure III, Big Game Hunter, Dangerous Hunts, Deer Hunt, Revolution, Secret Service, Shadow Force, and US Most Wanted, allow remote attackers to cause a denial of service via an empty UDP packet to the server, which cannot detect that a new packet has arrived using the socket ioctl.
[]
null
null
null
null
null
GHSA-f76p-727c-9wqp
Out of bounds write vulnerability in the JPEG parsing code of Netop Vision Pro up to and including 9.7.2 allows an adjacent unauthenticated attacker to write to arbitrary memory potentially leading to a Denial of Service (DoS).
[]
null
null
null
null
null
CVE-2024-29291
An issue in Laravel Framework 8 through 11 might allow a remote attacker to discover database credentials in storage/logs/laravel.log. NOTE: this is disputed by multiple third parties because the owner of a Laravel Framework installation can choose to have debugging logs, but needs to set the access control appropriately for the type of data that may be logged.
[ "cpe:2.3:a:laravel:framework:*:*:*:*:*:*:*:*" ]
null
null
null
null
null
CVE-2018-8441
An elevation of privilege vulnerability exists due to an integer overflow in Windows Subsystem for Linux, aka "Windows Subsystem for Linux Elevation of Privilege Vulnerability." This affects Windows 10, Windows 10 Servers.
[ "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*" ]
null
null
7.8
4.6
null
CVE-2009-4470
SQL injection vulnerability in boardrule.php in DVBBS 2.0 allows remote attackers to execute arbitrary SQL commands via the groupboardid parameter.
[ "cpe:2.3:a:dvbbs:dvbbs:2.0:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
GHSA-rm2m-chmf-gp2r
Mozilla Firefox before 19.0, Firefox ESR 17.x before 17.0.3, Thunderbird before 17.0.3, Thunderbird ESR 17.x before 17.0.3, and SeaMonkey before 2.16 allow man-in-the-middle attackers to spoof the address bar by operating a proxy server that provides a 407 HTTP status code accompanied by web script, as demonstrated by a phishing attack on an HTTPS site.
[]
null
null
null
null
null
CVE-2018-5535
On F5 BIG-IP 14.0.0, 13.0.0-13.1.0, 12.1.0-12.1.3, or 11.5.1-11.6.3 specifically crafted HTTP responses, when processed by a Virtual Server with an associated QoE profile that has Video enabled, may cause TMM to incorrectly buffer response data causing the TMM to restart resulting in a Denial of Service.
[ "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_local_traffic_manager:14.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_application_acceleration_manager:14.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:14.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_analytics:14.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_access_policy_manager:14.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_application_security_manager:14.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_domain_name_system:14.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_edge_gateway:14.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_fraud_protection_service:14.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_global_traffic_manager:14.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_link_controller:14.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:14.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_webaccelerator:14.0.0:*:*:*:*:*:*:*" ]
null
null
7.5
5
null
GHSA-qmxc-jm57-x7h9
SQL injection vulnerability in Zengaia before 0.2 allows remote attackers to execute arbitrary SQL commands via unknown vectors.
[]
null
null
null
null
null
CVE-2006-5647
Sophos Anti-Virus and Endpoint Security before 6.0.5, Anti-Virus for Linux before 5.0.10, and other platforms before 4.11 allows remote attackers to cause a denial of service (memory corruption) and possibly execute arbitrary code via a malformed CHM file with a large name length in the CHM chunk header, aka "CHM name length memory consumption vulnerability."
[ "cpe:2.3:a:sophos:anti-virus:4.04:*:*:*:*:*:*:*", "cpe:2.3:a:sophos:anti-virus:4.05:*:*:*:*:*:*:*", "cpe:2.3:a:sophos:anti-virus:4.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:sophos:anti-virus:4.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:sophos:anti-virus:4.5.11:*:*:*:*:*:*:*", "cpe:2.3:a:sophos:anti-virus:4.5.12:*:*:*:*:*:*:*", "cpe:2.3:a:sophos:anti-virus:4.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:sophos:anti-virus:4.7.2:*:*:*:*:*:*:*", "cpe:2.3:a:sophos:anti-virus:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:sophos:anti-virus:5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:sophos:anti-virus:5.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:sophos:anti-virus:5.1:*:*:*:*:*:*:*", "cpe:2.3:a:sophos:anti-virus:5.2:*:*:*:*:*:*:*", "cpe:2.3:a:sophos:anti-virus:5.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:sophos:anti-virus:6.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:sophos:endpoint_security:*:*:*:*:*:*:*:*" ]
null
null
null
6.4
null
GHSA-hfjq-9qvp-vr83
TUTOS 1.3 allows remote attackers to read system information via a direct request to php/admin/phpinfo.php, which calls the phpinfo function.
