id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
189k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
patch_commit_url
stringlengths
38
232
CVE-2009-3959
Integer overflow in the U3D implementation in Adobe Reader and Acrobat 9.x before 9.3, and 8.x before 8.2 on Windows and Mac OS X, allows remote attackers to execute arbitrary code via a malformed PDF document.
[ "cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:3.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:4.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:4.0.5a:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:4.0.5c:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:5.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:5.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:5.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:6.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:6.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:6.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:6.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:6.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:6.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.1.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:3.01:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:3.02:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:4.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:4.0.5a:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:4.0.5c:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:4.5:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:5.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:5.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:5.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:5.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:5.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:5.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:5.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:6.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:6.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:6.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:6.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:6.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:7.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:7.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:7.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:7.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:7.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:7.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:7.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:7.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:7.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:7.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:7.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:7.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:7.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:8.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:8.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:8.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:8.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:8.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:8.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:8.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:9.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:9.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:9.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:9.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:9.1.3:*:*:*:*:*:*:*", "cpe:2.3:o:unix:unix:*:*:*:*:*:*:*:*" ]
null
null
null
10
null
CVE-2025-47697
Client-side enforcement of server-side security issue exists in wivia 5 all versions. If exploited, an unauthenticated attacker may bypass authentication and operate the affected device as the moderator user.
[]
6.9
null
6.5
null
null
GHSA-jf6r-2jh6-5f5q
Array index error in AcroForm.api in Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, allows remote attackers to execute arbitrary code via a crafted GIF image in a PDF file, which bypasses a size check and triggers a heap-based buffer overflow.
[]
null
null
null
null
null
CVE-2022-40854
Tenda AC18 router contained a stack overflow vulnerability in /goform/fast_setting_wifi_set
[ "cpe:2.3:o:tenda:ac18_firmware:15.03.05.19\\(6318\\):*:*:*:*:*:*:*", "cpe:2.3:h:tenda:ac18:-:*:*:*:*:*:*:*" ]
null
9.8
null
null
null
GHSA-2j4g-q4pc-fmcw
Church Management System version 1.0 is affected by a SQL anjection vulnerability through creating a user with a PHP file as an avatar image, which is accessible through the /uploads directory. This can lead to RCE on the web server by uploading a PHP webshell.
[]
null
9.8
null
null
null
CVE-2020-16992
Azure Sphere Elevation of Privilege Vulnerability
Azure Sphere Elevation of Privilege Vulnerability
[ "cpe:2.3:a:microsoft:azure_sphere:*:*:*:*:*:*:*:*" ]
null
7.5
null
null
null
CVE-2007-2424
PHP remote file inclusion vulnerability in help/index.php in The Merchant (themerchant) 2.2 allows remote attackers to execute arbitrary PHP code via a URL in the show parameter.
[ "cpe:2.3:a:the_merchant_project:the_merchant:2.2:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2014-3828
Multiple SQL injection vulnerabilities in Centreon 2.5.1 and Centreon Enterprise Server 2.2 (fixed in Centreon web 2.5.3) allow remote attackers to execute arbitrary SQL commands via (1) the index_id parameter to views/graphs/common/makeXML_ListMetrics.php, (2) the sid parameter to views/graphs/GetXmlTree.php, (3) the session_id parameter to views/graphs/graphStatus/displayServiceStatus.php, (4) the mnftr_id parameter to configuration/configObject/traps/GetXMLTrapsForVendor.php, or (5) the index parameter to common/javascript/commandGetArgs/cmdGetExample.php in include/.
[ "cpe:2.3:a:merethis:centreon:2.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:merethis:centreon_enterprise_server:2.2:*:*:*:*:*:*:*" ]
null
null
null
10
null
GHSA-fmhx-jh46-8mxr
SQL injection vulnerability in account.asp in Active Membership 2.0 allows remote attackers to execute arbitrary SQL commands via the (1) username and (2) password parameters, possibly related to start.asp. NOTE: some of these details are obtained from third party information.
[]
null
null
null
null
null
RHSA-2025:1137
Red Hat Security Advisory: firefox security update
firefox: thunderbird: Use-after-free in XSLT firefox: thunderbird: Use-after-free in Custom Highlight firefox: thunderbird: A bug in WebAssembly code generation could result in a crash firefox: thunderbird: Use-after-free during concurrent delazification firefox: thunderbird: Potential opening of private browsing tabs in normal browsing windows firefox: thunderbird: Certificate length was not properly checked firefox: thunderbird: Memory safety bugs fixed in Firefox 135, Thunderbird 135, Firefox ESR 115.20, Firefox ESR 128.7, Thunderbird 115.20, and Thunderbird 128.7 firefox: thunderbird: Memory safety bugs fixed in Firefox 135, Thunderbird 135, Firefox ESR 128.7, and Thunderbird 128.7
[ "cpe:/a:redhat:rhel_eus:8.8::appstream" ]
null
8.8
null
null
null
CVE-2006-3599
SQL injection vulnerability in the Nuke Advanced Classifieds module for PHP-Nuke allows remote attackers to execute arbitrary SQL commands via the id_ads parameter in an EditAds op.
[ "cpe:2.3:a:php-nuke:advanced_classified_module:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
GHSA-cm5p-vcj3-gv4c
Multiple race conditions in the font initialization could have led to memory corruption and execution of attacker-controlled code. This vulnerability affects Firefox for Android < 112, Firefox < 112, and Focus for Android < 112.
[]
null
7.5
null
null
null
ICSA-20-224-08
Siemens SICAM A8000 RTUs
The login screen does not sufficiently sanitize input, which enables an attacker to generate specially crafted log messages. If an unsuspecting victim views the log messages via the web browser, these log messages might be interpreted and executed as code by the web application. This Cross-Site-Scripting (XSS) vulnerability might compromize the confidentiality, integrity and availability of the web application.
[]
null
8.3
null
null
null
GHSA-vr29-mm4v-x5ph
page/EventHandler.cpp in WebCore in WebKit in Google Chrome before 5.0.375.70 does not properly handle a change of the focused frame during the dispatching of keydown, which allows user-assisted remote attackers to redirect keystrokes via a crafted HTML document, aka rdar problem 7018610. NOTE: this might overlap CVE-2010-1422.
[]
null
null
null
null
null
GHSA-jcjc-m39p-5c5c
XNU in the kernel in Apple iOS before 9 does not properly validate the headers of TCP packets, which allows remote attackers to bypass the sequence-number protection mechanism and cause a denial of service (TCP connection disruption) via a crafted header.
[]
null
null
null
null
null
GHSA-cpvm-9533-ww22
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WPify s.R.O. WPify Woo Czech allows Reflected XSS.This issue affects WPify Woo Czech: from n/a through 4.0.10.
[]
null
7.1
null
null
null
CVE-2021-38637
Windows Storage Information Disclosure Vulnerability
Windows Storage Information Disclosure Vulnerability
[ "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2183:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2183:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2183:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2183:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1801:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1801:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1809:10.0.18363.1801:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1237:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1237:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1237:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.230:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1809:10.0.19041.1237:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2004:10.0.19041.1237:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_20h2:10.0.19042.1237:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_20h2:10.0.19042.1237:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_server_20h2:10.0.19042.1237:*:*:*:*:*:*:*" ]
null
5.5
null
null
null
CVE-2022-43275
Canteen Management System v1.0 was discovered to contain an arbitrary file upload vulnerability via /youthappam/php_action/editProductImage.php. This vulnerability allows attackers to execute arbitrary code via a crafted PHP file.
[ "cpe:2.3:a:canteen_management_system_project:canteen_management_system:1.0:*:*:*:*:*:*:*" ]
null
7.2
null
null
null
CVE-2020-7355
Rapid7 Metasploit Pro Stored XSS in 'notes' field
Cross-site Scripting (XSS) vulnerability in the 'notes' field of a discovered scan asset in Rapid7 Metasploit Pro allows an attacker with a specially-crafted network service of a scan target store an XSS sequence in the Metasploit Pro console, which will trigger when the operator views the record of that scanned host in the Metasploit Pro interface. This issue affects Rapid7 Metasploit Pro version 4.17.1-20200427 and prior versions, and is fixed in Metasploit Pro version 4.17.1-20200514. See also CVE-2020-7354, which describes a similar issue, but involving the generated 'host' field of a discovered scan asset.
