id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
189k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
patch_commit_url
stringlengths
36
232
CVE-2018-1425
IBM Security Guardium Big Data Intelligence (SonarG) 3.1 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 139003.
[ "cpe:2.3:a:ibm:security_guardium_big_data_intelligence:3.1:*:*:*:*:*:*:*" ]
null
null
5.9
4.3
null
CVE-2024-36236
Adobe Experience Manager | Cross-site Scripting (DOM-based XSS) (CWE-79)
Adobe Experience Manager versions 6.5.20 and earlier Answer: are affected by a DOM-based Cross-Site Scripting (XSS) vulnerability. This vulnerability could allow an attacker to execute arbitrary JavaScript code in the context of the victim's browser session. Exploitation of this issue requires user interaction, such as convincing a victim to click on a specially crafted link.
[ "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*" ]
null
5.4
null
null
null
RHSA-2017:0065
Red Hat Security Advisory: kernel security update
kernel: Use-after-free in the recvmmsg exit path
[ "cpe:/o:redhat:rhel_aus:6.5::server", "cpe:/o:redhat:rhel_tus:6.5::server" ]
null
null
8.1
null
null
GHSA-m5g7-g5cj-mjrh
ClamAV 0.92 does not recognize Base64 UUEncoded archives, which allows remote attackers to bypass the scanner via a Base64-UUEncoded file.
[]
null
null
null
null
null
GHSA-7547-299x-4pmv
Improper session management vulnerability in Samsung Health prior to 6.20.1.005 prevents logging out from Samsung Health App.
[]
null
null
null
null
null
CVE-2008-0738
Multiple SQL injection vulnerabilities in CandyPress (CP) 4.1.1.26, and earlier 4.1.x versions, allow remote attackers to execute arbitrary SQL commands via the (1) idcust parameter to (a) ajax_getTiers.asp and (b) ajax_getCust.asp in ajax/, and the (2) tableName parameter to (c) ajax/ajax_tableFields.asp. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
[ "cpe:2.3:a:shoppingtree:candypress_store:*:*:*:*:*:*:*:*", "cpe:2.3:a:shoppingtree:candypress_store:4.1.1.26:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2025-24479
FactoryTalk® View Machine Edition - Local Code Injection
A Local Code Execution Vulnerability exists in the product and version listed above. The vulnerability is due to a default setting in Windows and allows access to the Command Prompt as a higher privileged user.
[]
8.6
null
null
null
null
CVE-1999-1514
Buffer overflow in Celtech ExpressFS FTP server 2.x allows remote attackers to cause a denial of service, and possibly execute arbitrary commands, via a long USER command.
[ "cpe:2.3:a:celtech_software:expressfs:2.6:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2021-27602
SAP Commerce, versions - 1808, 1811, 1905, 2005, 2011, Backoffice application allows certain authorized users to create source rules which are translated to drools rule when published to certain modules within the application. An attacker with this authorization can inject malicious code in the source rules and perform remote code execution enabling them to compromise the confidentiality, integrity and availability of the application.
[ "cpe:2.3:a:sap:commerce:1808:*:*:*:*:*:*:*", "cpe:2.3:a:sap:commerce:1811:*:*:*:*:*:*:*", "cpe:2.3:a:sap:commerce:1905:*:*:*:*:*:*:*", "cpe:2.3:a:sap:commerce:2005:*:*:*:*:*:*:*", "cpe:2.3:a:sap:commerce:2011:*:*:*:*:*:*:*" ]
null
null
9.9
null
null
CVE-2022-24453
HEVC Video Extensions Remote Code Execution Vulnerability
HEVC Video Extensions Remote Code Execution Vulnerability
[ "cpe:2.3:a:microsoft:hevc_video_extensions:*:*:*:*:*:*:*:*" ]
null
7.8
null
null
null
GHSA-v2f2-hxv3-5cx2
Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.64 and earlier, and 5.5.26 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer.
[]
null
null
null
null
null
CVE-2021-0234
Junos OS: QFX5100-96S: DDoS protection does not work as expected.
Due to an improper Initialization vulnerability on Juniper Networks Junos OS QFX5100-96S devices with QFX 5e Series image installed, ddos-protection configuration changes will not take effect beyond the default DDoS (Distributed Denial of Service) settings when configured from the CLI. The DDoS protection (jddosd) daemon allows the device to continue to function while protecting the packet forwarding engine (PFE) during the DDoS attack. When this issue occurs, the default DDoS settings within the PFE apply, as CPU bound packets will be throttled and dropped in the PFE when the limits are exceeded. To check if the device has this issue, the administrator can execute the following command to monitor the status of DDoS protection: user@device> show ddos-protection protocols error: the ddos-protection subsystem is not running This issue affects only QFX5100-96S devices. No other products or platforms are affected by this issue. This issue affects: Juniper Networks Junos OS on QFX5100-96S: 17.3 versions prior to 17.3R3-S10; 17.4 versions prior to 17.4R3-S4; 18.1 versions prior to 18.1R3-S10; 18.2 versions prior to 18.2R3-S3; 18.3 versions prior to 18.3R3-S2; 18.4 versions prior to 18.4R2-S4, 18.4R3-S1; 19.1 versions prior to 19.1R3, 19.1R3-S4; 19.2 versions prior to 19.2R2; 19.3 versions prior to 19.3R3; 19.4 versions prior to 19.4R2;
[ "cpe:2.3:o:juniper:junos:17.3:-:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.3:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.3:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.3:r1-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.3:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.3:r2-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.3:r2-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.3:r2-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.3:r2-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.3:r2-s5:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.3:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.3:r3:-:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.3:r3-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.3:r3-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.3:r3-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.3:r3-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.3:r3-s5:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.3:r3-s6:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.3:r3-s7:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.3:r3-s8:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.3:r3-s9:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.4:-:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.4:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.4:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.4:r1-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.4:r1-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.4:r1-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.4:r1-s5:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.4:r1-s6:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.4:r1-s7:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.4:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.4:r2-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.4:r2-s10:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.4:r2-s11:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.4:r2-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.4:r2-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.4:r2-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.4:r2-s5:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.4:r2-s6:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.4:r2-s7:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.4:r2-s8:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.4:r2-s9:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.4:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.4:r3-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.4:r3-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.4:r3-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.1:-:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.1:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.1:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.1:r2-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.1:r2-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.1:r2-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.1:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.1:r3-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.1:r3-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.1:r3-