id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
189k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
patch_commit_url
stringlengths
38
232
CVE-2012-5300
SQL injection vulnerability in art_catalogo.php in MyStore Xpress Tienda Virtual 2.0 allows remote attackers to execute arbitrary SQL commands via the id parameter.
[ "cpe:2.3:a:mystorexpress:tienda_virtual:2.0:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2019-20719
Certain NETGEAR devices are affected by a buffer overflow by an authenticated user. This affects D6220 before 1.0.0.48, D6400 before 1.0.0.82, D7000v2 before 1.0.0.52, D8500 before 1.0.3.43, R6250 before 1.0.4.34, R6400 before 1.0.1.44, R6400v2 before 1.0.2.62, R7000P before 1.4.1.30, R7100LG before 1.0.0.48, R7300DST before 1.0.0.68, R7900 before 1.0.3.8, R7900P before 1.4.1.30, R8000 before 1.0.4.28, R8000P before 1.4.1.30, R8300 before 1.0.2.128, and R8500 before 1.0.2.128.
[ "cpe:2.3:o:netgear:d6220_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:d6220:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:d6400_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:d6400:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:d7000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:d7000:v2:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:d8500_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:d8500:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r6250_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r6250:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r6400_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r6400:-:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r6400:v2:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r7000p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r7000p:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r7100lg_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r7100lg:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r7300dst_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r7300dst:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r7900_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r7900:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r7900p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r7900p:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r8000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r8000:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r8000p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r8000p:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r8300_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r8300:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r8500_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r8500:-:*:*:*:*:*:*:*" ]
null
null
6.8
null
null
CVE-2011-0908
Open redirect vulnerability in Vanilla Forums before 2.0.17.6 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the Target parameter to an unspecified component, a different vulnerability than CVE-2011-0526.
[ "cpe:2.3:a:vanillaforums:vanilla:*:*:*:*:*:*:*:*", "cpe:2.3:a:vanillaforums:vanilla:2.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:vanillaforums:vanilla:2.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:vanillaforums:vanilla:2.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:vanillaforums:vanilla:2.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:vanillaforums:vanilla:2.0.13:*:*:*:*:*:*:*", "cpe:2.3:a:vanillaforums:vanilla:2.0.14:*:*:*:*:*:*:*", "cpe:2.3:a:vanillaforums:vanilla:2.0.15:*:*:*:*:*:*:*", "cpe:2.3:a:vanillaforums:vanilla:2.0.16:*:*:*:*:*:*:*", "cpe:2.3:a:vanillaforums:vanilla:2.0.17:*:*:*:*:*:*:*", "cpe:2.3:a:vanillaforums:vanilla:2.0.17.1:*:*:*:*:*:*:*", "cpe:2.3:a:vanillaforums:vanilla:2.0.17.2:*:*:*:*:*:*:*", "cpe:2.3:a:vanillaforums:vanilla:2.0.17.3:*:*:*:*:*:*:*", "cpe:2.3:a:vanillaforums:vanilla:2.0.17.4:*:*:*:*:*:*:*" ]
null
null
null
5.8
null
GHSA-fg5c-ff2p-69xc
Tenda AC6V1.0 V15.03.05.19 was discovered to contain a buffer overflow via the deviceId parameter in the formSetClientState function.
[]
null
7.5
null
null
null
CVE-2007-5383
The Thomson/Alcatel SpeedTouch 7G router, as used for the BT Home Hub 6.2.6.B and earlier, allows remote attackers on an intranet to bypass authentication and gain administrative access via vectors including a '/' (slash) character at the end of the PATH_INFO to cgi/b, aka "double-slash auth bypass." NOTE: remote attackers outside the intranet can exploit this by leveraging a separate CSRF vulnerability. NOTE: SpeedTouch 780 might also be affected by some of these issues.
[ "cpe:2.3:h:alcatel:speedtouch_7g_router:*:*:*:*:*:*:*:*", "cpe:2.3:h:bt:home_hub:*:*:*:*:*:*:*:*" ]
null
null
null
10
null
GHSA-5wj9-5hwc-xr22
Cross-site scripting (XSS) vulnerability in Apple Safari before 5.0.1 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1.1 on Mac OS X 10.4, allows remote attackers to inject arbitrary web script or HTML via an RSS feed.
[]
null
null
null
null
null
GHSA-6hf4-vpmw-h78p
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader 11.1.0.52543. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of JPEG2000 images. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated structure. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-15812.
[]
null
null
null
null
null
CVE-2012-0883
envvars (aka envvars-std) in the Apache HTTP Server before 2.4.2 places a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse DSO in the current working directory during execution of apachectl.
[ "cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.4.1:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*" ]
null
null
null
6.9
null
CVE-2019-13363
admin.php?page=notification_by_mail in Piwigo 2.9.5 has XSS via the nbm_send_html_mail, nbm_send_mail_as, nbm_send_detailed_content, nbm_complementary_mail_content, nbm_send_recent_post_dates, or param_submit parameter. This is exploitable via CSRF.
[ "cpe:2.3:a:piwigo:piwigo:2.9.5:*:*:*:*:*:*:*" ]
null
9.6
null
6.8
null
CVE-2006-0172
Cross-site scripting (XSS) vulnerability in the file manager utility in Hummingbird Collaboration (aka Hummingbird Enterprise Collaboration) 5.21 and earlier allows remote attackers to inject arbitrary web script or HTML in an uploaded page, which is published without a check for hostile scripting.
