id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
189k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
patch_commit_url
stringlengths
36
232
GHSA-qhc9-7662-g2fq
App Sandbox in Apple Mac OS X before 10.9 allows attackers to bypass intended sandbox restrictions via a crafted app that uses the LaunchServices interface to specify process arguments.
[]
null
null
null
null
null
GHSA-g25j-xhg4-fhj4
IBM API Connect's Developer Portal 5.0.0.0 through 5.0.8.3 is vulnerable to Server Side Request Forgery. An attacker, using specially crafted input parameters can trick the server into making potentially malicious calls within the trusted network. IBM X-Force ID: 146370.
[]
null
null
9.9
null
null
GHSA-7rv3-2wf3-pj6w
Stack consumption vulnerability in the KFILE JPEG (kfile_jpeg) plugin in kdegraphics 3, as used by konqueror, digikam, and other KDE image browsers, allows remote attackers to cause a denial of service (stack consumption) via a crafted EXIF section in a JPEG file, which results in an infinite recursion.
[]
null
null
null
null
null
RHSA-2015:1704
Red Hat Security Advisory: Red Hat JBoss Data Virtualization 6.1.0 security update
dashbuilder: XXE/SSRF vulnerability
[ "cpe:/a:redhat:jboss_data_virtualization:6.1" ]
null
null
null
null
null
CVE-2017-18571
The search-everything plugin before 8.1.7 for WordPress has SQL injection related to WordPress 4.7.x, a different vulnerability than CVE-2014-2316.
[ "cpe:2.3:a:search_everything_project:search_everything:*:*:*:*:*:wordpress:*:*" ]
null
null
9.8
7.5
null
GHSA-333x-jcc3-m545
Remote Desktop Commander Suite Agent before v4.8 contains an unquoted service path which allows attackers to escalate privileges to the system level.
[]
null
7.8
null
null
null
GHSA-fj27-2rf7-hwm8
The Mahasna Batik (aka com.batik.mahasna) application 1.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[]
null
null
null
null
null
CVE-2016-9406
Cross-site scripting (XSS) vulnerability in the User control panel in MyBB (aka MyBulletinBoard) before 1.8.7 and MyBB Merge System before 1.8.7 might allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.
[ "cpe:2.3:a:mybb:merge_system:*:*:*:*:*:*:*:*", "cpe:2.3:a:mybb:mybb:*:*:*:*:*:*:*:*" ]
null
null
6.1
4.3
null
CVE-2019-20491
cPanel before 82.0.18 allows attackers to leverage virtual mail accounts in order to bypass account suspensions (SEC-508).
[ "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*" ]
null
5.4
null
5.5
null
CVE-2020-15037
NeDi 1.9C is vulnerable to cross-site scripting (XSS) attack. The application allows an attacker to execute arbitrary JavaScript code via the Reports-Devices.php page st[] parameter.
[ "cpe:2.3:a:nedi:nedi:1.9c:*:*:*:*:*:*:*" ]
null
5.4
null
3.5
null
CVE-2005-1775
Terminator 3: War of the Machines 1.16 and earlier allows remote attackers to cause a denial of service (application crash) via a large nickname.
[ "cpe:2.3:a:atari:terminator_3_war_of_the_machines:1.16:*:*:*:*:*:*:*" ]
null
null
null
5
null
GHSA-f22h-jvjx-fm57
Cross-site scripting (XSS) vulnerability in Open-AudIT Professional 2.1.1 allows remote attackers to inject arbitrary web script or HTML via a crafted name of a component, as demonstrated by the Admin->Logs section (with a logs?logs.type= URI) and the Manage->Attributes section (via the "Name (display)" field to the attributes/create URI).
[]
null
null
5.4
null
null
RHSA-2006:0600
Red Hat Security Advisory: mailman security update
security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
null
CVE-2019-4299
IBM Robotic Process Automation with Automation Anywhere 11 could allow a local user to obtain highly sensitive information from log files when debugging is enabled. IBM X-Force ID: 160765.
[ "cpe:2.3:a:ibm:robotic_process_automation_with_automation_anywhere:*:*:*:*:*:*:*:*" ]
null
null
5.1
null
null
CVE-2018-15988
Adobe Acrobat and Reader versions 2019.008.20081 and earlier, 2019.008.20080 and earlier, 2019.008.20081 and earlier, 2017.011.30106 and earlier version, 2017.011.30105 and earlier version, 2015.006.30457 and earlier, and 2015.006.30456 and earlier have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution.
[ "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*" ]
null
null
7.8
9.3
null
CVE-2024-5499
Out of bounds write in Streams API in Google Chrome prior to 125.0.6422.141 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*" ]
null
8.8
null
null
null
CVE-2024-52528
Auth Token can be passed dummy or wrong the middleware response is 200 OK
Budget Control Gateway acts as an entry point for incoming requests and routes them to the appropriate microservices for Budget Control. Budget Control Gateway does not properly validate auth tokens, which allows attackers to bypass intended restrictions. This vulnerability is fixed in 1.5.2.
