id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
197k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
CVE-2021-43820
Permissions check bypass in Seafile
Seafile is an open source cloud storage system. A sync token is used in Seafile file syncing protocol to authorize access to library data. To improve performance, the token is cached in memory in seaf-server. Upon receiving a token from sync client or SeaDrive client, the server checks whether the token exist in the cache. However, if the token exists in cache, the server doesn't check whether it's associated with the specific library in the URL. This vulnerability makes it possible to use any valid sync token to access data from any **known** library. Note that the attacker has to first find out the ID of a library which it has no access to. The library ID is a random UUID, which is not possible to be guessed. There are no workarounds for this issue.
[ "cpe:2.3:a:seafile:seafile_server:*:*:*:*:community:*:*:*", "cpe:2.3:a:seafile:seafile_server:*:*:*:*:professional:*:*:*" ]
null
7.4
null
null
GHSA-j42w-vpmm-467m
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in WPWeb Elite Docket (WooCommerce Collections / Wishlist / Watchlist) allows SQL Injection.This issue affects Docket (WooCommerce Collections / Wishlist / Watchlist): from n/a before 1.7.0.
[]
null
9.3
null
null
CVE-2020-2828
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: WLS Web Services). The supported version that is affected is 10.3.6.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via IIOP, T3 to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle WebLogic Server accessible data. CVSS 3.0 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
[ "cpe:2.3:a:oracle:weblogic_server:10.3.6.0.0:*:*:*:*:*:*:*" ]
null
null
7.5
null
GHSA-xfrc-7mj2-5xh9
Undefined Behavior in zencashjs
Versions of `zencashjs` prior to 1.2.0 may cause loss of funds when used with cryptocurrency wallets. The package relies on a string comparison of the first two characters of a Horizen address to determine the destination address type of a transaction (P2PKH or P2SH). Due to the base58 address prefixes chosen in Horizen there exists the possibility of a clash of address prefixes for testnet P2PKH and mainnet P2SH addresses, testnet P2PKH addresses start with “zt” while a subset of mainnet P2SH addresses can also start with “zt”. The package interprets transactions sent to a “zt” P2SH address on mainnet as P2PKH transactions erroneously. Any funds sent to a mainnet P2SH multisignature address starting with “zt” will be sent to the wrong address and be lost.RecommendationUpgrade to version 1.2.0 or later.
[]
null
null
null
null
GHSA-4f88-x3x5-4xc4
An issue was discovered in Adobe InDesign 12.1.0 and earlier versions. An exploitable memory corruption vulnerability exists. Successful exploitation could lead to arbitrary code execution.
[]
null
null
9.8
null
CVE-2022-23746
The IPsec VPN blade has a dedicated portal for downloading and connecting through SSL Network Extender (SNX). If the portal is configured for username/password authentication, it is vulnerable to a brute-force attack on usernames and passwords.
[ "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:-:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_10:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_103:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_117:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_118:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_127:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_134:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_135:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_138:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_141:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_149:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_155:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_156:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_160:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_161:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_17:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_173:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_183:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_187:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_188:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_190:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_202:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_203:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_205:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_208:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_210:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_211:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_220:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_33:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_42:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_47:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_73:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_74:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_80:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_87:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_91:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:-:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_105:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_121:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_163:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_178:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_191:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_210:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_240:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_258:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_266:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_273:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_279:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_283:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_295:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_302:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_304:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_305:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_306:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_309:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_310:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_313:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_314:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_315:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_317:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_326:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_327:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_331:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_332:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_334:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_335:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:-:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_107:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_111:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_135:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_136:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_140:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_155:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_163:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_166:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_168:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_180:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_19:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_191:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_195:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_196:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_210:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_213:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_214:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_215:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_217:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_219:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_221:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_226:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_227:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_228:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_232:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_235:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_236:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_237:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_241:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_242:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_245:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_246:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_251:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_254:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_50:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_76:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30sp:-:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30sp:take_101:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30sp:take_31:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30sp:take_32:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30sp:take_45:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30sp:take_49:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30sp:take_56:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30sp:take_73:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30sp:take_75:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30sp:take_82:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30sp:take_97:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:-:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_100:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_102:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_114:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_118:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_119:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_120:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_121:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_125:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_126:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_131:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_138:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_139:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_150:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_153:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_154:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_156:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_158:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_161:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_172:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_173:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_25:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_38:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_45:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_48:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_53:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_54:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_55:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_65:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_67:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_69:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_74:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_77:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_78:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_83:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_87:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_89:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_91:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_92:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_93:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_94:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r81:-:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r81:take_10:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r81:take_11:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r81:take_13:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r81:take_17:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r81:take_23:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r81:take_25:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r81:take_27:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r81:take_29:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r81:take_34:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r81:take_36:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r81:take_42:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r81:take_44:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r81:take_51:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r81:take_56:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r81:take_58:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r81:take_60:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r81:take_65:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r81:take_68:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r81:take_69:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r81:take_72:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r81:take_74:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r81.10:-:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r81.10:take_14:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r81.10:take_22:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r81.10:take_30:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r81.10:take_38:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r81.10:take_44:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r81.10:take_45:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r81.10:take_55:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r81.10:take_61:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r81.10:take_66:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r81.10:take_75:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r81.10:take_78:*:*:*:-:*:*", "cpe:2.3:a:checkpoint:ssl_network_extender:r81.10:take_9:*:*:*:-:*:*" ]
null
7.5
null
null
CVE-2024-8533
Rockwell Automation OptixPanel™ Privilege Escalation Vulnerability via File Permissions
A privilege escalation vulnerability exists in the Rockwell Automation affected products. The vulnerability occurs due to improper default file permissions allowing users to exfiltrate credentials and escalate privileges.
[ "cpe:2.3:o:rockwellautomation:2800c_optixpanel_compact:4.0.0.325:*:*:*:*:*:*:*", "cpe:2.3:o:rockwellautomation:2800s_optixpanel_standard:4.0.0.350:*:*:*:*:*:*:*", "cpe:2.3:o:rockwellautomation:embedded_edge_compute_module:4.0.0.347:*:*:*:*:*:*:*", "cpe:2.3:o:rockwellautomation:2800c_optixpanel_compact_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:rockwellautomation:2800c_optixpanel_compact:-:*:*:*:*:*:*:*", "cpe:2.3:o:rockwellautomation:2800s_optixpanel_standard_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:rockwellautomation:2800s_optixpanel_standard:-:*:*:*:*:*:*:*", "cpe:2.3:o:rockwellautomation:embedded_edge_compute_module_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:rockwellautomation:embedded_edge_compute_module:-:*:*:*:*:*:*:*" ]
7.7
null
null
null
GHSA-546c-jgxm-3c33
The Backup Bolt WordPress plugin through 1.3.0 is vulnerable to Information Exposure via the unprotected access of debug logs. This makes it possible for unauthenticated attackers to retrieve the debug log which may contain information like system errors which could contain sensitive information.