[ "cpe:2.3:a:hummingbird:enterprise_collaboration:*:*:*:*:*:*:*:*", "cpe:2.3:a:hummingbird:enterprise_collaboration:5.2:*:*:*:*:*:*:*" ]
null
null
null
3.5
null
GHSA-fv43-627p-jvmr
IBM Power9 (AIX 7.1, 7.2, and VIOS 3.1) processors could allow a local user to obtain sensitive information from the data in the L1 cache under extenuating circumstances. IBM X-Force ID: 189296.
[]
null
4.7
null
null
null
GHSA-vpgj-6w52-7hjj
Missing Authorization vulnerability in Printful Printful Integration for WooCommerce allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Printful Integration for WooCommerce: from n/a through 2.2.3.
[]
null
4.3
null
null
null
GHSA-h2w7-2v8j-jgm7
In Nintex Automation 5.6 and 5.7 before 5.8, the K2 SmartForms Designer folder has configuration files (web.config) containing passwords that are readable by unauthorized users.
[]
null
4.3
null
null
null
CVE-2025-25140
WordPress Simple User Profile plugin <= 1.9 - CSRF to Stored XSS vulnerability
Cross-Site Request Forgery (CSRF) vulnerability in Scriptonite Simple User Profile allows Stored XSS. This issue affects Simple User Profile: from n/a through 1.9.
[]
null
7.1
null
null
null
CVE-2021-1995
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Web Services). Supported versions that are affected are 10.3.6.0.0 and 12.1.3.0.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle WebLogic Server accessible data. CVSS 3.1 Base Score 6.5 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N).
[ "cpe:2.3:a:oracle:weblogic_server:10.3.6.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:weblogic_server:12.1.3.0.0:*:*:*:*:*:*:*" ]
null
6.5
null
null
null
GHSA-9wwh-6p2j-f92g
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 8.3.1.21155. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the alignment attribute of Field objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code under the context of the current process. Was ZDI-CAN-5094.
[]
null
null
8.8
null
null
GHSA-rj8g-vjhf-jg95
The "mall some commodity details: commodity consultation" component in WSTMart 2.0.8_181212 has stored XSS via the consultContent parameter, as demonstrated by the index.php/home/goodsconsult/add.html URI.
[]
null
null
6.1
null
null
CVE-2016-15015
viafintech Barzahlen Payment Module PHP SDK Webhook.php verify timing discrepancy
A vulnerability, which was classified as problematic, was found in viafintech Barzahlen Payment Module PHP SDK up to 2.0.0. Affected is the function verify of the file src/Webhook.php. The manipulation leads to observable timing discrepancy. The complexity of an attack is rather high. The exploitability is told to be difficult. Upgrading to version 2.0.1 is able to address this issue. The patch is identified as 3e7d29dc0ca6c054a6d6e211f32dae89078594c1. It is recommended to upgrade the affected component. VDB-217650 is the identifier assigned to this vulnerability.
[ "cpe:2.3:a:paysafe:barzahlen_payment_module_php_sdk:*:*:*:*:*:*:*:*" ]
null
2.6
2.6
1.4
https://github.com/viafintech/Barzahlen-PHP/commit/3e7d29dc0ca6c054a6d6e211f32dae89078594c1
GHSA-f3g2-mvp2-3pxr
The sys_timer_create function in posix-timers.c for Linux kernel 2.6.x allows local users to cause a denial of service (memory consumption) and possibly bypass memory limits or cause other processes to be killed by creating a large number of posix timers, which are allocated in kernel memory but are not treated as part of the process' memory.
[]
null
null
null
null
null
GHSA-792f-vcf6-566f
Buffer overflow in the kcsSUNWIOsolf.so library in Solaris 7 and 8 allows local attackers to execute arbitrary commands via the KCMS_PROFILES environment variable, e.g. as demonstrated using the kcms_configure program.
[]
null
null
null
null
null
CVE-2024-39691
Malicious Matrix homeserver can leak truncated message content of messages it shouldn't have access to
matrix-appservice-irc is a Node.js IRC bridge for the Matrix messaging protocol. The fix for GHSA-wm4w-7h2q-3pf7 / CVE-2024-32000 included in matrix-appservice-irc 2.0.0 relied on the Matrix homeserver-provided timestamp to determine whether a user has access to the event they're replying to when determining whether or not to include a truncated version of the original event in the IRC message. Since this value is controlled by external entities, a malicious Matrix homeserver joined to a room in which a matrix-appservice-irc bridge instance (before version 2.0.1) is present can fabricate the timestamp with the intent of tricking the bridge into leaking room messages the homeserver should not have access to. matrix-appservice-irc 2.0.1 drops the reliance on `origin_server_ts` when determining whether or not an event should be visible to a user, instead tracking the event timestamps internally. As a workaround, it's possible to limit the amount of information leaked by setting a reply template that doesn't contain the original message.
[]
null
4.3
null
null
null
CVE-2023-23404
Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability
Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability
[ "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*" ]
null
8.1
null
null
null
GHSA-fgmq-fxrw-4cf2
Unrestricted file upload vulnerability in index.php in Atomymaxsite 2.5 and earlier allows remote attackers to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file, as exploited in the wild in October 2012.
[]
null
null
null
null
null
CVE-2023-42093
Foxit PDF Reader Annotation Use-After-Free Information Disclosure Vulnerability
Foxit PDF Reader Annotation Use-After-Free Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Annotation objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-21869.
