id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
197k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
CVE-2021-21829
A heap-based buffer overflow vulnerability exists in the XML Decompression EnumerationUncompressor::UncompressItem functionality of AT&T Labs’ Xmill 0.7. A specially crafted XMI file can lead to remote code execution. An attacker can provide a malicious file to trigger this vulnerability.
[ "cpe:2.3:a:att:xmill:0.7:*:*:*:*:*:*:*" ]
null
null
8.1
null
CVE-2024-43391
Phoenix Contact: Firewall reconfiguration through the FW_PORTFORWARDING.SRC_IP in MGUARD devices
A low privileged remote attacker can perform configuration changes of the firewall services, including packet filter, packet forwarding, network access control or NAT through the FW_PORTFORWARDING.SRC_IP environment variable which can lead to a DoS.
[ "cpe:2.3:o:phoenixcontact:tc_mguard_rs4000_4g_vzw_vpn_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:tc_mguard_rs4000_4g_vzw_vpn:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:tc_mguard_rs4000_4g_vpn_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:tc_mguard_rs4000_4g_vpn:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:tc_mguard_rs4000_4g_att_vpn_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:tc_mguard_rs4000_4g_att_vpn:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:tc_mguard_rs4000_3g_vpn_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:tc_mguard_rs4000_3g_vpn:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:tc_mguard_rs2000_4g_vzw_vpn_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:tc_mguard_rs2000_4g_vzw_vpn:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:tc_mguard_rs2000_4g_vpn_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:tc_mguard_rs2000_4g_vpn:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:tc_mguard_rs2000_4g_att_vpn_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:tc_mguard_rs2000_4g_att_vpn:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:tc_mguard_rs2000_3g_vpn_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:tc_mguard_rs2000_3g_vpn:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_smart2_vpn_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_mguard_smart2_vpn:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_smart2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_mguard_smart2:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_rs4004_tx\\/dtx_vpn_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_mguard_rs4004_tx\\/dtx_vpn:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_rs4004_tx\\/dtx_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_mguard_rs4004_tx\\/dtx:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_rs4000_tx\\/tx_vpn_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_mguard_rs4000_tx\\/tx_vpn:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_rs4000_tx\\/tx-p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_mguard_rs4000_tx\\/tx-p:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_rs4000_tx\\/tx-m_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_mguard_rs4000_tx\\/tx-m:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_rs4000_tx\\/tx_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_mguard_rs4000_tx\\/tx:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_rs2005_tx_vpn_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_mguard_rs2005_tx_vpn:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_rs2000_tx\\/tx_vpn_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_mguard_rs2000_tx\\/tx_vpn:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_rs2000_tx\\/tx-b_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_mguard_rs2000_tx\\/tx-b:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_pcie4000_vpn_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_mguard_pcie4000_vpn:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_pcie4000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_mguard_pcie4000:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_pci4000_vpn_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_mguard_pci4000_vpn:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_pci4000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_mguard_pci4000:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_gt\\/gt_vpn_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_mguard_gt\\/gt_vpn:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_gt\\/gt_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_mguard_gt\\/gt:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_delta_tx\\/tx_vpn_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_mguard_delta_tx\\/tx_vpn:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_delta_tx\\/tx_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_mguard_delta_tx\\/tx:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_core_tx_vpn_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_mguard_core_tx_vpn:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_core_tx_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_mguard_core_tx:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_centerport_vpn-1000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_mguard_centerport_vpn-1000:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_4305_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_mguard_4305:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_4302_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_mguard_4302:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_4102_pcie_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_mguard_4102_pcie:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_4102_pci_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_mguard_4102_pci:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_2105_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_mguard_2105:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_2102_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_mguard_2102:-:*:*:*:*:*:*:*" ]
null
8.1
null
null
RHSA-2024:8969
Red Hat Security Advisory: Red Hat Ansible Automation Platform Execution Environments Container Release Update
ansible-core: Exposure of Sensitive Information in Ansible Vault Files Due to Improper Logging ansible-core: Ansible-core user may read/write unauthorized content
[ "cpe:/a:redhat:ansible_automation_platform:ee::el8", "cpe:/a:redhat:ansible_automation_platform:ee::el9" ]
null
6.3
null
null
CVE-2024-25074
An issue was discovered in Samsung Semiconductor Mobile Processor and Modem Exynos 9820, Exynos 9825, Exynos 980, Exynos 990, Exynos 850, Exynos 1080, Exynos 2100, Exynos 2200, Exynos 1280, Exynos 1380, Exynos 1330, Exynos 9110, Exynos W920, Exynos W930, Exynos Modem 5123, Exynos Modem 5300. The baseband software does not properly check a pointer specified by the SM (Session Management module), which can lead to Denial of Service (Untrusted Pointer Dereference).
[]
null
5.9
null
null
CVE-2023-24956
Forget Heart Message Box v1.1 was discovered to contain a SQL injection vulnerability via the name parameter at /cha.php.
[ "cpe:2.3:a:forget_heart_message_box_project:forget_heart_message_box:1.1:*:*:*:*:*:*:*" ]
null
8.8
null
null
GHSA-gwhh-28wm-q9vf
SQL Injection vulnerability in dataease before 1.2.0, allows attackers to gain sensitive information via the orders parameter to /api/sys_msg/list/1/10.
[]
null
7.5
null
null
GHSA-9mpf-9xm9-9826
The mintToken function of a smart contract implementation for SpeedCashLite (SCSL), an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value.
[]
null
7.5
null
null
CVE-2013-6796
The SMTP server in DeepOfix 3.3 and earlier allows remote attackers to bypass authentication via an empty password, which triggers an LDAP anonymous bind.