[]
null
4.7
null
null
GHSA-x7h3-m42w-6h68
cPanel before 70.0.23 allows code execution because "." is in @INC during a Perl syntax check of cpaddonsup (SEC-359).
[]
null
null
7.2
null
GHSA-xw2v-wvvx-29jq
Vulnerability in the Oracle Outside In Technology component of Oracle Fusion Middleware (subcomponent: Outside In Filters). The supported version that is affected are 8.5.3 and 8.5.4. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Outside In Technology. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Outside In Technology and unauthorized read access to a subset of Oracle Outside In Technology accessible data. Note: Outside In Technology is a suite of software development kits (SDKs). The protocol and CVSS score depend on the software that uses the Outside In Technology code. The CVSS score assumes that the software passes data received over a network directly to Outside In Technology code, but if data is not received over a network the CVSS score may be lower. CVSS 3.0 Base Score 7.1 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H).
[]
null
null
7.1
null
RHSA-2013:1543
Red Hat Security Advisory: samba4 security and bug fix update
samba: DoS via integer overflow when reading an EA list
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
GHSA-5jmf-9wpp-rqgr
KandNconcepts Club CMS 1.1 and 1.2 has cross site scripting via the 'team.php,player.php,club.php' id parameter.
[]
null
null
null
null
CVE-2005-4331
SQL injection vulnerability in merchant.ihtml in iHTML Merchant Version 2 Pro allows remote attackers to execute arbitrary SQL commands via the (1) step, (2) id, and (3) pid parameters.
[ "cpe:2.3:a:ihtml_merchant:ihtml_merchant:2_pro:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2024-49292
WordPress Exclusive Addons for Elementor plugin <= 2.7.1 - Cross-Site Scripting vulnerability
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Exclusive Addons Exclusive Addons Elementor allows Stored XSS.This issue affects Exclusive Addons Elementor: from n/a through 2.7.1.
[]
null
6.5
null
null
CVE-2015-4304
The web framework in Cisco Prime Collaboration Assurance before 10.5.1.53684-1 allows remote authenticated users to bypass intended access restrictions, and create administrative accounts or read data from arbitrary tenant domains, via a crafted URL, aka Bug IDs CSCus62671 and CSCus62652.
[ "cpe:2.3:a:cisco:prime_collaboration_assurance:9.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:prime_collaboration_assurance:9.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:prime_collaboration_assurance:10.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:prime_collaboration_assurance:10.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:prime_collaboration_assurance:10.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:prime_collaboration_assurance:10.6.0:*:*:*:*:*:*:*" ]
null
null
null
9
GHSA-3c62-hfcf-656j
Cross-site scripting (XSS) vulnerability in the Classic Meeting Server in IBM Sametime 8.x through 8.5.2.1 allows remote attackers to inject arbitrary web script or HTML via a crafted URL.
[]
null
null
null
null
GHSA-h5f5-3v68-7xc5
An elevation of privilege vulnerability in the Qualcomm Wi-Fi driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-32451171. References: QC-CR#1087807.
[]
null
null
7
null
CVE-2023-35843
NocoDB through 0.106.0 (or 0.109.1) has a path traversal vulnerability that allows an unauthenticated attacker to access arbitrary files on the server by manipulating the path parameter of the /download route. This vulnerability could allow an attacker to access sensitive files and data on the server, including configuration files, source code, and other sensitive information.
[ "cpe:2.3:a:nocodb:nocodb:*:*:*:*:*:*:*:*" ]
null
7.5
null
null
CVE-2017-0789
A elevation of privilege vulnerability in the Broadcom wi-fi driver. Product: Android. Versions: Android kernel. Android ID: A-37685267. References: B-V2017053102.
[ "cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:*" ]
null
null
8.8
5.8
GHSA-g262-9hc8-9fhq
In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Automobile, Snapdragon Mobile, and Snapdragon Wear MSM8909W, SD 210/SD 212/SD 205, SD 400, SD 410/12, SD 425, SD 430, SD 450, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 800, SD 808, SD 810, SD 820, SD 820A, and SD 835, lack of length checking in wv_dash_core_load_keys_v8() could lead to a buffer overflow vulnerability.
[]
null
null
9.8
null
GHSA-g6hp-54f4-25v2
wmFrog weather monitor 0.1.6 and other versions before 0.2.0 allows local users to overwrite arbitrary files via a symlink attack on temporary files.
[]
null
null
null
null
GHSA-6vfh-4748-9hr4
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in interactivegeomaps Interactive Geo Maps allows Reflected XSS. This issue affects Interactive Geo Maps: from n/a through 1.6.24.
[]
null
7.1
null
null
GHSA-qv96-733j-36x6
The Nifty Newsletters WordPress plugin is vulnerable to Cross-Site Request Forgery via the sola_nl_wp_head function found in the ~/sola-newsletters.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 4.0.23.
[]
null
null
null
null
GHSA-5q4p-94m5-jf36
In Lizard (formerly LZ5) 2.0, use of an invalid memory address was discovered in LZ5_compress_continue in lz5_compress.c, related to LZ5_compress_fastSmall and MEM_read32. The vulnerability causes a segmentation fault and application crash, which leads to denial of service.
[]
null
null
7.5
null
CVE-2019-14883
A vulnerability was found in Moodle 3.6 before 3.6.7 and 3.7 before 3.7.3, where tokens used to fetch inline atachments in email notifications were not disabled when a user's account was no longer active. Note: to access files, a user would need to know the file path, and their token.
[ "cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*" ]
null
null
3.7
null
CVE-2021-44343
David Brackeen ok-file-formats 203defd is vulnerable to Buffer Overflow. When the function of the ok-file-formats project is used, a heap-buffer-overflow occurred in function ok_png_read_data() in "/ok_png.c".
[ "cpe:2.3:a:ok-file-formats_project:ok-file-formats:2021-06-05:*:*:*:*:*:*:*" ]
null
7.8
null
6.8
CVE-2021-2149
Vulnerability in the Oracle ZFS Storage Appliance Kit product of Oracle Systems (component: Core). The supported version that is affected is 8.8. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where Oracle ZFS Storage Appliance Kit executes to compromise Oracle ZFS Storage Appliance Kit. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle ZFS Storage Appliance Kit accessible data. CVSS 3.1 Base Score 2.5 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N).
