id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
197k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
patch_commit_url
stringlengths
38
232
GHSA-w7c2-4jxv-7chp
A path traversal vulnerability was reported in the Motorola Ready For application that could allow a local attacker to access local files.
[]
null
2.8
null
null
null
GHSA-jchw-25xp-jwwc
Follow Redirects improperly handles URLs in the url.parse() function
Versions of the package follow-redirects before 1.15.4 are vulnerable to Improper Input Validation due to the improper handling of URLs by the url.parse() function. When new URL() throws an error, it can be manipulated to misinterpret the hostname. An attacker could exploit this weakness to redirect traffic to a malicious site, potentially leading to information disclosure, phishing attacks, or other security breaches.
[]
null
6.1
null
null
null
CVE-2010-3831
Photos in Apple iOS before 4.2 enables support for HTTP Basic Authentication over an unencrypted connection, which allows man-in-the-middle attackers to read MobileMe account passwords by spoofing a MobileMe Gallery server during a "Send to MobileMe" action.
[ "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.1.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.1.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.1.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.1.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.0.2:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
GHSA-hx3p-mvcq-8g8m
Microsoft MSN Messenger 4.7 on Windows XP allows remote attackers to cause a denial of service (resource consumption) via a flood of SIP INVITE requests to the port specified for voice conversation.
[]
null
null
null
null
null
GHSA-cj7x-pmqr-fc9p
ZF2014-03 has a potential cross site scripting vector in multiple view helpers
[]
null
6.1
null
null
null
GHSA-hm6h-3c43-g4fj
Use-after-free vulnerability in QuickTime in Apple Mac OS X 10.7.x before 10.7.4 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted movie file with JPEG2000 encoding.
[]
null
null
null
null
null
CVE-2005-1883
global.php in YaPiG 0.92b allows remote attackers to include arbitrary local files via the BASE_DIR parameter.
[ "cpe:2.3:a:yapig:yapig:0.92b:*:*:*:*:*:*:*" ]
null
null
null
5
null
GHSA-f784-rmxc-rc67
The Sina Extension for Elementor (Header Builder, Footer Builter, Theme Builder, Slider, Gallery, Form, Modal, Data Table Free Elementor Widgets & Elementor Templates) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the `Sina Posts`, `Sina Blog Post` and `Sina Table` widgets in all versions up to, and including, 3.7.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
6.4
null
null
null
CVE-2021-41063
SQL injection vulnerability was discovered in Aanderaa GeoView Webservice prior to version 2.1.3 that could allow an unauthenticated attackers to execute arbitrary commands.
[ "cpe:2.3:a:xylem:aanderaa_geoview:*:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
null
CVE-2023-26572
Unauthenticated SQL Injection In IDAttend’s IDWeb Application
Unauthenticated SQL injection in the GetExcursionList method in IDAttend’s IDWeb application 3.1.052 and earlier allows extraction or modification of all data by unauthenticated attackers.
[ "cpe:2.3:a:idattend:idweb:*:*:*:*:*:*:*:*" ]
null
9.8
null
null
null
GHSA-fxw5-mp3x-jpj6
Multiple PHP remote file inclusion vulnerabilities in PHPauction GPL 2.51 allow remote attackers to execute arbitrary PHP code via a URL in the include_path parameter to (1) converter.inc.php, (2) messages.inc.php, and (3) settings.inc.php in includes/.
[]
null
null
null
null
null
GHSA-jx9f-pj44-f5rh
In the module “Customization fields fee for your store” (aicustomfee) from ai-dev module for PrestaShop, an attacker can perform SQL injection up to 0.2.0. Release 0.2.1 fixed this security issue.
[]
null
9.8
null
null
null
GHSA-xvrg-83h8-x5v4
Macintosh systems generate large ICMP datagrams in response to malformed datagrams, allowing them to be used as amplifiers in a flood attack.
[]
null
null
null
null
null
GHSA-9cmg-www5-3gxx
Buffer overflow on the Linksys WRT54GL wireless router allows remote attackers to execute arbitrary code via unspecified vectors, as demonstrated by a certain module in VulnDisco Pack Professional 8.10 through 8.11. NOTE: as of 20090917, this disclosure has no actionable information. However, because the VulnDisco Pack author is a reliable researcher, the issue is being assigned a CVE identifier for tracking purposes.
[]
null
null
null
null
null
CVE-2021-0318
In appendEventsToCacheLocked of SensorEventConnection.cpp, there is a possible out of bounds write due to a use-after-free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android; Versions: Android-9, Android-8.1, Android-10, Android-11; Android ID: A-168211968.
[ "cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*" ]
null
7.8
null
7.2
null
CVE-2019-12530
Incorrect access control was discovered in the stdonato Dashboard plugin through 0.9.7 for GLPI, affecting df.php, issue.php, load.php, mem.php, traf.php, and uptime.php in front/sh.
[ "cpe:2.3:a:glpi_dashboard_project:glpi_dashboard:*:*:*:*:*:glpi:*:*" ]
null
null
9.8
7.5
null
CVE-2025-2908
Insufficiently Protected Credentials vulnerability in MeetMe products
The exposure of credentials in the call forwarding configuration module in MeetMe products in versions prior to 2024-09 allows an attacker to gain access to some important assets via configuration files.
[]
8.5
null
null
null
null
GHSA-j4j9-vv9c-xpp3
An authenticated path traversal vulnerability exists in the ArubaOS command line interface. Successful exploitation of this vulnerability results in the ability to read arbitrary files on the underlying operating system, including sensitive system files.