[ "cpe:2.3:a:budgetcontrol:gateway:*:*:*:*:*:*:*:*" ]
9.3
null
null
null
null
CVE-2022-36117
An issue was discovered in Blue Prism Enterprise 6.0 through 7.01. In a misconfigured environment that exposes the Blue Prism Application server, it is possible for an authenticated user to reverse engineer the Blue Prism software and circumvent access controls for an administrative function. If credential access is configured to be accessible by a machine or the runtime resource security group, using further reverse engineering, an attacker can spoof a known machine and request known encrypted credentials to decrypt later.
[ "cpe:2.3:a:ssctech:blue_prism:*:*:*:*:*:*:*:*" ]
null
3.1
null
null
null
CVE-2022-37428
PowerDNS Recursor up to and including 4.5.9, 4.6.2 and 4.7.1, when protobuf logging is enabled, has Improper Cleanup upon a Thrown Exception, leading to a denial of service (daemon crash) via a DNS query that leads to an answer with specific properties.
[ "cpe:2.3:a:powerdns:recursor:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*" ]
null
6.5
null
null
null
GHSA-p9mv-wfx3-mx37
The Tournamatch WordPress plugin before 4.6.1 does not sanitise and escape some parameters, which could allow users with a role as low as subscriber to perform Cross-Site Scripting attacks.
[]
null
5.4
null
null
null
GHSA-3f7c-8v7j-hgxr
Phpgurukul Beauty Parlour Management System v1.1 is vulnerable to SQL Injection in admin/index.php via the the username parameter.
[]
null
9.8
null
null
null
GHSA-5x49-v2vj-pp85
The Image Map Pro plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'save_project' function with an arbitrary shortcode in versions up to, and including, 6.0.20 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
6.4
null
null
null
GHSA-66vj-p7rx-6jrr
An issue has been discovered in GitLab CE/EE affecting all versions starting with 14.5. Arbitrary file read was possible by importing a group was due to incorrect handling of file.
[]
null
null
null
null
null
CVE-2016-6258
The PV pagetable code in arch/x86/mm.c in Xen 4.7.x and earlier allows local 32-bit PV guest OS administrators to gain host OS privileges by leveraging fast-paths for updating pagetable entries.
[ "cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:3.4.2:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:3.4.3:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:3.4.4:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:4.1.5:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:4.2.3:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:4.4.1:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:4.5.0:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:4.6.0:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:4.6.1:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:4.6.3:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:4.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:citrix:xenserver:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:citrix:xenserver:6.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:citrix:xenserver:6.1:*:*:*:*:*:*:*", "cpe:2.3:a:citrix:xenserver:6.2.0:sp1:*:*:*:*:*:*", "cpe:2.3:a:citrix:xenserver:6.5.0:sp1:*:*:*:*:*:*", "cpe:2.3:a:citrix:xenserver:7.0:*:*:*:*:*:*:*" ]
null
null
8.8
7.2
null
CVE-2005-0629
Multiple cross-site scripting (XSS) vulnerabilities in profile.php in 427BB 2.2 allow remote attackers to inject arbitrary web script or HTML via the (1) user or (2) Avatar parameters.
[ "cpe:2.3:a:427bb:fourtwosevenbb:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:427bb:fourtwosevenbb:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:427bb:fourtwosevenbb:2.1:*:*:*:*:*:*:*", "cpe:2.3:a:427bb:fourtwosevenbb:2.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:427bb:fourtwosevenbb:2.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:427bb:fourtwosevenbb:2.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:427bb:fourtwosevenbb:2.2:*:*:*:*:*:*:*", "cpe:2.3:a:427bb:fourtwosevenbb:2.2.1:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
GHSA-27w7-2jg3-x45x
A vulnerability, which was classified as critical, was found in SourceCodester Advanced Web Store 1.0. Affected is an unknown function of the file /admin/admin_addnew_product.php. The manipulation of the argument txtProdId leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
[]
6.9
7.3
null
null
null
CVE-2021-34397
Bootloader contains a vulnerability in NVIDIA MB2, which may cause free-the-wrong-heap, which may lead to limited denial of service.
[ "cpe:2.3:o:nvidia:jetson_linux:*:*:*:*:*:*:*:*", "cpe:2.3:h:nvidia:jetson_agx_xavier_16gb:-:*:*:*:*:*:*:*", "cpe:2.3:h:nvidia:jetson_agx_xavier_32gb:-:*:*:*:*:*:*:*", "cpe:2.3:h:nvidia:jetson_agx_xavier_8gb:-:*:*:*:*:*:*:*", "cpe:2.3:h:nvidia:jetson_tx2:-:*:*:*:*:*:*:*", "cpe:2.3:h:nvidia:jetson_tx2_4gb:-:*:*:*:*:*:*:*", "cpe:2.3:h:nvidia:jetson_tx2_nx:-:*:*:*:*:*:*:*", "cpe:2.3:h:nvidia:jetson_tx2i:-:*:*:*:*:*:*:*", "cpe:2.3:h:nvidia:jetson_xavier_nx:-:*:developer_kit:*:*:*:*:*", "cpe:2.3:h:nvidia:jetson_xavier_nx:-:*:production:*:*:*:*:*" ]
null
1.9
null
null
null
GHSA-f7p2-4f5g-hfv9
When the installation directory does not have sufficiently restrictive file permissions, an attacker can modify files in the installation directory to cause execution of malicious code.
