id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
189k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
patch_commit_url
stringlengths
36
232
GHSA-qrx9-3wpp-hfcm
Improper input validation in the Linux kernel-mode driver for some Intel(R) 800 Series Ethernet before version 1.17.2 may allow an authenticated user to potentially enable escalation of privilege via local access.
[]
9.3
8.8
null
null
null
GHSA-98p9-xwhh-c2q7
A vulnerability in the web-based management interface of Cisco Data Center Network Manager could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the management interface on an affected device. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by persuading a user of the interface to click a customized link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive browser-based information.
[]
null
null
6.1
null
null
GHSA-grmq-8wh7-vqvm
A vulnerability was found in Gwolle Guestbook Plugin 1.7.4. It has been rated as problematic. This issue affects some unknown processing. The manipulation leads to basic cross site scripting. The attack may be initiated remotely.
[]
null
6.1
null
null
null
GHSA-2532-fj77-38p3
Multiple PHP remote file inclusion vulnerabilities in burnCMS 0.2 and earlier allow remote attackers to execute arbitrary PHP code via a URL in the root parameter to (1) mysql.class.php or (2) postgres.class.php in lib/db/; or (3) authuser.php, (4) misc.php, or (5) connect.php in lib/.
[]
null
null
null
null
null
CVE-2017-7579
inc/PMF/Faq.php in phpMyFAQ before 2.9.7 has XSS in the question field.
[ "cpe:2.3:a:phpmyfaq:phpmyfaq:*:*:*:*:*:*:*:*" ]
null
null
6.1
4.3
null
CVE-2017-14401
The EyesOfNetwork web interface (aka eonweb) 5.1-0 has SQL injection via the user_name parameter to module/admin_user/add_modify_user.php in the "ACCOUNT UPDATE" section.
[ "cpe:2.3:a:eyesofnetwork:eyesofnetwork:5.1-0:*:*:*:*:*:*:*" ]
null
null
9.8
7.5
null
GHSA-2vpg-h3vh-6g5m
The listening daemon in Blue Coat Systems Inc. WinProxy before 6.1a allows remote attackers to cause a denial of service (crash) via a long HTTP request that causes an out-of-bounds read.
[]
null
null
null
null
null
GHSA-w665-48g4-w8g7
A vulnerability was found in Human Resource Management System 1.0. It has been classified as problematic. This affects an unknown part of the component Leave Handler. The manipulation of the argument Reason leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-210831.
[]
null
5.4
null
null
null
GHSA-hc2r-g3jp-hcc7
Cross-Site Request Forgery (CSRF) vulnerability in Antsanchez Easy Cookie Law plugin <= 3.1 versions.
[]
null
5.4
null
null
null
RHSA-2017:1484
Red Hat Security Advisory: kernel security update
kernel: heap/stack gap jumping via unbounded stack allocations kernel: Incorrectly mapped contents of PIE executable
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
2.9
null
null
GHSA-6p3v-7x9x-66jr
Grandstream GXP1600 series firmware 1.0.4.152 and below is vulnerable to authenticated remote command execution when an attacker adds an OpenVPN up script to the phone's VPN settings via the "Additional Settings" field in the web interface. When the VPN's connection is established, the user defined script is executed with root privileges.
[]
null
null
null
null
null
CVE-2011-4001
Directory traversal vulnerability in HP no Mawashimono Nikki 6.6 and earlier allows remote attackers to read and modify arbitrary files via unspecified vectors.
[ "cpe:2.3:a:mawashimono:nikki:*:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:1.2:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:1.3:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:1.4:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:1.5:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:1.6:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:1.41:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:2.4:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:2.5:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:2.6:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:2.7:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:2.8:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:2.61:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:2.62:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:2.71:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:2.81:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:3.1:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:3.01:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:3.02:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:3.2:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:3.3:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:3.03:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:3.11:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:3.12:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:3.13:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:3.21:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:3.22:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:4.01:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:4.3:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:4.4:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:4.5:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:4.6:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:4.7:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:4.8:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:4.10:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:4.11:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:4.12:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:4.20:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:4.21:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:4.22:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:4.23:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:4.24:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:4.25:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:4.31:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:4.41:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:4.42:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:4.43:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:4.44:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:4.51:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:4.52:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:4.71:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:4.72:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:4.73:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:4.74:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:5.0:alpha:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:5.0:alpha2:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:5.0:alpha3:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:5.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:5.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:5.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:5.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:5.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:5.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:5.0:rc4:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:5.0:rc5:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:5.0:rc6:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:5.0:rc7:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:5.1:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:5.01:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:5.2:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:5.02:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:5.3:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:5.03:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:5.4:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:5.04:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:5.5:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:5.05:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:5.11:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:5.12:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:5.13:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:5.14:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:5.15:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:5.16:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:5.21:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:5.22:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:5.23:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:5.24:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:5.41:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:5.42:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:5.43:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:5.51:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:5.52:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:5.53:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:5.54:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:5.55:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:5.56:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:5.57:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:5.58:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:5.59:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:5.111:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:5.141:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:5.142:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:5.143:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:5.144:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:5.145:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:5.146:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:5.147:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:5.148:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:5.149:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:5.151:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:5.152:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:5.153:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:5.154:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:5.155:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:5.156:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:5.157:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:5.158:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:5.159:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:5.161:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:5.162:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:5.163:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:5.231:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:6.00:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:6.01:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:6.02:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:6.03:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:6.04:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:6.4:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:6.5:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:6.05:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:6.06:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:6.07:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:6.08:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:6.09:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:6.10:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:6.11:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:6.12:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:6.13:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:6.14:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:6.15:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:6.16:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:6.17:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:6.18:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:6.19:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:6.20:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:6.21:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:6.22:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:6.23:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:6.24:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:6.25:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:6.26:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:6.27:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:6.28:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:6.29:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:6.30:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:6.31:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:6.32:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:6.33:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:6.34:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:6.51:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:6.52:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:6.53:*:*:*:*:*:*:*", "cpe:2.3:a:mawashimono:nikki:6.54:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2017-18685
An issue was discovered on Samsung mobile devices with KK(4.4), L(5.0/5.1), and M(6.0) software. The InputMethod application can cause a system crash via a malformed serializable object in an Intent. The Samsung ID is SVE-2016-7123 (February 2017).
