id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
57.2k
cpes
sequencelengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
CVE-2022-22161
Junos OS: MX104 might become unresponsive if the out-of-band management port receives a flood of traffic
An Uncontrolled Resource Consumption vulnerability in the kernel of Juniper Networks Junos OS allows an unauthenticated network based attacker to cause 100% CPU load and the device to become unresponsive by sending a flood of traffic to the out-of-band management ethernet port. Continued receipted of a flood will create a sustained Denial of Service (DoS) condition. Once the flood subsides the system will recover by itself. An indication that the system is affected by this issue would be that an irq handled by the fman process is shown to be using a high percentage of CPU cycles like in the following example output: user@host> show system processes extensive ... PID USERNAME PRI NICE SIZE RES STATE TIME WCPU COMMAND 31 root -84 -187 0K 16K WAIT 22.2H 56939.26% irq96: fman0 This issue affects Juniper Networks Junos OS: All versions prior to 18.3R3-S6; 18.4 versions prior to 18.4R2-S9, 18.4R3-S9; 19.1 versions prior to 19.1R2-S3, 19.1R3-S7; 19.2 versions prior to 19.2R1-S7, 19.2R3-S3; 19.3 versions prior to 19.3R2-S7, 19.3R3-S4; 19.4 versions prior to 19.4R2-S5, 19.4R3-S5; 20.1 versions prior to 20.1R3-S1; 20.2 versions prior to 20.2R3-S2; 20.3 versions prior to 20.3R3-S1; 20.4 versions prior to 20.4R2-S2, 20.4R3; 21.1 versions prior to 21.1R2; 21.2 versions prior to 21.2R1-S1, 21.2R2.
[ "cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.3:-:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.3:r:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.3:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.3:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.3:r1-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.3:r1-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.3:r1-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.3:r1-s5:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.3:r1-s6:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.3:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.3:r2-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.3:r2-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.3:r2-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.3:r2-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.3:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.3:r3-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.3:r3-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.3:r3-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.3:r3-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.3:r3-s5:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:-:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:r1-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:r1-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:r1-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:r1-s5:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:r1-s6:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:r1-s7:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:r2-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:r2-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:r2-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:r2-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:r2-s5:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:r2-s6:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:r2-s7:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:r2-s8:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:r3-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:r3-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:r3-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:r3-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:r3-s5:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:r3-s6:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:r3-s7:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:r3-s8:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.1:-:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.1:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.1:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.1:r1-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.1:r1-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.1:r1-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.1:r1-s5:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.1:r1-s6:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.1:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.1:r2-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.1:r2-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.1:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.1:r3-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.1:r3-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.1:r3-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.1:r3-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.1:r3-s5:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.1:r3-s6:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.2:-:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.2:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.2:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.2:r1-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.2:r1-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.2:r1-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.2:r1-s5:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.2:r1-s6:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.2:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.2:r3-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.2:r3-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.3:-:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.3:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.3:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.3:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.3:r2-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.3:r2-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.3:r2-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.3:r2-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.3:r2-s5:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.3:r2-s6:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.3:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.3:r3-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.3:r3-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.3:r3-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:-:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r1-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r1-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r1-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r2-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r2-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r2-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r2-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r3-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r3-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r3-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r3-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.1:-:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.1:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.1:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.1:r1-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.1:r1-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.1:r1-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.1:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.1:r2-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.1:r2-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.1:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.2:-:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.2:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.2:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.2:r1-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.2:r1-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.2:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.2:r2-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.2:r2-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.2:r2-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.2:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.2:r3-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.3:-:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.3:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.3:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.3:r2-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.3:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.4:-:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.4:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.4:r2-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.1:-:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.1:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.1:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*", "cpe:2.3:h:juniper:mx104:-:*:*:*:*:*:*:*" ]
null
7.5
null
null
GHSA-r5vj-6v5w-753q
Unrestricted file upload vulnerability in Infinite Automation Mango Automation 2.5.x and 2.6.x before 2.6.0 build 430 allows remote authenticated users to execute arbitrary JSP code via vectors involving an upload of an image file.
[]
null
null
null
null
RHSA-2016:1630
Red Hat Security Advisory: rh-python34-python security update
python: smtplib StartTLS stripping attack python: http protocol steam injection attack CGIHandler: sets environmental variable based on user supplied Proxy request header
[ "cpe:/a:redhat:rhel_software_collections:2::el6", "cpe:/a:redhat:rhel_software_collections:2::el7" ]
null
null
5
null
CVE-2024-9049
Beaver Builder – WordPress Page Builder <= 2.8.3.6 - Authenticated (Contributor+) Stored DOM-Based Cross-Site Scripting via Button Group Module
The Beaver Builder – WordPress Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Button Group module in all versions up to, and including, 2.8.3.6 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[ "cpe:2.3:a:fastlinemedia:beaver_builder:*:*:*:*:*:wordpress:*:*" ]
null
6.4
null
null
CVE-2017-11126
The III_i_stereo function in libmpg123/layer3.c in mpg123 through 1.25.1 allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted audio file that is mishandled in the code for the "block_type != 2" case, a similar issue to CVE-2017-9870.
[ "cpe:2.3:a:mpg123:mpg123:*:*:*:*:*:*:*:*" ]
null
null
5.5
4.3
GHSA-2hj4-ccw5-92h5
A vulnerability in the Authentication, Authorization, and Accounting (AAA) feature of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, remote attacker to bypass command authorization and copy files to or from the file system of an affected device using the Secure Copy Protocol (SCP).This vulnerability is due to incorrect processing of SCP commands in AAA command authorization checks. An attacker with valid credentials and level 15 privileges could exploit this vulnerability by using SCP to connect to an affected device from an external machine. A successful exploit could allow the attacker to obtain or change the configuration of the affected device and put files on or retrieve files from the affected device.