[ "cpe:2.3:o:oracle:zfs_storage_appliance:8.8:*:*:*:*:*:*:*" ]
null
2.5
null
null
CVE-2017-1292
IBM Maximo Asset Management 7.5 and 7.6 generates error messages that could reveal sensitive information that could be used in further attacks against the system. IBM X-Force ID: 125153.
[ "cpe:2.3:a:ibm:maximo_asset_management:7.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:7.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management_essentials:7.5:*:*:*:*:*:*:*" ]
null
null
5.3
5
CVE-2025-25946
An issue in Bento4 v1.6.0-641 allows an attacker to cause a memory leak via Ap4Marlin.cpp and Ap4Processor.cpp, specifically in AP4_MarlinIpmpEncryptingProcessor::Initialize and AP4_Processor::Process, during the execution of mp4encrypt with a specially crafted MP4 input file.
[]
null
5.5
null
null
GHSA-8pwh-g3mh-g2qj
The (1) AgentInterface and (2) CustomerInterface components in Open Ticket Request System (OTRS) before 3.0.6 place cleartext credentials into the session data in the database, which makes it easier for context-dependent attackers to obtain sensitive information by reading the _UserLogin and _UserPW fields.
[]
null
null
null
null
GHSA-h235-jq43-x2pf
An issue was discovered in VERMEG AgileReporter 21.3. An admin can enter an XSS payload in the Analysis component.
[]
null
5.4
null
null
CVE-2006-4531
PHP remote file inclusion vulnerability in lib/config.php in Pheap CMS 1.1 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the lpref parameter.
[ "cpe:2.3:a:bare_concept_media:pheap_cms:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2017-1000156
Mahara 15.04 before 15.04.9 and 15.10 before 15.10.5 and 16.04 before 16.04.3 are vulnerable to a group's configuration page being editable by any group member even when they didn't have the admin role.
[ "cpe:2.3:a:mahara:mahara:15.04:rc1:*:*:*:*:*:*", "cpe:2.3:a:mahara:mahara:15.04:rc2:*:*:*:*:*:*", "cpe:2.3:a:mahara:mahara:15.04.0:*:*:*:*:*:*:*", "cpe:2.3:a:mahara:mahara:15.04.1:*:*:*:*:*:*:*", "cpe:2.3:a:mahara:mahara:15.04.2:*:*:*:*:*:*:*", "cpe:2.3:a:mahara:mahara:15.04.3:*:*:*:*:*:*:*", "cpe:2.3:a:mahara:mahara:15.04.4:*:*:*:*:*:*:*", "cpe:2.3:a:mahara:mahara:15.04.5:*:*:*:*:*:*:*", "cpe:2.3:a:mahara:mahara:15.04.6:*:*:*:*:*:*:*", "cpe:2.3:a:mahara:mahara:15.04.7:*:*:*:*:*:*:*", "cpe:2.3:a:mahara:mahara:15.04.8:*:*:*:*:*:*:*", "cpe:2.3:a:mahara:mahara:16.04:rc1:*:*:*:*:*:*", "cpe:2.3:a:mahara:mahara:16.04:rc2:*:*:*:*:*:*", "cpe:2.3:a:mahara:mahara:16.04.0:*:*:*:*:*:*:*", "cpe:2.3:a:mahara:mahara:16.04.1:*:*:*:*:*:*:*", "cpe:2.3:a:mahara:mahara:16.04.2:*:*:*:*:*:*:*", "cpe:2.3:a:mahara:mahara:15.10.0:*:*:*:*:*:*:*", "cpe:2.3:a:mahara:mahara:15.10.1:*:*:*:*:*:*:*", "cpe:2.3:a:mahara:mahara:15.10.2:*:*:*:*:*:*:*", "cpe:2.3:a:mahara:mahara:15.10.3:*:*:*:*:*:*:*", "cpe:2.3:a:mahara:mahara:15.10.4:*:*:*:*:*:*:*" ]
null
null
6.5
5.5
GHSA-487j-f8hg-5p28
An undocumented SNMP read/write community string ('NoGaH$@!') in Avaya P330, P130, and M770-ATM Cajun products allows remote attackers to gain administrative privileges.
[]
null
null
null
null
GHSA-hfjh-h3g2-p6m4
In TrendNet TW100-S4W1CA 2.3.32, due to a lack of proper session controls, a threat actor could make unauthorized changes to an affected router via a specially crafted web page. If an authenticated user were to interact with a malicious web page it could allow for a complete takeover of the router.
[]
null
null
null
null
CVE-2006-4972
Cross-site scripting (XSS) vulnerability in archive/index.php/forum-4.html in MyBB (aka MyBulletinBoard) allows remote attackers to inject arbitrary web script or HTML via the navbits[][name] parameter.
[ "cpe:2.3:a:mybulletinboard:mybulletinboard:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mybulletinboard:mybulletinboard:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mybulletinboard:mybulletinboard:1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mybulletinboard:mybulletinboard:1.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mybulletinboard:mybulletinboard:1.0_final:*:*:*:*:*:*:*", "cpe:2.3:a:mybulletinboard:mybulletinboard:1.0_preview_release_2:*:*:*:*:*:*:*", "cpe:2.3:a:mybulletinboard:mybulletinboard:1.0_rc2:*:*:*:*:*:*:*", "cpe:2.3:a:mybulletinboard:mybulletinboard:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:mybulletinboard:mybulletinboard:1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:mybulletinboard:mybulletinboard:1.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:mybulletinboard:mybulletinboard:1.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:mybulletinboard:mybulletinboard:1.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:mybulletinboard:mybulletinboard:1.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:mybulletinboard:mybulletinboard:1.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:mybulletinboard:mybulletinboard:1.10:*:*:*:*:*:*:*", "cpe:2.3:a:mybulletinboard:mybulletinboard:1.14:*:*:*:*:*:*:*", "cpe:2.3:a:mybulletinboard:mybulletinboard:1.20:*:*:*:*:*:*:*" ]
null
null
null
5.1
CVE-2018-16268
The SoundServer/FocusServer system services in Tizen allow an unprivileged process to perform media-related system actions, due to improper D-Bus security policy configurations. Such actions include playing an arbitrary sound file or DTMF tones. This affects Tizen before 5.0 M1, and Tizen-based firmwares including Samsung Galaxy Gear series before build RE2.