[ "cpe:2.3:o:google:android:4.4:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:5.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*" ]
null
7.5
null
7.8
null
RHSA-2018:3663
Red Hat Security Advisory: sos-collector security update
sos-collector: incorrect permissions set on newly created files
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
5.9
null
null
GHSA-hx7r-89vp-x3gj
In Audiocodes Mediapack MP-11x through 6.60A.369.002, a crafted POST request request may result in an unauthenticated remote user's ability to execute unauthorized code.
[]
null
9.8
null
null
null
CVE-2012-4597
Cross-site scripting (XSS) vulnerability in McAfee Email and Web Security (EWS) 5.5 through Patch 6 and 5.6 through Patch 3, and McAfee Email Gateway (MEG) 7.0.0 and 7.0.1, allows remote attackers to inject arbitrary web script or HTML via vectors related to the McAfee Security Appliance Management Console/Dashboard.
[ "cpe:2.3:a:mcafee:email_and_web_security:5.5:*:*:*:*:*:*:*", "cpe:2.3:a:mcafee:email_and_web_security:5.6:*:*:*:*:*:*:*", "cpe:2.3:a:mcafee:email_gateway:7.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:mcafee:email_gateway:7.0.1:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
GHSA-gjjp-x6r5-h5rj
The Xen hypervisor block backend driver for Linux kernel 2.6.18, when running on a 64-bit host with a 32-bit paravirtualized guest, allows local privileged users in the guest OS to cause a denial of service (host OS crash) via a request that specifies a large number of blocks.
[]
null
null
null
null
null
RHSA-2013:0144
Red Hat Security Advisory: firefox security update
Mozilla: Use-after-free when displaying table with many columns and column groups (MFSA 2013-05) Mozilla: Compartment mismatch with quickstubs returned values (MFSA 2013-09) Mozilla: Address space layout leaked in XBL objects (MFSA 2013-11) Mozilla: Buffer overflow in Javascript string concatenation (MFSA 2013-12) Mozilla: Use-after-free in serializeToStream (MFSA 2013-16) Mozilla: Use-after-free in ListenerManager (MFSA 2013-17) Mozilla: Chrome Object Wrapper (COW) bypass through plugin objects (MFSA 2013-15) Mozilla: URL spoofing in addressbar during page loads (MFSA 2013-04) Mozilla: Use-after-free and buffer overflow issues found using Address Sanitizer (MFSA 2013-02) Mozilla: Use-after-free and buffer overflow issues found using Address Sanitizer (MFSA 2013-02) Mozilla: Use-after-free and buffer overflow issues found using Address Sanitizer (MFSA 2013-02) Mozilla: Miscellaneous memory safety hazards (rv:10.0.12) (MFSA 2013-01)
[ "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
null
CVE-2009-1371
The CLI_ISCONTAINED macro in libclamav/others.h in ClamAV before 0.95.1 allows remote attackers to cause a denial of service (application crash) via a malformed file with UPack encoding.
[ "cpe:2.3:a:clamav:clamav:*:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.01:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.02:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.3:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.03:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.05:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.8_:rc3:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.9_rc1:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.10:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.12:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.13:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.14:pre:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.15:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.20:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.21:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.22:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.23:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.24:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.51:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.52:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.53:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.54:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.60:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.60p:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.65:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.66:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.67:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.67-1:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.68:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.68.1:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.70:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.70:rc:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.71:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.72:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.73:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.74:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.75:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.75.1:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.80:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.80:rc4:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.80_rc:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.80_rc1:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.80_rc2:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.80_rc3:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.81:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.81_rc1:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.82:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.83:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.84:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.84_rc1:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.84_rc2:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.85:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.85.1:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.86:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.86.1:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.86.2:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.86_rc1:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.87:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.87.1:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.88:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.88.1:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.88.2:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.88.3:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.88.4:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.88.5:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.88.6:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.88.7:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.88.7_p0:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.88.7_p1:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.90:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.90.1:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.90.1_p0:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.90.2:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.90.2_p0:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.90.3:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.90.3_p0:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.90.3_p1:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.90_rc1:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.90_rc1.1:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.90_rc2:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.90_rc3:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.91:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.91.1:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.91.2:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.91.2_p0:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.91_rc1:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.91_rc2:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.92:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.92.1:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.92_p0:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.93:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.93.1:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.93.2:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.93.3:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.94:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.94.1:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.94.2:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.95:src1:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.95:src2:*:*:*:*:*:*" ]
null
null
null
5
null
GHSA-644w-28vg-vrrc
The leakage of the client secret in TonTon-Tei Line v13.6.1 allows attackers to obtain the channel access token and send crafted broadcast messages.
[]
null
8.2
null
null
null
CVE-2014-4007
The SAP Upgrade tools for ABAP has hardcoded credentials, which makes it easier for remote attackers to obtain access via unspecified vectors.
[ "cpe:2.3:a:sap:upgrade_tools:-:*:*:*:*:*:*:*" ]
null
null
null
5
null
CVE-2023-21101
In multiple functions of WVDrmPlugin.cpp, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android SoCAndroid ID: A-258189255
[ "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*" ]
null
7
null
null
null
CVE-2023-46204
WordPress Duplicate Theme Plugin <= 0.1.6 is vulnerable to Cross Site Request Forgery (CSRF)
Cross-Site Request Forgery (CSRF) vulnerability in Muller Digital Inc. Duplicate Theme plugin <= 0.1.6 versions.
