id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
197k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
patch_commit_url
stringlengths
38
232
GHSA-6wpm-4j63-64j7
Deserialization of Untrusted Data vulnerability in WP Speedo Team Members allows Object Injection. This issue affects Team Members: from n/a through 3.4.0.
[]
null
8.8
null
null
null
GHSA-qqx8-c7mj-52mh
The BeeTeam368 Extensions plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the handle_submit_upload_file() function in all versions up to, and including, 2.3.5. This makes it possible for authenticated attackers with Subscriber-level access or higher to upload arbitrary files on the affected site's server which may make remote code execution possible.
[]
null
8.8
null
null
null
CVE-2010-2623
SQL injection vulnerability in pages.php in Internet DM Specialist Bed and Breakfast allows remote attackers to execute arbitrary SQL commands via the pp_id parameter.
[ "cpe:2.3:a:internetdm:bed_and_breakfast:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2010-4939
PHP remote file inclusion vulnerability in index.php in MailForm 1.2 allows remote attackers to execute arbitrary PHP code via a URL in the theme parameter.
[ "cpe:2.3:a:scripts.bdr130:mailform:1.2:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
GHSA-m6w2-chv8-mqrq
Windows Active Directory Certificate Services (AD CS) Remote Code Execution Vulnerability
[]
null
6.6
null
null
null
CVE-2023-48930
xinhu xinhuoa 2.2.1 contains a File upload vulnerability.
[ "cpe:2.3:a:rockoa:xinhu:2.2.1:*:*:*:*:*:*:*" ]
null
9.8
null
null
null
CVE-2022-27043
Yearning versions 2.3.1 and 2.3.2 Interstellar GA and 2.3.4 - 2.3.6 Neptune is vulnerable to Directory Traversal.
[ "cpe:2.3:a:yearning:yearning:*:*:*:*:*:*:*:*", "cpe:2.3:a:yearning:yearning:2.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:yearning:yearning:2.3.2:*:*:*:*:*:*:*" ]
null
7.5
null
5
null
CVE-2024-23506
WordPress InstaWP Connect Plugin <= 0.1.0.9 is vulnerable to Sensitive Data Exposure
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in InstaWP Team InstaWP Connect – 1-click WP Staging & Migration.This issue affects InstaWP Connect – 1-click WP Staging & Migration: from n/a through 0.1.0.9.
[ "cpe:2.3:a:instawp:instawp_connect:*:*:*:*:*:wordpress:*:*" ]
null
7.7
null
null
null
GHSA-vx88-5hj8-432c
Analysis of the Bomgar Remote Support Portal JavaStart.jar Applet 52790 and earlier revealed that it is vulnerable to a path traversal vulnerability. The archive can be downloaded from a given Bomgar Remote Support Portal deployment at https://domain/api/content/JavaStart.jar and is callable from an arbitrary website using <object> and/or <appletHTML> tags. Successful exploitation results in file creation/modification/deletion in the operating system and with privileges of the user that ran the Java applet.
[]
null
null
10
null
null
CVE-2010-3313
phpgwapi/js/fckeditor/editor/dialog/fck_spellerpages/spellerpages/serverscripts/spellchecker.php in EGroupware 1.4.001+.002; 1.6.001+.002 and possibly other versions before 1.6.003; and EPL 9.1 before 9.1.20100309 and 9.2 before 9.2.20100309; allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) aspell_path or (2) spellchecker_lang parameters.
[ "cpe:2.3:a:egroupware:egroupware:1.4.001:*:*:*:*:*:*:*", "cpe:2.3:a:egroupware:egroupware:1.4.001\\+.002:*:*:*:*:*:*:*", "cpe:2.3:a:egroupware:egroupware:1.4.002:*:*:*:*:*:*:*", "cpe:2.3:a:egroupware:egroupware:1.6.001:*:*:*:*:*:*:*", "cpe:2.3:a:egroupware:egroupware:1.6.001\\+.002:*:*:*:*:*:*:*", "cpe:2.3:a:egroupware:egroupware:1.6.002:*:*:*:*:*:*:*", "cpe:2.3:a:egroupware:egroupware:9.1:-:commercial_epl:*:*:*:*:*", "cpe:2.3:a:egroupware:egroupware:9.2:-:commercial_epl:*:*:*:*:*" ]
null
null
null
7.5
null
GHSA-x4p3-9wcx-48ww
In PAN_WriteBuf of pan_api.cc, there is a possible out of bounds read due to a use after free. This could lead to remote information disclosure over Bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-233604485
[]
null
6.5
null
null
null
cisco-sa-sb-wap-multi-ZAfKGXhF
Cisco Small Business 100, 300, and 500 Series Wireless Access Points Vulnerabilities
Multiple vulnerabilities in the web-based management interface of certain Cisco Small Business 100, 300, and 500 Series Wireless Access Points could allow an authenticated, remote attacker to obtain sensitive information from or inject arbitrary commands on an affected device. For more information about these vulnerabilities, see the Details ["#details"] section of this advisory. Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-wap-multi-ZAfKGXhF ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-wap-multi-ZAfKGXhF"]
[]
null
5.5
null
null
null
GHSA-394v-2hqm-x86g
Stack-based buffer overflow in http.c in Karl Dahlke Edbrowse (aka Command line editor browser) 3.1.3 allows remote attackers to execute arbitrary code by operating an FTP server that sends directory listings with (1) long user names or (2) long group names.