[ "cpe:2.3:a:deeproot_linux:deepofix:*:*:*:*:*:*:*:*" ]
null
null
null
5
RHSA-2022:0777
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
kernel: Use After Free in unix_gc() which could result in a local privilege escalation kernel: use-after-free in RDMA listen() kernel: tcp: fix page frag corruption on page fault kernel: possible privileges escalation due to missing TLB flush kernel: remote stack overflow via kernel panic on systems using TIPC may lead to DoS kernel: missing check in ioctl allows kernel memory read/write kernel: failing usercopy allows for use-after-free exploitation
[ "cpe:/a:redhat:rhel_eus:8.4::crb", "cpe:/o:redhat:rhel_eus:8.4::baseos" ]
null
7
null
null
CVE-2023-42009
IBM InfoSphere Information Server cross-site scripting
IBM InfoSphere Information Server 11.7 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 265504.
[ "cpe:2.3:a:ibm:infosphere_information_server:*:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:infosphere_information_server:*:*:*:*:on_cloud:*:*:*", "cpe:2.3:o:ibm:aix:-:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
5.4
null
null
GHSA-2w84-9xxr-7qr9
A Read-Only User Effect Change vulnerability in the Policy Builder interface of Cisco Policy Suite could allow an authenticated, remote attacker to make policy changes in the Policy Builder interface. The vulnerability is due to insufficient authorization controls. An attacker could exploit this vulnerability by accessing the Policy Builder interface and modifying an HTTP request. A successful exploit could allow the attacker to make changes to existing policies. Cisco Bug IDs: CSCvi35007.
[]
null
null
6.5
null
CVE-2015-5173
Cloud Foundry Runtime cf-release before 216, UAA before 2.5.2, and Pivotal Cloud Foundry (PCF) Elastic Runtime before 1.7.0 allow attackers to have unspecified impact via vectors involving emails with password recovery links, aka "Cross Domain Referer Leakage."
[ "cpe:2.3:a:cloudfoundry:cf-release:*:*:*:*:*:*:*:*", "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:*:*:*:*:*:*:*:*", "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:*:*:*:*:*:*:*:*" ]
null
8.8
null
6.8
GHSA-hppr-6qxj-jhgx
In phpMyFaq before 2.9.9, there is CSRF in admin/ajax.config.php.
[]
null
null
8.8
null
GHSA-r66x-78gw-39v4
CodeAvalanche Directory stores sensitive information under the web root with insufficient access control, which allows remote attackers to download the database file containing the administrator password via a direct request for _private/CADirectory.mdb. NOTE: some of these details are obtained from third party information.
[]
null
null
null
null
GHSA-cqhq-5mcx-c3m9
An issue in floodlight v1.2 allows a local attacker to cause a denial of service via the Topology Manager module, Topologylnstance module, Routing module.
[]
null
5.5
null
null
RHSA-2025:8252
Red Hat Security Advisory: libsoup security update
libsoup: Heap buffer over-read in `skip_insignificant_space` when sniffing content libsoup: Integer Underflow in soup_multipart_new_from_message() Leading to Denial of Service in libsoup libsoup: Denial of Service attack to websocket server libsoup: OOB Read on libsoup through function "soup_multipart_new_from_message" in soup-multipart.c leads to crash or exit of process
[ "cpe:/a:redhat:rhel_eus:8.8::appstream", "cpe:/o:redhat:rhel_eus:8.8::baseos" ]
null
7.4
null
null
CVE-2024-27778
An improper neutralization of special elements used in an OS Command vulnerability [CWE-78] in Fortinet FortiSandbox version 4.4.0 through 4.4.4, 4.2.0 through 4.2.6 and below 4.0.4 allows an authenticated attacker with at least read-only permission to execute unauthorized commands via crafted requests.
[]
null
8.3
null
null
CVE-2025-27207
Adobe Commerce | Improper Access Control (CWE-284)
Adobe Commerce versions 2.4.8, 2.4.7-p5, 2.4.6-p10, 2.4.5-p12, 2.4.4-p13 and earlier are affected by an Improper Access Control vulnerability that could result in privilege escalation. A low privileged attacker could leverage this vulnerability to bypass security measures and gain unauthorized read access. Exploitation of this issue does not require user interaction.
[]
null
6.5
null
null
GHSA-8r7j-pj39-v7xh
Hitachi Vantara Pentaho Business Analytics Server prior to versions 9.4.0.0 and 9.3.0.2, including 8.3.x display the target path on host when a file is uploaded with an invalid character in its name.
[]
null
4.3
null
null
CVE-2021-4048
An out-of-bounds read flaw was found in the CLARRV, DLARRV, SLARRV, and ZLARRV functions in lapack through version 3.10.0, as also used in OpenBLAS before version 0.3.18. Specially crafted inputs passed to these functions could cause an application using lapack to crash or possibly disclose portions of its memory.
[ "cpe:2.3:a:lapack_project:lapack:*:*:*:*:*:*:*:*", "cpe:2.3:a:openblas_project:openblas:*:*:*:*:*:*:*:*", "cpe:2.3:a:julialang:julia:*:*:*:*:*:*:*:*", "cpe:2.3:a:julialang:julia:1.7.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:julialang:julia:1.7.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:julialang:julia:1.7.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:julialang:julia:1.7.0:beta4:*:*:*:*:*:*", "cpe:2.3:a:julialang:julia:1.7.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:redhat:ceph_storage:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:ceph_storage:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:ceph_storage:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:openshift_container_storage:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:openshift_data_foundation:4.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*" ]
null
9.1
null
6.4
GHSA-2849-xmf3-cv2h
A memory corruption issue was addressed with improved memory handling. This issue is fixed in macOS Catalina 10.15. An application may be able to execute arbitrary code with system privileges.
