id
string
title
string
description
string
cpes
list
cvss_v4_0
float64
cvss_v3_1
float64
cvss_v3_0
float64
cvss_v2_0
float64
patch_commit_url
string
CVE-2024-11750
ONLYOFFICE DocSpace <= 2.1.1 - Authenticated (Contributor+) Stored Cross-Site Scripting
The ONLYOFFICE DocSpace plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'onlyoffice-docspace' shortcode in all versions up to, and including, 2.1.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
6.4
null
null
null
GHSA-93m4-v97h-82q2
Tor before 0.1.1.20 allows remote attackers to spoof log entries or possibly execute shell code via strings with non-printable characters.
[]
null
null
null
null
null
CVE-2010-0175
Use-after-free vulnerability in the nsTreeSelection implementation in Mozilla Firefox before 3.0.19 and 3.5.x before 3.5.9, Thunderbird before 3.0.4, and SeaMonkey before 2.0.4 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via unspecified vectors that trigger a call to the handler for the select event for XUL tree items.
[ "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.9:rc:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.9.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.9.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.9.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.10:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.10.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0:preview_release:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5:beta1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5:beta2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.13:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.14:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.15:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.16:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.17:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.18:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.19:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.20:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.13:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.14:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.15:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.16:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.5.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.5.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.5.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:0.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:0.7.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:0.7.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:0.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5:beta2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5.0.13:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5.0.14:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.14:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.16:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.17:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.18:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.19:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.21:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.22:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.23:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:3.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:3.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0:alpha:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0:beta:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1:alpha:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.10:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.11:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.12:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.13:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.14:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.15:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.16:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.17:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.18:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.19:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0:alpha_1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0:alpha_2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0:alpha_3:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0:beta_1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0:beta_2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0.4:*:*:*:*:*:*:*" ]
null
null
null
9.3
null
CVE-2021-2115
Vulnerability in the Oracle Common Applications Calendar product of Oracle E-Business Suite (component: Tasks). Supported versions that are affected are 12.1.1-12.1.3 and 12.2.3-12.2.10. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Common Applications Calendar. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Common Applications Calendar, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Common Applications Calendar accessible data as well as unauthorized update, insert or delete access to some of Oracle Common Applications Calendar accessible data. CVSS 3.1 Base Score 7.6 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N).
[ "cpe:2.3:a:oracle:common_applications_calendar:*:*:*:*:*:*:*:*" ]
null
7.6
null
null
null
GHSA-gvh3-f4g3-c9ff
IBM MQ Operator LTS 2.0.0 through 2.0.29, MQ Operator CD 3.0.0, 3.0.1, 3.1.0 through 3.1.3, 3.3.0, 3.4.0, 3.4.1, 3.5.0, 3.5.1, 3.6.0, and MQ Operator SC2 3.2.0 through 3.2.13 Container could disclose sensitive information to a local user due to improper clearing of heap memory before release.
[]
null
6.2
null
null
null
GHSA-w26v-m725-wjxm
Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
[]
null
5.4
null
null
null
GHSA-qh8r-2p8w-h54f
Unspecified vulnerability in the Oracle E-Business Intelligence component in Oracle E-Business Suite 11.5.10.2, 12.0.6, and 12.1.3 allows remote attackers to affect integrity via unknown vectors.
[]
null
null
null
null
null
CVE-2005-3327
Network Appliance Data ONTAP 7.0 and earlier allows iSCSI Initiators to bypass iSCSI authentication via a modified client that skips the Security (Start) mode, as required by the Login Negotiation protocol, and uses Operational mode without proving identity.
[ "cpe:2.3:a:network_appliance:data_ontap:*:*:*:*:*:*:*:*", "cpe:2.3:a:network_appliance:data_ontap:6.4:*:*:*:*:*:*:*", "cpe:2.3:a:network_appliance:data_ontap:6.5:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2023-0357
Helpy version 2.8.0 allows an unauthenticated remote attacker to exploit an XSS stored in the application. This is possible because the application does not correctly validate the attachments sent by customers in the ticket.
[ "cpe:2.3:a:helpy.io:helpy:2.8.0:*:*:*:*:*:*:*" ]
null
6.1
null
null
null
GHSA-fj66-g7xw-9g27
Jamf Private Access before 2022-05-16 has Incorrect Access Control, in which an unauthorized user can reach a system in the internal infrastructure, aka WND-44801.
[]
null
7.5
null
null
null
CVE-2023-32605
Affected versions Trend Micro Apex Central (on-premise) are vulnerable to potential authenticated reflected cross-site scripting (XSS) attacks due to user input validation and sanitization issues. Please note: an attacker must first obtain authentication to Apex Central on the target system in order to exploit this vulnerability. This is similar to, but not identical to CVE-2023-32604.
[ "cpe:2.3:a:trendmicro:apex_central:2019:-:*:*:*:windows:*:*" ]
null
5.4
null
null
null
CVE-2021-31879
GNU Wget through 1.21.1 does not omit the Authorization header upon a redirect to a different origin, a related issue to CVE-2018-1000007.
[ "cpe:2.3:a:gnu:wget:*:*:*:*:*:*:*:*", "cpe:2.3:o:broadcom:brocade_fabric_operating_system_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*", "cpe:2.3:o:netapp:a250_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:netapp:a250:-:*:*:*:*:*:*:*", "cpe:2.3:o:netapp:500f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:netapp:500f:-:*:*:*:*:*:*:*" ]
null
6.1
null
5.8
null
RHSA-2018:0112
Red Hat Security Advisory: libvirt security update
An update for libvirt is now available for Red Hat Enterprise Linux 6.2 Advanced Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
[ "cpe:/o:redhat:rhel_mission_critical:6.2::server" ]
null
null
null
null
null
GHSA-fqxf-7mq3-hv59
Insufficient validation of the IOCTL input buffer in AMD ?Prof may allow an attacker to send an arbitrary buffer leading to a potential Windows kernel crash resulting in denial of service.
[]
null
7.5
null
null
null
GHSA-pc7w-54q4-2cx9
PHP remote file inclusion vulnerability in SocketMail Lite and Pro 2.2.6 and earlier, when register_globals and magic_quotes are enabled, allows remote attackers to execute arbitrary PHP code via a URL in the site_path parameter to (1) index.php and (2) inc-common.php.
[]
null
null
null
null
null
CVE-2008-0596
Memory leak in CUPS before 1.1.22, and possibly other versions, allows remote attackers to cause a denial of service (memory consumption and daemon crash) via a large number of requests to add and remove shared printers.
[ "cpe:2.3:o:redhat:desktop:3.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:desktop:4.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:as_3:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:as_4:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:es_3:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:es_4:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:ws_3:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:ws_4:*:*:*:*:*:*:*", "cpe:2.3:a:easy_software_products:cups:1.1.17:*:*:*:*:*:*:*", "cpe:2.3:a:easy_software_products:cups:1.1.22:*:*:*:*:*:*:*" ]
null
null
null
5
null
GHSA-mwg7-wp3h-xm4h
In telecom service, there is a missing permission check. This could lead to local denial of service in telecom service.