[ "cpe:2.3:o:linux:tizen:1.0:*:*:*:*:*:*:*", "cpe:2.3:o:linux:tizen:1.0:m1:*:*:*:*:*:*", "cpe:2.3:o:linux:tizen:2.0:*:*:*:*:*:*:*", "cpe:2.3:o:linux:tizen:2.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:tizen:2.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:tizen:2.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:tizen:2.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:tizen:2.3.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:tizen:2.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:tizen:3.0:*:*:*:*:*:*:*", "cpe:2.3:o:linux:tizen:3.0:m2:*:*:*:*:*:*", "cpe:2.3:o:linux:tizen:3.0:m3:*:*:*:*:*:*", "cpe:2.3:o:linux:tizen:4.0:m1:*:*:*:*:*:*", "cpe:2.3:o:linux:tizen:4.0:m2:*:*:*:*:*:*", "cpe:2.3:o:linux:tizen:4.0:m3:*:*:*:*:*:*", "cpe:2.3:o:linux:tizen:5.0:*:*:*:*:*:*:*", "cpe:2.3:h:samsung:galaxy_gear:-:*:*:*:*:*:*:*" ]
null
4.3
null
3.3
GHSA-m77w-vf95-xmj5
Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK & Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
[]
null
null
null
null
GHSA-84x5-p2mg-fvmp
pi.c in OpenJPEG, as used in PDFium in Google Chrome before 48.0.2564.109, does not validate a certain precision value, which allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read) via a crafted JPEG 2000 image in a PDF document, related to the opj_pi_next_rpcl, opj_pi_next_pcrl, and opj_pi_next_cprl functions.
[]
null
null
6.3
null
GHSA-3p3p-cgj7-vgw3
RSSHub vulnerable to Server-Side Request Forgery
SummaryServeral Server-Side Request Forgery (SSRF) vulnerabilities in RSSHub allow remote attackers to use the server as a proxy to send HTTP GET requests to arbitrary targets and retrieve information in the internal network or conduct Denial-of-Service (DoS) attacks.Details`/mastodon/acct/:acct/statuses/:only_media?`https://github.com/DIYgod/RSSHub/blob/5928c5db2472e101c2f5c3bafed77a2f72edd40a/lib/routes/mastodon/acct.js#L4-L7https://github.com/DIYgod/RSSHub/blob/5928c5db2472e101c2f5c3bafed77a2f72edd40a/lib/routes/mastodon/utils.js#L85-L105`/zjol/paper/:id?`https://github.com/DIYgod/RSSHub/blob/172f6cfd2b69ea6affdbdedf61e6dde1671f3796/lib/routes/zjol/paper.js#L7-L13`/m4/:id?/:category*`https://github.com/DIYgod/RSSHub/blob/172f6cfd2b69ea6affdbdedf61e6dde1671f3796/lib/routes/m4/index.js#L10-L14PoChttps://rsshub.app/mastodon/acct/[email protected]%23/statuseshttps://rsshub.app/zjol/paper/a6wt15r2.requestrepo.com%23https://rsshub.app/m4/a6wt15r2.requestrepo.com%23/testImpactThe attacker can send malicious requests to a RSSHub server, to make the server send HTTP GET requests to arbitrary destinations and see partial responses. This may lead to:Leak the server IP address, which could be hidden behind a CDN.Retrieve information in the internal network. e.g. which addresses/ports are accessible, the titles and meta descriptions of HTML pages.DoS amplification. The attacker could request the server to download some large files, or chain several SSRF requests in a single attacker request: `https://rsshub.a.com/zjol/paper/rsshub.b.net%2Fzjol%2Fpaper%2Frsshub.a.com%252Fzjol%252Fpaper%252Frsshub.b.net%25252Fzjol%25252Fpaper%25252Frsshub.a.com%2525252Fzjol%2525252Fpaper%2525252Fexample.com%2525252523%25252523%252523%2523%23`.
[]
null
6.5
null
null
GHSA-xv29-cvx6-qc29
procfs in FreeBSD and possibly other operating systems does not properly restrict access to per-process mem and ctl files, which allows local users to gain root privileges by forking a child process and executing a privileged process from the child, while the parent retains access to the child's address space.
[]
null
null
null
null
CVE-2025-4333
feng_ha_ha/megagao ssm-erp/production_ssm FileServiceImpl.java uploadFile unrestricted upload
A vulnerability was found in feng_ha_ha/megagao ssm-erp and production_ssm up to 0.0.1. It has been classified as critical. This affects the function uploadFile of the file src/main/java/com/megagao/production/ssm/service/impl/FileServiceImpl.java. The manipulation of the argument uploadFile leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. This product is distributed under two entirely different names.
[]
5.3
6.3
6.3
6.5
GHSA-g5fc-q72r-xgfm
The ICMPv6 parser in tcpdump before 4.9.2 has a buffer over-read in print-icmp6.c:icmp6_print().
[]
null
null
9.8
null
CVE-2020-25036
UCOPIA Wi-Fi appliances 6.0.5 allow authenticated remote attackers to escape the restricted administration shell CLI, and access a shell with admin user rights, via an unprotected less command.
[ "cpe:2.3:a:ucopia:ucopia_wireless_appliance:*:*:*:*:*:*:*:*" ]
null
8.8
null
9
CVE-2004-1147
phpMyAdmin 2.6.0-pl2, and other versions before 2.6.1, with external transformations enabled, allows remote attackers to execute arbitrary commands via shell metacharacters.
[ "cpe:2.3:a:phpmyadmin:phpmyadmin:2.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:2.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:2.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:2.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:2.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:2.5.5:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:2.5.5_pl1:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:2.5.5_rc1:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:2.5.5_rc2:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:2.5.6_rc1:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:2.5.7:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:2.5.7_pl1:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:2.6.0_pl1:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:2.6.0_pl2:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:2.6.0_pl3:*:*:*:*:*:*:*" ]
null
null
null
10
GHSA-27g2-9rj4-4jm7
Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.3.5 and 8.3.7 allows context-dependent attackers to affect availability via unknown vectors related to Outside In Filters, a different vulnerability than CVE-2012-1766, CVE-2012-1767, CVE-2012-1769, CVE-2012-1770, CVE-2012-1771, CVE-2012-1772, CVE-2012-1773, CVE-2012-3106, CVE-2012-3108, and CVE-2012-3110.
[]
null
null
null
null
GHSA-v7q3-h4r2-3g3j
Cloudlog 2.6.15 allows Oqrs.php get_station_info station_id SQL injection.
[]
null
9.8
null
null
CVE-2020-10376
Technicolor TC7337NET 08.89.17.23.03 devices allow remote attackers to discover passwords by sniffing the network for an "Authorization: Basic" HTTP header.
