id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
197k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
patch_commit_url
stringlengths
38
232
GHSA-43hv-qjpp-xgv7
Tenda W20E v15.11.0.6 (US_W20EV4.0br_v15.11.0.6(1068_1546_841)_CN_TDC) is vulnerable to Buffer Overflow via function formIPMacBindModify.
[]
null
9.8
null
null
null
CVE-2021-24525
Shortcodes Ultimate < 5.10.2 - Contributor+ Stored XSS
The Shortcodes Ultimate WordPress plugin before 5.10.2 allows users with Contributor roles to perform stored XSS via shortcode attributes. Note: the plugin is inconsistent in its handling of shortcode attributes; some do escape, most don't, and there are even some attributes that are insecure by design (like [su_button]'s onclick attribute).
[ "cpe:2.3:a:getshortcodes:shortcodes_ultimate:*:*:*:*:*:wordpress:*:*" ]
null
5.4
null
3.5
null
CVE-2023-49501
Buffer Overflow vulnerability in Ffmpeg v.n6.1-3-g466799d4f5 allows a local attacker to execute arbitrary code via the config_eq_output function in the libavfilter/asrc_afirsrc.c:495:30 component.
[ "cpe:2.3:a:ffmpeg:ffmpeg:-:*:*:*:*:*:*:*" ]
null
8
null
null
null
CVE-2007-0051
Format string vulnerability in Apple iPhoto 6.0.5 (316), and other versions before 6.0.6, allows remote user-assisted attackers to execute arbitrary code via a crafted photocast with format string specifiers in the title of an RSS iPhoto feed.
[ "cpe:2.3:a:apple:iphoto:6.0.5:*:*:*:*:*:*:*" ]
null
null
null
6.8
null
GHSA-wg9r-cvfj-5cg2
The Tithe.ly Giving Button WordPress plugin through 1.1 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
[]
null
5.4
null
null
null
CVE-2011-2216
reqresp_parser.c in the SIP channel driver in Asterisk Open Source 1.8.x before 1.8.4.2 does not initialize certain strings, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a malformed Contact header.
[ "cpe:2.3:a:digium:asterisk:1.8.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.0:beta4:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.0:beta5:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.0:rc4:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.0:rc5:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.1:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.2:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.3:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.3:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.3:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.3:rc3:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.4:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.4:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.4:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.4:rc3:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.4.1:*:*:*:*:*:*:*" ]
null
null
null
5
null
CVE-2025-32372
Server-Side Request Forgery (SSRF) in DotNetNuke.Core
DNN (formerly DotNetNuke) is an open-source web content management platform (CMS) in the Microsoft ecosystem. A bypass has been identified for the previously known vulnerability CVE-2017-0929, allowing unauthenticated attackers to execute arbitrary GET requests against target systems, including internal or adjacent networks. This vulnerability facilitates a semi-blind SSRF attack, allowing attackers to make the target server send requests to internal or external URLs without viewing the full responses. Potential impacts include internal network reconnaissance, bypassing firewalls. This vulnerability is fixed in 9.13.8.
[]
null
6.5
null
null
null
GHSA-xv5c-vg59-hj7x
There is a "Use After Free" vulnerability in Qt's QHttp2ProtocolHandler in the QtNetwork module. This only affects HTTP/2 handling, HTTP handling is not affected by this at all. This happens due to a race condition between how QHttp2Stream uploads the body of a POST request and the simultaneous handling of HTTP error responses.This issue only affects Qt 6.9.0 and has been fixed for Qt 6.9.1.
[]
2.1
null
null
null
null
CVE-2019-10168
The virConnectBaselineHypervisorCPU() and virConnectCompareHypervisorCPU() libvirt APIs, 4.x.x before 4.10.1 and 5.x.x before 5.4.1, accept an "emulator" argument to specify the program providing emulation for a domain. Since v1.2.19, libvirt will execute that program to probe the domain's capabilities. Read-only clients could specify an arbitrary path for this argument, causing libvirtd to execute a crafted executable with its own privileges.
[ "cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:virtualization:4.3:*:*:*:*:*:*:*" ]
null
null
8.8
null
null
GHSA-3grg-4gwx-fp3c
VMware Aria Operations contains a privilege escalation vulnerability. A malicious actor with administrative access to the local system can escalate privileges to 'root'.
[]
null
6.7
null
null
null
GHSA-f826-hqvc-j84v
Double free vulnerability in the kernel in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008 allows local users to gain privileges via a crafted application that makes system calls within multiple threads, aka "Windows Kernel Unhandled Exception Vulnerability." NOTE: according to Microsoft, this is not a duplicate of CVE-2008-4510.
[]
null
null
null
null
null
GHSA-g2wh-ghm8-wh32
A buffer overflow vulnerability exists in the httpd next_page functionality of Yifan YF325 v1.0_20221108. A specially crafted network request can lead to command execution. An attacker can send a network request to trigger this vulnerability.This buffer overflow is in the next_page parameter in the gozila_cgi function.
[]
null
8.8
null
null
null
GHSA-pvcr-v8j8-j5q3
Parsing JSON serialized payload without protected field can lead to segfault
SummaryCalling `jws.Parse` with a JSON serialized payload where the `signature` field is present while `protected` is absent can lead to a nil pointer dereference.DetailsThis seems to also affect other functions that calls `Parse` internally, like `jws.Verify`.My understanding of these functions from the docs is that they are supposed to fail gracefully on invalid input and don't require any prior validation.Based on the stack trace in the PoC, the issue seems to be that the processing done in `jws/message.go:UnmarshalJSON()` assumes that if a `signature` field is present, then a `protected` field is also present. If this is not the case, then the subsequent call to `getB64Value(sig.protected)` will dereference `sig.protected`, which is `nil`.PoCReproducer:Result:ImpactThe vulnerability can be used to crash / DOS a system doing JWS verification.