[]
null
7.8
null
null
null
CVE-2021-25785
Taocms v2.5Beta5 was discovered to contain a cross-site scripting (XSS) vulnerability via the component Management column.
[ "cpe:2.3:a:taogogo:taocms:2.5:beta5:*:*:*:*:*:*" ]
null
4.8
null
3.5
null
GHSA-mmpf-hqvm-whr2
An Improper Locking vulnerability in the SIP ALG of Juniper Networks Junos OS on MX Series with MS-MPC or MS-MIC card and SRX Series allows an unauthenticated, network-based attacker to cause a flow processing daemon (flowd) crash and thereby a Denial of Service (DoS). Continued receipt of these specific packets will cause a sustained Denial of Service condition. This issue occurs when SIP ALG is enabled and specific SIP messages are processed simultaneously. This issue affects: Juniper Networks Junos OS on MX Series and SRX Series 20.4 versions prior to 20.4R3-S4; 21.1 versions prior to 21.1R3-S3; 21.2 versions prior to 21.2R3-S2; 21.3 versions prior to 21.3R3; 21.4 versions prior to 21.4R3; 22.1 versions prior to 22.1R2. This issue does not affect Juniper Networks Junos OS versions prior to 20.4R1 on MX Series, or SRX Series.
[]
null
7.5
null
null
null
CVE-2005-2509
Unknown vulnerability in loginwindow in Mac OS X 10.4.2 and earlier, when Fast User Switching is enabled, allows attackers to log into other accounts if they know the passwords to at least two accounts.
[ "cpe:2.3:o:apple:mac_os_x:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.0.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.0.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.1.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.1.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.1.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.2.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.2.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.2.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.2.6:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.2.7:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.2.8:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.3.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.3.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.3.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.3.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.3.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.3.6:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.3.7:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.3.8:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.3.9:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.4.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.4.9:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.1.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.1.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.1.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.2.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.2.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.2.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.2.6:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.2.7:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.2.8:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.3.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.3.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.3.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.3.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.3.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.3.6:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.3.7:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.3.8:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.3.9:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.4.1:*:*:*:*:*:*:*" ]
null
null
null
2.1
null
GHSA-8p32-r59w-h3pg
An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory, aka 'Windows Kernel Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2020-0928, CVE-2020-1589, CVE-2020-1592, CVE-2020-16854.
[]
null
4
null
null
null
RHSA-2010:0610
Red Hat Security Advisory: kernel security and bug fix update
kernel: bluetooth: potential bad memory access with sysfs files kernel: ext4: Make sure the MOVE_EXT ioctl can't overwrite append-only files /kernel/security/CVE-2006-0742 test cause kernel-xen panic on ia64 kernel: xfs swapext ioctl minor security issue kernel: cifs: Fix a kernel BUG with remote OS/2 server kernel: nfsd4: bug in read_buf kernel: dns_resolver upcall security issue
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
null
GHSA-8222-6fc8-mhvf
Vulnerability that affects org.springframework.ws:spring-ws and org.springframework.ws:spring-xml
Spring Web Services, versions 2.4.3, 3.0.4, and older unsupported versions of all three projects, were susceptible to XML External Entity Injection (XXE) when receiving XML data from untrusted sources.
[]
null
9.8
null
null
null
CVE-2025-49415
WordPress FW Gallery <= 8.0.0 - Arbitrary File Deletion Vulnerability
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Fastw3b LLC FW Gallery allows Path Traversal. This issue affects FW Gallery: from n/a through 8.0.0.
[]
null
8.6
null
null
null
GHSA-xxqj-98q4-mp83
ImageMagick 7.0.8-50 Q16 has memory leaks at AcquireMagickMemory because of an error in MagickWand/mogrify.c.
[]
null
6.5
null
null
null
CVE-2019-7317
png_image_free in png.c in libpng 1.6.x before 1.6.37 has a use-after-free because png_image_free_function is called under png_safe_execute.
[ "cpe:2.3:a:libpng:libpng:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:hyperion_infrastructure_technology:11.2.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:java_se:7u221:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:java_se:8u212:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:11.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:12.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*", "cpe:2.3:a:hpe:xp7_command_view_advanced_edition_suite:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:-:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:-:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*", "cpe:2.3:a:opensuse:package_hub:-:*:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*", "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*", "cpe:2.3:a:netapp:active_iq_unified_manager:9.6:*:*:*:*:vmware_vsphere:*:*", "cpe:2.3:a:netapp:active_iq_unified_manager:9.6:*:*:*:*:windows:*:*", "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:e-series_santricity_management:-:*:*:*:*:vcenter:*:*", "cpe:2.3:a:netapp:e-series_santricity_storage_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:e-series_santricity_unified_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:e-series_santricity_web_services:*:*:*:*:*:web_services_proxy:*:*", "cpe:2.3:a:netapp:oncommand_insight:*:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:oncommand_workflow_automation:*:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:snapmanager:*:*:*:*:*:oracle:*:*", "cpe:2.3:a:netapp:snapmanager:*:*:*:*:*:sap:*:*", "cpe:2.3:a:netapp:snapmanager:3.4.2:p1:*:*:*:oracle:*:*", "cpe:2.3:a:netapp:snapmanager:3.4.2:p1:*:*:*:sap:*:*", "cpe:2.3:a:netapp:steelstore:-:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*" ]
null
5.3
null
2.6
null
GHSA-wrw9-g9r9-p9h2
MariaDB through 10.5.9 allows attackers to trigger a convert_const_to_int use-after-free when the BIGINT data type is used.