[ "cpe:2.3:o:technicolor:tc7337net_firmware:08.89.17.23.03:*:*:*:*:*:*:*", "cpe:2.3:h:technicolor:tc7337net:-:*:*:*:*:*:*:*" ]
null
9.8
null
5
GHSA-q239-6x89-792c
Vulnerable versions of the Jupiter (<= 6.10.1) and JupiterX (<= 2.0.6) Themes allow logged-in users, including subscriber-level users, to perform Path Traversal and Local File inclusion. In the JupiterX theme, the jupiterx_cp_load_pane_action AJAX action present in the lib/admin/control-panel/control-panel.php file calls the load_control_panel_pane function. It is possible to use this action to include any local PHP file via the slug parameter. The Jupiter theme has a nearly identical vulnerability which can be exploited via the mka_cp_load_pane_action AJAX action present in the framework/admin/control-panel/logic/functions.php file, which calls the mka_cp_load_pane_action function.
[]
null
8.8
null
null
GHSA-725p-65w3-rpp3
Windows Portmapping Information Disclosure Vulnerability
[]
null
7.1
null
null
CVE-2020-0069
In the ioctl handlers of the Mediatek Command Queue driver, there is a possible out of bounds write due to insufficient input sanitization and missing SELinux restrictions. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-147882143References: M-ALPS04356754
[ "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:berkeley-l09_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:berkeley-l09:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:columbia-al10b_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:columbia-al10b:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:columbia-l29d_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:columbia-l29d:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:columbia-tl00b_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:columbia-tl00b:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:columbia-tl00d_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:columbia-tl00d:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:cornell-al00a_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:cornell-al00a:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:cornell-tl10b_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:cornell-tl10b:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:dura-al00a_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:dura-al00a:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:honor_20_pro_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:honor_20_pro:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:y6_2019_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:y6_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:nova_3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:nova_3:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:nova_4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:nova_4:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:honor_8a_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:honor_8a:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:honor_view_20_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:honor_view_20:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:jakarta-al00a_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:jakarta-al00a:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:katyusha-al00a_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:katyusha-al00a:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:katyusha-al10a_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:katyusha-al10a:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:madrid-al00a_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:madrid-al00a:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:paris-l29b_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:paris-l29b:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:princeton-al10b_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:princeton-al10b:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:sydney-al00_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:sydney-al00:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:sydney-tl00_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:sydney-tl00:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:sydneym-al00_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:sydneym-al00:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:tony-al00b_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:tony-al00b:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:tony-tl00b_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:tony-tl00b:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:yale-al00a_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:yale-al00a:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:yale-l21a_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:yale-l21a:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:yalep-al10b_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:yalep-al10b:-:*:*:*:*:*:*:*" ]
null
7.8
null
7.2
CVE-2023-40166
Notepad++ heap buffer read overflow in FileManager::detectLanguageFromTextBegining
Notepad++ is a free and open-source source code editor. Versions 8.5.6 and prior are vulnerable to heap buffer read overflow in `FileManager::detectLanguageFromTextBegining `. The exploitability of this issue is not clear. Potentially, it may be used to leak internal memory allocation information. As of time of publication, no known patches are available in existing versions of Notepad++.
[ "cpe:2.3:a:notepad-plus-plus:notepad\\+\\+:*:*:*:*:*:*:*:*" ]
null
5.5
null
null
cisco-sa-lldp-memlk-McOecPT
Cisco Webex Room Phone and Cisco Webex Share Link Layer Discovery Protocol Memory Leak Vulnerability
A vulnerability in the Link Layer Discovery Protocol (LLDP) feature of Cisco Webex Room Phone and Cisco Webex Share devices could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient resource allocation. An attacker could exploit this vulnerability by sending crafted LLDP traffic to an affected device. A successful exploit could allow the attacker to exhaust the memory resources of the affected device, resulting in a crash of the LLDP process. If the affected device is configured to support LLDP only, this could cause an interruption to inbound and outbound calling. By default, these devices are configured to support both Cisco Discovery Protocol and LLDP. To recover operational state, the affected device needs a manual restart. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
[]
null
6.5
null
null
cisco-sa-ucm-access-dMKvV2DY
Cisco Unified Communications Products Access Control Vulnerability
A vulnerability in the Disaster Recovery framework of Cisco Unified Communications Manager (Unified CM), Cisco Unified Communications Manager IM & Presence Service (Unified CM IM&P), and Cisco Unity Connection could allow an authenticated, remote attacker to perform certain administrative actions they should not be able to. This vulnerability is due to insufficient access control checks on the affected device. An attacker with read-only privileges could exploit this vulnerability by executing a specific vulnerable command on an affected device. A successful exploit could allow the attacker to perform a set of administrative actions they should not be able to. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
[]
null
6.5
null
null
GHSA-99jv-8292-2hpm
eventing-gitlab vulnerable to denial of service, caused by improper enforcement of the timeout on individual read operations
ImpactThe eventing-gitlab cluster-local server doesn't set `ReadHeaderTimeout`‬‭ which could lead do a DDoS‬ ‭attack, where a large group of users send requests to the server causing the server to hang‬ ‭for long enough to deny it from being available to other users, also know as a Slowloris‬ ‭attack.PatchesFix in `v1.12.1` and `v1.11.3`.CreditsThe vulnerability was reported by Ada Logics during an ongoing security audit of Knative involving Ada Logics, the Knative maintainers, OSTIF and CNCF.
[]
null
null
null
null
CVE-2025-28232
Incorrect access control in the HOME.php endpoint of JMBroadcast JMB0150 Firmware v1.0 allows attackers to access the Admin panel without authentication.
[]
null
9.1
null
null
CVE-2023-37997
WordPress Post List With Featured Image Plugin <= 1.2 is vulnerable to Cross Site Scripting (XSS)
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Dharmesh Patel Post List With Featured Image plugin <= 1.2 versions.
[ "cpe:2.3:a:dharmeshpatel:post_list_with_featured_image:*:*:*:*:*:wordpress:*:*" ]
null
7.1
null
null
GHSA-7wrc-738x-m52x
Cross-site scripting (XSS) vulnerability in templates/installer/step-004.inc.php in spotweb 1.5.1 and below allow remote attackers to inject arbitrary web script or HTML via the username parameter.
[]
null
null
null
null
GHSA-cggj-gprv-7895
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Content Mirror allows Reflected XSS. This issue affects Content Mirror: from n/a through 1.2.
[]
null
7.1
null
null
GHSA-f5h8-mp5p-q6q4
** DISPUTED ** Zone Alarm Pro 1.0 through 5.1 gives full access to %windir%\Internet Logs\* to the EVERYONE group, which allows local users to cause a denial of service by modifying the folder contents or permissions. NOTE: this issue has been disputed by the vendor, who claims that it does not affect product functionality since the same information is also saved in a protected file.