[ "cpe:2.3:a:mullerdigital:duplicate_theme:*:*:*:*:*:wordpress:*:*" ]
null
4.3
null
null
null
GHSA-x356-8vx7-fmf3
Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.36 and prior, 7.5.26 and prior, 7.6.22 and prior and and 8.0.29 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H).
[]
null
6.3
null
null
null
GHSA-qrcv-45vg-jfwm
An Incorrect Access Control (issue 1 of 2) was discovered in GitLab Community and Enterprise Edition before 11.7.8, 11.8.x before 11.8.4, and 11.9.x before 11.9.2. It allowed non-members of a private project/group to add and read labels.
[]
null
null
null
null
null
CVE-2025-25769
Wangmarket v4.10 to v5.0 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /controller/UserController.java.
[]
null
8
null
null
null
GHSA-vh2f-wj96-fxxh
In the Linux kernel, the following vulnerability has been resolved:RDMA/mlx5: Fix fortify source warning while accessing Eth segment------------[ cut here ]------------ memcpy: detected field-spanning write (size 56) of single field "eseg->inline_hdr.start" at /var/lib/dkms/mlnx-ofed-kernel/5.8/build/drivers/infiniband/hw/mlx5/wr.c:131 (size 2) WARNING: CPU: 0 PID: 293779 at /var/lib/dkms/mlnx-ofed-kernel/5.8/build/drivers/infiniband/hw/mlx5/wr.c:131 mlx5_ib_post_send+0x191b/0x1a60 [mlx5_ib] Modules linked in: 8021q garp mrp stp llc rdma_ucm(OE) rdma_cm(OE) iw_cm(OE) ib_ipoib(OE) ib_cm(OE) ib_umad(OE) mlx5_ib(OE) ib_uverbs(OE) ib_core(OE) mlx5_core(OE) pci_hyperv_intf mlxdevm(OE) mlx_compat(OE) tls mlxfw(OE) psample nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_set nf_tables libcrc32c nfnetlink mst_pciconf(OE) knem(OE) vfio_pci vfio_pci_core vfio_iommu_type1 vfio iommufd irqbypass cuse nfsv3 nfs fscache netfs xfrm_user xfrm_algo ipmi_devintf ipmi_msghandler binfmt_misc crct10dif_pclmul crc32_pclmul polyval_clmulni polyval_generic ghash_clmulni_intel sha512_ssse3 snd_pcsp aesni_intel crypto_simd cryptd snd_pcm snd_timer joydev snd soundcore input_leds serio_raw evbug nfsd auth_rpcgss nfs_acl lockd grace sch_fq_codel sunrpc drm efi_pstore ip_tables x_tables autofs4 psmouse virtio_net net_failover failover floppy [last unloaded: mlx_compat(OE)] CPU: 0 PID: 293779 Comm: ssh Tainted: G OE 6.2.0-32-generic #32~22.04.1-Ubuntu Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 RIP: 0010:mlx5_ib_post_send+0x191b/0x1a60 [mlx5_ib] Code: 0c 01 00 a8 01 75 25 48 8b 75 a0 b9 02 00 00 00 48 c7 c2 10 5b fd c0 48 c7 c7 80 5b fd c0 c6 05 57 0c 03 00 01 e8 95 4d 93 da <0f> 0b 44 8b 4d b0 4c 8b 45 c8 48 8b 4d c0 e9 49 fb ff ff 41 0f b7 RSP: 0018:ffffb5b48478b570 EFLAGS: 00010046 RAX: 0000000000000000 RBX: 0000000000000001 RCX: 0000000000000000 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 RBP: ffffb5b48478b628 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: ffffb5b48478b5e8 R13: ffff963a3c609b5e R14: ffff9639c3fbd800 R15: ffffb5b480475a80 FS: 00007fc03b444c80(0000) GS:ffff963a3dc00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000556f46bdf000 CR3: 0000000006ac6003 CR4: 00000000003706f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: <TASK> ? show_regs+0x72/0x90 ? mlx5_ib_post_send+0x191b/0x1a60 [mlx5_ib] ? __warn+0x8d/0x160 ? mlx5_ib_post_send+0x191b/0x1a60 [mlx5_ib] ? report_bug+0x1bb/0x1d0 ? handle_bug+0x46/0x90 ? exc_invalid_op+0x19/0x80 ? asm_exc_invalid_op+0x1b/0x20 ? mlx5_ib_post_send+0x191b/0x1a60 [mlx5_ib] mlx5_ib_post_send_nodrain+0xb/0x20 [mlx5_ib] ipoib_send+0x2ec/0x770 [ib_ipoib] ipoib_start_xmit+0x5a0/0x770 [ib_ipoib] dev_hard_start_xmit+0x8e/0x1e0 ? validate_xmit_skb_list+0x4d/0x80 sch_direct_xmit+0x116/0x3a0 __dev_xmit_skb+0x1fd/0x580 __dev_queue_xmit+0x284/0x6b0 ? _raw_spin_unlock_irq+0xe/0x50 ? __flush_work.isra.0+0x20d/0x370 ? push_pseudo_header+0x17/0x40 [ib_ipoib] neigh_connected_output+0xcd/0x110 ip_finish_output2+0x179/0x480 ? __smp_call_single_queue+0x61/0xa0 __ip_finish_output+0xc3/0x190 ip_finish_output+0x2e/0xf0 ip_output+0x78/0x110 ? __pfx_ip_finish_output+0x10/0x10 ip_local_out+0x64/0x70 __ip_queue_xmit+0x18a/0x460 ip_queue_xmit+0x15/0x30 __tcp_transmit_skb+0x914/0x9c0 tcp_write_xmit+0x334/0x8d0 tcp_push_one+0x3c/0x60 tcp_sendmsg_locked+0x2e1/0xac0 tcp_sendmsg+0x2d/0x50 inet_sendmsg+0x43/0x90 sock_sendmsg+0x68/0x80 sock_write_iter+0x93/0x100 vfs_write+0x326/0x3c0 ksys_write+0xbd/0xf0 ? do_syscall_64+0x69/0x90 __x64_sys_write+0x19/0x30 do_syscall_ ---truncated---
[]
null
7.8
null
null
null
CVE-2020-15314
Zyxel CloudCNM SecuManager 3.1.0 and 3.1.1 has a hardcoded RSA SSH key for the root account.