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.1:r3-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.1:r3-s5:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.1:r3-s6:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.1:r3-s7:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.1:r3-s8:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.1:r3-s9:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.2:-:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.2:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.2:r1:-:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.2:r1-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.2:r1-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.2:r1-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.2:r1-s5:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.2:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.2:r2-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.2:r2-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.2:r2-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.2:r2-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.2:r2-s5:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.2:r2-s6:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.2:r2-s7:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.2:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.2:r3-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.2:r3-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.3:-:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.3:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.3:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.3:r1-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.3:r1-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.3:r1-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.3:r1-s5:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.3:r1-s6:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.3:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.3:r2-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.3:r2-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.3:r2-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.3:r2-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.3:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.3:r3-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:-:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:r1-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:r1-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:r1-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:r1-s5:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:r1-s6:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:r1-s7:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:r2-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:r2-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:r2-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.1:-:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.1:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.1:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.1:r1-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.1:r1-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.1:r1-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.1:r1-s5:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.1:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.1:r2-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.1:r2-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.1:r3-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.1:r3-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.1:r3-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.2:-:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.2:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.2:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.2:r1-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.2:r1-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.2:r1-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.2:r1-s5:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.2:r1-s6:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.3:-:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.3:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.3:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.3:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.3:r2-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.3:r2-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.3:r2-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.3:r2-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.3:r2-s5:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r1-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r1-s3:*:*:*:*:*:*", "cpe:2.3:h:juniper:qfx5100-96s:-:*:*:*:*:*:*:*" ]
null
5.8
null
null
null
GHSA-hgxv-8gp2-j88j
In gasket_free_coherent_memory_all of gasket_page_table.c, there is a possible memory corruption due to a double free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-151454974References: N/A
[]
null
6.7
null
null
null
GHSA-vqx3-p34h-gjh5
The BackWPup plugin for WordPress is vulnerable to Plaintext Storage of Backup Destination Password in all versions up to, and including, 4.0.2. This is due to to the plugin improperly storing backup destination passwords in plaintext. This makes it possible for authenticated attackers, with administrator-level access, to retrieve the password from the password input field in the UI or from the options table where the password is stored.
[]
null
2.2
null
null
null
CVE-2024-2023
Folders <= 3.0 and Folders Pro <= 3.0.2 - Directory Traversal via handle_folders_file_upload
The Folders and Folders Pro plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 3.0 in Folders and 3.0.2 in Folders Pro via the 'handle_folders_file_upload' function. This makes it possible for authenticated attackers, with author access and above, to upload files to arbitrary locations on the server.
[ "cpe:2.3:a:premio:folders:*:*:*:*:*:wordpress:*:*", "cpe:2.3:a:premio:folders_pro:*:*:*:*:*:*:*:*" ]
null
4.3
null
null
null
CVE-2024-13445
Elementor Website Builder – More Than Just a Page Builder <= 3.27.4 - Authenticated (Contributor+) Stored Cross-Site Scripting
The Elementor Website Builder – More Than Just a Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the border, margin and gap parameters in all versions up to, and including, 3.27.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
6.4
null
null
null
GHSA-cwq3-9m45-v2wc
Directory traversal vulnerability in includes/controller.php in Pulse CMS Basic before 1.2.9 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the p parameter to index.php.
[]
null
null
null
null
null
GHSA-v6ff-g4q4-fqx2
There is an Assertion 'page_p != NULL' failed at /parser/js/js-parser-mem.c(parser_list_get) in JerryScript 3.0.0.
[]
null
null
null
null
null
GHSA-9v2g-635q-h56f
Multiple SQL injection vulnerabilities in default.asp in Site2Nite allow remote attackers to execute arbitrary SQL commands via the (1) txtUserName and (2) txtPassword parameters. NOTE: some of these details are obtained from third party information.
[]
null
null
null
null
null
CVE-2017-2100
Hands-on Vulnerability Learning Tool "AppGoat" for Web Application V3.0.1 and earlier allows remote attackers to conduct DNS rebinding attacks via unspecified vectors.
[ "cpe:2.3:a:ipa:appgoat:*:*:*:*:*:*:*:*" ]
null
null
6.3
6.8
null
GHSA-fgmc-hghq-mhhv
Directory Traversal vulnerability in Hex-Dragon Plain Craft Launcher 2 version Alpha 1.3.9, allows local attackers to execute arbitrary code and gain sensitive information.
[]
null
7.8
null
null
null
GHSA-3p63-xccw-wppw
A vulnerability has been found in PHPGurukul e-Diary Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file /search-result.php. The manipulation of the argument searchdata leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
[]
5.3
6.3
null
null
null
GHSA-g44m-wxp5-6q6h
Cross-Site Request Forgery (CSRF) vulnerability in eyecix JobSearch allows Cross Site Request Forgery.This issue affects JobSearch: from n/a through 2.5.3.
[]
null
4.3
null
null
null
GHSA-p5g4-jr8m-xjw5
IrfanView DXF File Parsing Memory Corruption Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of DXF files. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24703.
[]
null
null
7.8
null
null
GHSA-xm65-9x7h-29gw
Net-SNMP before 5.0.9 allows a user or community to access data in MIB objects, even if that data is not allowed to be viewed.