[]
null
null
null
null
null
GHSA-m25w-37x6-fpxv
Off-by-one buffer overflow in ModSecurity (mod_security) 1.7.4 for Apache 2.x, when SecFilterScanPost is enabled, allows remote attackers to execute arbitrary code via crafted POST requests.
[]
null
null
null
null
null
CVE-2024-21831
Uncontrolled search path in some Intel(R) Processor Diagnostic Tool software before version 4.1.9.41 may allow an authenticated user to potentially enable escalation of privilege via local access.
[ "cpe:2.3:a:intel:processor_diagnostic_tool:*:*:*:*:*:*:*:*" ]
null
6.7
null
null
null
CVE-2025-50692
FoxCMS <=v1.2.5 is vulnerable to Code Execution in admin/template_file/editFile.html.
[]
null
9.8
null
null
null
GHSA-vfvr-qwmh-f4c8
Cross-site scripting (XSS) vulnerability in the email APP in Huawei PLK smartphones with software AL10C00 before AL10C00B211 and AL10C92 before AL10C92B211; ATH smartphones with software AL00C00 before AL00C00B361, CL00C92 before CL00C92B361, TL00HC01 before TL00HC01B361, and UL00C00 before UL00C00B361; CherryPlus smartphones with software TL00C00 before TL00C00B553, UL00C00 before UL00C00B553, and TL00MC01 before TL00MC01B553; and RIO smartphones with software AL00C00 before AL00C00B360 allows remote attackers to inject arbitrary web script or HTML via an email message.
[]
null
null
6.1
null
null
CVE-2017-2856
An exploitable buffer overflow vulnerability exists in the DDNS client used by the Foscam C1 Indoor HD Camera running application firmware 2.52.2.43. On devices with DDNS enabled, an attacker who is able to intercept HTTP connections will be able to fully compromise the device by creating a rogue HTTP server.
[ "cpe:2.3:o:foscam:c1_firmware:2.52.2.43:*:*:*:*:*:*:*", "cpe:2.3:h:foscam:c1:-:*:*:*:*:*:*:*" ]
null
null
8.1
null
null
ICSA-24-137-05
Siemens Simcenter Nastran
The affected applications contain a stack overflow vulnerability while parsing specially strings as argument for one of the application binaries. This could allow an attacker to execute code in the context of the current process.
[]
null
7.8
null
null
null
CVE-2023-45869
ILIAS 7.25 (2023-09-12) allows any authenticated user to execute arbitrary operating system commands remotely, when a highly privileged account accesses an XSS payload. The injected commands are executed via the exec() function in the execQuoted() method of the ilUtil class (/Services/Utilities/classes/class.ilUtil.php) This allows attackers to inject malicious commands into the system, potentially compromising the integrity, confidentiality, and availability of the ILIAS installation and the underlying operating system.
[ "cpe:2.3:a:ilias:ilias:7.25:*:*:*:*:*:*:*" ]
null
9
null
null
null
GHSA-xw5q-g62x-2qjc
electron ASAR Integrity bypass by just modifying the content
electron's ASAR Integrity can be bypass by modifying the content.ImpactThis only impacts apps that have the `embeddedAsarIntegrityValidation` and `onlyLoadAppFromAsar` [fuses](https://www.electronjs.org/docs/latest/tutorial/fuses) enabled. Apps without these fuses enabled are not impacted. This issue is specific to Windows, apps using these fuses on macOS are unimpacted.Specifically this issue can only be exploited if your app is launched from a filesystem the attacker has write access too. i.e. the ability to edit files inside the .app bundle on macOS which these fuses are supposed to protect against.WorkaroundsThere are no app side workarounds, you must update to a patched version of Electron.Fixed Versions`30.0.5``31.0.0-beta.1`For more informationIf you have any questions or comments about this advisory, email us at [[email protected]](mailto:[email protected])
[]
null
7.8
null
null
null
CVE-2025-7090
Belkin F9K1122 webs formConnectionSetting stack-based overflow
A vulnerability, which was classified as critical, has been found in Belkin F9K1122 1.00.33. Affected by this issue is the function formConnectionSetting of the file /goform/formConnectionSetting of the component webs. The manipulation of the argument max_Conn/timeOut leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
[]
8.7
8.8
8.8
9
null
RHSA-2006:0271
Red Hat Security Advisory: freeradius security update
security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::es" ]
null
null
null
null
null
GHSA-76hj-25wr-pvgg
Tridium Niagara Enterprise Security 2.3u1, all versions prior to 2.3.118.6, Niagara AX 3.8u4, all versions prior to 3.8.401.1, Niagara 4.4u2, all versions prior to 4.4.93.40.2, and Niagara 4.6, all versions prior to 4.6.96.28.4 a cross-site scripting vulnerability has been identified that may allow a remote attacker to inject code to some web pages affecting confidentiality.
[]
null
null
5.4
null
null
CVE-2023-37257
The DataEase panel and dataset have a stored XSS vulnerability
DataEase is an open source data visualization analysis tool. Prior to version 1.18.9, the DataEase panel and dataset have a stored cross-site scripting vulnerability. The vulnerability has been fixed in v1.18.9. There are no known workarounds.