[ "cpe:2.3:a:zyxel:cloudcnm_secumanager:3.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:zyxel:cloudcnm_secumanager:3.1.1:*:*:*:*:*:*:*" ]
null
5.9
null
4.3
null
CVE-2025-39361
WordPress Royal Elementor Addons plugin <= 1.7.1017 - Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WProyal Royal Elementor Addons allows Stored XSS.This issue affects Royal Elementor Addons: from n/a through 1.7.1017.
[]
null
6.5
null
null
null
GHSA-x8jc-gpmg-fxrr
SQL injection vulnerability in search.php in MyTopix 1.2.3 allows remote attackers to execute arbitrary SQL commands via the (1) mid and (2) keywords parameters.
[]
null
null
null
null
null
CVE-2017-11358
The read_samples function in hcom.c in Sound eXchange (SoX) 14.4.2 allows remote attackers to cause a denial of service (invalid memory read and application crash) via a crafted hcom file.
[ "cpe:2.3:a:sound_exchange_project:sound_exchange:14.4.2:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" ]
null
null
5.5
4.3
null
CVE-2009-0860
Cross-site scripting (XSS) vulnerability in the web user interface in the login application in NetMRI 3.0.1 and earlier allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, related to error pages.
[ "cpe:2.3:a:netcordia:netmri:*:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
GHSA-3c96-x4xm-9p54
The web interface in Pattern Insight 2.3 allows remote attackers to conduct clickjacking attacks via a FRAME element.
[]
null
null
null
null
null
CVE-2021-38966
IBM Cloud Pak for Automation 21.0.2 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 212357.
[ "cpe:2.3:a:ibm:cloud_pak_for_automation:21.0.2:-:*:*:*:*:*:*", "cpe:2.3:a:ibm:workflow_process_service:21.0.2:*:*:*:*:*:*:*" ]
null
null
5.4
null
null
GHSA-q44p-q588-242q
jQuery 1.4.2 allows remote attackers to conduct cross-site scripting (XSS) attacks via vectors related to use of the text method inside after.
[]
null
null
6.1
null
null
GHSA-cg57-h35j-g58g
getgps data in iTrack Easy can be modified without authentication by setting the data using the parametercmd:setothergps. This vulnerability can be exploited to alter the GPS data of a lost device.
[]
null
null
7.5
null
null
RHSA-2023:3715
Red Hat Security Advisory: libvirt security update
libvirt: Memory leak in virPCIVirtualFunctionList cleanup
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
6.3
null
null
null
GHSA-995f-rv3r-c9mx
Microsoft Windows SCSI Class System File Elevation of Privilege Vulnerability
[]
null
7.8
null
null
null
CVE-2011-1269
Microsoft PowerPoint 2002 SP3, 2003 SP3, and 2007 SP2; Office 2004 and 2008 for Mac; Open XML File Format Converter for Mac; and Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP2 make unspecified function calls during file parsing without proper handling of memory, which allows remote attackers to execute arbitrary code via a crafted PowerPoint document, aka "Presentation Memory Corruption RCE Vulnerability."
[ "cpe:2.3:a:microsoft:office:2004:*:mac:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2008:*:mac:*:*:*:*:*", "cpe:2.3:a:microsoft:office_compatibility_pack:2007:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:open_xml_file_format_converter:*:*:mac:*:*:*:*:*", "cpe:2.3:a:microsoft:powerpoint:2002:sp3:*:*:*:*:*:*", "cpe:2.3:a:microsoft:powerpoint:2003:sp3:*:*:*:*:*:*", "cpe:2.3:a:microsoft:powerpoint:2007:sp2:*:*:*:*:*:*" ]
null
null
null
9.3
null
RHSA-2022:1934
Red Hat Security Advisory: mod_auth_mellon security update
mod_auth_mellon: Open Redirect vulnerability in logout URLs
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
null
6.1
null
null
CVE-2020-9707
Adobe Acrobat and Reader versions 2020.009.20074 and earlier, 2020.001.30002, 2017.011.30171 and earlier, and 2015.006.30523 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
[ "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:20.001.30002:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:20.001.30002:*:*:*:classic:*:*:*", "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
3.3
null
4.3
null
GHSA-cwx6-6g6c-mmwm
Improper conditions check in Intel BIOS platform sample code for some Intel(R) Processors before may allow a privileged user to potentially enable escalation of privilege via local access.
[]
null
6.7
null
null
null
CVE-2017-1337
IBM WebSphere MQ 9.0.1 and 9.0.2 Java/JMS application can incorrectly transmit user credentials in plain text. IBM X-Force ID: 126245.
[ "cpe:2.3:a:ibm:websphere_mq:9.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_mq:9.0.2:*:*:*:*:*:*:*" ]
null
null
8.1
4.3
null
CVE-2020-13245
Certain NETGEAR devices are affected by Missing SSL Certificate Validation. This affects R7000 1.0.9.6_1.2.19 through 1.0.11.100_10.2.10, and possibly R6120, R7800, R6220, R8000, R6350, R9000, R6400, RAX120, R6400v2, RBR20, R6800, XR300, R6850, XR500, and R7000P.