[ "cpe:2.3:a:foxit:pdf_editor:11.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:foxit:pdf_editor:-:*:*:*:*:*:*:*", "cpe:2.3:a:foxit:pdf_editor:*:*:*:*:*:*:*:*", "cpe:2.3:a:foxit:pdf_editor:2023.1.0.15510:*:*:*:*:*:*:*", "cpe:2.3:a:foxit:pdf_reader:*:*:*:*:*:*:*:*" ]
null
null
3.3
null
null
GHSA-7g6r-q443-4qwp
SQL injection vulnerability in usercp.php in MyBB (MyBulletinBoard) 1.0 through 1.1.3 allows remote attackers to execute arbitrary SQL commands via the showcodebuttons parameter.
[]
null
null
null
null
null
CVE-2021-42545
Insufficient Session Expiration in TopEase
An insufficient session expiration vulnerability exists in Business-DNA Solutions GmbH’s TopEase® Platform Version <= 7.1.27, which allows a remote attacker to reuse, spoof, or steal other user and admin sessions.
[ "cpe:2.3:a:business-dnasolutions:topease:*:*:*:*:*:*:*:*" ]
null
8.1
null
null
null
CVE-2022-24042
A vulnerability has been identified in Desigo DXR2 (All versions < V01.21.142.5-22), Desigo PXC3 (All versions < V01.21.142.4-18), Desigo PXC4 (All versions < V02.20.142.10-10884), Desigo PXC5 (All versions < V02.20.142.10-10884). The web application returns an AuthToken that does not expire at the defined auto logoff delay timeout. An attacker could be able to capture this token and re-use old session credentials or session IDs for authorization.
[ "cpe:2.3:o:siemens:desigo_pxc5_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:desigo_pxc5:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:desigo_pxc4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:desigo_pxc4:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:desigo_pxc3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:desigo_pxc3:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:desigo_dxr2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:desigo_dxr2:-:*:*:*:*:*:*:*" ]
null
9.1
null
6.4
null
CVE-2014-6589
Unspecified vulnerability in the Oracle VM VirtualBox component in Oracle Virtualization VirtualBox before 4.3.20 allows local users to affect integrity and availability via vectors related to VMSVGA virtual graphics device, a different vulnerability than CVE-2014-6588, CVE-2014-6590, CVE-2014-6595, and CVE-2015-0427.
[ "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*" ]
null
null
null
3.2
null
GHSA-4qxr-c6vx-j7fm
A security flaw has been discovered in zhenfeng13 My-Blog 1.0.0. This vulnerability affects unknown code of the file /blog/comment of the component Frontend Blog Article Comment Handler. The manipulation leads to authentication bypass by capture-replay. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
[]
5.5
5.3
null
null
null
GHSA-v2pm-qr9p-2m3v
Cisco Linksys Routers EA2700, EA3500, E4200, EA4500: A bug can cause an unsafe TCP port to open which leads to unauthenticated access
[]
null
null
null
null
null
GHSA-w3x6-wpp4-45cx
The wpDataTables – WordPress Data Table, Dynamic Tables & Table Charts Plugin plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'A' parameter in all versions up to, and including, 3.4.2.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
[]
null
6.1
null
null
null
GHSA-4v9q-9vcj-g43w
A local code execution security vulnerability was identified in HP Network Node Manager i (NNMi) v10.00, v10.10 and v10.20 Software.
[]
null
null
7.8
null
null
CVE-2010-1916
The dynamic configuration feature in Xinha WYSIWYG editor 0.96 Beta 2 and earlier, as used in Serendipity 1.5.2 and earlier, allows remote attackers to bypass intended access restrictions and modify the configuration of arbitrary plugins via (1) crafted backend_config_secret_key_location and backend_config_hash parameters that are used in a SHA1 hash of a shared secret that can be known or externally influenced, which are not properly handled by the "Deprecated config passing" feature; or (2) crafted backend_data and backend_data[key_location] variables, which are not properly handled by the xinha_read_passed_data function. NOTE: this can be leveraged to upload and possibly execute arbitrary files via config.inc.php in the ImageManager plugin.
[ "cpe:2.3:a:xinha:wysiwyg_editor:0.9:beta:*:*:*:*:*:*", "cpe:2.3:a:xinha:wysiwyg_editor:0.91:beta:*:*:*:*:*:*", "cpe:2.3:a:xinha:wysiwyg_editor:0.92:beta:*:*:*:*:*:*", "cpe:2.3:a:xinha:wysiwyg_editor:0.93:*:*:*:*:*:*:*", "cpe:2.3:a:xinha:wysiwyg_editor:0.94:*:*:*:*:*:*:*", "cpe:2.3:a:xinha:wysiwyg_editor:0.95:*:*:*:*:*:*:*", "cpe:2.3:a:xinha:wysiwyg_editor:0.96:beta:*:*:*:*:*:*", "cpe:2.3:a:xinha:wysiwyg_editor:0.96:beta2:*:*:*:*:*:*", "cpe:2.3:a:s9y:serendipity:0.3:*:*:*:*:*:*:*", "cpe:2.3:a:s9y:serendipity:0.4:*:*:*:*:*:*:*", "cpe:2.3:a:s9y:serendipity:0.5:pl1:*:*:*:*:*:*", "cpe:2.3:a:s9y:serendipity:0.6:pl3:*:*:*:*:*:*", "cpe:2.3:a:s9y:serendipity:0.7:*:*:*:*:*:*:*", "cpe:2.3:a:s9y:serendipity:0.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:s9y:serendipity:0.8:*:*:*:*:*:*:*", "cpe:2.3:a:s9y:serendipity:0.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:s9y:serendipity:0.8.2:*:*:*:*:*:*:*", "cpe:2.3:a:s9y:serendipity:0.8.3:*:*:*:*:*:*:*", "cpe:2.3:a:s9y:serendipity:0.8.4:*:*:*:*:*:*:*", "cpe:2.3:a:s9y:serendipity:0.8.5:*:*:*:*:*:*:*", "cpe:2.3:a:s9y:serendipity:0.9:*:*:*:*:*:*:*", "cpe:2.3:a:s9y:serendipity:0.9.1:*:*:*:*:*:*:*", "cpe:2.3:a:s9y:serendipity:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:s9y:serendipity:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:s9y:serendipity:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:s9y:serendipity:1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:s9y:serendipity:1.