id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
189k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
patch_commit_url
stringlengths
38
232
GHSA-35mj-mc7c-rc4m
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader 11.0.0.49893. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Annotation objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14270.
[]
null
null
null
null
null
CVE-2007-3352
Cross-site scripting (XSS) vulnerability in the preview form in Stephen Ostermiller Contact Form before 2.00.02 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors that contain an apostrophe.
[ "cpe:2.3:a:stephen_ostermiller:contact_form:2.00.02:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
RHSA-2022:8889
Red Hat Security Advisory: Openshift Logging 5.3.14 bug fix release and security update
jackson-databind: denial of service via a large depth of nested objects jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS jackson-databind: use of deeply nested arrays
[ "cpe:/a:redhat:logging:5.3::el8" ]
null
7.5
null
null
null
CVE-2009-4343
Cross-site scripting (XSS) vulnerability in the Training Company Database (trainincdb) extension 0.4.7 for TYPO3 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
[ "cpe:2.3:a:dominic_eckart:trainincdb:0.4.7:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
CVE-2025-1618
vTiger CRM index.php cross site scripting
A vulnerability has been found in vTiger CRM 6.4.0/6.5.0 and classified as problematic. This vulnerability affects unknown code of the file /modules/Mobile/index.php. The manipulation of the argument _operation leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 7.0 is able to address this issue. It is recommended to upgrade the affected component.
[]
5.3
4.3
4.3
5
null
RHSA-2021:2584
Red Hat Security Advisory: ruby:2.7 security, bug fix, and enhancement update
ruby: Potential HTTP request smuggling in WEBrick ruby: XML round-trip vulnerability in REXML
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.5
null
null
null
RHSA-2024:8727
Red Hat Security Advisory: firefox security update
firefox: thunderbird: Permission leak via embed or object elements firefox: thunderbird: Use-after-free in layout with accessibility firefox: thunderbird: Confusing display of origin for external protocol handler prompt firefox: thunderbird: XSS due to Content-Disposition being ignored in multipart/x-mixed-replace response firefox: thunderbird: Origin of permission prompt could be spoofed by long URL firefox: thunderbird: Cross origin video frame leak firefox: thunderbird: History interface could have been used to cause a Denial of Service condition in the browser firefox: thunderbird: Clipboard "paste" button persisted across tabs firefox: DOM push subscription message could hang Firefox firefox: thunderbird: Memory safety bugs fixed in Firefox 132, Thunderbird 132, Firefox ESR 128.4, and Thunderbird 128.4
[ "cpe:/o:redhat:rhel_els:7" ]
null
8.8
null
null
null
GHSA-qwmr-cmwr-523q
The kill_something_info function in kernel/signal.c in the Linux kernel before 2.6.28 does not consider PID namespaces when processing signals directed to PID -1, which allows local users to bypass the intended namespace isolation, and send arbitrary signals to all processes in all namespaces, via a kill command.
[]
null
null
null
null
null
CVE-2019-20141
An XSS issue was discovered in the Laborator Neon theme 2.0 for WordPress via the data/autosuggest-remote.php q parameter.
[ "cpe:2.3:a:laborator:neon:2.0:*:*:*:*:wordpress:*:*" ]
null
6.1
null
4.3
null
CVE-2018-15925
Adobe Acrobat and Reader versions 2018.011.20063 and earlier, 2017.011.30102 and earlier, and 2015.006.30452 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
[ "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
null
5.5
4.3
null
GHSA-qh5q-fw44-7cp6
Adobe ColdFusion versions 2023.5 (and earlier) and 2021.11 (and earlier) are affected by an Improper Input Validation vulnerability that could result in a Security feature bypass. An unauthenticated attacker could leverage this vulnerability to impact a minor integrity feature. Exploitation of this issue does require user interaction.
[]
null
4.3
null
null
null
CVE-2019-7278
Optergy Proton/Enterprise devices have an Unauthenticated SMS Sending Service.
[ "cpe:2.3:a:optergy:enterprise:*:*:*:*:*:*:*:*", "cpe:2.3:a:optergy:proton:*:*:*:*:*:*:*:*" ]
null
null
6.5
6.4
null
CVE-2024-24901
Dell PowerScale OneFS 8.2.x through 9.6.0.x contain an insufficient logging vulnerability. A local malicious user with high privileges could potentially exploit this vulnerability, causing audit messages lost and not recorded for a specific time period.
[ "cpe:2.3:a:dell:powerscale_onefs:*:*:*:*:*:*:*:*", "cpe:2.3:a:dell:powerscale_onefs:9.6.1:*:*:*:*:*:*:*" ]
null
3
null
null
null
CVE-2021-23973
When trying to load a cross-origin resource in an audio/video context a decoding error may have resulted, and the content of that error may have revealed information about the resource. This vulnerability affects Firefox < 86, Thunderbird < 78.8, and Firefox ESR < 78.8.
[ "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*" ]
null
6.5
null
4.3
null
GHSA-542p-6q49-2qfr
wp-includes/comment.php in WordPress before 3.0.2 does not properly whitelist trackbacks and pingbacks in the blogroll, which allows remote attackers to bypass intended spam restrictions via a crafted URL, as demonstrated by a URL that triggers a substring match.
[]
null
null
null
null
null
CVE-2023-33281
The remote keyfob system on Nissan Sylphy Classic 2021 sends the same RF signal for each door-open request, which allows for a replay attack. NOTE: the vendor's position is that this cannot be reproduced with genuine Nissan parts: for example, the combination of keyfob and door handle shown in the exploit demonstration does not match any technology that Nissan provides to customers.
[ "cpe:2.3:o:nissan:sylphy_classic_2021_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:nissan:sylphy_classic_2021:-:*:*:*:*:*:*:*" ]
null
6.5
null
null
null
GHSA-9953-8mhm-vpr8
The PureStorage-OpenConnect/swagger repository through 1.1.5 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.
[]
null
9.3
null
null
null
CVE-2018-8385
A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in Microsoft browsers, aka "Scripting Engine Memory Corruption Vulnerability." This affects Internet Explorer 9, ChakraCore, Internet Explorer 11, Microsoft Edge, Internet Explorer 10. This CVE ID is unique from CVE-2018-8353, CVE-2018-8355, CVE-2018-8359, CVE-2018-8371, CVE-2018-8372, CVE-2018-8373, CVE-2018-8389, CVE-2018-8390.