[]
null
null
null
null
CVE-2015-4166
Cloudera Key Trustee Server before 5.4.3 does not store keys synchronously, which might allow attackers to have unspecified impact via vectors related to loss of an encryption key.
[ "cpe:2.3:a:cloudera:key_trustee_server:*:*:*:*:*:*:*:*" ]
null
null
9.8
7.5
GHSA-8wmr-w5j9-89v2
PHP remote file inclusion vulnerability in viewevent.php in myWebland myEvent 1.x allows remote attackers to execute arbitrary PHP code via a URL in the myevent_path parameter, a different vector than CVE-2006-4040. NOTE: the provenance of this information is unknown; the details are obtained from third party information.
[]
null
null
null
null
CVE-2023-0496
HT Event < 1.4.6 - Arbitrary Plugin Activation via CSRF
The HT Event WordPress plugin before 1.4.6 does not have CSRF check when activating plugins, which could allow attackers to make logged in admins activate arbitrary plugins present on the blog via a CSRF attack
[ "cpe:2.3:a:hasthemes:ht_event:*:*:*:*:*:wordpress:*:*" ]
null
4.3
null
null
CVE-2014-2637
Unspecified vulnerability in HP Sprinter 12.01 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-2342.
[ "cpe:2.3:a:hp:sprinter:12.01:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2014-3376
Cisco IOS XR 5.1 and earlier allows remote attackers to cause a denial of service (process reload) via a malformed RSVP packet, aka Bug ID CSCuq12031.
[ "cpe:2.3:o:cisco:ios_xr:2.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:3.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:3.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:3.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:3.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:3.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:3.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:3.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:3.2.4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:3.2.50:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:3.3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:3.3.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:3.3.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:3.3.3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:3.3.4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:3.3.5:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:3.4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:3.4.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:3.4.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:3.4.3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:3.5:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:3.5.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:3.5.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:3.5.3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:3.5.4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:3.6:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:3.6.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:3.6.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:3.6.3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:3.7:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:3.7.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:3.7.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:3.7.3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:3.8.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:3.8.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:3.8.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:3.8.3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:3.8.4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:3.9.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:3.9.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:3.9.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:4.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:4.0.3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:4.0.4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:4.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:4.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:4.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:4.2.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:4.3.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:4.3.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:4.3.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:4.3.4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:5.1.0:*:*:*:*:*:*:*" ]
null
null
null
5
GHSA-x78q-89f4-5w3c
In Wireshark 2.2.0 to 2.2.5 and 2.0.0 to 2.0.11, the BGP dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-bgp.c by using a different integer data type.
[]
null
null
7.5
null
CVE-2020-4992
IBM DataPower Gateway 2018.4.1.0 through 2018.4.1.16 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 192737.
[ "cpe:2.3:a:ibm:datapower_gateway:*:*:*:*:*:*:*:*" ]
null
null
4.3
null
CVE-2020-11681
Castel NextGen DVR v1.0.0 stores and displays credentials for the associated SMTP server in cleartext. Low privileged users can exploit this to create an administrator user and obtain the SMTP credentials.
[ "cpe:2.3:o:castel:nextgen_dvr_firmware:1.0.0:*:*:*:*:*:*:*", "cpe:2.3:h:castel:nextgen_dvr:-:*:*:*:*:*:*:*" ]
null
8.1
null
4
CVE-2024-13933
FoodBakery | Delivery Restaurant Directory WordPress Theme <= 4.7 - Cross-Site Request Forgery in Multiple Functions
The FoodBakery | Delivery Restaurant Directory WordPress Theme theme for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 4.7. This is due to missing or incorrect nonce validation on the foodbakery_var_backup_file_delete, foodbakery_widget_file_delete, theme_option_save, export_widget_settings, ajax_import_widget_data, foodbakery_var_settings_backup_generate, foodbakery_var_backup_file_restore, and theme_option_rest_all functions. This makes it possible for unauthenticated attackers to delete arbitrary files, update theme options, export widget options, import widget options, generate backups, restore backups, and reset theme options via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
[]
null
8.8
null
null
GHSA-vr8v-ggvj-qc6m
Due to insufficient encoding of user input, SAP NetWeaver allows an unauthenticated attacker to inject code that may expose sensitive data like user ID and password. These endpoints are normally exposed over the network and successful exploitation can partially impact confidentiality of the application.
[]
null
6.1
null
null
GHSA-mcqx-w3j9-p34h
SQL injection vulnerability in the Call Detail Record Postgres logging engine (cdr_pgsql) in Asterisk 1.4.x before 1.4.15, 1.2.x before 1.2.25, B.x before B.2.3.4, and C.x before C.1.0-beta6 allows remote authenticated users to execute arbitrary SQL commands via (1) ANI and (2) DNIS arguments.
[]
null
null
null
null
cisco-sa-20190828-nexus-aci-dos
Cisco Nexus 9000 Series Fabric Switches ACI Mode Border Leaf Endpoint Learning Vulnerability
A vulnerability within the Endpoint Learning feature of Cisco Nexus 9000 Series Switches running in Application Centric Infrastructure (ACI) mode could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an endpoint device in certain circumstances. The vulnerability is due to improper endpoint learning when packets are received on a specific port from outside the ACI fabric and destined to an endpoint located on a border leaf when Disable Remote Endpoint Learning has been enabled. This can result in a Remote (XR) entry being created for the impacted endpoint that will become stale if the endpoint migrates to a different port or leaf switch. This results in traffic not reaching the impacted endpoint until the Remote entry can be relearned by another mechanism. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190828-nexus-aci-dos ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190828-nexus-aci-dos"]
[]
null
null
6.8
null
CVE-2021-39295
In OpenBMC 2.9, crafted IPMI messages allow an attacker to cause a denial of service to the BMC via the netipmid (IPMI lan+) interface.
[ "cpe:2.3:a:openbmc-project:openbmc:2.9.0:-:*:*:*:*:*:*" ]
null
7.5
null
null
GHSA-vm5p-w959-c36r
Crestron AM-100 with firmware 1.6.0.2 and AM-101 with firmware 2.7.0.2 is vulnerable to denial of service via a crafted request to TCP port 389. The request will force the slideshow to transition into a "stopped" state. A remote, unauthenticated attacker can use this vulnerability to stop an active slideshow.
[]
null
null
null
null
CVE-2002-0538
FTP proxy in Symantec Raptor Firewall 6.5.3 and Enterprise 7.0 rewrites an FTP server's "FTP PORT" responses in a way that allows remote attackers to redirect FTP data connections to arbitrary ports, a variant of the "FTP bounce" vulnerability.