[ "cpe:2.3:a:rapid7:metasploit:*:*:*:*:pro:*:*:*", "cpe:2.3:a:rapid7:metasploit:4.17.1:-:*:*:pro:*:*:*", "cpe:2.3:a:rapid7:metasploit:4.17.1:20170221:*:*:pro:*:*:*", "cpe:2.3:a:rapid7:metasploit:4.17.1:20170323:*:*:pro:*:*:*", "cpe:2.3:a:rapid7:metasploit:4.17.1:20170405:*:*:pro:*:*:*", "cpe:2.3:a:rapid7:metasploit:4.17.1:20170419:*:*:pro:*:*:*", "cpe:2.3:a:rapid7:metasploit:4.17.1:20170510:*:*:pro:*:*:*", "cpe:2.3:a:rapid7:metasploit:4.17.1:20170518:*:*:pro:*:*:*", "cpe:2.3:a:rapid7:metasploit:4.17.1:20170530:*:*:pro:*:*:*", "cpe:2.3:a:rapid7:metasploit:4.17.1:20170613:*:*:pro:*:*:*", "cpe:2.3:a:rapid7:metasploit:4.17.1:20170627:*:*:pro:*:*:*", "cpe:2.3:a:rapid7:metasploit:4.17.1:20170718:*:*:pro:*:*:*", "cpe:2.3:a:rapid7:metasploit:4.17.1:20170731:*:*:pro:*:*:*", "cpe:2.3:a:rapid7:metasploit:4.17.1:20170816:*:*:pro:*:*:*", "cpe:2.3:a:rapid7:metasploit:4.17.1:20170828:*:*:pro:*:*:*", "cpe:2.3:a:rapid7:metasploit:4.17.1:20170914:*:*:pro:*:*:*", "cpe:2.3:a:rapid7:metasploit:4.17.1:20170926:*:*:pro:*:*:*", "cpe:2.3:a:rapid7:metasploit:4.17.1:20171009:*:*:pro:*:*:*", "cpe:2.3:a:rapid7:metasploit:4.17.1:20171030:*:*:pro:*:*:*", "cpe:2.3:a:rapid7:metasploit:4.17.1:20171115:*:*:pro:*:*:*", "cpe:2.3:a:rapid7:metasploit:4.17.1:20171129:*:*:pro:*:*:*", "cpe:2.3:a:rapid7:metasploit:4.17.1:20171206:*:*:pro:*:*:*", "cpe:2.3:a:rapid7:metasploit:4.17.1:20171220:*:*:pro:*:*:*", "cpe:2.3:a:rapid7:metasploit:4.17.1:20180108:*:*:pro:*:*:*", "cpe:2.3:a:rapid7:metasploit:4.17.1:20180124:*:*:pro:*:*:*", "cpe:2.3:a:rapid7:metasploit:4.17.1:20180206:*:*:pro:*:*:*", "cpe:2.3:a:rapid7:metasploit:4.17.1:20180301:*:*:pro:*:*:*", "cpe:2.3:a:rapid7:metasploit:4.17.1:20180312:*:*:pro:*:*:*", "cpe:2.3:a:rapid7:metasploit:4.17.1:20180327:*:*:pro:*:*:*", "cpe:2.3:a:rapid7:metasploit:4.17.1:20180410:*:*:pro:*:*:*", "cpe:2.3:a:rapid7:metasploit:4.17.1:20180501:*:*:pro:*:*:*", "cpe:2.3:a:rapid7:metasploit:4.17.1:20180511:*:*:pro:*:*:*", "cpe:2.3:a:rapid7:metasploit:4.17.1:20180526:*:*:pro:*:*:*", "cpe:2.3:a:rapid7:metasploit:4.17.1:20180618:*:*:pro:*:*:*", "cpe:2.3:a:rapid7:metasploit:4.17.1:20180704:*:*:pro:*:*:*", "cpe:2.3:a:rapid7:metasploit:4.17.1:20180716:*:*:pro:*:*:*", "cpe:2.3:a:rapid7:metasploit:4.17.1:20180727:*:*:pro:*:*:*", "cpe:2.3:a:rapid7:metasploit:4.17.1:20180813:*:*:pro:*:*:*", "cpe:2.3:a:rapid7:metasploit:4.17.1:20180827:*:*:pro:*:*:*", "cpe:2.3:a:rapid7:metasploit:4.17.1:20180907:*:*:pro:*:*:*", "cpe:2.3:a:rapid7:metasploit:4.17.1:20180924:*:*:pro:*:*:*", "cpe:2.3:a:rapid7:metasploit:4.17.1:20181009:*:*:pro:*:*:*", "cpe:2.3:a:rapid7:metasploit:4.17.1:20181022:*:*:pro:*:*:*", "cpe:2.3:a:rapid7:metasploit:4.17.1:20181105:*:*:pro:*:*:*", "cpe:2.3:a:rapid7:metasploit:4.17.1:20181130:*:*:pro:*:*:*", "cpe:2.3:a:rapid7:metasploit:4.17.1:20181215:*:*:pro:*:*:*", "cpe:2.3:a:rapid7:metasploit:4.17.1:20190108:*:*:pro:*:*:*", "cpe:2.3:a:rapid7:metasploit:4.17.1:20190118:*:*:pro:*:*:*", "cpe:2.3:a:rapid7:metasploit:4.17.1:20190201:*:*:pro:*:*:*", "cpe:2.3:a:rapid7:metasploit:4.17.1:20190219:*:*:pro:*:*:*", "cpe:2.3:a:rapid7:metasploit:4.17.1:20190303:*:*:pro:*:*:*", "cpe:2.3:a:rapid7:metasploit:4.17.1:20190319:*:*:pro:*:*:*", "cpe:2.3:a:rapid7:metasploit:4.17.1:20190331:*:*:pro:*:*:*", "cpe:2.3:a:rapid7:metasploit:4.17.1:20190416:*:*:pro:*:*:*", "cpe:2.3:a:rapid7:metasploit:4.17.1:20190426:*:*:pro:*:*:*", "cpe:2.3:a:rapid7:metasploit:4.17.1:20190513:*:*:pro:*:*:*", "cpe:2.3:a:rapid7:metasploit:4.17.1:20190603:*:*:pro:*:*:*", "cpe:2.3:a:rapid7:metasploit:4.17.1:20190607:*:*:pro:*:*:*", "cpe:2.3:a:rapid7:metasploit:4.17.1:20190626:*:*:pro:*:*:*", "cpe:2.3:a:rapid7:metasploit:4.17.1:20190722:*:*:pro:*:*:*", "cpe:2.3:a:rapid7:metasploit:4.17.1:20190805:*:*:pro:*:*:*", "cpe:2.3:a:rapid7:metasploit:4.17.1:20190819:*:*:pro:*:*:*", "cpe:2.3:a:rapid7:metasploit:4.17.1:20190910:*:*:pro:*:*:*", "cpe:2.3:a:rapid7:metasploit:4.17.1:20190930:*:*:pro:*:*:*", "cpe:2.3:a:rapid7:metasploit:4.17.1:20191014:*:*:pro:*:*:*", "cpe:2.3:a:rapid7:metasploit:4.17.1:20191030:*:*:pro:*:*:*", "cpe:2.3:a:rapid7:metasploit:4.17.1:20191108:*:*:pro:*:*:*", "cpe:2.3:a:rapid7:metasploit:4.17.1:20191209:*:*:pro:*:*:*", "cpe:2.3:a:rapid7:metasploit:4.17.1:20200113:*:*:pro:*:*:*", "cpe:2.3:a:rapid7:metasploit:4.17.1:20200122:*:*:pro:*:*:*", "cpe:2.3:a:rapid7:metasploit:4.17.1:20200131:*:*:pro:*:*:*", "cpe:2.3:a:rapid7:metasploit:4.17.1:20200218:*:*:pro:*:*:*", "cpe:2.3:a:rapid7:metasploit:4.17.1:20200302:*:*:pro:*:*:*", "cpe:2.3:a:rapid7:metasploit:4.17.1:20200318:*:*:pro:*:*:*", "cpe:2.3:a:rapid7:metasploit:4.17.1:20200330:*:*:pro:*:*:*", "cpe:2.3:a:rapid7:metasploit:4.17.1:20200413:*:*:pro:*:*:*" ]
null
6.1
null
null
null
RHSA-2018:0546
Red Hat Security Advisory: ceph security update
ceph: Unauthenticated malformed HTTP requests handled by rgw_civetweb.cc:RGW::init_env() can lead to denial of service
[ "cpe:/a:redhat:ceph_storage:3::el7" ]
null
null
7.3
null
null
CVE-2013-2507
Multiple cross-site scripting (XSS) vulnerabilities in the Brother MFC-9970CDW printer with firmware G (1.03) allow remote attackers to inject arbitrary web script or HTML via the (1) id parameter to admin/log_to_net.html or (2) kind parameter to fax/copy_settings.html, a different vulnerability than CVE-2013-2670 and CVE-2013-2671.