[ "cpe:2.3:a:microsoft:internet_explorer:11:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:chakracore:-:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:*:*:*:*:*:*:*:*" ]
null
null
7.5
7.6
null
GHSA-9jxx-4x48-3ff9
Multiple SQL injection vulnerabilities in PHPYun 1.1.6 allow remote attackers to execute arbitrary SQL commands via the (1) provinceid parameter to search.php and the (2) e parameter to resumeview.php.
[]
null
null
null
null
null
CVE-2014-9684
OpenStack Image Registry and Delivery Service (Glance) 2014.2 through 2014.2.2 does not properly remove images, which allows remote authenticated users to cause a denial of service (disk consumption) by creating a large number of images using the task v2 API and then deleting them before the uploads finish, a different vulnerability than CVE-2015-1881.
[ "cpe:2.3:a:openstack:image_registry_and_delivery_service_\\(glance\\):2014.2:*:*:*:*:*:*:*", "cpe:2.3:a:openstack:image_registry_and_delivery_service_\\(glance\\):2014.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:openstack:image_registry_and_delivery_service_\\(glance\\):2014.2.2:*:*:*:*:*:*:*" ]
null
null
null
4
null
CVE-2009-0843
The msLoadQuery function in mapserv in MapServer 4.x before 4.10.4 and 5.x before 5.2.2 allows remote attackers to determine the existence of arbitrary files via a full pathname in the queryfile parameter, which triggers different error messages depending on whether this pathname exists.
[ "cpe:2.3:a:osgeo:mapserver:4.2.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:osgeo:mapserver:4.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:osgeo:mapserver:4.4.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:osgeo:mapserver:4.4.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:osgeo:mapserver:4.4.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:osgeo:mapserver:4.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:osgeo:mapserver:4.6.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:osgeo:mapserver:4.6.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:osgeo:mapserver:4.6.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:osgeo:mapserver:4.6.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:osgeo:mapserver:4.8.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:osgeo:mapserver:4.8.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:osgeo:mapserver:4.8.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:osgeo:mapserver:4.8.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:osgeo:mapserver:4.8.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:osgeo:mapserver:4.10.0:*:*:*:*:*:*:*", "cpe:2.3:a:osgeo:mapserver:4.10.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:osgeo:mapserver:4.10.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:osgeo:mapserver:4.10.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:osgeo:mapserver:4.10.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:osgeo:mapserver:4.10.1:*:*:*:*:*:*:*", "cpe:2.3:a:osgeo:mapserver:4.10.2:*:*:*:*:*:*:*", "cpe:2.3:a:osgeo:mapserver:4.10.3:*:*:*:*:*:*:*", "cpe:2.3:a:osgeo:mapserver:5.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:osgeo:mapserver:5.0.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:osgeo:mapserver:5.0.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:osgeo:mapserver:5.0.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:osgeo:mapserver:5.0.0:beta4:*:*:*:*:*:*", "cpe:2.3:a:osgeo:mapserver:5.0.0:beta5:*:*:*:*:*:*", "cpe:2.3:a:osgeo:mapserver:5.0.0:beta6:*:*:*:*:*:*", "cpe:2.3:a:osgeo:mapserver:5.0.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:osgeo:mapserver:5.0.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:osgeo:mapserver:5.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:osgeo:mapserver:5.2.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:osgeo:mapserver:5.2.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:osgeo:mapserver:5.2.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:osgeo:mapserver:5.2.0:beta4:*:*:*:*:*:*", "cpe:2.3:a:osgeo:mapserver:5.2.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:osgeo:mapserver:5.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:umn:mapserver:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:umn:mapserver:4.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:umn:mapserver:4.0:beta2:*:*:*:*:*:*" ]
null
null
null
7.8
null
GHSA-6fjf-2cgp-836f
A Cross-Site Request Forgery (CSRF) in /member/post.php?job=postnew&step=post of Qibosoft v7 allows attackers to force victim users into arbitrarily publishing new articles via a crafted URL.
[]
null
null
null
null
null
CVE-2025-23958
WordPress Editor Wysiwyg Background Color plugin <= 1.0 - Broken Access Control vulnerability
Missing Authorization vulnerability in FADI MED Editor Wysiwyg Background Color allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Editor Wysiwyg Background Color: from n/a through 1.0.
[]
null
6.5
null
null
null
CVE-2017-2849
In the web management interface in Foscam C1 Indoor HD cameras with application firmware 2.52.2.37, a specially crafted HTTP request can allow for a user to inject arbitrary shell characters during NTP server configuration resulting in command injection. An attacker can simply send an HTTP request to the device to trigger this vulnerability.
[ "cpe:2.3:o:foscam:c1_indoor_hd_camera_firmware:2.52.2.37:*:*:*:*:*:*:*", "cpe:2.3:h:foscam:c1_indoor_hd_camera:-:*:*:*:*:*:*:*" ]
null
null
8.8
null
null
GHSA-qxw4-5w76-j3pr
An SQL injection vulnerability exists in the AssetActions.aspx functionality of Lansweeper lansweeper 9.1.20.2. A specially-crafted HTTP request can cause SQL injection. An attacker can make an authenticated HTTP request to trigger this vulnerability.
[]
null
8.8
null
null
null
CVE-2025-27867
Apache Felix HTTP Webconsole Plugin: XSS in HTTP Webconsole Plugin
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Apache Felix HTTP Webconsole Plugin. This issue affects Apache Felix HTTP Webconsole Plugin: from Version 1.X through 1.2.0. Users are recommended to upgrade to version 1.2.2, which fixes the issue.
[]
null
5.6
null
null
null
CVE-2024-12372
Rockwell Automation PowerMonitor™ 1000 Denial of Service
A denial-of-service and possible remote code execution vulnerability exists in the Rockwell Automation Power Monitor 1000. The vulnerability results in corruption of the heap memory which may compromise the integrity of the system, potentially allowing for remote code execution or a denial-of-service attack.
[]
9.3
null
null
null
null
CVE-2020-0568
Race condition in the Intel(R) Driver and Support Assistant before version 20.1.5 may allow an authenticated user to potentially enable denial of service via local access.
[ "cpe:2.3:a:intel:driver_\\&_support_assistant:*:*:*:*:*:*:*:*" ]
null
4.7
null
1.9
null
GHSA-jqpf-rmrm-4gj4
The VNC application stores its passwords encrypted within the registry but uses DES for encryption. As DES is broken, the original passwords can be recovered.