[]
null
4.3
null
null
null
ICSA-23-348-06
Siemens OPC UA Implementation in SINUMERIK ONE and SINUMERIK MC
The OPC UA implementations (ANSI C and C++) in affected products contain an integer overflow vulnerability that could cause the application to run into an infinite loop during certificate validation. This could allow an unauthenticated remote attacker to create a denial of service condition by sending a specially crafted certificate.
[]
null
7.5
null
null
null
GHSA-7x7m-6347-w9xm
An Insecure Direct Object Reference vulnerability exists in the web UI of the GateManager which allows an authenticated attacker to reset the password of any user in its domain or any sub-domain, via escalation of privileges. This issue affects all GateManager versions prior to 9.2c
[]
null
null
null
null
null
CVE-2022-20959
Cisco Identity Services Engine Cross-Site Scripting Vulnerability
A vulnerability in the External RESTful Services (ERS) API of Cisco Identity Services Engine (ISE) Software could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface of an affected device. This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by persuading an authenticated administrator of the web-based management interface to click a malicious link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
[ "cpe:2.3:a:cisco:identity_services_engine:*:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:2.7.0:-:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch1:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch2:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch3:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch4:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch5:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch6:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch7:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:3.0.0:-:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch1:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch2:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch3:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch4:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch5:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch6:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:3.1:-:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:3.1:patch1:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:3.1:patch3:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:3.2:-:*:*:*:*:*:*" ]
null
6.1
null
null
null
GHSA-3v65-m7jv-mqrv
Missing Authorization vulnerability in Andy Stratton Append Content allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Append Content: from n/a through 2.1.1.
[]
null
6.5
null
null
null
GHSA-x4wr-fxwh-p3m9
Possible Integer underflow in WLAN function due to lack of check of data received from user side in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile in QCN7605, QCS605, SDA845, SDM670, SDM710, SDM845, SDM850, SM8150, SXR1130
[]
null
null
null
null
null
CVE-2023-0453
WP Private Message < 1.0.6 - Private Message Disclosure via IDOR
The WP Private Message WordPress plugin (bundled with the Superio theme as a required plugin) before 1.0.6 does not ensure that private messages to be accessed belong to the user making the requests. This allowing any authenticated users to access private messages belonging to other users by tampering the ID.
[ "cpe:2.3:a:apusthemes:wp_private_messaging:*:*:*:*:*:wordpress:*:*" ]
null
4.3
null
null
null
CVE-2018-13532
The mintToken function of a smart contract implementation for Mindexcoin, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value.
[ "cpe:2.3:a:mindexcoin:mindexcoin:-:*:*:*:*:*:*:*" ]
null
null
7.5
5
null
CVE-2024-20402
A vulnerability in the SSL VPN feature for Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause an affected device to reload unexpectedly, resulting in a denial of service (DoS) condition. This vulnerability is due to a logic error in memory management when the device is handling SSL VPN connections. An attacker could exploit this vulnerability by sending crafted SSL/TLS packets to the SSL VPN server of the affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition.
[ "cpe:2.3:h:cisco:adaptive_security_appliance:*:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:firepower_threat_defense_software:*:*:*:*:*:*:*:*" ]
null
8.6
null
null
null
GHSA-g838-rwc8-xv7q
An issue was discovered in HDF5 through 1.12.0. A NULL pointer dereference exists in the function H5F_get_nrefs() located in H5Fquery.c. It allows an attacker to cause Denial of Service.
[]
null
null
null
null
null
GHSA-73h3-v6g5-wmx3
Symantec Endpoint Protection Manager (SEPM), prior to 14.2 RU2 MP1, may be susceptible to an out of bounds vulnerability, which is a type of issue that results in an existing application reading memory outside of the bounds of the memory that had been allocated to the program.
[]
null
null
null
null
null
GHSA-frvp-fph6-68p5
An arbitrary file creation vulnerability exists in PaperCut NG/MF that only affects Windows servers with Web Print enabled. This specific flaw exists within the web-print.exe process, which can incorrectly create files that don’t exist when a maliciously formed payload is provided. This can be used to flood disk space and result in a Denial of Service (DoS) attack.Note:This CVE has been split from CVE-2024-4712.
[]
null
6.1
null
null
null
ICSA-15-064-04
Siemens SIMATIC S7-300 CPU Denial-of-Service Vulnerability
Siemens SIMATIC S7-300 CPU devices allow remote attackers to cause a denial of service (defect-mode transition) via crafted packets on (1) TCP port 102 or (2) Profibus.
[]
null
null
null
null
null
GHSA-w74p-9j5g-g6g8
Multiple vulnerabilities in the video service of Cisco TelePresence Collaboration Endpoint (CE) and Cisco RoomOS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerabilities are due to insufficient input validation. An attacker could exploit these vulnerabilities by sending crafted traffic to the video service of an affected endpoint. A successful exploit could allow the attacker to cause the video service to crash, resulting in a DoS condition on an affected device.
[]
null
null
null
null
null
CVE-2016-8679
The _dwarf_get_size_of_val function in libdwarf/dwarf_util.c in Libdwarf before 20161124 allows remote attackers to cause a denial of service (out-of-bounds read) by calling the dwarfdump command on a crafted file.
[ "cpe:2.3:a:libdwarf_project:libdwarf:*:*:*:*:*:*:*:*" ]
null
6.5
null
4.3
null
GHSA-vhpv-9vr4-2gvr
LibreHealthIO lh-ehr version <REL-2.0.0 contains an Authenticated Local File Disclosure vulnerability in Importing of templates allows local file disclosure that can result in Disclosure of sensitive files on the server. This attack appear to be exploitable via User controlled variable in import templates function.