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:s9y:serendipity:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:s9y:serendipity:1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:s9y:serendipity:1.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:s9y:serendipity:1.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:s9y:serendipity:1.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:s9y:serendipity:1.2:*:*:*:*:*:*:*", "cpe:2.3:a:s9y:serendipity:1.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:s9y:serendipity:1.3:*:*:*:*:*:*:*", "cpe:2.3:a:s9y:serendipity:1.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:s9y:serendipity:1.4:*:*:*:*:*:*:*", "cpe:2.3:a:s9y:serendipity:1.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:s9y:serendipity:1.5:*:*:*:*:*:*:*", "cpe:2.3:a:s9y:serendipity:1.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:s9y:serendipity:1.5.2:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
RHSA-2021:2040
Red Hat Security Advisory: rh-mariadb103-mariadb and rh-mariadb103-galera security update
mariadb: writable system variables allows a database user with SUPER privilege to execute arbitrary code as the system mysql user
[ "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
7.2
null
null
null
CVE-2022-22852
A Stored Cross Site Scripting (XSS) vulnerability exists in Sourcecodtester Hospital's Patient Records Management System 1.0 via the description parameter in room_list.
[ "cpe:2.3:a:hospital\\'s_patient_records_management_system_project:hospital\\'s_patient_records_management_system:1.0:*:*:*:*:*:*:*" ]
null
5.4
null
4.3
null
GHSA-pgvp-qh2c-78r2
The Condor S.E. (aka com.app_condorsoutheast.layout) application 1.399 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[]
null
null
null
null
null
CVE-2025-24059
Windows Common Log File System Driver Elevation of Privilege Vulnerability
Incorrect conversion between numeric types in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally.
[]
null
7.8
null
null
null
GHSA-v47g-xr27-3c46
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Service Shogun Ach Invoice App allows PHP Local File Inclusion.This issue affects Ach Invoice App: from n/a through 1.0.1.
[]
null
7.5
null
null
null
GHSA-j6q4-78q3-g22f
The issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14.4, iOS 17.4 and iPadOS 17.4. An attacker in a privileged network position may be able to inject keystrokes by spoofing a keyboard.
[]
null
5.9
null
null
null
CVE-2023-37636
A stored cross-site scripting (XSS) vulnerability in UVDesk Community Skeleton v1.1.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Message field when creating a ticket.
[ "cpe:2.3:a:webkul:uvdesk:1.1.1:*:*:*:*:*:*:*" ]
null
5.4
null
null
null
RHSA-2020:1505
Red Hat Security Advisory: qemu-kvm-ma security update
QEMU: block: iscsi: OOB heap access via an unexpected response of iSCSI Server
[ "cpe:/o:redhat:rhel_eus:7.5::server" ]
null
6
null
null
null
CVE-2016-4694
The Apache HTTP Server in Apple OS X before 10.12 and OS X Server before 5.2 follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted CGI client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue, a related issue to CVE-2016-5387.
[ "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:os_x_server:*:*:*:*:*:*:*:*" ]
null
null
9.1
7.5
null
GHSA-mqp8-25jm-w22w
The affected products are vulnerable to an improper validation of array index, which could allow an attacker to crash the server and remotely execute arbitrary code.
[]
null
9.8
null
null
null
GHSA-8x27-9ppr-w79j
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound ChatGPT Open AI Images & Content for WooCommerce allows Reflected XSS. This issue affects ChatGPT Open AI Images & Content for WooCommerce: from n/a through 2.2.0.
[]
null
7.1
null
null
null
GHSA-f87m-rhgw-vj35
PostgreSQL Anonymizer v2.0 and v2.1 contain a vulnerability that allows a masked user to bypass the masking rules defined on a table and read the original data using a database cursor or the --insert option of pg_dump. This problem occurs only when dynamic masking is enabled, which is not the default setting. The problem is resolved in version 2.2.1
[]
null
6.5
null
null
null
CVE-2024-7258
WooCommerce Google Feed Manager <= 2.8.0 - Missing Authorization to Authenticated (Contributor+) Arbitrary File Deletion
The WooCommerce Google Feed Manager plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the 'wppfm_removeFeedFile' function in all versions up to, and including, 2.8.0. This makes it possible for authenticated attackers, with Contributor-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).
[ "cpe:2.3:a:wpmarketingrobot:woocommerce_google_feed_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:wpmarketingrobot:woocommerce_google_feed_manager:*:*:*:*:*:wordpress:*:*" ]
null
8.8
null
null
null
CVE-2008-3692
Unspecified vulnerability in a certain ActiveX control in VMware Workstation 5.5.x before 5.5.8 build 108000, VMware Workstation 6.0.x before 6.0.5 build 109488, VMware Player 1.x before 1.0.8 build 108000, VMware Player 2.x before 2.0.5 build 109488, VMware ACE 1.x before 1.0.7 build 108880, VMware ACE 2.x before 2.0.5 build 109488, and VMware Server before 1.0.7 build 108231 has unknown impact and remote attack vectors, a different vulnerability than CVE-2008-3691, CVE-2008-3693, CVE-2008-3694, CVE-2008-3695, and CVE-2008-3696.