[]
null
null
null
null
CVE-2023-38064
In JetBrains TeamCity before 2023.05.1 build chain parameters of the "password" type could be written to the agent log
[ "cpe:2.3:a:jetbrains:teamcity:*:*:*:*:*:*:*:*" ]
null
4.3
null
null
CVE-2015-1548
mini_httpd 1.21 and earlier allows remote attackers to obtain sensitive information from process memory via an HTTP request with a long protocol string, which triggers an incorrect response size calculation and an out-of-bounds read.
[ "cpe:2.3:a:acme:mini_httpd:*:*:*:*:*:*:*:*" ]
null
null
null
5
CVE-2007-1789
Flyspray 0.9.9 allows remote attackers to obtain sensitive information (private project summaries) via direct requests.
[ "cpe:2.3:a:flyspray:flyspray:0.9.9:*:*:*:*:*:*:*" ]
null
null
null
6.8
CVE-2019-14294
An issue was discovered in Xpdf 4.01.01. There is a use-after-free in the function JPXStream::fillReadBuf at JPXStream.cc, due to an out of bounds read.
[ "cpe:2.3:a:glyphandcog:xpdfreader:4.01.01:*:*:*:*:*:*:*" ]
null
null
5.5
4.3
CVE-2015-1272
Use-after-free vulnerability in the GPU process implementation in Google Chrome before 44.0.2403.89 allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging the continued availability of a GPUChannelHost data structure during Blink shutdown, related to content/browser/gpu/browser_gpu_channel_host_factory.cc and content/renderer/render_thread_impl.cc.
[ "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2021-46478
Jsish v3.5.0 was discovered to contain a heap buffer overflow via jsiClearStack in src/jsiEval.c. This vulnerability can lead to a Denial of Service (DoS).
[ "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*" ]
null
5.5
null
4.3
GHSA-4h97-gx53-pcm9
The CTHthemes CityBook before 2.3.4, TownHub before 1.0.6, and EasyBook before 1.2.2 themes for WordPress allow Persistent XSS via the chat widget/page message form.
[]
null
null
null
null
CVE-2019-18676
An issue was discovered in Squid 3.x and 4.x through 4.8. Due to incorrect input validation, there is a heap-based buffer overflow that can result in Denial of Service to all clients using the proxy. Severity is high due to this vulnerability occurring before normal security checks; any remote client that can reach the proxy port can trivially perform the attack via a crafted URI scheme.
[ "cpe:2.3:a:squid-cache:squid:*:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*" ]
null
7.5
null
5
cisco-sa-3000-9000-fileaction-QtLzDRy2
Cisco NX-OS Software Unauthenticated Arbitrary File Actions Vulnerability
A vulnerability in the implementation of an internal file management service for Cisco Nexus 3000 Series Switches and Cisco Nexus 9000 Series Switches in standalone NX-OS mode that are running Cisco NX-OS Software could allow an unauthenticated, remote attacker to create, delete, or overwrite arbitrary files with root privileges on the device. This vulnerability exists because TCP port 9075 is incorrectly configured to listen and respond to external connection requests. An attacker could exploit this vulnerability by sending crafted TCP packets to an IP address that is configured on a local interface on TCP port 9075. A successful exploit could allow the attacker to create, delete, or overwrite arbitrary files, including sensitive files that are related to the device configuration. For example, the attacker could add a user account without the device administrator knowing. Cisco has released software updates that address this vulnerability. There are workarounds that address this vulnerability. This advisory is part of the February 2021 Cisco FXOS and NX-OS Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: February 2021 Cisco FXOS and NX-OS Software Security Advisory Bundled Publication ["https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-74414"].
[]
null
9.8
null
null
GHSA-pphf-qgjw-p8w7
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: btnxpuart: Fix btnxpuart_closeFix scheduling while atomic BUG in btnxpuart_close(), properly purge the transmit queue and free the receive skb.[ 10.973809] BUG: scheduling while atomic: kworker/u9:0/80/0x00000002 ... [ 10.980740] CPU: 3 PID: 80 Comm: kworker/u9:0 Not tainted 6.8.0-rc7-0.0.0-devel-00005-g61fdfceacf09 #1 [ 10.980751] Hardware name: Toradex Verdin AM62 WB on Dahlia Board (DT) [ 10.980760] Workqueue: hci0 hci_power_off [bluetooth] [ 10.981169] Call trace: ... [ 10.981363] uart_update_mctrl+0x58/0x78 [ 10.981373] uart_dtr_rts+0x104/0x114 [ 10.981381] tty_port_shutdown+0xd4/0xdc [ 10.981396] tty_port_close+0x40/0xbc [ 10.981407] uart_close+0x34/0x9c [ 10.981414] ttyport_close+0x50/0x94 [ 10.981430] serdev_device_close+0x40/0x50 [ 10.981442] btnxpuart_close+0x24/0x98 [btnxpuart] [ 10.981469] hci_dev_close_sync+0x2d8/0x718 [bluetooth] [ 10.981728] hci_dev_do_close+0x2c/0x70 [bluetooth] [ 10.981862] hci_power_off+0x20/0x64 [bluetooth]
[]
null
null
null
null
GHSA-82q8-cp6f-mm8v
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Jojaba Access Category Password allows Reflected XSS.This issue affects Access Category Password: from n/a through 1.5.1.
[]
null
7.1
null
null
CVE-2020-10367
Certain Cypress (and Broadcom) Wireless Combo chips, when a January 2021 firmware update is not present, allow memory access via a "Spectra" attack.
[]
null
5.5
null
null
GHSA-mg6j-7hwf-j46v
OpenSSH before 3.0.1 with Kerberos V enabled does not properly authenticate users, which could allow remote attackers to login unchallenged.