[]
null
5.5
null
null
null
CVE-2025-52581
An integer overflow vulnerability exists in the GDF parsing functionality of The Biosig Project libbiosig 3.9.0 and Master Branch (35a819fa). A specially crafted GDF file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.
[]
null
9.8
null
null
null
GHSA-7q36-jprx-hc27
A vulnerability was found in code-projects Online Book Shop 1.0. It has been classified as critical. This affects an unknown part of the file /booklist.php. The manipulation of the argument subcatid leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
[]
5.3
6.3
null
null
null
RHSA-2014:0625
Red Hat Security Advisory: openssl security update
openssl: freelist misuse causing a possible use-after-free openssl: Buffer overflow via DTLS invalid fragment openssl: SSL_MODE_RELEASE_BUFFERS NULL pointer dereference in do_ssl3_write() openssl: DoS when sending invalid DTLS handshake openssl: SSL/TLS MITM vulnerability openssl: client-side denial of service when using anonymous ECDH
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
null
GHSA-6r9c-25q3-26fc
Directory traversal vulnerability in ecrire/exec/valider_xml.php in SPIP 3.1.2 and earlier allows remote attackers to enumerate the files on the system via the var_url parameter in a valider_xml action.
[]
null
null
7.5
null
null
CVE-2020-23877
pdf2xml v2.0 was discovered to contain a stack buffer overflow in the component getObjectStream.
[ "cpe:2.3:a:science-miner:pdf2xml:2.0:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
null
GHSA-3886-8ggm-q6g4
Multiple cross-site scripting (XSS) vulnerabilities in the esb-csv-import-export plugin through 1.1 for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) cie_type, (2) cie_import, (3) cie_update, or (4) cie_ignore parameter to includes/admin/views/esb-cie-import-export-page.php.
[]
null
null
6.1
null
null
GHSA-7x3f-83h7-pff9
SQL injection vulnerability in protect.php in X-Scripts X-Protection 1.10, with magic_quotes_gpc disabled, allows remote attackers to execute arbitrary SQL commands via the (1) username and (2) password parameter.
[]
null
null
null
null
null
CVE-2007-4084
Multiple SQL injection vulnerabilities in AlstraSoft Affiliate Network Pro allow remote attackers to execute arbitrary SQL commands via (1) the pgmid parameter in an uploadProducts action to merchants/index.php and possibly (2) the rowid parameter to merchants/temp.php.
[ "cpe:2.3:a:alstrasoft:affiliate_network_pro:8.0:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2000-0383
The file transfer component of AOL Instant Messenger (AIM) reveals the physical path of the transferred file to the remote recipient.
[ "cpe:2.3:a:aol:instant_messenger:4.0:*:*:*:*:*:*:*" ]
null
null
null
5
null
CVE-2024-50103
ASoC: qcom: Fix NULL Dereference in asoc_qcom_lpass_cpu_platform_probe()
In the Linux kernel, the following vulnerability has been resolved: ASoC: qcom: Fix NULL Dereference in asoc_qcom_lpass_cpu_platform_probe() A devm_kzalloc() in asoc_qcom_lpass_cpu_platform_probe() could possibly return NULL pointer. NULL Pointer Dereference may be triggerred without addtional check. Add a NULL check for the returned pointer.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:*" ]
null
5.5
null
null
null
CVE-2019-14130
Memory corruption can occurs in trusted application if offset size from HLOS is more than actual mapped buffer size in Snapdragon Auto, Snapdragon Compute, Snapdragon Mobile, Snapdragon Wired Infrastructure and Networking in Kamorta, QCS404, Rennell, SC7180, SDX55, SM6150, SM7150, SM8250, SXR2130
[ "cpe:2.3:o:qualcomm:kamorta_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:kamorta:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcs404_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcs404:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:rennell_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:rennell:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sc7180_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sc7180:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdx55:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm6150_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm6150:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm7150_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm7150:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm8250_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm8250:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sxr2130_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sxr2130:-:*:*:*:*:*:*:*" ]
null
7.8
null
4.6
null
GHSA-mjff-hx99-hm9w
MuleSoft is aware of a Remote Code Execution vulnerability affecting certain versions of a Mule runtime component that may affect both CloudHub and on-premise customers. Versions affected: Mule 4.1.x and 4.2.x runtime released before February 2, 2021.
[]
null
null
null
null
null
CVE-2013-2057
YaBB through 2.5.2: 'guestlanguage' Cookie Parameter Local File Include Vulnerability
[ "cpe:2.3:a:yabb:yabb:*:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
null
GHSA-wgmc-38h7-h2w9
Rejected reason: Not used
[]
null
null
null
null
null
GHSA-8h6w-5gpw-7wpv
SQL injection vulnerability in in the authenticate function in MailWatch for MailScanner 1.0.2 allows remote attackers to execute arbitrary SQL commands.
[]
null
null
null
null
null
CVE-2025-24448
Illustrator | Out-of-bounds Read (CWE-125)
Illustrator versions 29.2.1, 28.7.4 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[]
null
5.5
null
null
null
CVE-2024-6150
A non-admin user can cause short-term disruption in Target VM availability in Citrix Provisioning
[]
4.8
null
null
null
null
GHSA-hc92-m58j-m3m5
When creating a callback over IPC for showing the Color Picker window, multiple of the same callbacks could have been created at a time and eventually all simultaneously destroyed as soon as one of the callbacks finished. This could have led to a use-after-free causing a potentially exploitable crash. This vulnerability affects Firefox < 117, Firefox ESR < 102.15, Firefox ESR < 115.2, and Thunderbird < 115.2.
[]
null
6.5
null
null
null
GHSA-x3cf-qq49-8942
The security policy processing module in Huawei Secospace USG6300 with software V500R001C20SPC100, V500R001C20SPC101, V500R001C20SPC200; Secospace USG6500 with software V500R001C20SPC100, V500R001C20SPC101, V500R001C20SPC200; Secospace USG6600 with software V500R001C20SPC100, V500R001C20SPC101, V500R001C20SPC200 allows authenticated attackers to setup a specific security policy into the devices, causing a buffer overflow and crashing the system.
[]
null
null
6.5
null
null
PYSEC-2022-276
null
LIEF commit 365a16a was discovered to contain a heap-buffer overflow via the function print_binary at /c/macho_reader.c.
[]
null
null
null
null
null
CVE-2016-4371
HPE Service Manager Software 9.30, 9.31, 9.32, 9.33, 9.34, 9.35, 9.40, and 9.41 allows remote authenticated users to obtain sensitive information, modify data, and conduct server-side request forgery (SSRF) attacks via unspecified vectors, related to the Server, Web Client, Windows Client, and Service Request components.