[ "cpe:2.3:o:brother:mfc-9970cdw_firmware:g\\(1.03\\):*:*:*:*:*:*:*", "cpe:2.3:h:brother:mfc-9970cdw:-:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
CVE-2022-28656
is_closing_session() allows users to consume RAM in the Apport process
[ "cpe:2.3:a:apport_project:apport:*:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:esm:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:21.10:*:*:*:-:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:22.04:*:*:*:lts:*:*:*" ]
null
5.5
null
null
null
GHSA-pcq6-7678-76ww
A vulnerability in the detection engine parsing of Pragmatic General Multicast (PGM) protocol packets for Cisco Firepower System Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition due to the Snort process unexpectedly restarting. The vulnerability is due to improper input validation of the fields in the PGM protocol packet. An attacker could exploit this vulnerability by sending a crafted PGM packet to the detection engine on the targeted device. An exploit could allow the attacker to cause a DoS condition if the Snort process restarts and traffic inspection is bypassed or traffic is dropped. This vulnerability affects Cisco Firepower System Software that has one or more file action policies configured and is running on any of the following Cisco products: Adaptive Security Appliance (ASA) 5500-X Series with FirePOWER Services; Adaptive Security Appliance (ASA) 5500-X Series Next-Generation Firewalls; Advanced Malware Protection (AMP) for Networks, 7000 Series Appliances; Advanced Malware Protection (AMP) for Networks, 8000 Series Appliances; Firepower 4100 Series Security Appliances; FirePOWER 7000 Series Appliances; FirePOWER 8000 Series Appliances; Firepower 9300 Series Security Appliances; FirePOWER Threat Defense for Integrated Services Routers (ISRs); Industrial Security Appliance 3000; Sourcefire 3D System Appliances; Virtual Next-Generation Intrusion Prevention System (NGIPSv) for VMware. Fixed versions: 5.4.0.10 5.4.1.9 6.0.1.3 6.1.0 6.2.0. Cisco Bug IDs: CSCuz00876.
[]
null
null
8.6
null
null
GHSA-gx58-6vgh-h446
SQL injection vulnerability in Site Sift Listings allows remote attackers to execute arbitrary SQL commands via the id parameter in a detail action to index.php. NOTE: this issue might be site-specific.
[]
null
null
null
null
null
CVE-2020-4851
IBM Spectrum Scale 5.0.0 through 5.0.5.5 and 5.1.0 through 5.1.0.2 could allow a local user to poison log files which could impact support and development efforts. IBM X-Force ID: 190450.
[ "cpe:2.3:a:ibm:spectrum_scale:*:*:*:*:*:*:*:*" ]
null
null
4
null
null
GHSA-x86f-c5g7-4mrq
When copying a network request from the developer tools panel as a curl command the output was not being properly sanitized and could allow arbitrary commands to be hidden within. This vulnerability affects Firefox < 109, Thunderbird < 102.7, and Firefox ESR < 102.7.
[]
null
6.5
null
null
null
CVE-2019-11686
Western Digital SanDisk X300, X300s, X400, and X600 devices: A vulnerability in the wear-leveling algorithm of the drive may cause cryptographically sensitive parameters (such as data encryption keys) to remain on the drive media after their intended erasure.
[ "cpe:2.3:o:westerndigital:sandisk_x600_sd9tb8w-128g_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:westerndigital:sandisk_x600_sd9tb8w-128g:-:*:*:*:*:*:*:*", "cpe:2.3:o:westerndigital:sandisk_x600_sd9tb8w-256g_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:westerndigital:sandisk_x600_sd9tb8w-256g:-:*:*:*:*:*:*:*", "cpe:2.3:o:westerndigital:sandisk_x600_sd9tb8w-512g_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:westerndigital:sandisk_x600_sd9tb8w-512g:-:*:*:*:*:*:*:*", "cpe:2.3:o:westerndigital:sandisk_x600_sd9tb8w-1t00_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:westerndigital:sandisk_x600_sd9tb8w-1t00:-:*:*:*:*:*:*:*", "cpe:2.3:o:westerndigital:sandisk_x600_sd9tb8w-2t00_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:westerndigital:sandisk_x600_sd9tb8w-2t00:-:*:*:*:*:*:*:*", "cpe:2.3:o:westerndigital:sandisk_x600_sd9tn8w-128g_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:westerndigital:sandisk_x600_sd9tn8w-128g:-:*:*:*:*:*:*:*", "cpe:2.3:o:westerndigital:sandisk_x600_sd9tn8w-256g_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:westerndigital:sandisk_x600_sd9tn8w-256g:-:*:*:*:*:*:*:*", "cpe:2.3:o:westerndigital:sandisk_x600_sd9tn8w-512g_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:westerndigital:sandisk_x600_sd9tn8w-512g:-:*:*:*:*:*:*:*", "cpe:2.3:o:westerndigital:sandisk_x600_sd9tn8w-1t00_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:westerndigital:sandisk_x600_sd9tn8w-1t00:-:*:*:*:*:*:*:*", "cpe:2.3:o:westerndigital:sandisk_x600_sd9tn8w-2t00_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:westerndigital:sandisk_x600_sd9tn8w-2t00:-:*:*:*:*:*:*:*", "cpe:2.3:o:westerndigital:sandisk_x600_sd9sb8w-128g_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:westerndigital:sandisk_x600_sd9sb8w-128g:-:*:*:*:*:*:*:*", "cpe:2.3:o:westerndigital:sandisk_x600_sd9sb8w-256g_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:westerndigital:sandisk_x600_sd9sb8w-256g:-:*:*:*:*:*:*:*", "cpe:2.3:o:westerndigital:sandisk_x600_sd9sb8w-512g_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:westerndigital:sandisk_x600_sd9sb8w-512g:-:*:*:*:*:*:*:*", "cpe:2.3:o:westerndigital:sandisk_x600_sd9sb8w-1t00_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:westerndigital:sandisk_x600_sd9sb8w-1t00:-:*:*:*:*:*:*:*", "cpe:2.3:o:westerndigital:sandisk_x600_sd9sb8w-2t00_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:westerndigital:sandisk_x600_sd9sb8w-2t00:-:*:*:*:*:*:*:*", "cpe:2.3:o:westerndigital:sandisk_x600_sd9sn8w-128g_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:westerndigital:sandisk_x600_sd9sn8w-128g:-:*:*:*:*:*:*:*", "cpe:2.3:o:westerndigital:sandisk_x600_sd9sn8w-256g_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:westerndigital:sandisk_x600_sd9sn8w-256g:-:*:*:*:*:*:*:*", "cpe:2.3:o:westerndigital:sandisk_x600_sd9sn8w-512g_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:westerndigital:sandisk_x600_sd9sn8w-512g:-:*:*:*:*:*:*:*", "cpe:2.3:o:westerndigital:sandisk_x600_sd9sn8w-1t00_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:westerndigital:sandisk_x600_sd9sn8w-1t00:-:*:*:*:*:*:*:*", "cpe:2.3:o:westerndigital:sandisk_x600_sd9sn8w-2t00_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:westerndigital:sandisk_x600_sd9sn8w-2t00:-:*:*:*:*:*:*:*", "cpe:2.3:o:westerndigital:sandisk_x300s_sd7sb3q-064g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:westerndigital:sandisk_x300s_sd7sb3q-064g:-