[]
null
null
null
null
CVE-2014-7919
b/libs/gui/ISurfaceComposer.cpp in Android allows attackers to trigger a denial of service (null pointer dereference and process crash).
[ "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*" ]
null
null
7.5
5
GHSA-vq49-7r44-hh7p
A vulnerability was found in PopojiCMS 2.0.1 and classified as problematic. This issue affects some unknown processing of the file install.php of the component Web Config. The manipulation of the argument Site Title with the input <script>alert(1)</script> leads to cross site scripting. The attack may be initiated remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The identifier VDB-244229 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
[]
null
null
2.6
null
GHSA-9cqp-q38m-rfw4
In Progress® Telerik® Document Processing Libraries, versions prior to 2025 Q1 (2025.1.205), unzipping an archive can lead to arbitrary file system access.
[]
null
8.3
null
null
GHSA-8grx-rjm9-f6qq
An issue was discovered in PunBB before 1.4.6. An XSS vulnerability in the [email] BBcode tag allows (with authentication) injecting arbitrary JavaScript into any forum message.
[]
null
null
null
null
CVE-2011-3012
The ioQuake3 engine, as used in World of Padman 1.2 and earlier, Tremulous 1.1.0, and ioUrbanTerror 2007-12-20, does not check for dangerous file extensions before writing to the quake3 directory, which allows remote attackers to execute arbitrary code via a crafted third-party addon that creates a Trojan horse DLL file, a different vulnerability than CVE-2011-2764.
[ "cpe:2.3:a:ioquake3:ioquake3_engine:*:*:*:*:*:*:*:*", "cpe:2.3:a:tremulous:tremulous:1.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:urbanterror:iourbanterror:2007-12-20:*:*:*:*:*:*:*", "cpe:2.3:a:worldofpadman:world_of_padman:*:*:*:*:*:*:*:*" ]
null
null
null
10
CVE-2023-52805
jfs: fix array-index-out-of-bounds in diAlloc
In the Linux kernel, the following vulnerability has been resolved: jfs: fix array-index-out-of-bounds in diAlloc Currently there is not check against the agno of the iag while allocating new inodes to avoid fragmentation problem. Added the check which is required.
[]
null
7.8
null
null
CVE-2021-40826
Clementine Music Player through 1.3.1 is vulnerable to a User Mode Write Access Violation, affecting the MP3 file parsing functionality at clementine+0x3aa207. The vulnerability is triggered when the user opens a crafted MP3 file or loads a remote stream URL that is mishandled by Clementine. Attackers could exploit this issue to cause a crash (DoS) of the clementine.exe process or achieve arbitrary code execution in the context of the current logged-in Windows user.
[ "cpe:2.3:a:clementine-player:clementine:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
7.8
null
6.8
CVE-2005-1728
MCX Client for Apple Mac OS X 10.4.x up to 10.4.1 insecurely logs Portable Home Directory credentials, which allows local users to obtain the credentials.
[ "cpe:2.3:o:apple:mac_os_x:10.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.4.1:*:*:*:*:*:*:*" ]
null
null
null
4.6
CVE-2006-1842
Cross-site scripting (XSS) vulnerability in global.php in ShoutBOOK 1.1 allows remote attackers to inject arbitrary web script or HTML via the (1) NAME and (2) COMMENTS parameters.
[ "cpe:2.3:a:cynical_games:shoutbook:1.1:*:*:*:*:*:*:*" ]
null
null
null
2.6
GHSA-373h-5fj9-5xc7
Full path disclosure in the Googlemaps plugin before 3.1 for Joomla!.
[]
null
null
5.3
null
CVE-2024-24150
A memory leak issue discovered in parseSWF_TEXTRECORD in libming v0.4.8 allows attackers to cause a denial of service via a crafted SWF file.
[ "cpe:2.3:a:libming:libming:0.4.8:*:*:*:*:*:*:*" ]
null
6.5
null
null
CVE-2024-42423
Citrix Workspace App version 23.9.0.24.4 on Dell ThinOS 2311 contains an Incorrect Authorization vulnerability when Citrix CEB is enabled for WebLogin. A local unauthenticated user with low privileges may potentially exploit this vulnerability to bypass existing controls and perform unauthorized actions leading to information disclosure and tampering.
[ "cpe:2.3:a:citrix:workspace:23.9.0.24.4:*:*:*:*:*:*:*", "cpe:2.3:o:dell:thinos:2402:*:*:*:*:*:*:*", "cpe:2.3:o:dell:thinos:2311:*:*:*:*:*:*:*" ]
null
6.1
null
null
CVE-2013-4857
D-Link DIR-865L has PHP File Inclusion in the router xml file.
[ "cpe:2.3:o:dlink:dir-865l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:dir-865l:-:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
CVE-2022-22930
A remote code execution (RCE) vulnerability in the Template Management function of MCMS v5.2.4 allows attackers to execute arbitrary code via a crafted payload.
[ "cpe:2.3:a:mingsoft:mcms:5.2.4:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
CVE-2024-48987
Snipe-IT before 7.0.10 allows remote code execution (associated with cookie serialization) when an attacker knows the APP_KEY. This is exacerbated by .env files, available from the product's repository, that have default APP_KEY values.
[ "cpe:2.3:a:snipeitapp:snipe-it:*:*:*:*:*:*:*:*" ]
null
6.6
null
null
CVE-2012-2864
Mesa, as used in Google Chrome before 21.0.1183.0 on the Acer AC700, Cr-48, and Samsung Series 5 and 5 550 Chromebook platforms, and the Samsung Chromebox Series 3, allows remote attackers to execute arbitrary code via unspecified vectors that trigger an "array overflow."