[ "cpe:2.3:a:hp:service_manager:9.30:*:*:*:*:*:*:*", "cpe:2.3:a:hp:service_manager:9.31:*:*:*:*:*:*:*", "cpe:2.3:a:hp:service_manager:9.32:*:*:*:*:*:*:*", "cpe:2.3:a:hp:service_manager:9.33:*:*:*:*:*:*:*", "cpe:2.3:a:hp:service_manager:9.34:*:*:*:*:*:*:*", "cpe:2.3:a:hp:service_manager:9.35:*:*:*:*:*:*:*", "cpe:2.3:a:hp:service_manager:9.40:*:*:*:*:*:*:*", "cpe:2.3:a:hp:service_manager:9.41:*:*:*:*:*:*:*", "cpe:2.3:a:hp:service_manager_mobility:9.30:*:*:*:*:*:*:*", "cpe:2.3:a:hp:service_manager_mobility:9.31:*:*:*:*:*:*:*", "cpe:2.3:a:hp:service_manager_mobility:9.32:*:*:*:*:*:*:*", "cpe:2.3:a:hp:service_manager_mobility:9.33:*:*:*:*:*:*:*", "cpe:2.3:a:hp:service_manager_mobility:9.34:*:*:*:*:*:*:*", "cpe:2.3:a:hp:service_manager_mobility:9.35:*:*:*:*:*:*:*", "cpe:2.3:a:hp:service_manager_mobility:9.40:*:*:*:*:*:*:*", "cpe:2.3:a:hp:service_manager_mobility:9.41:*:*:*:*:*:*:*", "cpe:2.3:a:hp:service_manager_server:9.30:*:*:*:*:*:*:*", "cpe:2.3:a:hp:service_manager_server:9.31:*:*:*:*:*:*:*", "cpe:2.3:a:hp:service_manager_server:9.32:*:*:*:*:*:*:*", "cpe:2.3:a:hp:service_manager_server:9.33:*:*:*:*:*:*:*", "cpe:2.3:a:hp:service_manager_server:9.34:*:*:*:*:*:*:*", "cpe:2.3:a:hp:service_manager_server:9.35:*:*:*:*:*:*:*", "cpe:2.3:a:hp:service_manager_server:9.40:*:*:*:*:*:*:*", "cpe:2.3:a:hp:service_manager_server:9.41:*:*:*:*:*:*:*", "cpe:2.3:a:hp:service_manager_service_request_catalog:9.30:*:*:*:*:*:*:*", "cpe:2.3:a:hp:service_manager_service_request_catalog:9.31:*:*:*:*:*:*:*", "cpe:2.3:a:hp:service_manager_service_request_catalog:9.32:*:*:*:*:*:*:*", "cpe:2.3:a:hp:service_manager_service_request_catalog:9.33:*:*:*:*:*:*:*", "cpe:2.3:a:hp:service_manager_service_request_catalog:9.34:*:*:*:*:*:*:*", "cpe:2.3:a:hp:service_manager_service_request_catalog:9.35:*:*:*:*:*:*:*", "cpe:2.3:a:hp:service_manager_service_request_catalog:9.40:*:*:*:*:*:*:*", "cpe:2.3:a:hp:service_manager_service_request_catalog:9.41:*:*:*:*:*:*:*", "cpe:2.3:a:hp:service_manager_web_client:9.30:*:*:*:*:*:*:*", "cpe:2.3:a:hp:service_manager_web_client:9.31:*:*:*:*:*:*:*", "cpe:2.3:a:hp:service_manager_web_client:9.32:*:*:*:*:*:*:*", "cpe:2.3:a:hp:service_manager_web_client:9.33:*:*:*:*:*:*:*", "cpe:2.3:a:hp:service_manager_web_client:9.34:*:*:*:*:*:*:*", "cpe:2.3:a:hp:service_manager_web_client:9.35:*:*:*:*:*:*:*", "cpe:2.3:a:hp:service_manager_web_client:9.40:*:*:*:*:*:*:*", "cpe:2.3:a:hp:service_manager_web_client:9.41:*:*:*:*:*:*:*", "cpe:2.3:a:hp:service_manager_windows_client:9.30:*:*:*:*:*:*:*", "cpe:2.3:a:hp:service_manager_windows_client:9.31:*:*:*:*:*:*:*", "cpe:2.3:a:hp:service_manager_windows_client:9.32:*:*:*:*:*:*:*", "cpe:2.3:a:hp:service_manager_windows_client:9.33:*:*:*:*:*:*:*", "cpe:2.3:a:hp:service_manager_windows_client:9.34:*:*:*:*:*:*:*", "cpe:2.3:a:hp:service_manager_windows_client:9.35:*:*:*:*:*:*:*", "cpe:2.3:a:hp:service_manager_windows_client:9.40:*:*:*:*:*:*:*", "cpe:2.3:a:hp:service_manager_windows_client:9.41:*:*:*:*:*:*:*" ]
null
null
8
6
null
GHSA-x3x6-8hwq-3mg4
admin/filemanager/ (aka the File Manager) in EZTechhelp EZCMS 1.2 and earlier does not require authentication, which allows remote attackers to create, modify, read, and delete files.
[]
null
null
null
null
null
CVE-2025-26477
Dell ECS version 3.8.1.4 and prior contain an Improper Input Validation vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Code execution.
[]
null
4.3
null
null
null
CVE-2021-24067
Microsoft Excel Remote Code Execution Vulnerability
Microsoft Excel Remote Code Execution Vulnerability
[ "cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:*:*", "cpe:2.3:a:microsoft:excel:2010:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:excel:2013:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:excel:2013:sp1:*:*:rt:*:*:*", "cpe:2.3:a:microsoft:excel:2016:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2019:*:*:*:*:-:*:*", "cpe:2.3:a:microsoft:office:2019:*:*:*:*:macos:*:*", "cpe:2.3:a:microsoft:office_online_server:-:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office_web_apps:2013:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office_web_apps_server:2013:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2021:*:*:*:ltsc:*:*:*", "cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:excel:2016:*:*:*:*:*:x86:*", "cpe:2.3:a:microsoft:excel:2016:*:*:*:*:*:x64:*", "cpe:2.3:a:microsoft:excel:2013:sp1:*:*:*:*:x86:*", "cpe:2.3:a:microsoft:excel:2013:sp1:*:*:*:*:x64:*" ]
null
7.8
null
null
null
CVE-2022-41547
Mobile Security Framework (MobSF) v0.9.2 and below was discovered to contain a local file inclusion (LFI) vulnerability in the StaticAnalyzer/views.py script. This vulnerability allows attackers to read arbitrary files via a crafted HTTP request.
[ "cpe:2.3:a:opensecurity:mobile_security_framework:*:*:*:*:*:*:*:*" ]
null
7.5
null
null
null
CVE-2024-9483
Uninitialized variable in digital signiture verification may crash the application
A null-pointer-dereference in the signature verification module in AVG/Avast Antivirus signature <24092400 released on 24/Sep/2024 on MacOS may allow a malformed xar file to crash the application during processing.
[ "cpe:2.3:a:avast:antivirus:*:*:*:*:*:macos:*:*", "cpe:2.3:a:avg:antivirus:*:*:*:*:*:macos:*:*" ]
null
5.1
null
null
null
GHSA-qcqw-xq86-g95h
A memory corruption issue was addressed with improved memory handling. This issue affected versions prior to iOS 12, macOS Mojave 10.14, tvOS 12, watchOS 5.