[]
null
8
null
null
GHSA-r32h-q4vw-rvf3
In the Linux kernel, the following vulnerability has been resolved:mlxsw: spectrum_acl_tcam: Fix memory leak when canceling rehash workThe rehash delayed work is rescheduled with a delay if the number of credits at end of the work is not negative as supposedly it means that the migration ended. Otherwise, it is rescheduled immediately.After "mlxsw: spectrum_acl_tcam: Fix possible use-after-free during rehash" the above is no longer accurate as a non-negative number of credits is no longer indicative of the migration being done. It can also happen if the work encountered an error in which case the migration will resume the next time the work is scheduled.The significance of the above is that it is possible for the work to be pending and associated with hints that were allocated when the migration started. This leads to the hints being leaked [1] when the work is canceled while pending as part of ACL region dismantle.Fix by freeing the hints if hints are associated with a work that was canceled while pending.Blame the original commit since the reliance on not having a pending work associated with hints is fragile.[1] unreferenced object 0xffff88810e7c3000 (size 256): comm "kworker/0:16", pid 176, jiffies 4295460353 hex dump (first 32 bytes): 00 30 95 11 81 88 ff ff 61 00 00 00 00 00 00 80 .0......a....... 00 00 61 00 40 00 00 00 00 00 00 00 04 00 00 00 ..a.@........... backtrace (crc 2544ddb9): [<00000000cf8cfab3>] kmalloc_trace+0x23f/0x2a0 [<000000004d9a1ad9>] objagg_hints_get+0x42/0x390 [<000000000b143cf3>] mlxsw_sp_acl_erp_rehash_hints_get+0xca/0x400 [<0000000059bdb60a>] mlxsw_sp_acl_tcam_vregion_rehash_work+0x868/0x1160 [<00000000e81fd734>] process_one_work+0x59c/0xf20 [<00000000ceee9e81>] worker_thread+0x799/0x12c0 [<00000000bda6fe39>] kthread+0x246/0x300 [<0000000070056d23>] ret_from_fork+0x34/0x70 [<00000000dea2b93e>] ret_from_fork_asm+0x1a/0x30
[]
null
5.5
null
null
GHSA-8crw-6mr7-v864
In PackageManager, there is a missing permission check. This could lead to local information disclosure across users with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-153996866
[]
null
null
null
null
GHSA-9m9r-rw59-qh84
The System Dashboard WordPress plugin before 2.8.15 does not sanitise and escape some parameters when outputting them in the page, which could allow unauthenticated users to perform Cross-Site Scripting attacks.
[]
null
6.1
null
null
CVE-2005-3550
Directory traversal vulnerability in admin.php in toendaCMS before 0.6.2 allows remote attackers to access arbitrary files via a .. (dot dot) in the id_user parameter.
[ "cpe:2.3:a:toenda_software_development:toendacms:*:*:*:*:*:*:*:*" ]
null
null
null
5
CVE-2022-24126
A buffer overflow in the NRSessionSearchResult parser in Bandai Namco FromSoftware Dark Souls III through 2022-03-19 allows remote attackers to execute arbitrary code via matchmaking servers, a different vulnerability than CVE-2021-34170.
[ "cpe:2.3:a:fromsoftware:dark_souls_iii:*:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
GHSA-r928-prgx-2wf8
Vulnerability in the Oracle CRM Technical Foundation product of Oracle E-Business Suite (component: Preferences). Supported versions that are affected are 12.1.3 and 12.2.3-12.2.9. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle CRM Technical Foundation. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle CRM Technical Foundation, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle CRM Technical Foundation accessible data. CVSS 3.1 Base Score 4.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N).
[]
null
null
null
null
CVE-2023-26588
Use of hard-coded credentials vulnerability in Buffalo network devices allows an attacker to access the debug function of the product. The affected products and versions are as follows: BS-GSL2024 firmware Ver. 1.10-0.03 and earlier, BS-GSL2016P firmware Ver. 1.10-0.03 and earlier, BS-GSL2016 firmware Ver. 1.10-0.03 and earlier, BS-GS2008 firmware Ver. 1.0.10.01 and earlier, BS-GS2016 firmware Ver. 1.0.10.01 and earlier, BS-GS2024 firmware Ver. 1.0.10.01 and earlier, BS-GS2048 firmware Ver. 1.0.10.01 and earlier, BS-GS2008P firmware Ver. 1.0.10.01 and earlier, BS-GS2016P firmware Ver. 1.0.10.01 and earlier, and BS-GS2024P firmware Ver. 1.0.10.01 and earlier
[ "cpe:2.3:o:buffalo:bs-gsl2024_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:buffalo:bs-gsl2024:-:*:*:*:*:*:*:*", "cpe:2.3:o:buffalo:bs-gsl2016p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:buffalo:bs-gsl2016p:-:*:*:*:*:*:*:*", "cpe:2.3:o:buffalo:bs-gsl2016_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:buffalo:bs-gsl2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:buffalo:bs-gs2008_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:buffalo:bs-gs2008:-:*:*:*:*:*:*:*", "cpe:2.3:o:buffalo:bs-gs2016_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:buffalo:bs-gs2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:buffalo:bs-gs2024_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:buffalo:bs-gs2024:-:*:*:*:*:*:*:*", "cpe:2.3:o:buffalo:bs-gs2048_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:buffalo:bs-gs2048:-:*:*:*:*:*:*:*", "cpe:2.3:o:buffalo:bs-gs2008p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:buffalo:bs-gs2008p:-:*:*:*:*:*:*:*", "cpe:2.3:o:buffalo:bs-gs2016p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:buffalo:bs-gs2016p:-:*:*:*:*:*:*:*", "cpe:2.3:o:buffalo:bs-gs2024p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:buffalo:bs-gs2024p:-:*:*:*:*:*:*:*", "cpe:2.3:o:buffalo:bs-gsl2005_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:buffalo:bs-gsl2005:-:*:*:*:*:*:*:*", "cpe:2.3:o:buffalo:bs-gsl2008_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:buffalo:bs-gsl2008:-:*:*:*:*:*:*:*", "cpe:2.3:o:buffalo:bs-gsl2005p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:buffalo:bs-gsl2005p:-:*:*:*:*:*:*:*", "cpe:2.3:o:buffalo:bs-gsl2008p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:buffalo:bs-gsl2008p:-:*:*:*:*:*:*:*", "cpe:2.3:o:buffalo:bs-gs2016hp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:buffalo:bs-gs2016hp:-:*:*:*:*:*:*:*", "cpe:2.3:o:buffalo:bs-gs2024hp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:buffalo:bs-gs2024hp:-:*:*:*:*:*:*:*" ]
null
7.5
null
null
GHSA-5vpv-xmcj-9q85
Fix for arbitrary file deletion in customer media allows for remote code execution
ImpactMagento admin users with access to the customer media could execute code on the server.
[]
null
7.2
null
null
GHSA-53gq-4mvm-23rp
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2024-34467. Reason: This candidate is a reservation duplicate of CVE-2024-34467. Notes: All CVE users should reference CVE-2024-34467 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.
[]
null
null
null
null
GHSA-gjr5-xrxx-mv2c
Pheap 2.0 allows remote attackers to bypass authentication by setting a pheap_login cookie value to the administrator's username, which can be used to (1) obtain sensitive information, including the administrator password, via settings.php or (2) upload and execute arbitrary PHP code via an update_doc action in edit.php.
[]
null
null
null
null
CVE-2008-0369
Multiple unspecified programs in IBM Informix Dynamic Server (IDS) 10.x before 10.00.xC8 allow local users to create arbitrary files by specifying the target file in the SQLIDEBUG environment variable, whose ownership is changed to the user invoking the programs.