[ "cpe:2.3:o:google:chrome_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:21.0.1180.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:21.0.1180.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:21.0.1180.2:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:21.0.1180.3:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:21.0.1180.4:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:21.0.1180.5:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:21.0.1180.6:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:21.0.1180.7:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:21.0.1180.8:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:21.0.1180.9:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:21.0.1180.10:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:21.0.1180.11:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:21.0.1180.13:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:21.0.1180.14:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:21.0.1180.15:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:21.0.1180.17:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:21.0.1180.18:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:21.0.1180.31:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:21.0.1180.32:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:21.0.1180.33:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:21.0.1180.34:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:21.0.1180.35:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:21.0.1180.36:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:21.0.1180.37:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:21.0.1180.38:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:21.0.1180.39:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:21.0.1180.41:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:21.0.1180.46:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:21.0.1180.47:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:21.0.1180.48:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:21.0.1180.49:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:21.0.1180.50:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:21.0.1180.79:*:*:*:*:*:*:*", "cpe:2.3:h:acer:ac700_chromebook:-:*:*:*:*:*:*:*", "cpe:2.3:h:google:cr-48_chromebook:-:*:*:*:*:*:*:*", "cpe:2.3:h:samsung:series_5_550_chromebook:-:*:*:*:*:*:*:*", "cpe:2.3:h:samsung:series_5_chromebook:-:*:*:*:*:*:*:*" ]
null
null
null
10
GHSA-qqfg-frwj-847v
Untrusted search path vulnerability in Microsoft Internet Explorer 9 on Windows Server 2008 R2 and R2 SP1 and Windows 7 Gold and SP1 allows local users to gain privileges via a Trojan horse DLL in the current working directory, as demonstrated by a directory that contains an HTML file, aka "Internet Explorer Insecure Library Loading Vulnerability."
[]
null
null
null
null
CVE-2017-10356
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Java SE, Java SE Embedded, JRockit executes to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 6.2 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
[ "cpe:2.3:a:oracle:jdk:1.6.0:update161:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update151:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.9.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update161:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update151:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.9.0:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*", "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*", "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*", "cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*", "cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*", "cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*", "cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*", "cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*", "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*", "cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*", "cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*", "cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*", "cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*", "cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*", "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" ]
null
6.2
null
2.1
GHSA-7j77-rcrw-mhm8
Microsoft Message Queuing Denial of Service Vulnerability
[]
null
6.5
null
null
GHSA-w49r-x3v6-c9fq
A vulnerability was found in code-projects Simple Online Hotel Reservation System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /admin/edit_query_account.php. The manipulation of the argument Name leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
[]
5.5
7.3
null
null
GHSA-g78f-6xq7-rrhq
An issue was discovered in Mattermost Server before 4.3.0, 4.2.1, and 4.1.2. It allows attackers to gain privileges by accessing unintended API endpoints on a user's behalf.
[]
null
null
null
null
GHSA-pj74-hxf7-xf99
There is an LDAP bind credentials exposure on KACE Systems Deployment and Remote Site appliances 9.0.146. The captured credentials may provide a higher privilege level on the Active Directory domain. To exploit this, an authenticated attacker edits the user-authentication settings to specify an attacker-controlled LDAP server, clicks the Test Settings button, and captures the cleartext credentials.
[]
null
6.5
null
null
CVE-2020-35462
Version 3.16.0 of the CoScale agent Docker image contains a blank password for the root user. Systems deployed using affected versions of the CoScale agent container may allow a remote attacker to achieve root access with a blank password.
[ "cpe:2.3:a:coscale_agent_project:coscale_agent:3.16.0:*:*:*:*:*:*:*" ]
null
9.8
null
10
CVE-2025-24452
InDesign Desktop | Out-of-bounds Write (CWE-787)
InDesign Desktop versions ID20.1, ID19.5.2 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[]
null
7.8
null
null
CVE-2022-47578
An issue was discovered in the endpoint protection agent in Zoho ManageEngine Device Control Plus 10.1.2228.15. Despite configuring complete restrictions on USB pendrives, USB HDD devices, memory cards, USB connections to mobile devices, etc., it is still possible to bypass the USB restrictions by booting into Safe Mode. This allows a file to be exchanged outside the laptop/system. Safe Mode can be launched by any user (even without admin rights). Data exfiltration can occur, and also malware might be introduced onto the system. NOTE: the vendor's position is "it's not a vulnerability in our product."
[ "cpe:2.3:a:zohocorp:manageengine_device_control_plus:10.1.2228.15:*:*:*:*:*:*:*" ]
null
7.1
null
null
GHSA-cgqc-747x-pr3m
Adobe Flash Player before 10.3.181.14 on Windows, Mac OS X, Linux, and Solaris and before 10.3.185.21 on Android allows attackers to execute arbitrary code via unspecified vectors, related to a "bounds checking" issue, a different vulnerability than CVE-2011-0624, CVE-2011-0625, and CVE-2011-0626.
[]
null
null
null
null
CVE-2017-18060
In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, improper input validation for resp_event->vdev_id in wma_unified_bcntx_status_event_handler(), which is received from firmware, leads to potential out of bounds memory read.
[ "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*" ]
null
null
7.5
5
GHSA-8wfc-hch7-gvrx
Directory traversal vulnerability in the MimeBodyPart.getFileName method in JavaMail 1.3.2 allows remote attackers to write arbitrary files via a .. (dot dot) in the filename in the Content-Disposition header.
[]
null
null
null
null
CVE-2013-7179
The ping functionality in cgi-bin/diagnostic.cgi on Seowon Intech SWC-9100 routers allows remote attackers to execute arbitrary commands via shell metacharacters in the ping_ipaddr parameter.
