id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
57.2k
cpes
sequencelengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
CVE-2006-1761
Cross-site scripting vulnerability in index.php in blur6ex 0.3.452 allows remote attackers to inject arbitrary web script or HTML via the errormsg parameter, which is not sanitized in the error message. NOTE: the vector in the shard parameter is not XSS and has been assigned a separate name.
[ "cpe:2.3:a:blursoft:blur6ex:0.3.462:*:*:*:*:*:*:*" ]
null
null
null
2.6
GHSA-56mp-522g-cw9g
An IDOR exists in < 12.3.2, < 12.2.6, and < 12.1.12 for GitLab Community Edition (CE) and Enterprise Edition (EE) that allowed a project owner or maintainer to see the members of any private group via merge request approval rules.
[]
null
null
null
null
GHSA-cjgr-h69p-cj83
Race condition in the tty_fasync function in drivers/char/tty_io.c in the Linux kernel before 2.6.32.6 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via unknown vectors, related to the put_tty_queue and __f_setown functions. NOTE: the vulnerability was addressed in a different way in 2.6.32.9.
[]
null
4.7
null
null
CVE-2017-7984
In Joomla! 3.2.0 through 3.6.5 (fixed in 3.7.0), inadequate filtering leads to XSS in the template manager component.
[ "cpe:2.3:a:joomla:joomla\\!:3.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.4.0:alpha:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.4.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.4.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.4.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.4.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.4.1:rc1:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.4.1:rc2:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.4.2:rc1:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.4.5:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.4.6:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.4.7:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.4.8:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.4.8:rc:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.5.0:beta:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.5.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.5.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.5.0:beta4:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.5.0:beta5:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.5.0:rc:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.5.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.5.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.5.0:rc4:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.5.1:rc:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.6.0:alpha:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.6.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.6.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.6.0:rc:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.6.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.6.1:rc1:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.6.1:rc2:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.6.3:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.6.3:rc1:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.6.3:rc2:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.6.3:rc3:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.6.4:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.6.5:*:*:*:*:*:*:*" ]
null
null
6.1
4.3
GHSA-hwhh-xm47-jghm
In the Linux kernel, the following vulnerability has been resolved:netfilter: nf_conncount: Fully initialize struct nf_conncount_tuple in insert_tree()Since commit b36e4523d4d5 ("netfilter: nf_conncount: fix garbage collection confirm race"), `cpu` and `jiffies32` were introduced to the struct nf_conncount_tuple.The commit made nf_conncount_add() initialize `conn->cpu` and `conn->jiffies32` when allocating the struct. In contrast, count_tree() was not changed to initialize them.By commit 34848d5c896e ("netfilter: nf_conncount: Split insert and traversal"), count_tree() was split and the relevant allocation code now resides in insert_tree(). Initialize `conn->cpu` and `conn->jiffies32` in insert_tree().BUG: KMSAN: uninit-value in find_or_evict net/netfilter/nf_conncount.c:117 [inline] BUG: KMSAN: uninit-value in __nf_conncount_add+0xd9c/0x2850 net/netfilter/nf_conncount.c:143 find_or_evict net/netfilter/nf_conncount.c:117 [inline] __nf_conncount_add+0xd9c/0x2850 net/netfilter/nf_conncount.c:143 count_tree net/netfilter/nf_conncount.c:438 [inline] nf_conncount_count+0x82f/0x1e80 net/netfilter/nf_conncount.c:521 connlimit_mt+0x7f6/0xbd0 net/netfilter/xt_connlimit.c:72 __nft_match_eval net/netfilter/nft_compat.c:403 [inline] nft_match_eval+0x1a5/0x300 net/netfilter/nft_compat.c:433 expr_call_ops_eval net/netfilter/nf_tables_core.c:240 [inline] nft_do_chain+0x426/0x2290 net/netfilter/nf_tables_core.c:288 nft_do_chain_ipv4+0x1a5/0x230 net/netfilter/nft_chain_filter.c:23 nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline] nf_hook_slow+0xf4/0x400 net/netfilter/core.c:626 nf_hook_slow_list+0x24d/0x860 net/netfilter/core.c:663 NF_HOOK_LIST include/linux/netfilter.h:350 [inline] ip_sublist_rcv+0x17b7/0x17f0 net/ipv4/ip_input.c:633 ip_list_rcv+0x9ef/0xa40 net/ipv4/ip_input.c:669 __netif_receive_skb_list_ptype net/core/dev.c:5936 [inline] __netif_receive_skb_list_core+0x15c5/0x1670 net/core/dev.c:5983 __netif_receive_skb_list net/core/dev.c:6035 [inline] netif_receive_skb_list_internal+0x1085/0x1700 net/core/dev.c:6126 netif_receive_skb_list+0x5a/0x460 net/core/dev.c:6178 xdp_recv_frames net/bpf/test_run.c:280 [inline] xdp_test_run_batch net/bpf/test_run.c:361 [inline] bpf_test_run_xdp_live+0x2e86/0x3480 net/bpf/test_run.c:390 bpf_prog_test_run_xdp+0xf1d/0x1ae0 net/bpf/test_run.c:1316 bpf_prog_test_run+0x5e5/0xa30 kernel/bpf/syscall.c:4407 __sys_bpf+0x6aa/0xd90 kernel/bpf/syscall.c:5813 __do_sys_bpf kernel/bpf/syscall.c:5902 [inline] __se_sys_bpf kernel/bpf/syscall.c:5900 [inline] __ia32_sys_bpf+0xa0/0xe0 kernel/bpf/syscall.c:5900 ia32_sys_call+0x394d/0x4180 arch/x86/include/generated/asm/syscalls_32.h:358 do_syscall_32_irqs_on arch/x86/entry/common.c:165 [inline] __do_fast_syscall_32+0xb0/0x110 arch/x86/entry/common.c:387 do_fast_syscall_32+0x38/0x80 arch/x86/entry/common.c:412 do_SYSENTER_32+0x1f/0x30 arch/x86/entry/common.c:450 entry_SYSENTER_compat_after_hwframe+0x84/0x8eUninit was created at: slab_post_alloc_hook mm/slub.c:4121 [inline] slab_alloc_node mm/slub.c:4164 [inline] kmem_cache_alloc_noprof+0x915/0xe10 mm/slub.c:4171 insert_tree net/netfilter/nf_conncount.c:372 [inline] count_tree net/netfilter/nf_conncount.c:450 [inline] nf_conncount_count+0x1415/0x1e80 net/netfilter/nf_conncount.c:521 connlimit_mt+0x7f6/0xbd0 net/netfilter/xt_connlimit.c:72 __nft_match_eval net/netfilter/nft_compat.c:403 [inline] nft_match_eval+0x1a5/0x300 net/netfilter/nft_compat.c:433 expr_call_ops_eval net/netfilter/nf_tables_core.c:240 [inline] nft_do_chain+0x426/0x2290 net/netfilter/nf_tables_core.c:288 nft_do_chain_ipv4+0x1a5/0x230 net/netfilter/nft_chain_filter.c:23 nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline] nf_hook_slow+0xf4/0x400 net/netfilter/core.c:626 nf_hook_slow_list+0x24d/0x860 net/netfilter/core.c:663 NF_HOOK_LIST include/linux/netfilter.h:350 [inline] ip_sublist_rcv+0x17b7/0x17f0 net/ipv4/ip_input.c:633 ip_list_rcv+0x9ef/0xa40 net/ip ---truncated---
[]
null
5.5
null
null
CVE-2011-3848
Directory traversal vulnerability in Puppet 2.6.x before 2.6.10 and 2.7.x before 2.7.4 allows remote attackers to write X.509 Certificate Signing Request (CSR) to arbitrary locations via (1) a double-encoded key parameter in the URI in 2.7.x, (2) the CN in the Subject of a CSR in 2.6 and 0.25.