[]
null
null
6.5
null
null
CVE-2019-8661
A use after free issue was addressed with improved memory management. This issue is fixed in macOS Mojave 10.14.6. A remote attacker may be able to cause arbitrary code execution.
[ "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
null
GHSA-3h95-28f9-58jc
Voltronic Power ViewPower Incorrect Permission Assignment Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Voltronic Power ViewPower. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.The specific flaw exists within the product installer. The issue results from incorrect permissions set on folders. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-22025.
[]
null
null
7.8
null
null
CVE-2022-33154
The schema (aka Embedding schema.org vocabulary) extension before 1.13.1 and 2.x before 2.5.1 for TYPO3 allows XSS.
[ "cpe:2.3:a:schema_project:schema:*:*:*:*:*:typo3:*:*" ]
null
5.4
null
3.5
null
GHSA-rf9h-956h-9g4h
The ElementAnimations::EnsureStyleRuleFor function in Mozilla Firefox 4.x through 13.0, Firefox ESR 10.x before 10.0.6, Thunderbird 5.0 through 13.0, Thunderbird ESR 10.x before 10.0.6, and SeaMonkey before 2.11 allows remote attackers to cause a denial of service (buffer over-read, incorrect pointer dereference, and heap-based buffer overflow) or possibly execute arbitrary code via a crafted web site.
[]
null
null
null
null
null
GHSA-7ccr-xp36-pxwq
The Cisco Optical Service Module (OSM) for the Catalyst 6500 and 7600 series running Cisco IOS 12.1(8)E through 12.1(13.4)E allows remote attackers to cause a denial of service (hang) via a malformed packet.
[]
null
null
null
null
null
GHSA-4qqf-9m5c-w2c5
Weblate exposes personal IP address via e-mail
ImpactThe audit log notifications included the full IP address of the acting user. This could be obtained by third-party servers such as SMTP relays, or spam filters.PatchesThis issue has been addressed in Weblate 5.12 via https://github.com/WeblateOrg/weblate/pull/15102.ReferencesThanks to [micael1](https://hackerone.com/micael1) for reporting this [issue at HackerOne](https://hackerone.com/reports/3179850).
[]
2.1
5.3
null
null
null
GHSA-jvrv-fqm8-xr99
An elevation of privilege vulnerability in the Qualcomm sound driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-31906657. References: QC-CR#1078000.
[]
null
null
7
null
null
GHSA-cj8v-r5w4-97v8
Affected versions of Atlassian Crucible allow remote attackers to impact the application's availability via a Denial of Service (DoS) vulnerability in the file upload request feature of code reviews. The affected versions are before version 4.7.4, and from version 4.8.0 before 4.8.5.
[]
null
null
null
null
null
GHSA-ghw3-5qvm-3mqc
CodeIgniter4 allows spoofing of IP address when using proxy
ImpactThis vulnerability may allow attackers to spoof their IP address when your server is behind a reverse proxy.PatchesUpgrade to v4.2.11 or later, and configure `Config\App::$proxyIPs`.WorkaroundsDo not use `$request->getIPAddress()`.Referenceshttps://codeigniter4.github.io/userguide/incoming/request.html#CodeIgniter\HTTP\Request::getIPAddressFor more informationIf you have any questions or comments about this advisory:Open an issue in [codeigniter4/CodeIgniter4](https://github.com/codeigniter4/CodeIgniter4/issues)Email us at [SECURITY.md](https://github.com/codeigniter4/CodeIgniter4/blob/develop/SECURITY.md)
[]
null
7
null
null
null
RHSA-2023:3190
Red Hat Security Advisory: kernel security update
kernel: net/ulp: use-after-free in listening ULP sockets kernel: remote DoS in TIPC kernel module
[ "cpe:/o:redhat:rhel_e4s:8.1::baseos" ]
null
7.5
null
null
null
GHSA-2mg2-8p2q-47h9
Novell NetWare 5.0 allows remote attackers to cause a denial of service by flooding port 40193 with random data.
[]
null
null
null
null
null
CVE-2021-41262
SQL Injection in Galette
Galette is a membership management web application built for non profit organizations and released under GPLv3. Versions prior to 0.9.6 are subject to SQL injection attacks by users with "member" privilege. Users are advised to upgrade to version 0.9.6 as soon as possible. There are no known workarounds.
[ "cpe:2.3:a:galette:galette:*:*:*:*:*:*:*:*" ]
null
8.8
null
null
null
GHSA-9v2r-6pgh-ch4q
H3C B5 Mini B5MiniV100R005 was discovered to contain a stack overflow via the function SetAPWifiorLedInfoById.
[]
null
7.8
null
null
null
GHSA-3v8f-pqw4-37vx
Cross-site scripting (XSS) vulnerability in index.php in the Link module 5.x-2.5 for Drupal 5.10 allows remote authenticated users, with "administer content types" privileges, to inject arbitrary web script or HTML via the description parameter (aka the Help field). NOTE: some of these details are obtained from third party information.
[]
null
null
null
null
null
CVE-2017-7518
A flaw was found in the Linux kernel before version 4.12 in the way the KVM module processed the trap flag(TF) bit in EFLAGS during emulation of the syscall instruction, which leads to a debug exception(#DB) being raised in the guest stack. A user/process inside a guest could use this flaw to potentially escalate their privileges inside the guest. Linux guests are not affected by this.
[ "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
null
null
5.5
null
null
GHSA-7vjj-62vf-v9c4
Inappropriate implementation in full screen in Google Chrome prior to 83.0.4103.61 allowed a remote attacker to spoof security UI via a crafted HTML page.
[]
null
6.5
null
null
null
GHSA-9fhg-rgm9-gqph
CGI PHP mlog script allows an attacker to read any file on the target server.