[]
null
null
null
null
null
CVE-2013-0925
Google Chrome before 26.0.1410.43 does not ensure that an extension has the tabs (aka APIPermission::kTab) permission before providing a URL to this extension, which has unspecified impact and remote attack vectors.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.2:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.3:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.4:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.5:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.6:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.7:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.8:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.9:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.10:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.11:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.12:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.14:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.15:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.16:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.17:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.18:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.19:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.20:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.21:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.22:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.23:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.24:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.25:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.26:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.27:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.28:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.29:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.30:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.31:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.32:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.33:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.34:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.35:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.36:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.37:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.38:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.39:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.40:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.41:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2025-54042
WordPress WP Post Hide plugin <= 1.0.9 - Cross Site Request Forgery (CSRF) Vulnerability
Cross-Site Request Forgery (CSRF) vulnerability in xfinitysoft WP Post Hide allows Cross Site Request Forgery. This issue affects WP Post Hide: from n/a through 1.0.9.
[]
null
4.3
null
null
null
GHSA-58cf-923h-gc5m
A vulnerability was found in SourceCodester Company Website CMS 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file /dashboard/createblog of the component Create Blog Page. The manipulation leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-244310 is the identifier assigned to this vulnerability.
[]
null
null
4.7
null
null
GHSA-6g7v-365p-9jh2
In registerSignalHandlers of main.c, there is a possible local arbitrary code execution due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-256591441
[]
null
6.7
null
null
null
GHSA-3wfw-cf7h-38c7
A vulnerability in the storage method of the PON Controller configuration file could allow an authenticated, local attacker with low privileges to obtain the MongoDB credentials.This vulnerability is due to improper storage of the unencrypted database credentials on the device that is running Cisco IOS XR Software. An attacker could exploit this vulnerability by accessing the configuration files on an affected system. A successful exploit could allow the attacker to view MongoDB credentials.
[]
null
8.4
null
null
null
CVE-2014-4262
Unspecified vulnerability in Oracle Java SE 5.0u65, 6u75, 7u60, and 8u5 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.
[ "cpe:2.3:a:oracle:jdk:1.5.0:update65:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update75:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update60:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.8.0:update5:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:update65:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update75:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update60:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.8.0:update5:*:*:*:*:*:*" ]
null
null
null
9.3
null
RHSA-2023:3366
Red Hat Security Advisory: OpenShift Container Platform 4.13.2 packages and security update
golang: crash in a golang.org/x/crypto/ssh server golang: path/filepath: path-filepath filepath.Clean path traversal golang: crypto/tls: large handshake records may cause panics golang: net/http, net/textproto: denial of service from excessive memory allocation golang: go/parser: Infinite loop in parsing golang: html/template: backticks not treated as string delimiters golang: html/template: improper sanitization of CSS values golang: html/template: improper handling of JavaScript whitespace golang: html/template: improper handling of empty HTML attributes
[ "cpe:/a:redhat:openshift:4.13::el8", "cpe:/a:redhat:openshift:4.13::el9", "cpe:/a:redhat:openshift_ironic:4.13::el9" ]
null
7.3
null
null
null
CVE-2008-2144
Multiple unspecified vulnerabilities in Solaris print service for Sun Solaris 8, 9, and 10 allow remote attackers to cause a denial of service or execute arbitrary code via unknown vectors.
[ "cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*", "cpe:2.3:o:sun:sunos:5.9:*:*:*:*:*:*:*", "cpe:2.3:o:sun:sunos:5.10:*:*:*:*:*:*:*" ]
null
null
null
10
null
CVE-2017-12630
In Apache Drill 1.11.0 and earlier when submitting form from Query page users are able to pass arbitrary script or HTML which will take effect on Profile page afterwards. Example: after submitting special script that returns cookie information from Query page, malicious user may obtain this information from Profile page afterwards.
[ "cpe:2.3:a:apache:drill:*:*:*:*:*:*:*:*" ]
null
null
5.4
3.5
null
CVE-2003-0088
TruBlueEnvironment for MacOS 10.2.3 and earlier allows local users to overwrite or create arbitrary files and gain root privileges by setting a certain environment variable that is used to write debugging information.
[ "cpe:2.3:o:apple:mac_os_x:10.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.2.3:*:*:*:*:*:*:*" ]
null
null
null
7.2
null
GHSA-26wc-mjpc-3f8m
Vulnerability in Realtek RtsPer driver for PCIe Card Reader (RtsPer.sys) before 10.0.22000.21355 and Realtek RtsUer driver for USB Card Reader (RtsUer.sys) before 10.0.22000.31274 leaks driver logs that contain addresses of kernel mode objects, weakening KASLR.
[]
null
5.5
null
null
null
GHSA-m5jj-3fxw-8572
Adobe Shockwave Player before 11.6.1.629 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.
[]
null
null
null
null
null
CVE-2022-4819
HotCRP cross site scripting
A vulnerability was found in HotCRP. It has been rated as problematic. Affected by this issue is some unknown functionality. The manipulation leads to cross site scripting. The attack may be launched remotely. The name of the patch is d4ffdb0ef806453c54ddca7fdda3e5c60356285c. It is recommended to apply a patch to fix this issue. VDB-216998 is the identifier assigned to this vulnerability.
[ "cpe:2.3:a:hotcrp:hotcrp:-:*:*:*:*:*:*:*" ]
null
2.4
2.4
null
https://github.com/kohler/hotcrp/commit/d4ffdb0ef806453c54ddca7fdda3e5c60356285c
CVE-2024-21108
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 7.0.16. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 3.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N).