[ "cpe:2.3:a:ibm:informix_dynamic_server:10.00:*:*:*:*:*:*:*" ]
null
null
null
6.9
CVE-2021-1470
Cisco SD-WAN SQL Injection Vulnerability
A vulnerability in the web-based management interface of Cisco&nbsp;SD-WAN vManage Software could allow an authenticated, remote attacker to conduct SQL injection attacks on an affected system. This vulnerability is due to improper input validation of SQL queries to an affected system. An attacker could exploit this vulnerability by authenticating to the application and sending malicious SQL queries to an affected system. A successful exploit could allow the attacker to modify values on or return values from the vManage database or the underlying operating system.Cisco&nbsp;has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.
[]
null
4.9
null
null
GHSA-pcph-v7q2-77cx
INSERT ... ON CONFLICT DO UPDATE commands in PostgreSQL 10.x before 10.1, 9.6.x before 9.6.6, and 9.5.x before 9.5.10 disclose table contents that the invoker lacks privilege to read. These exploits affect only tables where the attacker lacks full read access but has both INSERT and UPDATE privileges. Exploits bypass row level security policies and lack of SELECT privilege.
[]
null
null
6.5
null
CVE-2021-21891
A stack-based buffer overflow vulnerability exists in the Web Manager FsBrowseClean functionality of Lantronix PremierWave 2050 8.9.0.0R4 (in QEMU). A specially crafted HTTP request can lead to remote code execution in the vulnerable portion of the branch (deletefile). An attacker can make an authenticated HTTP request to trigger this vulnerability.
[ "cpe:2.3:o:lantronix:premierwave_2050_firmware:8.9.0.0:r4:*:*:*:*:*:*", "cpe:2.3:h:lantronix:premierwave_2050:-:*:*:*:*:*:*:*" ]
null
null
9.1
null
CVE-2021-36542
Cross-Site Request Forgery (CSRF) vulnerability in the /op/op.LockDocument.php in SeedDMS v5.1.x<5.1.23 and v6.0.x <6.0.16 allows a remote attacker to lock any document without victim's knowledge, by enticing an authenticated user to visit an attacker's web page.
[ "cpe:2.3:a:seeddms:seeddms:*:*:*:*:*:*:*:*", "cpe:2.3:a:seeddms:seeddms:6.0.6:beta:*:*:*:*:*:*" ]
null
4.3
null
4.3
CVE-2018-17997
LayerBB 1.1.1 allows XSS via the titles of conversations (PMs).
[ "cpe:2.3:a:layerbb:layerbb:1.1.1:*:*:*:*:*:*:*" ]
null
null
6.1
4.3
CVE-2020-14210
Reflected Cross-Site Scripting (XSS) vulnerability in MONITORAPP WAF in which script can be executed when responding to Request URL information. It provides a function to response to Request URL information when blocking.
[ "cpe:2.3:a:monitorapp:application_insight_web_application:*:*:*:*:virtual:*:*:*", "cpe:2.3:a:monitorapp:web_application_firewall:*:*:*:*:*:*:*:*" ]
null
6.1
null
4.3
GHSA-8qq4-4mf9-45qp
An issue was discovered in Maxum Rumpus before 8.2.12 on macOS. Authenticated users can perform a path traversal using double escaped characters, enabling read access to arbitrary files on the server.
[]
null
null
null
null
CVE-2022-1265
BulletProof Security < 6.1 - Admin+ Stored Cross-Site Scripting
The BulletProof Security WordPress plugin before 6.1 does not sanitize and escape some of its CAPTCHA settings, which could allow high-privileged users to perform Cross-Site Scripting attacks even when unfiltered_html is disallowed
[ "cpe:2.3:a:ait-pro:bulletproof_security:*:*:*:*:*:wordpress:*:*" ]
null
4.8
null
3.5
CVE-2024-43151
WordPress Ultimate Addons for Beaver Builder – Lite plugin <= 1.5.9 - Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Brainstorm Force Ultimate Addons for Beaver Builder – Lite allows Stored XSS.This issue affects Ultimate Addons for Beaver Builder – Lite: from n/a through 1.5.9.
[]
null
6.5
null
null
CVE-2014-2776
Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2014-1769, CVE-2014-1782, CVE-2014-1785, CVE-2014-2753, CVE-2014-2755, CVE-2014-2760, CVE-2014-2761, and CVE-2014-2772.
[ "cpe:2.3:a:microsoft:internet_explorer:11:*:*:*:*:*:*:*" ]
null
null
null
9.3
cisco-sa-wsa-xss-RuB5WGqL
Cisco Web Security Appliance Stored Cross-Site Scripting Vulnerability
A vulnerability in the web-based management interface of Cisco AsyncOS for Cisco Web Security Appliance (WSA) could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device. The vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by inserting malicious data into a specific data field in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
[]
null
4.8
null
null
GHSA-62gw-p866-4mj6
SQL injection vulnerability in the NinjaMonials (com_ninjamonials) component for Joomla! allows remote attackers to execute arbitrary SQL commands via the Itemid parameter in a display action to index.php.
[]
null
null
null
null
RHSA-2024:4379
Red Hat Security Advisory: gvisor-tap-vsock security update
golang-fips/openssl: Memory leaks in code encrypting and decrypting RSA payloads
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
7.5
null
null
GHSA-rxx7-mqqx-phw8
sympa version 6.2.16 and later contains a CWE-601: URL Redirection to Untrusted Site ('Open Redirect') vulnerability in The "referer" parameter of the wwsympa.fcgi login action. that can result in Open redirection and reflected XSS via data URIs. This attack appear to be exploitable via Victim's browser must follow a URL supplied by the attacker. This vulnerability appears to have been fixed in none available.
[]
null
null
6.1
null
CVE-2021-4212
A potential vulnerability in the SMI callback function used in the Legacy BIOS mode driver in some Lenovo Notebook models may allow an attacker with local access and elevated privileges to execute arbitrary code.