[]
null
4.4
null
null
null
GHSA-xqfj-6ppw-2qw5
A vulnerability in the Cisco&nbsp;Discovery Protocol implementation for Cisco&nbsp;IOS XR Software could allow an unauthenticated, adjacent attacker to cause the Cisco&nbsp;Discovery Protocol process to reload on an affected device. This vulnerability is due to a heap buffer overflow in certain Cisco&nbsp;Discovery Protocol messages. An attacker could exploit this vulnerability by sending a malicious Cisco&nbsp;Discovery Protocol packet to an affected device. A successful exploit could allow the attacker to cause a heap overflow, which could cause the Cisco&nbsp;Discovery Protocol process to reload on the device. The bytes that can be written in the buffer overflow are restricted, which limits remote code execution.Note: Cisco&nbsp;Discovery Protocol is a Layer 2 protocol. To exploit this vulnerability, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent). &nbsp;Cisco&nbsp;has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.This advisory is part of the September 2022 release of the Cisco&nbsp;IOS XR Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see .
[]
null
4.3
null
null
null
GHSA-jqrp-vr9m-25fh
An information leak in VISION MEAT WORKS Track Diner 10/10mbl v13.6.1 allows attackers to obtain the channel access token and send crafted messages.
[]
null
7.5
null
null
null
CVE-2002-2262
Unspecified vulnerability in xntpd of HP-UX 10.20 through 11.11 allows remote attackers to cause a denial of service (hang) via unknown attack vectors.
[ "cpe:2.3:o:hp:hp-ux:10:*:*:*:*:*:*:*", "cpe:2.3:o:hp:hp-ux:10.03:*:*:*:*:*:*:*", "cpe:2.3:o:hp:hp-ux:10.08:*:*:*:*:*:*:*", "cpe:2.3:o:hp:hp-ux:10.09:*:*:*:*:*:*:*", "cpe:2.3:o:hp:hp-ux:10.20:*:*:*:*:*:*:*", "cpe:2.3:o:hp:hp-ux:10.24:*:*:*:*:*:*:*", "cpe:2.3:o:hp:hp-ux:10.26:*:*:*:*:*:*:*", "cpe:2.3:o:hp:hp-ux:10.30:*:*:*:*:*:*:*", "cpe:2.3:o:hp:hp-ux:10.34:*:*:*:*:*:*:*", "cpe:2.3:o:hp:hp-ux:11:*:*:*:*:*:*:*", "cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*", "cpe:2.3:o:hp:hp-ux:11.0.4:*:*:*:*:*:*:*", "cpe:2.3:o:hp:hp-ux:11.04:*:*:*:*:*:*:*", "cpe:2.3:o:hp:hp-ux:11.11:*:*:*:*:*:*:*", "cpe:2.3:o:hp:hp-ux:11.11i:*:*:*:*:*:*:*" ]
null
null
null
5
null
GHSA-32qv-66w9-3gjf
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
[]
null
null
null
null
null
CVE-2009-1859
Adobe Reader 7 and Acrobat 7 before 7.1.3, Adobe Reader 8 and Acrobat 8 before 8.1.6, and Adobe Reader 9 and Acrobat 9 before 9.1.2 might allow attackers to execute arbitrary code via unspecified vectors that trigger memory corruption.
[ "cpe:2.3:a:adobe:acrobat:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0:*:professional:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0:*:standard:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.1:*:professional:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.1:*:standard:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.2:*:professional:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.2:*:standard:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.3:*:professional:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.3:*:standard:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.4:*:professional:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.4:*:standard:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.5:*:professional:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.5:*:standard:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.6:*:professional:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.6:*:standard:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.7:*:professional:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.7:*:standard:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.8:*:elements:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.8:*:professional:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.8:*:standard:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.9:*:professional:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.1:*:professional:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.1:*:standard:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.1.1:*:standard:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.0:*:professional:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.0:*:standard:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1:*:standard:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1.1:*:professional:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1.1:*:standard:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1.2:*:professional:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1.2:*:standard:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1.2:security_update:professional:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1.3:*:professional:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1.3:*:standard:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1.4:*:professional:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1.4:*:standard:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.0:*:standard:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.1:*:standard:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:7.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:7.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:7.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:7.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:7.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:7.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:7.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:7.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:7.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:7.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:7.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:8.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:8.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:8.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:8.1.2:security_update:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:8.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:8.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:8.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:9:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:9.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:9.1.1:*:*:*:*:*:*:*" ]
null
null
null
9.3
null
CVE-2021-21267
Regular Expression Denial-of-Service in npm schema-inspector
Schema-Inspector is an open-source tool to sanitize and validate JS objects (npm package schema-inspector). In before version 2.0.0, email address validation is vulnerable to a denial-of-service attack where some input (for example `a@0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.`) will freeze the program or web browser page executing the code. This affects any current schema-inspector users using any version to validate email addresses. Users who do not do email validation, and instead do other types of validation (like string min or max length, etc), are not affected. Users should upgrade to version 2.0.0, which uses a regex expression that isn't vulnerable to ReDoS.
[ "cpe:2.3:a:schema-inspector_project:schema-inspector:*:*:*:*:*:node.js:*:*", "cpe:2.3:a:netapp:e-series_performance_analyzer:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*" ]
null
7.5
null
null
null
CVE-2024-11325
AWeber Forms by Optin Cat <= 2.5.7 - Reflected Cross-Site Scripting
The AWeber Forms by Optin Cat plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 2.5.7. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
[]
null
5.2
null
null
null
GHSA-qfgj-vxwq-r49v
Integer underflow in the dccp_parse_options function (net/dccp/options.c) in the Linux kernel before 2.6.33.14 allows remote attackers to cause a denial of service via a Datagram Congestion Control Protocol (DCCP) packet with an invalid feature options length, which triggers a buffer over-read.
[]
null
7.5
null
null
null
CVE-2022-23810
Template injection (Improper Neutralization of Special Elements Used in a Template Engine) vulnerability in a-blog cms Ver.2.8.x series versions prior to Ver.2.8.75, Ver.2.9.x series versions prior to Ver.2.9.40, Ver.2.10.x series versions prior to Ver.2.10.44, Ver.2.11.x series versions prior to Ver.2.11.42, and Ver.3.0.x series versions prior to Ver.3.0.1 allows a remote authenticated attacker to obtain an arbitrary file on the server via unspecified vectors.
[ "cpe:2.3:a:appleple:a-blog_cms:*:*:*:*:*:*:*:*", "cpe:2.3:a:appleple:a-blog_cms:3.0.0:*:*:*:*:*:*:*" ]
null
6.5
null
4
null
PYSEC-2024-259
null
In PyTorch <=2.4.1, the RemoteModule has Deserialization RCE. NOTE: this is disputed by multiple parties because this is intended behavior in PyTorch distributed computing.