[ "cpe:2.3:a:oracle:vm_virtualbox:prior_to_7.0.16:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*" ]
null
3.3
null
null
null
CVE-2024-38063
Windows TCP/IP Remote Code Execution Vulnerability
Windows TCP/IP Remote Code Execution Vulnerability
[ "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*" ]
null
9.8
null
null
null
CVE-2006-5369
Unspecified vulnerability in Oracle Application Object Library in Oracle E-Business Suite 11.5.10CU2 has unknown impact and remote authenticated attack vectors, aka Vuln# APPS02.
[ "cpe:2.3:a:oracle:e-business_suite:11.5.10.2:*:*:*:*:*:*:*" ]
null
null
null
10
null
CVE-2025-23510
WordPress WordPress Logging Service plugin <= 1.5.4 - CSRF to Stored Cross Site Scripting (XSS) vulnerability
Cross-Site Request Forgery (CSRF) vulnerability in Zaantar WordPress Logging Service allows Stored XSS.This issue affects WordPress Logging Service: from n/a through 1.5.4.
[]
null
7.1
null
null
null
CVE-2014-4061
Microsoft SQL Server 2008 SP3, 2008 R2 SP2, and 2012 SP1 does not properly control use of stack memory for processing of T-SQL batch commands, which allows remote authenticated users to cause a denial of service (daemon hang) via a crafted T-SQL statement, aka "Microsoft SQL Server Stack Overrun Vulnerability."
[ "cpe:2.3:a:microsoft:sql_server:2008:r2_sp2:itanium:*:*:*:*:*", "cpe:2.3:a:microsoft:sql_server:2008:r2_sp2:x64:*:*:*:*:*", "cpe:2.3:a:microsoft:sql_server:2008:r2_sp2:x86:*:*:*:*:*", "cpe:2.3:a:microsoft:sql_server:2008:sp3:itanium:*:*:*:*:*", "cpe:2.3:a:microsoft:sql_server:2008:sp3:x64:*:*:*:*:*", "cpe:2.3:a:microsoft:sql_server:2008:sp3:x86:*:*:*:*:*", "cpe:2.3:a:microsoft:sql_server:2012:sp1:x64:*:*:*:*:*", "cpe:2.3:a:microsoft:sql_server:2012:sp1:x86:*:*:*:*:*" ]
null
null
null
6.8
null
CVE-2025-21879
btrfs: fix use-after-free on inode when scanning root during em shrinking
In the Linux kernel, the following vulnerability has been resolved: btrfs: fix use-after-free on inode when scanning root during em shrinking At btrfs_scan_root() we are accessing the inode's root (and fs_info) in a call to btrfs_fs_closing() after we have scheduled the inode for a delayed iput, and that can result in a use-after-free on the inode in case the cleaner kthread does the iput before we dereference the inode in the call to btrfs_fs_closing(). Fix this by using the fs_info stored already in a local variable instead of doing inode->root->fs_info.
[]
null
7.8
null
null
null
GHSA-pxhq-xq33-27qf
Unspecified vulnerability in HP ProCurve 9300m Series switches with software 08.0.01c through 08.0.01j allows remote attackers to cause a denial of service via unknown vectors, a different switch series than CVE-2006-4015.
[]
null
null
null
null
null
CVE-2024-23135
Multiple Vulnerabilities in the Autodesk AutoCAD Desktop Software
A maliciously crafted SLDPRT file in ASMkern228A.dll when parsed through Autodesk applications can be used in user-after-free vulnerability. This vulnerability, along with other vulnerabilities, could lead to code execution in the current process.
[ "cpe:2.3:a:autodesk:autocad_advance_steel:2021:*:*:*:*:*:*:*", "cpe:2.3:a:autodesk:autocad_advance_steel:2022:*:*:*:*:*:*:*", "cpe:2.3:a:autodesk:autocad_advance_steel:2023:*:*:*:*:*:*:*", "cpe:2.3:a:autodesk:autocad_advance_steel:2024:*:*:*:*:*:*:*", "cpe:2.3:a:autodesk:autocad_advance_steel:2025:*:*:*:*:*:*:*", "cpe:2.3:a:autodesk:autocad_civil_3d:2021:*:*:*:*:*:*:*", "cpe:2.3:a:autodesk:autocad_civil_3d:2022:*:*:*:*:*:*:*", "cpe:2.3:a:autodesk:autocad_civil_3d:2023:*:*:*:*:*:*:*", "cpe:2.3:a:autodesk:autocad_civil_3d:2024:*:*:*:*:*:*:*", "cpe:2.3:a:autodesk:autocad_civil_3d:2025:*:*:*:*:*:*:*", "cpe:2.3:a:autodesk:autocad:2021:*:*:*:*:*:*:*", "cpe:2.3:a:autodesk:autocad:2022:*:*:*:*:*:*:*", "cpe:2.3:a:autodesk:autocad:2023:*:*:*:*:*:*:*", "cpe:2.3:a:autodesk:autocad:2024:*:*:*:*:*:*:*", "cpe:2.3:a:autodesk:autocad:2025:*:*:*:*:*:*:*" ]
null
7.8
null
null
null
GHSA-672j-xwv9-5wq3
FON La Fonera routers do not properly limit DNS service access by unauthenticated clients, which allows remote attackers to tunnel traffic via DNS requests for hosts that should not be accessible before authentication.
[]
null
null
null
null
null
GHSA-7hqx-w6mq-g592
check_input_term in sound/usb/mixer.c in the Linux kernel through 5.2.9 mishandles recursion, leading to kernel stack exhaustion.