[]
null
4.9
null
null
null
CVE-2017-14958
lib.php in PivotX 2.3.11 does not properly block uploads of dangerous file types by admin users, which allows remote PHP code execution via an upload of a .php file.
[ "cpe:2.3:a:pivotx:pivotx:2.3.11:*:*:*:*:*:*:*" ]
null
null
7.2
6.5
null
CVE-2008-3841
Cross-site scripting (XSS) vulnerability in admin/search_links.php in Freeway eCommerce 1.4.1.171 allows remote attackers to inject arbitrary web script or HTML via the search_link parameter.
[ "cpe:2.3:a:openfreeway:freeway:1.4.1.171:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
GHSA-cpmg-8xfp-5wj8
An issue was discovered in the Clario VPN client through 5.9.1.1662 for macOS. The VPN client insecurely configures the operating system such that all IP traffic to the VPN server's IP address is sent in plaintext outside the VPN tunnel even if this traffic is not generated by the VPN client. This allows an adversary to trick the victim into sending plaintext traffic to the VPN server's IP address and thereby deanonymize the victim. NOTE: the tunnelcrack.mathyvanhoef.com website uses this CVE ID to refer more generally to "ServerIP attack for only traffic to the real IP address of the VPN server" rather than to only Clario.
[]
null
6.3
null
null
null
CVE-2025-27738
Windows Resilient File System (ReFS) Information Disclosure Vulnerability
Improper access control in Windows Resilient File System (ReFS) allows an authorized attacker to disclose information over a network.
[]
null
6.5
null
null
null
CVE-2024-53796
WordPress Themesflat Addons For Elementor plugin <= 2.2.2 - Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Themesflat Themesflat Addons For Elementor allows DOM-Based XSS.This issue affects Themesflat Addons For Elementor: from n/a through 2.2.2.
[]
null
6.5
null
null
null
GHSA-3qhj-558h-vvvj
Cross-site scripting (XSS) vulnerability in NBBC before 1.4.2 allows remote attackers to inject arbitrary web script or HTML via an invalid URL in a BBCode img tag.
[]
null
null
null
null
null
GHSA-xh53-2m5x-5pw7
A memory corruption issue was addressed with improved input validation. This issue affected versions prior to macOS Mojave 10.14.
[]
null
null
7.8
null
null
CVE-2002-2417
acFTP 1.4 does not properly handle when an invalid password is provided by the user during authentication, which allows remote attackers to hide or misrepresent certain activity from log files and possibly gain privileges.
[ "cpe:2.3:a:acftp:acftp:1.4:*:*:*:*:*:*:*" ]
null
null
null
10
null
GHSA-f9ww-4p5f-wmx4
Cross-site request forgery (CSRF) vulnerability in 1024 CMS 1.2.5 allows remote attackers to perform some actions as administrators, as demonstrated by (1) an unspecified action that creates a file containing PHP code and (2) unspecified use of the forum component. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
[]
null
null
null
null
null
CVE-2018-16782
libimageworsener.a in ImageWorsener 1.3.2 has a buffer overflow in the bmpr_read_rle_internal function in imagew-bmp.c.
[ "cpe:2.3:a:entropymine:imageworsener:1.3.2:*:*:*:*:*:*:*" ]
null
null
8.8
6.8
null
CVE-2007-3556
Liesbeth base CMS stores sensitive information under the web root with insufficient access control, which allows remote attackers to download an include file containing account credentials via a direct request for config.inc.
[ "cpe:2.3:a:doubleflex:liesbeth_base_cms:*:*:*:*:*:*:*:*" ]
null
null
null
5
null
RHSA-2019:3196
Red Hat Security Advisory: firefox security update
Mozilla: Use-after-free when creating index updates in IndexedDB Mozilla: Potentially exploitable crash due to 360 Total Security Mozilla: Stack buffer overflow in HKDF output Mozilla: Stack buffer overflow in WebRTC networking Mozilla: Unintended access to a privileged JSONView object Mozilla: document.domain-based origin isolation has same-origin-property violation Mozilla: Incorrect HTML parsing results in XSS bypass technique Mozilla: Memory safety bugs fixed in Firefox 70 and Firefox ESR 68.2 expat: heap-based buffer over-read via crafted XML input
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
6.1
7.5
null
null
CVE-2025-24638
WordPress Create with Code plugin <= 1.4 - Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Pete Dring Create with Code allows DOM-Based XSS. This issue affects Create with Code: from n/a through 1.4.
[]
null
6.5
null
null
null
CVE-2025-8751
Protected Total WebShield Extension Block Page cross site scripting
A vulnerability was found in Protected Total WebShield Extension up to 3.2.0 on Chrome. It has been classified as problematic. This affects an unknown part of the component Block Page. The manipulation of the argument Category leads to cross site scripting. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
[]
2.3
3.1
3.1
2.6
null
CVE-2018-1000515
ventrian News-Articles version NewsArticles.00.09.11 contains a XML External Entity (XXE) vulnerability in News-Articles/API/MetaWebLog/Handler.ashx.vb that can result in Attacker can read any file in the server or use smbrelay attack to access to server..
[ "cpe:2.3:a:news-articles_project:news-articles:00.09.11:*:*:*:*:*:*:*" ]
null
null
7.5
5
null
GHSA-p484-7m3w-w9xh
TOCTOU race-condition vulnerability in Insyde InsydeH2O with Kernel 5.2 before version 05.27.29, Kernel 5.3 before version 05.36.29, Kernel 5.4 version before 05.44.13, and Kernel 5.5 before version 05.52.13 allows an attacker to alter data and code used by the remainder of the boot process.