:*:*:*:*:*:*:*", "cpe:2.3:o:westerndigital:sandisk_x300s_sd7sn3q-064g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:westerndigital:sandisk_x300s_sd7sn3q-064g:-:*:*:*:*:*:*:*", "cpe:2.3:o:westerndigital:sandisk_x300s_sd7ub2q-010t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:westerndigital:sandisk_x300s_sd7ub2q-010t:-:*:*:*:*:*:*:*", "cpe:2.3:o:westerndigital:sandisk_x300s_sd7ub2q-512g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:westerndigital:sandisk_x300s_sd7ub2q-512g:-:*:*:*:*:*:*:*", "cpe:2.3:o:westerndigital:sandisk_x300s_sd7ub3q-128g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:westerndigital:sandisk_x300s_sd7ub3q-128g:-:*:*:*:*:*:*:*", "cpe:2.3:o:westerndigital:sandisk_x300s_sd7ub3q-256g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:westerndigital:sandisk_x300s_sd7ub3q-256g:-:*:*:*:*:*:*:*", "cpe:2.3:o:westerndigital:sandisk_x300s_sd7un3q-128g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:westerndigital:sandisk_x300s_sd7un3q-128g:-:*:*:*:*:*:*:*", "cpe:2.3:o:westerndigital:sandisk_x300s_sd7un3q-256g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:westerndigital:sandisk_x300s_sd7un3q-256g:-:*:*:*:*:*:*:*", "cpe:2.3:o:westerndigital:sandisk_x300s_sd7un3q-512g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:westerndigital:sandisk_x300s_sd7un3q-512g:-:*:*:*:*:*:*:*", "cpe:2.3:o:westerndigital:sandisk_x400_sd8sb8u-128g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:westerndigital:sandisk_x400_sd8sb8u-128g:-:*:*:*:*:*:*:*", "cpe:2.3:o:westerndigital:sandisk_x400_sd8sb8u-128g-1122_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:westerndigital:sandisk_x400_sd8sb8u-128g-1122:-:*:*:*:*:*:*:*", "cpe:2.3:o:westerndigital:sandisk_x400_sd8sb8u-1t00_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:westerndigital:sandisk_x400_sd8sb8u-1t00:-:*:*:*:*:*:*:*", "cpe:2.3:o:westerndigital:sandisk_x400_sd8sb8u-1t00-1122_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:westerndigital:sandisk_x400_sd8sb8u-1t00-1122:-:*:*:*:*:*:*:*", "cpe:2.3:o:westerndigital:sandisk_x400_sd8sb8u-256g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:westerndigital:sandisk_x400_sd8sb8u-256g:-:*:*:*:*:*:*:*", "cpe:2.3:o:westerndigital:sandisk_x400_sd8sb8u-256g-1122_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:westerndigital:sandisk_x400_sd8sb8u-256g-1122:-:*:*:*:*:*:*:*", "cpe:2.3:o:westerndigital:sandisk_x400_sd8sb8u-512g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:westerndigital:sandisk_x400_sd8sb8u-512g:-:*:*:*:*:*:*:*", "cpe:2.3:o:westerndigital:sandisk_x400_sd8sb8u-512g-1122_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:westerndigital:sandisk_x400_sd8sb8u-512g-1122:-:*:*:*:*:*:*:*", "cpe:2.3:o:westerndigital:sandisk_x400_sd8sn8u-128g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:westerndigital:sandisk_x400_sd8sn8u-128g:-:*:*:*:*:*:*:*", "cpe:2.3:o:westerndigital:sandisk_x400_sd8sn8u-128g-1122_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:westerndigital:sandisk_x400_sd8sn8u-128g-1122:-:*:*:*:*:*:*:*", "cpe:2.3:o:westerndigital:sandisk_x400_sd8sn8u-1t00_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:westerndigital:sandisk_x400_sd8sn8u-1t00:-:*:*:*:*:*:*:*", "cpe:2.3:o:westerndigital:sandisk_x400_sd8sn8u-1t00-1122_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:westerndigital:sandisk_x400_sd8sn8u-1t00-1122:-:*:*:*:*:*:*:*", "cpe:2.3:o:westerndigital:sandisk_x400_sd8sn8u-256g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:westerndigital:sandisk_x400_sd8sn8u-256g:-:*:*:*:*:*:*:*", "cpe:2.3:o:westerndigital:sandisk_x400_sd8sn8u-256g-1122_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:westerndigital:sandisk_x400_sd8sn8u-256g-1122:-:*:*:*:*:*:*:*", "cpe:2.3:o:westerndigital:sandisk_x400_sd8sn8u-512g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:westerndigital:sandisk_x400_sd8sn8u-512g:-:*:*:*:*:*:*:*", "cpe:2.3:o:westerndigital:sandisk_x400_sd8sn8u-512g-1122_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:westerndigital:sandisk_x400_sd8sn8u-512g-1122:-:*:*:*:*:*:*:*", "cpe:2.3:o:westerndigital:sandisk_x400_sd8tb8u-128g-1122_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:westerndigital:sandisk_x400_sd8tb8u-128g-1122:-:*:*:*:*:*:*:*", "cpe:2.3:o:westerndigital:sandisk_x400_sd8tb8u-1t00-1122_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:westerndigital:sandisk_x400_sd8tb8u-1t00-1122:-:*:*:*:*:*:*:*", "cpe:2.3:o:westerndigital:sandisk_x400_sd8tb8u-256g-1122_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:westerndigital:sandisk_x400_sd8tb8u-256g-1122:-:*:*:*:*:*:*:*", "cpe:2.3:o:westerndigital:sandisk_x400_sd8tb8u-512g-1122_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:westerndigital:sandisk_x400_sd8tb8u-512g-1122:-:*:*:*:*:*:*:*", "cpe:2.3:o:westerndigital:sandisk_x300_sd7sb6s-128g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:westerndigital:sandisk_x300_sd7sb6s-128g:-:*:*:*:*:*:*:*", "cpe:2.3:o:westerndigital:sandisk_x300_sd7sb6s-256g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:westerndigital:sandisk_x300_sd7sb6s-256g:-:*:*:*:*:*:*:*", "cpe:2.3:o:westerndigital:sandisk_x300_sd7sb7s-010t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:westerndigital:sandisk_x300_sd7sb7s-010t:-:*:*:*:*:*:*:*", "cpe:2.3:o:westerndigital:sandisk_x300_sd7sb7s-512g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:westerndigital:sandisk_x300_sd7sb7s-512g:-:*:*:*:*:*:*:*", "cpe:2.3:o:westerndigital:sandisk_x300_sd7sf6s-128g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:westerndigital:sandisk_x300_sd7sf6s-128g:-:*:*:*:*:*:*:*", "cpe:2.3:o:westerndigital:sandisk_x300_sd7sf6s-256g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:westerndigital:sandisk_x300_sd7sf6s-256g:-:*:*:*:*:*:*:*", "cpe:2.3:o:westerndigital:sandisk_x300_sd7sf6s-512g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:westerndigital:sandisk_x300_sd7sf6s-512g:-:*:*:*:*:*:*:*", "cpe:2.3:o:westerndigital:sandisk_x300_sd7sn6s-128g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:westerndigital:sandisk_x300_sd7sn6s-128g:-:*:*:*:*:*:*:*", "cpe:2.3:o:westerndigital:sandisk_x300_sd7sn6s-256g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:westerndigital:sandisk_x300_sd7sn6s-256g:-:*:*:*:*:*:*:*", "cpe:2.3:o:westerndigital:sandisk_x300_sd7sn6s-512g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:westerndigital:sandisk_x300_sd7sn6s-512g:-:*:*:*:*:*:*:*" ]
null
5.5
null
2.1
null
GHSA-hj6w-6w27-6783
IBM Concert Software 1.0.0, 1.0.1, 1.0.2, 1.0.2.1, and 1.0.3 could disclose sensitive system information to an unauthorized actor that could be used in further attacks against the system.