[]
null
7.5
null
null
null
CVE-2011-3362
Integer signedness error in the decode_residual_block function in cavsdec.c in libavcodec in FFmpeg before 0.7.3 and 0.8.x before 0.8.2, and libav through 0.7.1, allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via a crafted Chinese AVS video (aka CAVS) file.
[ "cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.3:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.4.5:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.4.6:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.4.7:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.4.8:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.4.9:pre1:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.5:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.6:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.8.0:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:libav:libav:*:*:*:*:*:*:*:*", "cpe:2.3:a:libav:libav:0.3:*:*:*:*:*:*:*", "cpe:2.3:a:libav:libav:0.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:libav:libav:0.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:libav:libav:0.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:libav:libav:0.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:libav:libav:0.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:libav:libav:0.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:libav:libav:0.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:libav:libav:0.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:libav:libav:0.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:libav:libav:0.4.5:*:*:*:*:*:*:*", "cpe:2.3:a:libav:libav:0.4.6:*:*:*:*:*:*:*", "cpe:2.3:a:libav:libav:0.4.7:*:*:*:*:*:*:*", "cpe:2.3:a:libav:libav:0.4.8:*:*:*:*:*:*:*", "cpe:2.3:a:libav:libav:0.4.9:pre1:*:*:*:*:*:*", "cpe:2.3:a:libav:libav:0.5:*:*:*:*:*:*:*", "cpe:2.3:a:libav:libav:0.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:libav:libav:0.6:*:*:*:*:*:*:*", "cpe:2.3:a:libav:libav:0.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:libav:libav:0.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:libav:libav:0.7:beta1:*:*:*:*:*:*", "cpe:2.3:a:libav:libav:0.7:beta2:*:*:*:*:*:*" ]
null
null
null
6.8
null
CVE-2011-0487
ICQ 7 does not verify the authenticity of updates, which allows man-in-the-middle attackers to execute arbitrary code via a crafted file that is fetched through an automatic-update mechanism.
[ "cpe:2.3:a:icq:icq:7:*:*:*:*:*:*:*" ]
null
null
null
9.3
null
GHSA-59j4-wjwp-mw9m
Sandbox Bypass in Apache Velocity Engine
An attacker that is able to modify Velocity templates may execute arbitrary Java code or run arbitrary system commands with the same privileges as the account running the Servlet container. This applies to applications that allow untrusted users to upload/modify velocity templates running Apache Velocity Engine versions up to 2.2.
[]
null
8.8
null
null
null
GHSA-j56m-fmmm-mpjf
Purchase Order Management v1.0 was discovered to contain a SQL injection vulnerability via the password parameter at /purchase_order/admin/login.php.
[]
null
9.8
null
null
null
GHSA-pw44-hm4h-4f79
Found Linux Kernel flaw in the i740 driver. The Userspace program could pass any values to the driver through ioctl() interface. The driver doesn't check the value of 'pixclock', so it may cause a divide by zero error.
[]
null
5.5
null
null
null
GHSA-mccr-h554-3wjw
Format string vulnerability in the print_proxies function in bin/proxy.c in libproxy 0.3.1 might allow context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via format string specifiers in a proxy name, as demonstrated using the http_proxy environment variable or a PAC file.
[]
null
null
null
null
null
CVE-2024-33273
SQL injection vulnerability in shipup before v.3.3.0 allows a remote attacker to escalate privileges via the getShopID function.
[]
null
9.8
null
null
null
GHSA-jw26-8m9h-2xm5
cgi-bin/webutil.pl in The Puppet Master WebUtil 2.3 allows remote attackers to execute arbitrary commands via shell metacharacters in the whois command.
[]
null
null
null
null
null
CVE-2009-0884
Buffer overflow in FileZilla Server before 0.9.31 allows remote attackers to cause a denial of service via unspecified vectors related to SSL/TLS packets.
[ "cpe:2.3:a:filezilla-project:filezilla_server:*:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
CVE-2017-14596
In Joomla! before 3.8.0, inadequate escaping in the LDAP authentication plugin can result in a disclosure of a username and password.