[]
null
4.7
null
null
null
GHSA-vmq8-94rq-xchh
U&M Software JustBookIt 1.0 does not require administrative authentication for all scripts in the admin/ directory, which allows remote attackers to have an unspecified impact via a direct request to (1) user_manual.php, (2) user_config.php, (3) user_kundnamn.php, (4) user_kundlista.php, (5) user_aktiva_kunder.php, (6) database.php, and possibly (7) index.php.
[]
null
null
null
null
null
GHSA-f775-4rjm-m64p
Cross-site scripting (XSS) vulnerability in Open-Xchange AppSuite and Server before 6.22.0 rev16, 6.22.1 before rev19, 7.0.1 before rev7, 7.0.2 before rev11, and 7.2.0 before rev8 allows remote authenticated users to inject arbitrary web script or HTML via a delivery=view action, aka Bug ID 26373, a different vulnerability than CVE-2013-3106.
[]
null
null
null
null
null
CVE-2012-5624
The XMLHttpRequest object in Qt before 4.8.4 enables http redirection to the file scheme, which allows man-in-the-middle attackers to force the read of arbitrary local files and possibly obtain sensitive information via a file: URL to a QML application.
[ "cpe:2.3:a:digia:qt:*:*:*:*:*:*:*:*", "cpe:2.3:a:qt:qt:1.41:*:*:*:*:*:*:*", "cpe:2.3:a:qt:qt:1.42:*:*:*:*:*:*:*", "cpe:2.3:a:qt:qt:1.43:*:*:*:*:*:*:*", "cpe:2.3:a:qt:qt:1.44:*:*:*:*:*:*:*", "cpe:2.3:a:qt:qt:1.45:*:*:*:*:*:*:*", "cpe:2.3:a:qt:qt:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:qt:qt:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:qt:qt:2.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:qt:qt:3.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:qt:qt:3.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:qt:qt:3.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:qt:qt:3.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:qt:qt:3.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:qt:qt:3.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:qt:qt:3.3.6:*:*:*:*:*:*:*", "cpe:2.3:a:qt:qt:4.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:qt:qt:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:qt:qt:4.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:qt:qt:4.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:qt:qt:4.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:qt:qt:4.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:qt:qt:4.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:qt:qt:4.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:qt:qt:4.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:qt:qt:4.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:qt:qt:4.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:qt:qt:4.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:qt:qt:4.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:qt:qt:4.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:qt:qt:4.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:qt:qt:4.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:qt:qt:4.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:qt:qt:4.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:qt:qt:4.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:qt:qt:4.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:qt:qt:4.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:qt:qt:4.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:qt:qt:4.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:qt:qt:4.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:qt:qt:4.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:qt:qt:4.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:qt:qt:4.6.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:qt:qt:4.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:qt:qt:4.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:qt:qt:4.6.3:*:*:*:*:*:*:*", "cpe:2.3:a:qt:qt:4.6.4:*:*:*:*:*:*:*", "cpe:2.3:a:qt:qt:4.6.5:*:*:*:*:*:*:*", "cpe:2.3:a:qt:qt:4.6.5:rc:*:*:*:*:*:*", "cpe:2.3:a:qt:qt:4.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:qt:qt:4.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:qt:qt:4.7.2:*:*:*:*:*:*:*", "cpe:2.3:a:qt:qt:4.7.3:*:*:*:*:*:*:*", "cpe:2.3:a:qt:qt:4.7.4:*:*:*:*:*:*:*", "cpe:2.3:a:qt:qt:4.7.5:*:*:*:*:*:*:*", "cpe:2.3:a:qt:qt:4.7.6:*:*:*:*:*:*:*", "cpe:2.3:a:qt:qt:4.7.6:rc:*:*:*:*:*:*", "cpe:2.3:a:qt:qt:4.8.0:*:*:*:*:*:*:*", "cpe:2.3:a:qt:qt:4.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:qt:qt:4.8.2:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
CVE-2024-32923
there is a possible cellular denial of service due to a logic error in the code. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.
[]
null
4
null
null
null
CVE-2009-0834
The audit_syscall_entry function in the Linux kernel 2.6.28.7 and earlier on the x86_64 platform does not properly handle (1) a 32-bit process making a 64-bit syscall or (2) a 64-bit process making a 32-bit syscall, which allows local users to bypass certain syscall audit configurations via crafted syscalls, a related issue to CVE-2009-0342 and CVE-2009-0343.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_eus:4.7:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_eus:5.3:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:4.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_aus:5.3:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:4.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:10.3:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_desktop:10:sp2:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_server:10:sp2:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp2:*:*:*:*:*:*" ]
null
null
null
3.6
null
GHSA-rxxh-4rjm-62rq
Microsoft Office Graphics Component Information Disclosure Vulnerability
[]
null
6.1
null
null
null
GHSA-r5xm-9894-gpw6
Open edX platform before 2022-06-06 allows XSS via the "next" parameter in the logout URL.
[]
null
6.1
null
null
null
GHSA-rcj3-h239-hjc8
An issue was discovered in Samsung Mobile Processor Exynos 2200, 1480, and 2400. A Use-After-Free in the mobile processor leads to privilege escalation.
[]
null
7.8
null
null
null
CVE-2024-38770
WordPress Backup and Staging by WP Time Capsule plugin <= 1.22.20 - Authentication Bypass and Privilege Escalation Vulnerability
Improper Privilege Management vulnerability in Revmakx Backup and Staging by WP Time Capsule allows Privilege Escalation, Authentication Bypass.This issue affects Backup and Staging by WP Time Capsule: from n/a through 1.22.20.