[ "cpe:2.3:a:vmware:ace:*:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:player:*:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:server:*:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*" ]
null
null
null
10
null
GHSA-3rvg-chjx-7h2j
The (1) git-remote-ext and (2) unspecified other remote helper programs in Git before 2.3.10, 2.4.x before 2.4.10, 2.5.x before 2.5.4, and 2.6.x before 2.6.1 do not properly restrict the allowed protocols, which might allow remote attackers to execute arbitrary code via a URL in a (a) .gitmodules file or (b) unknown other sources in a submodule.
[]
null
null
9.8
null
null
GHSA-5vvj-3pp4-24pq
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
[]
null
null
null
null
null
GHSA-ggjx-p9wq-x9mj
Vulnerability in the Oracle FLEXCUBE Private Banking component of Oracle Financial Services Applications (subcomponent: Product / Instrument Search). Supported versions that are affected are 2.0.1, 2.2.0 and 12.0.1. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle FLEXCUBE Private Banking. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle FLEXCUBE Private Banking, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle FLEXCUBE Private Banking accessible data. CVSS v3.0 Base Score 4.1 (Confidentiality impacts).
[]
null
null
4.1
null
null
CVE-2020-13543
A code execution vulnerability exists in the WebSocket functionality of Webkit WebKitGTK 2.30.0. A specially crafted web page can trigger a use-after-free vulnerability which can lead to remote code execution. An attacker can get a user to visit a webpage to trigger this vulnerability.
[ "cpe:2.3:a:webkitgtk:webkitgtk:2.30.0:*:*:*:*:*:*:*" ]
null
null
8.8
null
null
RHSA-2018:0050
Red Hat Security Advisory: vdsm security update
An update for vdsm is now available for RHEV 4.X, RHEV-H, and Agents for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
[ "cpe:/o:redhat:enterprise_linux:7::hypervisor" ]
null
null
null
null
null
cisco-sa-ftd-intrusion-dos-DfT7wyGC
Cisco Firepower Threat Defense Software for Cisco Firepower 2100 Series Firewalls Inspection Rules Denial of Service Vulnerability
A vulnerability in the internal packet processing of Cisco Firepower Threat Defense (FTD) Software for Cisco Firepower 2100 Series Firewalls could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to improper handling of certain packets when they are sent to the inspection engine. An attacker could exploit this vulnerability by sending a series of crafted packets to an affected device. A successful exploit could allow the attacker to deplete all 9,472 byte blocks on the device, resulting in traffic loss across the device or an unexpected reload of the device. If the device does not reload on its own, a manual reload of the device would be required to recover from this state. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is part of the November 2023 release of the Cisco ASA, FTD, and FMC Security Advisory Bundled publication. For a complete list of the advisories and links to them, see Cisco Event Response: November 2023 Semiannual Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication ["https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-74985"].
[]
null
8.6
null
null
null
cisco-sa-aci-cloudsec-enc-Vs5Wn2sX
Cisco ACI Multi-Site CloudSec Encryption Information Disclosure Vulnerability
A vulnerability in the Cisco ACI Multi-Site CloudSec encryption feature of Cisco Nexus 9000 Series Fabric Switches in ACI mode could allow an unauthenticated, remote attacker to read or modify intersite encrypted traffic. This vulnerability is due to an issue with the implementation of the ciphers that are used by the CloudSec encryption feature on affected switches. An attacker with an on-path position between the ACI sites could exploit this vulnerability by intercepting intersite encrypted traffic and using cryptanalytic techniques to break the encryption. A successful exploit could allow the attacker to read or modify the traffic that is transmitted between the sites. Cisco has not released and will not release software updates that address this vulnerability. There are no workarounds that address this vulnerability.
[]
null
7.4
null
null
null
GHSA-3pg4-4j4q-43cp
In the Linux kernel, the following vulnerability has been resolved:irqchip/apple-aic: Fix refcount leak in aic_of_ic_initof_get_child_by_name() returns a node pointer with refcount incremented, we should use of_node_put() on it when not need anymore. Add missing of_node_put() to avoid refcount leak.
[]
null
5.5
null
null
null
GHSA-99wh-fq8c-c266
In Package Manager Service, there is a possible way to determine whether an app is installed, without query permissions, due to side channel information disclosure. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
[]
null
5.5
null
null
null
CVE-2021-40092
A cross-site scripting (XSS) vulnerability in Image Tile in SquaredUp for SCOM 5.2.1.6654 allows remote attackers to inject arbitrary web script or HTML via an SVG file.
[ "cpe:2.3:a:squaredup:squaredup:*:*:*:*:azure:*:*:*", "cpe:2.3:a:squaredup:squaredup:*:*:*:*:community:*:*:*", "cpe:2.3:a:squaredup:squaredup:*:*:*:*:system_center_operations_manager:*:*:*" ]
null
5.4
null
3.5
null
GHSA-6x94-8g2r-qg72
eProsima Fast DDS versions prior to 2.4.0 (#2269) are susceptible to exploitation when an attacker sends a specially crafted packet to flood a target device with unwanted traffic, which may result in a denial-of-service condition and information exposure.
[]
null
9.1
null
null
null
CVE-2001-0182
FireWall-1 4.1 with a limited-IP license allows remote attackers to cause a denial of service by sending a large number of spoofed IP packets with various source addresses to the inside interface, which floods the console with warning messages and consumes CPU resources.