[]
null
null
null
null
null
CVE-2015-1650
Use-after-free vulnerability in Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word 2013 SP1, Word 2013 RT SP1, Word Viewer, Office Compatibility Pack SP3, Word Automation Services on SharePoint Server 2010 SP2 and 2013 SP1, and Office Web Apps Server 2010 SP2 and 2013 SP1 allows remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Office Component Use After Free Vulnerability."
[ "cpe:2.3:a:microsoft:office:2010:sp2:x64:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2010:sp2:x86:*:*:*:*:*", "cpe:2.3:a:microsoft:office_compatibility_pack:*:sp3:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office_web_apps:2010:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office_web_apps:2013:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sharepoint_server:2010:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sharepoint_server:2013:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:word:2007:sp3:*:*:*:*:*:*", "cpe:2.3:a:microsoft:word:2010:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:word:2013:sp1:*:*:rt:*:*:*", "cpe:2.3:a:microsoft:word_viewer:*:*:*:*:*:*:*:*" ]
null
null
null
9.3
null
CVE-2014-1786
Microsoft Internet Explorer 9 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2014-1773, CVE-2014-1783, CVE-2014-1784, CVE-2014-1795, CVE-2014-1805, CVE-2014-2758, CVE-2014-2759, CVE-2014-2765, CVE-2014-2766, and CVE-2014-2775.
[ "cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:11:*:*:*:*:*:*:*" ]
null
null
null
9.3
null
GHSA-hh5m-ff4f-2qxj
HCL MyXalytics is affected by an improper password policy implementation vulnerability. Weak passwords and lack of account lockout policies allow attackers to guess or brute-force passwords if the username is known.
[]
null
4.8
null
null
null
CVE-2007-5131
SQL injection vulnerability in index.php in Interspire ActiveKB NX 2.x allows remote attackers to execute arbitrary SQL commands via the catId parameter in a browse action. NOTE: it was separately reported that ActiveKB 1.5 is also affected.
[ "cpe:2.3:a:interspire:activekb_nx:2:*:*:*:*:*:*:*", "cpe:2.3:a:interspire:activekb_nx:2.6:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
GHSA-c6hq-rccc-7p5f
A vulnerability classified as critical was found in code-projects Pharmacy Management System 1.0. This vulnerability affects unknown code of the file /php/add_new_medicine.php. The manipulation of the argument name/packing/generic_name/suppliers_name leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
[]
5.3
6.3
null
null
null
CVE-2001-0960
Computer Associates ARCserve for NT 6.61 SP2a and ARCserve 2000 7.0 stores the backup agent user name and password in cleartext in the aremote.dmp file in the ARCSERVE$ hidden share, which allows local and remote attackers to gain privileges.
[ "cpe:2.3:a:broadcom:arcserve_backup:6.61:sp2a:*:*:*:*:*:*", "cpe:2.3:a:broadcom:arcserve_backup_2000:*:*:*:*:*:*:*:*", "cpe:2.3:a:ca:arcserve_backup_2000:*:*:advanced:*:*:*:*:*" ]
null
null
null
10
null
GHSA-ccm6-q86p-2hwx
The server IKEv1 implementation in Cisco IOS 12.2 through 12.4 and 15.0 through 15.6, IOS XE through 3.18S, IOS XR 4.3.x and 5.0.x through 5.2.x, and PIX before 7.0 allows remote attackers to obtain sensitive information from device memory via a Security Association (SA) negotiation request, aka Bug IDs CSCvb29204 and CSCvb36055 or BENIGNCERTAIN.
[]
null
7.5
null
null
null
CVE-2017-1683
IBM Connections Engagement Center 6.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 134005.
[ "cpe:2.3:a:ibm:connections_engagement_center:6.0:*:*:*:*:*:*:*" ]
null
null
5.4
3.5
null
GHSA-q2wj-pp48-fpgj
Roundcube 1.5.x before 1.5.6 and 1.6.x before 1.6.5 allows XSS via a Content-Type or Content-Disposition header (used for attachment preview or download).