[ "cpe:2.3:a:revmakx:backup_and_staging_by_wp_time_capsule:*:*:*:*:*:*:*:*" ]
null
9.8
null
null
null
GHSA-jmf3-9f5j-cpjh
Windows Task Scheduler Elevation of Privilege Vulnerability
[]
null
8.8
null
null
null
GHSA-gv63-32vm-56hx
An issue was discovered in fs/io_uring.c in the Linux kernel before 5.6. It unsafely handles the root directory during path lookups, and thus a process inside a mount namespace can escape to unintended filesystem locations, aka CID-ff002b30181d.
[]
null
null
null
null
null
GHSA-m4qq-492w-2qw2
HCL iNotes is susceptible to a link to non-existent domain vulnerability. An attacker could use this vulnerability to trick a user into supplying sensitive information such as username, password, credit card number, etc.
[]
null
7.4
null
null
null
GHSA-3f2f-2p2j-r4w2
The Buy 99 Cents Only Products (aka com.ww99CentsOnlyStores) application 0.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[]
null
null
null
null
null
RHSA-2017:2635
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.17 update on RHEL 6
log4j: Socket receiver deserialization vulnerability tomcat: Security constrained bypass in error page mechanism jackson-databind: Deserialization vulnerability via readValue method of ObjectMapper
[ "cpe:/a:redhat:jboss_enterprise_application_platform:6::el6" ]
null
null
8.1
null
null
GHSA-vhx4-h49c-248m
To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used.
[]
null
null
null
null
null
CVE-2013-2254
The deepGetOrCreateNode function in impl/operations/AbstractCreateOperation.java in org.apache.sling.servlets.post.bundle 2.2.0 and 2.3.0 in Apache Sling does not properly handle a NULL value that returned when the session does not have permissions to the root node, which allows remote attackers to cause a denial of service (infinite loop) via unspecified vectors.
[ "cpe:2.3:a:apache:org.apache.sling.servlets.post:2.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:org.apache.sling.servlets.post:2.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:sling:*:*:*:*:*:*:*:*" ]
null
null
null
5
null
CVE-2024-5989
Rockwell Automation ThinManager® ThinServer™ Improper Input Validation Vulnerability
Due to an improper input validation, an unauthenticated threat actor can send a malicious message to invoke SQL injection into the program and cause a remote code execution condition on the Rockwell Automation ThinManager® ThinServer™.
[ "cpe:2.3:a:rockwellautomation:thinmanager:11.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:rockwellautomation:thinmanager:11.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:rockwellautomation:thinmanager:12.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:rockwellautomation:thinmanager:12.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:rockwellautomation:thinmanager:13.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:rockwellautomation:thinmanager:13.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:rockwellautomation:thinmanager:13.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:rockwellautomation:thinmanager:*:*:*:*:*:*:*:*", "cpe:2.3:a:rockwellautomation:thinserver:*:*:*:*:*:*:*:*" ]
9.3
null
null
null
null
CVE-2018-19887
An invalid memory address dereference was discovered in the huffcode function (libfaac/huff2.c) in Freeware Advanced Audio Coder (FAAC) 1.29.9.2. The vulnerability causes a segmentation fault and application crash, which leads to denial of service in the book 4 case.
[ "cpe:2.3:a:audiocoding:freeware_advanced_audio_coder:1.29.9.2:*:*:*:*:*:*:*" ]
null
null
5.5
4.3
null
CVE-2022-3332
SourceCodester Food Ordering Management System POST Parameter router.php sql injection
A vulnerability classified as critical has been found in SourceCodester Food Ordering Management System. This affects an unknown part of the file router.php of the component POST Parameter Handler. The manipulation of the argument username leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-209583.
[ "cpe:2.3:a:food_ordering_management_system_project:food_ordering_management_system:-:*:*:*:*:*:*:*" ]
null
6.3
null
null
null
GHSA-5wg4-7x93-v266
An issue was discovered in Amazon AWS VPN Client 2.0.0. It is possible to include a UNC path in the OpenVPN configuration file when referencing file paths for parameters (such as auth-user-pass). When this file is imported and the client attempts to validate the file path, it performs an open operation on the path and leaks the user's Net-NTLMv2 hash to an external server. This could be exploited by having a user open a crafted malicious ovpn configuration file.
[]
null
5
null
null
null
CVE-2017-8858
In Veritas NetBackup 8.0 and earlier and NetBackup Appliance 3.0 and earlier, there is unauthenticated privileged remote file write using the 'bprd' process.
[ "cpe:2.3:a:veritas:netbackup:*:*:*:*:*:*:*:*", "cpe:2.3:a:veritas:netbackup_appliance:*:*:*:*:*:*:*:*" ]
null
null
9.8
10
null
RHSA-2020:5305
Red Hat Security Advisory: rh-nodejs12-nodejs security update
nodejs-yargs-parser: prototype pollution vulnerability nodejs-y18n: prototype pollution vulnerability c-ares: ares_parse_{a,aaaa}_reply() insufficient naddrttls validation DoS nodejs-ajv: prototype pollution via crafted JSON schema in ajv.validate function
[ "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
5.6
null
null
null
GHSA-pfm4-qwvx-8qmj
An issue was discovered on Samsung mobile devices with O(8.x) software. There is a Notification leak on a locked device in Standalone Dex mode. The Samsung ID is SVE-2018-12925 (November 2018).