[ "cpe:2.3:a:puppet:puppet:2.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet:2.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet:2.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet:2.6.3:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet:2.6.4:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet:2.6.5:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet:2.6.6:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet:2.6.7:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet:2.6.8:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet:2.6.9:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet:2.7.2:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet:2.7.3:*:*:*:*:*:*:*", "cpe:2.3:a:puppetlabs:puppet:2.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:puppetlabs:puppet:2.7.1:*:*:*:*:*:*:*" ]
null
null
null
5
CVE-2023-38069
In JetBrains IntelliJ IDEA before 2023.1.4 license dialog could be suppressed in certain cases
[ "cpe:2.3:a:jetbrains:intellij_idea:*:*:*:*:*:*:*:*" ]
null
3.3
null
null
CVE-2024-43267
WordPress Mega Addons For Elementor plugin <= 1.9 - Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Qamar Sheeraz, Nasir Ahmad, GenialSouls Mega Addons For Elementor allows Stored XSS.This issue affects Mega Addons For Elementor: from n/a through 1.9.
[]
null
6.5
null
null
RHSA-2015:0865
Red Hat Security Advisory: Red Hat Satellite Proxy 5 - 40 Day End Of Life Notice
This is the 40 day notification of the End Of Life (EOL) plans for the following versions of Red Hat Satellite Proxy 5: * Red Hat Satellite Proxy 5.2 * Red Hat Satellite Proxy 5.3 * Red Hat Satellite Proxy 5.4 * Red Hat Satellite Proxy 5.5
[ "cpe:/a:redhat:network_proxy:5.2::el5", "cpe:/a:redhat:network_proxy:5.3::el5", "cpe:/a:redhat:network_proxy:5.4::el5", "cpe:/a:redhat:network_proxy:5.4::el6", "cpe:/a:redhat:network_proxy:5.5::el5", "cpe:/a:redhat:network_proxy:5.5::el6" ]
null
null
null
null
CVE-2024-28195
Cross-Site Request Forgery (CSRF) vulnerability in API and login in your_spotify
your_spotify is an open source, self hosted Spotify tracking dashboard. YourSpotify versions < 1.9.0 do not protect the API and login flow against Cross-Site Request Forgery (CSRF). Attackers can use this to execute CSRF attacks on victims, allowing them to retrieve, modify or delete data on the affected YourSpotify instance. Using repeated CSRF attacks, it is also possible to create a new user on the victim instance and promote the new user to instance administrator if a legitimate administrator visits a website prepared by an attacker. Note: Real-world exploitability of this vulnerability depends on the browser version and browser settings in use by the victim. This issue has been addressed in version 1.9.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.
[ "cpe:2.3:a:yooooomi:your_spotify:*:*:*:*:*:*:*:*" ]
null
8.1
null
null
GHSA-55vh-84h5-w3p4
A vulnerability was found in Campcodes Beauty Salon Management System 1.0 and classified as problematic. This issue affects some unknown processing of the file /admin/edit_category.php. The manipulation of the argument id leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-235247.
[]
null
null
3.5
null
CVE-2019-20091
An issue was discovered in Bento4 1.5.1.0. There is a NULL pointer dereference in AP4_Descriptor::GetTag in mp42ts when called from AP4_DecoderConfigDescriptor::GetDecoderSpecificInfoDescriptor in Ap4DecoderConfigDescriptor.cpp.
[ "cpe:2.3:a:axiosys:bento4:1.5.1.0:*:*:*:*:*:*:*" ]
null
5.5
null
4.3
GHSA-4mjx-2gh5-ph8h
Exposure of sensitive Slack webhook URLs in debug logs and traces
ImpactDebug logs expose sensitive URLs for Slack webhooks that contain private information.PatchesThe problem is fixed in v1.3.2 which redacts sensitive URLs for webhooks.WorkaroundsDisabling/filtering debug logs in case you use Slack webhooks using tracing log level and filters.Referenceshttps://github.com/abdolence/slack-morphism-rust/releases/tag/v1.3.2For more informationIf you have any questions or comments about this advisory:Open an issue in [repo](https://github.com/abdolence/slack-morphism-rust)Read our [security policy](https://github.com/abdolence/slack-morphism-rust/blob/master/SECURITY.md)
[]
null
7.5
null
null
CVE-2024-4948
Use after free in Dawn in Google Chrome prior to 125.0.6422.60 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
[ "cpe:2.3:a:google:chrome:-:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*" ]
null
8.8
null
null
GHSA-7hwg-r28w-246w
The The Events Calendar plugin for WordPress is vulnerable to Stored Cross-Site Scripting via RSVP name field in all versions up to, and including, 6.6.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
7.2
null
null
GHSA-pjxj-j84h-598j
Prison Management System v1.0 was discovered to contain a SQL injection vulnerability via the 'id' parameter at /pms/admin/visits/view_visit.php:4
[]
null
8.8
null
null
CVE-2019-0281
SAPUI5 and OpenUI5, before versions 1.38.39, 1.44.39, 1.52.25, 1.60.6 and 1.63.0, does not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability.
[ "cpe:2.3:a:sap:openui5:*:*:*:*:*:*:*:*" ]
null
null
6.1
4.3
CVE-2016-0464
Unspecified vulnerability in the Oracle WebLogic Server component in Oracle Fusion Middleware 10.3.6, 12.1.2, and 12.1.3 allows remote attackers to affect integrity via vectors related to WLS-Console.
[ "cpe:2.3:a:oracle:fusion_middleware:10.3.6:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:fusion_middleware:12.1.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:fusion_middleware:12.1.3.0:*:*:*:*:*:*:*" ]
null
null
null
4.3
GHSA-r3xh-r3g8-x9xh
Improper access control in some Intel(R) QAT drivers for Windows before version 1.9.0 may allow an authenticated user to potentially enable information disclosure via local access.
[]
null
3.3
null
null
GHSA-f2gj-wfwj-gh3q
The IPv6 fragmentation header parser in tcpdump before 4.9.2 has a buffer over-read in print-frag6.c:frag6_print().