[]
null
5.5
null
null
null
RHSA-2025:10374
Red Hat Security Advisory: tigervnc security update
xorg-x11-server-Xwayland: xorg-x11-server: tigervnc: Out-of-Bounds Read in X Rendering Extension Animated Cursors xorg-x11-server-Xwayland: xorg-x11-server: tigervnc: Integer Overflow in Big Requests Extension xorg-x11-server-Xwayland: xorg-x11-server: tigervnc: Unprocessed Client Request Due to Bytes to Ignore xorg-x11-server-Xwayland: xorg-x11-server: tigervnc: Integer overflow in X Record extension xorg-x11-server-Xwayland: xorg-x11-server: tigervnc: Integer Overflow in X Resize, Rotate and Reflect (RandR) Extension
[ "cpe:/a:redhat:rhel_eus:9.4::appstream" ]
null
7.8
null
null
null
CVE-2007-1807
SQL injection vulnerability in modules/myalbum/viewcat.php in the myAlbum-P 2.0 and earlier module for Xoops allows remote attackers to execute arbitrary SQL commands via the cid parameter.
[ "cpe:2.3:a:peak_xoops:myalbum_p:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2014-8585
Directory traversal vulnerability in the WordPress Download Manager plugin for WordPress allows remote attackers to read arbitrary files via a .. (dot dot) in the fname parameter to (1) views/file_download.php or (2) file_download.php.
[ "cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:1.1:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:1.2:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:1.2.1:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:1.2.2:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:1.2.3:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:1.2.4:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:1.2.5:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:1.3:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:1.4:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:1.5:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:1.5.1:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:1.5.2:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:1.5.3:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:1.5.9:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:1.5.32:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:1.5.33:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.0.1:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.0.2:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.0.3:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.0.4:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.0.5:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.0.6:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.0.7:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.0.8:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.0.9:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.0.10:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.0.11:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.0.12:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.0.13:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.0.14:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.0.15:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.0.16:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.0.17:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.0.18:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.0.19:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.1.0:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.1.1:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.1.2:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.1.3:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.2.0:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.2.1:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.2.2:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.2.3:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.2.4:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.2.5:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.2.6:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.2.7:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.2.8:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.2.9:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.3.0:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.3.1:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.3.2:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.3.3:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.3.4:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.3.5:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.3.6:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.3.7:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.3.8:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.3.9:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.4.0:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.4.1:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.4.2:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.4.3:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.4.4:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.4.5:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.4.6:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.4.7:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.4.8:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.4.9:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.5.0:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.5.1:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.5.2:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.5.3:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.5.4:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.5.5:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.5.6:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.5.7:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.5.8:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.5.9:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.5.91:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.5.92:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.5.93:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.5.94:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.5.95:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.5.96:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.5.97:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.5.98:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.5.99:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.6.0:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.6.1:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.6.2:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.6.3:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.6.4:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.6.5:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.6.6:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.6.7:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.6.8:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.6.9:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.6.91:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.6.92:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.6.93:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.6.94:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.6.95:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.6.96:*:*:*:*:wordpress:*:*" ]
null
null
null
5
null
CVE-2020-12684
XXE injection can occur in i-net Clear Reports 2019 19.0.287 (Designer), as used in i-net HelpDesk and other products, when XML input containing a reference to an external entity is processed by a weakly configured XML parser.
[ "cpe:2.3:a:inetsoftware:i-net_clear_reports:19.0.287:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
null
GHSA-g8w8-65mq-pgmc
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in anzia Ni WooCommerce Order Export allows Reflected XSS.This issue affects Ni WooCommerce Order Export: from n/a through 3.1.6.
[]
null
7.1
null
null
null
CVE-2022-22890
There is an Assertion 'arguments_type != SCANNER_ARGUMENTS_PRESENT && arguments_type != SCANNER_ARGUMENTS_PRESENT_NO_REG' failed at /jerry-core/parser/js/js-scanner-util.c in Jerryscript 3.0.0.
[ "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*" ]
null
5.5
null
5
null
RHSA-2008:0814
Red Hat Security Advisory: condor security and bug fix update
condor: incorrect handling of wild cards in authorization lists
[ "cpe:/a:redhat:enterprise_mrg:1::el5" ]
null
null
null
null
null
GHSA-vqr7-r45q-8887
SQL injection vulnerability in product_cat in AgileBill 1.4.92 and earlier allows remote attackers to execute arbitrary SQL commands via the id parameter.
[]
null
null
null
null
null
GHSA-pqq3-38c3-35qx
ASUSTOR Data Master 3.1.5 and below allows authenticated remote non-administrative users to read any file on the file system when providing the full path to loginimage.cgi.
[]
null
null
6.5
null
null
GHSA-qj43-c67c-c7c5
A Denial-of-Service (DoS) vulnerability was discovered in F-Secure & WithSecure products whereby the aegen.dll will go into an infinite loop when unpacking PE files. This eventually leads to scanning engine crash. The exploit can be triggered remotely by an attacker.
[]
null
7.5
null
null
null
GHSA-hqx2-pqrp-v2ph
The Envo's Elementor Templates & Widgets for WooCommerce plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.4.4. This is due to missing or incorrect nonce validation on the ajax_plugin_activation function. This makes it possible for unauthenticated attackers to activate arbitrary installed plugins via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
[]
null
4.3
null
null
null
CVE-2002-1651
Cross-site scripting (XSS) vulnerability in Verity Search97 allows remote attackers to insert arbitrary web content and steal sensitive information from other clients, possibly due to certain error messages from template pages that use the (1) vformat or (2) vfilter functions.
[ "cpe:2.3:a:verity:search97:2.1:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
CVE-2025-4082
Modification of specific WebGL shader attributes could trigger an out-of-bounds read, which, when chained with other vulnerabilities, could be used to escalate privileges. *This bug only affects Thunderbird for macOS. Other versions of Thunderbird are unaffected.* This vulnerability affects Firefox < 138, Firefox ESR < 128.10, Firefox ESR < 115.23, Thunderbird < 138, and Thunderbird < 128.10.