[ "cpe:2.3:a:dataease:dataease:*:*:*:*:*:*:*:*" ]
null
5.4
null
null
null
CVE-2024-44228
This issue was addressed with improved permissions checking. This issue is fixed in Xcode 16. An app may be able to inherit Xcode permissions and access user data.
[ "cpe:2.3:a:apple:xcode:-:*:*:*:*:*:*:*", "cpe:2.3:a:apple:xcode:*:*:*:*:*:*:*:*" ]
null
7.5
null
null
null
GHSA-7g56-f7p4-fmcq
Mbed TLS before 3.0.1 has a double free in certain out-of-memory conditions, as demonstrated by an mbedtls_ssl_set_session() failure.
[]
null
9.8
null
null
null
CVE-2002-2426
Cross-site request forgery (CSRF) vulnerability in Citrix Presentation Server 4.0 and 4.5, MetaFrame Presentation Server 3.0, and Access Essentials 1.0 through 2.0 allows remote attackers to execute arbitrary published applications, and possibly other programs, as authenticated users via the InitialProgram key in an ICA connection. NOTE: some of these details are obtained from third party information.
[ "cpe:2.3:a:citrix:access_essentials:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:citrix:access_essentials:1.5:*:*:*:*:*:*:*", "cpe:2.3:a:citrix:access_essentials:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:citrix:metaframe_presentation_server:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:citrix:presentation_server:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:citrix:presentation_server:4.5:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
GHSA-r5r8-fxfq-hj6q
Auth. (author+) Stored Cross-Site Scripting (XSS) vulnerability in simonpedge Slide Anything – Responsive Content / HTML Slider and Carousel plugin <= 2.4.9 versions.
[]
null
5.4
null
null
null
CVE-2009-4337
SQL injection vulnerability in the Diocese of Portsmouth Calendar (pd_calendar) extension 0.4.1 and earlier for TYPO3 allows remote attackers to execute arbitrary SQL commands via unknown vectors, a different issue than CVE-2008-6691.
[ "cpe:2.3:a:simon_rundell:pd_calendar_today:*:*:*:*:*:*:*:*", "cpe:2.3:a:simon_rundell:pd_calendar_today:0.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
GHSA-gwfg-4782-gv5m
The Ultimate Member plugin for WordPress is vulnerable to open redirects due to insufficient validation on supplied URLs in the social fields of the Profile Page, which makes it possible for attackers to redirect unsuspecting victims in versions up to, and including, 2.3.1 granted the victim clicks on a social icon on a user's profile page.
[]
null
5.4
null
null
null
CVE-2025-6517
Dromara MaxKey Meta URL SAML20DetailsController.java add server-side request forgery
A vulnerability was found in Dromara MaxKey up to 4.1.7 and classified as critical. This issue affects the function Add of the file maxkey-webs\maxkey-web-mgt\src\main\java\org\dromara\maxkey\web\apps\contorller\SAML20DetailsController.java of the component Meta URL Handler. The manipulation of the argument post leads to server-side request forgery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
[]
5.3
6.3
6.3
6.5
null
CVE-2000-0259
The default permissions for the Cryptography\Offload registry key used by the OffloadModExpo in Windows NT 4.0 allows local users to obtain compromise the cryptographic keys of other users.
[ "cpe:2.3:a:microsoft:terminal_server:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*" ]
null
null
null
7.2
null
GHSA-jpj5-hg26-6jgc
Cross-site Scripting in Alist
Alist versions 2.0.10 through 2.1.0 were discovered to contain a cross-site scripting (XSS) vulnerability via /i/:data/ipa.plist. This issue was fixed in version 2.1.1.
[]
null
6.1
null
null
null
CVE-2021-4123
Cross-Site Request Forgery (CSRF) in livehelperchat/livehelperchat
livehelperchat is vulnerable to Cross-Site Request Forgery (CSRF)
[ "cpe:2.3:a:livehelperchat:live_helper_chat:*:*:*:*:*:*:*:*" ]
null
null
6.5
null
null
CVE-2011-3463
WebDAV Sharing in Apple Mac OS X 10.7.x before 10.7.3 does not properly perform authentication, which allows local users to gain privileges by leveraging access to (1) the server or (2) a bound directory.
[ "cpe:2.3:o:apple:mac_os_x:10.7.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.7.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.7.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.7.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.7.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.7.2:*:*:*:*:*:*:*" ]
null
null
null
7.2
null
CVE-2017-6781
A vulnerability in the management of shell user accounts for Cisco Policy Suite (CPS) Software for CPS appliances could allow an authenticated, local attacker to gain elevated privileges on an affected system. The affected privilege level is not at the root level. The vulnerability is due to incorrect role-based access control (RBAC) for shell user accounts. An attacker could exploit this vulnerability by authenticating to an affected appliance and providing crafted user input via the CLI. A successful exploit could allow the attacker to acquire a higher privilege level than should have been granted. To exploit this vulnerability, the attacker must log in to the appliance with valid credentials. Cisco Bug IDs: CSCve37724. Known Affected Releases: 9.0.0, 9.1.0, 10.0.0, 11.0.0, 12.0.0.