[]
null
9.8
null
null
null
CVE-2015-2135
Unspecified vulnerability in HP Intelligent Provisioning 1.00 through 1.62(a), 2.00, and 2.10 allows remote attackers to execute arbitrary code via unknown vectors.
[ "cpe:2.3:a:hp:intelligent_provisioning:*:*:*:*:*:*:*:*", "cpe:2.3:a:hp:intelligent_provisioning:2.00:*:*:*:*:*:*:*", "cpe:2.3:a:hp:intelligent_provisioning:2.10:*:*:*:*:*:*:*" ]
null
null
null
10
null
GHSA-f9gh-m5x7-5826
IBM Insights Foundation for Energy 2.0 is vulnerable to SQL injection. A remote attacker could send specially-crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-Force ID: 125719.
[]
null
null
8.8
null
null
CVE-2013-4447
Cross-site scripting (XSS) vulnerability in the API in the Simplenews module 6.x-1.x before 6.x-1.5 and 7.x-1.x before 7.x-1.1 for Drupal allows remote attackers to inject arbitrary web script or HTML via an email address.
[ "cpe:2.3:a:md-systems:simplenews:6.x-1.0:-:*:*:*:drupal:*:*", "cpe:2.3:a:md-systems:simplenews:6.x-1.0:beta1:*:*:*:drupal:*:*", "cpe:2.3:a:md-systems:simplenews:6.x-1.0:beta2:*:*:*:drupal:*:*", "cpe:2.3:a:md-systems:simplenews:6.x-1.0:beta3:*:*:*:drupal:*:*", "cpe:2.3:a:md-systems:simplenews:6.x-1.0:beta4:*:*:*:drupal:*:*", "cpe:2.3:a:md-systems:simplenews:6.x-1.0:beta5:*:*:*:drupal:*:*", "cpe:2.3:a:md-systems:simplenews:6.x-1.0:rc1:*:*:*:drupal:*:*", "cpe:2.3:a:md-systems:simplenews:6.x-1.0:rc2:*:*:*:drupal:*:*", "cpe:2.3:a:md-systems:simplenews:6.x-1.0:rc3:*:*:*:drupal:*:*", "cpe:2.3:a:md-systems:simplenews:6.x-1.0:rc4:*:*:*:drupal:*:*", "cpe:2.3:a:md-systems:simplenews:6.x-1.0:rc5:*:*:*:drupal:*:*", "cpe:2.3:a:md-systems:simplenews:6.x-1.0:rc6:*:*:*:drupal:*:*", "cpe:2.3:a:md-systems:simplenews:6.x-1.1:-:*:*:*:drupal:*:*", "cpe:2.3:a:md-systems:simplenews:6.x-1.2:-:*:*:*:drupal:*:*", "cpe:2.3:a:md-systems:simplenews:6.x-1.3:-:*:*:*:drupal:*:*", "cpe:2.3:a:md-systems:simplenews:6.x-1.4:-:*:*:*:drupal:*:*", "cpe:2.3:a:md-systems:simplenews:6.x-1.x:dev:*:*:*:drupal:*:*", "cpe:2.3:a:md-systems:simplenews:7.x-1.0:-:*:*:*:drupal:*:*", "cpe:2.3:a:md-systems:simplenews:7.x-1.0:alpha1:*:*:*:drupal:*:*", "cpe:2.3:a:md-systems:simplenews:7.x-1.0:alpha2:*:*:*:drupal:*:*", "cpe:2.3:a:md-systems:simplenews:7.x-1.0:beta1:*:*:*:drupal:*:*", "cpe:2.3:a:md-systems:simplenews:7.x-1.0:beta2:*:*:*:drupal:*:*", "cpe:2.3:a:md-systems:simplenews:7.x-1.0:rc1:*:*:*:drupal:*:*", "cpe:2.3:a:md-systems:simplenews:7.x-1.x:dev:*:*:*:drupal:*:*" ]
null
null
null
4.3
null
CVE-2012-2559
WellinTech KingHistorian 3.0 allows remote attackers to execute arbitrary code or cause a denial of service (invalid pointer write) via a crafted packet to TCP port 5678.
[ "cpe:2.3:a:wellintech:kinghistorian:3.0:*:*:*:*:*:*:*" ]
null
null
null
10
null
CVE-2024-21334
Open Management Infrastructure (OMI) Remote Code Execution Vulnerability
Open Management Infrastructure (OMI) Remote Code Execution Vulnerability
[ "cpe:2.3:a:microsoft:open_management_infrastructure:*:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:system_center_operations_manager:2019:-:*:*:*:*:*:*", "cpe:2.3:a:microsoft:system_center_operations_manager:2022:-:*:*:*:*:*:*" ]
null
9.8
null
null
null
CVE-2007-0117
DiskManagementTool in the DiskManagement.framework 92.29 on Mac OS X 10.4.8 does not properly validate Bill of Materials (BOM) files, which allows attackers to gain privileges via a BOM file under /Library/Receipts/, which triggers arbitrary file permission changes upon execution of a diskutil permission repair operation.
[ "cpe:2.3:o:apple:mac_os_x:10.4.8:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.4.8:*:*:*:*:*:*:*" ]
null
null
null
10
null
RHSA-2008:0175
Red Hat Security Advisory: openoffice.org security update
openoffice.org: Quattro Pro files handling heap overflows in Attribute and Font records openoffice.org: EMF files parsing EMR_BITBLT record heap overflows openoffice.org: Quattro Pro files parsing integer underflow openoffice.org: OLE files parsing heap overflows
[ "cpe:/a:redhat:rhel_productivity:5", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client" ]
null
null
null
null
null
GHSA-f5vv-hcgf-xvxq
Orthanc before 1.12.0 allows authenticated users with access to the Orthanc API to overwrite arbitrary files on the file system, and in specific deployment scenarios allows the attacker to overwrite the configuration, which can be exploited to trigger Remote Code Execution (RCE).
[]
null
8.8
null
null
null
GHSA-76xq-r882-9hgq
The Poll Maker WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the mcount parameter found in the ~/admin/partials/settings/poll-maker-settings.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 3.2.8.
[]
null
null
null
null
null
CVE-2025-45988
Blink routers BL-WR9000 V2.4.9 , BL-AC2100_AZ3 V1.0.4, BL-X10_AC8 v1.0.5 , BL-LTE300 v1.2.3, BL-F1200_AT1 v1.0.0, BL-X26_AC8 v1.2.8, BLAC450M_AE4 v4.0.0 and BL-X26_DA3 v1.2.7 were discovered to contain multiple command injection vulnerabilities via the cmd parameter in the bs_SetCmd function.