[]
null
6.1
null
null
null
CVE-2024-50142
xfrm: validate new SA's prefixlen using SA family when sel.family is unset
In the Linux kernel, the following vulnerability has been resolved: xfrm: validate new SA's prefixlen using SA family when sel.family is unset This expands the validation introduced in commit 07bf7908950a ("xfrm: Validate address prefix lengths in the xfrm selector.") syzbot created an SA with usersa.sel.family = AF_UNSPEC usersa.sel.prefixlen_s = 128 usersa.family = AF_INET Because of the AF_UNSPEC selector, verify_newsa_info doesn't put limits on prefixlen_{s,d}. But then copy_from_user_state sets x->sel.family to usersa.family (AF_INET). Do the same conversion in verify_newsa_info before validating prefixlen_{s,d}, since that's how prefixlen is going to be used later on.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:*" ]
null
5.5
null
null
null
CVE-2022-29562
A vulnerability has been identified in RUGGEDCOM ROX MX5000 (All versions < V2.16.0), RUGGEDCOM ROX MX5000RE (All versions < V2.16.0), RUGGEDCOM ROX RX1400 (All versions < V2.16.0), RUGGEDCOM ROX RX1500 (All versions < V2.16.0), RUGGEDCOM ROX RX1501 (All versions < V2.16.0), RUGGEDCOM ROX RX1510 (All versions < V2.16.0), RUGGEDCOM ROX RX1511 (All versions < V2.16.0), RUGGEDCOM ROX RX1512 (All versions < V2.16.0), RUGGEDCOM ROX RX1524 (All versions < V2.16.0), RUGGEDCOM ROX RX1536 (All versions < V2.16.0), RUGGEDCOM ROX RX5000 (All versions < V2.16.0). Affected devices do not properly handle malformed HTTP packets. This could allow an unauthenticated remote attacker to send a malformed HTTP packet causing certain functions to fail in a controlled manner.
[ "cpe:2.3:o:siemens:ruggedcom_rox_mx5000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:ruggedcom_rox_mx5000:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:ruggedcom_rox_mx5000re_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:ruggedcom_rox_mx5000re:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:ruggedcom_rox_rx1400_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:ruggedcom_rox_rx1400:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:ruggedcom_rox_rx1500_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:ruggedcom_rox_rx1500:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:ruggedcom_rox_rx1501_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:ruggedcom_rox_rx1501:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:ruggedcom_rox_rx1510_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:ruggedcom_rox_rx1510:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:ruggedcom_rox_rx1511_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:ruggedcom_rox_rx1511:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:ruggedcom_rox_rx1512_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:ruggedcom_rox_rx1512:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:ruggedcom_rox_rx1524_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:ruggedcom_rox_rx1524:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:ruggedcom_rox_rx1536_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:ruggedcom_rox_rx1536:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:ruggedcom_rox_rx5000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:ruggedcom_rox_rx5000:-:*:*:*:*:*:*:*" ]
null
3.7
null
null
null
GHSA-24wc-7r9r-xg28
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WEN Themes WEN Responsive Columns allows Stored XSS.This issue affects WEN Responsive Columns: from n/a through 1.3.2.
[]
null
6.5
null
null
null
RHSA-2021:0105
Red Hat Security Advisory: Red Hat Process Automation Manager 7.9.1 security update
XStream: remote code execution due to insecure XML deserialization when relying on blocklists
[ "cpe:/a:redhat:jboss_enterprise_bpms_platform:7.9" ]
null
9
null
null
null
GHSA-3m6c-6c98-23qq
The issue was addressed by restricting options offered on a locked device. This issue is fixed in macOS Ventura 13.7.1, macOS Sonoma 14.7.1. An attacker with physical access can input Game Controller events to apps running on a locked device.
[]
null
2.4
null
null
null
RHSA-2020:0790
Red Hat Security Advisory: kernel security and bug fix update
kernel: unprivileged users able to create RAW sockets in AF_ISDN network protocol kernel: buffer overflow in cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
8
4
null
null
GHSA-v495-vr49-324q
mount.ecryptfs_private.c in eCryptfs-utils does not validate mount destination filesystem types, which allows local users to gain privileges by mounting over a nonstandard filesystem, as demonstrated by /proc/$pid.
[]
null
8.4
null
null
null
CVE-2023-2322
Cross-site Scripting (XSS) - Stored in pimcore/pimcore
Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 10.5.21.