[ "cpe:2.3:h:seowonintech:swc-9100:-:*:*:*:*:*:*:*" ]
null
null
null
8.3
GHSA-qm43-g2xj-hvg5
User enumeration vulnerability in Liferay Portal 7.2.0 through 7.4.3.26, and older unsupported versions, and Liferay DXP 7.4 before update 27, 7.3 before update 8, 7.2 before fix pack 20, and older unsupported versions allows remote attackers to determine if an account exist in the application by comparing the request's response time.
[]
null
5.3
null
null
GHSA-7g24-qg88-p43q
jose4j uses weak cryptographic algorithm
jose4j before v0.9.3 allows attackers to set a low PBES2 iteration count of 1000 or less.
[]
null
7.5
null
null
CVE-2021-28628
Adobe Experience Manager Cross-site Scripting vulnerability in inbox render.jsp
Adobe Experience Manager Cloud Service offering, as well as versions 6.5.8.0 (and below) is affected by a Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
[ "cpe:2.3:a:adobe:experience_manager:*:*:*:*:cloud_service:*:*:*" ]
null
6.3
null
null
GHSA-h676-pjr4-hgqx
Path Traversal in S-Cart
A Directory Traversal vulnerability exists in S-Cart 6.7 via download in sc-admin/backup.
[]
null
4.4
null
null
RHSA-2025:9838
Red Hat Security Advisory: Satellite 6.15.5.3 Async Update
cjson: segmentation violation in function cJSON_InsertItemInArray cjson: segmentation violation in function cJSON_SetValuestring sqlparse: parsing heavily nested list leads to denial of service cjson: segmentation violation trigger through the second parameter of function cJSON_SetValuestring at cJSON.c rubygem-rack: Unbounded-Parameter DoS in Rack::QueryParser
[ "cpe:/a:redhat:satellite:6.15::el8", "cpe:/a:redhat:satellite_capsule:6.15::el8", "cpe:/a:redhat:satellite_utils:6.15::el8" ]
null
7.5
null
null
GHSA-8m85-9jc9-wrwp
RPM secure Stream can access any secure resource due to improper SMMU configuration and can lead to information disclosure in Snapdragon Industrial IOT, Snapdragon Mobile
[]
null
5.5
null
null
CVE-2023-24146
TOTOLINK CA300-PoE V6.2c.884 was discovered to contain a command injection vulnerability via the minute parameter in the setRebootScheCfg function.
[ "cpe:2.3:o:totolink:ca300-poe_firmware:6.2c.884:*:*:*:*:*:*:*", "cpe:2.3:h:totolink:ca300-poe:-:*:*:*:*:*:*:*" ]
null
9.8
null
null
RHSA-2010:0140
Red Hat Security Advisory: pango security update
libpangoft2 segfaults on forged font files
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
GHSA-76x5-m9p8-42mc
Buffer overflow in Stormy Studios Knet 1.04c and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code via a long HTTP GET request.
[]
null
null
null
null
GHSA-grp2-56hp-6jw2
WPGIMP32.FLT in Microsoft Office 2000 SP3, XP SP3, and 2003 SP2; Office Converter Pack; and Works 8 does not properly parse the length of a WordPerfect Graphics (WPG) file, which allows remote attackers to execute arbitrary code via a crafted WPG file, aka the "WPG Image File Heap Corruption Vulnerability."
[]
null
null
null
null
CVE-2021-21122
Use after free in Blink in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:edge_chromium:*:*:*:*:*:*:*:*" ]
null
8.8
null
6.8
GHSA-gqrc-m5mp-p6jj
paintballrefjosh/MaNGOSWebV4 4.0.8 is vulnerable to a reflected XSS in inc/admin/template_files/admin.faq.php (id parameter).
[]
null
null
6.1
null
CVE-2011-3967
Unspecified vulnerability in Google Chrome before 17.0.963.46 allows remote attackers to cause a denial of service (application crash) via a crafted certificate.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" ]
null
null
null
5
RHSA-2022:7134
Red Hat Security Advisory: kernel-rt security and bug fix update
kernel: information leak in scsi_ioctl() kernel: kernel info leak issue in pfkey_register kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation hw: cpu: AMD: RetBleed Arbitrary Speculative Code Execution with Return Instructions hw: cpu: AMD: Branch Type Confusion (non-retbleed) hw: cpu: Intel: information disclosure via local access hw: cpu: AMD: RetBleed Arbitrary Speculative Code Execution with Return Instructions hw: cpu: Intel: RetBleed Arbitrary Speculative Code Execution with Return Instructions
[ "cpe:/a:redhat:enterprise_linux:8::nfv", "cpe:/a:redhat:enterprise_linux:8::realtime" ]
null
5.6
null
null
CVE-2018-11751
Previous versions of Puppet Agent didn't verify the peer in the SSL connection prior to downloading the CRL. This issue is resolved in Puppet Agent 6.4.0.
[ "cpe:2.3:a:puppet:puppet_server:*:*:*:*:*:*:*:*" ]
null
5.4
null
4.8
GHSA-25q6-m425-9fqr
Feehi CMS Cross-site Scripting
A stored cross-site scripting (XSS) vulnerability in `/index.php?r=site%2Fsignup` of Feehi CMS v2.1.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the username field.
[]
null
5.4
null
null
CVE-2024-35582
A cross-site scripting (XSS) vulnerability in Sourcecodester Laboratory Management System v1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Department input field.
[ "cpe:2.3:a:sourcecodester:laboratory_management_system:1.0:*:*:*:*:*:*:*" ]
null
6.1
null
null
GHSA-5w78-v688-cx9q
Answer vulnerable to Cross-site Scripting
Cross-site Scripting (XSS) - Stored in GitHub repository answerdev/answer prior to 1.0.6.