[ "cpe:2.3:o:lenovo:c340-14iml_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:c340-14iml:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:c340-15iml_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:c340-15iml:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:d330-10igm_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:d330-10igm:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:duet_3-10igl5_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:duet_3-10igl5:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:e41-50_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:e41-50:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:flex-14iml_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:flex-14iml:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:flex-15iml_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:flex-15iml:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideapad_3-14are05_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideapad_3-14are05:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideapad_3-15are05_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideapad_3-15are05:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideapad_3-17are05_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideapad_3-17are05:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideapad_5-14alc05_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideapad_5-14alc05:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideapad_5-14are05_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideapad_5-14are05:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideapad_5-15itl05_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideapad_5-15itl05:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideapad_5_pro-14acn6_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideapad_5_pro-14acn6:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideapad_5_pro-14itl6_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideapad_5_pro-14itl6:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideapad_5_pro-16ihu6_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideapad_5_pro-16ihu6:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideapad_creator_5-15imh05_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideapad_creator_5-15imh05:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideapad_gaming_3-15ach6_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideapad_gaming_3-15ach6:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideapad_gaming_3-15arh05_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideapad_gaming_3-15arh05:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideapad_gaming_3-15imh05_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideapad_gaming_3-15imh05:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:l340-15irh_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:l340-15irh:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:l340-15iwl_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:l340-15iwl:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:l340-15iwl_touch_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:l340-15iwl_touch:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:l340-17irh_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:l340-17irh:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:l340-17iwl_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:l340-17iwl:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:legion_y540-15irh_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:legion_y540-15irh:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:legion_y540-15irh-pg0_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:legion_y540-15irh-pg0:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:legion_y540-17irh_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:legion_y540-17irh:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:legion_y540-17irh-pg0_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:legion_y540-17irh-pg0:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:legion_y545_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:legion_y545:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:legion_y545-pg0_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:legion_y545-pg0:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:legion_y7000-2019_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:legion_y7000-2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:legion_y7000-2019-pg0_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:legion_y7000-2019-pg0:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:s340-13iml_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:s340-13iml:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:s340-14api_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:s340-14api:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:s340-14iml_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:s340-14iml:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:s340-15api_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:s340-15api:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:s340-15api_touch_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:s340-15api_touch:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:s340-15iml_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:s340-15iml:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:s540-14iml_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:s540-14iml:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:s540-14iml_touch_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:s540-14iml_touch:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:s540-15iml_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:s540-15iml:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:slim_7-14are05_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:slim_7-14are05:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:slim_7-14itl05_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:slim_7-14itl05:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:slim_7-15iil05_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:slim_7-15iil05:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:slim_7-15imh05_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:slim_7-15imh05:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:slim_7-15itl05_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:slim_7-15itl05:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkbook_13x_itg_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkbook_13x_itg:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkbook_14_g3_itl_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkbook_14_g3_itl:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkbook_plus_g2_itg_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkbook_plus_g2_itg:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v14-are_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v14-are:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v140-15iwl_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v140-15iwl:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v340-17iwl_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v340-17iwl:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:yoga_6-13alc6_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:yoga_6-13alc6:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:yoga_creator_7-15imh05_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:yoga_creator_7-15imh05:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:yoga_slim_7-14are05_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:yoga_slim_7-14are05:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:yoga_slim_7-14iil05_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:yoga_slim_7-14iil05:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:yoga_slim_7-14itl05_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:yoga_slim_7-14itl05:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:yoga_slim_7-15iil05_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:yoga_slim_7-15iil05:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:yoga_slim_7-15imh05_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:yoga_slim_7-15imh05:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:yoga_slim_7-15itl05_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:yoga_slim_7-15itl05:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:yoga_slim_7_carbon_13itl5_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:yoga_slim_7_carbon_13itl5:-:*:*:*:*:*:*:*" ]
null
6.7
null
null
GHSA-h7vp-qvfw-h2f3
Mail::Audit module in libmail-audit-perl 2.1-5, when logging is enabled without a default log file specified, uses predictable log filenames, which allows local users to overwrite arbitrary files via a symlink attack on the [PID]-audit.log temporary file.
[]
null
null
null
null
GHSA-qx4x-jg45-h572
In Emerson Rosemount GC370XA, GC700XA, and GC1500XA products, an unauthenticated user with network access could obtain access to sensitive information or cause a denial-of-service condition.
[]
null
6.9
null
null
GHSA-7hmg-vfm5-895r
MotionPro in Array ArrayOS AG before 9.4.0.505 on AG and vxAG allows remote command execution via crafted packets. AG and vxAG 9.3.0.259.x are unaffected.
[]
null
9.8
null
null
GHSA-h3cw-j9j9-5pc4
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, and OpenJDK 7, allows user-assisted remote attackers to bypass the Java security sandbox via unspecified vectors related to JMX, aka "Issue 52," a different vulnerability than CVE-2013-1490.
[]
null
5.3
null
null
GHSA-vxg3-frf4-qwph
Windows NTLM Elevation of Privilege Vulnerability.
[]
null
7.8
null
null
CVE-2015-9261
huft_build in archival/libarchive/decompress_gunzip.c in BusyBox before 1.27.2 misuses a pointer, causing segfaults and an application crash during an unzip operation on a specially crafted ZIP file.
[ "cpe:2.3:a:busybox:busybox:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*" ]
null
5.5
null
4.3
GHSA-h5x9-6828-fhq5
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley MicroStation CONNECT 10.16.0.80. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of J2K images. Crafted data in a J2K image can trigger a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-15377.
[]
null
null
null
null
CVE-2022-46364
Apache CXF SSRF Vulnerability
A SSRF vulnerability in parsing the href attribute of XOP:Include in MTOM requests in versions of Apache CXF before 3.5.5 and 3.4.10 allows an attacker to perform SSRF style attacks on webservices that take at least one parameter of any type. 
[ "cpe:2.3:a:apache:cxf:*:*:*:*:*:*:*:*" ]
null
9.8
null
null
CVE-2015-8223
Huawei P7 before P7-L00C17B851, P7-L05C00B851, and P7-L09C92B85, and P8 ALE-UL00 before ALE-UL00B211 allows local users to cause a denial of service (OS crash) by leveraging camera permissions and via crafted input to the camera driver.
[ "cpe:2.3:o:huawei:p7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:p7:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:p8_ale-ul00_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:p8_ale-ul00:-:*:*:*:*:*:*:*" ]
null
null
5.5
4.9
GHSA-jf9v-867q-hmcf
School Management System commit bae5aa was discovered to contain a SQL injection vulnerability via the password parameter at login.php
[]
null
8.8
null
null
CVE-2013-4534
Buffer overflow in hw/intc/openpic.c in QEMU before 1.7.2 allows remote attackers to cause a denial of service or possibly execute arbitrary code via vectors related to IRQDest elements.