[ "cpe:2.3:a:pimcore:pimcore:*:*:*:*:*:*:*:*" ]
null
null
5.2
null
null
GHSA-35x6-wg3h-rrv6
Session fixation vulnerability in SYNO.PhotoStation.Auth in Synology Photo Station before 6.8.7-3481 allows remote attackers to hijack web sessions via the PHPSESSID parameter.
[]
null
null
6.3
null
null
GHSA-w4rw-xxg9-4xcp
Unrestricted file upload vulnerability in Yeager CMS 1.2.1 allows remote attackers to execute arbitrary code by uploading a file with an executable extension.
[]
null
null
7.8
null
null
CVE-2025-22616
WeGIA Cross-Site Scripting (XSS) Stored endpoint 'dependente_parentesco_adicionar.php' parameter 'descricao'
WeGIA is an open source web manager with a focus on the Portuguese language and charitable institutions. A Stored Cross-Site Scripting (XSS) vulnerability was identified in the `dependente_parentesco_adicionar.php` endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts into the `descricao` parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk. The application fails to properly validate and sanitize user inputs in the `dependente_parentesco_adicionar.php` parameter. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim's browser, potentially compromising the user's data and system. This issue has been addressed in version 3.2.6 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
[]
6.4
null
null
null
null
CVE-2021-27401
The Join Meeting page of Mitel MiCollab Web Client before 9.2 FP2 could allow an attacker to access (view and modify) user data by executing arbitrary code due to insufficient input validation, aka Cross-Site Scripting (XSS).
[ "cpe:2.3:a:mitel:micollab:*:*:*:*:*:-:*:*", "cpe:2.3:a:mitel:micollab:9.2:-:*:*:*:-:*:*", "cpe:2.3:a:mitel:micollab:9.2:fp1:*:*:*:-:*:*" ]
null
6.1
null
4.3
null
GHSA-c6rp-8vm7-pm5g
Windows Clustered Shared Volume Information Disclosure Vulnerability. This CVE ID is unique from CVE-2022-29122, CVE-2022-29123, CVE-2022-29134.
[]
null
6.5
null
null
null
ICSA-23-012-08
Siemens S7-1500 CPU devices
Affected devices do not contain an Immutable Root of Trust in Hardware. With this the integrity of the code executed on the device can not be validated during load-time. An attacker with physical access to the device could use this to replace the boot image of the device and execute arbitrary code.
[]
null
4.6
null
null
null
CVE-2019-13655
Imgix through 2019-06-19 allows remote attackers to cause a denial of service (resource consumption) by manipulating a small JPEG file to specify dimensions of 64250x64250 pixels, which is mishandled during an attempt to load the 'whole image' into memory.
[ "cpe:2.3:a:imgix:imgix:*:*:*:*:*:*:*:*" ]
null
null
6.5
4.3
null
GHSA-2g2x-6p8h-94w3
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 10.1.4.37651. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Document objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-13741.
[]
null
null
null
null
null
CVE-2025-21983
mm/slab/kvfree_rcu: Switch to WQ_MEM_RECLAIM wq
In the Linux kernel, the following vulnerability has been resolved: mm/slab/kvfree_rcu: Switch to WQ_MEM_RECLAIM wq Currently kvfree_rcu() APIs use a system workqueue which is "system_unbound_wq" to driver RCU machinery to reclaim a memory. Recently, it has been noted that the following kernel warning can be observed: <snip> workqueue: WQ_MEM_RECLAIM nvme-wq:nvme_scan_work is flushing !WQ_MEM_RECLAIM events_unbound:kfree_rcu_work WARNING: CPU: 21 PID: 330 at kernel/workqueue.c:3719 check_flush_dependency+0x112/0x120 Modules linked in: intel_uncore_frequency(E) intel_uncore_frequency_common(E) skx_edac(E) ... CPU: 21 UID: 0 PID: 330 Comm: kworker/u144:6 Tainted: G E 6.13.2-0_g925d379822da #1 Hardware name: Wiwynn Twin Lakes MP/Twin Lakes Passive MP, BIOS YMM20 02/01/2023 Workqueue: nvme-wq nvme_scan_work RIP: 0010:check_flush_dependency+0x112/0x120 Code: 05 9a 40 14 02 01 48 81 c6 c0 00 00 00 48 8b 50 18 48 81 c7 c0 00 00 00 48 89 f9 48 ... RSP: 0018:ffffc90000df7bd8 EFLAGS: 00010082 RAX: 000000000000006a RBX: ffffffff81622390 RCX: 0000000000000027 RDX: 00000000fffeffff RSI: 000000000057ffa8 RDI: ffff88907f960c88 RBP: 0000000000000000 R08: ffffffff83068e50 R09: 000000000002fffd R10: 0000000000000004 R11: 0000000000000000 R12: ffff8881001a4400 R13: 0000000000000000 R14: ffff88907f420fb8 R15: 0000000000000000 FS: 0000000000000000(0000) GS:ffff88907f940000(0000) knlGS:0000000000000000 CR2: 00007f60c3001000 CR3: 000000107d010005 CR4: 00000000007726f0 PKRU: 55555554 Call Trace: <TASK> ? __warn+0xa4/0x140 ? check_flush_dependency+0x112/0x120 ? report_bug+0xe1/0x140 ? check_flush_dependency+0x112/0x120 ? handle_bug+0x5e/0x90 ? exc_invalid_op+0x16/0x40 ? asm_exc_invalid_op+0x16/0x20 ? timer_recalc_next_expiry+0x190/0x190 ? check_flush_dependency+0x112/0x120 ? check_flush_dependency+0x112/0x120 __flush_work.llvm.1643880146586177030+0x174/0x2c0 flush_rcu_work+0x28/0x30 kvfree_rcu_barrier+0x12f/0x160 kmem_cache_destroy+0x18/0x120 bioset_exit+0x10c/0x150 disk_release.llvm.6740012984264378178+0x61/0xd0 device_release+0x4f/0x90 kobject_put+0x95/0x180 nvme_put_ns+0x23/0xc0 nvme_remove_invalid_namespaces+0xb3/0xd0 nvme_scan_work+0x342/0x490 process_scheduled_works+0x1a2/0x370 worker_thread+0x2ff/0x390 ? pwq_release_workfn+0x1e0/0x1e0 kthread+0xb1/0xe0 ? __kthread_parkme+0x70/0x70 ret_from_fork+0x30/0x40 ? __kthread_parkme+0x70/0x70 ret_from_fork_asm+0x11/0x20 </TASK> ---[ end trace 0000000000000000 ]--- <snip> To address this switch to use of independent WQ_MEM_RECLAIM workqueue, so the rules are not violated from workqueue framework point of view. Apart of that, since kvfree_rcu() does reclaim memory it is worth to go with WQ_MEM_RECLAIM type of wq because it is designed for this purpose.
[]
null
null
null
null
null
GHSA-xpcw-3w24-57xc
This issue was addressed with improved checks. This issue is fixed in macOS Big Sur 11.4, Security Update 2021-003 Catalina, Security Update 2021-004 Mojave, iOS 14.6 and iPadOS 14.6. Processing a maliciously crafted USD file may disclose memory contents.
[]
null
5.5
null
null
null
CVE-2017-0317
All versions of NVIDIA GPU and GeForce Experience installer contain a vulnerability where it fails to set proper permissions on the package extraction path thus allowing a non-privileged user to tamper with the extracted files, potentially leading to escalation of privileges via code execution.
[ "cpe:2.3:a:nvidia:gpu_driver:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
null
7.5
6.9
null
GHSA-5vpj-4f48-j8qc
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Asgaros Asgaros Forum allows Stored XSS. This issue affects Asgaros Forum: from n/a through 3.0.0.
[]
null
6.5
null
null
null
CVE-2014-9165
Use-after-free vulnerability in Adobe Reader and Acrobat 10.x before 10.1.13 and 11.x before 11.0.10 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2014-8454 and CVE-2014-8455.
[ "cpe:2.3:a:adobe:acrobat_reader:10.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:10.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:10.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:10.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:10.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:10.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:10.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:10.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:10.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:10.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:10.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:10.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:10.1.8:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:10.1.9:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:10.1.10:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:10.1.11:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:10.1.12:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:11.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:11.0.01:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:11.0.02:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:11.0.03:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:11.0.04:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:11.0.05:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:11.0.06:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:11.0.07:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:11.0.08:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:11.0.09:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.1.8:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.1.9:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.1.10:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.1.11:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.1.12:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:11.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:11.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:11.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:11.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:11.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:11.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:11.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:11.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:11.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:11.0.9:*:*:*:*:*:*:*" ]
null
null
null
10
null
GHSA-499w-c4pr-hwwh
Priority Web version 19.1.0.68, parameter manipulation on an unspecified end-point may allow authentication bypass.