[]
null
5.4
null
null
ICSA-22-195-16
Siemens EN100 Ethernet Module
Affected applications contains a memory corruption vulnerability while parsing specially crafted HTTP packets to /txtrace endpoint manupulating a specific argument. This could allow an attacker to crash the affected application leading to a denial of service condition
[]
null
8.6
null
null
CVE-2019-9391
In libxaac, there is a possible out of bounds read due to uninitialized data. This could lead to information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-111050781
[ "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*" ]
null
6.5
null
4.3
CVE-2024-10956
Cross-Site WebSocket Hijacking in binary-husky/gpt_academic
GPT Academy version 3.83 in the binary-husky/gpt_academic repository is vulnerable to Cross-Site WebSocket Hijacking (CSWSH). This vulnerability allows an attacker to hijack an existing WebSocket connection between the victim's browser and the server, enabling unauthorized actions such as deleting conversation history without the victim's consent. The issue arises due to insufficient WebSocket authentication and lack of origin validation.
[]
null
null
7.6
null
CVE-2021-24360
Yes/No Chart < 1.0.12 - Authenticated (contributor+) Blind SQL Injection
The Yes/No Chart WordPress plugin before 1.0.12 did not sanitise its sid shortcode parameter before using it in a SQL statement, allowing medium privilege users (contributor+) to perform Blind SQL Injection attacks
[ "cpe:2.3:a:kohsei-works:yes\\/no_chart:*:*:*:*:*:wordpress:*:*" ]
null
6.5
null
4
GHSA-hgwq-wchh-f9vv
iperf3 before 3.14 allows peers to cause an integer overflow and heap corruption via a crafted length field.
[]
null
5.5
null
null
CVE-2016-4960
For the NVIDIA Quadro, NVS, and GeForce products, the NVIDIA NVStreamKMS.sys service component is improperly validating user-supplied data through its API entry points causing an elevation of privilege.
[ "cpe:2.3:a:nvidia:geforce_experience:-:*:*:*:*:*:*:*", "cpe:2.3:h:nvidia:geforce_910m:-:*:*:*:*:*:*:*", "cpe:2.3:h:nvidia:geforce_920m:-:*:*:*:*:*:*:*", "cpe:2.3:h:nvidia:geforce_920mx:-:*:*:*:*:*:*:*", "cpe:2.3:h:nvidia:geforce_930m:-:*:*:*:*:*:*:*", "cpe:2.3:h:nvidia:geforce_930mx:-:*:*:*:*:*:*:*", "cpe:2.3:h:nvidia:geforce_940m:-:*:*:*:*:*:*:*", "cpe:2.3:h:nvidia:geforce_940mx:-:*:*:*:*:*:*:*", "cpe:2.3:h:nvidia:geforce_945m:-:*:*:*:*:*:*:*", "cpe:2.3:h:nvidia:geforce_gt_710:-:*:*:*:*:*:*:*", "cpe:2.3:h:nvidia:geforce_gt_730:-:*:*:*:*:*:*:*", "cpe:2.3:h:nvidia:geforce_gtx_1050:-:*:*:*:*:*:*:*", "cpe:2.3:h:nvidia:geforce_gtx_1060:-:*:*:*:*:*:*:*", "cpe:2.3:h:nvidia:geforce_gtx_1070:-:*:*:*:*:*:*:*", "cpe:2.3:h:nvidia:geforce_gtx_1080:-:*:*:*:*:*:*:*", "cpe:2.3:h:nvidia:geforce_gtx_950m:-:*:*:*:*:*:*:*", "cpe:2.3:h:nvidia:geforce_gtx_960m:-:*:*:*:*:*:*:*", "cpe:2.3:h:nvidia:geforce_gtx_965m:-:*:*:*:*:*:*:*", "cpe:2.3:h:nvidia:nvs_310:-:*:*:*:*:*:*:*", "cpe:2.3:h:nvidia:nvs_315:-:*:*:*:*:*:*:*", "cpe:2.3:h:nvidia:nvs_510:-:*:*:*:*:*:*:*", "cpe:2.3:h:nvidia:nvs_810:-:*:*:*:*:*:*:*", "cpe:2.3:h:nvidia:quadro_k1200:-:*:*:*:*:*:*:*", "cpe:2.3:h:nvidia:quadro_k420:-:*:*:*:*:*:*:*", "cpe:2.3:h:nvidia:quadro_k620:-:*:*:*:*:*:*:*", "cpe:2.3:h:nvidia:quadro_m1000m:-:*:*:*:*:*:*:*", "cpe:2.3:h:nvidia:quadro_m2000:-:*:*:*:*:*:*:*", "cpe:2.3:h:nvidia:quadro_m2000m:-:*:*:*:*:*:*:*", "cpe:2.3:h:nvidia:quadro_m3000m:-:*:*:*:*:*:*:*", "cpe:2.3:h:nvidia:quadro_m4000:-:*:*:*:*:*:*:*", "cpe:2.3:h:nvidia:quadro_m4000m:-:*:*:*:*:*:*:*", "cpe:2.3:h:nvidia:quadro_m5000:-:*:*:*:*:*:*:*", "cpe:2.3:h:nvidia:quadro_m5000m:-:*:*:*:*:*:*:*", "cpe:2.3:h:nvidia:quadro_m500m:-:*:*:*:*:*:*:*", "cpe:2.3:h:nvidia:quadro_m5500:-:*:*:*:*:*:*:*", "cpe:2.3:h:nvidia:quadro_m6000:-:*:*:*:*:*:*:*", "cpe:2.3:h:nvidia:quadro_m600m:-:*:*:*:*:*:*:*", "cpe:2.3:h:nvidia:quadro_p5000:-:*:*:*:*:*:*:*", "cpe:2.3:h:nvidia:quadro_p6000:-:*:*:*:*:*:*:*", "cpe:2.3:h:nvidia:titan_x:-:*:*:*:*:*:*:*" ]
null
null
7.3
6.9
GHSA-f55p-m2v7-m3pw
WebKit in Apple iOS before 9.3 and Safari before 9.1 allows remote attackers to bypass the Same Origin Policy and obtain physical-location data via a crafted geolocation request.