[ "cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:0.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:0.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:0.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:0.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:0.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:0.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:0.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:0.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:0.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:0.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:0.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:0.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:0.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:0.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:0.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:0.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:0.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:0.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:0.5.5:*:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:0.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:0.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:0.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:0.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:0.7.2:*:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:0.8.0:*:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:0.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:0.8.2:*:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:0.9.0:*:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:0.9.1:*:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:0.9.1-5:*:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:0.10.0:*:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:0.10.1:*:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:0.10.2:*:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:0.10.3:*:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:0.10.4:*:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:0.10.5:*:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:0.10.6:*:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:0.11.0:*:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:0.11.0:rc0:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:0.11.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:0.11.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:0.11.0-rc0:*:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:0.11.0-rc1:*:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:0.11.0-rc2:*:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:0.11.1:*:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:0.12.0:*:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:0.12.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:0.12.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:0.12.1:*:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:0.12.2:*:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:0.12.3:*:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:0.12.4:*:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:0.12.5:*:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:0.13.0:*:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:0.13.0:rc0:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:0.13.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:0.14.0:*:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:0.14.0:rc0:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:0.14.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:0.14.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:0.14.1:*:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:0.15.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:0.15.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:0.15.1:*:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:0.15.2:*:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:1.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:1.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:1.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:1.0:rc4:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:1.1:rc1:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:1.1:rc2:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:1.1:rc3:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:1.1:rc4:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:1.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:1.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:1.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:1.5.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:1.5.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:1.5.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:1.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:1.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:1.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:1.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:1.6.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:1.6.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:1.6.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:1.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:1.6.2:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-7ffc-hwfp-9xhq
** UNSUPPORTED WHEN ASSIGNED ** ThinkUp 2.0-beta.10 is affected by a path manipulation vulnerability in Smarty.class.php.
[]
null
9.8
null
null
CVE-2022-22401
IBM Aspera Faspex information disclosure
IBM Aspera Faspex 5.0.5 could allow a remote attacker to gather or persuade a naive user to supply sensitive information. IBM X-Force ID: 222567.
[ "cpe:2.3:a:ibm:aspera_faspex:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*" ]
null
5.9
null
null
CVE-2019-15258
Cisco SPA100 Series Analog Telephone Adapters Web Management Interface Denial of Service Vulnerability
A vulnerability in the web-based management interface of Cisco SPA100 Series Analog Telephone Adapters (ATAs) could allow an authenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to improper validation of user-supplied requests to the web-based management interface. An attacker could exploit this vulnerability by sending a crafted request to the web-based management interface of an affected device. A successful exploit could allow the attacker to cause the device to stop responding, requiring manual intervention for recovery.
[ "cpe:2.3:o:cisco:spa112_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:spa112_firmware:1.4.1:-:*:*:*:*:*:*", "cpe:2.3:o:cisco:spa112_firmware:1.4.1:sr1:*:*:*:*:*:*", "cpe:2.3:o:cisco:spa112_firmware:1.4.1:sr2:*:*:*:*:*:*", "cpe:2.3:o:cisco:spa112_firmware:1.4.1:sr3:*:*:*:*:*:*", "cpe:2.3:h:cisco:spa112:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:spa122_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:spa122_firmware:1.4.1:-:*:*:*:*:*:*", "cpe:2.3:o:cisco:spa122_firmware:1.4.1:sr1:*:*:*:*:*:*", "cpe:2.3:o:cisco:spa122_firmware:1.4.1:sr2:*:*:*:*:*:*", "cpe:2.3:o:cisco:spa122_firmware:1.4.1:sr3:*:*:*:*:*:*", "cpe:2.3:h:cisco:spa122:-:*:*:*:*:*:*:*" ]
null
null
6.5
null
CVE-2017-12348
Multiple vulnerabilities in the web-based management interface of Cisco UCS Central Software could allow a remote attacker to conduct a cross-site scripting (XSS) attack against a user of the affected interface or hijack a valid session ID from a user of the affected interface. Cisco Bug IDs: CSCvf71978, CSCvf71986.
[ "cpe:2.3:a:cisco:unified_computing_system_central_software:2.2\\(1a\\)a:*:*:*:*:*:*:*" ]
null
null
5.4
3.5
GHSA-hjxm-p5wf-9v7p
Integer underflow in lzhsr.dll in Autonomy KeyView, as used in IBM Lotus Notes before 8.5.2 FP3, allows remote attackers to execute arbitrary code via a crafted header in a .lzh attachment that triggers a stack-based buffer overflow, aka SPR PRAD88MJ2W.
[]
null
null
null
null
GHSA-7wxc-mh8q-7484
An issue found in IXP Data Easy Install v.6.6.14884.0 allows an attacker to escalate privileges via lack of permissions applied to sub directories.
[]
null
7.8
null
null
CVE-2019-19637
An issue was discovered in libsixel 1.8.2. There is an integer overflow in the function sixel_decode_raw_impl at fromsixel.c.
[ "cpe:2.3:a:libsixel_project:libsixel:1.8.2:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
CVE-2025-23846
WordPress Flexible Blogtitle Plugin <= 0.1 - Reflected Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Kolja Nolte Flexible Blogtitle allows Reflected XSS. This issue affects Flexible Blogtitle: from n/a through 0.1.
[]
null
7.1
null
null
GHSA-p8mc-767v-qwwh
Unspecified vulnerability in the PeopleSoft Enterprise HRMS component in Oracle PeopleSoft and JDEdwards Suite 9.0 Bundle #14 and 9.1 Bundle #4 allows remote authenticated users to affect confidentiality via unknown vectors related to Talent Acquisition Manager.
[]
null
null
null
null
CVE-2023-25520
NVIDIA Jetson Linux Driver Package contains a vulnerability in nvbootctrl, where a privileged local attacker can configure invalid settings, resulting in denial of service.
[ "cpe:2.3:o:nvidia:jetson_linux:*:*:*:*:*:*:*:*", "cpe:2.3:h:nvidia:jetson_agx_xavier:-:*:*:*:*:*:*:*", "cpe:2.3:h:nvidia:jetson_tx2:-:*:*:*:*:*:*:*", "cpe:2.3:h:nvidia:jetson_tx2_nx:-:*:*:*:*:*:*:*", "cpe:2.3:h:nvidia:jetson_xavier_nx:-:*:*:*:*:*:*:*" ]
null
4.4
null
null
GHSA-3724-xmqw-2wwv
Zulip Server before 2.1.3 allows XSS via the modal_link feature in the Markdown functionality.
[]
null
null
null
null
CVE-2024-11895
Online Payments – Get Paid with PayPal, Square & Stripe <= 3.20.0 - Authenticated (Contributor+) Stored Cross-Site Scripting
The Online Payments – Get Paid with PayPal, Square & Stripe plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcodes in all versions up to, and including, 3.20.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
6.4
null
null
GHSA-5ch5-4vm6-3g39
Multiple unspecified vulnerabilities in Attachmate Reflection for Secure IT UNIX Client and Server before 7.0 SP1 have unknown impact and attack vectors, aka "security vulnerabilities found by 3rd party analysis."
[]
null
null
null
null
cisco-sa-fmc-xss-yT8LNSeA
Cisco Firepower Management Center Software Cross-Site Scripting Vulnerabilities
Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information. Cisco has released software updates to address these vulnerabilities. There are no workarounds that address these vulnerabilities.