[ "cpe:2.3:a:cisco:policy_suite:9.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:policy_suite:9.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:policy_suite:10.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:policy_suite:11.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:policy_suite:12.0.0:*:*:*:*:*:*:*" ]
null
null
5.3
4.6
null
RHSA-2023:6842
Red Hat Security Advisory: OpenShift Container Platform 4.12.43 bug fix and security update
OpenShift: modification of node role labels golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)
[ "cpe:/a:redhat:openshift:4.12::el8" ]
null
7.5
null
null
null
CVE-2018-19067
An issue was discovered on Foscam C2 devices with System Firmware 1.11.1.8 and Application Firmware 2.72.1.32, and Opticam i5 devices with System Firmware 1.5.2.11 and Application Firmware 2.21.1.128. There is a hardcoded Ak47@99 password for the factory~ account.
[ "cpe:2.3:o:opticam:i5_application_firmware:2.21.1.128:*:*:*:*:*:*:*", "cpe:2.3:o:opticam:i5_system_firmware:1.5.2.11:*:*:*:*:*:*:*", "cpe:2.3:h:opticam:i5:-:*:*:*:*:*:*:*", "cpe:2.3:o:foscam:c2_application_firmware:2.72.1.32:*:*:*:*:*:*:*", "cpe:2.3:o:foscam:c2_system_firmware:1.11.1.8:*:*:*:*:*:*:*", "cpe:2.3:h:foscam:c2:-:*:*:*:*:*:*:*" ]
null
null
9.8
10
null
GHSA-h78p-6x92-8qgr
An issue was discovered in Sprecher Automation SPRECON-E Service Program before 3.43 SP0. Under certain preconditions, it is possible to execute telegram simulation as a non-admin user. As prerequisites, a user must have created an online-connection, validly authenticated and authorized as administrator, and executed telegram simulation. After that, the online-connection must have been closed. Incorrect caching of client data then may lead to privilege escalation, where a subsequently acting non-admin user is permitted to do telegram simulation. In order to exploit this vulnerability, a potential attacker would need to have both a valid engineering-account in the SPRECON RBAC system as well as access to a service/maintenance computer with SPRECON-E Service Program running. Additionally, a valid admin-user must have closed the service connection beforehand without closing the program, having executed telegram simulation; the attacker then has access to the running software instance. Hence, there is no risk from external attackers.
[]
null
null
7.5
null
null
CVE-2022-29358
epub2txt2 v2.04 was discovered to contain an integer overflow via the function bug in _parse_special_tag at sxmlc.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted XML file.
[ "cpe:2.3:a:epub2txt2_project:epub2txt2:2.04:*:*:*:*:*:*:*" ]
null
5.5
null
4.3
null
CVE-2006-1406
Multiple cross-site scripting (XSS) vulnerabilities in wbadmlog.aspx in uniForum 4.0 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) txtuser or (2) txtpassword parameters.
[ "cpe:2.3:a:uniforum:uniforum:*:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
CVE-2021-32988
FATEK Automation WinProladder Versions 3.30 and prior are vulnerable to an out-of-bounds write, which may allow an attacker to execute arbitrary code.
[ "cpe:2.3:a:fatek:winproladder:*:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
null
GHSA-qh2w-vp8r-w5jg
SQL injection vulnerability in the Volunteer Management System (com_volunteer) module 2.0 for Joomla! allows remote attackers to execute arbitrary SQL commands via the job_id parameter in a jobshow action to index.php.
[]
null
null
null
null
null
CVE-2005-4565
Format string vulnerability in the Internet Key Exchange version 1 (IKEv1) implementation in ADTRAN NetVanta before 10.03.03.E might allow remote attackers to have an unknown impact via format string specifiers in crafted IKE packets, as demonstrated by the PROTOS ISAKMP Test Suite for IKEv1.
[ "cpe:2.3:h:adtran:netvanta:3xxx:*:*:*:*:*:*:*", "cpe:2.3:h:adtran:netvanta:4xxx:*:*:*:*:*:*:*", "cpe:2.3:h:adtran:netvanta:5xxx:*:*:*:*:*:*:*" ]
null
null
null
10
null
CVE-2022-42036
The d8s-urls package for Python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-csv package. The affected version is 0.1.0.
[ "cpe:2.3:a:democritus:d8s-urls:0.1.0:*:*:*:*:python:*:*" ]
null
9.8
null
null
null
GHSA-qpxq-x4wv-xrc2
Some URIs in IBM API Connect 2018.1 and 2018.4.1.3 disclose system specification information like the machine id, system uuid, filesystem paths, network interface names along with their mac addresses. An attacker can use this information in targeted attacks. IBM X-Force ID: 156542.
[]
null
null
5.3
null
null
CVE-2008-4403
The CGI modules in the server in Trend Micro OfficeScan 8.0 SP1 before build 2439 and 8.0 SP1 Patch 1 before build 3087 allow remote attackers to cause a denial of service (NULL pointer dereference and child process crash) via crafted HTTP headers, related to the "error handling mechanism."
[ "cpe:2.3:a:trend_micro:officescan:8.0:sp1:*:*:*:*:*:*", "cpe:2.3:a:trend_micro:officescan:8.0:sp1_patch1:*:*:*:*:*:*" ]
null
null
null
5
null
CVE-2023-33128
.NET and Visual Studio Remote Code Execution Vulnerability
.NET and Visual Studio Remote Code Execution Vulnerability
[ "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*" ]
null
7.3
null
null
null
CVE-2016-3650
Symantec Endpoint Protection Manager (SEPM) 12.1 before RU6 MP5 allows remote authenticated users to discover credentials via a brute-force attack.