[]
null
null
7.8
null
null
GHSA-g3m4-2wr6-2q64
SysAid On-Prem versions <= 23.3.40 are vulnerable to an unauthenticated XML External Entity (XXE) vulnerability in the Checkin processing functionality, allowing for administrator account takeover and file read primitives.
[]
null
9.3
null
null
null
GHSA-5pcp-jwf5-3c2g
In Iolo System Shield AntiVirus and AntiSpyware 5.0.0.136, the amp.sys driver file contains an Arbitrary Write vulnerability due to not validating input values from IOCtl 0x00226003.
[]
null
null
9.8
null
null
GHSA-hjc9-48r3-j77h
perl.robot in realtimebattle 1.0.8 allows local users to overwrite arbitrary files via a symlink attack on the /tmp/perl.robot.log temporary file.
[]
null
null
null
null
null
CVE-2012-6605
The device-management command-line interface in Palo Alto Networks PAN-OS before 3.1.11 and 4.0.x before 4.0.9 allows remote authenticated users to execute arbitrary code via unspecified vectors, aka Ref ID 34896.
[ "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:3.1.9:*:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:4.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:4.0.3:*:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:4.0.4:*:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:4.0.5:*:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:4.0.6:*:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:4.0.7:*:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:4.0.8:*:*:*:*:*:*:*" ]
null
null
null
9
null
RHSA-2024:3513
Red Hat Security Advisory: less security update
less: OS command injection
[ "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
8.6
null
null
null
GHSA-mpx5-6w72-2g32
An exposure of sensitive information vulnerability was identified in GitHub Enterprise Server that could allow an attacker to disclose the names of private repositories within an organization. This issue could be exploited by leveraging a user-to-server token with no scopes via the Search API endpoint. Successful exploitation required an organization administrator to install a malicious GitHub App in the organization’s repositories. This vulnerability impacted only GitHub Enterprise Server version 3.17 and was addressed in version 3.17.2. The vulnerability was reported through the GitHub Bug Bounty program.
[]
6.3
4.3
null
null
null
CVE-2025-26890
WordPress HUSKY plugin <= 1.3.6.4 - Local File Inclusion vulnerability
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in PluginUs.Net HUSKY allows PHP Local File Inclusion.This issue affects HUSKY: from n/a through 1.3.6.4.
[]
null
7.5
null
null
null
CVE-2015-6293
Cisco AsyncOS 8.x before 8.0.8-113, 8.1.x and 8.5.x before 8.5.3-051, 8.6.x and 8.7.x before 8.7.0-171-LD, and 8.8.x before 8.8.0-085 on Web Security Appliance (WSA) devices allows remote attackers to cause a denial of service (memory consumption) via multiple file-range requests, aka Bug ID CSCur39155.
[ "cpe:2.3:a:cisco:web_security_appliance:8.0.0-000:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:web_security_appliance:8.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:web_security_appliance:8.0.5:hp1:*:*:*:*:*:*", "cpe:2.3:a:cisco:web_security_appliance:8.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:web_security_appliance:8.0.6-078:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:web_security_appliance:8.0.7-142:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:web_security_appliance:8.0.8-mr-113:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:web_security_appliance:8.5.0-497:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:web_security_appliance:8.5.0.000:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:web_security_appliance:8.5.2-024:*:*:*:*:*:*:*" ]
null
null
null
7.8
null
CVE-2020-36534
easyii CMS out cross-site request forgery
A vulnerability was found in easyii CMS. It has been classified as problematic. Affected is an unknown function of the file /admin/sign/out. The manipulation leads to cross site request forgery. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
[ "cpe:2.3:a:easyiicms:easyiicms:-:*:*:*:*:*:*:*" ]
null
4.3
null
null
null
RHSA-2025:3623
Red Hat Security Advisory: firefox security update
firefox: thunderbird: Use-after-free triggered by XSLTProcessor firefox: thunderbird: URL Bar Spoofing via non-BMP Unicode characters firefox: thunderbird: Memory safety bugs fixed in Firefox 137, Thunderbird 137, Firefox ESR 128.9, and Thunderbird 128.9
[ "cpe:/a:redhat:rhel_aus:8.2::appstream" ]
null
8.8
null
null
null
GHSA-rxvw-rgx9-7hq4
The Giveaways and Contests by RafflePress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'rafflepress' and 'rafflepress_gutenberg' shortcode in versions up to, and including, 1.12.0 due to insufficient input sanitization and output escaping on 'giframe' user supplied attribute. This makes it possible for authenticated attackers with contributor level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
6.4
null
null
null
CVE-2022-31643
A potential security vulnerability has been identified in the system BIOS for certain HP PC products which may allow loss of integrity. HP is releasing firmware updates to mitigate the potential vulnerability.
[ "cpe:2.3:o:hp:elite_dragonfly_g3_firmware:01.03.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elite_dragonfly_g3:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:dragonfly_folio_g3_firmware:01.03.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:dragonfly_folio_g3:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elite_dragonfly_g2_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elite_dragonfly_g2:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elite_dragonfly_max_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elite_dragonfly_max:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elite_x2_g8_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elite_x2_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elite_x360_1040_g9_firmware:01.03.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elite_x360_1040_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elite_x360_830_g9_firmware:01.03.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elite_x360_830_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_1040_g9_firmware:01.03.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_1040_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_630_g9_firmware:01.04.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_630_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_640_g9_firmware:01.04.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_640_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_645_g9_firmware:01.08.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_645_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_650_g9_firmware:01.04.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_650_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_655_g9_firmware:01.08.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_655_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_830_g9_firmware:01.03.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_830_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_830_g8_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_830_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_835_g9_firmware:01.02.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_835_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_835_g8_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_835_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_840_g9_firmware:01.03.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_840_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_840_aero_g8_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_840_aero_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_840_g8_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_840_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_845_g9_firmware:01.02.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_845_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_845_g8_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_845_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_850_g8_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_850_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_855_g8_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_855_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_860_g9_firmware:01.03.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_860_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_865_g9_firmware:01.02.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_865_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_x360_1030_g8_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_x360_1030_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_x360_1040_g8_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_x360_1040_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_x360_830_g8_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_x360_830_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:pro_x360_fortis_g10_firmware:01.03.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:pro_x360_fortis_g10:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:pro_x360_fortis_g9_firmware:01.03.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:pro_x360_fortis_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_430_g8_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_430_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_440_g9_firmware:01.04.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_440_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_440_g8_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_440_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_445_g9_firmware:01.08.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_445_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_445_g8_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_445_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_450_g9_firmware:01.04.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_450_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_450_g8_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_450_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_455_g9_firmware:01.08.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_455_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_455_g8_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_455_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_630_g8_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_630_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_635_aero_g8_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_635_aero_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_640_g8_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_640_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_650_g8_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_650_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_fortis_g10_firmware:01.03.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_fortis_g10:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_fortis_g9_firmware:01.03.