[]
null
5.9
null
null
null
GHSA-4p33-4mmg-2qxr
3proxy 0.5 to 0.5.2, when NT-encoded passwords are being used, allows remote attackers to cause a denial of service (blocked account) via unspecified vectors related to NTLM authentication, which causes a password hash to be overwritten.
[]
null
null
null
null
null
GHSA-2g9p-2pv5-997p
A vulnerability, which was classified as critical, was found in Axiomatic Bento4. This affects the function AP4_MemoryByteStream::WritePartial of the file Ap4ByteStream.cpp of the component mp42aac. The manipulation leads to heap-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-212007.
[]
null
7.5
null
null
null
CVE-2019-0709
Windows Hyper-V Remote Code Execution Vulnerability
A remote code execution vulnerability exists when Windows Hyper-V on a host server fails to properly validate input from an authenticated user on a guest operating system. To exploit the vulnerability, an attacker could run a specially crafted application on a guest operating system that could cause the Hyper-V host operating system to execute arbitrary code. An attacker who successfully exploited the vulnerability could execute arbitrary code on the host operating system. The security update addresses the vulnerability by correcting how Hyper-V validates guest operating system user input.
[ "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*" ]
null
7.6
null
null
null
CVE-2019-10657
Grandstream GWN7000 before 1.0.6.32 and GWN7610 before 1.0.8.18 devices allow remote authenticated users to discover passwords via a /ubus/uci.apply config request.
[ "cpe:2.3:o:grandstream:gwn7610_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:grandstream:gwn7610:-:*:*:*:*:*:*:*", "cpe:2.3:o:grandstream:gwn7000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:grandstream:gwn7000:-:*:*:*:*:*:*:*" ]
null
6.5
null
4
null
GHSA-8r9h-wv72-5pmq
Billing Software v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'username' parameter of the loginCheck.php resource does not validate the characters received and they are sent unfiltered to the database.
[]
null
9.8
null
null
null
CVE-2022-31702
vRealize Network Insight (vRNI) contains a command injection vulnerability present in the vRNI REST API. A malicious actor with network access to the vRNI REST API can execute commands without authentication.
[ "cpe:2.3:a:vmware:vrealize_network_insight:6.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:vrealize_network_insight:6.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:vrealize_network_insight:6.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:vrealize_network_insight:6.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:vrealize_network_insight:6.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:vrealize_network_insight:6.7.0:*:*:*:*:*:*:*" ]
null
9.8
null
null
null
CVE-2024-29434
An issue in the system image upload interface of Alldata v0.4.6 allows attackers to execute a directory traversal when uploading a file.
[]
null
8.3
null
null
null
GHSA-j6hg-c78w-h2x4
Cross-Site Request Forgery (CSRF) vulnerability in Fluenx DeepL API translation plugin <= 2.1.4 versions.
[]
null
4.3
null
null
null
GHSA-8qq4-g237-59gp
Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4172, CVE-2016-4175, CVE-2016-4180, CVE-2016-4181, CVE-2016-4182, CVE-2016-4183, CVE-2016-4184, CVE-2016-4185, CVE-2016-4186, CVE-2016-4187, CVE-2016-4188, CVE-2016-4189, CVE-2016-4190, CVE-2016-4217, CVE-2016-4218, CVE-2016-4219, CVE-2016-4220, CVE-2016-4221, CVE-2016-4233, CVE-2016-4234, CVE-2016-4235, CVE-2016-4236, CVE-2016-4237, CVE-2016-4238, CVE-2016-4239, CVE-2016-4240, CVE-2016-4241, CVE-2016-4242, CVE-2016-4243, CVE-2016-4244, CVE-2016-4245, and CVE-2016-4246.
[]
null
null
9.8
null
null
CVE-2024-30276
Adobe Audition 2024 M2V File Parsing Memory corruption
Audition versions 24.2, 23.6.4 and earlier Answer: are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[ "cpe:2.3:a:adobe:audition:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:audition:24.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:audition:24.1:*:*:*:*:*:*:*" ]
null
5.5
null
null
null
GHSA-7vqf-qxp2-qfv6
Microsoft Exchange Server Remote Code Execution Vulnerability
[]
null
8
null
null
null
GHSA-536w-qc2g-q32f
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WPPOOL Sheets To WP Table Live Sync allows Stored XSS.This issue affects Sheets To WP Table Live Sync: from n/a through 3.7.0.
[]
null
5.9
null
null
null
GHSA-fx6x-83f6-g9pc
** DISPUTED ** Directory traversal vulnerability in index.php in Simple Machines Forum (SMF) 1.1.3 allows remote attackers to include local files via unspecified vectors related to the sourcedir parameter or the actionArray hash. NOTE: CVE and multiple third parties dispute this vulnerability because both sourcedir and actionArray are defined before use.
[]
null
null
null
null
null
GHSA-8qq4-8jvq-mfw4
Exposure of Sensitive Information to an Unauthorized Actor in Apache Tomcat
When using a VirtualDirContext with Apache Tomcat 7.0.0 to 7.0.80 it was possible to bypass security constraints and/or view the source code of JSPs for resources served by the VirtualDirContext using a specially crafted request.
[]
null
null
7.5
null
null
GHSA-mmh6-m7v9-5956
Regular expression denial of service in markdown-link-extractor
An exponential ReDoS (Regular Expression Denial of Service) can be triggered in the markdown-link-extractor npm package, when an attacker is able to supply arbitrary input to the module's exported function
[]
null
null
null
null
null
CVE-2011-4558
Tiki 8.2 and earlier allows remote administrators to execute arbitrary PHP code via crafted input to the regexres and regex parameters.