[ "cpe:2.3:o:netgear:r6120_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r6120:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r6220_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r6220:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r6350_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r6350:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r6400_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r6400:-:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r6400:v2:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r6800_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r6800:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r6850_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r6850:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r7000p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r7000p:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r7800_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r7800:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r8000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r8000:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r9000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r9000:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:rax120_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:rax120:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:rbr20_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:rbr20:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:xr300_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:xr300:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:xr500_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:xr500:-:*:*:*:*:*:*:*" ]
null
5.9
null
4.3
null
CVE-2007-5910
Stack-based buffer overflow in Autonomy (formerly Verity) KeyView Viewer, Filter, and Export SDK before 9.2.0.12, as used by ActivePDF DocConverter, wp6sr.dll in IBM Lotus Notes 8.0 and before 7.0.3, Symantec Mail Security, and other products, allows remote attackers to execute arbitrary code via a crafted WordPerfect (WPD) file.
[ "cpe:2.3:a:activepdf:docconverter:3.8.2_.5:*:*:*:*:*:*:*", "cpe:2.3:a:autonomy:keyview_export_sdk:*:*:*:*:*:*:*:*", "cpe:2.3:a:autonomy:keyview_filter_sdk:*:*:*:*:*:*:*:*", "cpe:2.3:a:autonomy:keyview_viewer_sdk:*:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_notes:*:*:*:*:*:*:*:*", "cpe:2.3:a:symantec:mail_security:5.0:*:appliance:*:*:*:*:*", "cpe:2.3:a:symantec:mail_security:5.0:*:microsoft_exchange:*:*:*:*:*", "cpe:2.3:a:symantec:mail_security:5.0.0:*:smtp:*:*:*:*:*", "cpe:2.3:a:symantec:mail_security:5.0.0.24:*:appliance:*:*:*:*:*", "cpe:2.3:a:symantec:mail_security:5.0.1:*:smtp:*:*:*:*:*", "cpe:2.3:a:symantec:mail_security:7.5:*:domino:*:*:*:*:*" ]
null
null
null
9.3
null
GHSA-55hp-hjjj-m6wh
QuickCMS is vulnerable to Reflected XSS via sLangEdit parameter in admin's panel functionality. A malicious attacker can craft a specially crafted URL that, when opened, results in arbitrary JavaScript execution in the victim's browser.The vendor was notified early about this vulnerability, but didn't respond with the details of vulnerability or vulnerable version range. Only version 6.8 was tested and confirmed as vulnerable, other versions were not tested and might also be vulnerable.
[]
5.1
6.1
null
null
null
CVE-2023-46737
Possible endless data attack from attacker-controlled registry in cosign
Cosign is a sigstore signing tool for OCI containers. Cosign is susceptible to a denial of service by an attacker controlled registry. An attacker who controls a remote registry can return a high number of attestations and/or signatures to Cosign and cause Cosign to enter a long loop resulting in an endless data attack. The root cause is that Cosign loops through all attestations fetched from the remote registry in pkg/cosign.FetchAttestations. The attacker needs to compromise the registry or make a request to a registry they control. When doing so, the attacker must return a high number of attestations in the response to Cosign. The result will be that the attacker can cause Cosign to go into a long or infinite loop that will prevent other users from verifying their data. In Kyvernos case, an attacker whose privileges are limited to making requests to the cluster can make a request with an image reference to their own registry, trigger the infinite loop and deny other users from completing their admission requests. Alternatively, the attacker can obtain control of the registry used by an organization and return a high number of attestations instead the expected number of attestations. The issue can be mitigated rather simply by setting a limit to the limit of attestations that Cosign will loop through. The limit does not need to be high to be within the vast majority of use cases and still prevent the endless data attack. This issue has been patched in version 2.2.1 and users are advised to upgrade.
[ "cpe:2.3:a:sigstore:cosign:*:*:*:*:*:*:*:*" ]
null
3.1
null
null
null
CVE-2025-3774
Wise Chat <= 3.3.4 - Unauthenticated Stored Cross-Site Scripting via X-Forwarded-For Header
The Wise Chat plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the X-Forwarded-For header in all versions up to, and including, 3.3.4 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
7.2
null
null
null
GHSA-624h-qqfx-32pv
Adobe Acrobat and Reader versions 2019.010.20098 and earlier, 2019.010.20098 and earlier, 2017.011.30127 and earlier version, and 2015.006.30482 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure .
[]
null
null
7.5
null
null
RHSA-2023:4499
Red Hat Security Advisory: thunderbird security update
thunderbird: File Extension Spoofing using the Text Direction Override Character Mozilla: Offscreen Canvas could have bypassed cross-origin restrictions Mozilla: Incorrect value used during WASM compilation Mozilla: Potential permissions request bypass via clickjacking Mozilla: Crash in DOMParser due to out-of-memory conditions Mozilla: Fix potential race conditions when releasing platform objects Mozilla: Stack buffer overflow in StorageManager Mozilla: Cookie jar overflow caused unexpected cookie jar state Mozilla: Memory safety bugs fixed in Firefox 116, Firefox ESR 115.1, Firefox ESR 102.14, Thunderbird 115.1, and Thunderbird 102.14 Mozilla: Memory safety bugs fixed in Firefox ESR 115.1, and Thunderbird 115.1
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
9.8
null
null
null
CVE-2023-45807
OpenSearch Issue with tenant read-only permissions
OpenSearch is a community-driven, open source fork of Elasticsearch and Kibana following the license change in early 2021. There is an issue with the implementation of tenant permissions in OpenSearch Dashboards where authenticated users with read-only access to a tenant can perform create, edit and delete operations on index metadata of dashboards and visualizations in that tenant, potentially rendering them unavailable. This issue does not affect index data, only metadata. Dashboards correctly enforces read-only permissions when indexing and updating documents. This issue does not provide additional read access to data users don’t already have. This issue can be mitigated by disabling the tenants functionality for the cluster. Versions 1.3.14 and 2.11.0 contain a fix for this issue.