[]
null
4.8
null
null
CVE-2008-1769
VLC before 0.8.6f allow remote attackers to cause a denial of service (crash) via a crafted Cinepak file that triggers an out-of-bounds array access and memory corruption.
[ "cpe:2.3:a:videolan:vlc:0.1.99:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc:0.1.99a:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc:0.1.99b:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc:0.1.99c:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc:0.1.99d:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc:0.1.99e:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc:0.1.99f:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc:0.1.99g:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc:0.1.99h:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc:0.1.99i:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc:0.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc:0.2.50:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc:0.2.60:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc:0.2.61:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc:0.2.62:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc:0.2.63:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc:0.2.70:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc:0.2.71:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc:0.2.72:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc:0.2.73:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc:0.2.80:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc:0.2.81:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc:0.2.82:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc:0.2.83:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc:0.2.90:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc:0.2.91:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc:0.2.92:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc:0.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc:0.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc:0.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc:0.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc:0.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc:0.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc:0.4.3_ac3:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc:0.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc:0.4.5:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc:0.4.6:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc:0.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc:0.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc:0.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc:0.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc:0.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc:0.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc:0.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc:0.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc:0.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc:0.7.2:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc:0.8.0:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc:0.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc:0.8.2:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc:0.8.4:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc:0.8.4a:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc:0.8.5:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc:0.8.6:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc:0.8.6a:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc:0.8.6b:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc:0.8.6c:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc:0.8.6d:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc:0.8.6e:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc:0.8.1337:*:*:*:*:*:*:*" ]
null
null
null
6.8
CVE-2005-1769
Multiple cross-site scripting (XSS) vulnerabilities in SquirrelMail 1.4.0 through 1.4.4 allow remote attackers to inject arbitrary web script or HTML via unknown attack vectors in (1) the URL or (2) an e-mail message.
[ "cpe:2.3:a:squirrelmail:squirrelmail:1.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:squirrelmail:squirrelmail:1.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:squirrelmail:squirrelmail:1.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:squirrelmail:squirrelmail:1.4.3_rc1:*:*:*:*:*:*:*", "cpe:2.3:a:squirrelmail:squirrelmail:1.4.3a:*:*:*:*:*:*:*", "cpe:2.3:a:squirrelmail:squirrelmail:1.44:*:*:*:*:*:*:*" ]
null
null
null
4.3
CVE-2004-1075
Cross-site scripting (XSS) vulnerability in standard_error_message.dtml for Zwiki after 0.10.0rc1 to 0.36.2 allows remote attackers to inject arbitrary HTML and web script via a malformed URL, which is not properly cleansed when generating an error message.
[ "cpe:2.3:a:zwiki:zwiki:0.10_rc1:*:*:*:*:*:*:*", "cpe:2.3:a:zwiki:zwiki:0.36.2:*:*:*:*:*:*:*" ]
null
null
null
6.8
CVE-2016-10332
In all Android releases from CAF using the Linux kernel, stack protection was not enabled for secure applications.
[ "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*" ]
null
null
5.5
4.3
GHSA-59vq-j7xp-3fmj
Use-after-free vulnerability in Google Chrome before 20.0.1132.43 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to SVG resources.
[]
null
null
null
null
CVE-2014-6923
The Dubrovnik Guided Walking Tours (aka com.mytoursapp.android.app351) application 1.3.2 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[ "cpe:2.3:a:mobitrips:dubrovnik_guided_walking_tours:1.3.2:*:*:*:*:android:*:*" ]
null
null
null
5.4
GHSA-6r69-3xcf-x5gg
IBM InfoSphere Information Server 11.7 could disclose sensitive user information to another user with physical access to the machine. IBM X-Force ID: 294727.
[]
null
2.4
null
null
GHSA-vqrj-75mr-c9xv
In soter service, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with System execution privileges needed.
[]
null
4.4
null
null
CVE-2025-2379
PHPGurukul Apartment Visitors Management System create-pass.php sql injection
A vulnerability was found in PHPGurukul Apartment Visitors Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /create-pass.php. The manipulation of the argument visname leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
[]
6.9
7.3
7.3
7.5
CVE-2018-10824
An issue was discovered on D-Link DWR-116 through 1.06, DIR-140L through 1.02, DIR-640L through 1.02, DWR-512 through 2.02, DWR-712 through 2.02, DWR-912 through 2.02, DWR-921 through 2.02, and DWR-111 through 1.01 devices. The administrative password is stored in plaintext in the /tmp/csman/0 file. An attacker having a directory traversal (or LFI) can easily get full router access.
[ "cpe:2.3:o:dlink:dwr-116_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:dwr-116:-:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dir-140l_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:dir-140l:-:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dir-640l_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:dir-640l:-:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dwr-512_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:dwr-512:-:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dwr-712_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:dwr-712:-:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dwr-912_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:dwr-921:-:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dwr-921_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dwr-111_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:dwr-111:-:*:*:*:*:*:*:*" ]
null
9.8
null
5
GHSA-75p2-hgw4-g7f7
AutoUpdater.NET allows XXE
AutoUpdater.cs in AutoUpdater.NET before 1.5.8 allows XXE.
[]
null
9.8
null
null
GHSA-hp8q-38h9-gmmv
TOTOLINK CP300+ V5.2cu.7594_B20200910 and before is vulnerable to command injection.
[]
null
9.8
null
null
GHSA-5pf6-cq2v-23ww
WhoDB Allows Unbounded Memory Consumption in Authentication Middleware Can Lead to Denial of Service
SummaryA Denial of Service (DoS) vulnerability in the authentication middleware allows any client to cause memory exhaustion by sending large request bodies. The server reads the entire request body into memory without size limits, creating multiple copies during processing, which can lead to Out of Memory conditions.Affects all versions up to the latest one (v0.43.0).DetailsThe vulnerability exists in the AuthMiddleware function in `core/src/auth/auth.go`. The middleware processes all API requests (`/api/*`) and reads the entire request body using `io.ReadAll` without any size limits:The issue is amplified by:A generous 10-minute timeout (`middleware.Timeout(10*time.Minute)`)High throttle limits (10000 concurrent requests, 1000 backlog)Multiple copies of the request body being created during processingNo per-client rate limitingPoCRun the latest WhoDB:Prepare a PoC Python script:Run the script and observe memory usage of the WhoDB container. Run it a few times in parallel, or increase the payload size. I was able to hit the OOM killer on a 8 GB VM quickly. Process "core" is the entrypoint of the container.ImpactSeverity: HighAuthentication Required: No (public API endpoint)Affected Components: All API endpoints (`/api/*`)Impact Type: Denial of ServiceAny client can send arbitrarily large request bodies to the API endpoints. Due to the multiple copies created during processing and lack of size limits, this can quickly exhaust server memory, potentially affecting all users of the system. The high concurrent request limits and long timeout make this particularly effective for DoS attacks.Fix considerations:Implement request body size limits using `http.MaxBytesReader`Reduce the request timeout from 10 minutesImplement per-client rate limitingConsider streaming body processing instead of loading entirely into memory
[]
null
7.5
null
null
CVE-2013-3356
Buffer overflow in Adobe Reader and Acrobat before 10.1.8 and 11.x before 11.0.04 on Windows and Mac OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2013-3353.