[ "cpe:2.3:a:tiki:tiki:*:*:*:*:*:*:*:*" ]
null
7.2
null
6
null
CVE-2024-9883
Pods < 3.2.7.1 - Admin+ Stored XSS
The Pods WordPress plugin before 3.2.7.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
[ "cpe:2.3:a:podsfoundation:pods:*:*:*:*:*:wordpress:*:*" ]
null
4.8
null
null
null
GHSA-mhpx-vvg7-ghg9
Adobe Acrobat Reader versions 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier have an exploitable memory corruption vulnerability in image conversion related to processing of the PCX (picture exchange) file format. Successful exploitation could lead to arbitrary code execution.
[]
null
null
7.8
null
null
CVE-2023-31067
An issue was discovered in TSplus Remote Access through 16.0.2.14. There are Full Control permissions for Everyone on some directories under %PROGRAMFILES(X86)%\TSplus\Clients\www.
[ "cpe:2.3:a:tsplus:tsplus_remote_access:*:*:*:*:*:*:*:*" ]
null
9.8
null
null
null
GHSA-5www-87m9-2c36
The pipe_init_terminal function in main.c in s3dvt allows local users to gain privileges by leveraging setuid permissions and usage of bash 4.3 and earlier. NOTE: This vulnerability exists because of an incomplete fix for CVE-2013-6876.
[]
null
null
7.8
null
null
CVE-2024-24746
Apache NimBLE: Denial of service in NimBLE Bluetooth stack
Loop with Unreachable Exit Condition ('Infinite Loop') vulnerability in Apache NimBLE.  Specially crafted GATT operation can cause infinite loop in GATT server leading to denial of service in Bluetooth stack or device. This issue affects Apache NimBLE: through 1.6.0. Users are recommended to upgrade to version 1.7.0, which fixes the issue.
[ "cpe:2.3:a:apache:nimble:*:*:*:*:*:*:*:*" ]
null
7.5
null
null
https://github.com/apache/mynewt-nimble/commit/d42a0ebe6632bd0c318560e4293a522634f60594
GHSA-49hp-q4w9-2gpc
tpview.dll in VMware Workstation Pro 12.x before 12.5.0 and VMware Workstation Player 12.x before 12.5.0 on Windows, when Cortado ThinPrint virtual printing is enabled, allows guest OS users to execute arbitrary code on the host OS or cause a denial of service (host OS memory corruption) via a JPEG 2000 image.
[]
null
null
7.8
null
null
CVE-2019-10150
It was found that OpenShift Container Platform versions 3.6.x - 4.6.0 does not perform SSH Host Key checking when using ssh key authentication during builds. An attacker, with the ability to redirect network traffic, could use this to alter the resulting build output.
[ "cpe:2.3:a:redhat:openshift_container_platform:*:*:*:*:*:*:*:*" ]
null
null
5.9
null
null
RHSA-2016:0296
Red Hat Security Advisory: rh-ror41 security update
rubygem-actionpack: Timing attack vulnerability in basic authentication in Action Controller rubygem-activerecord: Nested attributes rejection proc bypass in Active Record rubygem-actionpack: Object leak vulnerability for wildcard controller routes in Action Pack rubygem-actionpack: possible object leak and denial of service attack in Action Pack rubygem-actionpack: directory traversal flaw in Action View rubygem-activerecord: possible input validation circumvention in Active Model
[ "cpe:/a:redhat:rhel_software_collections:2::el6", "cpe:/a:redhat:rhel_software_collections:2::el7" ]
null
null
null
null
null
GHSA-f462-4c2j-6qcw
In the Linux kernel, the following vulnerability has been resolved:usb: typec: altmodes/displayport: do not index invalid pin_assignmentsA poorly implemented DisplayPort Alt Mode port partner can indicate that its pin assignment capabilities are greater than the maximum value, DP_PIN_ASSIGN_F. In this case, calls to pin_assignment_show will cause a BRK exception due to an out of bounds array access.Prevent for loop in pin_assignment_show from accessing invalid values in pin_assignments by adding DP_PIN_ASSIGN_MAX value in typec_dp.h and using i < DP_PIN_ASSIGN_MAX as a loop condition.
[]
null
null
null
null
null
GHSA-2p86-fwpp-78jw
SNMP daemon in the DX200 based network element for Nokia Serving GPRS support node (SGSN) allows remote attackers to read SNMP options via arbitrary community strings.
[]
null
null
null
null
null
CVE-2011-1713
Microsoft msxml.dll, as used in Internet Explorer 8 on Windows 7, allows remote attackers to obtain potentially sensitive information about heap memory addresses via an XML document containing a call to the XSLT generate-id XPath function. NOTE: this might overlap CVE-2011-1202.
[ "cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:*:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
CVE-2007-4920
SQL injection vulnerability in soporte_derecha_w.php in PHP Webquest 2.5 and earlier allows remote attackers to execute arbitrary SQL commands via the id_actividad parameter.
[ "cpe:2.3:a:php_webquest:php_webquest:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
GHSA-84ww-gp3p-3hmw
In msmtp 1.8.2 and mpop 1.4.3, when tls_trust_file has its default configuration, certificate-verification results are not properly checked.
[]
null
null
5.3
null
null
CVE-2018-1000003
Improper input validation bugs in DNSSEC validators components in PowerDNS version 4.1.0 allow attacker in man-in-the-middle position to deny existence of some data in DNS via packet replay.
[ "cpe:2.3:a:powerdns:recursor:4.1.0:*:*:*:*:*:*:*" ]
null
null
3.7
4.3
null
CVE-2009-0658
Buffer overflow in Adobe Reader 9.0 and earlier, and Acrobat 9.0 and earlier, allows remote attackers to execute arbitrary code via a crafted PDF document, related to a non-JavaScript function call and possibly an embedded JBIG2 image stream, as exploited in the wild in February 2009 by Trojan.Pidief.E.