[]
null
9.8
null
null
null
CVE-2021-34484
Windows User Profile Service Elevation of Privilege Vulnerability
Windows User Profile Service Elevation of Privilege Vulnerability
[ "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2114:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2114:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2114:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2114:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1734:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1734:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1809:10.0.18363.1734:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1165:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1165:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1165:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1809:10.0.19041.1165:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2004:10.0.19041.1165:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_20h2:10.0.19042.1165:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_20h2:10.0.19042.1165:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_server_20h2:10.0.19042.1165:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19022:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19022:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.4583:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.4583:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.4583:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:6.1.7601.25685:sp1:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_7:6.1.7601.25685:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20094:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20094:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_rt_8.1:6.3.9600.20094:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21192:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21192:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_server_2008_r2:6.1.7601.25685:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23435:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012_r2:6.3.9600.20094:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_2004:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_21h1:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2004:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_20h2:*:*:*:*:*:*:*:*" ]
null
7.8
null
null
null
CVE-2006-0012
Unspecified vulnerability in Windows Explorer in Microsoft Windows 2000 SP4, XP SP1 and SP2, and Server 2003 SP1 allows remote attackers to execute arbitrary code via attack vectors involving COM objects and "crafted files and directories," aka the "Windows Shell Vulnerability."
[ "cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2000:*:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2000:*:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2000:*:sp3:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2003_server:datacenter_64-bit:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2003_server:enterprise:*:64-bit:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2003_server:enterprise:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2003_server:enterprise_64-bit:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2003_server:enterprise_64-bit:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2003_server:r2:*:64-bit:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2003_server:r2:*:datacenter_64-bit:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2003_server:r2:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2003_server:standard:*:64-bit:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2003_server:standard:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2003_server:standard_64-bit:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2003_server:web:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2003_server:web:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_98:*:gold:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_98se:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_me:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:*:64-bit:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:*:home:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:*:media_center:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:gold:professional:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:sp1:home:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:sp1:media_center:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:sp2:home:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:sp2:media_center:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:sp2:tablet_pc:*:*:*:*:*" ]
null
null
null
5.1
null
GHSA-pr6w-w2r2-gm2g
Improper directory permissions in Intel(R) PROSet/Wireless WiFi Software before version 21.40 may allow an authenticated user to potentially enable denial of service and information disclosure via local access.
[]
null
null
null
null
null
GHSA-3g7x-q6q4-3cqc
Unspecified vulnerability in Vignette Content Management 7.3.0.5, 7.3.1, 7.3.1.1, 7.4, and 7.5 allows "low privileged" users to gain administrator privileges via unknown attack vectors.
[]
null
null
null
null
null
GHSA-q6h2-p7mg-mcvj
Cross-Site Scripting (XSS) vulnerability affecting LocalServer 1.0.9 that could allow a remote user to send a specially crafted query to an authenticated user and steal their session details through /testmail/index.php, parameter to.
[]
null
6.1
null
null
null
GHSA-pxf7-7jp8-6443
Argument injection vulnerability in HyperAccess 8.4 allows user-assisted remote attackers to execute arbitrary vbscript and commands via the /r option in a telnet:// URI, which is configured to use hawin32.exe.
[]
null
null
null
null
null
CVE-2021-29645
Hitachi JP1/IT Desktop Management 2 Agent 9 through 12 calls the SendMessageTimeoutW API with arbitrary arguments via a local pipe, leading to a local privilege escalation vulnerability. An attacker who exploits this issue could execute arbitrary code on the local system.
[ "cpe:2.3:a:hitachi:it_operations_director:*:*:*:*:*:*:*:*", "cpe:2.3:a:hitachi:job_management_partner_1\\/it_desktop_management-manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:hitachi:job_management_partner_1\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:hitachi:job_management_partner_1\\/remote_control_agent:*:*:*:*:*:*:*:*", "cpe:2.3:a:hitachi:job_management_partner_1\\/software_distribution_client:*:*:*:*:*:*:*:*", "cpe:2.3:a:hitachi:job_management_partner_1\\/software_distribution_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:hitachi:jp1\\/it_desktop_management-manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-operations_director:*:*:*:*:*:*:*:*", "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client:*:*:*:*:*:*:*:*", "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*", "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:hitachi:jp1\\/netm\\/remote_control_feature:*:*:*:*:*:*:*:*", "cpe:2.3:a:hitachi:jp1\\/remote_control_feature:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
7
null
null
null
CVE-2019-8019
Adobe Acrobat and Reader versions 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have a type confusion vulnerability. Successful exploitation could lead to arbitrary code execution .