[]
null
null
null
null
null
GHSA-m72x-m7hc-6vp7
On the EPSON WF-2750 printer with firmware JP02I2, the Web interface AirPrint Setup page is vulnerable to HTML Injection that can redirect users to malicious sites.
[]
null
null
6.1
null
null
CVE-2024-25524
RuvarOA v6.01 and v12.01 were discovered to contain a SQL injection vulnerability via the sys_file_storage_id parameter at /WorkPlan/WorkPlanAttachDownLoad.aspx.
[ "cpe:2.3:a:ruvar:ruvaroa:-:*:*:*:*:*:*:*" ]
null
9.4
null
null
null
CVE-2023-50989
Tenda i29 v1.0 V1.0.0.5 was discovered to contain a command injection vulnerability via the pingSet function.
[ "cpe:2.3:o:tenda:i29_firmware:1.0.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:tenda:i29_firmware:1.0.0.5:*:*:*:*:*:*:*", "cpe:2.3:h:tenda:i29:1.0:*:*:*:*:*:*:*" ]
null
9.8
null
null
null
GHSA-v5q8-xvg8-g43w
Online Shopping Portal Project v3.1 was discovered to contain a SQL injection vulnerability via the Email parameter at /shopping/login.php.
[]
null
8.8
null
null
null
GHSA-p5mw-x2jr-q9g7
An issue was discovered on PHOENIX CONTACT FL NAT SMCS 8TX, FL NAT SMN 8TX, FL NAT SMN 8TX-M, and FL NAT SMN 8TX-M-DMG devices. There is unauthorized access to the WEB-UI by attackers arriving from the same source IP address as an authenticated user, because this IP address is used as a session identifier.
[]
null
null
8.8
null
null
GHSA-wmm4-77g9-76jv
An issue was discovered in NuttX before 7.27. The function netlib_parsehttpurl() in apps/netutils/netlib/netlib_parsehttpurl.c mishandles URLs longer than hostlen bytes (in the webclient, this is set by default to 40), leading to an Infinite Loop. The attack vector is the Location header of an HTTP 3xx response.
[]
null
null
7.5
null
null
GHSA-96gq-m97m-9ppg
In some configurations an attacker can inject a new executable path into the extensions.load file for osquery and hard link a parent folder of a malicious binary to a folder with known 'safe' permissions. Under those circumstances osquery will load said malicious executable with SYSTEM permissions. The solution is to migrate installations to the 'Program Files' directory on Windows which restricts unprivileged write access. This issue affects osquery prior to v3.4.0.
[]
null
null
8.1
null
null
CVE-2009-3339
Unspecified vulnerability in McAfee Email and Web Security Appliance 5.1 VMtrial allows remote attackers to read arbitrary files via unknown vectors, as demonstrated by a certain module in VulnDisco Pack Professional 8.9 through 8.11. NOTE: as of 20090917, this disclosure has no actionable information. However, because the VulnDisco Pack author is a reliable researcher, the issue is being assigned a CVE identifier for tracking purposes.
[ "cpe:2.3:a:mcafee:email_and_web_security_appliance:5.1:-:vmtrial:*:*:*:*:*", "cpe:2.3:h:mcafee:email_and_web_security_appliance:*:*:*:*:*:*:*:*" ]
null
null
null
7.8
null
GHSA-qvrc-hgq4-x7gw
Microsoft Internet Explorer 6.0.2900.2180 and earlier does not block javascript: URIs in Refresh headers in HTTP responses, which allows remote attackers to conduct cross-site scripting (XSS) attacks via vectors related to (1) injecting a Refresh header or (2) specifying the content of a Refresh header, a related issue to CVE-2009-1312.
[]
null
null
null
null
null
CVE-2023-38433
Fujitsu Real-time Video Transmission Gear "IP series" use hard-coded credentials, which may allow a remote unauthenticated attacker to initialize or reboot the products, and as a result, terminate the video transmission. Affected products and versions are as follows: IP-HE950E firmware versions V01L001 to V01L053, IP-HE950D firmware versions V01L001 to V01L053, IP-HE900E firmware versions V01L001 to V01L010, IP-HE900D firmware versions V01L001 to V01L004, IP-900E / IP-920E firmware versions V01L001 to V02L061, IP-900D / IP-900ⅡD / IP-920D firmware versions V01L001 to V02L061, IP-90 firmware versions V01L001 to V01L013, and IP-9610 firmware versions V01L001 to V02L007.