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_fortis_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_x360_11_g7_ee_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_x360_11_g7_ee:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_x360_435_g8_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_x360_435_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_firefly_g8_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_firefly_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_firefly_g9_firmware:01.03.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_firefly_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_fury_g8_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_fury_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_fury_16_g9_firmware:01.03.02:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_fury_16_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_power_g8_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_power_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_power_g9_firmware:01.03.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_power_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_studio_g8_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_studio_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_studio_g9_firmware:01.03.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_studio_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zhan_66_pro_g5_firmware:01.04.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zhan_66_pro_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zhan_66_pro_a_14_g4_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zhan_66_pro_a_14_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zhan_66_pro_a_14_g5_firmware:01.08.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zhan_66_pro_a_14_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elite_mini_600_g9_firmware:02.05.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elite_mini_600_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elite_mini_800_g9_firmware:02.05.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elite_mini_800_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elite_sff_600_g9_firmware:02.05.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elite_sff_600_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elite_sff_800_g9_firmware:02.05.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elite_sff_800_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elite_tower_600_g9_firmware:02.05.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elite_tower_600_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elite_tower_680_g9_firmware:02.05.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elite_tower_680_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elite_tower_800_g9_firmware:02.05.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elite_tower_800_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elite_tower_880_g9_firmware:02.05.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elite_tower_880_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_800_g8_firmware:02.09.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_800_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_805_g8_firmware:02.05.02:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_805_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_880_g8_firmware:02.09.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_880_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:eliteone_800_g8_24_firmware:02.09.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:eliteone_800_g8_24:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:eliteone_800_g8_27_firmware:02.09.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:eliteone_800_g8_27:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:eliteone_840_g9_firmware:02.06.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:eliteone_840_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:eliteone_870_g9_firmware:02.06.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:eliteone_870_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:mini_conferencing_pc_firmware:02.05.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:mini_conferencing_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:pro_mini_400_g9_firmware:02.05.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:pro_mini_400_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:pro_sff_400_g9_firmware:02.05.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:pro_sff_400_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:pro_tower_400_g9_firmware:02.05.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:pro_tower_400_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:pro_tower_480_g9_firmware:02.05.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:pro_tower_480_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_405_g8_firmware:02.05.02:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_405_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:proone_440_g9_firmware:02.05.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proone_440_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:z1_g8_tower_firmware:02.09.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:z1_g8_tower:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:z1_g9_tower_firmware:02.05.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:z1_g9_tower:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:engage_go_10_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:engage_go_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:hp_z2_mini_g9_firmware:01.04.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:hp_z2_mini_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:hp_z2_small_form_factor_g8_firmware:01.05.02:*:*:*:*:*:*:*", "cpe:2.3:h:hp:hp_z2_small_form_factor_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:hp_z2_small_form_factor_g9_firmware:01.04.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:hp_z2_small_form_factor_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:hp_z2_tower_g8_firmware:01.05.02:*:*:*:*:*:*:*", "cpe:2.3:h:hp:hp_z2_tower_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:hp_z2_tower_g9_firmware:01.04.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:hp_z2_tower_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:pro_mt440_g3_firmware:01.05.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:pro_mt440_g3:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elite_mt645_g7_firmware:01.10.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elite_mt645_g7:-:*:*:*:*:*:*:*" ]
null
5.5
null
null
null
GHSA-hm2x-9mrv-7fj2
Windows Projected File System Elevation of Privilege Vulnerability
[]
null
7.8
null
null
null
RHSA-2024:2038
Red Hat Security Advisory: tigervnc security update
xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice xorg-x11-server: Use-after-free in ProcRenderAddGlyphs
[ "cpe:/a:redhat:rhel_eus:8.8::appstream" ]
null
7.8
null
null
null
GHSA-6mvj-2569-3mcm
Editor.js vulnerable to Code Injection
Editor.js is a block-style editor with clean JSON output. Versions prior to 2.26.0 are vulnerable to Code Injection via pasted input. The processHTML method passes pasted input into wrapper’s innerHTML. This issue is patched in version 2.26.0.
[]
5.3
6.1
null
null
null
CVE-2024-2036
ApplyOnline – Application Form Builder and Manager <= 2.6 - Missing Authorization to Sensitive Information Exposure
The ApplyOnline – Application Form Builder and Manager plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the aol_modal_box AJAX action in all versions up to, and including, 2.6. This makes it possible for authenticated attackers, with subscriber access or higher, to view Application submissions.
[]
null
4.3
null
null
null
CVE-2015-0305
Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK & Compiler before 16.0.0.272 allow attackers to execute arbitrary code by leveraging an unspecified "type confusion."
[ "cpe:2.3:a:adobe:adobe_air_sdk_and_compiler:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:android:*:*", "cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:adobe_air_sdk:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:14.0.0.125:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:14.0.0.145:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:14.0.0.176:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:14.0.0.179:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:15.0.0.144:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:15.0.0.152:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:15.0.0.167:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:15.0.0.189:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:15.0.0.223:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:15.0.0.238:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:15.0.0.239:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:15.0.0.246:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:16.0.0.234:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:16.0.0.235:*:*:*:*:*:*:*" ]
null
null
null
9.3
null
CVE-2018-21127
Certain NETGEAR devices are affected by command injection by an unauthenticated attacker. This affects WAC505 before 5.0.0.17 and WAC510 before 5.0.0.17.
[ "cpe:2.3:o:netgear:wac505_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:wac505:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:wac510_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:wac510:-:*:*:*:*:*:*:*" ]
null
null
8.8
null
null
CVE-2022-41686
Out-of-bound memory read and write in /dev/mmz_userdev device driver. The impact depends on the privileges of the attacker. The unprivileged process run on the device could read out-of-bound memory leading sensitive to information disclosure. The proc ...
OpenHarmony-v3.1.2 and prior versions, 3.0.6 and prior versions have an Out-of-bound memory read and write vulnerability in /dev/mmz_userdev device driver. The impact depends on the privileges of the attacker. The unprivileged process run on the device could read out-of-bound memory leading sensitive to information disclosure. The processes with system user UID run on the device would be able to write out-of-bound memory which could lead to unspecified memory corruption.
[ "cpe:2.3:a:openharmony:openharmony:*:*:*:*:long_term_support:*:*:*", "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*" ]
null
5.1
null
null
null
GHSA-mc83-gm47-m9vc
A vulnerability in the call-handling functionality of Session Initiation Protocol (SIP) Software for Cisco IP Phone 7800 Series and 8800 Series could allow an unauthenticated, remote attacker to cause an affected phone to reload unexpectedly, resulting in a temporary denial of service (DoS) condition. The vulnerability is due to incomplete error handling when XML data within a SIP packet is parsed. An attacker could exploit this vulnerability by sending a SIP packet that contains a malicious XML payload to an affected phone. A successful exploit could allow the attacker to cause the affected phone to reload unexpectedly, resulting in a temporary DoS condition.