[]
null
5.3
null
null
null
CVE-2022-27544
HCL BigFix Web Reports authorized users may see sensitive information in clear text
BigFix Web Reports authorized users may see SMTP credentials in clear text.
[ "cpe:2.3:a:hcltech:bigfix_platform:*:*:*:*:*:*:*:*" ]
null
5
null
null
null
GHSA-ghfx-q992-xmjq
SQL injection vulnerability in the Live Chat (com_livechat) component 1.0 for Joomla! allows remote attackers to execute arbitrary SQL commands via the last parameter to getChatRoom.php. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
[]
null
null
null
null
null
GHSA-78x5-r7gq-35h4
TEKNOTEL CBW700N 81.447.392110.729.024 devices allow remote attackers to discover credentials via iso.3.6.1.4.1.4491.2.4.1.1.6.1.1.0 and iso.3.6.1.4.1.4491.2.4.1.1.6.1.2.0 SNMP requests.
[]
null
null
9.8
null
null
GHSA-2hj9-rhvv-rxfx
modules/gallery/helpers/data_rest.php in Gallery 3 before 3.0.9 allows remote attackers to bypass intended access restrictions and obtain sensitive information (image files) via the "full" string in the size parameter.
[]
null
null
null
null
null
CVE-2021-36665
An issue was discovered in Druva 6.9.0 for macOS, allows attackers to gain escalated local privileges via the inSyncUpgradeDaemon.
[ "cpe:2.3:a:druva:insync_client:*:*:*:*:*:macos:*:*", "cpe:2.3:a:druva:insync_client:*:*:*:*:*:windows:*:*" ]
null
7.8
null
7.2
null
CVE-2014-9412
Multiple cross-site scripting (XSS) vulnerabilities in NetIQ Access Manager (NAM) 4.x before 4.1 allow remote attackers to inject arbitrary web script or HTML via (1) an arbitrary parameter to roma/jsp/debug/debug.jsp or (2) an arbitrary parameter in a debug.DumpAll action to nps/servlet/webacc, a different issue than CVE-2014-5216.
[ "cpe:2.3:a:microfocus:access_manager:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:microfocus:access_manager:4.0.1:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
GHSA-3x83-p476-vv95
Downloads Resources over HTTP in selenium-standalone-painful
Affected versions of `selenium-standalone-painful` insecurely download an executable over an unencrypted HTTP connection.In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `selenium-standalone-painful`.RecommendationNo patch is currently available for this vulnerability.The best mitigation is currently to avoid using this package, using a different package if available.Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
[]
null
null
null
null
null
ICSA-24-228-09
Siemens NX
The affected applications contains an out of bounds read vulnerability while parsing specially crafted PRT files. This could allow an attacker to crash the application or execute code in the context of the current process.
[]
null
7.8
null
null
null
CVE-2021-22962
An attacker can send a specially crafted request which could lead to leakage of sensitive data or potentially a resource-based DoS attack.
[ "cpe:2.3:a:ivanti:avalanche:*:*:*:*:premise:*:*:*" ]
null
null
7.3
null
null
GHSA-p72p-3m8j-v5mg
PreferencesPithosDialog.py in Pithos 0.3.7 does not properly restrict permissions for the .config/pithos.ini file in a user's home directory, which allows local users to obtain Pandora credentials by reading this file.
[]
null
null
null
null
null
CVE-2017-8582
HTTP.sys in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an information disclosure vulnerability when the component improperly handles objects in memory, aka "Https.sys Information Disclosure Vulnerability".
[ "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*" ]
null
null
5.9
4.3
null
CVE-2020-27384
The Gw2-64.exe in Guild Wars 2 launcher version 106916 suffers from an elevation of privileges vulnerability which can be used by an "Authenticated User" to modify the existing executable file with a binary of his choice. The vulnerability exist due to the improper permissions, with the 'F' flag (Full Control) for 'Everyone' group, making the entire directory 'Guild Wars 2' and its files and sub-dirs world-writable.
[ "cpe:2.3:a:arena:guild_wars_2:106916:*:*:*:*:*:*:*" ]
null
7.8
null
4.6
null
CVE-2023-33160
Microsoft SharePoint Server Remote Code Execution Vulnerability
Microsoft SharePoint Server Remote Code Execution Vulnerability
[ "cpe:2.3:a:microsoft:sharepoint_server:-:*:*:*:subscription:*:*:*", "cpe:2.3:a:microsoft:sharepoint_server:2016:*:*:*:enterprise:*:*:*", "cpe:2.3:a:microsoft:sharepoint_server:2019:*:*:*:*:*:*:*" ]
null
8.8
null
null
null
CVE-2022-23457
Path Traversal in ESAPI
ESAPI (The OWASP Enterprise Security API) is a free, open source, web application security control library. Prior to version 2.3.0.0, the default implementation of `Validator.getValidDirectoryPath(String, String, File, boolean)` may incorrectly treat the tested input string as a child of the specified parent directory. This potentially could allow control-flow bypass checks to be defeated if an attack can specify the entire string representing the 'input' path. This vulnerability is patched in release 2.3.0.0 of ESAPI. As a workaround, it is possible to write one's own implementation of the Validator interface. However, maintainers do not recommend this.
[ "cpe:2.3:a:owasp:enterprise_security_api:*:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:weblogic_server:12.2.1.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:weblogic_server:14.1.1.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:linux:*:*", "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*", "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*", "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*" ]
null
7.5
null
null
null
GHSA-7547-299x-4pmv
Improper session management vulnerability in Samsung Health prior to 6.20.1.005 prevents logging out from Samsung Health App.
[]
null
null
null
null
null
GHSA-xq72-5mqw-j6rc
An issue was discovered in the Archibus app 4.0.3 for iOS. There is an XSS vulnerability in the create work request feature of the maintenance module, via the description field. This allows an attacker to perform an action on behalf of the user, exfiltrate data, and so on.
[]
null
6.1
null
null
null
CVE-2008-6477
SQL injection vulnerability in Mumbo Jumbo Media OP4 allows remote attackers to execute arbitrary SQL commands via the id parameter to index.php.
[ "cpe:2.3:a:mumbojumbo:op4:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2022-41634
WordPress Media Library Folders plugin <= 7.1.1 - Cross-Site Request Forgery (CSRF) vulnerability
Cross-Site Request Forgery (CSRF) vulnerability in Media Library Folders plugin <= 7.1.1 on WordPress.
[ "cpe:2.3:a:maxfoundry:media_library_folders:*:*:*:*:*:wordpress:*:*" ]
null
5.4
null
null
null
CVE-2023-49857
WordPress Awesome Support plugin <= 6.1.7 - Broken Access Control vulnerability
Missing Authorization vulnerability in Awesome Support Team Awesome Support allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Awesome Support: from n/a through 6.1.7.
[ "cpe:2.3:a:awesomesupport:awesome_support_wordpress_helpdesk_\\&_support:-:*:*:*:*:wordpress:*:*" ]
null
6.5
null
null
null
CVE-2006-1731
Mozilla Firefox and Thunderbird 1.x before 1.5 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0 returns the Object class prototype instead of the global window object when (1) .valueOf.call or (2) .valueOf.apply are called without any arguments, which allows remote attackers to conduct cross-site scripting (XSS) attacks.
[ "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5:beta1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5:beta2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:mozilla_suite:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:mozilla_suite:1.7.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:mozilla_suite:1.7.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:mozilla_suite:1.7.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:mozilla_suite:1.7.10:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:mozilla_suite:1.7.11:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:*:beta:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0:*:alpha:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.0.5:beta:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5:beta2:*:*:*:*:*:*" ]
null
null
null
4.3
null
GHSA-6gv9-w2gh-cw82
Microsoft Office Excel 2002 SP3 does not properly parse the Excel file format, which allows remote attackers to execute arbitrary code via a crafted spreadsheet, aka "Microsoft Office Excel Record Memory Corruption Vulnerability."