[ "cpe:2.3:a:amazon:opensearch:*:*:*:*:*:docker:*:*", "cpe:2.3:a:amazon:opensearch:*:*:*:*:*:maven:*:*" ]
null
5.4
null
null
null
GHSA-cgx8-9m8p-2q4p
A vulnerability in the Network Address Translation 64 (NAT64) functions of Cisco IOS Software could allow an unauthenticated, remote attacker to cause either an interface queue wedge or a device reload. The vulnerability is due to the incorrect handling of certain IPv4 packet streams that are sent through the device. An attacker could exploit this vulnerability by sending specific IPv4 packet streams through the device. An exploit could allow the attacker to either cause an interface queue wedge or a device reload, resulting in a denial of service (DoS) condition.
[]
null
null
7.5
null
null
GHSA-vpg4-mfvr-xc5c
An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A stack out-of-bounds read occurs in mbc_enc_len() during regular expression searching. Invalid handling of reg->dmin in forward_search_range() could result in an invalid pointer dereference, as an out-of-bounds read from a stack buffer.
[]
null
null
9.8
null
null
GHSA-j6jv-rr9g-q9j6
A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory leak at the fifo_alloc_common function in libavutil/fifo.c.
[]
null
null
null
null
null
CVE-2023-26405
ZDI-CAN-20712: Object Prototype pollution which leads to API Restrictions Bypass
Adobe Acrobat Reader versions 23.001.20093 (and earlier) and 20.005.30441 (and earlier) are affected by an Improper Input Validation vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[ "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
7.8
null
null
null
GHSA-c62j-xm9j-qw97
The Site Reviews WordPress plugin before 6.7.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
[]
null
4.8
null
null
null
GHSA-cg5m-p8pg-93cg
Theoretically, it would be possible for an attacker to brute-force the password for an instance in single-user password protection mode via a timing attack given the linear nature of the `!==` used for comparison.The risk is minified by the additional overhead of the request, which varies in a non-constant nature making the attack less reliable to execute
[]
null
null
7.1
null
null
RHSA-2023:2075
Red Hat Security Advisory: libwebp security update
Mozilla: libwebp: Double-free in libwebp
[ "cpe:/a:redhat:rhel_eus:9.0::appstream" ]
null
7.5
null
null
null
GHSA-7xq3-j5px-xf94
The is_asn1 function in strongSwan 4.1.11 through 5.0.4 does not properly validate the return value of the asn1_length function, which allows remote attackers to cause a denial of service (segmentation fault) via a (1) XAuth username, (2) EAP identity, or (3) PEM encoded file that starts with a 0x04, 0x30, or 0x31 character followed by an ASN.1 length value that triggers an integer overflow.
[]
null
null
null
null
null
RHSA-2024:2066
Red Hat Security Advisory: buildah security update
buildah: full container escape at build time
[ "cpe:/a:redhat:rhel_eus:9.0::appstream" ]
null
8.6
null
null
null
CVE-2019-4298
IBM Robotic Process Automation with Automation Anywhere 11 uses a high privileged PostgreSQL account for database access which could allow a local user to perform actions they should not have privileges to execute. IBM X-Force ID: 160764.
[ "cpe:2.3:a:ibm:robotic_process_automation_with_automation_anywhere:*:*:*:*:*:*:*:*" ]
null
null
7.7
null
null
CVE-2022-0806
Data leak in Canvas in Google Chrome prior to 99.0.4844.51 allowed a remote attacker who convinced a user to engage in screen sharing to potentially leak cross-origin data via a crafted HTML page.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
6.5
null
4.3
null
GHSA-c8c6-j574-7j4p
In telephony service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed.
[]
null
5.5
null
null
null
GHSA-hc9m-j5rq-cphm
Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.862 Application 20.0.2014 allows Server-Side Request Forgery: Elatec V-2023-014.
[]
null
9.8
null
null
null
CVE-2023-5222
Viessmann Vitogate 300 Web Management Interface vitogate.cgi isValidUser hard-coded password
A vulnerability classified as critical was found in Viessmann Vitogate 300 up to 2.1.3.0. This vulnerability affects the function isValidUser of the file /cgi-bin/vitogate.cgi of the component Web Management Interface. The manipulation leads to use of hard-coded password. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-240364. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
[ "cpe:2.3:o:viessmann:vitogate_300_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:viessmann:vitogate_300:-:*:*:*:*:*:*:*" ]
null
6.3
6.3
5.8
null
GHSA-76g9-9frm-pxr6
An issue was discovered on NETGEAR Nighthawk M1 (MR1100) devices before 12.06.03. The web-interface Cross-Site Request Forgery token is stored in a dynamically generated JavaScript file, and therefore can be embedded in third party pages, and re-used against the Nighthawk web interface. This entirely bypasses the intended security benefits of the use of a CSRF-protection token.
[]
null
null
8.1
null
null
CVE-2021-2405
Vulnerability in the Oracle Engineering product of Oracle E-Business Suite (component: Change Management). Supported versions that are affected are 12.2.3-12.2.10. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Engineering. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Engineering accessible data as well as unauthorized access to critical data or complete access to all Oracle Engineering accessible data. CVSS 3.1 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N).
[ "cpe:2.3:a:oracle:engineering:*:*:*:*:*:*:*:*" ]
null
8.1
null
null
null
GHSA-43g9-956r-vq78
readelf in GNU Binutils 2.28 is vulnerable to a heap-based buffer over-read while processing corrupt RL78 binaries. The vulnerability can trigger program crashes. It may lead to an information leak as well.
[]
null
null
9.1
null
null
CVE-2001-0674
Directory traversal vulnerability in RobTex Viking Web server before 1.07-381 allows remote attackers to read arbitrary files via a hexadecimal encoded dot-dot attack (eg. http://www.server.com/%2e%2e/%2e%2e) in an HTTP URL request.
[ "cpe:2.3:a:robtex:viking_server:*:*:*:*:*:*:*:*", "cpe:2.3:a:robtex:viking_server:1.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:robtex:viking_server:1.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:robtex:viking_server:1.0.7:*:*:*:*:*:*:*" ]
null
null
null
5
null
CVE-2018-4023
An exploitable code execution vulnerability exists in the XML_UploadFile Wi-Fi command of the NT9665X Chipset firmware, running on the Anker Roav A1 Dashcam, version RoavA1SWV1.9. A specially crafted packet can cause a stack-based buffer overflow, resulting in code execution.