[]
null
null
null
null
null
GHSA-mv77-9g28-cwg3
`CHECK` fail via inputs in `PyFunc`
ImpactAn input `token` that is not a UTF-8 bytestring will trigger a `CHECK` fail in [`tf.raw_ops.PyFunc`](https://github.com/tensorflow/tensorflow/blob/master/tensorflow/python/lib/core/py_func.cc).PatchesWe have patched the issue in GitHub commit [9f03a9d3bafe902c1e6beb105b2f24172f238645](https://github.com/tensorflow/tensorflow/commit/9f03a9d3bafe902c1e6beb105b2f24172f238645).The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1, 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range.For more informationPlease consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.AttributionThis vulnerability has been reported by [email protected]
[]
null
4.8
null
null
null
CVE-2017-16927
The scp_v0s_accept function in sesman/libscp/libscp_v0.c in the session manager in xrdp through 0.9.4 uses an untrusted integer as a write length, which allows local users to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted input stream.
[ "cpe:2.3:a:neutrinolabs:xrdp:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*" ]
null
null
8.4
7.2
null
GHSA-8jjx-c624-8pjg
An issue was discovered in PSPP 1.2.0. There is a heap-based buffer overflow at the function read_bytes_internal in utilities/pspp-dump-sav.c, which allows attackers to cause a denial of service (application crash) or possibly have unspecified other impact.
[]
null
null
7.8
null
null
GHSA-rp4p-25j3-mhw4
It was observed that while login into Business-central console, HTTP request discloses sensitive information like username and password when intercepted using some tool like burp suite etc.
[]
null
7.5
null
null
null
GHSA-7hrx-2h6p-x7pc
In the Linux kernel, the following vulnerability has been resolved:scsi: mpi3mr: Fix memory leaks in mpi3mr_init_ioc()Don't allocate memory again when IOC is being reinitialized.
[]
null
null
null
null
null
CVE-2024-5019
WhatsUp Gold LoadCSSUsingBasePath Directory Traversal Information Disclosure Vulnerability
In WhatsUp Gold versions released before 2023.1.3,  an unauthenticated Arbitrary File Read issue exists in Wug.UI.Areas.Wug.Controllers.SessionController.CachedCSS. This vulnerability allows reading of any file with iisapppool\NmConsole privileges.
[ "cpe:2.3:a:progress:whatsup_gold:2023.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:progress:whatsup_gold:*:*:*:*:*:*:*:*" ]
null
5.3
null
null
null
GHSA-w2v5-r8g7-67hv
Cross-site scripting (XSS) vulnerability in the BuddyPress Extended Friendship Request plugin before 1.0.2 for WordPress, when the "Friend Connections" component is enabled, allows remote attackers to inject arbitrary web script or HTML via the friendship_request_message parameter to wp-admin/admin-ajax.php. NOTE: some of these details are obtained from third party information.
[]
null
null
null
null
null
GHSA-9j94-67jr-4cqj
Rack session gets restored after deletion
SummaryWhen using the `Rack::Session::Pool` middleware, simultaneous rack requests can restore a deleted rack session, which allows the unauthenticated user to occupy that session.Details[Rack session middleware](https://github.com/rack/rack-session/blob/v2.1.0/lib/rack/session/abstract/id.rb#L271-L278) prepares the session at the beginning of request, then saves is back to the store with possible changes applied by host rack application. This way the session becomes to be a subject of race conditions in general sense over concurrent rack requests.ImpactWhen using the `Rack::Session::Pool` middleware, and provided the attacker can acquire a session cookie (already a major issue), the session may be restored if the attacker can trigger a long running request (within that same session) adjacent to the user logging out, in order to retain illicit access even after a user has attempted to logout.MitigationUpdate to the latest version of `rack-session`, orEnsure your application invalidates sessions atomically by marking them as logged out e.g., using a `logged_out` flag, instead of deleting them, and check this flag on every request to prevent reuse, orImplement a custom session store that tracks session invalidation timestamps and refuses to accept session data if the session was invalidated after the request began.RelatedThis code was previously part of `rack` in Rack < 3, see <https://github.com/rack/rack/security/advisories/GHSA-vpfw-47h7-xj4g> for the equivalent advisory in `rack` (affecting Rack < 3 only).
[]
null
4.2
null
null
null
CVE-2014-7814
SQL injection vulnerability in Red Hat CloudForms 3.1 Management Engine (CFME) 5.3 allows remote authenticated users to execute arbitrary SQL commands via a crafted REST API request to an SQL filter.
[ "cpe:2.3:a:redhat:cloudforms_3.1_management_engine:5.3:*:*:*:*:*:*:*" ]
null
null
null
6.5
null
GHSA-cmwc-cfp9-2c98
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
[]
null
null
null
null
null
GHSA-p658-759g-r8hf
The Interactive Content WordPress plugin before 1.15.8 does not validate uploads which could allow a Contributors and above to update malicious SVG files, leading to Stored Cross-Site Scripting issues
[]
null
5.4
null
null
null
CVE-2021-31430
This vulnerability allows local attackers to disclose sensitive information on affected installations of Parallels Desktop 15.1.5-47309. An attacker must first obtain the ability to execute high-privileged code on the target guest system in order to exploit this vulnerability. The specific flaw exists within the IDE virtual device. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to escalate privileges and execute arbitrary code in the context of the hypervisor. Was ZDI-CAN-13188.
[ "cpe:2.3:a:parallels:parallels_desktop:15.1.5-47309:*:*:*:*:*:*:*" ]
null
null
6
null
null
GHSA-9c9g-7w7x-vr22
Microsoft Internet Explorer 10 and 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2014-0313.
[]
null
null
null
null
null
GHSA-w9gf-3cjv-vfxp
Cross-site scripting (XSS) vulnerability in admin/menu.php in SAXON 5.4 allows remote attackers to inject arbitrary web script or HTML via the config[news_url] parameter.
[]
null
null
null
null
null
RHSA-2020:0513
Red Hat Security Advisory: flash-plugin security update
flash-plugin: Arbitrary Code Execution vulnerability (APSB20-06)
[ "cpe:/a:redhat:rhel_extras:6" ]
null
null
8.8
null
null
RHSA-2015:0236
Red Hat Security Advisory: Red Hat JBoss Fuse/A-MQ 6.1.0 security and bug fix update
CXF: Improper security semantics enforcement of SAML SubjectConfirmation methods Framework: directory traversal flaw
[ "cpe:/a:redhat:jboss_amq:6.1.0", "cpe:/a:redhat:jboss_fuse:6.1.0" ]
null
null
null
null
null
GHSA-wmw4-vj25-rfxw
The Unlimited Elements For Elementor (Free Widgets, Addons, Templates) plugin for WordPress is vulnerable to IP Address Spoofing in all versions up to, and including, 1.5.112 due to insufficient IP address validation and/or use of user-supplied HTTP headers as a primary method for IP retrieval. This makes it possible for unauthenticated attackers to bypass antispam functionality in the Form Builder widgets.
[]
null
5.3
null
null
null
CVE-2024-13982
SPON IP Network Intercom System rj_get_token.php Arbitrary File Read
SPON IP Network Broadcast System, a digital audio transmission platform developed by SPON Communications, contains an arbitrary file read vulnerability in the rj_get_token.php endpoint. The flaw arises from insufficient input validation on the jsondata[url] parameter, which allows attackers to perform directory traversal and access sensitive files on the server. An unauthenticated remote attacker can exploit this vulnerability by sending a crafted POST request to read arbitrary files, potentially exposing system configuration, credentials, or internal logic. An affected version range is undefined.