[ "cpe:2.3:a:symantec:enterprise_firewall:6.5.2:*:windows_2000_nt:*:*:*:*:*", "cpe:2.3:a:symantec:enterprise_firewall:7.0:*:solaris:*:*:*:*:*", "cpe:2.3:a:symantec:enterprise_firewall:7.0:*:windows_2000_nt:*:*:*:*:*", "cpe:2.3:a:symantec:raptor_firewall:6.5:*:windows_nt:*:*:*:*:*", "cpe:2.3:a:symantec:raptor_firewall:6.5.3:*:solaris:*:*:*:*:*", "cpe:2.3:a:symantec:velociraptor:1.x:*:*:*:*:*:*:*", "cpe:2.3:h:symantec:gateway_security:1.0:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-76v4-x2qg-xhgv
A vulnerability has been identified in Siemens Software Center (All versions < V3.0). A DLL Hijacking vulnerability could allow a local attacker to execute code with elevated privileges by placing a malicious DLL in one of the directories on the DLL search path.
[]
null
7.8
null
null
GHSA-mq84-3c8v-r75g
Mozilla Firefox 1.5.0.6 allows remote attackers to execute arbitrary JavaScript in the context of the browser's session with an arbitrary intranet web server, by hosting script on an Internet web server that can be made inaccessible by the attacker and that has a domain name under the attacker's control, which can force the browser to drop DNS pinning and perform a new DNS query for the domain name after the script is already running.
[]
null
null
null
null
GHSA-4c4v-9xr2-899m
In Parse_ins of eas_mdls.c, there is a possible out of bounds write due to a missing bounds check. This could lead to remote information disclosure in the media extractor process with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11 Android-8.0Android ID: A-150160279
[]
null
null
null
null
CVE-2019-16318
In Pimcore before 5.7.1, an attacker with limited privileges can bypass file-extension restrictions via a 256-character filename, as demonstrated by the failure of automatic renaming of .php to .php.txt for long filenames, a different vulnerability than CVE-2019-10867 and CVE-2019-16317.
[ "cpe:2.3:a:pimcore:pimcore:*:*:*:*:*:*:*:*" ]
null
8.8
null
6.5
CVE-2024-50480
WordPress Marketing Automation by AZEXO plugin <= 1.27.80 - Arbitrary File Upload vulnerability
Unrestricted Upload of File with Dangerous Type vulnerability in azexo Marketing Automation by AZEXO allows Upload a Web Shell to a Web Server.This issue affects Marketing Automation by AZEXO: from n/a through 1.27.80.
[ "cpe:2.3:a:azexo:marketing_automation_by_azexo:*:*:*:*:*:*:*:*" ]
null
9.9
null
null
GHSA-6ppr-fg8v-vwjq
v2rayL 2.1.3 allows local users to achieve root access because /etc/v2rayL/config.json is owned by a low-privileged user but contains commands that are executed as root, after v2rayL.service is restarted via Sudo.
[]
null
null
null
null
CVE-2023-25882
ZDI-CAN-19385: Adobe Dimension OBJ File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability
Adobe Dimension versions 3.4.7 (and earlier) is affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[ "cpe:2.3:a:adobe:dimension:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
7.8
null
null
CVE-2022-23469
Authorization header displayed in the debug logs
Traefik is an open source HTTP reverse proxy and load balancer. Versions prior to 2.9.6 are subject to a potential vulnerability in Traefik displaying the Authorization header in its debug logs. In certain cases, if the log level is set to DEBUG, credentials provided using the Authorization header are displayed in the debug logs. Attackers must have access to a users logging system in order for credentials to be stolen. This issue has been addressed in version 2.9.6. Users are advised to upgrade. Users unable to upgrade may set the log level to `INFO`, `WARN`, or `ERROR`.
[ "cpe:2.3:a:traefik:traefik:*:*:*:*:*:*:*:*" ]
null
3.5
null
null
CVE-2024-5859
Appointment Booking and Online Scheduling <= 4.4.2 - Reflected Cross-Site Scripting
The Online Booking & Scheduling Calendar for WordPress by vcita plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘d’ parameter in all versions up to, and including, 4.4.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
[ "cpe:2.3:a:vcita:online_booking_\\&_scheduling_calendar_for_wordpress_by_vcita:*:*:*:*:*:wordpress:*:*" ]
null
6.1
null
null
GHSA-r3fw-4472-w2w2
DELL ESI (Enterprise Storage Integrator) for SAP LAMA, version 10.0, contains an information disclosure vulnerability in EHAC component. An remote unauthenticated attacker could potentially exploit this vulnerability by eavesdropping the network traffic to gain admin level credentials.
[]
null
9.8
null
null
GHSA-959q-hg7j-486g
BeyondTrust Privilege Management prior to version 21.6 creates a Temporary File in a Directory with Insecure Permissions.
[]
null
null
null
null
CVE-2021-36287
Dell VNX2 for file version 8.1.21.266 and earlier, contain an unauthenticated remote code execution vulnerability which may lead unauthenticated users to execute commands on the system.
[ "cpe:2.3:a:dell:emc_unity_operating_environment:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vnx_vg10:-:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vnx_vg50:-:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vnx5200:-:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vnx5400:-:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vnx5600:-:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vnx5800:-:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vnx7600:-:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vnx8000:-:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vnxe1600:-:*:*:*:*:*:*:*" ]
null
7.3
null
null
CVE-2023-25214
Tenda AC5 US_AC5V1.0RTL_V15.03.06.28 was discovered to contain a stack overflow via the setSchedWifi function. This vulnerability allows attackers to cause a Denial of Service (DoS) or execute arbitrary code via a crafted payload.
[ "cpe:2.3:o:tenda:ac5_firmware:15.03.06.28:*:*:*:*:*:*:*", "cpe:2.3:h:tenda:ac5:1.0:*:*:*:*:*:*:*" ]
null
9.8
null
null
CVE-2024-34602
Use of implicit intent for sensitive communication in Samsung Messages prior to SMR Jul-2024 Release 1 allows local attackers to get sensitive information. User interaction is required for triggering this vulnerability.