[ "cpe:2.3:a:joomla:joomla\\!:1.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:1.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:1.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:1.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:1.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:1.5.5:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:1.5.6:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:1.5.7:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:1.5.8:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:1.5.9:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:1.5.10:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:1.5.11:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:1.5.12:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:1.5.13:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:1.5.14:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:1.5.15:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:1.5.16:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:1.5.17:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:1.5.18:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:1.5.19:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:1.5.20:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:1.5.21:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:1.5.22:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:1.5.23:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:1.5.24:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:1.5.25:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:1.5.26:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:1.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:1.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:1.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:1.6.3:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:1.6.4:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:1.6.5:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:1.6.6:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:1.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:1.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:1.7.2:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:1.7.3:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:1.7.4:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:1.7.5:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:2.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:2.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:2.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:2.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:2.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:2.5.5:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:2.5.6:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:2.5.7:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:2.5.8:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:2.5.9:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:2.5.10:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:2.5.11:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:2.5.12:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:2.5.13:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:2.5.14:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:2.5.15:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:2.5.16:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:2.5.17:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:2.5.18:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:2.5.19:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:2.5.20:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:2.5.21:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:2.5.22:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:2.5.23:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:2.5.24:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:2.5.25:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:2.5.26:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:2.5.27:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:2.5.28:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.2.7:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.3.6:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.4.5:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.4.6:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.4.7:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.4.8:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.6.3:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.6.4:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.6.5:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.7.2:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.7.3:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.7.4:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.7.5:*:*:*:*:*:*:*" ]
null
null
9.8
5
null
GHSA-cm7m-hh39-78r7
A vulnerability has been identified in JT2Go (All versions < V13.2), Solid Edge SE2021 (All Versions < SE2021MP5), Teamcenter Visualization (All versions < V13.2). The plmxmlAdapterSE70.dll library in affected applications lacks proper validation of user-supplied data when parsing PAR files. This could result in an out of bounds write past the fixed-length heap-based buffer. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-13422)
[]
null
7.8
null
null
null
CVE-2019-19680
A file-extension filtering vulnerability in Proofpoint Enterprise Protection (PPS / PoD), in the unpatched versions of PPS through 8.9.22 and 8.14.2 respectively, allows attackers to bypass protection mechanisms (related to extensions, MIME types, virus detection, and journal entries for transmitted files) by sending malformed (not RFC compliant) multipart email.
[ "cpe:2.3:a:proofpoint:enterprise_protection:*:*:*:*:lts:*:*:*", "cpe:2.3:a:proofpoint:enterprise_protection:*:*:*:*:-:*:*:*" ]
null
8.8
null
6.8
null
CVE-2011-2014
The LDAP over SSL (aka LDAPS) implementation in Active Directory, Active Directory Application Mode (ADAM), and Active Directory Lightweight Directory Service (AD LDS) in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 does not examine Certificate Revocation Lists (CRLs), which allows remote authenticated users to bypass intended certificate restrictions and access Active Directory resources by leveraging a revoked X.509 certificate for a domain account, aka "LDAPS Authentication Bypass Vulnerability."
[ "cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:x64:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:x86:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x32:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:*:x64:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:*" ]
null
null
null
9
null
CVE-2013-0757
The Chrome Object Wrapper (COW) implementation in Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.2, and SeaMonkey before 2.15 does not prevent modifications to the prototype of an object, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges by referencing Object.prototype.__proto__ in a crafted HTML document.
[ "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird_esr:*:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:-:*:*", "cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:vmware:*:*", "cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp4:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp2:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*" ]
null
null
null
9.3
null
CVE-2020-7577
A vulnerability has been identified in Camstar Enterprise Platform (All versions), Opcenter Execution Core (All versions < V8.2). Through the use of several vulnerable fields of the application, an authenticated user could perform an SQL Injection attack by passing a modified SQL query downstream to the back-end server. The exploit of this vulnerability could be used to read, and potentially modify application data to which the user has access to.
[ "cpe:2.3:a:siemens:opcenter_execution_core:*:*:*:*:*:*:*:*" ]
null
8.1
null
5.5
null
GHSA-wv97-3q88-x27x
A vulnerability was found in chinese-poetry 0.1. It has been rated as problematic. This issue affects some unknown processing of the file rank/server.js. The manipulation leads to inefficient regular expression complexity. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
[]
2.1
4.3
null
null
null
CVE-2009-0546
Stack-based buffer overflow in NewsGator FeedDemon 2.7 and earlier allows user-assisted remote attackers to execute arbitrary code via a long text attribute in an outline element in a .opml file.