[ "cpe:2.3:o:anker-in:roav_dashcam_a1_firmware:1.9:*:*:*:*:*:*:*", "cpe:2.3:h:anker-in:roav_dashcam_a1:-:*:*:*:*:*:*:*" ]
null
null
10
null
null
GHSA-442g-whj9-hm26
(1) ipxchk and (2) ipxlink in SGI OS2 IRIX 6.3 does not properly clear the IFS environmental variable before executing system calls, which allows local users to execute arbitrary commands.
[]
null
null
null
null
null
CVE-2018-1553
IBM WebSphere Application Server Liberty prior to 18.0.0.2 could allow a remote attacker to obtain sensitive information, caused by mishandling of exceptions by the SAML Web SSO feature. IBM X-Force ID: 142890.
[ "cpe:2.3:a:ibm:websphere_application_server:*:*:*:*:liberty:*:*:*" ]
null
null
5.3
null
null
CVE-2025-41708
Cleartext Transmission of Sensitive Data via Insecure HTTP Web Interface
Due to an unsecure default configuration HTTP is used instead of HTTPS for the web interface. An unauthenticated attacker on the same network could exploit this to learn sensitive data during transmission.
[]
null
7.4
null
null
null
CVE-2022-45086
Cross-site Scripting in Smartpower Web
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Group Arge Energy and Control Systems Smartpower Web allows Cross-Site Scripting (XSS). This issue affects Smartpower Web: before 23.01.01.
[ "cpe:2.3:a:gruparge:smartpower_web:*:*:*:*:*:*:*:*" ]
null
5.4
null
null
null
CVE-2023-0868
Stealing Cookies using Reflected XSS via graph results
Reflected cross-site scripting in graph results in multiple versions of OpenNMS Meridian and Horizon could allow an attacker access to steal session cookies. Users should upgrade to Meridian 2023.1.0 or newer, or Horizon 31.0.4. Meridian and Horizon installation instructions state that they are intended for installation within an organization's private networks and should not be directly accessible from the Internet.
[ "cpe:2.3:a:opennms:horizon:*:*:*:*:*:*:*:*", "cpe:2.3:a:opennms:meridian:*:*:*:*:*:*:*:*" ]
null
6.7
null
null
null
GHSA-94rc-fxwq-q3h5
OpenSID 18.06-pasca has an Unrestricted File Upload vulnerability via an Attachment Document in the article feature. This vulnerability leads to uploading arbitrary PHP code via a .php filename with the application/pdf Content-Type.
[]
null
null
9.8
null
null
ICSA-19-204-01
Mitsubishi Electric FR Configurator2
This vulnerability is triggered when input passed to the XML parser is not sanitized while parsing the XML project and/or template file (.frc2). Once a user opens the file, the attacker could read arbitrary files. CVE-2019-10976 has been assigned to this vulnerability. A CVSS v3 base score of 7.1 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H). This vulnerability can be triggered when an attacker provides the target with a rogue project file (.frc2). Once a user opens the rogue project, CPU exhaustion occurs, which causes the software to quit responding until the application is restarted. CVE-2019-10972 has been assigned to this vulnerability. A CVSS v3 base score of 5.5 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H).
[]
null
null
5.5
null
null
CVE-2015-3215
The NetKVM Windows Virtio driver allows remote attackers to cause a denial of service (guest crash) via a crafted length value in an IP packet, as demonstrated by a value that does not account for the size of the IP options.
[ "cpe:2.3:a:redhat:virtio-win:-:*:*:*:*:*:*:*" ]
null
null
7.5
5
null
GHSA-8qq3-mrrg-37qg
Microsoft Dynamics Business Central Cross-site Scripting Vulnerability
[]
null
6.1
null
null
null
GHSA-4w56-w59g-jg9w
Adobe Experience Manager versions 6.5.19 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
[]
null
5.4
null
null
null
GHSA-pgg9-mmcg-8mxp
MantisBT Incorrect Authorization in bug_actiongroup_page.php
An issue was discovered in MantisBT before 2.24.4. Due to insufficient access-level checks, any logged-in user allowed to perform Group Actions can get access to the Summary fields of private Issues via bug_arr[]= in a crafted bug_actiongroup_page.php URL. (The target Issues can have Private view status, or belong to a private Project.)
[]
null
null
null
null
null
CVE-2023-37314
D-Link DAP-2622 DDP Set IPv6 Address Auth Username Stack-based Buffer Overflow Remote Code Execution Vulnerability
D-Link DAP-2622 DDP Set IPv6 Address Auth Username Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DAP-2622 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the DDP service. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. . Was ZDI-CAN-20092.
[ "cpe:2.3:o:dlink:dap_2622_firmware:*:*:*:*:*:*:*:*" ]
null
null
8.8
null
null
CVE-2012-3842
Multiple cross-site scripting (XSS) vulnerabilities in CMD_DOMAIN in JBMC Software DirectAdmin 1.403 allow remote authenticated users with certain privileges to inject arbitrary web script or HTML via the (1) select0 or (2) select8 parameters.
[ "cpe:2.3:a:jbmc-software:directadmin:1.403:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
RHSA-2011:0542
Red Hat Security Advisory: Red Hat Enterprise Linux 6.1 kernel security, bug fix and enhancement update
kvm: arch/x86/kvm/x86.c: reading uninitialized stack memory kernel: unlimited socket backlog DoS kernel: unlimited socket backlog DoS kernel: thp: prevent hugepages during args/env copying into the user stack kernel: fs/partitions: Validate map_count in Mac partition tables kernel: BUG_ON() in rds_send_xmit() kernel: potential kernel deadlock when creating circular epoll file structures kernel: nfs4: Ensure that ACL pages sent over NFS were not allocated from the slab kernel: fs/partitions: Corrupted OSF partition table infoleak kernel: ipv4: netfilter: arp_tables: fix infoleak to userspace kernel: ipv4: netfilter: ip_tables: fix infoleak to userspace kernel: ipv6: netfilter: ip6_tables: fix infoleak to userspace kernel: drivers/scsi/mpt2sas: prevent heap overflows kernel: drivers/scsi/mpt2sas: prevent heap overflows kernel: bonding: Incorrect TX queue offset
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
null
CVE-2018-20870
The WebDAV transport feature in cPanel before 76.0.8 enables debug logging (SEC-467).