[]
null
9.8
null
null
null
GHSA-7xxg-7678-587v
The JPXStream::readTilePartData function in JPXStream.cc in xpdf 4.00 allows attackers to launch denial of service (heap-based buffer over-read and application crash) via a specific pdf file, as demonstrated by pdftohtml.
[]
null
null
5.5
null
null
GHSA-p29h-x3w2-549g
URL Redirection to Untrusted Site ('Open Redirect') vulnerability in Magazine3 Core Web Vitals & PageSpeed Booster.This issue affects Core Web Vitals & PageSpeed Booster: from n/a through 1.0.12.
[]
null
4.7
null
null
null
RHSA-2016:0014
Red Hat Security Advisory: libldb security update
libldb: Remote DoS in Samba (AD) LDAP server libldb: remote memory read in the Samba LDAP server
[ "cpe:/a:redhat:storage:3.1:samba:el7", "cpe:/a:redhat:storage:3.1:server:el6" ]
null
null
null
null
null
CVE-2017-15784
XnView Classic for Windows Version 2.43 allows attackers to execute arbitrary code or cause a denial of service via a crafted .dwg file, related to an "Illegal Instruction Violation starting at xnview+0x0000000000370074."
[ "cpe:2.3:a:xnview:xnview:2.43:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*" ]
null
null
7.8
6.8
null
GHSA-3285-56f3-892c
The Database Backup and check Tables Automated With Scheduler 2024 plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 2.32 via the database_backup_ajax_download() function. This makes it possible for authenticated attackers, with administrator-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information.
[]
null
4.9
null
null
null
CVE-2020-15849
Re:Desk 2.3 has a blind authenticated SQL injection vulnerability in the SettingsController class, in the actionEmailTemplates() method. A malicious actor with access to an administrative account could abuse this vulnerability to recover sensitive data from the application's database, allowing for authorization bypass and taking over additional accounts by means of modifying password-reset tokens stored in the database. Remote command execution is also possible by leveraging this to abuse the Yii framework's bizRule functionality, allowing for arbitrary PHP code to be executed by the application. Remote command execution is also possible by using this together with a separate insecure file upload vulnerability (CVE-2020-15488).
[ "cpe:2.3:a:re-desk:re\\:desk:2.3:*:*:*:*:*:*:*" ]
null
7.2
null
6.5
null
CVE-2022-26992
Arris routers SBR-AC1900P 1.0.7-B05, SBR-AC3200P 1.0.7-B05 and SBR-AC1200P 1.0.5-B05 were discovered to contain a command injection vulnerability in the ddns function via the DdnsUserName, DdnsHostName, and DdnsPassword parameters. This vulnerability allows attackers to execute arbitrary commands via a crafted request.
[ "cpe:2.3:o:arris:sbr-ac1900p_firmware:1.0.7-b05:*:*:*:*:*:*:*", "cpe:2.3:h:arris:sbr-ac1900p:-:*:*:*:*:*:*:*", "cpe:2.3:o:arris:sbr-ac3200p_firmware:1.0.7-b05:*:*:*:*:*:*:*", "cpe:2.3:h:arris:sbr-ac3200p:-:*:*:*:*:*:*:*", "cpe:2.3:o:arris:sbr-ac1200p_firmware:1.0.5-b05:*:*:*:*:*:*:*", "cpe:2.3:h:arris:sbr-ac1200p:-:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
null
GHSA-whg7-cqjh-3q4x
Multiple "command injection" vulnerabilities in Phorum 3.4 through 3.4.2 allow remote attackers to execute arbitrary commands and modify the Phorum configuration files via the (1) UserAdmin program, (2) Edit user profile, or (3) stats program.
[]
null
null
null
null
null
CVE-2021-33478
The TrustZone implementation in certain Broadcom MediaxChange firmware could allow an unauthenticated, physically proximate attacker to achieve arbitrary code execution in the TrustZone Trusted Execution Environment (TEE) of an affected device. This, for example, affects certain Cisco IP Phone and Wireless IP Phone products before 2021-07-07. Exploitation is possible only when the attacker can disassemble the device in order to control the voltage/current for chip pins.
[ "cpe:2.3:o:cisco:ip_phone_8800_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ip_phone_8800_series_with_multiplatform_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ip_phone_8811_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ip_phone_8811_with_multiplatform_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ip_phone_8841_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ip_phone_8841_with_multiplatform_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ip_phone_8845_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ip_phone_8845_with_multiplatform_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ip_phone_8851_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ip_phone_8851_with_multiplatform_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ip_phone_8861_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ip_phone_8861_with_multiplatform_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ip_phone_8865_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ip_phone_8865_with_multiplatform_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wireless_ip_phone_8821_firmware:*:*:*:*:*:*:*:*" ]
null
6.8
null
4.6
null
RHSA-2020:0811
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.2.7 security update
thrift: Endless loop when feed with specific input data thrift: Out-of-bounds read related to TJSONProtocol or TSimpleJSONProtocol apache-commons-beanutils: does not suppresses the class property in PropertyUtilsBean by default xml-security: Apache Santuario potentially loads XML parsing code from an untrusted source wildfly: The 'enabled-protocols' value in legacy security is not respected if OpenSSL security provider is in use netty: HTTP request smuggling netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.2" ]
null
7.5
7.4
null
null
GHSA-4c3c-8gp8-85c5
Vulnerability in the Oracle Marketing component of Oracle E-Business Suite (subcomponent: User Interface). Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5 and 12.2.6. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Marketing. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Marketing, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Marketing accessible data as well as unauthorized update, insert or delete access to some of Oracle Marketing accessible data. CVSS v3.0 Base Score 8.2 (Confidentiality and Integrity impacts).
[]
null
null
8.2
null
null
GHSA-gpxg-3cwf-59mg
Softnext Technologies Corp.’s SPAM SQR has a vulnerability of Code Injection within its specific function. An authenticated remote attacker with administrator privilege can exploit this vulnerability to execute arbitrary system command to perform arbitrary system operation or disrupt service.
[]
null
7.2
null
null
null
CVE-2024-0972
BuddyPress Members Only <= 3.3.5 - Improper Access Control to Sensitive Information Exposure via REST API
The BuddyPress Members Only plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 3.3.5 via the REST API. This makes it possible for unauthenticated attackers to bypass the plugin's "All Other Sections On Your Site Will be Opened to Guest" feature (when unset) and view restricted page and post content.