[ "cpe:2.3:a:symantec:endpoint_protection_manager:*:mp4:*:*:*:*:*:*" ]
null
null
8.8
4
null
CVE-2018-1167
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Spotify Music Player 1.0.69.336. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of URI handlers. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code under the context of the current process. Was ZDI-CAN-5501.
[ "cpe:2.3:a:spotify:spotify:1.0.69.336:*:*:*:*:*:*:*" ]
null
null
8.8
6.8
null
CVE-2024-48974
Life2000 Ventilator does not perform proper file integrity checks when adopting firmware updates
The ventilator does not perform proper file integrity checks when adopting firmware updates. This makes it possible for an attacker to force unauthorized changes to the device's configuration settings and/or compromise device functionality by pushing a compromised/illegitimate firmware file. This could disrupt the function of the device and/or cause unauthorized information disclosure.
[ "cpe:2.3:o:baxter:life2000_ventilator_firmware:*:*:*:*:*:*:*:*" ]
null
9.3
null
null
null
CVE-2002-0419
Information leaks in IIS 4 through 5.1 allow remote attackers to obtain potentially sensitive information or more easily conduct brute force attacks via responses from the server in which (2) in certain configurations, the server IP address is provided as the realm for Basic authentication, which could reveal real IP addresses that were obscured by NAT, or (3) when NTLM authentication is used, the NetBIOS name of the server and its Windows NT domain are revealed in response to an Authorization request. NOTE: this entry originally contained a vector (1) in which the server reveals whether it supports Basic or NTLM authentication through 401 Access Denied error messages. CVE has REJECTED this vector; it is not a vulnerability because the information is already available through legitimate use, since authentication cannot proceed without specifying a scheme that is supported by both the client and the server.
[ "cpe:2.3:a:microsoft:internet_information_server:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_information_server:4.0:alpha:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_information_services:5.0:*:*:*:*:*:*:*" ]
null
null
null
5
null
GHSA-cprp-w79q-f798
Missing Authorization vulnerability in GS Plugins GS Pins for Pinterest allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects GS Pins for Pinterest: from n/a through 1.6.7.
[]
null
5.4
null
null
null
CVE-2021-28622
Adobe Animate BMP File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability
Adobe Animate version 21.0.6 (and earlier) is affected by an Out-of-bounds Write vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[ "cpe:2.3:a:adobe:animate:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
null
7.8
null
null
RHSA-2023:6023
Red Hat Security Advisory: varnish:6 security update
HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
[ "cpe:/a:redhat:rhel_e4s:8.1::appstream" ]
null
7.5
null
null
null
GHSA-q7mm-qvfp-88hm
IceCMS v2.0.1 is vulnerable to Cross Site Request Forgery (CSRF).
[]
null
6.5
null
null
null
GHSA-5mw4-q577-59hc
All versions of NVIDIA Windows GPU Display Driver contain a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgDdiEscape where the size of an input buffer is not validated, leading to denial of service or potential escalation of privileges.
[]
null
null
7.8
null
null
GHSA-fgwf-vh6h-x6h6
Cross-site scripting (XSS) vulnerability in admin/classes/ui.dta.php in Drake CMS allows remote attackers to inject arbitrary web script or HTML via the desc[][title] field. NOTE: Drake CMS has only a beta version available, and the vendor has previously stated "We do not consider security reports valid until the first official release of Drake CMS."
[]
null
null
null
null
null
GHSA-32qv-jwqq-5v6r
A vulnerability, which was classified as critical, was found in OTCMS 7.01. Affected is an unknown function of the file /admin/ind_backstage.php. The manipulation of the argument sqlContent leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-247908.
[]
null
4.7
null
null
null
CVE-2024-28318
gpac 2.3-DEV-rev921-g422b78ecf-master was discovered to contain a out of boundary write vulnerability via swf_get_string at scene_manager/swf_parse.c:325
[ "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*" ]
null
7.1
null
null
null
CVE-2022-35621
Access control vulnerability in Evoh NFT EvohClaimable contract with sha256 hash code fa2084d5abca91a62ed1d2f1cad3ec318e6a9a2d7f1510a00d898737b05f48ae allows remote attackers to execute fraudulent NFT transfers.
[ "cpe:2.3:a:evohclaimable_project:evohclaimable:-:*:*:*:*:*:*:*" ]
null
5.3
null
null
null
GHSA-26cr-h49j-77ch
A stored cross site scripting (XSS) vulnerability in phplist 3.5.4 and below allows authenticated attackers to execute arbitrary web scripts or HTML via a crafted payload in the "admin" parameter under the "Manage administrators" module.
[]
null
null
null
null
null
GHSA-x6x2-p3pj-7mv4
The Local Security Authority Subsystem Service (LSASS) in Microsoft Windows XP SP2 and SP3 and Server 2003 SP2 does not properly process authentication requests, which allows local users to gain privileges via a request with a crafted length, aka "LSASS Length Validation Vulnerability."