[ "cpe:2.3:a:checkpoint:firewall-1:4.1:*:*:*:*:*:*:*", "cpe:2.3:a:checkpoint:firewall-1:4.1:sp2:*:*:*:*:*:*", "cpe:2.3:a:checkpoint:firewall-1:4.1:sp3:*:*:*:*:*:*" ]
null
null
null
5
null
GHSA-ggrx-w8hv-q97q
During boot, the device unlock interface behaves differently depending on if a fingerprint registered to the device is present. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-79776455
[]
null
null
null
null
null
GHSA-qhrg-rwr6-hrvj
Cross-site scripting (XSS) vulnerability in photos/index.php in TCW PHP Album 1.0 allows remote attackers to inject arbitrary web script or HTML via the album parameter.
[]
null
null
null
null
null
CVE-2020-35138
The MobileIron agents through 2021-03-22 for Android and iOS contain a hardcoded encryption key, used to encrypt the submission of username/password details during the authentication process, as demonstrated by Mobile@Work (aka com.mobileiron). The key is in the com/mobileiron/common/utils/C4928m.java file. NOTE: It has been asserted that there is no causality or connection between credential encryption and the MiTM attack
[ "cpe:2.3:a:mobileiron:mobile\\@work:*:*:*:*:*:android:*:*", "cpe:2.3:a:mobileiron:mobile\\@work:*:*:*:*:*:iphone_os:*:*" ]
null
9.8
null
5
null
GHSA-xv4r-44qp-78wm
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in ValvePress Automatic allows SQL Injection.This issue affects Automatic: from n/a through 3.92.0.
[]
null
9.9
null
null
null
GHSA-mgm9-mwp5-9w5r
BSS Continuity CMS 4.2.22640.0 has a Remote Code Execution vulnerability due to unauthenticated file upload
[]
null
null
null
null
null
GHSA-mp68-mcgr-c9f7
Adobe Flash Player before 18.0.0.382 and 19.x through 23.x before 23.0.0.185 on Windows and OS X and before 11.2.202.637 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4273, CVE-2016-6982, CVE-2016-6983, CVE-2016-6984, CVE-2016-6985, CVE-2016-6986, and CVE-2016-6989.
[]
null
null
9.8
null
null
CVE-2018-4299
Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 12, tvOS 12, watchOS 5, Safari 12, iTunes 12.9 for Windows, iCloud for Windows 7.7.
[ "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", "cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
null
8.8
6.8
null
GHSA-vp3r-hc2j-v8hr
A vulnerability was found in givanz Vvveb 1.0.6.1. It has been declared as critical. Affected by this vulnerability is an unknown functionality. The manipulation leads to session fixiation. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.0.7 is able to address this issue. The patch is named d4b1e030066417b77d15b4ac505eed5ae7bf2c5e. It is recommended to upgrade the affected component.
[]
2.1
6.3
null
null
null
CVE-2024-9521
SEO Manager <= 1.9 - Authenticated (Contributor+) Stored Cross-Site Scripting via Post Meta
The SEO Manager plugin for WordPress is vulnerable to Stored Cross-Site Scripting via post meta in versions up to, and including, 1.9 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
6.4
null
null
null
RHSA-2013:0621
Red Hat Security Advisory: kernel security update
kernel: x86/msr: /dev/cpu/*/msr local privilege escalation kernel: race condition with PTRACE_SETREGS
[ "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
null
GHSA-85fc-m2vq-4r26
Mozilla Firefox before 15.0 on Android does not properly implement unspecified callers of the __android_log_print function, which allows remote attackers to execute arbitrary code via a crafted web page that calls the JavaScript dump function.
[]
null
null
null
null
null
GHSA-x65f-5582-859h
cgi-bin/setup_virtualserver.exe on the Belkin F5D7230-4 router with firmware 9.01.10 allows remote attackers to cause a denial of service (control center outage) via an HTTP request with invalid POST data and a "Connection: Keep-Alive" header.
[]
null
null
null
null
null
GHSA-9x38-862g-jg8w
Apache Axis2, as used in dswsbobje.war in SAP BusinessObjects Enterprise XI 3.2, CA ARCserve D2D r15, and other products, has a default password of axis2 for the admin account, which makes it easier for remote attackers to execute arbitrary code by uploading a crafted web service.
[]
null
null
null
null
null
GHSA-hqc8-j86x-2764
Off-by-one error in simple-slab
An issue was discovered in the simple-slab crate before 0.3.3 for Rust. remove() has an off-by-one error, causing memory leakage and a drop of uninitialized memory.
[]
null
7.5
null
null
null
CVE-2021-3555
A Buffer Overflow vulnerability in the RSTP server component of Eufy Indoor 2K Indoor Camera allows a local attacker to achieve remote code execution. This issue affects: Eufy Indoor 2K Indoor Camera 2.0.9.3 version and prior versions.
[ "cpe:2.3:o:eufylife:solo_indoorcam_c24_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:eufylife:solo_indoorcam_c24:-:*:*:*:*:*:*:*", "cpe:2.3:o:eufylife:solo_indoorcam_p24_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:eufylife:solo_indoorcam_p24:-:*:*:*:*:*:*:*" ]
null
7.6
null
null
null
cisco-sa-20180815-csb-wap-dos
Cisco Small Business 100 Series and 300 Series Wireless Access Points Denial of Service Vulnerability
A vulnerability in the implementation of Extensible Authentication Protocol over LAN (EAPOL) functionality in Cisco Small Business 100 Series Wireless Access Points and Cisco Small Business 300 Series Wireless Access Points could allow an authenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to the improper processing of certain EAPOL frames. An attacker could exploit this vulnerability by sending a stream of crafted EAPOL frames to an affected device. A successful exploit could allow the attacker to force the access point (AP) to disassociate all the associated stations (STAs) and to disallow future, new association requests. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180815-csb-wap-dos ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180815-csb-wap-dos"]
[]
null
null
6.8
null
null
CVE-2018-17614
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Losant Arduino MQTT Client prior to V2.7. User interaction is not required to exploit this vulnerability. The specific flaw exists within the parsing of MQTT PUBLISH packets. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-6436.