[]
null
null
9.8
null
CVE-2017-8021
EMC Elastic Cloud Storage (ECS) before 3.1 is affected by an undocumented account vulnerability that could potentially be leveraged by malicious users to compromise the affected system.
[ "cpe:2.3:a:dell:elastic_cloud_storage:*:*:*:*:*:*:*:*" ]
null
9.8
null
10
CVE-2002-0496
The HTTP server for SouthWest Talker server 1.0.0 allows remote attackers to cause a denial of service (server crash) via a malformed URL to port 5002.
[ "cpe:2.3:a:southwest:southwest:1.0.0:*:*:*:*:*:*:*" ]
null
null
null
5
RHSA-2002:215
Red Hat Security Advisory: : Updated fetchmail packages fix vulnerabilities
security flaw security flaw
[ "cpe:/o:redhat:linux:6.2", "cpe:/o:redhat:linux:7.0", "cpe:/o:redhat:linux:7.1", "cpe:/o:redhat:linux:7.2", "cpe:/o:redhat:linux:7.3", "cpe:/o:redhat:linux:8.0" ]
null
null
null
null
GHSA-fgqv-x4rv-8256
Microsoft SharePoint Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-31963, CVE-2021-31966.
[]
null
7.1
null
null
CVE-2014-7330
The XtendCU Mobile (aka com.metova.cuae.xtend) application 1.0.28 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[ "cpe:2.3:a:xtendcu:xtendcu_mobile:1.0.28:*:*:*:*:android:*:*" ]
null
null
null
5.4
GHSA-p2gx-4434-pf6g
Apache InLong: Logged-in user could exploit an arbitrary file read vulnerability
Deserialization of Untrusted Data vulnerability in Apache InLong.This issue affects Apache InLong: from 1.8.0 through 1.10.0, the attackers canuse the specific payload to read from an arbitrary file. Users are advised to upgrade to Apache InLong's 1.11.0 or cherry-pick [1] to solve it.[1] https://github.com/apache/inlong/pull/9673
[]
9.3
9.1
null
null
GHSA-3h97-vcg5-xxqv
Adobe RoboHelp version 2015.0.3 and earlier, RoboHelp 11 and earlier have an input validation issue that could be used in cross-site scripting attacks.
[]
null
null
6.1
null
GHSA-x9q2-fff7-3xq5
A vulnerability was found in icplayer up to 0.819. It has been declared as problematic. Affected by this vulnerability is the function AddonText_Selection_create of the file addons/Text_Selection/src/presenter.js. The manipulation leads to cross site scripting. The attack can be launched remotely. Upgrading to version 0.820 is able to address this issue. The name of the patch is 2223628e6db1df73f6d633d2c0422d995990f0a3. It is recommended to upgrade the affected component. The identifier VDB-222289 was assigned to this vulnerability.
[]
null
6.1
null
null
GHSA-q2pr-ffxw-p47h
Uncontrolled resource consumption in the Linux kernel drivers for Intel(R) SGX may allow an authenticated user to potentially enable denial of service via local access.
[]
null
5.5
null
null
GHSA-qvm4-wwp9-8xp8
IBM WebSphere Application Server 7.0, 8.0, 8.5, and 9,0 could allow a remote attacker to traverse directories on the file system. An attacker could send a specially-crafted URL request to view arbitrary files on the system but not content. IBM X-Force ID: 163226.
[]
null
4.3
null
null
GHSA-3c2r-59vj-vq75
An elevation of privilege vulnerability in the Broadcom Wi-Fi driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-34197514. References: B-RB#112600.
[]
null
null
7
null
CVE-1999-0909
Multihomed Windows systems allow a remote attacker to bypass IP source routing restrictions via a malformed packet with IP options, aka the "Spoofed Route Pointer" vulnerability.
[ "cpe:2.3:a:microsoft:terminal_server:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_95:0a:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_95:0b:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_98se:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_nt:4.0:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_nt:4.0:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_nt:4.0:sp3:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_nt:4.0:sp4:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_nt:4.0:sp5:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-vghf-6629-65jw
The Style Inspector in Mozilla Firefox before 17.0 and Firefox ESR 10.x before 10.0.11 does not properly restrict the context of HTML markup and Cascading Style Sheets (CSS) token sequences, which allows user-assisted remote attackers to execute arbitrary JavaScript code with chrome privileges via a crafted stylesheet.
[]
null
null
null
null
GHSA-37r5-v3hg-cg4r
A flaw was found in grub2. When reading data from a jfs filesystem, grub's jfs filesystem module uses user-controlled parameters from the filesystem geometry to determine the internal buffer size, however, it improperly checks for integer overflows. A maliciouly crafted filesystem may lead some of those buffer size calculations to overflow, causing it to perform a grub_malloc() operation with a smaller size than expected. As a result, the grub_jfs_lookup_symlink() function will write past the internal buffer length during grub_jfs_read_file(). This issue can be leveraged to corrupt grub's internal critical data and may result in arbitrary code execution, by-passing secure boot protections.
[]
null
6.4
null
null
CVE-2007-1525
Direct static code injection vulnerability in postpost.php in Dayfox Blog (dfblog) 4 allows remote attackers to execute arbitrary PHP code via the cat parameter, which can be executed via a request to posts.php.
[ "cpe:2.3:a:dayfox_designs:dayfox_blog:4:*:*:*:*:*:*:*" ]
null
null
null
6.8
CVE-1999-1324
VAXstations running Open VMS 5.3 through 5.5-2 with VMS DECwindows or MOTIF do not properly disable access to user accounts that exceed the break-in limit threshold for failed login attempts, which makes it easier for attackers to conduct brute force password guessing.
[ "cpe:2.3:o:hp:openvms_vax:*:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
GHSA-6f6x-vfc5-5gwm
The read_header function in libavcodec/ffv1dec.c in FFmpeg 2.4 and 3.3.4 and possibly earlier allows remote attackers to have unspecified impact via a crafted MP4 file, which triggers an out-of-bounds read.
[]
null
null
8.8
null
CVE-2006-0652
WHMCompleteSolution (WHMCS) before 2.3 assigns incorrect permissions to "resellers", which allows remote authenticated users to perform privileged actions or obtain sensitive information. NOTE: this report is based on a vendor bug report that identified "incorrect permissions." However, the vendor did not label it a security issue, and there was no statement regarding whether or not the permissions were actually more permissive than intended. If in fact the permissions were more restrictive than intended, then this would be a functional problem but not a vulnerability.
[ "cpe:2.3:a:whmcompletesolution:whmcompletesolution:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:whmcompletesolution:whmcompletesolution:2.1:*:*:*:*:*:*:*", "cpe:2.3:a:whmcompletesolution:whmcompletesolution:2.2:*:*:*:*:*:*:*" ]
null
null
null
6.5
GHSA-2355-vxmg-gjx2
Improper input validation in subsystem for Intel(R) AMT versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable denial of service or information disclosure via adjacent access.