[]
8.7
null
null
null
null
ICSA-23-080-01
Keysight N6845A Geolocation Server
N6854A Geolocation Server versions 2.4.2 are vulnerable to untrusted data deserialization, which may allow a malicious actor to escalate privileges in the affected device’s default configuration and achieve remote code execution. CVE-2023-1399 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been assigned; the CVSS vector string is (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).
[]
null
null
7.8
null
null
GHSA-6qpf-6fwg-q2xj
Cross-site scripting (XSS) vulnerability in HP Proliant Support Pack (PSP) before 8.7 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
[]
null
null
null
null
null
CVE-2010-4830
SQL injection vulnerability in Resumes/TD_RESUME_Indlist.asp in Techno Dreams (T-Dreams) Job Career Package 3.0 allows remote attackers to execute arbitrary SQL commands via the z_Residency parameter.
[ "cpe:2.3:a:t-dreams:job_career_package:3.0:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2024-11780
Site Search 360 <= 2.1.6 - Authenticated (Contributor+) Stored Cross-Site Scripting
The Site Search 360 plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'ss360-resultblock' shortcode in all versions up to, and including, 2.1.6 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
6.4
null
null
null
CVE-2024-20003
In Modem NL1, there is a possible system crash due to an improper input validation. This could lead to remote denial of service, if NW sent invalid NR RRC Connection Setup message, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01191612; Issue ID: MOLY01191612 (MSV-981).
[ "cpe:2.3:h:mediatek:mt6875t:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt2735:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6297:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*", "cpe:2.3:o:mediatek:nr15:-:*:*:*:*:*:*:*" ]
null
7.5
null
null
null
GHSA-9fm7-cmvm-vvjr
D-Link DWL-2600AP 4.2.0.15 Rev A devices have an authenticated OS command injection vulnerability via the Restore Configuration functionality in the Web interface, using shell metacharacters in the admin.cgi?action=config_restore configRestore or configServerip parameter.
[]
null
7.8
null
null
null
GHSA-54c7-72v9-gm27
In version v12 of parisneo/lollms-webui, the 'Send file to AL' function allows uploading files with various extensions, including potentially dangerous ones like .py, .sh, .bat, and more. Attackers can exploit this by uploading files with malicious content and then using the '/open_file' API endpoint to execute these files. The vulnerability arises from the use of 'subprocess.Popen' to open files without proper validation, leading to potential remote code execution.
[]
null
null
6.6
null
null
CVE-2020-35680
smtpd/lka_filter.c in OpenSMTPD before 6.8.0p1, in certain configurations, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted pattern of client activity, because the filter state machine does not properly maintain the I/O channel between the SMTP engine and the filters layer.
[ "cpe:2.3:a:opensmtpd:opensmtpd:*:*:*:*:*:*:*:*", "cpe:2.3:a:opensmtpd:opensmtpd:6.8.0:-:*:*:*:*:*:*", "cpe:2.3:a:opensmtpd:opensmtpd:6.8.0:patch1-rc1:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*" ]
null
7.5
null
5
null
cisco-sa-20190227-wmda-cmdinj
Cisco Webex Meetings Desktop App and Cisco Webex Productivity Tools Update Service Command Injection Vulnerability
A vulnerability in the update service of Cisco Webex Meetings Desktop App and Cisco Webex Productivity Tools for Windows could allow an authenticated, local attacker to execute arbitrary commands as a privileged user. The vulnerability is due to insufficient validation of user-supplied parameters. An attacker could exploit this vulnerability by invoking the update service command with a crafted argument. An exploit could allow the attacker to run arbitrary commands with SYSTEM user privileges. While the CVSS Attack Vector metric denotes the requirement for an attacker to have local access, administrators should be aware that in Active Directory deployments, the vulnerability could be exploited remotely by leveraging the operating system remote management tools. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190227-wmda-cmdinj ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190227-wmda-cmdinj"]
[]
null
null
7.8
null
null
GHSA-w9wh-5q96-r696
Race condition in the JavaScript garbage collection in Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code by causing the garbage collector to delete a temporary variable while it is still being used during the creation of a new Function object.
[]
null
null
null
null
null
CVE-2004-0165
Format string vulnerability in Point-to-Point Protocol (PPP) daemon (pppd) 2.4.0 for Mac OS X 10.3.2 and earlier allows remote attackers to read arbitrary pppd process data, including PAP or CHAP authentication credentials, to gain privileges.
[ "cpe:2.3:o:apple:mac_os_x:10.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.1.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.1.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.1.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.2.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.2.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.2.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.2.6:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.2.7:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.2.8:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.3.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.3.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.1.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.1.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.1.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.2.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.2.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.2.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.2.6:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.2.7:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.2.8:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.3.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.3.2:*:*:*:*:*:*:*" ]
null
null
null
5
null
GHSA-c856-w373-jm6c
In JetBrains TeamCity before 2024.07.1 multiple stored XSS was possible on Clouds page
[]
null
4.6
null
null
null
CVE-2011-4925
Terascale Open-Source Resource and Queue Manager (aka TORQUE Resource Manager) before 2.5.9, when munge authentication is used, allows remote authenticated users to impersonate arbitrary user accounts via unspecified vectors.