[ "cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:9.0:*:*:*:*:*:*:*" ]
null
7.8
null
9.3
null
CVE-2011-3730
Drupal 7.0 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by modules/simpletest/tests/upgrade/drupal-6.upload.database.php and certain other files.
[ "cpe:2.3:a:drupal:drupal:7.0:*:*:*:*:*:*:*" ]
null
null
null
5
null
GHSA-mw2c-vx6j-mg76
CKEditor4 Cross-site Scripting vulnerability in samples with enabled the preview feature
Affected packagesThe vulnerability has been discovered in the samples that use the [preview](https://ckeditor.com/cke4/addon/preview) feature:`samples/old/**/*.html``plugins/[plugin name]/samples/**/*.html`All integrators that use these samples in the production code can be affected.ImpactA potential vulnerability has been discovered in one of CKEditor's 4 samples that are shipped with production code. The vulnerability allowed to execute JavaScript code by abusing the misconfigured [preview feature](https://ckeditor.com/cke4/addon/preview). It affects all users using the CKEditor 4 at version < 4.24.0-lts with affected samples used in a production environment.PatchesThe problem has been recognized and patched. The fix will be available in version 4.24.0-lts.For more informationEmail us at [[email protected]](mailto:[email protected]) if you have any questions or comments about this advisory.AcknowledgementsThe CKEditor 4 team would like to thank [Marcin Wyczechowski](https://www.linkedin.com/in/marcin-wyczechowski-0a823795/) & [Michał Majchrowicz](https://www.linkedin.com/in/micha%C5%82-majchrowicz-mwsc/) [AFINE Team](https://afine.com/) for recognizing and reporting this vulnerability.
[]
null
6.1
null
null
null
CVE-2012-6562
engine/lib/users.php in Elgg before 1.8.5 does not properly specify permissions for the useradd action, which allows remote attackers to create arbitrary accounts.
[ "cpe:2.3:a:elgg:elgg:*:*:*:*:*:*:*:*", "cpe:2.3:a:elgg:elgg:1.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:elgg:elgg:1.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:elgg:elgg:1.7.2:*:*:*:*:*:*:*", "cpe:2.3:a:elgg:elgg:1.7.3:*:*:*:*:*:*:*", "cpe:2.3:a:elgg:elgg:1.7.4:*:*:*:*:*:*:*", "cpe:2.3:a:elgg:elgg:1.7.5:*:*:*:*:*:*:*", "cpe:2.3:a:elgg:elgg:1.7.6:*:*:*:*:*:*:*", "cpe:2.3:a:elgg:elgg:1.7.7:*:*:*:*:*:*:*", "cpe:2.3:a:elgg:elgg:1.7.8:*:*:*:*:*:*:*", "cpe:2.3:a:elgg:elgg:1.7.9:*:*:*:*:*:*:*", "cpe:2.3:a:elgg:elgg:1.7.10:*:*:*:*:*:*:*", "cpe:2.3:a:elgg:elgg:1.7.11:*:*:*:*:*:*:*", "cpe:2.3:a:elgg:elgg:1.7.12:*:*:*:*:*:*:*", "cpe:2.3:a:elgg:elgg:1.7.13:*:*:*:*:*:*:*", "cpe:2.3:a:elgg:elgg:1.7.14:*:*:*:*:*:*:*", "cpe:2.3:a:elgg:elgg:1.7.15:*:*:*:*:*:*:*", "cpe:2.3:a:elgg:elgg:1.7.16:*:*:*:*:*:*:*", "cpe:2.3:a:elgg:elgg:1.7.17:*:*:*:*:*:*:*", "cpe:2.3:a:elgg:elgg:1.7.18:*:*:*:*:*:*:*", "cpe:2.3:a:elgg:elgg:1.8.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:elgg:elgg:1.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:elgg:elgg:1.8.3:*:*:*:*:*:*:*" ]
null
null
null
6.8
null
CVE-2020-9878
A buffer overflow issue was addressed with improved memory handling. This issue is fixed in iOS 13.6 and iPadOS 13.6, macOS Catalina 10.15.6, tvOS 13.4.8, watchOS 6.2.8. Processing a maliciously crafted USD file may lead to unexpected application termination or arbitrary code execution.
[ "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*" ]
null
7.8
null
6.8
null
GHSA-rvqc-v6vj-m9pw
The web container in IBM WebSphere Application Server (WAS) before 6.0.2.21, and 6.1.x before 6.1.0.9, sends response data intended for a different request in certain circumstances after a closed connection error, which might allow remote attackers to obtain sensitive information.
[]
null
null
null
null
null
GHSA-c49f-ghq8-6mq2
The RapidLoad Power-Up for Autoptimize plugin for WordPress is vulnerable to unauthorized cache modification due to a missing capability check on the attach_rule function in versions up to, and including, 1.7.1. This makes it possible for authenticated attackers with subscriber-level access to modify cache rules.
[]
null
4.3
null
null
null
CVE-2017-8915
sinopia, as used in SAP HANA XS 1.00 and 2.00, allows remote attackers to cause a denial of service (assertion failure and service crash) by pushing a package with a filename containing a $ (dollar sign) or % (percent) character, aka SAP Security Note 2407694.
[ "cpe:2.3:a:sap:hana_xs:1.00:*:*:*:*:*:*:*", "cpe:2.3:a:sap:hana_xs:2.00:*:*:*:*:*:*:*" ]
null
null
7.5
5
null
GHSA-j6xh-q826-55jw
OpenStack Compute (Nova) vulnerable to denial of service via XML Entity Expansion attack
The security group extension in OpenStack Compute (Nova) Grizzly 2013.1.3, Havana before havana-3, and earlier allows remote attackers to cause a denial of service (resource consumption and crash) via an XML Entity Expansion (XEE) attack. NOTE: this issue is due to an incomplete fix for CVE-2013-1664.
[]
null
null
null
null
null