[]
null
null
null
null
GHSA-vp32-rg8f-2jxg
A Improper Neutralization of CRLF Sequences vulnerability in Open Build Service allows remote attackers to cause deletion of directories by tricking obs-service-refresh_patches to delete them. Affected releases are openSUSE Open Build Service: versions prior to d6244245dda5367767efc989446fe4b5e4609cce.
[]
null
null
7.5
null
CVE-2021-26075
The Jira importers plugin AttachTemporaryFile rest resource in Jira Server and Data Center before version 8.5.12, from version 8.6.0 before 8.13.4, and from version 8.14.0 before 8.15.1 allowed remote authenticated attackers to obtain the full path of the Jira application data directory via an information disclosure vulnerability in the error message when presented with an invalid filename.
[ "cpe:2.3:a:atlassian:data_center:*:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:jira:*:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:jira_data_center:*:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:jira_server:*:*:*:*:*:*:*:*" ]
null
4.3
null
4
CVE-2020-15255
CSV injection in Anuko Time Tracker
In Anuko Time Tracker before verion 1.19.23.5325, due to not properly filtered user input a CSV export of a report could contain cells that are treated as formulas by spreadsheet software (for example, when a cell value starts with an equal sign). This is fixed in version 1.19.23.5325.
[ "cpe:2.3:a:anuko:time_tracker:*:*:*:*:*:*:*:*" ]
null
8.7
null
null
GHSA-54cv-wj74-27xr
Adobe Dimension versions 3.4.7 (and earlier) is affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[]
null
7.8
null
null
GHSA-xm9g-8m49-7qpg
Unspecified vulnerability in the Oracle Customer Interaction History component in Oracle E-Business Suite 12.0.4, 12.0.5, 12.0.6, 12.1.1, 12.1.2, 12.1.3, 12.2.2, 12.2.3, and 12.2.4 allows remote attackers to affect confidentiality and integrity via unknown vectors related to List of Values.
[]
null
null
null
null
RHSA-2019:3520
Red Hat Security Advisory: python3 security and bug fix update
python: NULL pointer dereference using a specially crafted X509 certificate python: CRLF injection via the query part of the url passed to urlopen() python: CRLF injection via the path part of the url passed to urlopen() python: Undocumented local_file protocol allows remote attackers to bypass protection mechanisms
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
null
7.4
null
CVE-2008-6802
Multiple SQL injection vulnerabilities in index.php in phPhotoGallery 0.92 allow remote attackers to execute arbitrary SQL commands via the (1) Username and (2) Password fields. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
[ "cpe:2.3:a:phpexplorer:phphotogallery:0.92:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2023-40128
In several functions of xmlregexp.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
[ "cpe:2.3:o:google:android:11.0:-:*:*:*:*:*:*", "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*" ]
null
7.8
null
null
RHSA-2022:1301
Red Hat Security Advisory: thunderbird security update
Mozilla: Use-after-free in NSSToken objects Mozilla: Use-after-free after VR Process destruction Mozilla: OpenPGP revocation information was ignored Mozilla: Denial of Service via complex regular expressions Mozilla: Out of bounds write due to unexpected WebAuthN Extensions Mozilla: Use-after-free in DocumentL10n::TranslateDocument Mozilla: Incorrect AliasSet used in JIT Codegen Mozilla: iframe contents could be rendered outside the border Mozilla: Memory safety bugs fixed in Firefox 99 and Firefox ESR 91.8
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8.8
6.1
null
CVE-2025-27346
WordPress Rebuild Permalinks Plugin <= 1.6 - Reflected Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in gerrygooner Rebuild Permalinks allows Reflected XSS. This issue affects Rebuild Permalinks: from n/a through 1.6.
[]
null
7.1
null
null
CVE-2005-0090
A regression error in the Red Hat Enterprise Linux 4 kernel 4GB/4GB split patch omits an "access check," which allows local users to cause a denial of service (crash).
[ "cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*" ]
null
null
null
2.1
CVE-2006-2340
Cross-site scripting (XSS) vulnerability in PassMasterFlex and PassMasterFlexPlus (PassMasterFlex+) 1.2 and earlier allows remote attackers to inject arbitrary web script or HTML via the (1) username, (2) password, or (3) User-Agent HTTP header in the Hack Log.
[ "cpe:2.3:a:lethal_penguin:passmasterflex:1.2:*:*:*:*:*:*:*", "cpe:2.3:a:lethal_penguin:passmasterflexplus:1.2:*:*:*:*:*:*:*" ]
null
null
null
5.8
CVE-2018-8968
An issue was discovered in zzcms 8.2. user/manage.php allows remote attackers to delete arbitrary files via directory traversal sequences in the oldimg or oldflv parameter in an action=modify request. This can be leveraged for database access by deleting install.lock.
[ "cpe:2.3:a:zzcms:zzcms:8.2:*:*:*:*:*:*:*" ]
null
7.5
null
6.4
CVE-2007-5736
Unrestricted file upload vulnerability in upload.php in SeeBlick 1.0 Beta allows remote attackers to upload arbitrary files via unspecified vectors. NOTE: these files are stored with .html extensions, so the scope of the attack might be limited to resource consumption and possibly XSS.
[ "cpe:2.3:a:seeblick:seeblick:1.0:*:*:*:*:*:*:*" ]
null
null
null
6.4
CVE-2007-2902
SQL injection vulnerability in main/auth/my_progress.php in Dokeos 1.8.0 and earlier allows remote authenticated users to execute arbitrary SQL commands via the course parameter.
[ "cpe:2.3:a:dokeos:dokeos:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2014-9599
Cross-site scripting (XSS) vulnerability in the filemanager in b2evolution before 5.2.1 allows remote attackers to inject arbitrary web script or HTML via the fm_filter parameter to blogs/admin.php.
[ "cpe:2.3:a:b2evolution:b2evolution:*:*:*:*:*:*:*:*" ]
null
null
null
4.3
CVE-2022-21829
Concrete CMS Versions 9.0.0 through 9.0.2 and 8.5.7 and below can download zip files over HTTP and execute code from those zip files which could lead to an RCE. Fixed by enforcing ‘concrete_secure’ instead of ‘concrete’. Concrete now only makes requests over https even a request comes in via http. Concrete CMS security team ranked this 8 with CVSS v3.1 vector: AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H Credit goes to Anna for reporting HackerOne 1482520.
[ "cpe:2.3:a:concretecms:concrete_cms:*:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
GHSA-8f8g-9j73-7p82
steal vulnerable to Prototype Pollution via optionName variable
Prototype pollution vulnerability in stealjs steal 2.2.4 via the optionName variable in main.js.
[]
null
9.8
null
null
CVE-2016-10228
The iconv program in the GNU C Library (aka glibc or libc6) 2.31 and earlier, when invoked with multiple suffixes in the destination encoding (TRANSLATE or IGNORE) along with the -c option, enters an infinite loop when processing invalid multi-byte input sequences, leading to a denial of service.