[ "cpe:2.3:a:losant:arduino_mqtt_client:*:*:*:*:*:*:*:*" ]
null
null
8.8
5.8
null
GHSA-frgm-mc5h-57vv
Advantech WebAccess 8.3.4 is vulnerable to file upload attacks via unauthenticated RPC call. An unauthenticated, remote attacker can use this vulnerability to execute arbitrary code.
[]
null
null
9.8
null
null
GHSA-236p-2rjr-h84v
Multiple buffer overflows in the AirDefense Airsensor M520 with firmware 4.3.1.1 and 4.4.1.4 allow remote authenticated users to cause a denial of service (HTTPS service outage) via a crafted query string in an HTTPS request to (1) adLog.cgi, (2) post.cgi, or (3) ad.cgi, related to the "files filter."
[]
null
null
null
null
null
GHSA-j2m9-929g-4mjf
PHP remote file inclusion vulnerability in news.php in Sponge News 2.2 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the sndir parameter.
[]
null
null
null
null
null
GHSA-gj25-c67g-2q9v
Uncontrolled search path element vulnerability in Samsung Update prior to version 3.0.77.0 allows attackers to execute arbitrary code as Samsung Update permission.
[]
null
7.8
null
null
null
CVE-2005-2637
Multiple SQL injection vulnerabilities in PHPFreeNews 1.40 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) Match or (2) CatID parameter to SearchResults.php, or (3) the password to AccessControl.php.
[ "cpe:2.3:a:phpfreenews:phpfreenews:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2022-30981
An issue was discovered in Gentics CMS before 5.43.1. By uploading a malicious ZIP file, an attacker is able to deserialize arbitrary data and hence can potentially achieve Java code execution.
[ "cpe:2.3:a:gentics:gentics_cms:*:*:*:*:*:*:*:*" ]
null
8.8
null
null
null
GHSA-9vgx-7hmw-rvwq
Cross-site scripting (XSS) vulnerability in DevTrack 6.x allows remote attackers to inject arbitrary web script or HTML via the "Keyword search" form field and unspecified other form fields that populate a public saved query. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
[]
null
null
null
null
null
CVE-2011-1677
mount in util-linux 2.19 and earlier does not remove the /etc/mtab~ lock file after a failed attempt to add a mount entry, which has unspecified impact and local attack vectors.
[ "cpe:2.3:a:linux:util-linux:*:*:*:*:*:*:*:*", "cpe:2.3:a:linux:util-linux:2.2:*:*:*:*:*:*:*", "cpe:2.3:a:linux:util-linux:2.5:*:*:*:*:*:*:*", "cpe:2.3:a:linux:util-linux:2.7:*:*:*:*:*:*:*", "cpe:2.3:a:linux:util-linux:2.8:*:*:*:*:*:*:*", "cpe:2.3:a:linux:util-linux:2.9:*:*:*:*:*:*:*", "cpe:2.3:a:linux:util-linux:2.10:*:*:*:*:*:*:*", "cpe:2.3:a:linux:util-linux:2.11:*:*:*:*:*:*:*", "cpe:2.3:a:linux:util-linux:2.12:*:*:*:*:*:*:*", "cpe:2.3:a:linux:util-linux:2.12:pre:*:*:*:*:*:*", "cpe:2.3:a:linux:util-linux:2.13:*:*:*:*:*:*:*", "cpe:2.3:a:linux:util-linux:2.13:pre:*:*:*:*:*:*", "cpe:2.3:a:linux:util-linux:2.14:*:*:*:*:*:*:*", "cpe:2.3:a:linux:util-linux:2.15:*:*:*:*:*:*:*", "cpe:2.3:a:linux:util-linux:2.16:*:*:*:*:*:*:*", "cpe:2.3:a:linux:util-linux:2.17:*:*:*:*:*:*:*", "cpe:2.3:a:linux:util-linux:2.18:*:*:*:*:*:*:*" ]
null
null
null
4.6
null
GHSA-m74g-79p9-m5hp
The Asus ASUS_X015_1 Android device with a build fingerprint of asus/CN_X015/ASUS_X015_1:7.0/NRD90M/CN_X015-14.00.1709.35-20171215:user/release-keys contains a pre-installed app with a package name of com.asus.loguploaderproxy app (versionCode=1570000015, versionName=7.0.0.3_161222) that allows other pre-installed apps to perform command execution via an accessible app component. This capability can be accessed by any pre-installed app on the device which can obtain signatureOrSystem permissions that are required by other other pre-installed apps that exported their capabilities to other pre-installed app.
[]
null
null
null
null
null
GHSA-ggx4-j822-3742
SQL injection vulnerability in CoBaLT 1.0 allows remote attackers to execute arbitrary SQL commands via the id parameter to (1) urun.asp, (2) admin/bayi_listele.asp, (3) admin/urun_grup_listele.asp, and (4) admin/urun_listele.asp.
[]
null
null
null
null
null
GHSA-8fr3-hfg3-gpgp
Open Redirect in node-forge
parseUrl functionality in node-forge mishandles certain uses of backslash such as `https:/\/\/\` and interprets the URI as a relative path.