[ "cpe:2.3:a:zhuyi:buddypress_members_only:*:*:*:*:*:*:*:*", "cpe:2.3:a:membersonly:buddypress_members_only:*:*:*:*:*:wordpress:*:*" ]
null
5.3
null
null
null
CVE-2021-3056
PAN-OS: Memory Corruption Vulnerability in GlobalProtect Clientless VPN During SAML Authentication
A memory corruption vulnerability in Palo Alto Networks PAN-OS GlobalProtect Clientless VPN enables an authenticated attacker to execute arbitrary code with root user privileges during SAML authentication. This issue impacts: PAN-OS 8.1 versions earlier than PAN-OS 8.1.20; PAN-OS 9.0 versions earlier than PAN-OS 9.0.14; PAN-OS 9.1 versions earlier than PAN-OS 9.1.9; PAN-OS 10.0 versions earlier than PAN-OS 10.0.1. Prisma Access customers with Prisma Access 2.1 Preferred firewalls are impacted by this issue.
[ "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:10.0.0:*:*:*:*:*:*:*" ]
null
8.8
null
null
null
GHSA-p529-89xc-g5vh
Unspecified vulnerability in the Oracle Agile PLM component in Oracle Supply Chain Products Suite 9.3.4 and 9.3.5 allows remote attackers to affect confidentiality via vectors related to SDK, a different vulnerability than CVE-2016-3526 and CVE-2016-3529.
[]
null
null
5.3
null
null
GHSA-vfxx-4xcx-mgvh
In the Linux kernel, the following vulnerability has been resolved:netfs: Fix the (non-)cancellation of copy when cache is temporarily disabledWhen the caching for a cookie is temporarily disabled (e.g. due to a DIO write on that file), future copying to the cache for that file is disabled until all fds open on that file are closed. However, if netfslib is using the deprecated PG_private_2 method (such as is currently used by ceph), and decides it wants to copy to the cache, netfs_advance_write() will just bail at the first check seeing that the cache stream is unavailable, and indicate that it dealt with all the content.This means that we have no subrequests to provide notifications to drive the state machine or even to pin the request and the request just gets discarded, leaving the folios with PG_private_2 set.Fix this by jumping directly to cancel the request if the cache is not available. That way, we don't remove mark3 from the folio_queue list and netfs_pgpriv2_cancel() will clean up the folios.This was found by running the generic/013 xfstest against ceph with an active cache and the "-o fsc" option passed to ceph. That would usually hang
[]
null
null
null
null
null
CVE-2024-22075
Firefly III (aka firefly-iii) before 6.1.1 allows webhooks HTML Injection.
[ "cpe:2.3:a:firefly-iii:firefly_iii:*:*:*:*:*:*:*:*" ]
null
6.1
null
null
null
GHSA-hx7f-9jfv-xvrf
The jrCookie function in includes/jamroom-misc.inc.php in JamRoom before 3.4.0 allows remote attackers to bypass authentication and gain administrative access via a boolean value within serialized data in a JMU_Cookie cookie.
[]
null
null
null
null
null
GHSA-c3j9-w7pw-hrww
The (1) hugetlb_vmtruncate_list and (2) hugetlb_vmtruncate functions in fs/hugetlbfs/inode.c in the Linux kernel before 2.6.19-rc4 perform certain prio_tree calculations using HPAGE_SIZE instead of PAGE_SIZE units, which allows local users to cause a denial of service (panic) via unspecified vectors.
[]
null
null
null
null
null
GHSA-vjxq-fxvh-23vc
An issue was discovered in GitLab Community and Enterprise Edition 8.15 through 12.4. It has Insecure Permissions (issue 1 of 2).
[]
null
null
null
null
null
GHSA-cjm2-6jxj-2465
In the Linux kernel, the following vulnerability has been resolved:thermal: intel: int340x: processor: Fix warning during module unloadThe processor_thermal driver uses pcim_device_enable() to enable a PCI device, which means the device will be automatically disabled on driver detach. Thus there is no need to call pci_disable_device() again on it.With recent PCI device resource management improvements, e.g. commit f748a07a0b64 ("PCI: Remove legacy pcim_release()"), this problem is exposed and triggers the warining below.[ 224.010735] proc_thermal_pci 0000:00:04.0: disabling already-disabled device [ 224.010747] WARNING: CPU: 8 PID: 4442 at drivers/pci/pci.c:2250 pci_disable_device+0xe5/0x100 ... [ 224.010844] Call Trace: [ 224.010845] <TASK> [ 224.010847] ? show_regs+0x6d/0x80 [ 224.010851] ? __warn+0x8c/0x140 [ 224.010854] ? pci_disable_device+0xe5/0x100 [ 224.010856] ? report_bug+0x1c9/0x1e0 [ 224.010859] ? handle_bug+0x46/0x80 [ 224.010862] ? exc_invalid_op+0x1d/0x80 [ 224.010863] ? asm_exc_invalid_op+0x1f/0x30 [ 224.010867] ? pci_disable_device+0xe5/0x100 [ 224.010869] ? pci_disable_device+0xe5/0x100 [ 224.010871] ? kfree+0x21a/0x2b0 [ 224.010873] pcim_disable_device+0x20/0x30 [ 224.010875] devm_action_release+0x16/0x20 [ 224.010878] release_nodes+0x47/0xc0 [ 224.010880] devres_release_all+0x9f/0xe0 [ 224.010883] device_unbind_cleanup+0x12/0x80 [ 224.010885] device_release_driver_internal+0x1ca/0x210 [ 224.010887] driver_detach+0x4e/0xa0 [ 224.010889] bus_remove_driver+0x6f/0xf0 [ 224.010890] driver_unregister+0x35/0x60 [ 224.010892] pci_unregister_driver+0x44/0x90 [ 224.010894] proc_thermal_pci_driver_exit+0x14/0x5f0 [processor_thermal_device_pci] ... [ 224.010921] ---[ end trace 0000000000000000 ]---Remove the excess pci_disable_device() calls.[ rjw: Subject and changelog edits ]
[]
null
5.5
null
null
null
GHSA-3cw8-r66w-2976
Illustrator versions 29.2.1, 28.7.4 and earlier are affected by an Untrusted Search Path vulnerability that might allow attackers to execute their own programs, access unauthorized data files, or modify configuration in unexpected ways. If the application uses a search path to locate critical resources such as programs, then an attacker could modify that search path to point to a malicious program, which the targeted application would then execute. The problem extends to any type of critical resource that the application trusts.
[]
null
7.8
null
null
null
GHSA-9v5v-qfv2-66qp
A use-after-free issue was addressed with improved memory management. This issue is fixed in iOS 17 and iPadOS 17, macOS Sonoma 14, watchOS 10, tvOS 17, Safari 17. Processing web content may lead to arbitrary code execution.