[ "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*" ]
null
null
5.9
4.3
GHSA-5xf3-qpv9-5x44
Maid Hiring Management System v1.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the component /admin/search-booking-request.php.
[]
null
6.1
null
null
CVE-2024-32690
WordPress RSS Feed Widget plugin <= 2.9.7 - Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Fahad Mahmood RSS Feed Widget allows Stored XSS.This issue affects RSS Feed Widget: from n/a through 2.9.7.
[]
null
5.9
null
null
GHSA-vhrf-gfcg-4676
Due to improper authorization check, business users who are using Israeli File from SHAAM program (/ATL/VQ23 transaction), are granted more than needed authorization to perform certain transaction, which may lead to users getting access to data that would otherwise be restricted.
[]
null
6.5
null
null
RHSA-2022:9111
Red Hat Security Advisory: OpenShift Container Platform 4.9.54 bug fix and security update
go-getter: command injection vulnerability go-getter: unsafe download (issue 1 of 3) go-getter: unsafe download (issue 2 of 3) go-getter: unsafe download (issue 3 of 3)
[ "cpe:/a:redhat:openshift:4.9::el8" ]
null
8.6
null
null
CVE-2018-17555
The web component on ARRIS TG2492LG-NA 061213 devices allows remote attackers to obtain sensitive information via the /snmpGet oids parameter.
[ "cpe:2.3:o:commscope:arris_tg2492lg-na_firmware:061213:*:*:*:*:*:*:*", "cpe:2.3:h:commscope:arris_tg2492lg-na:-:*:*:*:*:*:*:*" ]
null
7.5
null
5
CVE-2002-1077
IPSwitch IMail Web Calendaring service (iwebcal) allows remote attackers to cause a denial of service (crash) via an HTTP POST request without a Content-Length field.
[ "cpe:2.3:a:ipswitch:imail:6.1:*:*:*:*:*:*:*", "cpe:2.3:a:ipswitch:imail:6.2:*:*:*:*:*:*:*", "cpe:2.3:a:ipswitch:imail:6.3:*:*:*:*:*:*:*", "cpe:2.3:a:ipswitch:imail:6.4:*:*:*:*:*:*:*", "cpe:2.3:a:ipswitch:imail:7.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ipswitch:imail:7.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ipswitch:imail:7.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:ipswitch:imail:7.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:ipswitch:imail:7.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:ipswitch:imail:7.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:ipswitch:imail:7.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:ipswitch:imail:7.1:*:*:*:*:*:*:*" ]
null
null
null
5
CVE-2019-20731
Certain NETGEAR devices are affected by a buffer overflow by an authenticated user. This affects D6220 before 1.0.0.40, D6400 before 1.0.0.74, D7000v2 before 1.0.0.74, D8500 before 1.0.3.39, EX3700 before 1.0.0.70, EX3800 before 1.0.0.70, EX6000 before 1.0.0.30, EX6100 before 1.0.2.22, EX6120 before 1.0.0.40, EX6130 before 1.0.0.22, EX6150v1 before 1.0.0.42, EX6200 before 1.0.3.88, EX7000 before 1.0.0.66, R6250 before 1.0.4.20, R6300v2 before 1.0.4.18, R6400v2 before 1.0.2.52, R6700 before 1.0.1.44, R6900 before 1.0.1.46, R7000 before 1.0.9.26, R6900P before 1.3.0.20, R7000P before 1.3.0.20, R7100LG before 1.0.0.34, R7300DST before 1.0.0.62, R8000 before 1.0.4.12, R7900P before 1.3.0.10, R8000P before 1.3.0.10, R8300 before 1.0.2.116, R8500 before 1.0.2.116, WN2500RPv2 before 1.0.1.54, and WNDR3400v3 before 1.0.1.18.
[ "cpe:2.3:o:netgear:d6220_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:d6220:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:d6400_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:d6400:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:d7000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:d7000:v2:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:d8500_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:d8500:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:ex3700_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:ex3700:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:ex3800_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:ex3800:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:ex6000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:ex6000:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:ex6100_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:ex6100:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:ex6120_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:ex6120:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:ex6130_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:ex6130:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:ex6150_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:ex6150:v1:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:ex6200_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:ex6200:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:ex7000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:ex7000:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r6250_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r6250:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r6300_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r6300:v2:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r6400_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r6400:v2:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r6700_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r6700:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r6900_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r6900:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r7000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r7000:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r6900p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r6900p:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r7000p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r7000p:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r7100lg_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r7100lg:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r7300dst_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r7300dst:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r8000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r8000:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r7900p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r7900p:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r8000p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r8000p:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r8300_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r8300:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r8500_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r8500:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:wn2500rp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:wn2500rp:v2:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:wndr3400_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:wndr3400:v3:*:*:*:*:*:*:*" ]
null
null
5.6
null
CVE-2019-14937
REDCap before 9.3.0 allows time-based SQL injection in the edit calendar event via the cal_id parameter, such as cal_id=55 and sleep(3) to Calendar/calendar_popup_ajax.php. The attacker can obtain a user's login sessionid from the database, and then re-login into REDCap to compromise all data.
[ "cpe:2.3:a:vanderbilt:redcap:*:*:*:*:*:*:*:*" ]
null
null
7.5
6
CVE-2025-2222
CWE-552: Files or Directories Accessible to External Parties vulnerability over https exists that could leak information and potential privilege escalation following man in the middle attack.
[]
8.2
7.8
null
null
CVE-2020-27936
An out-of-bounds read issue existed that led to the disclosure of kernel memory. This was addressed with improved input validation. This issue is fixed in macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave. A local user may be able to cause unexpected system termination or read kernel memory.
[ "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*" ]
null
7.1
null
6.6
CVE-2019-2488
Vulnerability in the Oracle CRM Technical Foundation component of Oracle E-Business Suite (subcomponent: Session Management). Supported versions that are affected are 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6, 12.2.7 and 12.2.8. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle CRM Technical Foundation. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle CRM Technical Foundation accessible data. CVSS 3.0 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).
[ "cpe:2.3:a:oracle:e-business_suite:12.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:e-business_suite:12.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:e-business_suite:12.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:e-business_suite:12.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:e-business_suite:12.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:e-business_suite:12.2.7:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:e-business_suite:12.2.8:*:*:*:*:*:*:*" ]
null
null
5.3
5
GHSA-8fh8-56w4-443q
The ACL handling in rsyslog 3.12.1 to 3.20.0, 4.1.0, and 4.1.1 does not follow $AllowedSender directive, which allows remote attackers to bypass intended access restrictions and spoof log messages or create a large number of spurious messages.