[ "cpe:2.3:h:fujitsu:ip-he950e:-:*:*:*:*:*:*:*", "cpe:2.3:o:fujitsu:ip-he950d_firmware:v01l001:*:*:*:*:*:*:*", "cpe:2.3:o:fujitsu:ip-he900e_firmware:v01l001:*:*:*:*:*:*:*", "cpe:2.3:o:fujitsu:ip-he900d_firmware:v01l001:*:*:*:*:*:*:*", "cpe:2.3:o:fujitsu:ip-900e_firmware:v01l001:*:*:*:*:*:*:*", "cpe:2.3:o:fujitsu:ip-920e_firmware:v01l001:*:*:*:*:*:*:*", "cpe:2.3:o:fujitsu:ip-900d_firmware:v01l001:*:*:*:*:*:*:*", "cpe:2.3:o:fujitsu:ip-900iid_firmware:v01l001:*:*:*:*:*:*:*", "cpe:2.3:o:fujitsu:ip-920d_firmware:v01l001:*:*:*:*:*:*:*", "cpe:2.3:o:fujitsu:ip-90:*:*:*:*:*:*:*:*", "cpe:2.3:o:fujitsu:ip-9610_firmware:v01l001:*:*:*:*:*:*:*", "cpe:2.3:o:fujitsu:ip-he950e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:fujitsu:ip-he950d_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:fujitsu:ip-he950d:-:*:*:*:*:*:*:*", "cpe:2.3:o:fujitsu:ip-he900e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:fujitsu:ip-he900e:-:*:*:*:*:*:*:*", "cpe:2.3:o:fujitsu:ip-he900d_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:fujitsu:ip-he900d:-:*:*:*:*:*:*:*", "cpe:2.3:o:fujitsu:ip-900e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:fujitsu:ip-900e:-:*:*:*:*:*:*:*", "cpe:2.3:o:fujitsu:ip-920e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:fujitsu:ip-920e:-:*:*:*:*:*:*:*", "cpe:2.3:o:fujitsu:ip-900d_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:fujitsu:ip-900d:-:*:*:*:*:*:*:*", "cpe:2.3:o:fujitsu:ip-900iid_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:fujitsu:ip-900iid:-:*:*:*:*:*:*:*", "cpe:2.3:o:fujitsu:ip-920d_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:fujitsu:ip-920d:-:*:*:*:*:*:*:*", "cpe:2.3:o:fujitsu:ip-90_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:fujitsu:ip-90:-:*:*:*:*:*:*:*", "cpe:2.3:o:fujitsu:ip-9610_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:fujitsu:ip-9610:-:*:*:*:*:*:*:*" ]
null
7.5
null
null
null
GHSA-r64c-j6jf-m9jx
Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
[]
null
5.4
null
null
null
GHSA-p22p-6prx-hph4
Tenda M3 V1.0.0.12(4856) was discovered to contain a stack overflow vulnerability in the function formSetAdConfigInfo. This vulnerability allows attackers to cause a Denial of Service (DoS) via the authIPs parameter.
[]
null
7.5
null
null
null
CVE-2019-8782
Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 13.2 and iPadOS 13.2, tvOS 13.2, Safari 13.0.3, iTunes for Windows 12.10.2, iCloud for Windows 11.0. Processing maliciously crafted web content may lead to arbitrary code execution.
[ "cpe:2.3:a:apple:icloud:*:*:*:*:*:windows:*:*", "cpe:2.3:a:apple:itunes:*:*:*:*:*:windows:*:*", "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*" ]
null
8.8
null
6.8
null
CVE-2025-20922
Out-of-bounds read in appending text paragraph in Samsung Notes prior to version 4.4.26.71 allows attackers to read out-of-bounds memory.
[]
null
5.5
null
null
null
CVE-2022-21345
Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: Security). Supported versions that are affected are 8.58 and 8.59. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).
[ "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.58:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.59:*:*:*:*:*:*:*" ]
null
6.5
null
null
null
CVE-2023-38242
ZDI-CAN-21387: Adobe Acrobat Reader DC Font Parsing Out-Of-Bounds Read Information Disclosure Vulnerability
Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[ "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*" ]
null
5.5
null
null
null
CVE-2025-3857
Infinite loop condition in Amazon.IonDotnet
When reading binary Ion data through Amazon.IonDotnet using the RawBinaryReader class, Amazon.IonDotnet does not check the number of bytes read from the underlying stream while deserializing the binary format. If the Ion data is malformed or truncated, this triggers an infinite loop condition that could potentially result in a denial of service. Users should upgrade to Amazon.IonDotnet version 1.3.1 and ensure any forked or derivative code is patched to incorporate the new fixes.
[]
8.7
7.5
null
null
null
CVE-2016-9495
Hughes high-performance broadband satellite modems, models HN7740S DW7000 HN7000S/SM, uses hard coded credentials
Hughes high-performance broadband satellite modems, models HN7740S DW7000 HN7000S/SM, uses hard coded credentials. Access to the device's default telnet port (23) can be obtained through using one of a few default credentials shared among all devices.
[ "cpe:2.3:o:hughes:hn7740s_firmware:6.9.0.34:*:*:*:*:*:*:*", "cpe:2.3:h:hughes:hn7740s:-:*:*:*:*:*:*:*", "cpe:2.3:o:hughes:dw7000_firmware:6.9.0.34:*:*:*:*:*:*:*", "cpe:2.3:h:hughes:dw7000:-:*:*:*:*:*:*:*", "cpe:2.3:o:hughes:hn7000s_firmware:6.9.0.34:*:*:*:*:*:*:*", "cpe:2.3:h:hughes:hn7000s:-:*:*:*:*:*:*:*", "cpe:2.3:o:hughes:hn7000sm_firmware:6.9.0.34:*:*:*:*:*:*:*", "cpe:2.3:h:hughes:hn7000sm:-:*:*:*:*:*:*:*" ]
null
null
8.8
5.8
null
CVE-2019-2393
Crash while joining collections with $lookup
A user authorized to perform database queries may trigger denial of service by issuing specially crafted queries, which use $lookup and collations. This issue affects MongoDB Server v4.2 versions prior to 4.2.1; MongoDB Server v4.0 versions prior to 4.0.13 and MongoDB Server v3.6 versions prior to 3.6.15.
[ "cpe:2.3:a:mongodb:mongodb:*:*:*:*:*:*:*:*" ]
null
6.5
null
null
null
CVE-2023-43988
An issue in nature fitness saijo mini-app on Line v13.6.1 allows attackers to send crafted malicious notifications via leakage of the channel access token.