[]
null
null
null
null
null
CVE-2020-9648
Adobe Experience Manager versions 6.5 and earlier have a cross-site scripting vulnerability. Successful exploitation could lead to arbitrary javascript execution in the browser.
[ "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*" ]
null
6.1
null
4.3
null
CVE-2013-1552
Unspecified vulnerability in Oracle MySQL 5.1.67 and earlier and 5.5.29 and earlier allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors.
[ "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_eus:6.4:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*" ]
null
null
null
6.5
null
GHSA-vf3j-xp87-c8f3
DHCP Server Service Remote Code Execution Vulnerability
[]
null
7.2
null
null
null
GHSA-r9p3-vp8p-5xp4
In TBD of TBD, there is a possible use after free bug. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-208842348References: N/A
[]
null
6.7
null
null
null
GHSA-55xr-4fxj-xx2h
Cross-site scripting (XSS) vulnerability in hilfe.php in b1gMail 6.3.1 allows remote attackers to inject arbitrary web script or HTML via the chapter parameter.
[]
null
null
null
null
null
CVE-2024-3662
The WPZOOM Social Feed Widget & Block plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the wpzoom_instagram_clear_data() function in all versions up to, and including, 2.1.13. This makes it possible for authenticated attackers, with subscriber-level access and above, to delete all Instagram images installed on the site.
[]
null
4.3
null
null
null
GHSA-5w62-j643-gj5x
An uninitialized stack variable vulnerability in load_tic_series() in set.c in gnuplot 5.2.rc1 allows an attacker to cause Denial of Service (Segmentation fault and Memory Corruption) or possibly have unspecified other impact when a victim opens a specially crafted file.
[]
null
null
7.8
null
null
CVE-2008-6200
Multiple cross-site scripting (XSS) vulnerabilities in Swiki 1.5 allow remote attackers to inject arbitrary web script or HTML via (1) the query string and (2) a new wiki entry.
[ "cpe:2.3:a:wiki:swiki:1.5:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
CVE-2022-23823
A potential vulnerability in some AMD processors using frequency scaling may allow an authenticated attacker to execute a timing attack to potentially enable information disclosure.
[ "cpe:2.3:o:amd:athlon_x4_750_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:athlon_x4_750:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:athlon_x4_760k_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:athlon_x4_760k:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:athlon_x4_830_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:athlon_x4_830:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:athlon_x4_835_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:athlon_x4_835:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:athlon_x4_840_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:athlon_x4_840:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:athlon_x4_845_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:athlon_x4_845:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:athlon_x4_860k_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:athlon_x4_860k:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:athlon_x4_870k_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:athlon_x4_870k:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:athlon_x4_880k_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:athlon_x4_880k:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:athlon_x4_940_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:athlon_x4_940:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:athlon_x4_950_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:athlon_x4_950:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:athlon_x4_970_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:athlon_x4_970:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_threadripper_pro_3995wx_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_threadripper_pro_3995wx:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_threadripper_pro_3795wx_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_threadripper_pro_3795wx:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_threadripper_pro_3955wx_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_threadripper_pro_3955wx:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_threadripper_pro_3945wx_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_threadripper_pro_3945wx:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_threadripper_pro_5955wx_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_threadripper_pro_5955wx:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_threadripper_pro_5965wx_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_threadripper_pro_5965wx:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_threadripper_pro_5945wx_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_threadripper_pro_5945wx:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_threadripper_pro_5975wx_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_threadripper_pro_5975wx:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_threadripper_pro_5995wx_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_threadripper_pro_5995wx:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_threadripper_2990wx_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_threadripper_2990wx:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_threadripper_2970wx_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_threadripper_2970wx:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_threadripper_2950x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_threadripper_2950x:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_threadripper_2920x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_threadripper_2920x:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_threadripper_3990x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_threadripper_3990x:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_threadripper_3970x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_threadripper_3970x:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_threadripper_3960x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_threadripper_3960x:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:a12-9700p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:a12-9700p:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:a12-9730p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:a12-9730p:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:a10-9600p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:a10-9600p:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:a10-9630p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:a10-9630p:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:a9-9410_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:a9-9410:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:a9-9420_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:a9-9420:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:a6-9210_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:a6-9210:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:a6-9220_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:a6-9220:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:a6-9220c_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:a6-9220c:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:a4-9120_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:a4-9120:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3_2200u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3_2200u:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3_2300u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3_2300u:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_2500u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_2500u:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_2600_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_2600:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_2600h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_2600h:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_2600x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_2600x:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_2700_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_2700:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_2700x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_2700x:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_7_2700_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_2700:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_7_2700u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_2700u:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_7_2700x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_2700x:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_7_2800h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_2800h:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3_3100_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3_3100:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3_3200u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3_3200u:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3_3250u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3_3250u:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3_3300g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3_3300g:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3_3300u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3_3300u:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3_3300x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3_3300x:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_3400g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_3400g:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_3450g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_3450g:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_3500u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_3500u:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_3550h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_3550h:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_3600_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_3600:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_3600x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_3600x:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_3600xt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_3600xt:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_7_3700u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_3700u:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_7_3700x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_3700x:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_7_3750h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_3750h:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_7_3800x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_3800x:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_7_3800xt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_3800xt:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_7_4700g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_4700g:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_7_4700ge_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_4700ge:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_4600g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_4600g:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_4600ge_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_4600ge:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3_4300g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3_4300g:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3_4300ge_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3_4300ge:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_9_4900h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_9_4900h:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_7_4800u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_4800u:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_7_4700u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_4700u:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_7_4800h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_4800h:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_4600u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_4600u:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_4500u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_4500u:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_4600h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_4600h:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3_4300u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3_4300u:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_9_5980hx_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_9_5980hx:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_9_5980hs_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_9_5980hs:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_7_5825u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_5825u:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_9_5900hx_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_9_5900hx:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_9_5900hs_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_9_5900hs:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_7_5825c_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_5825c:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_7_5800h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_5800h:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_5625u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_5625u:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_7_5800hs_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_5800hs:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_5625c_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_5625c:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_5600h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_5600h:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_5600hs_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_5600hs:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_7_5800u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_5800u:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_5600u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_5600u:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_5560u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_5560u:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3_5425u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3_5425u:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3_5425c_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3_5425c:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3_5400u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3_5400u:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3_5125c_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3_5125c:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:athlon_gold_3150u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:athlon_gold_3150u:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:athlon_silver_3050u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:athlon_silver_3050u:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7001_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7001:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7251_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7251:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7261_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7261:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7281_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7281:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7301_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7301:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7351_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7351:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7351p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7351p:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7371_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7371:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7401_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7401:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7401p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7401p:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7451_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7451:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7501_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7501:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7551_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7551:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7551p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7551p:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7601_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7601:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7002_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7002:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7252_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7262_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7272_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7282_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7302_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7302p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7352_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7402_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7402p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7452_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7502_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7502p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7532_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7542_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7552_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7642_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7662_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7702_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7742_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7f32_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7f52_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7f72_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7h12_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7h12:-:*:*:*:*:*:*:*" ]
null
6.5
null
4
null
CVE-2012-4109
The clear sshkey command in the fabric-interconnect component in Cisco Unified Computing System (UCS) allows local users to gain privileges by embedding commands in an unspecified parameter, aka Bug ID CSCtq86559.