[]
null
null
null
null
GHSA-583g-g682-crxf
Micronaut management endpoints vulnerable to drive-by localhost attack
SummaryEnabled but unsecured management endpoints are susceptible to drive-by localhost attacks. While not typical of a production application, these attacks may have more impact on a development environment where such endpoints may be flipped on without much thought.DetailsA malicious/compromised website can make HTTP requests to `localhost`. Normally, such requests would trigger a CORS preflight check which would prevent the request; however, some requests are ["simple"](https://developer.mozilla.org/en-US/docs/Web/HTTP/CORS#simple_requests) and do not require a preflight check. These endpoints, if enabled and not secured, are vulnerable to being triggered.ImpactProduction environments typically disable unused endpoints and secure/restrict access to needed endpoints. A more likely victim is the developer in their local development host, who has enabled endpoints without security for the sake of easing development.
[]
null
5.1
null
null
GHSA-j6rf-xjcr-vrqj
Improper buffer restrictions in system driver for some Intel(R) Graphics Drivers before version 15.33.50.5129 may allow an authenticated user to potentially enable denial of service via local access.
[]
null
null
null
null
CVE-2024-43523
Windows Mobile Broadband Driver Remote Code Execution Vulnerability
Windows Mobile Broadband Driver Remote Code Execution Vulnerability
[ "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*" ]
null
6.8
null
null
CVE-2020-13943
If an HTTP/2 client connecting to Apache Tomcat 10.0.0-M1 to 10.0.0-M7, 9.0.0.M1 to 9.0.37 or 8.5.0 to 8.5.57 exceeded the agreed maximum number of concurrent streams for a connection (in violation of the HTTP/2 protocol), it was possible that a subsequent request made on that connection could contain HTTP headers - including HTTP/2 pseudo headers - from a previous request rather than the intended headers. This could lead to users seeing responses for unexpected resources.
[ "cpe:2.3:a:apache:tomcat:8.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:8.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:8.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:8.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:8.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:8.5.5:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:8.5.6:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:8.5.7:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:8.5.8:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:8.5.9:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:8.5.10:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:8.5.11:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:8.5.12:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:8.5.13:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:8.5.14:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:8.5.15:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:8.5.16:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:8.5.17:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:8.5.18:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:8.5.19:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:8.5.20:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:8.5.21:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:8.5.22:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:8.5.23:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:8.5.24:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:8.5.25:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:8.5.26:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:8.5.27:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:8.5.28:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:8.5.29:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:8.5.30:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:8.5.31:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:8.5.32:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:8.5.33:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:8.5.34:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:8.5.35:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:8.5.36:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:8.5.37:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:8.5.38:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:8.5.39:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:8.5.40:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:8.5.41:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:8.5.42:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:8.5.43:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:8.5.44:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:8.5.45:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:8.5.46:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:8.5.47:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:8.5.48:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:8.5.49:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:8.5.50:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:8.5.51:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:8.5.52:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:8.5.53:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:8.5.54:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:8.5.55:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:8.5.56:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:8.5.57:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:9.0.0:milestone10:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:9.0.0:milestone11:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:9.0.0:milestone12:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:9.0.0:milestone13:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:9.0.0:milestone14:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:9.0.0:milestone15:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:9.0.0:milestone16:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:9.0.0:milestone17:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:9.0.0:milestone18:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:9.0.0:milestone19:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:9.0.0:milestone20:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:9.0.0:milestone21:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:9.0.0:milestone22:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:9.0.0:milestone23:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:9.0.0:milestone24:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:9.0.0:milestone25:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:9.0.0:milestone26:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:9.0.0:milestone27:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:9.0.0:milestone5:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:9.0.0:milestone6:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:9.0.0:milestone7:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:9.0.0:milestone8:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:9.0.0:milestone9:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:9.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:9.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:9.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:9.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:9.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:9.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:9.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:9.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:9.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:9.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:9.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:9.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:9.0.13:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:9.0.14:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:9.0.15:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:9.0.16:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:9.0.17:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:9.0.18:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:9.0.19:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:9.0.20:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:9.0.21:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:9.0.22:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:9.0.23:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:9.0.24:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:9.0.25:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:9.0.26:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:9.0.27:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:9.0.28:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:9.0.29:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:9.0.30:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:9.0.31:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:9.0.32:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:9.0.33:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:9.0.34:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:9.0.35:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:9.0.36:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:9.0.37:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:10.0.0:milestone1:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:10.0.0:milestone2:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:10.0.0:milestone3:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:10.0.0:milestone4:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:10.0.0:milestone5:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:10.0.0:milestone6:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:10.0.0:milestone7:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:instantis_enterprisetrack:17.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:instantis_enterprisetrack:17.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:instantis_enterprisetrack:17.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:sd-wan_edge:9.0:*:*:*:*:*:*:*" ]
null
4.3
null
4
CVE-2020-8171
We have recently released new version of AirMax AirOS firmware v6.3.0 for TI, XW and XM boards that fixes vulnerabilities found on AirMax AirOS v6.2.0 and prior TI, XW and XM boards, according to the description below:There are certain end-points containing functionalities that are vulnerable to command injection. It is possible to craft an input string that passes the filter check but still contains commands, resulting in remote code execution.Mitigation:Update to the latest AirMax AirOS firmware version available at the AirMax download page.