[ "cpe:2.3:a:cluster_resources:torque_resource_manager:1.0.1p0:*:*:*:*:*:*:*", "cpe:2.3:a:cluster_resources:torque_resource_manager:1.0.1p1:*:*:*:*:*:*:*", "cpe:2.3:a:cluster_resources:torque_resource_manager:1.0.1p2:*:*:*:*:*:*:*", "cpe:2.3:a:cluster_resources:torque_resource_manager:1.0.1p3:*:*:*:*:*:*:*", "cpe:2.3:a:cluster_resources:torque_resource_manager:1.0.1p4:*:*:*:*:*:*:*", "cpe:2.3:a:cluster_resources:torque_resource_manager:1.0.1p5:*:*:*:*:*:*:*", "cpe:2.3:a:cluster_resources:torque_resource_manager:1.0.1p6:*:*:*:*:*:*:*", "cpe:2.3:a:cluster_resources:torque_resource_manager:1.1.0p0:*:*:*:*:*:*:*", "cpe:2.3:a:cluster_resources:torque_resource_manager:1.1.0p1:*:*:*:*:*:*:*", "cpe:2.3:a:cluster_resources:torque_resource_manager:1.1.0p2:*:*:*:*:*:*:*", "cpe:2.3:a:cluster_resources:torque_resource_manager:1.1.0p3:*:*:*:*:*:*:*", "cpe:2.3:a:cluster_resources:torque_resource_manager:1.1.0p4:*:*:*:*:*:*:*", "cpe:2.3:a:cluster_resources:torque_resource_manager:1.1.0p5:*:*:*:*:*:*:*", "cpe:2.3:a:cluster_resources:torque_resource_manager:1.1.0p6:*:*:*:*:*:*:*", "cpe:2.3:a:cluster_resources:torque_resource_manager:1.2.0p0:*:*:*:*:*:*:*", "cpe:2.3:a:cluster_resources:torque_resource_manager:1.2.0p1:*:*:*:*:*:*:*", "cpe:2.3:a:cluster_resources:torque_resource_manager:1.2.0p2:*:*:*:*:*:*:*", "cpe:2.3:a:cluster_resources:torque_resource_manager:1.2.0p3:*:*:*:*:*:*:*", "cpe:2.3:a:cluster_resources:torque_resource_manager:1.2.0p4:*:*:*:*:*:*:*", "cpe:2.3:a:cluster_resources:torque_resource_manager:1.2.0p5:*:*:*:*:*:*:*", "cpe:2.3:a:cluster_resources:torque_resource_manager:1.2.0p6:*:*:*:*:*:*:*", "cpe:2.3:a:cluster_resources:torque_resource_manager:2.0.0p0:*:*:*:*:*:*:*", "cpe:2.3:a:cluster_resources:torque_resource_manager:2.0.0p1:*:*:*:*:*:*:*", "cpe:2.3:a:cluster_resources:torque_resource_manager:2.0.0p2:*:*:*:*:*:*:*", "cpe:2.3:a:cluster_resources:torque_resource_manager:2.0.0p3:*:*:*:*:*:*:*", "cpe:2.3:a:cluster_resources:torque_resource_manager:2.0.0p4:*:*:*:*:*:*:*", "cpe:2.3:a:cluster_resources:torque_resource_manager:2.0.0p5:*:*:*:*:*:*:*", "cpe:2.3:a:cluster_resources:torque_resource_manager:2.0.0p6:*:*:*:*:*:*:*", "cpe:2.3:a:clusterresources:torque_resource_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:clusterresources:torque_resource_manager:2.1.0p0:*:*:*:*:*:*:*", "cpe:2.3:a:clusterresources:torque_resource_manager:2.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:clusterresources:torque_resource_manager:2.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:clusterresources:torque_resource_manager:2.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:clusterresources:torque_resource_manager:2.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:clusterresources:torque_resource_manager:2.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:clusterresources:torque_resource_manager:2.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:clusterresources:torque_resource_manager:2.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:clusterresources:torque_resource_manager:2.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:clusterresources:torque_resource_manager:2.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:clusterresources:torque_resource_manager:2.3.6:*:*:*:*:*:*:*", "cpe:2.3:a:clusterresources:torque_resource_manager:2.3.7:*:*:*:*:*:*:*", "cpe:2.3:a:clusterresources:torque_resource_manager:2.3.8:*:*:*:*:*:*:*", "cpe:2.3:a:clusterresources:torque_resource_manager:2.3.9:*:*:*:*:*:*:*", "cpe:2.3:a:clusterresources:torque_resource_manager:2.3.10:*:*:*:*:*:*:*", "cpe:2.3:a:clusterresources:torque_resource_manager:2.3.11:*:*:*:*:*:*:*", "cpe:2.3:a:clusterresources:torque_resource_manager:2.3.12:*:*:*:*:*:*:*", "cpe:2.3:a:clusterresources:torque_resource_manager:2.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:clusterresources:torque_resource_manager:2.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:clusterresources:torque_resource_manager:2.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:clusterresources:torque_resource_manager:2.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:clusterresources:torque_resource_manager:2.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:clusterresources:torque_resource_manager:2.4.5:*:*:*:*:*:*:*", "cpe:2.3:a:clusterresources:torque_resource_manager:2.4.6:*:*:*:*:*:*:*", "cpe:2.3:a:clusterresources:torque_resource_manager:2.4.7:*:*:*:*:*:*:*", "cpe:2.3:a:clusterresources:torque_resource_manager:2.4.8:*:*:*:*:*:*:*", "cpe:2.3:a:clusterresources:torque_resource_manager:2.4.9:*:*:*:*:*:*:*", "cpe:2.3:a:clusterresources:torque_resource_manager:2.4.10:*:*:*:*:*:*:*", "cpe:2.3:a:clusterresources:torque_resource_manager:2.4.11:*:*:*:*:*:*:*", "cpe:2.3:a:clusterresources:torque_resource_manager:2.4.12:*:*:*:*:*:*:*", "cpe:2.3:a:clusterresources:torque_resource_manager:2.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:clusterresources:torque_resource_manager:2.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:clusterresources:torque_resource_manager:2.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:clusterresources:torque_resource_manager:2.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:clusterresources:torque_resource_manager:2.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:clusterresources:torque_resource_manager:2.5.5:*:*:*:*:*:*:*", "cpe:2.3:a:clusterresources:torque_resource_manager:2.5.6:*:*:*:*:*:*:*", "cpe:2.3:a:clusterresources:torque_resource_manager:2.5.7:*:*:*:*:*:*:*" ]
null
null
null
4.9
null
CVE-2018-5489
NetApp 7-Mode Transition Tool allows users with valid credentials to access functions and information which may have been intended to be restricted to administrators or privileged users. 7MTT versions below 2.0 do not enforce user authorization rules on file information and status that it has previously collected. The released version of 7MTT has been updated to maintain and verify authorization rules for file information, status and utilities.
[ "cpe:2.3:a:netapp:7-mode_transition_tool:*:*:*:*:*:*:*:*" ]
null
null
6.5
4
null
GHSA-29j4-8jcf-4q5w
The BEAR for WordPress is vulnerable to Missing Authorization in versions up to, and including, 1.1.3.3. This is due to a missing capability check on the woobe_bulkoperations_apply_default_combination function. This makes it possible for authenticated attackers (subscriber or higher) to manipulate products.
[]
null
4.3
null
null
null
GHSA-wqrx-hq6q-6g5p
ASUS Japan WL-330NUL devices with firmware before 3.0.0.42 allow remote attackers to cause a denial of service via unspecified vectors.
[]
null
null
4.3
null
null
CVE-2023-46240
CodeIgniter4 vulnerable to information disclosure when detailed error report is displayed in production environment
CodeIgniter is a PHP full-stack web framework. Prior to CodeIgniter4 version 4.4.3, if an error or exception occurs, a detailed error report is displayed even if in the production environment. As a result, confidential information may be leaked. Version 4.4.3 contains a patch. As a workaround, replace `ini_set('display_errors', '0')` with `ini_set('display_errors', 'Off')` in `app/Config/Boot/production.php`.
[ "cpe:2.3:a:codeigniter:codeigniter:*:*:*:*:*:*:*:*" ]
null
7.5
null
null
null
CVE-2021-47602
mac80211: track only QoS data frames for admission control
In the Linux kernel, the following vulnerability has been resolved: mac80211: track only QoS data frames for admission control For admission control, obviously all of that only works for QoS data frames, otherwise we cannot even access the QoS field in the header. Syzbot reported (see below) an uninitialized value here due to a status of a non-QoS nullfunc packet, which isn't even long enough to contain the QoS header. Fix this to only do anything for QoS data packets.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:5.16:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:5.16:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:5.16:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:5.16:rc4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:5.16:rc5:*:*:*:*:*:*" ]
null
5.5
null
null
null