[ "cpe:2.3:a:newsgator:feeddemon:*:*:*:*:*:*:*:*", "cpe:2.3:a:newsgator:feeddemon:2.0.0.24:*:*:*:*:*:*:*", "cpe:2.3:a:newsgator:feeddemon:2.6:*:*:*:*:*:*:*", "cpe:2.3:a:newsgator:feeddemon:2.6.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:newsgator:feeddemon:2.6.1.5:*:*:*:*:*:*:*" ]
null
null
null
9.3
null
CVE-2011-2827
Use-after-free vulnerability in Google Chrome before 13.0.782.215 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to text searching.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
cisco-sa-20190417-es-tvcs-dos
Cisco Expressway Series and Cisco TelePresence Video Communication Server Denial of Service Vulnerability
A vulnerability in the phone book feature of Cisco Expressway Series and Cisco TelePresence Video Communication Server (VCS) could allow an authenticated, remote attacker to cause the CPU to increase to 100% utilization, causing a denial of service (DoS) condition on an affected system. The vulnerability is due to improper handling of the XML input. An attacker could exploit this vulnerability by sending a Session Initiation Protocol (SIP) message with a crafted XML payload to an affected device. A successful exploit could allow the attacker to exhaust CPU resources, resulting in a DoS condition. Manual intervention may be required to recover the device. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. Mitigation options that address this vulnerability are available. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190417-es-tvcs-dos ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190417-es-tvcs-dos"]
[]
null
null
7.7
null
null
CVE-2015-1771
Cross-site request forgery (CSRF) vulnerability in the web applications in Microsoft Exchange Server 2013 SP1 and Cumulative Update 8 allows remote attackers to hijack the authentication of arbitrary users, aka "Exchange Cross-Site Request Forgery Vulnerability."
[ "cpe:2.3:a:microsoft:exchange_server:2013:cumulative_update_8:*:*:*:*:*:*", "cpe:2.3:a:microsoft:exchange_server:2013:sp1:*:*:*:*:*:*" ]
null
null
null
6.8
null
RHSA-2017:1975
Red Hat Security Advisory: libreoffice security and bug fix update
libreoffice: Heap-buffer-overflow in tools::Polygon::Insert
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
5.3
null
null
CVE-2018-16358
A cross-site scripting (XSS) vulnerability in inc/core/class.dc.core.php in the media manager in Dotclear through 2.14.1 allows remote authenticated users to upload HTML content containing an XSS payload with the file extension .ahtml.
[ "cpe:2.3:a:dotclear:dotclear:*:*:*:*:*:*:*:*" ]
null
null
5.4
3.5
null
CVE-2025-8638
Kenwood DMX958XR Firmware Update Command Injection Vulnerability
Kenwood DMX958XR Firmware Update Command Injection Vulnerability. This vulnerability allows physically present attackers to execute arbitrary code on affected installations of Kenwood DMX958XR devices. Authentication is not required to exploit this vulnerability. The specific flaw exists within the firmware update process. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-26261.
[]
null
null
6.8
null
null
RHSA-2004:585
Red Hat Security Advisory: xchat security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
null
CVE-2021-34652
Media Usage <= 0.0.4 Reflected Cross-Site Scripting
The Media Usage WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the id parameter in the ~/mmu_admin.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 0.0.4.
[ "cpe:2.3:a:meowapps:media_usage:*:*:*:*:*:wordpress:*:*" ]
null
6.1
null
null
null
CVE-2012-3283
Unspecified vulnerability on the HP LeftHand Virtual SAN Appliance hydra with software before 10.0 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1511.
[ "cpe:2.3:a:hp:san\\/iq:*:*:*:*:*:*:*:*", "cpe:2.3:a:hp:san\\/iq:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:hp:san\\/iq:8.1:*:*:*:*:*:*:*", "cpe:2.3:a:hp:san\\/iq:8.5:*:*:*:*:*:*:*", "cpe:2.3:a:hp:san\\/iq:9.0:*:*:*:*:*:*:*", "cpe:2.3:a:hp:lefthand_p4000_virtual_san_appliance:-:*:*:*:*:*:*:*" ]
null
null
null
10
null
GHSA-g5jf-3pr8-vjwm
An XML External Entity (XXE) issue exists in OSCI-Transport 1.2 as used in OSCI Transport Library 1.6.1 (Java) and OSCI Transport Library 1.6 (.NET), exploitable by sending a crafted standard-conforming OSCI message from within the infrastructure.
[]
null
null
9.8
null
null
GHSA-8hrg-qfqw-3fgp
Vulnerability in the Java SE, JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162, 10 and JRockit: R28.3.17. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Java SE, JRockit executes to compromise Java SE, JRockit. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 7.7 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).
[]
null
null
7.7
null
null
CVE-2022-33093
74cmsSE v3.5.1 was discovered to contain a SQL injection vulnerability via the key parameter at /freelance/resume_list.
[ "cpe:2.3:a:74cms:74cmsse:3.5.1:*:*:*:*:*:*:*" ]
null
7.5
null
5
null
CVE-2023-1042
SourceCodester Online Pet Shop We App update_status.php cross site scripting
A vulnerability has been found in SourceCodester Online Pet Shop We App 1.0 and classified as problematic. This vulnerability affects unknown code of the file /pet_shop/admin/orders/update_status.php. The manipulation of the argument oid with the input 1"><script>alert(1111)</script> leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-221800.
[ "cpe:2.3:a:online_pet_shop_we_app_project:online_pet_shop_we_app:1.0:*:*:*:*:*:*:*" ]
null
3.5
3.5
4
null
CVE-2024-27460
A privilege escalation exists in the updater for Plantronics Hub 3.25.1 and below.