[ "cpe:2.3:a:adobe:acrobat:11.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:11.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:11.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:11.0.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:11.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:11.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:11.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:11.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.0:-:pro:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.0.1:-:pro:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:10.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:10.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:10.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:10.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:10.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:10.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:10.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:10.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:10.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:10.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:10.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:10.1.7:*:*:*:*:*:*:*" ]
null
null
null
10
GHSA-jh78-wfmg-g7qq
Improper access control and open directories in Ivanti LANDESK Management Suite (LDMS, aka Endpoint Manager) 10.0.1.168 Service Update 5 may lead to remote disclosure of administrator passwords.
[]
null
null
null
null
GHSA-5p3m-cq5g-w2cc
Possible buffer overflow in data offload handler due to lack of check of keydata length when copying data in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking in APQ8009, APQ8017, APQ8053, APQ8064, APQ8096, APQ8096AU, IPQ6018, IPQ8074, MDM9206, MDM9207C, MDM9607, MDM9640, MDM9650, MSM8996AU, Nicobar, QCA4531, QCA6174A, QCA6564, QCA6574, QCA6574AU, QCA6584, QCA6584AU, QCA9377, QCA9379, QCA9886, QCS405, QCS605, Rennell, SA6155P, SC8180X, SDA660, SDM630, SDM636, SDM660, SDM670, SDM710, SDM845, SDX20, SDX24, SM6150, SM7150, SM8150, SXR1130, SXR2130
[]
null
null
null
null
GHSA-7cqv-r3p7-crpx
The Camera driver in Huawei Honor 4C smartphones with software CHM-UL00C00 before CHM-UL00C00B564, CHM-TL00C01 before CHM-TL00C01B564, and CHM-TL00C00 before CHM-TL00HC00B564 allows attackers to cause a denial of service (system crash) or gain privileges via a crafted application, a different vulnerability than CVE-2016-6180, CVE-2016-6182, CVE-2016-6183, and CVE-2016-6184.
[]
null
null
7
null
CVE-2017-7735
A Cross-Site Scripting vulnerability in Fortinet FortiOS versions 5.2.0 through 5.2.11 and 5.4.0 through 5.4.4 allows attackers to execute unauthorized code or commands via the "Groups" input while creating or editing User Groups.
[ "cpe:2.3:o:fortinet:fortios:5.2.0:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortios:5.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortios:5.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortios:5.2.3:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortios:5.2.4:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortios:5.2.5:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortios:5.2.6:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortios:5.2.7:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortios:5.2.8:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortios:5.2.9:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortios:5.2.10:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortios:5.2.11:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortios:5.4.0:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortios:5.4.1:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortios:5.4.2:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortios:5.4.3:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortios:5.4.4:*:*:*:*:*:*:*" ]
null
null
5.4
3.5
CVE-2023-32293
WordPress WRC Pricing Tables plugin <= 2.3.7 - Broken Access Control vulnerability
Missing Authorization vulnerability in Realwebcare WRC Pricing Tables allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WRC Pricing Tables: from n/a through 2.3.7.
[ "cpe:2.3:a:realwebcare:wrc_pricing_tables:-:*:*:*:*:wordpress:*:*" ]
null
5.3
null
null
GHSA-47r3-3h3h-gh9w
GE Gas Power ToolBoxST Version v04.07.05C suffers from an XML external entity (XXE) vulnerability using the DTD parameter entities technique that could result in disclosure and retrieval of arbitrary data on the affected node via an out-of-band (OOB) attack. The vulnerability is triggered when input passed to the XML parser is not sanitized while parsing the XML project/template file.
[]
null
7.5
null
null
GHSA-56x7-v79h-p2jx
Cross-site scripting (XSS) vulnerability in the Server component in CA Host-Based Intrusion Prevention System (HIPS) before 8.0.0.93 allows remote attackers to inject arbitrary web script or HTML via requests that are written to logs for later display in the log viewer.
[]
null
null
null
null
CVE-2019-13252
ACDSee Free 1.1.21 has a User Mode Write AV starting at IDE_ACDStd!IEP_SetColorProfile+0x00000000001172b0.
[ "cpe:2.3:a:acdsee:acdsee:1.1.21:*:*:*:free:*:*:*" ]
null
null
7.8
6.8
CVE-2005-3705
Heap-based buffer overflow in WebKit in Mac OS X and OS X Server 10.3.9 and 10.4.3, as used in applications such as Safari, allows remote attackers to execute arbitrary code via unknown attack vectors.
[ "cpe:2.3:o:apple:mac_os_x:10.3.9:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.4.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.3.9:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.4.3:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-r9jr-jpgm-rcwh
The issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13.6, tvOS 17, macOS Monterey 12.7, watchOS 10, iOS 17 and iPadOS 17. An app may be able to execute arbitrary code with kernel privileges.
[]
null
7.8
null
null
CVE-2019-16199
eQ-3 Homematic CCU2 before 2.47.18 and CCU3 before 3.47.18 allow Remote Code Execution by unauthenticated attackers with access to the web interface via an HTTP POST request to certain URLs related to the ReGa core process.
[ "cpe:2.3:o:eq-3:homematic_ccu2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:eq-3:homematic_ccu2:-:*:*:*:*:*:*:*", "cpe:2.3:o:eq-3:homematic_ccu3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:eq-3:homematic_ccu3:-:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
GHSA-37wj-v394-2xvc
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Drupal Facets allows Cross-Site Scripting (XSS).This issue affects Facets: from 0.0.0 before 2.0.9.
[]
null
6.1
null
null
GHSA-pf33-mp3w-9986
Unspecified vulnerability in the LDAP dissector in Wireshark (formerly Ethereal) 0.99.3 allows remote attackers to cause a denial of service (crash) via a crafted LDAP packet.
[]
null
null
null
null
CVE-2009-4855
SQL injection vulnerability in index.php in TYPO3 4.0 allows remote attackers to execute arbitrary SQL commands via the showUid parameter. NOTE: the TYPO3 Security Team disputes this report, stating that "there is no such vulnerability... The showUid parameter is generally used in third-party TYPO3 extensions - not in TYPO3 Core.