[ "cpe:2.3:o:ui:airos:*:*:*:*:*:*:*:*", "cpe:2.3:h:ui:ag-hp-2g16:-:*:*:*:*:*:*:*", "cpe:2.3:h:ui:ag-hp-2g20:-:*:*:*:*:*:*:*", "cpe:2.3:h:ui:ag-hp-5g23:-:*:*:*:*:*:*:*", "cpe:2.3:h:ui:ag-hp-5g27:-:*:*:*:*:*:*:*", "cpe:2.3:h:ui:airgrid_m:-:*:*:*:*:*:*:*", "cpe:2.3:h:ui:airgrid_m2:-:*:*:*:*:*:*:*", "cpe:2.3:h:ui:airgrid_m5:-:*:*:*:*:*:*:*", "cpe:2.3:h:ui:ar:-:*:*:*:*:*:*:*", "cpe:2.3:h:ui:ar-hp:-:*:*:*:*:*:*:*", "cpe:2.3:h:ui:bm2-ti:-:*:*:*:*:*:*:*", "cpe:2.3:h:ui:bm2hp:-:*:*:*:*:*:*:*", "cpe:2.3:h:ui:bm5-ti:-:*:*:*:*:*:*:*", "cpe:2.3:h:ui:bm5hp:-:*:*:*:*:*:*:*", "cpe:2.3:h:ui:is-m5:-:*:*:*:*:*:*:*", "cpe:2.3:h:ui:lbem5-23:-:*:*:*:*:*:*:*", "cpe:2.3:h:ui:litestation_m5:-:*:*:*:*:*:*:*", "cpe:2.3:h:ui:locom2:-:*:*:*:*:*:*:*", "cpe:2.3:h:ui:locom5:-:*:*:*:*:*:*:*", "cpe:2.3:h:ui:locom9:-:*:*:*:*:*:*:*", "cpe:2.3:h:ui:m2:-:*:*:*:*:*:*:*", "cpe:2.3:h:ui:m3:-:*:*:*:*:*:*:*", "cpe:2.3:h:ui:m365:-:*:*:*:*:*:*:*", "cpe:2.3:h:ui:m5:-:*:*:*:*:*:*:*", "cpe:2.3:h:ui:m900:-:*:*:*:*:*:*:*", "cpe:2.3:h:ui:nb-2g18:-:*:*:*:*:*:*:*", "cpe:2.3:h:ui:nb-5g22:-:*:*:*:*:*:*:*", "cpe:2.3:h:ui:nb-5g25:-:*:*:*:*:*:*:*", "cpe:2.3:h:ui:nbe-m2-13:-:*:*:*:*:*:*:*", "cpe:2.3:h:ui:nbe-m5-16:-:*:*:*:*:*:*:*", "cpe:2.3:h:ui:nbe-m5-19:-:*:*:*:*:*:*:*", "cpe:2.3:h:ui:nbm3:-:*:*:*:*:*:*:*", "cpe:2.3:h:ui:nbm365:-:*:*:*:*:*:*:*", "cpe:2.3:h:ui:nbm9:-:*:*:*:*:*:*:*", "cpe:2.3:h:ui:nsm2:-:*:*:*:*:*:*:*", "cpe:2.3:h:ui:nsm3:-:*:*:*:*:*:*:*", "cpe:2.3:h:ui:nsm365:-:*:*:*:*:*:*:*", "cpe:2.3:h:ui:nsm5:-:*:*:*:*:*:*:*", "cpe:2.3:h:ui:pbe-m2-400:-:*:*:*:*:*:*:*", "cpe:2.3:h:ui:pbe-m5-300:-:*:*:*:*:*:*:*", "cpe:2.3:h:ui:pbe-m5-300-iso:-:*:*:*:*:*:*:*", "cpe:2.3:h:ui:pbe-m5-400:-:*:*:*:*:*:*:*", "cpe:2.3:h:ui:pbe-m5-400-iso:-:*:*:*:*:*:*:*", "cpe:2.3:h:ui:pbe-m5-620:-:*:*:*:*:*:*:*", "cpe:2.3:h:ui:pbm10:-:*:*:*:*:*:*:*", "cpe:2.3:h:ui:pbm365:-:*:*:*:*:*:*:*", "cpe:2.3:h:ui:pbm5:-:*:*:*:*:*:*:*", "cpe:2.3:h:ui:picom2hp:-:*:*:*:*:*:*:*", "cpe:2.3:h:ui:power_ap_n:-:*:*:*:*:*:*:*", "cpe:2.3:h:ui:rm2-ti:-:*:*:*:*:*:*:*", "cpe:2.3:h:ui:rm5-ti:-:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
GHSA-x2vw-xfxf-2fwh
Buffer overflow in libavcodec/dca.c in FFmpeg 0.4.9 before r14917, as used by MPlayer, allows context-dependent attackers to have an unknown impact via vectors related to an incorrect DCA_MAX_FRAME_SIZE value.
[]
null
null
null
null
GHSA-mqfg-r4mp-f7xf
Sterling Order Management in IBM Sterling Selling and Fulfillment Suite 9.3.0 before FP8 allows remote authenticated users to cause a denial of service (CPU consumption) via a '\0' character.
[]
null
null
null
null
CVE-2021-29627
In FreeBSD 13.0-STABLE before n245050, 12.2-STABLE before r369525, 13.0-RC4 before p0, and 12.2-RELEASE before p6, listening socket accept filters implementing the accf_create callback incorrectly freed a process supplied argument string. Additional operations on the socket can lead to a double free or use after free.
[ "cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:12.2:-:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:12.2:p1:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:12.2:p2:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:13.0:beta1:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:13.0:beta2:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:13.0:beta3:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:13.0:beta4:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:13.0:rc1:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:13.0:rc2:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:13.0:rc3:*:*:*:*:*:*" ]
null
7.8
null
7.2
CVE-2020-5894
On versions 3.0.0-3.3.0, the NGINX Controller webserver does not invalidate the server-side session token after users log out.
[ "cpe:2.3:a:f5:nginx_controller:*:*:*:*:*:*:*:*" ]
null
8.1
null
5.8
GHSA-8w4w-f5fh-qf9q
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Hive Support Hive Support – WordPress Help Desk allows SQL Injection.This issue affects Hive Support – WordPress Help Desk: from n/a through 1.1.2.
[]
null
8.5
null
null
GHSA-gfpr-4fpp-g5qm
Buffer Overflow vulnerability in XNSoft NConvert 7.163 (for Windows x86) allows attackers to cause a denial of service via crafted xwd file.
[]
null
6.5
null
null
CVE-2016-9904
An attacker could use a JavaScript Map/Set timing attack to determine whether an atom is used by another compartment/zone in specific contexts. This could be used to leak information, such as usernames embedded in JavaScript code, across websites. This vulnerability affects Firefox < 50.1, Firefox ESR < 45.6, and Thunderbird < 45.6.
[ "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*" ]
null
null
7.5
5
CVE-2020-21641
Out-of-Band XML External Entity (OOB-XXE) vulnerability in Zoho ManageEngine Analytics Plus before 4.3.5 allows remote attackers to read arbitrary files, enumerate folders and scan internal ports via crafted XML license file.
[ "cpe:2.3:a:zohocorp:manageengine_analytics_plus:*:*:*:*:*:*:*:*" ]
null
7.5
null
null
CVE-2020-29367
blosc2.c in Blosc C-Blosc2 through 2.0.0.beta.5 has a heap-based buffer overflow when there is a lack of space to write compressed data.
[ "cpe:2.3:a:c-blosc2_project:c-blosc2:2.0.0:a2:*:*:*:*:*:*", "cpe:2.3:a:c-blosc2_project:c-blosc2:2.0.0:a3:*:*:*:*:*:*", "cpe:2.3:a:c-blosc2_project:c-blosc2:2.0.0:a4:*:*:*:*:*:*", "cpe:2.3:a:c-blosc2_project:c-blosc2:2.0.0:a5:*:*:*:*:*:*", "cpe:2.3:a:c-blosc2_project:c-blosc2:2.0.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:c-blosc2_project:c-blosc2:2.0.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:c-blosc2_project:c-blosc2:2.0.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:c-blosc2_project:c-blosc2:2.0.0:beta4:*:*:*:*:*:*", "cpe:2.3:a:c-blosc2_project:c-blosc2:2.0.0:beta5:*:*:*:*:*:*" ]
null
7.8
null
9.3
GHSA-q5cc-q49p-jfrj
Domain Name Relay Daemon (dnrd) 2.10 and earlier allows remote malicious DNS sites to cause a denial of service and possibly execute arbitrary code via a long or malformed DNS reply, which is not handled properly by parse_query, get_objectname, and possibly other functions.
[]
null
null
null
null
CVE-2014-6101
Cross-site scripting (XSS) vulnerability in the redirect-login feature in IBM Business Process Manager (BPM) Advanced 7.5 through 8.5.5 allows remote attackers to inject arbitrary web script or HTML via a crafted URL.