[ "cpe:2.3:a:linecorp:line:13.6.1:*:*:*:*:*:*:*" ]
null
5.4
null
null
null
RHSA-2018:3528
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.1.5 on RHEL 7 security update
JBoss/WildFly: iiop does not honour strict transport confidentiality
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.1::el7" ]
null
null
5.3
null
null
CVE-2024-39686
fishaudio/Bert-VITS2 Command Injection in webui_preprocess.py bert_gen function
Bert-VITS2 is the VITS2 Backbone with multilingual bert. User input supplied to the data_dir variable is used directly in a command executed with subprocess.run(cmd, shell=True) in the bert_gen function, which leads to arbitrary command execution. This affects fishaudio/Bert-VITS2 2.3 and earlier.
[ "cpe:2.3:a:fishaudio:bert-vits2:*:*:*:*:*:*:*:*" ]
null
9.8
null
null
null
RHSA-2023:1588
Red Hat Security Advisory: kernel security update
ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF
[ "cpe:/o:redhat:rhel_e4s:8.1::baseos" ]
null
7.8
null
null
null
GHSA-3xp2-vcr5-r48r
viewreport.pl in NetIQ WebTrends Reporting Center Enterprise Edition 6.1a allows remote attackers to determine the installation path via an invalid profileid parameter, which leaks the pathname in an error message.
[]
null
null
null
null
null
CVE-2022-39344
Azure RTOS USBX vulnerable to buffer overflow
Azure RTOS USBX is a USB host, device, and on-the-go (OTG) embedded stack, that is fully integrated with Azure RTOS ThreadX. Prior to version 6.1.12, the USB DFU UPLOAD functionality may be utilized to introduce a buffer overflow resulting in overwrite of memory contents. In particular cases this may allow an attacker to bypass security features or execute arbitrary code. The implementation of `ux_device_class_dfu_control_request` function prevents buffer overflow during handling of DFU UPLOAD command when current state is `UX_SYSTEM_DFU_STATE_DFU_IDLE`. This issue has been patched, please upgrade to version 6.1.12. As a workaround, add the `UPLOAD_LENGTH` check in all possible states.
[ "cpe:2.3:a:microsoft:azure_rtos_usbx:*:*:*:*:*:*:*:*" ]
null
9.8
null
null
null
CVE-2014-2435
Unspecified vulnerability in Oracle MySQL Server 5.6.16 and earlier allows remote authenticated users to affect availability via unknown vectors related to InnoDB.
[ "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.6.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.6.4:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.6.5:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.6.6:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.6.7:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.6.8:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.6.9:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.6.10:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.6.11:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.6.12:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.6.13:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.6.14:*:*:*:*:*:*:*" ]
null
null
null
4
null
GHSA-g28r-954m-qc24
Adobe InCopy versions 18.0 (and earlier), 17.4 (and earlier) are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[]
null
7.8
null
null
null
CVE-2017-16172
section2.madisonjbrooks12 is a simple web server. section2.madisonjbrooks12 is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url.
[ "cpe:2.3:a:section2.madisonjbrooks12_project:section2.madisonjbrooks12:0.1.1:*:*:*:*:node.js:*:*" ]
null
null
7.5
5
null
CVE-2018-13134
TP-Link Archer C1200 1.13 Build 2018/01/24 rel.52299 EU devices have XSS via the PATH_INFO to the /webpages/data URI.
[ "cpe:2.3:o:tp-link:archer_c1200_firmware:1.13:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:archer_c1200:-:*:*:*:*:*:*:*" ]
null
null
6.1
4.3
null
GHSA-5fgm-r8gc-2w6h
In the Linux kernel, the following vulnerability has been resolved:workqueue: Do not warn when cancelling WQ_MEM_RECLAIM work from !WQ_MEM_RECLAIM workerAfter commit 746ae46c1113 ("drm/sched: Mark scheduler work queues with WQ_MEM_RECLAIM") amdgpu started seeing the following warning:[ ] workqueue: WQ_MEM_RECLAIM sdma0:drm_sched_run_job_work [gpu_sched] is flushing !WQ_MEM_RECLAIM events:amdgpu_device_delay_enable_gfx_off [amdgpu] ... [ ] Workqueue: sdma0 drm_sched_run_job_work [gpu_sched] ... [ ] Call Trace: [ ] <TASK> ... [ ] ? check_flush_dependency+0xf5/0x110 ... [ ] cancel_delayed_work_sync+0x6e/0x80 [ ] amdgpu_gfx_off_ctrl+0xab/0x140 [amdgpu] [ ] amdgpu_ring_alloc+0x40/0x50 [amdgpu] [ ] amdgpu_ib_schedule+0xf4/0x810 [amdgpu] [ ] ? drm_sched_run_job_work+0x22c/0x430 [gpu_sched] [ ] amdgpu_job_run+0xaa/0x1f0 [amdgpu] [ ] drm_sched_run_job_work+0x257/0x430 [gpu_sched] [ ] process_one_work+0x217/0x720 ... [ ] </TASK>The intent of the verifcation done in check_flush_depedency is to ensure forward progress during memory reclaim, by flagging cases when either a memory reclaim process, or a memory reclaim work item is flushed from a context not marked as memory reclaim safe.This is correct when flushing, but when called from the cancel(_delayed)_work_sync() paths it is a false positive because work is either already running, or will not be running at all. Therefore cancelling it is safe and we can relax the warning criteria by letting the helper know of the calling context.References: 746ae46c1113 ("drm/sched: Mark scheduler work queues with WQ_MEM_RECLAIM")
[]
null
null
null
null
null
GHSA-gx34-gwqq-m8fg
Improper input validation in software for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi in Windows 10 may allow an unauthenticated user to potentially enable denial of service via adjacent access.