[]
null
8.8
null
null
null
CVE-2024-27257
IBM OpenPages information disclosure
IBM OpenPages 8.3 and 9.0 potentially exposes information about client-side source code through use of JavaScript source maps to unauthorized users.
[ "cpe:2.3:a:ibm:openpages_with_watson:8.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:openpages_with_watson:9.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:openpages_grc_platform:*:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:openpages_with_watson:*:*:*:*:*:*:*:*" ]
null
4.3
null
null
null
GHSA-8662-q8m2-gwg3
Stack-based buffer overflow in Unitronics VisiLogic OPLC IDE before 9.8.30 allows remote attackers to execute arbitrary code via a crafted filename field in a ZIP archive in a vlp file.
[]
null
null
9.8
null
null
GHSA-h327-5h5x-675h
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Wikimedia Foundation Mediawiki - SocialProfile Extension allows Functionality Misuse.This issue affects Mediawiki - SocialProfile Extension: from 1.39.X before 1.39.11, from 1.41.X before 1.41.3, from 1.42.X before 1.42.2.
[]
null
2.4
null
null
null
GHSA-qm5f-3c7g-gj8r
The School Management System – SakolaWP plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.8. This is due to missing or incorrect nonce validation on the 'save_exam_setting' and 'delete_exam_setting' actions. This makes it possible for unauthenticated attackers to update exam settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
[]
null
4.3
null
null
null
ICSA-22-235-07
Hitachi Energy RTU500
This vulnerability exists in the HCI Modbus TCP function in affected product versions. If the HCI Modbus TCP is enabled and configured, an attacker could exploit the vulnerability by sending a specially crafted message to the RTU500 in a high rate, causing the targeted RTU500 CMU to reboot. There is a lack of flood control, which if exploited, could cause an internal stack overflow in the HCI Modbus TCP function.CVE-2022-2081 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
[]
null
null
7.5
null
null
GHSA-q658-rvwc-wq3g
NVIDIA Virtual GPU Manager contains a vulnerability in the vGPU plugin, in which the software reads from a buffer by using buffer access mechanisms such as indexes or pointers that reference memory locations after the targeted buffer, which may lead to code execution, denial of service, escalation of privileges, or information disclosure. This affects vGPU version 8.x (prior to 8.4), version 9.x (prior to 9.4) and version 10.x (prior to 10.3).
[]
null
null
null
null
null
CVE-2024-51582
WordPress WP Hotel Booking plugin <= 2.1.4 - Local File Inclusion vulnerability
Path Traversal: '.../...//' vulnerability in ThimPress WP Hotel Booking allows PHP Local File Inclusion.This issue affects WP Hotel Booking: from n/a through 2.1.4.
[ "cpe:2.3:a:thimpress:wp_hotel_booking:-:*:*:*:*:wordpress:*:*", "cpe:2.3:a:thimpress:wp_hotel_booking:*:*:*:*:*:wordpress:*:*" ]
null
7.5
null
null
null
GHSA-h6g2-hv3m-2mvr
A validated user not explicitly authorized to have access to certain sensitive information could access Philips Vue PACS on the same network to expose that information.
[]
8.8
8.2
null
null
null
PYSEC-2023-260
null
A reflected Cross-Site Scripting (XSS) vulnerability exists in the mlflow/mlflow repository, specifically within the handling of the Content-Type header in POST requests. An attacker can inject malicious JavaScript code into the Content-Type header, which is then improperly reflected back to the user without adequate sanitization or escaping, leading to arbitrary JavaScript execution in the context of the victim's browser. The vulnerability is present in the mlflow/server/auth/__init__.py file, where the user-supplied Content-Type header is directly injected into a Python formatted string and returned to the user, facilitating the XSS attack.
[]
null
6.1
null
null
null
CVE-2024-29969
TLS/SSL weak message authentication code ciphers are added by default for port 18082
When a Brocade SANnav installation is upgraded from Brocade SANnav v2.2.2 to Brocade SANnav 2.3.0, TLS/SSL weak message authentication code ciphers are added by default for port 18082.
[ "cpe:2.3:a:brocade:sannav:*:*:*:*:*:*:*:*" ]
null
7.5
null
null
null
CVE-2025-31221
An integer overflow was addressed with improved input validation. This issue is fixed in watchOS 11.5, macOS Sonoma 14.7.6, tvOS 18.5, iPadOS 17.7.7, iOS 18.5 and iPadOS 18.5, macOS Sequoia 15.5, visionOS 2.5, macOS Ventura 13.7.6. A remote attacker may be able to leak memory.
[]
null
7.5
null
null
null
GHSA-gm9v-2778-r2wp
A vulnerability classified as critical has been found in SourceCodester Student Result Management System 1.0. This affects an unknown part of the file /admin/core/new_user of the component Register Interface. The manipulation leads to improper access controls. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
[]
6.9
5.3
null
null
null
CVE-2024-8076
TOTOLINK AC1200 T8 setDiagnosisCfg buffer overflow
A vulnerability was found in TOTOLINK AC1200 T8 4.1.5cu.862_B20230228 and classified as critical. Affected by this issue is the function setDiagnosisCfg. The manipulation leads to buffer overflow. The attack may be launched remotely. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
[ "cpe:2.3:h:totolink:ac1200_t8:4.1.5cu.862_b20230228:*:*:*:*:*:*:*", "cpe:2.3:o:totolink:t8_firmware:4.1.5cu.862_b20230228:*:*:*:*:*:*:*", "cpe:2.3:h:totolink:t8:-:*:*:*:*:*:*:*" ]
8.7
8.8
8.8
9
null
RHSA-2023:0441
Red Hat Security Advisory: kpatch-patch security update
kernel: i915: Incorrect GPU TLB flush can lead to random memory access
[ "cpe:/o:redhat:rhel_eus:8.6::baseos" ]
null
7
null
null
null
CVE-2021-27703
Sercomm Model Etisalat Model S3- AC2100 is affected by Cross Site Scripting (XSS) via the firmware update page.
[]
null
5.4
null
null
null
GHSA-4g35-r4h2-vfq3
CA (formerly Computer Associates) eTrust ITM (Threat Manager) 8.1 stores sensitive user information in log files with predictable names, which allows remote attackers to obtain this information via unspecified vectors.