[ "cpe:2.3:a:ibm:business_process_manager:7.5.0.0:*:*:*:advanced:*:*:*", "cpe:2.3:a:ibm:business_process_manager:7.5.0.1:*:*:*:advanced:*:*:*", "cpe:2.3:a:ibm:business_process_manager:7.5.1.0:*:*:*:advanced:*:*:*", "cpe:2.3:a:ibm:business_process_manager:7.5.1.1:*:*:*:advanced:*:*:*", "cpe:2.3:a:ibm:business_process_manager:7.5.1.2:*:*:*:advanced:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.0.0.0:*:*:*:advanced:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.0.1.0:*:*:*:advanced:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.0.1.1:*:*:*:advanced:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.0.1.2:*:*:*:advanced:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.5.0.0:*:*:*:advanced:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.5.0.1:*:*:*:advanced:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.5.5.0:*:*:*:advanced:*:*:*" ]
null
null
null
4.3
GHSA-r9w6-rhh9-7v53
Incorrect Authorization in HashiCorp Consul
HashiCorp Consul and Consul Enterprise 1.4.1 through 1.6.2 did not uniformly enforce ACLs across all API endpoints, resulting in potential unintended information disclosure. Fixed in 1.6.3.
[]
null
5.3
null
null
GHSA-r3w4-36x6-7r99
Duplicate Advisory: Nokogiri updates packaged libxml2 to v2.12.7 to resolve CVE-2024-34459
Duplicate AdvisoryThis advisory has been withdrawn because it is a duplicate of GHSA-r95h-9x8f-r3f7. This link is maintained to preserve external references.Original DescriptionSummaryNokogiri v1.16.5 upgrades its dependency libxml2 to [2.12.7](https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.12.7) from 2.12.6.libxml2 v2.12.7 addresses CVE-2024-34459:described at https://gitlab.gnome.org/GNOME/libxml2/-/issues/720patched by https://gitlab.gnome.org/GNOME/libxml2/-/commit/2876ac53ImpactThere is no impact to Nokogiri users because the issue is present only in libxml2's `xmllint` tool which Nokogiri does not provide or expose.Timeline2024-05-13 05:57 EDT, libxml2 2.12.7 release is announced2024-05-13 08:30 EDT, nokogiri maintainers begin triage2024-05-13 10:05 EDT, nokogiri [v1.16.5 is released](https://github.com/sparklemotion/nokogiri/releases/tag/v1.16.5) and this GHSA made public
[]
null
null
null
null
GHSA-7j63-969g-r2jp
The Passster WordPress plugin before 3.5.5.5.2 stores the password inside a cookie named "passster" using base64 encoding method which is easy to decode. This puts the password at risk in case the cookies get leaked.
[]
null
5.9
null
null
CVE-2023-51502
WordPress WooCommerce Stripe Payment Gateway Plugin <= 7.6.1 is vulnerable to Insecure Direct Object References (IDOR)
Authorization Bypass Through User-Controlled Key vulnerability in WooCommerce WooCommerce Stripe Payment Gateway.This issue affects WooCommerce Stripe Payment Gateway: from n/a through 7.6.1.
[ "cpe:2.3:a:woocommerce:woocommerce_stripe_payment_gateway:*:*:*:*:*:*:*:*", "cpe:2.3:a:automattic:woocommerce_stripe:*:*:*:*:*:wordpress:*:*" ]
null
7.5
null
null
GHSA-9qrw-j2qh-47hj
Huawei E355s Mobile WiFi with firmware before 22.158.45.02.625 and WEBUI before 13.100.04.01.625 allows remote attackers to obtain sensitive configuration information by sniffing the network or sending unspecified commands.
[]
null
null
null
null
CVE-2022-31157
Use of a Broken or Risky Cryptographic Algorithm in packbackbooks/lti-1-3-php-library
LTI 1.3 Tool Library is a library used for building IMS-certified LTI 1.3 tool providers in PHP. Prior to version 5.0, the function used to generate random nonces was not sufficiently cryptographically complex. Users should upgrade to version 5.0 to receive a patch. There are currently no known workarounds.
[ "cpe:2.3:a:packback:lti_1.3_tool_library:*:*:*:*:*:*:*:*" ]
null
7.5
null
null
GHSA-v2w7-xjpq-rmv5
A vulnerability in the Secure Sockets Layer (SSL)/Transport Layer Security (TLS) handler of Cisco Firepower Threat Defense (FTD) Software when running on the Cisco Firepower 1000 Series platform could allow an unauthenticated, remote attacker to trigger a denial of service (DoS) condition on an affected device. The vulnerability is due to a communication error between internal functions. An attacker could exploit this vulnerability by sending a crafted SSL/TLS message to an affected device. A successful exploit could allow the attacker to cause a buffer underrun, which leads to a crash. The crash causes the affected device to reload.
[]
null
null
null
null
GHSA-44wx-pxp5-fjxm
An issue was discovered on Samsung mobile devices with software through 2016-09-13 (Exynos AP chipsets). There is a memcpy heap-based buffer overflow in the OTP service. The Samsung ID is SVE-2016-7114 (December 2016).
[]
null
null
null
null
GHSA-5vjc-qx43-r747
Stored Cross-site Scripting in folder-auth plugin
Folder-based Authorization Strategy Plugin 1.3 and earlier does not escape the names of roles shown on the configuration form.This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Overall/Administer permission.Folder-based Authorization Strategy Plugin 1.4 escapes the names of roles shown on the configuration form.See https://www.jenkins.io/security/advisory/2022-03-15/#SECURITY-2646
[]
null
null
null
null
CVE-2012-2155
Cross-site request forgery (CSRF) vulnerability in the CDN2 Video module 6.x for Drupal allows remote attackers to hijack the authentication of unspecified victims via unknown vectors.
[ "cpe:2.3:a:kyle_browning:cdn2_video:6.x-1.x:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:-:*:*:*:*:*:*:*" ]
null
null
null
6.8
GHSA-cjvq-xvv5-f922
A use-after-free vulnerability exists in the JavaScript engine of Foxit Software’s PDF Reader, version 11.0.0.49893. A specially crafted PDF document can trigger the reuse of previously freed memory, which can lead to arbitrary code execution. An attacker needs to trick the user to open the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially crafted, malicious site if the browser plugin extension is enabled.
[]
null
8.8
null
null
GHSA-wwc5-p8v7-jw92
Multiple endpoints in `oracle-sidecar` in versions 0.347.0 to 0.543.0 were found to be vulnerable to SQL injections.
[]
null
6.8
null
null
GHSA-ffm9-v534-h8c2
The Registrations for the Events Calendar WordPress plugin before 2.13.4 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
[]
null
6.1
null
null
GHSA-876v-7v7c-4xcf
LMA ISIDA Retriever 5.2 is vulnerable to XSS via query['text'].
[]
null
null
null
null