[]
null
null
6.5
null
GHSA-jm6x-683j-pm4v
In the Linux kernel, the following vulnerability has been resolved:i2c: imx: fix reference leak when pm_runtime_get_sync failsIn i2c_imx_xfer() and i2c_imx_remove(), the pm reference count is not expected to be incremented on return.However, pm_runtime_get_sync will increment pm reference count even failed. Forgetting to putting operation will result in a reference leak here.Replace it with pm_runtime_resume_and_get to keep usage counter balanced.
[]
null
5.5
null
null
CVE-2018-1554
IBM Maximo Asset Management 7.6 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 142891.
[ "cpe:2.3:a:ibm:maximo_asset_management:*:*:*:*:*:*:*:*" ]
null
null
5.4
null
GHSA-gcc7-974f-gvp3
A vulnerability was found in EasyAdmin8 2.0.2.2. It has been classified as problematic. Affected is an unknown function of the file /admin/index/index.html#/admin/mall.goods/index.html of the component File Upload Module. The manipulation leads to unrestricted upload. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-235068. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
[]
null
null
3.9
null
GHSA-937f-c6gr-9r2j
IBM QRadar Incident Forensics 7.2 and 7.3 does not properly restrict the size or amount of resources requested which could allow an unauthenticated user to cause a denial of service. IBM X-Force ID: 144650.
[]
null
null
7.5
null
CVE-2014-2545
TIBCO Managed File Transfer Internet Server before 7.2.2, Managed File Transfer Command Center before 7.2.2, Slingshot before 1.9.1, and Vault before 1.0.1 allow remote attackers to obtain sensitive information via a crafted HTTP request.
[ "cpe:2.3:a:tibco:slingshot:*:*:*:*:*:*:*:*", "cpe:2.3:a:tibco:slingshot:1.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:tibco:slingshot:1.8.0:*:*:*:*:*:*:*", "cpe:2.3:a:tibco:slingshot:1.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:tibco:vault:*:*:*:*:*:*:*:*", "cpe:2.3:a:tibco:managed_file_transfer_command_center:*:*:*:*:*:*:*:*", "cpe:2.3:a:tibco:managed_file_transfer_command_center:6.7:*:*:*:*:*:*:*", "cpe:2.3:a:tibco:managed_file_transfer_command_center:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:tibco:managed_file_transfer_command_center:7.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:tibco:managed_file_transfer_command_center:7.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:tibco:managed_file_transfer_command_center:7.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:tibco:managed_file_transfer_internet_server:*:*:*:*:*:*:*:*", "cpe:2.3:a:tibco:managed_file_transfer_internet_server:6.7:*:*:*:*:*:*:*", "cpe:2.3:a:tibco:managed_file_transfer_internet_server:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:tibco:managed_file_transfer_internet_server:7.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:tibco:managed_file_transfer_internet_server:7.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:tibco:managed_file_transfer_internet_server:7.2.0:*:*:*:*:*:*:*" ]
null
null
null
5
CVE-2014-5639
The ADT Taxis (aka com.icabbi.adttaxisApp) application 6 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[ "cpe:2.3:a:adt-taxis:adt_taxis:6.0:*:*:*:*:android:*:*" ]
null
null
null
5.4
CVE-1999-0834
Buffer overflow in RSAREF2 via the encryption and decryption functions in the RSAREF library.
[ "cpe:2.3:a:rsa:rsaref:2.0:*:*:*:*:*:*:*" ]
null
null
null
10
GHSA-rhpx-9698-w5hr
Windows Themes Information Disclosure Vulnerability
[]
null
4.7
null
null
GHSA-736r-p8hh-3qrw
An issue was discovered in idreamsoft iCMS V7.0.13. There is SQL Injection via the app/article/article.admincp.php _data_id parameter.
[]
null
null
9.8
null
CVE-2020-10113
cPanel before 84.0.20 allows self XSS via a temporary character-set specification (SEC-515).
[ "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*" ]
null
6.1
null
4.3
CVE-2003-0257
Format string vulnerability in the printer capability for IBM AIX .3, 5.1, and 5.2 allows local users to gain printq or root privileges.
[ "cpe:2.3:o:ibm:aix:4.3:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:aix:4.3.1:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:aix:4.3.2:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:aix:4.3.3:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:aix:5.1:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:aix:5.2:*:*:*:*:*:*:*" ]
null
null
null
7.2
CVE-2022-50229
ALSA: bcd2000: Fix a UAF bug on the error path of probing
In the Linux kernel, the following vulnerability has been resolved: ALSA: bcd2000: Fix a UAF bug on the error path of probing When the driver fails in snd_card_register() at probe time, it will free the 'bcd2k->midi_out_urb' before killing it, which may cause a UAF bug. The following log can reveal it: [ 50.727020] BUG: KASAN: use-after-free in bcd2000_input_complete+0x1f1/0x2e0 [snd_bcd2000] [ 50.727623] Read of size 8 at addr ffff88810fab0e88 by task swapper/4/0 [ 50.729530] Call Trace: [ 50.732899] bcd2000_input_complete+0x1f1/0x2e0 [snd_bcd2000] Fix this by adding usb_kill_urb() before usb_free_urb().
[]
null
null
null
null