[]
null
null
null
null
null
GHSA-wc3j-p7cf-6prx
Possible denial of service scenario due to improper handling of group management action frame in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking
[]
null
null
null
null
null
GHSA-w545-4968-c9wr
Google Chrome before 27.0.1453.110 on Windows provides an incorrect handle to a renderer process in unspecified circumstances, which allows remote attackers to cause a denial of service or possibly have other impact via unknown vectors.
[]
null
null
null
null
null
RHSA-2024:2890
Red Hat Security Advisory: bind and dhcp security update
bind9: Parsing large DNS messages may cause excessive CPU load bind9: KeyTrap - Extreme CPU consumption in DNSSEC validator bind9: Preparing an NSEC3 closest encloser proof can exhaust CPU resources
[ "cpe:/a:redhat:rhel_aus:8.2::appstream", "cpe:/o:redhat:rhel_aus:8.2::baseos" ]
null
7.5
null
null
null
CVE-2001-0387
Format string vulnerability in hfaxd in HylaFAX before 4.1.b2_2 allows local users to gain privileges via the -q command line argument.
[ "cpe:2.3:a:hylafax:hylafax:4.0_pl0:*:*:*:*:*:*:*", "cpe:2.3:a:hylafax:hylafax:4.0_pl1:*:*:*:*:*:*:*", "cpe:2.3:a:hylafax:hylafax:4.0_pl2:*:*:*:*:*:*:*", "cpe:2.3:a:hylafax:hylafax:4.1_beta1:*:*:*:*:*:*:*", "cpe:2.3:a:hylafax:hylafax:4.1_beta2:*:*:*:*:*:*:*", "cpe:2.3:a:hylafax:hylafax:4.1_beta3:*:*:*:*:*:*:*" ]
null
null
null
7.2
null
GHSA-g89c-gj6q-v3fw
mediaserver in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-07-01 does not limit process-memory usage, which allows remote attackers to cause a denial of service (device hang or reboot) via a crafted media file, aka internal bug 28615448.
[]
null
null
7.5
null
null
GHSA-c3xx-grhv-v8fg
Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK & Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, and CVE-2015-8454.
[]
null
null
null
null
null
CVE-2022-1957
Comment License < 1.4.0 - Arbitrary Settings Update via CSRF
The Comment License WordPress plugin before 1.4.0 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack
[ "cpe:2.3:a:comment_license_project:comment_license:*:*:*:*:*:wordpress:*:*" ]
null
4.3
null
4.3
null
cisco-sa-fmc-cmd-inj-Z3B5MY35
Cisco Firepower Management Center Software Command Injection Vulnerabilities
Multiple vulnerabilities in the web management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to execute arbitrary commands on the underlying operating system. These vulnerabilities are due to insufficient validation of user-supplied parameters for certain API endpoints. An attacker could exploit these vulnerabilities by sending crafted input to an affected API endpoint. A successful exploit could allow an attacker to execute arbitrary commands on the device with low system privileges. To successfully exploit these vulnerabilities, an attacker would need valid credentials for a user who has Devices permissions. By default, only Administrator, Security Approver and Network Admin roles have these permissions. Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities. This advisory is part of the November 2022 release of the Cisco ASA, FTD, and FMC Security Advisory Bundled publication. For a complete list of the advisories and links to them, see Cisco Event Response: November 2022 Semiannual Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication ["https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-74838"].
[]
null
6.3
null
null
null
GHSA-6r9v-xg29-4gfg
The Art Theme for WordPress is vulnerable to unauthorized access due to a missing capability check on the 'arttheme_theme_option_restore' AJAX function in all versions up to, and including, 3.12.2.3. This makes it possible for authenticated attackers, with subscriber-level access and above, to delete the theme option.
[]
null
4.3
null
null
null
RHSA-2024:0234
Red Hat Security Advisory: java-11-openjdk security update
OpenJDK: array out-of-bounds access due to missing range check in C1 compiler (8314468) OpenJDK: JVM class file verifier flaw allows unverified bytecode execution (8314295) OpenJDK: range check loop optimization issue (8314307) OpenJDK: arbitrary Java code execution in Nashorn (8314284) OpenJDK: logging of digital signature private keys (8316976) OpenJDK: RSA padding issue and timing side-channel attack against TLS (8317547)
[ "cpe:/a:redhat:rhel_aus:8.4::appstream", "cpe:/a:redhat:rhel_e4s:8.4::appstream", "cpe:/a:redhat:rhel_tus:8.4::appstream" ]
null
7.4
null
null
null
CVE-2005-4511
Format string vulnerability in TN3270 Resource Gateway 1.1.0 allows local users to cause a denial of service and possibly execute arbitrary code via format string specifiers in syslog function calls.
[ "cpe:2.3:a:curtis_hawthorne:tn3270_resource_gateway:1.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:curtis_hawthorne:tn3270_resource_gateway:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:curtis_hawthorne:tn3270_resource_gateway:1.1.0:*:*:*:*:*:*:*" ]
null
null
null
4.6
null
CVE-2006-2212
Buffer overflow in KarjaSoft Sami FTP Server 2.0.2 and earlier allows remote attackers to execute arbitrary code via a long (1) USER or (2) PASS command.
[ "cpe:2.3:a:karjasoft:sami_ftp_server:2.0.2:*:*:*:*:*:*:*" ]
null
null
null
6.4
null
CVE-2025-43864
React Router allows a DoS via cache poisoning by forcing SPA mode
React Router is a router for React. Starting in version 7.2.0 and prior to version 7.5.2, it is possible to force an application to switch to SPA mode by adding a header to the request. If the application uses SSR and is forced to switch to SPA, this causes an error that completely corrupts the page. If a cache system is in place, this allows the response containing the error to be cached, resulting in a cache poisoning that strongly impacts the availability of the application. This issue has been patched in version 7.5.2.
[]
null
7.5
null
null
null
GHSA-vvr6-2w5f-52qh
A vulnerability has been identified in Tecnomatix Plant Simulation (All versions < V2201.0006). The affected application contains an out of bounds write past the end of an allocated buffer while parsing a specially crafted SPP file. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-19807)
[]
null
7.8
null
null
null
GHSA-xw43-24rr-hxcr
Cross-site scripting (XSS) vulnerability in Google Chrome before 22.0.1229.79 allows remote attackers to inject arbitrary web script or HTML via vectors involving frames, aka "Universal XSS (UXSS)."
[]
null
null
null
null
null
CVE-2020-1073
A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka 'Scripting Engine Memory Corruption Vulnerability'.
[ "cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:chakracore:*:*:*:*:*:*:*:*" ]
null
8.1
null
9.3
null
GHSA-8rpg-rw6g-v4jc
Adobe Flash Player versions 25.0.0.127 and earlier have an exploitable memory corruption vulnerability in the ActionScript2 code parser. Successful exploitation could lead to arbitrary code execution.
[]
null
null
9.8
null
null
CVE-2008-6624
SQL injection vulnerability in getin.php in WEBBDOMAIN Petition 1.02, 2.0, and 3.0 allows remote attackers to execute arbitrary SQL commands via the username parameter.
[ "cpe:2.3:a:webbdomain:petition:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:webbdomain:petition:1.02:*:*:*:*:*:*:*", "cpe:2.3:a:webbdomain:petition:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:webbdomain:petition:3.0:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2018-20456
In radare2 prior to 3.1.1, the parseOperand function inside libr/asm/p/asm_x86_nz.c may allow attackers to cause a denial of service (application crash in libr/util/strbuf.c via a stack-based buffer over-read) by crafting an input file, a related issue to CVE-2018-20455.
[ "cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*" ]
null
null
5.5
4.3
null
CVE-2017-2226
Untrusted search path vulnerability in Setup file of advance preparation for e-Tax software (WEB version) (1.17.1) and earlier allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.