[]
null
null
null
null
null
GHSA-h6j8-h5j9-864g
RIM Blackberry 7230 running RIM Blackberry OS 3.7 SP1 allows remote attackers to cause a denial of service (device reboot and possibly data corruption) via a calendar message with a long Location field, which triggers a watchdog while the message is being stored.
[]
null
null
null
null
null
CVE-2022-31463
Owl Labs Meeting Owl 5.2.0.15 does not require a password for Bluetooth commands, because only client-side authentication is used.
[ "cpe:2.3:o:owllabs:meeting_owl_pro_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:owllabs:meeting_owl_pro:-:*:*:*:*:*:*:*" ]
null
8.2
null
null
null
GHSA-pv94-6hw8-hh77
Missing Authorization vulnerability in Ashish Ajani WP Simple HTML Sitemap allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP Simple HTML Sitemap: from n/a through 2.7.
[]
null
5.3
null
null
null
CVE-2019-6195
An authorization bypass exists in Lenovo XClarity Controller (XCC) versions prior to 3.08 CDI340V, 3.01 TEI392O, 1.71 PSI328N where a valid authenticated user with lesser privileges may be granted read-only access to higher-privileged information if 1) “LDAP Authentication Only with Local Authorization” mode is configured and used by XCC, and 2) a lesser privileged user logs into XCC within 1 minute of a higher privileged user logging out. The authorization bypass does not exist when “Local Authentication and Authorization” or “LDAP Authentication and Authorization” modes are configured and used by XCC.
[ "cpe:2.3:a:lenovo:xclarity_controller:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_hx_1000:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_hx_2000:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_hx_3000:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_hx_5000:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_hx_7000:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_vx_1000:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_vx_2000:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_vx_3000:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_vx_5000:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_vx_7000:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksystem_sd530:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksystem_sd650_dwc:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksystem_sn550:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksystem_sn850:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksystem_sr150:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksystem_sr158:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksystem_sr250:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksystem_sr258:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksystem_sr850:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksystem_sr860:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksystem_st250:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksystem_st258:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_mx_sr650:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksystem_sr530:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksystem_sr550:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksystem_sr570:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksystem_sr590:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksystem_sr630:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksystem_sr650:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksystem_st550:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksystem_st558:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksystem_sr950_server:-:*:*:*:*:*:*:*" ]
null
4.8
null
null
null
RHSA-2024:0695
Red Hat Security Advisory: Logging 5.6.16 - Red Hat OpenShift
golang: net/http/internal: Denial of Service (DoS) via Resource Consumption via HTTP requests
[ "cpe:/a:redhat:logging:5.6::el8" ]
null
5.3
null
null
null
GHSA-v3h6-v65m-hwf7
An improper authorization weakness in Juniper Networks Junos OS allows a local authenticated attacker to bypass regular security controls to access the Junos Device Manager (JDM) application and take control of the system. This issue affects: Juniper Networks Junos OS versions prior to 18.2R1, 18.2X75-D5.
[]
null
null
null
null
null
CVE-2023-42691
In wifi service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed
[ "cpe:2.3:o:google:android:11.0:-:*:*:*:*:*:*", "cpe:2.3:o:google:android:12.0:-:*:*:*:*:*:*", "cpe:2.3:o:google:android:13.0:-:*:*:*:*:*:*", "cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:sc7731e:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:sc9832e:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t310:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*" ]
null
7.8
null
null
null
RHSA-2022:7066
Red Hat Security Advisory: firefox security update
Mozilla: Same-origin policy violation could have leaked cross-origin URLs Mozilla: Memory Corruption in JS Engine Mozilla: Denial of Service via window.print Mozilla: Memory safety bugs fixed in Firefox ESR 102.4 and Thunderbird 102.4
[ "cpe:/a:redhat:rhel_e4s:8.1::appstream" ]
null
8.8
6.1
null
null
CVE-2024-37554
WordPress UltraAddons plugin <= 1.1.6 - Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in CodeAstrology Team UltraAddons Elementor Lite (Header & Footer Builder, Menu Builder, Cart Icon, Shortcode).This issue affects UltraAddons Elementor Lite (Header & Footer Builder, Menu Builder, Cart Icon, Shortcode): from n/a through 1.1.6.
[ "cpe:2.3:a:codeastrology:ultraaddons:*:*:*:*:*:*:*:*" ]
null
6.5
null
null
null
GHSA-m297-2wvr-723p
Out of bounds read vulnerability due to improper bounds checking in NI LabVIEW in lvre!UDecStrToNum that may result in information disclosure or arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted VI. This vulnerability affects NI LabVIEW 2025 Q1 and prior versions.
[]
7.3
7.8
null
null
null
RHSA-2023:0786
Red Hat Security Advisory: Network observability 1.1.0 security update
network-observability-console-plugin-container: setting Loki authToken configuration to DISABLE or HOST mode leads to authentication longer being enforced
[ "cpe:/a:redhat:network_observ_optr:1.1.0::el8" ]
null
7.5
null
null
null
CVE-2023-40788
SpringBlade <=V3.6.0 is vulnerable to Incorrect Access Control due to incorrect configuration in the default gateway resulting in unauthorized access to error logs
[ "cpe:2.3:a:bladex:springblade:*:*:*:*:*:*:*:*" ]
null
5.3
null
null
null