[ "cpe:2.3:o:samsung:android:12.0:-:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-apr-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-apr-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-apr-2024-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-aug-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-aug-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-dec-2021-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-dec-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-dec-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-feb-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-feb-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-feb-2024-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-jan-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-jan-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-jan-2024-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-jul-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-jul-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-jun-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-jun-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-jun-2024-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-mar-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-mar-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-mar-2024-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-may-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-may-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-may-2024-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-nov-2021-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-nov-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-nov-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-oct-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-oct-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-sep-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-sep-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:-:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-apr-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-apr-2024-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-aug-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-dec-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-dec-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-feb-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-feb-2024-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-jan-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-jan-2024-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-jul-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-jun-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-jun-2024-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-mar-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-mar-2024-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-may-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-may-2024-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-nov-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-nov-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-oct-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-oct-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-sep-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:-:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-apr-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-apr-2024-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-aug-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-dec-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-dec-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-feb-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-jan-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-jan-2024-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-jul-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-jun-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-jun-2024-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-mar-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-mar-2024-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-may-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-may-2024-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-nov-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-nov-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-oct-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-oct-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-sep-2023-r1:*:*:*:*:*:*" ]
null
3.3
null
null
GHSA-q4g6-66mw-2pxj
Directory traversal vulnerability in print.php in moziloWiki 1.0.1 and earlier allows remote attackers to read arbitrary files via a .. (dot dot) in the page parameter.
[]
null
null
null
null
CVE-2018-15676
An issue was discovered in BTITeam XBTIT. By using String.replace and eval, it is possible to bypass the includes/crk_protection.php anti-XSS mechanism that looks for a number of dangerous fingerprints.
[ "cpe:2.3:a:btiteam:xbtit:*:*:*:*:*:*:*:*" ]
null
null
5.3
5
CVE-2023-33376
Connected IO v2.1.0 and prior has an argument injection vulnerability in its iptables command message in its communication protocol, enabling attackers to execute arbitrary OS commands on devices.
[ "cpe:2.3:a:connectedio:connected_io:*:*:*:*:*:*:*:*" ]
null
9.8
null
null
GHSA-97r5-3mcv-523r
MyBB (aka MyBulletinBoard) before 1.6.18 and 1.8.x before 1.8.6 and MyBB Merge System before 1.8.6 allow remote attackers to obtain the installation path via vectors involving error log files.
[]
null
null
7.5
null
CVE-2021-46638
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley MicroStation CONNECT 10.16.0.80. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of DGN files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-15510.
[ "cpe:2.3:a:bentley:microstation:*:*:*:*:*:*:*:*", "cpe:2.3:a:bentley:microstation_connect:*:*:*:*:*:*:*:*", "cpe:2.3:a:bentley:view:*:*:*:*:*:*:*:*" ]
null
null
7.8
null
GHSA-xqf7-wh6f-f6jh
The GeoDataSource Country Region DropDown plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'gds-country-dropdown' shortcode in all versions up to, and including, 1.0.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
6.4
null
null
GHSA-x2fr-wg43-9j34
Creative Cloud Desktop Application versions 4.6.1 and earlier have an insecure inherited permissions vulnerability. Successful exploitation could lead to privilege escalation.
[]
null
null
null
null
GHSA-f47m-pm58-rvx2
A stored cross-site scripting (XSS) vulnerability in LightCMS v1.3.11 allows attackers to execute arbitrary web scripts or HTML via uploading a crafted PDF file.
[]
null
4.8
null
null
CVE-2020-7177
A wmiconfigcontent expression language injection remote code execution vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07).
[ "cpe:2.3:a:hp:intelligent_management_center:*:*:*:*:*:*:*:*", "cpe:2.3:a:hp:intelligent_management_center:7.3:-:*:*:*:*:*:*", "cpe:2.3:a:hp:intelligent_management_center:7.3:e0501:*:*:*:*:*:*", "cpe:2.3:a:hp:intelligent_management_center:7.3:e0503:*:*:*:*:*:*", "cpe:2.3:a:hp:intelligent_management_center:7.3:e0503p02:*:*:*:*:*:*", "cpe:2.3:a:hp:intelligent_management_center:7.3:e0504:*:*:*:*:*:*", "cpe:2.3:a:hp:intelligent_management_center:7.3:e0504p02:*:*:*:*:*:*", "cpe:2.3:a:hp:intelligent_management_center:7.3:e0504p04:*:*:*:*:*:*", "cpe:2.3:a:hp:intelligent_management_center:7.3:e0504p2:*:*:*:*:*:*", "cpe:2.3:a:hp:intelligent_management_center:7.3:e0504p4:*:*:*:*:*:*", "cpe:2.3:a:hp:intelligent_management_center:7.3:e0506:*:*:*:*:*:*", "cpe:2.3:a:hp:intelligent_management_center:7.3:e0506p02:*:*:*:*:*:*", "cpe:2.3:a:hp:intelligent_management_center:7.3:e0506p03:*:*:*:*:*:*", "cpe:2.3:a:hp:intelligent_management_center:7.3:e0506p07:*:*:*:*:*:*", "cpe:2.3:a:hp:intelligent_management_center:7.3:e0506p09:*:*:*:*:*:*", "cpe:2.3:a:hp:intelligent_management_center:7.3:e0605:*:*:*:*:*:*", "cpe:2.3:a:hp:intelligent_management_center:7.3:e0605h02:*:*:*:*:*:*", "cpe:2.3:a:hp:intelligent_management_center:7.3:e0605h05:*:*:*:*:*:*", "cpe:2.3:a:hp:intelligent_management_center:7.3:e0605h07:*:*:*:*:*:*", "cpe:2.3:a:hp:intelligent_management_center:7.3:e0605h08:*:*:*:*:*:*", "cpe:2.3:a:hp:intelligent_management_center:7.3:e0605h09:*:*:*:*:*:*", "cpe:2.3:a:hp:intelligent_management_center:7.3:e0605p04:*:*:*:*:*:*", "cpe:2.3:a:hp:intelligent_management_center:7.3:e0605p06:*:*:*:*:*:*", "cpe:2.3:a:hp:intelligent_management_center:7.3:e0701:*:*:*:*:*:*", "cpe:2.3:a:hp:intelligent_management_center:7.3:e0702:*:*:*:*:*:*", "cpe:2.3:a:hp:intelligent_management_center:7.3:e0703:*:*:*:*:*:*", "cpe:2.3:a:hp:intelligent_management_center:7.3:e0703h01:*:*:*:*:*:*", "cpe:2.3:a:hp:intelligent_management_center:7.3:e0705:*:*:*:*:*:*", "cpe:2.3:a:hp:intelligent_management_center:7.3:e0705p02:*:*:*:*:*:*" ]
null
8.8
null
9
GHSA-wwwg-6r7f-9c9h
Malicious Package in file-logging
This package contained malicious code. The package uploaded system information such as OS and hostname to a remote server.RecommendationRemove the package from your environment. There are no indications of further compromise.
[]
null
9.8
null
null
CVE-2024-26318
Serenity before 6.8.0 allows XSS via an email link because LoginPage.tsx permits return URLs that do not begin with a / character.
[]
null
6.1
null
null