[]
null
null
null
null
null
CVE-2024-36495
Read/Write Permissions for Everyone on Configuration File
The application Faronics WINSelect (Standard + Enterprise) saves its configuration in an encrypted file on the file system which "Everyone" has read and write access to, path to file: C:\ProgramData\WINSelect\WINSelect.wsd The path for the affected WINSelect Enterprise configuration file is: C:\ProgramData\Faronics\StorageSpace\WS\WINSelect.wsd
[ "cpe:2.3:a:faronics:winselect:*:*:*:*:*:*:*:*" ]
null
7.7
null
null
null
CVE-2017-11141
The ReadMATImage function in coders\mat.c in ImageMagick 7.0.5-6 has a memory leak vulnerability that can cause memory exhaustion via a crafted MAT file, related to incorrect ordering of a SetImageExtent call.
[ "cpe:2.3:a:imagemagick:imagemagick:7.0.5-6:*:*:*:*:*:*:*" ]
null
null
6.5
7.1
null
GHSA-8c77-8rhw-f4x7
A vulnerability in the web-based management interface of Cisco Meeting Server could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack and perform arbitrary actions on an affected device. The vulnerability is due to insufficient CSRF protections for the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to follow a customized link. A successful exploit could allow the attacker to perform arbitrary actions on an affected device by using a web browser and with the privileges of the user.
[]
null
null
8.8
null
null
CVE-2010-2844
Cross-site scripting (XSS) vulnerability in news_show.php in Newanz NewsOffice 2.0.18 allows remote attackers to inject arbitrary web script or HTML via the n-cat parameter.
[ "cpe:2.3:a:newanz:newsoffice:2.0.18:beta:*:*:*:*:*:*" ]
null
null
null
4.3
null
CVE-2012-4019
Cross-site scripting (XSS) vulnerability in tokyo_bbs.cgi in Come on Girls Interface (CGI) Tokyo BBS allows remote attackers to inject arbitrary web script or HTML via vectors related to the error page.
[ "cpe:2.3:a:c61:tokyo_bbs:-:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
GHSA-9r23-xjjv-gr5j
Authenticated (author or higher user role) Arbitrary File Upload vulnerability in ideasToCode Enable SVG, WebP & ICO Upload plugin <= 1.0.1 at WordPress.
[]
null
8.8
null
null
null
CVE-2022-24609
Luocms v2.0 is affected by an incorrect access control vulnerability. Through /admin/templates/template_manage.php, an attacker can write an arbitrary shell file.
[ "cpe:2.3:a:luocms_project:luocms:2.0:*:*:*:*:*:*:*" ]
null
9.8
null
10
null
CVE-2003-1148
Multiple PHP remote file inclusion vulnerabilities in J-Pierre DEZELUS Les Visiteurs 2.0.1, as used in phpMyConferences (phpMyConference) 8.0.2 and possibly other products, allow remote attackers to execute arbitrary PHP code via a URL in the lvc_include_dir parameter to (1) config.inc.php or (2) new-visitor.inc.php in common/visiteurs/include/.
[ "cpe:2.3:a:les_visiteurs:les_visiteurs:2.0.1:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
GHSA-6fc2-x5pj-mq44
Absolute path directory traversal vulnerability in (1) MERAK Mail Server for Windows 8.3.8r with before IceWarp Web Mail 5.6.1 and (2) VisNetic MailServer before 8.5.0.5 allows remote authenticated users to include arbitrary files via a modified language parameter and a full Windows or UNC pathname in the lang_settings parameter to mail/index.html, which is not properly sanitized by the validatefolder PHP function, possibly due to an incomplete fix for CVE-2005-4558.
[]
null
null
null
null
null
CVE-2003-0444
Heap-based buffer overflow in GTKSee 0.5 and 0.5.1 allows remote attackers to execute arbitrary code via a PNG image of certain color depths.
[ "cpe:2.3:a:gtksee:gtksee:0.5:*:*:*:*:*:*:*", "cpe:2.3:a:gtksee:gtksee:0.5.1:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
GHSA-vgj8-9328-h497
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 25.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
[]
null
null
null
null
null
CVE-2018-1000862
An information exposure vulnerability exists in Jenkins 2.153 and earlier, LTS 2.138.3 and earlier in DirectoryBrowserSupport.java that allows attackers with the ability to control build output to browse the file system on agents running builds beyond the duration of the build using the workspace browser.
[ "cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*", "cpe:2.3:a:jenkins:jenkins:*:*:*:*:-:*:*:*", "cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*" ]
null
null
4.3
4
null
CVE-2011-0788
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 25 and earlier, when running on Windows, allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2011-0786.
[ "cpe:2.3:a:sun:jdk:*:update_25:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update_14:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update_15:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update_16:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update_17:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update_18:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update_19:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update_20:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update_21:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update_22:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update_23:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update_24:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update1:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:*:update_25:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update_17:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update_18:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update_19:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update_20:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update_21:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update_22:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update_23:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update_24:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*" ]
null
null
null
7.6
null
GHSA-644f-fx6f-4895
An issue was discovered on Wireless IP Camera 360 devices. Attackers can read recordings by navigating to /mnt/idea0 or /mnt/idea1 on the SD memory card.