[]
null
null
null
null
null
CVE-2024-37358
Apache James: denial of service through the use of IMAP literals
Similarly to CVE-2024-34055, Apache James is vulnerable to denial of service through the abuse of IMAP literals from both authenticated and unauthenticated users, which could be used to cause unbounded memory allocation and very long computations Version 3.7.6 and 3.8.2 restrict such illegitimate use of IMAP literals.
[]
null
8.6
null
null
null
CVE-2022-35831
Windows Remote Access Connection Manager Information Disclosure Vulnerability
Windows Remote Access Connection Manager Information Disclosure Vulnerability
[ "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*" ]
null
5.5
null
null
null
RHSA-2022:4667
Red Hat Security Advisory: OpenShift Virtualization 4.10.1 RPMs security and bug fix update
prometheus/client_golang: Denial of service using InstrumentHandlerCounter
[ "cpe:/a:redhat:container_native_virtualization:4.10::el7", "cpe:/a:redhat:container_native_virtualization:4.10::el8" ]
null
7.5
null
null
null
CVE-2000-0106
The EasyCart shopping cart application allows remote users to modify sensitive purchase information via hidden form fields.
[ "cpe:2.3:a:easycart:easycart:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
cisco-sa-ftd-dos-JnnJm4wB
Cisco Firepower Threat Defense Software Denial of Service Vulnerability
A vulnerability in the connection handling function in Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to improper traffic handling when platform limits are reached. An attacker could exploit this vulnerability by sending a high rate of UDP traffic through an affected device. A successful exploit could allow the attacker to cause all new, incoming connections to be dropped, resulting in a DoS condition. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is part of the April 2022 release of the Cisco ASA, FTD, and FMC Security Advisory Bundled publication. For a complete list of the advisories and links to them, see Cisco Event Response: April 2022 Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication ["https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-74836"].
[]
null
8.6
null
null
null
CVE-2023-5345
Use-after-free in Linux kernel's fs/smb/client component
A use-after-free vulnerability in the Linux kernel's fs/smb/client component can be exploited to achieve local privilege escalation. In case of an error in smb3_fs_context_parse_param, ctx->password was freed but the field was not set to NULL which could lead to double free. We recommend upgrading past commit e6e43b8aa7cd3c3af686caf0c2e11819a886d705.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.6:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.6:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.6:rc3:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*" ]
null
7.8
null
null
null
GHSA-xjgj-h9x9-m8vv
The Traveloka application 3.14.0 for Android exports com.traveloka.android.activity.common.WebViewActivity, leading to file disclosure and XSS.
[]
null
4.7
null
null
null
GHSA-969p-8qf6-mrvc
Improper Authorization vulnerability in Link Sharing prior to version 12.4.00.3 allows attackers to open protected activity via PreconditionActivity.
[]
null
5.3
null
null
null
CVE-2021-42314
Microsoft Defender for IoT Remote Code Execution Vulnerability
Microsoft Defender for IoT Remote Code Execution Vulnerability
[ "cpe:2.3:a:microsoft:defender_for_iot:-:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:defender_for_iot:*:*:*:*:*:*:*:*" ]
null
8.8
null
null
null
GHSA-x7h5-4q34-2r6v
Mozilla Firefox 4.x through 8.0, Thunderbird 5.0 through 8.0, and SeaMonkey before 2.6 allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via an Ogg VIDEO element that is not properly handled after scaling.
[]
null
null
null
null
null
CVE-2025-38346
ftrace: Fix UAF when lookup kallsym after ftrace disabled
In the Linux kernel, the following vulnerability has been resolved: ftrace: Fix UAF when lookup kallsym after ftrace disabled The following issue happens with a buggy module: BUG: unable to handle page fault for address: ffffffffc05d0218 PGD 1bd66f067 P4D 1bd66f067 PUD 1bd671067 PMD 101808067 PTE 0 Oops: Oops: 0000 [#1] SMP KASAN PTI Tainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS RIP: 0010:sized_strscpy+0x81/0x2f0 RSP: 0018:ffff88812d76fa08 EFLAGS: 00010246 RAX: 0000000000000000 RBX: ffffffffc0601010 RCX: dffffc0000000000 RDX: 0000000000000038 RSI: dffffc0000000000 RDI: ffff88812608da2d RBP: 8080808080808080 R08: ffff88812608da2d R09: ffff88812608da68 R10: ffff88812608d82d R11: ffff88812608d810 R12: 0000000000000038 R13: ffff88812608da2d R14: ffffffffc05d0218 R15: fefefefefefefeff FS: 00007fef552de740(0000) GS:ffff8884251c7000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffffffc05d0218 CR3: 00000001146f0000 CR4: 00000000000006f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: <TASK> ftrace_mod_get_kallsym+0x1ac/0x590 update_iter_mod+0x239/0x5b0 s_next+0x5b/0xa0 seq_read_iter+0x8c9/0x1070 seq_read+0x249/0x3b0 proc_reg_read+0x1b0/0x280 vfs_read+0x17f/0x920 ksys_read+0xf3/0x1c0 do_syscall_64+0x5f/0x2e0 entry_SYSCALL_64_after_hwframe+0x76/0x7e The above issue may happen as follows: (1) Add kprobe tracepoint; (2) insmod test.ko; (3) Module triggers ftrace disabled; (4) rmmod test.ko; (5) cat /proc/kallsyms; --> Will trigger UAF as test.ko already removed; ftrace_mod_get_kallsym() ... strscpy(module_name, mod_map->mod->name, MODULE_NAME_LEN); ... The problem is when a module triggers an issue with ftrace and sets ftrace_disable. The ftrace_disable is set when an anomaly is discovered and to prevent any more damage, ftrace stops all text modification. The issue that happened was that the ftrace_disable stops more than just the text modification. When a module is loaded, its init functions can also be traced. Because kallsyms deletes the init functions after a module has loaded, ftrace saves them when the module is loaded and function tracing is enabled. This allows the output of the function trace to show the init function names instead of just their raw memory addresses. When a module is removed, ftrace_release_mod() is called, and if ftrace_disable is set, it just returns without doing anything more. The problem here is that it leaves the mod_list still around and if kallsyms is called, it will call into this code and access the module memory that has already been freed as it will return: strscpy(module_name, mod_map->mod->name, MODULE_NAME_LEN); Where the "mod" no longer exists and triggers a UAF bug.
[]
null
null
null
null
null
GHSA-6w62-442x-wvg8
Buffer overflow in several Database Consistency Checkers (DBCCs) for Microsoft SQL Server 2000 and Microsoft Desktop Engine (MSDE) 2000 allows members of the db_owner and db_ddladmin roles to execute arbitrary code.
[]
null
null
null
null
null