[ "cpe:2.3:h:cisco:unified_computing_system:-:*:*:*:*:*:*:*" ]
null
null
null
6.8
null
CVE-2010-4437
Unspecified vulnerability in the Oracle WebLogic Server component in Oracle Fusion Middleware 9.0, 9.1, 9.2.4, 10.0.2, 10.3.2, and 10.3.3 allows remote attackers to affect confidentiality and integrity via unknown vectors related to Servlet Container.
[ "cpe:2.3:a:oracle:fusion_middleware:9.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:fusion_middleware:9.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:fusion_middleware:9.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:fusion_middleware:10.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:fusion_middleware:10.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:fusion_middleware:10.3.3:*:*:*:*:*:*:*" ]
null
null
null
5.8
null
GHSA-6vh7-7h6m-h6fv
Adobe Character Animator version 4.4 (and earlier) is affected by a memory corruption vulnerability when parsing a M4A file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.
[]
null
7.8
null
null
null
GHSA-ggg7-c8p2-mjvq
Adobe Acrobat and Reader versions 2019.008.20081 and earlier, 2019.008.20080 and earlier, 2019.008.20081 and earlier, 2017.011.30106 and earlier version, 2017.011.30105 and earlier version, 2015.006.30457 and earlier, and 2015.006.30456 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
[]
null
null
5.5
null
null
GHSA-chc2-rvc6-vpg5
The External Control API in Roku and Roku TV products allow unauthorized access via a DNS Rebind attack. This can result in remote device control and privileged device and network information to be exfiltrated by an attacker.
[]
null
null
9.6
null
null
CVE-2013-3736
Cross-site scripting (XSS) vulnerability in the MobileUI (aka RT-Extension-MobileUI) extension before 1.04 in Request Tracker (RT) 4.0.0 before 4.0.13 allows remote attackers to inject arbitrary web script or HTML via the name of an attached file.
[ "cpe:2.3:a:bestpractical:request_tracker:4.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:request_tracker:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:request_tracker:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:request_tracker:4.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:request_tracker:4.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:request_tracker:4.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:request_tracker:4.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:request_tracker:4.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:request_tracker:4.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:request_tracker:4.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:request_tracker:4.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:request_tracker:4.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:request_tracker:4.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt-extension-mobileui:*:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
CVE-2018-14533
read_tmp and write_tmp in Inteno IOPSYS allow attackers to gain privileges after writing to /tmp/etc/smb.conf because /var is a symlink to /tmp.
[ "cpe:2.3:o:intenogroup:iopsys_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intenogroup:iopsys:-:*:*:*:*:*:*:*" ]
null
null
7.8
7.2
null
CVE-2020-1035
A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory, aka 'VBScript Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1058, CVE-2020-1060, CVE-2020-1093.
[ "cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*" ]
null
7.5
null
7.6
null
CVE-2007-0873
nabopoll 1.1.2 allows remote attackers to bypass authentication and access certain administrative functionality via a direct request for (1) config_edit.php, (2) template_edit.php, or (3) survey_edit.php in admin/.
[ "cpe:2.3:a:nabocorp:nabopoll:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:nabocorp:nabopoll:1.2:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2020-24327
Server Side Request Forgery (SSRF) vulnerability exists in Discourse 2.3.2 and 2.6 via the email function. When writing an email in an editor, you can upload pictures of remote websites.
[ "cpe:2.3:a:discourse:discourse:2.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:discourse:discourse:2.6.0:-:*:*:*:*:*:*" ]
null
5.3
null
5
null
GHSA-5646-667c-2w7m
In Wireshark 2.4.0, 2.2.0 to 2.2.8, and 2.0.0 to 2.0.14, the IrCOMM dissector has a buffer over-read and application crash. This was addressed in plugins/irda/packet-ircomm.c by adding length validation.
[]
null
null
7.5
null
null
CVE-2021-3961
Cross-site Scripting (XSS) - Stored in snipe/snipe-it
snipe-it is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
[ "cpe:2.3:a:snipeitapp:snipe-it:*:*:*:*:*:*:*:*" ]
null
null
8
null
null
CVE-1999-1021
NFS on SunOS 4.1 through 4.1.2 ignores the high order 16 bits in a 32 bit UID, which allows a local user to gain root access if the lower 16 bits are set to 0, as fixed by the NFS jumbo patch upgrade.