[]
null
null
7.5
null
null
GHSA-q2r3-58jv-x99w
Missing Authorization vulnerability in Brainstorm Force Convert Pro.This issue affects Convert Pro: from n/a through 1.7.5.
[]
null
7.1
null
null
null
GHSA-jqmj-x6r6-q24p
The Fiksu library for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[]
null
null
null
null
null
GHSA-jff7-fm48-4mpp
Synaesthesia 2.1 and earlier, and possibly other versions, when installed setuid root, does not drop privileges before processing configuration and mixer files, which allows local users to read arbitrary files.
[]
null
null
null
null
null
CVE-2020-14491
OpenClinic GA versions 5.09.02 and 5.89.05b do not properly check permissions before executing SQL queries, which may allow a low-privilege user to access privileged information.
[ "cpe:2.3:a:openclinic_ga_project:openclinic_ga:5.09.02:*:*:*:*:*:*:*", "cpe:2.3:a:openclinic_ga_project:openclinic_ga:5.89.05b:*:*:*:*:*:*:*" ]
null
6.5
null
4
null
RHSA-2007:0085
Red Hat Security Advisory: kernel security update
security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
null
RHSA-2023:5429
Red Hat Security Advisory: thunderbird security update
firefox: use-after-free in workers Mozilla: Out-of-bounds write in PathOps Mozilla: Use-after-free in Ion Compiler Mozilla: Memory safety bugs fixed in Firefox 118, Firefox ESR 115.3, and Thunderbird 115.3 libvpx: Heap buffer overflow in vp8 encoding in libvpx
[ "cpe:/a:redhat:rhel_aus:8.4::appstream", "cpe:/a:redhat:rhel_e4s:8.4::appstream", "cpe:/a:redhat:rhel_tus:8.4::appstream" ]
null
8.8
null
null
null
CVE-2023-23978
WordPress WP Client Reports Plugin <= 1.0.16 is vulnerable to Sensitive Data Exposure
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in SwitchWP WP Client Reports plugin <= 1.0.16 versions.
[ "cpe:2.3:a:switchwp:wp_client_reports:*:*:*:*:*:wordpress:*:*" ]
null
4.3
null
null
null
GHSA-7v3x-h7r2-34jv
Insufficient Session Expiration in Pterodactyl API
ImpactA vulnerability exists in Pterodactyl Panel `<= 1.6.6` that could allow a malicious attacker that compromises an API key to generate an authenticated user session that is not revoked when the API key is deleted, thus allowing the malicious user to remain logged in as the user the key belonged to.It is important to note that **a malicious user must first compromise an existing API key for a user to exploit this issue**. It cannot be exploited by chance, and requires a coordinated attack against an individual account using a known API key.PatchesThis issue has been addressed in the `v1.7.0` release of Pterodactyl Panel.WorkaroundsThose not wishing to upgrade may apply the change below:For more informationIf you have any questions or comments about this advisory please reach out to `Tactical Fish#8008` on [Discord](https://discord.gg/pterodactyl) or email `[email protected]`.
[]
null
6
null
null
null
GHSA-mwr4-4gh4-7m8j
A vulnerability in the web-based management interface of Cisco ISE could allow an unauthenticated, remote attacker to conduct an XSS attack against a user of the interface.This vulnerability exists because the web-based management interface does not sufficiently validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of the interface on an affected system to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
[]
null
6.1
null
null
null
CVE-2015-1187
The ping tool in multiple D-Link and TRENDnet devices allow remote attackers to execute arbitrary code via the ping_addr parameter to ping.ccp.
[ "cpe:2.3:o:dlink:dir-626l_firmware:1.04:b04:*:*:*:*:*:*", "cpe:2.3:h:dlink:dir-626l:-:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dir-636l_firmware:1.04:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:dir-636l:-:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dir-808l_firmware:1.03:b05:*:*:*:*:*:*", "cpe:2.3:h:dlink:dir-808l:-:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dir-810l_firmware:1.01:b04:*:*:*:*:*:*", "cpe:2.3:h:dlink:dir-810l:-:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dir-810l_firmware:2.02:b01:*:*:*:*:*:*", "cpe:2.3:o:dlink:dir-820l_firmware:1.02:b10:*:*:*:*:*:*", "cpe:2.3:h:dlink:dir-820l:-:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dir-820l_firmware:1.05:b03:*:*:*:*:*:*", "cpe:2.3:o:dlink:dir-820l_firmware:2.01:b02:*:*:*:*:*:*", "cpe:2.3:o:dlink:dir-826l_firmware:1.00:b23:*:*:*:*:*:*", "cpe:2.3:h:dlink:dir-826l:-:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dir-830l_firmware:1.00:b07:*:*:*:*:*:*", "cpe:2.3:h:dlink:dir-830l:-:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dir-836l_firmware:1.01:b03:*:*:*:*:*:*", "cpe:2.3:h:dlink:dir-836l:-:*:*:*:*:*:*:*", "cpe:2.3:o:trendnet:tew-731br_firmware:2.01:b01:*:*:*:*:*:*", "cpe:2.3:h:trendnet:tew-731br:-:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dir-651_firmware:1.10na:b02:*:*:*:*:*:*", "cpe:2.3:h:dlink:dir-651:-:*:*:*:*:*:*:*", "cpe:2.3:o:trendnet:tew-651br_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:trendnet:tew-651br:-:*:*:*:*:*:*:*", "cpe:2.3:o:trendnet:tew-652br_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:trendnet:tew-652br:-:*:*:*:*:*:*:*", "cpe:2.3:o:trendnet:tew-711br_firmware:1.00:b31:*:*:*:*:*:*", "cpe:2.3:h:trendnet:tew-711br:-:*:*:*:*:*:*:*", "cpe:2.3:o:trendnet:tew-810dr_firmware:1.00:b19:*:*:*:*:*:*", "cpe:2.3:h:trendnet:tew-810dr:-:*:*:*:*:*:*:*", "cpe:2.3:o:trendnet:tew-813dru_firmware:1.00:b23:*:*:*:*:*:*", "cpe:2.3:h:trendnet:tew-813dru:-:*:*:*:*:*:*:*" ]
null
9.8
null
10
null
GHSA-p7rw-cjjv-6cc4
JSCAPE Secure FTP Applet 4.8.0 and earlier does not ask the user to verify a new or mismatched SSH host key, which makes it easier for remote attackers to perform man-in-the-middle attacks.