[ "cpe:2.3:a:typo3:typo3:4.0:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-p6jx-jgrw-xrp7
Trango Apex <= 2.1.1, ApexLynx < 2.0, ApexOrion < 2.0, ApexPlus <= 3.2.0, Giga <= 2.6.1, GigaLynx < 2.0, GigaOrion < 2.0, GigaPlus <= 3.2.3, GigaPro <= 1.4.1, StrataLink < 3.0, and StrataPro devices have a built-in, hidden root account, with a default password that was once stored in cleartext within a software update package on a Trango FTP server. This account is accessible via SSH and/or TELNET, and grants access to the underlying embedded UNIX OS on the device, allowing full control over it.
[]
null
9.8
null
null
GHSA-7752-h8p6-727f
Microsoft Internet Explorer 7 through 11 and Microsoft Edge allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Memory Corruption Vulnerability," a different vulnerability than CVE-2015-2487, CVE-2015-2490, CVE-2015-2492, CVE-2015-2494, CVE-2015-2498, and CVE-2015-2499.
[]
null
null
null
null
GHSA-jgjj-vmw4-3g37
In the Linux kernel, the following vulnerability has been resolved:md: Don't ignore suspended array in md_check_recovery()mddev_suspend() never stop sync_thread, hence it doesn't make sense to ignore suspended array in md_check_recovery(), which might cause sync_thread can't be unregistered.After commit f52f5c71f3d4 ("md: fix stopping sync thread"), following hang can be triggered by test shell/integrity-caching.sh:suspend the array: raid_postsuspend mddev_suspendstop the array: raid_dtr md_stop __md_stop_writes stop_sync_thread set_bit(MD_RECOVERY_INTR, &mddev->recovery); md_wakeup_thread_directly(mddev->sync_thread); wait_event(..., !test_bit(MD_RECOVERY_RUNNING, &mddev->recovery))sync thread done: md_do_sync set_bit(MD_RECOVERY_DONE, &mddev->recovery); md_wakeup_thread(mddev->thread);daemon thread can't unregister sync thread: md_check_recovery if (mddev->suspended) return; -> return directly md_read_sync_thread clear_bit(MD_RECOVERY_RUNNING, &mddev->recovery); -> MD_RECOVERY_RUNNING can't be cleared, hence step 2 hang;This problem is not just related to dm-raid, fix it by ignoring suspended array in md_check_recovery(). And follow up patches will improve dm-raid better to frozen sync thread during suspend.
[]
null
5.5
null
null
CVE-2017-2357
An issue was discovered in certain Apple products. macOS before 10.12.3 is affected. The issue involves the "IOAudioFamily" component. It allows attackers to obtain sensitive kernel memory-layout information via a crafted app.
[ "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*" ]
null
null
3.3
4.3
GHSA-ch74-qvc9-j4fg
The Buzzsprout Podcasting plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'buzzsprout' shortcode in versions up to, and including, 1.8.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
6.4
null
null
CVE-2017-8083
CompuLab Intense PC and MintBox 2 devices with BIOS before 2017-05-21 do not use the CloseMnf protection mechanism for write protection of flash memory regions, which allows local users to install a firmware rootkit by leveraging administrative privileges.
[ "cpe:2.3:o:compulab:intense_pc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:compulab:intense_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:compulab:mintbox_2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:compulab:mintbox_2:-:*:*:*:*:*:*:*" ]
null
null
6.7
7.2
CVE-2018-13597
The mintToken function of a smart contract implementation for testcoin, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value.
[ "cpe:2.3:a:testcoin_project:testcoin:-:*:*:*:*:*:*:*" ]
null
null
7.5
5
CVE-2008-1226
Multiple cross-site scripting (XSS) vulnerabilities in Zimbra Collaboration Suite (ZCS) 4.0.3, 4.5.6, and possibly other versions before 4.5.10 allow remote attackers to inject arbitrary web script or HTML via an e-mail attachment, possibly involving a (1) .jpg or (2) .gif image attachment.
[ "cpe:2.3:a:zimbra:collaboration_suite:4.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration_suite:4.5.6:*:*:*:*:*:*:*" ]
null
null
null
4.3
CVE-2021-33676
A missing authority check in SAP CRM, versions - 700, 701, 702, 712, 713, 714, could be leveraged by an attacker with high privileges to compromise confidentiality, integrity, or availability of the system.
[ "cpe:2.3:a:sap:customer_relationship_management:700:*:*:*:*:*:*:*", "cpe:2.3:a:sap:customer_relationship_management:701:*:*:*:*:*:*:*", "cpe:2.3:a:sap:customer_relationship_management:702:*:*:*:*:*:*:*", "cpe:2.3:a:sap:customer_relationship_management:712:*:*:*:*:*:*:*", "cpe:2.3:a:sap:customer_relationship_management:713:*:*:*:*:*:*:*", "cpe:2.3:a:sap:customer_relationship_management:714:*:*:*:*:*:*:*" ]
null
null
6.8
null
GHSA-p9qg-6v6v-2g47
zhimengzhe iBarn v1.5 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the $search parameter at /pay.php.
[]
null
6.3
null
null
GHSA-2mg7-924f-g32v
The srtp_add_address function in epan/dissectors/packet-rtp.c in the RTP dissector in Wireshark 1.10.x before 1.10.7 does not properly update SRTP conversation data, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
[]
null
null
null
null
CVE-2018-10430
An issue was discovered in DiliCMS (aka DiligentCMS) 2.4.0. There is a Stored XSS Vulnerability in the fourth textbox of "System setting->site setting" of admin/index.php.
[ "cpe:2.3:a:dilicms:dilicms:2.4.0:*:*:*:*:*:*:*" ]
null
null
4.8
3.5
CVE-2019-8922
A heap-based buffer overflow was discovered in bluetoothd in BlueZ through 5.48. There isn't any check on whether there is enough space in the destination buffer. The function simply appends all data passed to it. The values of all attributes that are requested are appended to the output buffer. There are no size checks whatsoever, resulting in a simple heap overflow if one can craft a request where the response is large enough to overflow the preallocated buffer. This issue exists in service_attr_req gets called by process_request (in sdpd-request.c), which also allocates the response buffer.
[ "cpe:2.3:a:bluez:bluez:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*" ]
null
8.8
null
5.8
GHSA-p5fq-87jh-gjq8
Information disclosure vulnerability in Verizon Fios Quantum Gateway (G1100) firmware version 02.01.00.05 allows an remote, unauthenticated attacker to retrieve the value of the password salt by simply requesting an API URL in a web browser (e.g. /api).
[]
null
null
7.5
null
GHSA-jqhv-47hf-83hh
The TS Poll WordPress plugin before 2.4.0 does not sanitize and escape a parameter before using it in a SQL statement, allowing admins to perform SQL injection attacks
[]
null
7.2
null
null