[ "cpe:2.3:a:nta:e-tax:*:*:*:*:*:*:*:*" ]
null
7.8
null
6.8
null
CVE-2016-1379
Cisco Adaptive Security Appliance (ASA) Software 9.0 through 9.5.1 mishandles IPsec error processing, which allows remote authenticated users to cause a denial of service (memory consumption) via crafted (1) LAN-to-LAN or (2) Remote Access VPN tunnel packets, aka Bug ID CSCuv70576.
[ "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.2.10:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.3.6:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.3.8:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.5:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.7:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.17:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.20:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.24:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.26:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.29:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.33:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.35:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.37:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.1.4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.2.8:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.3.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.4.5:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.5:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.5.10:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.5.12:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.5.15:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.5.21:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.6:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.6.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.6.4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.6.6:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.6.8:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2\\(0.0\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2\\(0.104\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2\\(3.1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.2.4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.2.7:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.2.8:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.3.3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.3.4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3\\(1.50\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3\\(1.105\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3\\(2.100\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3\\(2.243\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.3.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.3.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.3.5:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.3.6:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.0.115:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.1.3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.1.5:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.5.1:*:*:*:*:*:*:*" ]
null
null
6.5
6.8
null
CVE-2017-11079
In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, while processing sparse image, uninitialized heap memory can potentially be flashed due to the lack of validation of sparse image block header size.
[ "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*" ]
null
null
9.8
7.5
null
GHSA-3724-4mmc-j59x
NoMachine Enterprise Desktop is affected by Buffer Overflow. IOCTL Handler 0x22001B in the NoMachine Enterprise Desktop above 4.0.346 and below 7.7.4 allow local attackers to execute arbitrary code in kernel mode or cause a denial of service (memory corruption and OS crash) via specially crafted I/O Request Packet.
[]
null
null
null
null
null
CVE-2019-4695
IBM Security Guardium Data Encryption (GDE) 3.0.0.2 allows web pages to be stored locally which can be read by another user on the system. IBM X-Force ID: 171926.
[ "cpe:2.3:a:ibm:guardium_data_encryption:3.0.0.2:*:*:*:*:*:*:*" ]
null
null
4
null
null
CVE-2024-26927
ASoC: SOF: Add some bounds checking to firmware data
In the Linux kernel, the following vulnerability has been resolved: ASoC: SOF: Add some bounds checking to firmware data Smatch complains about "head->full_size - head->header_size" can underflow. To some extent, we're always going to have to trust the firmware a bit. However, it's easy enough to add a check for negatives, and let's add a upper bounds check as well.
[ "cpe:2.3:a:linux:linux_kernel:-:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*" ]
null
8.4
null
null
null
GHSA-j2wm-vcg8-rf5v
An issue was discovered in phpMyAdmin. Username matching for the allow/deny rules may result in wrong matches and detection of the username in the rule due to non-constant execution time. All 4.6.x versions (prior to 4.6.5), 4.4.x versions (prior to 4.4.15.9), and 4.0.x versions (prior to 4.0.10.18) are affected.
[]
null
null
5.3
null
null
GHSA-pjwm-cr36-mwv3
ReDoS in giskard's transformation.py (GHSL-2024-324)
ReDoS in Giskard text perturbation detectorA Remote Code Execution (ReDoS) vulnerability was discovered in Giskard component by the [GitHub Security Lab](https://securitylab.github.com) team. When processing datasets with specific text patterns with Giskard detectors, this vulnerability could trigger exponential regex evaluation times, potentially leading to denial of service.DetailsThe vulnerability affects Giskard's punctuation removal transformation used in the text perturbation detection. A regex used to detect URLs and links was vulnerable to catastrophic backtracking that could be triggered by specific patterns in the text.Affected versionGiskard versions prior to 2.15.5 are affected. Users should upgrade to version 2.15.5 or later, which includes a fix for this vulnerability.ImpactThis vulnerability can cause extended computation times or crashes in Giskard when processing text containing certain patterns.CreditThis issue was discovered and reported by GHSL team member [@kevinbackhouse (Kevin Backhouse)](https://github.com/kevinbackhouse).
[]
6.9
null
null
null
null
GHSA-g94p-m365-483p
Verizon LVSKIHP 5G outside devices through 2022-02-15 allow anyone (knowing the device's serial number) to access a CPE admin website, e.g., at the 10.0.0.1 IP address. The password (for the verizon username) is calculated by concatenating the serial number and the model (i.e., the LVSKIHP string), running the sha256sum program, and extracting the first seven characters concatenated with the last seven characters of that SHA-256 value.
[]
null
8.1
null
null
null
CVE-2022-26266
Piwigo v12.2.0 was discovered to contain a SQL injection vulnerability via pwg.users.php.
[ "cpe:2.3:a:piwigo:piwigo:12.2.0:*:*:*:*:*:*:*" ]
null
8.8
null
6.5
null
GHSA-6c6g-x473-fqjx
Insufficiently Protected Credentials vulnerability in client environment of Hitachi ABB Power Grids Retail Operations and Counterparty Settlement Billing (CSB) allows an attacker or unauthorized user to access database credentials, shut down the product and access or alter. This issue affects: Hitachi ABB Power Grids Retail Operations version 5.7.2 and prior versions. Hitachi ABB Power Grids Counterparty Settlement Billing (CSB) version 5.7.2 and prior versions.
[]
null
7.2
null
null
null
GHSA-prxq-rjvh-533j
Cross-site scripting (XSS) vulnerability in Colony CMS 2.75 and earlier allows remote attackers to inject arbitrary web script or HTML via unspecified search parameters.
[]
null
null
null
null
null
PYSEC-2017-148
null
Cross-site scripting (XSS) vulnerability in ZMI pages that use the manage_tabs_message in Zope 2.11.4, 2.11.2, 2.10.9, 2.10.7, 2.10.6, 2.10.5, 2.10.4, 2.10.2, 2.10.1, 2.12.
[]
null
null
6.1
null
null
GHSA-f25p-chr4-q25h
Huawei Mate 9 and Mate 9 pro smart phones with software the versions before MHA-AL00B 8.0.0.334(C00); the versions before LON-AL00B 8.0.0.334(C00) have a information leak vulnerability in the date service proxy implementation. An attacker may trick a user into installing a malicious application and application can exploit the vulnerability to get kernel date which may cause sensitive information leak.
[]
null
null
5.5
null
null
GHSA-p5p4-pp89-v937
AyaCMS v3.1.2 has an Arbitrary File Upload vulnerability.
[]
null
8.8
null
null
null
CVE-2025-32572
WordPress Kata Plus Plugin <= 1.5.2 - PHP Object Injection vulnerability
Deserialization of Untrusted Data vulnerability in Climax Themes Kata Plus allows Object Injection. This issue affects Kata Plus: from n/a through 1.5.2.
[]
null
9.8
null
null
null
CVE-2012-5565
Cross-site scripting (XSS) vulnerability in js/compose-dimp.js in Horde Internet Mail Program (IMP) before 5.0.24, as used in Horde Groupware Webmail Edition before 4.0.9, allows remote attackers to inject arbitrary web script or HTML via a crafted name for an attached file, related to the dynamic view.