[ "cpe:2.3:a:hp_inc:plantronics_hub:*:*:*:*:*:*:*:*" ]
null
6.7
null
null
null
CVE-2021-0953
In setOnClickActivityIntent of SearchWidgetProvider.java, there is a possible way to access contacts and history bookmarks without permission due to an unsafe PendingIntent. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-184046278
[ "cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*" ]
null
7.8
null
7.2
null
CVE-2023-44385
Client-Side Request Forgery in Home Assistant iOS/macOS native Apps
The Home Assistant Companion for iOS and macOS app up to version 2023.4 are vulnerable to Client-Side Request Forgery. Attackers may send malicious links/QRs to victims that, when visited, will make the victim to call arbitrary services in their Home Assistant installation. Combined with this security advisory, may result in full compromise and remote code execution (RCE). Version 2023.7 addresses this issue and all users are advised to upgrade. There are no known workarounds for this vulnerability. This issue is also tracked as GitHub Security Lab (GHSL) Vulnerability Report: GHSL-2023-161.
[ "cpe:2.3:a:home-assistant:home_assistant_companion:*:*:*:*:*:iphone_os:*:*", "cpe:2.3:a:home-assistant:home_assistant_companion:*:*:*:*:*:macos:*:*" ]
null
8.6
null
null
null
CVE-2024-57099
ClassCMS v4.8 has a code execution vulnerability. Attackers can exploit this vulnerability by constructing a payload in the classview parameter of the model management feature, allowing them to execute arbitrary code and potentially take control of the server.
[]
null
9.8
null
null
null
GHSA-mrhp-8chw-79jf
The vulnerability allows a malicious low-privileged PAM user to access information about other PAM users and their group memberships.
[]
5.1
null
null
null
null
CVE-2021-37956
Use after free in Offline use in Google Chrome on Android prior to 94.0.4606.54 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*" ]
null
8.8
null
6.8
null
GHSA-g347-3vm4-xrvv
Absolute path traversal vulnerability in forcedownload.php in Gravy Media Photo Host 1.0.8 allows remote attackers to read arbitrary files via an encoded "/" (slash) in the file parameter.
[]
null
null
null
null
null
GHSA-qv52-3gx5-px5v
A use of hard-coded cryptographic key vulnerability in the SSLVPN of FortiOS before 7.0.1 may allow an attacker to retrieve the key by reverse engineering.
[]
null
null
null
null
null
GHSA-m9c5-rh9r-8cwm
SQL injection vulnerability in oku.asp in Hunkaray Duyuru Scripti allows remote attackers to execute arbitrary SQL commands via the id parameter.
[]
null
null
null
null
null
ICSA-19-031-01
Schneider Electric EVLink Parking
A hard-coded credentials vulnerability exists that could enable an attacker to gain access to the device.CVE-2018-7800 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). A code injection vulnerability exists that could allow remote code execution with maximum privileges.CVE-2018-7801 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). A SQL injection vulnerability exists that could give an attacker access to the web interface with full privileges.CVE-2018-7802 has been assigned to this vulnerability. A CVSS v3 base score of 6.4 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N).
[]
null
null
6.4
null
null
GHSA-gp5f-p5wv-f6gw
IBM Rational Quality Manager (RQM) 5.0 through 5.02 and 6.0 through 6.0.6 are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 141803.
[]
null
null
5.4
null
null
GHSA-x6mq-hc4c-8mhc
An issue was discovered in Avaya one-X Portal for IP Office 9.1.2.0 and prior. The DownloadToLocalDriveServlet function from the AFA portal is only intended to download backup ZIP files from the server to the operator desktop; however, a malicious user capable of intercepting the HTTP request would be able to modify folder and filename parameters in order to get access to any file on the underlying operating system, as demonstrated by a folder=/etc/&filename=passwd query string. Additionally it could cause a DoS, as this functions also implements file deletion after downloading.
[]
null
null
null
null
null
CVE-2022-43610
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Corel CorelDRAW Graphics Suite 23.5.0.506. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of GIF images. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-16350.
[ "cpe:2.3:a:corel:coreldraw:*:*:*:*:*:*:*:*" ]
null
null
3.3
null
null
CVE-2021-27679
Cross-site scripting (XSS) vulnerability in Navigation in Batflat CMS 1.3.6 allows remote attackers to inject arbitrary web script or HTML via the field name.
[ "cpe:2.3:a:batflat:batflat:1.3.6:*:*:*:*:*:*:*" ]
null
5.4
null
3.5
null
GHSA-gvc5-x64j-cff4
Multiple unspecified vulnerabilities in Salford Software Support Incident Tracker (SiT!) before 3.30 have unknown impact and attack vectors.
[]
null
null
null
null
null
CVE-2017-1000193
October CMS build 412 is vulnerable to stored WCI (a.k.a XSS) in brand logo image name resulting in JavaScript code execution in the victim's browser.
[ "cpe:2.3:a:octobercms:october:*:*:*:*:*:*:*:*" ]
null
null
6.1
4.3
null
CVE-2008-6916
Siemens SpeedStream 5200 with NetPort Software 1.1 allows remote attackers to bypass authentication via an invalid Host header, possibly involving a trailing dot in the hostname.