[ "cpe:2.3:o:sun:sunos:4.1:*:*:*:*:*:*:*", "cpe:2.3:o:sun:sunos:4.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:sun:sunos:4.1.2:*:*:*:*:*:*:*" ]
null
null
null
7.2
null
GHSA-34rw-6hrg-mxr5
A Race Condition vulnerability in Juniper Networks Junos OS LLDP implementation allows an attacker to cause LLDP to crash leading to a Denial of Service (DoS). This issue occurs when crafted LLDP packets are received by the device from an adjacent device. Multiple LACP flaps will occur after LLDP crashes. An indicator of compromise is to evaluate log file details for lldp with RLIMIT. Intervention should occur before 85% threshold of used KB versus maximum available KB memory is reached. show log messages | match RLIMIT | match lldp | last 20 Matching statement is " /kernel: %KERNEL-[number]: Process ([pid #],lldpd) has exceeded 85% of RLIMIT_DATA: " with [] as variable data to evaluate for. This issue affects: Juniper Networks Junos OS: 12.3 versions prior to 12.3R12-S15; 12.3X48 versions prior to 12.3X48-D95; 15.1 versions prior to 15.1R7-S6; 15.1X49 versions prior to 15.1X49-D200; 15.1X53 versions prior to 15.1X53-D593; 16.1 versions prior to 16.1R7-S7; 17.1 versions prior to 17.1R2-S11, 17.1R3-S2; 17.2 versions prior to 17.2R1-S9, 17.2R3-S3; 17.3 versions prior to 17.3R2-S5, 17.3R3-S6; 17.4 versions prior to 17.4R2-S4, 17.4R3; 18.1 versions prior to 18.1R3-S5; 18.2 versions prior to 18.2R2-S7, 18.2R3; 18.2X75 versions prior to 18.2X75-D12, 18.2X75-D33, 18.2X75-D50, 18.2X75-D420; 18.3 versions prior to 18.3R1-S7, 18.3R2-S3, 18.3R3; 18.4 versions prior to 18.4R1-S5, 18.4R2; 19.1 versions prior to 19.1R1-S4, 19.1R2.
[]
null
null
null
null
null
GHSA-jw2j-654v-qh53
The weaver module has a vulnerability in parameter type verification,Successful exploitation of this vulnerability may affect data confidentiality.
[]
null
null
null
null
null
GHSA-5xrr-fw23-8wgc
The test parameter of the xmlfeed in the Tradetracker-Store WordPress plugin before 4.6.60 is not sanitised, escaped or validated before inserting to a SQL statement, leading to SQL injection.
[]
null
null
null
null
null
GHSA-jh8v-m7x2-75f6
Unspecified vulnerability in the Oracle Spatial component in Oracle Database Server 10.2.0.4, 11.1.0.7, and 11.2.0.1 allows remote authenticated users to affect confidentiality and integrity, related to MDSYS.
[]
null
null
null
null
null
CVE-2014-125014
FFmpeg HEVC Video Decoder memory corruption
A vulnerability classified as problematic was found in FFmpeg 2.0. Affected by this vulnerability is an unknown functionality of the component HEVC Video Decoder. The manipulation leads to memory corruption. The attack can be launched remotely. It is recommended to apply a patch to fix this issue.
[ "cpe:2.3:a:ffmpeg:ffmpeg:2.0:*:*:*:*:*:*:*" ]
null
5.3
null
null
null
CVE-2024-37532
IBM WebSphere Application Server identity spoofing
IBM WebSphere Application Server 8.5 and 9.0 is vulnerable to identity spoofing by an authenticated user due to improper signature validation. IBM X-Force ID: 294721.
[ "cpe:2.3:a:ibm:websphere_application_server:8.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:9.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:8.5.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:9.0.0.0:*:*:*:*:*:*:*" ]
null
8.8
null
null
null
GHSA-23m6-v988-fw9r
An issue was discovered on Samsung mobile devices with O(8.x) and P(9.0) (with TEEGRIS) software. The SEC_FR trustlet has an out of bounds write. The Samsung ID is SVE-2019-15272 (October 2019).
[]
null
null
null
null
null
CVE-2024-2280
The Better Elementor Addons plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the widget link URL values in all versions up to, and including, 1.4.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
6.4
null
null
null
CVE-2021-41113
Cross-Site-Request-Forgery in Backend URI Handling in Typo3
TYPO3 is an open source PHP based web content management system released under the GNU GPL. It has been discovered that the new TYPO3 v11 feature that allows users to create and share deep links in the backend user interface is vulnerable to cross-site-request-forgery. The impact is the same as described in TYPO3-CORE-SA-2020-006 (CVE-2020-11069). However, it is not limited to the same site context and does not require the attacker to be authenticated. In a worst case scenario, the attacker could create a new admin user account to compromise the system. To successfully carry out an attack, an attacker must trick his victim to access a compromised system. The victim must have an active session in the TYPO3 backend at that time. The following Same-Site cookie settings in $GLOBALS[TYPO3_CONF_VARS][BE][cookieSameSite] are required for an attack to be successful: SameSite=strict: malicious evil.example.org invoking TYPO3 application at good.example.org and SameSite=lax or none: malicious evil.com invoking TYPO3 application at example.org. Update your instance to TYPO3 version 11.5.0 which addresses the problem described.
[ "cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*" ]
null
8.8
null
null
null
GHSA-h24r-m9qc-pvpg
Ansible-core information disclosure flaw
An information disclosure flaw was found in ansible-core due to a failure to respect the `ANSIBLE_NO_LOG` configuration in some scenarios. It was discovered that information is still included in the output in certain tasks, such as loop items. Depending on the task, this issue may include sensitive information, such as decrypted secret values.