[ "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
8.8
null
6.8
null
GHSA-32w4-gwv8-pcf9
The DOM implementation in Google Chrome before 47.0.2526.73 allows remote attackers to bypass the Same Origin Policy via unspecified vectors, a different vulnerability than CVE-2015-6768.
[]
null
null
null
null
null
CVE-2025-24141
An authentication issue was addressed with improved state management. This issue is fixed in iOS 18.3 and iPadOS 18.3. An attacker with physical access to an unlocked device may be able to access Photos while the app is locked.
[]
null
3.3
null
null
null
CVE-2002-2006
The default installation of Apache Tomcat 4.0 through 4.1 and 3.0 through 3.3.1 allows remote attackers to obtain the installation path and other sensitive system information via the (1) SnoopServlet or (2) TroubleShooter example servlets.
[ "cpe:2.3:a:apache:tomcat:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:3.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:3.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:3.2:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:3.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:3.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:3.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:3.3:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:3.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:4.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:4.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:4.1.0:*:*:*:*:*:*:*" ]
null
null
null
5
null
GHSA-xffw-rwp4-xcg6
The diagnostics subsystem in the administrative web interface on Cisco Virtualization Experience (aka VXC) Client 6215 devices with firmware 11.2(27.4) allows local users to gain privileges for OS command execution via a crafted option value, aka Bug ID CSCug54412.
[]
null
null
null
null
null
GHSA-9445-66j5-fhvj
The telnet administrator service running on port 650 on Gigaset DX600A v41.00-175 devices does not implement any lockout or throttling functionality. This situation (together with the weak password policy that forces a 4-digit password) allows remote attackers to easily obtain administrative access via brute-force attacks.
[]
null
9.8
null
null
null
GHSA-vf47-jc4w-pj9g
Multiple unspecified vulnerabilities in G15Daemon before 1.9.4 have unknown impact and attack vectors.
[]
null
null
null
null
null
GHSA-8gp3-qc4x-vw92
An exploitable use-after-free vulnerability exists in the JavaScript engine of Foxit Reader before 9.3 and PhantomPDF before 9.3, a different vulnerability than CVE-2018-16291, CVE-2018-16292, CVE-2018-16293, CVE-2018-16295, CVE-2018-16296, and CVE-2018-16297. A specially crafted PDF document can trigger a previously freed object in memory to be reused, resulting in arbitrary code execution. An attacker needs to trick the user to open the malicious file to trigger this vulnerability. If the browser plugin extension is enabled, visiting a malicious site can also trigger the vulnerability.
[]
null
null
7.8
null
null
RHSA-2004:005
Red Hat Security Advisory: kdepim security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
null
GHSA-44m8-rxc2-jwp2
The svnserve server in Subversion before 1.6.23 and 1.7.x before 1.7.10 allows remote attackers to cause a denial of service (exit) by aborting a connection.
[]
null
null
null
null
null
CVE-2006-4716
PHP remote file inclusion vulnerability in demarrage.php in Fire Soft Board (FSB) RC3 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the racine parameter.
[ "cpe:2.3:a:fire_soft_board:fire_soft_board:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
GHSA-p8mg-76fj-rc53
IBM Tivoli Workload Scheduler 9.4, 9.5, and 10.1 is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 226328.
[]
null
9.1
null
null
null
CVE-2012-1815
SQL injection vulnerability in Emerson DeltaV and DeltaV Workstations 9.3.1, 10.3.1, 11.3, and 11.3.1 and DeltaV ProEssentials Scientific Graph 5.0.0.6 allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
[ "cpe:2.3:a:emerson:deltav:9.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:emerson:deltav:10.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:emerson:deltav:11.3:*:*:*:*:*:*:*", "cpe:2.3:a:emerson:deltav:11.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:emerson:deltav_proessentials_scientific_graph:5.0.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:emerson:deltav_workstation:9.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:emerson:deltav_workstation:10.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:emerson:deltav_workstation:11.3:*:*:*:*:*:*:*", "cpe:2.3:a:emerson:deltav_workstation:11.3.1:*:*:*:*:*:*:*" ]
null
null
null
7.5
null