[ "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*" ]
null
null
5.5
2.1
null
GHSA-997j-7vrq-hm64
An issue was discovered on MOXA EDS-G512E 5.1 build 16072215 devices. An attacker could extract public and private keys from the firmware image available on the MOXA website and could use them against a production switch that has the default keys embedded.
[]
null
null
7.5
null
null
CVE-2015-3755
WebKit in Apple Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, as used in iOS before 8.4.1 and other products, allows remote attackers to spoof the user interface via a malformed URL.
[ "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
CVE-2020-5900
In versions 3.0.0-3.4.0, 2.0.0-2.9.0, and 1.0.1, there is insufficient cross-site request forgery (CSRF) protections for the NGINX Controller user interface.
[ "cpe:2.3:a:f5:nginx_controller:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:nginx_controller:1.0.1:*:*:*:*:*:*:*" ]
null
8.8
null
6.8
null
GHSA-3cxh-xp3g-jxjm
Apache ShardingSphere-Agent Deserialization of Untrusted Data vulnerability
Deserialization of Untrusted Data vulnerability in Apache ShardingSphere-Agent, which allows attackers to execute arbitrary code by constructing a special YAML configuration file.The attacker needs to have permission to modify the ShardingSphere Agent YAML configuration file on the target machine, and the target machine can access the URL with the arbitrary code JAR. An attacker can use SnakeYAML to deserialize java.net.URLClassLoader and make it load a JAR from a specified URL, and then deserialize javax.script.ScriptEngineManager to load code using that ClassLoader. When the ShardingSphere JVM process starts and uses the ShardingSphere-Agent, the arbitrary code specified by the attacker will be executed during the deserialization of the YAML configuration file by the Agent.This issue affects ShardingSphere-Agent: through 5.3.2. This vulnerability is fixed in Apache ShardingSphere 5.4.0.
[]
null
8.8
null
null
null
CVE-2018-4971
Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have a Use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
[ "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
null
8.8
6.8
null
CVE-2023-50213
D-Link G416 nodered File Handling Command Injection Remote Code Execution Vulnerability
D-Link G416 nodered File Handling Command Injection Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link G416 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the HTTP service listening on TCP port 80. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-21807.
[ "cpe:2.3:a:dlink:g416_firmware:1.08b02:*:*:*:*:*:*:*" ]
null
null
8.8
null
null
GHSA-7v52-g769-jjrf
An issue was discovered in DTS Monitoring 3.57.0. The parameter url within the WGET check function is vulnerable to OS command injection (blind).
[]
null
9.8
null
null
null
CVE-2019-16761
Validator parsing discrepancy due to string encoding in NPM slp-validate 1.0.0
A specially crafted Bitcoin script can cause a discrepancy between the specified SLP consensus rules and the validation result of the [email protected] npm package. An attacker could create a specially crafted Bitcoin script in order to cause a hard-fork from the SLP consensus. All versions >1.0.0 have been patched.
[ "cpe:2.3:a:simpleledger:slp-validate:1.0.0:*:*:*:*:*:*:*" ]
null
5.7
null
null
null
GHSA-f6c4-g32j-952q
In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, a specially-crafted HDMI CEC message can be used to cause stack memory corruption.
[]
null
null
7.8
null
null
GHSA-9gqv-fg2w-3mm9
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Rustaurius Ultimate WP Mail allows SQL Injection. This issue affects Ultimate WP Mail: from n/a through 1.3.4.
[]
null
8.5
null
null
null
CVE-2023-37448
A lock screen issue was addressed with improved state management. This issue is fixed in macOS Sonoma 14. A user may be able to view restricted content from the lock screen.
[ "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*" ]
null
3.3
null
null
null
CVE-2023-26281
IBM HTTP Server denial of service
IBM HTTP Server 8.5 used by IBM WebSphere Application Server could allow a remote user to cause a denial of service using a specially crafted URL. IBM X-Force ID: 248296.
[ "cpe:2.3:a:ibm:http_server:8.5.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:hp:hp-ux:-:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:aix:-:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:z\\/os:-:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "cpe:2.3:o:oracle:solaris:-:*:*:*:*:*:*:*" ]
null
5.9
null
null
null
RHSA-2016:1427
Red Hat Security Advisory: atomic-openshift security and bug fix update
Kubernetes: disclosure of information in multi tenant environments via watch-cache list
[ "cpe:/a:redhat:openshift:3.2::el7" ]
null
null
6.5
null
null
GHSA-vqp7-6hqw-v8m9
When the F5 BIG-IP APM 13.0.0-13.1.1 or 12.1.0-12.1.3 renders certain pages (pages with a logon agent or a confirm box), the BIG-IP APM may disclose configuration information such as partition and agent names via URI parameters.
[]
null
null
7.5
null
null
RHSA-2025:15005
Red Hat Security Advisory: kernel security update
kernel: udp: Fix memory accounting leak. kernel: net_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too kernel: RDMA/iwcm: Fix use-after-free of work objects after cm_id destruction kernel: ext4: only dirty folios when data journaling regular files kernel: vsock: Fix transport_* TOCTOU kernel: tipc: Fix use-after-free in tipc_conn_close() kernel: netfilter: nf_conntrack: fix crash due to removal of uninitialised entry
[ "cpe:/o:redhat:enterprise_linux:10.0" ]
null
7.1
null
null
null