[]
null
6.1
null
null
null
GHSA-j247-q9q3-vr7w
In the Linux kernel, the following vulnerability has been resolved:perf/x86/amd/core: Always clear status for idxThe variable 'status' (which contains the unhandled overflow bits) is not being properly masked in some cases, displaying the following warning:WARNING: CPU: 156 PID: 475601 at arch/x86/events/amd/core.c:972 amd_pmu_v2_handle_irq+0x216/0x270This seems to be happening because the loop is being continued before the status bit being unset, in case x86_perf_event_set_period() returns 0. This is also causing an inconsistency because the "handled" counter is incremented, but the status bit is not cleaned.Move the bit cleaning together above, together when the "handled" counter is incremented.
[]
null
null
null
null
null
GHSA-9h9f-9q8g-6764
Gophish XSS Vulnerability
Gophish through 0.8.0 allows XSS via a username.
[]
null
4.8
null
null
null
GHSA-r5vp-hv57-2vcx
Heap-based buffer overflow in the RTSP service in Helix DNA Server before 11.1.4 allows remote attackers to execute arbitrary code via an RSTP command containing multiple Require headers.
[]
null
null
null
null
null
GHSA-xcpp-m32j-m837
An XSS vulnerability exists in PHPRelativePath (aka Relative Path) through 1.0.2 via the RelativePath.Example1.php path parameter.
[]
null
null
null
null
null
RHSA-2016:2837
Red Hat Security Advisory: Red Hat CloudForms 3.x - 90 day End Of Life Notice
This is the 90 day notification for the End of Production Phase 2 of Red Hat CloudForms 3.x.
[ "cpe:/a:redhat:cloudforms:3.0" ]
null
null
null
null
null
CVE-2023-29109
Code Injection vulnerability in SAP Application Interface Framework (Message Dashboard)
The SAP Application Interface Framework (Message Dashboard) - versions AIF 703, AIFX 702, S4CORE 101, SAP_BASIS 755, 756, SAP_ABA 75C, 75D, 75E, application allows an Excel formula injection. An authorized attacker can inject arbitrary Excel formulas into fields like the Tooltip of the Custom Hints List. Once the victim opens the downloaded Excel document, the formula will be executed. As a result, an attacker can cause limited impact on the confidentiality and integrity of the application.
[ "cpe:2.3:a:sap:abap_platform:75c:*:*:*:*:*:*:*", "cpe:2.3:a:sap:abap_platform:75d:*:*:*:*:*:*:*", "cpe:2.3:a:sap:abap_platform:75e:*:*:*:*:*:*:*", "cpe:2.3:a:sap:application_interface_framework:aif_703:*:*:*:*:*:*:*", "cpe:2.3:a:sap:application_interface_framework:aifx_702:*:*:*:*:*:*:*", "cpe:2.3:a:sap:basis:755:*:*:*:*:*:*:*", "cpe:2.3:a:sap:basis:756:*:*:*:*:*:*:*", "cpe:2.3:a:sap:s4core:101:*:*:*:*:*:*:*" ]
null
4.4
null
null
null
GHSA-gc2g-58xq-cq5h
Improper access control in Citrix ADC and Citrix Gateway versions before 13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 and 10.5-70.18 and Citrix SDWAN WAN-OP versions before 11.1.1a, 11.0.3d and 10.2.7 resulting in limited information disclosure to low privileged users.
[]
null
4.3
null
null
null
CVE-2024-2626
Out of bounds read in Swiftshader in Google Chrome prior to 123.0.6312.58 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: Medium)
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*" ]
null
6.5
null
null
null
GHSA-c2jc-qcxf-rg39
Multiple cross-site scripting (XSS) vulnerabilities in Claroline 1.5.3 through 1.6 Release Candidate 1, and possibly Dokeos, allow remote attackers to inject arbitrary web script or HTML via (1) exercise_result.php, (2) exercice_submit.php, (3) agenda.php, (4) learningPathList.php, (5) learningPathAdmin.php, (6) learningPath.php, (7) userLog.php, (8) tool parameter to toolaccess_details.php, (9) data parameter to user_access_details.php, or (10) coursePath parameter to myagenda.php.
[]
null
null
null
null
null
CVE-2016-0459
Unspecified vulnerability in the Oracle Applications Framework component in Oracle E-Business Suite 11.5.10.2, 12.1.3, 12.2.3, 12.2.4, and 12.2.5 allows remote authenticated users to affect integrity via unknown vectors related to Popup Windows.
[ "cpe:2.3:a:oracle:e-business_suite:11.5.10.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:e-business_suite:12.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:e-business_suite:12.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:e-business_suite:12.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:e-business_suite:12.2.5:*:*:*:*:*:*:*" ]
null
null
null
4
null
CVE-2019-11680
KonaKart 8.9.0.0 is vulnerable to Remote Code Execution by uploading a web shell as a product category image.
[ "cpe:2.3:a:konakart:konakart:8.9.0.0:*:*:*:*:*:*:*" ]
null
null
9.8
7.5
null
CVE-2024-0023
In ConvertRGBToPlanarYUV of Codec2BufferUtils.cpp, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
[ "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:12.0l:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*" ]
null
7.4
null
null
null
CVE-2021-23192
A flaw was found in the way samba implemented DCE/RPC. If a client to a Samba server sent a very large DCE/RPC request, and chose to fragment it, an attacker could replace later fragments with their own data, bypassing the signature requirements.
[ "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*" ]
null
7.5
null
5
null