[]
null
5
null
null
null
GHSA-5hg6-vh9p-5frg
Fatek FvDesigner Version 1.5.76 and prior is vulnerable to an out-of-bounds write while processing project files, allowing an attacker to craft a special project file that may permit arbitrary code execution.
[]
null
null
null
null
null
GHSA-p66m-6jrh-qw22
A vulnerability, which was classified as problematic, was found in SourceCodester Online Graduate Tracer System 1.0. Affected is an unknown function of the file /tracking/admin/exportcs.php. The manipulation leads to information disclosure. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
[]
6.9
5.3
null
null
null
GHSA-gr5m-rhr9-5xm9
The RD Contacto plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.4. This is due to missing or incorrect nonce validation on the rdWappUpdateData() function. This makes it possible for unauthenticated attackers to update plugin settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
[]
null
4.3
null
null
null
GHSA-47jh-phv8-4gm6
A stored cross-site scripting (XSS) vulnerability in EyouCMS v1.6.4-UTF8-SP1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Menu Name field at /login.php?m=admin&c=Index&a=changeTableVal&_ajax=1&lang=cn.
[]
null
4.8
null
null
null
GHSA-pvr3-h264-ggm4
Cross-site scripting (XSS) vulnerability in shopcontent.asp in VP-ASP Shopping Cart 6.50, and possibly earlier, allows remote attackers to inject arbitrary web script or HTML via the type parameter.
[]
null
null
null
null
null
GHSA-fwpq-7jcm-8q4c
Multiple PHP remote file inclusion vulnerabilities in Portail Web Php 2.5.1.1 allow remote attackers to execute arbitrary PHP code via a URL in the site_path parameter to (1) config/conf-activation.php, (2) menu/item.php, and (3) modules/conf_modules.php in admin/system/; and (4) system/login.php. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
[]
null
null
null
null
null
GHSA-53pp-49v8-q8r5
Multiple PHP remote file inclusion vulnerabilities in Ay System Solutions CMS 2.6 and earlier allow remote attackers to execute arbitrary PHP code via a URL in the path[ShowProcessHandle] parameter to (1) home.php or (2) impressum.php. NOTE: the provenance of this information is unknown; the details are obtained from third party information.
[]
null
null
null
null
null
CVE-2018-3080
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 8.0.11 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
[ "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*" ]
null
4.9
null
4
null
RHSA-2025:3376
Red Hat Security Advisory: Red Hat build of Quarkus 3.15.4 release and security update
smallrye-fault-tolerance: SmallRye Fault Tolerance
[ "cpe:/a:redhat:quarkus:3.15::el8" ]
null
7.5
null
null
null
GHSA-m6rg-98pc-7rxm
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
[]
null
6.5
null
null
null
GHSA-fvg9-4m3g-p4h7
In skia_alloc_func of SkDeflate.cpp, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
[]
null
7.8
null
null
null
CVE-2019-5252
There is an improper authentication vulnerability in Huawei smartphones (Y9, Honor 8X, Honor 9 Lite, Honor 9i, Y6 Pro). The applock does not perform a sufficient authentication in a rare condition. Successful exploit could allow the attacker to use the application locked by applock in an instant.
[ "cpe:2.3:o:huawei:enjoy_8_plus_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:enjoy_8_plus:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:y9_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:y9:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:honor_8x_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:honor_8x:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:honor_9_lite_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:honor_9_lite:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:honor_9i_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:honor_9i:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:y6_pro_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:y6_pro:-:*:*:*:*:*:*:*" ]
null
3.5
null
3.6
null
GHSA-hcqx-jpmg-p37r
Directory traversal vulnerability in /scripts/cruise/cws.exe in CruiseWorks 1.09c and 1.09d allows remote attackers to read arbitrary files via a .. (dot dot) in the doc parameter.
[]
null
null
null
null
null
CVE-2023-48689
Railway Reservation System v1.0 - Multiple Unauthenticated SQL Injections (SQLi)
Railway Reservation System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'byname' parameter of the train.php resource does not validate the characters received and they are sent unfiltered to the database.
[ "cpe:2.3:a:projectworlds:railway_reservation_system:1.0:*:*:*:*:*:*:*" ]
null
9.8
null
null
null
CVE-2016-9155
The following SIEMENS branded IP Camera Models CCMW3025, CVMW3025-IR, CFMW3025 prior to version 1.41_SP18_S1; CCPW3025, CCPW5025 prior to version 0.1.73_S1; CCMD3025-DN18 prior to version v1.394_S1; CCID1445-DN18, CCID1445-DN28, CCID1145-DN36, CFIS1425, CCIS1425, CFMS2025, CCMS2025, CVMS2025-IR, CFMW1025, CCMW1025 prior to version v2635_SP1 could allow an attacker with network access to the web server to obtain administrative credentials under certain circumstances.
[ "cpe:2.3:o:siemens:ccid1445-dn18_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:ccid1445-dn28_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:ccid1445-dn36_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:ccis1425_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:ccmd3025-dn18_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:ccms2025_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:ccmw1025_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:ccmw3025_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:ccpw3025_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:cfis1425_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:cfms2025_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:cfmw1025_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:cfmw3025_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:cvms2025-ir_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:cvmw3025-ir_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:ccid1445-dn18:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:ccid1445-dn28:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:ccid1445-dn36:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:ccis1425:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:ccmd3025-dn18:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:ccms2025:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:ccmw1025:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:ccmw3025:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:ccpw3025:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:cfis1425:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:cfms2025:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:cfmw1025:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:cfmw3025:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:cvms2025-ir:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:cvmw3025-ir:-:*:*:*:*:*:*:*" ]
null
null
9.8
5
null
CVE-2024-20941
Vulnerability in the Oracle Installed Base product of Oracle E-Business Suite (component: HTML UI). Supported versions that are affected are 12.2.3-12.2.13. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Installed Base. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Installed Base, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Installed Base accessible data as well as unauthorized read access to a subset of Oracle Installed Base accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).