[ "cpe:2.3:a:horde:imp:*:*:*:*:*:*:*:*", "cpe:2.3:a:horde:imp:5.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:horde:imp:5.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:horde:imp:5.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:horde:imp:5.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:horde:imp:5.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:horde:imp:5.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:horde:imp:5.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:horde:imp:5.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:horde:imp:5.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:horde:imp:5.0.13:*:*:*:*:*:*:*", "cpe:2.3:a:horde:imp:5.0.14:*:*:*:*:*:*:*", "cpe:2.3:a:horde:imp:5.0.15:*:*:*:*:*:*:*", "cpe:2.3:a:horde:imp:5.0.16:*:*:*:*:*:*:*", "cpe:2.3:a:horde:imp:5.0.17:*:*:*:*:*:*:*", "cpe:2.3:a:horde:imp:5.0.18:*:*:*:*:*:*:*", "cpe:2.3:a:horde:imp:5.0.19:*:*:*:*:*:*:*", "cpe:2.3:a:horde:imp:5.0.20:*:*:*:*:*:*:*", "cpe:2.3:a:horde:imp:5.0.21:*:*:*:*:*:*:*", "cpe:2.3:a:horde:imp:5.0.22:*:*:*:*:*:*:*", "cpe:2.3:a:horde:groupware:*:*:webamail:*:*:*:*:*", "cpe:2.3:a:horde:groupware:4.0:*:webamail:*:*:*:*:*", "cpe:2.3:a:horde:groupware:4.0:rc1:webamail:*:*:*:*:*", "cpe:2.3:a:horde:groupware:4.0:rc2:webamail:*:*:*:*:*", "cpe:2.3:a:horde:groupware:4.0.1:*:webamail:*:*:*:*:*", "cpe:2.3:a:horde:groupware:4.0.2:*:webamail:*:*:*:*:*", "cpe:2.3:a:horde:groupware:4.0.3:*:webamail:*:*:*:*:*", "cpe:2.3:a:horde:groupware:4.0.4:*:webamail:*:*:*:*:*", "cpe:2.3:a:horde:groupware:4.0.5:*:webamail:*:*:*:*:*", "cpe:2.3:a:horde:groupware:4.0.6:*:webamail:*:*:*:*:*", "cpe:2.3:a:horde:groupware:4.0.7:*:webamail:*:*:*:*:*" ]
null
null
null
4.3
null
CVE-2022-33742
Linux disk/nic frontends data leaks T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Linux Block and Network PV device frontends don't zero memory regions before sharing them with the backend (CVE-2022-26365, CVE-2022-33740). Additionally the granularity of the grant table doesn't allow sharing less than a 4K page, leading to unrelated data residing in the same 4K page as data shared with a backend being accessible by such backend (CVE-2022-33741, CVE-2022-33742).
[ "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.12:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.12:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.12:rc5:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.12:rc6:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:5.19:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:5.19:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:5.19:rc4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:5.19:rc5:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:-:*:*:*:*:*:*:*" ]
null
7.1
null
3.6
null
GHSA-9xfp-2644-5v32
Improper buffer restrictions in some Intel(R) Thunderbolt(TM) DCH drivers for Windows before version 88 may allow a privileged user to potentially enable escalation of privilege via local access.
[]
null
6.1
null
null
null
GHSA-f8qc-p4j7-6757
Cross-site request forgery (CSRF) vulnerability in Exinda WAN Optimization Suite 7.0.0 (2160) allows remote attackers to hijack the authentication of administrators for requests that change the admin password via a request to admin/launch.
[]
null
null
null
null
null
CVE-2023-26454
Requests to fetch image metadata could be abused to include SQL queries that would be executed unchecked. Exploiting this vulnerability requires at least access to adjacent networks of the imageconverter service, which is not exposed to public networks by default. Arbitrary SQL statements could be executed in the context of the services database user account. API requests are now properly checked for valid content and attempts to circumvent this check are being logged as error. No publicly available exploits are known.
[ "cpe:2.3:a:open-xchange:open-xchange_appsuite:*:*:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:-:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6069:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6073:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6080:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6085:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6093:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6102:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6112:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6121:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6133:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6138:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6141:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6146:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6147:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6148:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6150:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6156:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6161:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6166:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6173:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6176:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6178:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6189:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6194:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6199:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6204:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6205:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6209:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6210:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6214:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6215:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6216:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6218:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6219:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6220:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6227:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6230:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6233:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6235:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6236:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6239:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6241:*:*:*:*:*:*" ]
null
7.6
null
null
null
GHSA-v5vc-xx2v-57v7
In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Mobile and Snapdragon Wear MDM9206, MDM9607, MDM9635M, MSM8909W, SD 210/SD 212/SD 205, SD 400, SD 410/12, SD 425, SD 430, SD 615/16/SD 415, SD 617, SD 800, SD 808, and SD 810, when making a high speed Dual Carrier Downlink Data call in a multicell environment, a buffer overflow may occur.
[]
null
null
9.8
null
null
GHSA-gmpq-xrxj-xh8m
Arches vulnerable to execution of arbitrary SQL
ImpactWith a carefully crafted web request, it's possible to execute certain unwanted sql statements against the database. Anyone running the impacted versions (<=6.1.1, 6.2.0, >=7.0.0, <=7.1.1) should upgrade as soon as possible.PatchesThe problem has been patched in the following versions: [6.1.2](https://pypi.org/project/arches/6.1.2/), [6.2.1](https://pypi.org/project/arches/6.2.1/), and [7.2.0](https://pypi.org/project/arches/7.2.0/) Users are strongly urged to upgrade to the most recent relevant patch.WorkaroundsThere are no workarounds.General Referenceshttps://www.w3schools.com/sql/sql_injection.asp https://en.wikipedia.org/wiki/SQL_injectionFor more informationPost any questions to the [Arches project forum](https://community.archesproject.org/).
[]
null
8.6
null
null
null
GHSA-q4cp-jqj9-c4cv
An out-of-bounds read was addressed with improved input validation. This issue is fixed in macOS Big Sur 11.0.1. A malicious application may be able to read restricted memory.
[]
null
null
null
null
null
GHSA-w2rh-7p2w-889c
The SimpleXMLRPCServer library module in Python 2.2, 2.3 before 2.3.5, and 2.4, when used by XML-RPC servers that use the register_instance method to register an object without a _dispatch method, allows remote attackers to read or modify globals of the associated module, and possibly execute arbitrary code, via dotted attributes.
[]
null
null
null
null
null
CVE-2017-11302
An issue was discovered in Adobe InDesign 12.1.0 and earlier versions. An exploitable memory corruption vulnerability exists. Successful exploitation could lead to arbitrary code execution.
[ "cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*" ]
null
null
9.8
10
null
GHSA-ggf6-638m-vqmg
Netmaker vulnerable to Insufficient Granularity of Access Control
ImpactImproper Authorization functions leads to non-privileged users running privileged API calls. If you have added users to your Netmaker platform who whould not have admin privileges, they could use their auth token to run admin-level functions via the API.In addition, differing response codes based on function calls allowed non-users to potentially brute force the determination of names of networks on the system.PatchesThis problem has been patched in v0.15.1. To apply:docker-compose downdocker pull gravitl/netmaker:v0.15.1docker-compose up -dFor more informationIf you have any questions or comments about this advisory:Email us at [[email protected]](mailto:[email protected]) This vulnerability was brought to our attention by @tweidinger
[]
null
8.8
null
null
null
CVE-2021-25479
A possible heap-based buffer overflow vulnerability in Exynos CP Chipset prior to SMR Oct-2021 Release 1 allows arbitrary memory write and code execution.
[ "cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", "cpe:2.3:h:samsung:exynos:-:*:*:*:*:*:*:*" ]
null
7.2
null
null
null
GHSA-vpxw-jphr-pjhp
The ktimer feature (sys/kern/kern_time.c) in FreeBSD 7.0, 7.1, and 7.2 allows local users to overwrite arbitrary kernel memory via an out-of-bounds timer value.
[]
null
null
null
null
null
GHSA-qhrx-hcm6-pmrw
Unsafe deserialization in SmtpTransport in CakePHP
An issue was discovered in SmtpTransport in CakePHP 3.7.6. An unserialized object with modified internal properties can trigger arbitrary file overwriting upon destruction.
[]
null
null
7.5
null
null
CVE-2021-24182
Tutor LMS < 1.8.3 - SQL Injection via tutor_quiz_builder_get_answers_by_question
The tutor_quiz_builder_get_answers_by_question AJAX action from the Tutor LMS – eLearning and online course solution WordPress plugin before 1.8.3 was vulnerable to UNION based SQL injection that could be exploited by students.
[ "cpe:2.3:a:themeum:tutor_lms:*:*:*:*:*:wordpress:*:*" ]
null
6.5
null
4
null
GHSA-43g4-6p45-h9cf
The FTP proxy server in Apple AirPort Express, AirPort Extreme, and Time Capsule with firmware 7.5 does not restrict the IP address and port specified in a PORT command from a client, which allows remote attackers to leverage intranet FTP servers for arbitrary TCP forwarding via a crafted PORT command.
[]
null
null
null
null
null