[]
null
null
null
null
null
CVE-2022-4495
collective.dms.basecontent column.py renderCell cross site scripting
A vulnerability, which was classified as problematic, has been found in collective.dms.basecontent up to 1.6. This issue affects the function renderCell of the file src/collective/dms/basecontent/browser/column.py. The manipulation leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 1.7 is able to address this issue. The name of the patch is 6c4d616fcc771822a14ebae5e23f3f6d96d134bd. It is recommended to upgrade the affected component. The identifier VDB-215813 was assigned to this vulnerability.
[ "cpe:2.3:a:collective.dms.basecontent_project:collective.dms.basecontent:*:*:*:*:*:*:*:*" ]
null
3.5
3.5
null
https://github.com/collective/collective.dms.basecontent/commit/6c4d616fcc771822a14ebae5e23f3f6d96d134bd
CVE-2001-0722
Internet Explorer 5.5 and 6.0 allows remote attackers to read and modify user cookies via Javascript in an about: URL, aka the "First Cookie Handling Vulnerability."
[ "cpe:2.3:a:microsoft:internet_explorer:5.5:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:6.0:*:*:*:*:*:*:*" ]
null
null
null
6.4
null
GHSA-mgf9-v7f6-c7w7
The issue was addressed with improved memory handling. This issue is fixed in iOS 16.2 and iPadOS 16.2, tvOS 16.2. Parsing a maliciously crafted TIFF file may lead to disclosure of user information.
[]
null
5.5
null
null
null
CVE-2024-34550
WordPress Dynamics 365 Integration plugin <= 1.3.17 - Sensitive Data Exposure vulnerability
Insertion of Sensitive Information into Log File vulnerability in AlexaCRM Dynamics 365 Integration.This issue affects Dynamics 365 Integration: from n/a through 1.3.17.
[]
null
5.3
null
null
null
GHSA-x92p-v52m-p9hc
Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2016-0102, CVE-2016-0103, CVE-2016-0106, CVE-2016-0109, and CVE-2016-0114.
[]
null
null
7.5
null
null
CVE-2005-1809
Sony Ericsson P900 Beamer allows remote attackers to cause a denial of service (panic) via an obexftp session with a long filename in an OBEX File Transfer or OBEX Object Push.
[ "cpe:2.3:o:sony:p900_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sony:p900:-:*:*:*:*:*:*:*" ]
null
null
null
5
null
GHSA-2r7v-857w-j9f5
NetEpi Case Manager before 0.98 generates different error messages depending on whether or not a username is valid, which allows remote attackers to enumerate valid usernames.
[]
null
null
null
null
null
CVE-2020-15715
rConfig 3.9.5 could allow a remote authenticated attacker to execute arbitrary code on the system, because of an error in the search.crud.php script. An attacker could exploit this vulnerability using the nodeId parameter.
[ "cpe:2.3:a:rconfig:rconfig:3.9.5:*:*:*:*:*:*:*" ]
null
9.9
null
6.5
null
GHSA-3j27-rxr5-w58g
Memory leak in Libxul, as used in Mozilla Firefox 3.0.5 and other products, allows remote attackers to cause a denial of service (memory consumption and browser hang) via a long CLASS attribute in an HR element in an HTML document.
[]
null
null
null
null
null
CVE-2019-15653
Comba AP2600-I devices through A02,0202N00PD2 are prone to password disclosure via an insecure authentication mechanism. The HTML source code of the login page contains values that allow obtaining the username and password. The username are password values are a double md5 of the plaintext real value, i.e., md5(md5(value)).
[ "cpe:2.3:o:comba:ap2600-i_-_a02_-_0202n00pd2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:comba:ap2600-i_-_a02_-_0202n00pd2:-:*:*:*:*:*:*:*" ]
null
7.5
null
5
null
RHSA-2013:1147
Red Hat Security Advisory: Red Hat JBoss SOA Platform 5.3.1 update
jakarta-commons-httpclient: missing connection hostname check against X.509 certificate name rubygem-json: Denial of Service and SQL Injection ruby: entity expansion DoS vulnerability in REXML
[ "cpe:/a:redhat:jboss_enterprise_soa_platform:5.3" ]
null
null
3.7
null
null