[ "cpe:2.3:h:siemens:speedstream_5200:-:*:*:*:*:*:*:*", "cpe:2.3:a:john_doe:netport_software:1.1:*:*:*:*:*:*:*" ]
null
null
null
10
null
GHSA-fc77-f4hm-5777
A vulnerability was discovered in Samsung Mobile Processors Exynos 1280, Exynos 2200, Exynos 1330, Exynos 1380, and Exynos 2400 where they do not properly check the length of the data, which can lead to a Information disclosure.
[]
null
4.4
null
null
null
CVE-2013-7469
Seafile through 6.2.11 always uses the same Initialization Vector (IV) with Cipher Block Chaining (CBC) Mode to encrypt private data, making it easier to conduct chosen-plaintext attacks or dictionary attacks.
[ "cpe:2.3:a:seafile:seafile:*:*:*:*:*:*:*:*" ]
null
null
7.5
5
null
GHSA-gg9q-x7v7-56vv
The Spellcheck API implementation in Google Chrome before 44.0.2403.89 does not use an HTTPS session for downloading a Hunspell dictionary, which allows man-in-the-middle attackers to deliver incorrect spelling suggestions or possibly have unspecified other impact via a crafted file, a related issue to CVE-2015-1263.
[]
null
null
null
null
null
GHSA-pvhr-6mxv-4gr5
A heap-based overflow vulnerability in MHW_RECOG_LIB_INFO function in libSDKRecognitionText.spensdk.samsung.so library prior to SMR Sep-2022 Release 1 allows attacker to cause memory access fault.
[]
null
7.8
null
null
null
GHSA-468w-3r6j-mchw
The issue was addressed with additional permissions checks. This issue is fixed in macOS Ventura 13.6.1. An attacker may be able to access passkeys without authentication.
[]
null
7.5
null
null
null
CVE-2022-25842
Arbitrary File Write via Archive Extraction (Zip Slip)
All versions of package com.alibaba.oneagent:one-java-agent-plugin are vulnerable to Arbitrary File Write via Archive Extraction (Zip Slip) using a specially crafted archive that holds directory traversal filenames (e.g. ../../evil.exe). The attacker can overwrite executable files and either invoke them remotely or wait for the system or user to call them, thus achieving remote command execution on the victim’s machine.
[ "cpe:2.3:a:alibabagroup:one-java-agent:*:*:*:*:*:*:*:*" ]
null
6.9
null
null
null
GHSA-9735-hqm8-4h6p
OpenBSD 7.3 before errata 014 is missing an argument-count bounds check in console terminal emulation. This could cause incorrect memory access and a kernel crash after receiving crafted DCS or CSI terminal escape sequences.
[]
null
5.5
null
null
null
CVE-2012-3846
Cross-site scripting (XSS) vulnerability in index.php in PHP-pastebin 2.1 allows remote attackers to inject arbitrary web script or HTML via the title parameter.
[ "cpe:2.3:a:atmoner:php-pastebin:2.1:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
GHSA-mh2f-2hrx-5245
User Enumeration and Data Integrity in Barcode functionality in OpenText Content Management versions 24.3-25.1on Windows and Linux allows a malicous authenticated attacker to potentially alter barcode attributes.
[]
5.9
null
null
null
null
GHSA-p9j3-5qrg-xc56
Vulnerability in the JD Edwards EnterpriseOne Tools product of Oracle JD Edwards (component: Design Tools SEC). Supported versions that are affected are 9.2.6.4 and prior. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise JD Edwards EnterpriseOne Tools. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in JD Edwards EnterpriseOne Tools, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of JD Edwards EnterpriseOne Tools accessible data as well as unauthorized read access to a subset of JD Edwards EnterpriseOne Tools accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).
[]
null
6.1
null
null
null
GHSA-fx4g-m96x-942q
Improper access control in the PMC for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.
[]
null
null
null
null
null
CVE-2007-0887
axigen 1.2.6 through 2.0.0b1 does not properly parse login credentials, which allows remote attackers to cause a denial of service (NULL dereference and application crash) via a base64-encoded "*\x00" sequence on the imap port (143/tcp).
[ "cpe:2.3:a:gecad_technologies:axigen_mail_server:1.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:gecad_technologies:axigen_mail_server:2.0.0b1:*:*:*:*:*:*:*" ]
null
null
null
7.8
null
CVE-2021-37794
A stored cross-site scripting (XSS) vulnerability exists in FileBrowser < v2.16.0 that allows an authenticated user authorized to upload a malicious .svg file which acts as a stored XSS payload. If this stored XSS payload is triggered by an administrator it will trigger malicious OS commands on the server running the FileBrowser instance.
[ "cpe:2.3:a:filebrowser_project:filebrowser:*:*:*:*:*:*:*:*" ]
null
5.4
null
3.5
null
CVE-2022-28656
is_closing_session() allows users to consume RAM in the Apport process
[ "cpe:2.3:a:apport_project:apport:*:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:esm:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:21.10:*:*:*:-:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:22.04:*:*:*:lts:*:*:*" ]
null
5.5
null
null
null
GHSA-8qc5-fvr8-g263
Transient DOS while processing IKEv2 Informational request messages, when a malformed fragment packet is received.
[]
null
7.5
null
null
null