[ "cpe:2.3:a:oracle:installed_base:*:*:*:*:*:*:*:*" ]
null
6.1
null
null
null
CVE-2007-2039
The Network Processing Unit (NPU) in the Cisco Wireless LAN Controller (WLC) before 3.2.171.5, 4.0.x before 4.0.206.0, and 4.1.x allows remote attackers on a local wireless network to cause a denial of service (loss of packet forwarding) via (1) crafted SNAP packets, (2) malformed 802.11 traffic, or (3) packets with certain header length values, aka Bug IDs CSCsg15901 and CSCsh10841.
[ "cpe:2.3:o:cisco:wireless_lan_controller_software:*:*:*:*:*:*:*:*" ]
null
null
null
6.1
null
CVE-2024-56829
Huang Yaoshi Pharmaceutical Management Software through 16.0 allows arbitrary file upload via a .asp filename in the fileName element of the UploadFile element in a SOAP request to /XSDService.asmx.
[]
null
10
null
null
null
CVE-2023-44114
Out-of-bounds array vulnerability in the dataipa module.Successful exploitation of this vulnerability may affect service confidentiality.
[ "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*" ]
null
7.5
null
null
null
CVE-2014-5027
Cross-site scripting (XSS) vulnerability in Review Board 1.7.x before 1.7.27 and 2.0.x before 2.0.4 allows remote attackers to inject arbitrary web script or HTML via a query parameter to a diff fragment page.
[ "cpe:2.3:a:reviewboard:review_board:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:reviewboard:review_board:2.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:reviewboard:review_board:2.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:reviewboard:review_board:2.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:reviewboard:review_board:2.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:reviewboard:review_board:2.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:reviewboard:review_board:2.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:reviewboard:review_board:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:reviewboard:review_board:2.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:reviewboard:review_board:2.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:reviewboard:review_board:1.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:reviewboard:review_board:1.7.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:reviewboard:review_board:1.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:reviewboard:review_board:1.7.2:*:*:*:*:*:*:*", "cpe:2.3:a:reviewboard:review_board:1.7.3:*:*:*:*:*:*:*", "cpe:2.3:a:reviewboard:review_board:1.7.4:*:*:*:*:*:*:*", "cpe:2.3:a:reviewboard:review_board:1.7.5:*:*:*:*:*:*:*", "cpe:2.3:a:reviewboard:review_board:1.7.6:*:*:*:*:*:*:*", "cpe:2.3:a:reviewboard:review_board:1.7.7:*:*:*:*:*:*:*", "cpe:2.3:a:reviewboard:review_board:1.7.8:*:*:*:*:*:*:*", "cpe:2.3:a:reviewboard:review_board:1.7.9:*:*:*:*:*:*:*", "cpe:2.3:a:reviewboard:review_board:1.7.10:*:*:*:*:*:*:*", "cpe:2.3:a:reviewboard:review_board:1.7.11:*:*:*:*:*:*:*", "cpe:2.3:a:reviewboard:review_board:1.7.12:*:*:*:*:*:*:*", "cpe:2.3:a:reviewboard:review_board:1.7.13:*:*:*:*:*:*:*", "cpe:2.3:a:reviewboard:review_board:1.7.14:*:*:*:*:*:*:*", "cpe:2.3:a:reviewboard:review_board:1.7.15:*:*:*:*:*:*:*", "cpe:2.3:a:reviewboard:review_board:1.7.16:*:*:*:*:*:*:*", "cpe:2.3:a:reviewboard:review_board:1.7.17:*:*:*:*:*:*:*", "cpe:2.3:a:reviewboard:review_board:1.7.18:*:*:*:*:*:*:*", "cpe:2.3:a:reviewboard:review_board:1.7.19:*:*:*:*:*:*:*", "cpe:2.3:a:reviewboard:review_board:1.7.20:*:*:*:*:*:*:*", "cpe:2.3:a:reviewboard:review_board:1.7.21:*:*:*:*:*:*:*", "cpe:2.3:a:reviewboard:review_board:1.7.22:*:*:*:*:*:*:*", "cpe:2.3:a:reviewboard:review_board:1.7.23:*:*:*:*:*:*:*", "cpe:2.3:a:reviewboard:review_board:1.7.24:*:*:*:*:*:*:*", "cpe:2.3:a:reviewboard:review_board:1.7.25:*:*:*:*:*:*:*", "cpe:2.3:a:reviewboard:review_board:1.7.26:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
CVE-2025-5889
juliangruber brace-expansion index.js expand redos
A vulnerability was found in juliangruber brace-expansion up to 1.1.11/2.0.1/3.0.0/4.0.0. It has been rated as problematic. Affected by this issue is the function expand of the file index.js. The manipulation leads to inefficient regular expression complexity. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 1.1.12, 2.0.2, 3.0.1 and 4.0.1 is able to address this issue. The name of the patch is a5b98a4f30d7813266b221435e1eaaf25a1b0ac5. It is recommended to upgrade the affected component.
[]
2.3
3.1
3.1
2.1
https://github.com/juliangruber/brace-expansion/pull/65/commits/a5b98a4f30d7813266b221435e1eaaf25a1b0ac5
CVE-2016-0471
Unspecified vulnerability in the PeopleSoft Enterprise PeopleTools component in Oracle PeopleSoft Products 8.53 and 8.54 allows remote attackers to affect confidentiality via unknown vectors related to Multichannel Framework.
[ "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.53:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.54:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
GHSA-h95c-rrrw-3pvx
In CdmaBroadcastSmsConfigsRequestData::encode of cdmasmsdata.cpp, there is a possible stack clash leading to memory corruption. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-242540694References: N/A
[]
null
6.7
null
null
null