id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
139k
cpes
sequencelengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
CVE-2018-3951
An exploitable remote code execution vulnerability exists in the HTTP header-parsing function of the TP-Link TL-R600VPN HTTP Server. A specially crafted HTTP request can cause a buffer overflow, resulting in remote code execution on the device. An attacker can send an authenticated HTTP request to trigger this vulnerability.
[ "cpe:2.3:o:tp-link:tl-r600vpn_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:tl-r600vpn:-:*:*:*:*:*:*:*" ]
null
null
7.2
null
GHSA-fx5c-4j3x-4pc6
DeluxeBB 1.06 and earlier, when run on the Apache HTTP Server with the mod_mime module, allows remote attackers to execute arbitrary PHP code by uploading files with double extensions via the fileupload parameter in a newthread action in newpost.php.
[]
null
null
null
null
GHSA-6rv3-q74h-h7v3
The Porto theme for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 7.1.0 via the 'porto_ajax_posts' function. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where php file type can be uploaded and included.
[]
null
9.8
null
null
CVE-2024-45113
ColdFusion | Improper Authentication (CWE-287)
ColdFusion versions 2023.6, 2021.12 and earlier are affected by an Improper Authentication vulnerability that could result in privilege escalation. An attacker could exploit this vulnerability to gain unauthorized access and affect the integrity of the application. Exploitation of this issue does not require user interaction.
[ "cpe:2.3:a:adobe:coldfusion:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:coldfusion:2023:-:*:*:*:*:*:*", "cpe:2.3:a:adobe:coldfusion:2023:update1:*:*:*:*:*:*", "cpe:2.3:a:adobe:coldfusion:2023:update2:*:*:*:*:*:*", "cpe:2.3:a:adobe:coldfusion:2023:update3:*:*:*:*:*:*", "cpe:2.3:a:adobe:coldfusion:2023:update4:*:*:*:*:*:*", "cpe:2.3:a:adobe:coldfusion:2023:update5:*:*:*:*:*:*", "cpe:2.3:a:adobe:coldfusion:2023:update6:*:*:*:*:*:*", "cpe:2.3:a:adobe:coldfusion:2021:-:*:*:*:*:*:*", "cpe:2.3:a:adobe:coldfusion:2021:update1:*:*:*:*:*:*", "cpe:2.3:a:adobe:coldfusion:2021:update10:*:*:*:*:*:*", "cpe:2.3:a:adobe:coldfusion:2021:update11:*:*:*:*:*:*", "cpe:2.3:a:adobe:coldfusion:2021:update12:*:*:*:*:*:*", "cpe:2.3:a:adobe:coldfusion:2021:update2:*:*:*:*:*:*", "cpe:2.3:a:adobe:coldfusion:2021:update3:*:*:*:*:*:*", "cpe:2.3:a:adobe:coldfusion:2021:update4:*:*:*:*:*:*", "cpe:2.3:a:adobe:coldfusion:2021:update5:*:*:*:*:*:*", "cpe:2.3:a:adobe:coldfusion:2021:update6:*:*:*:*:*:*", "cpe:2.3:a:adobe:coldfusion:2021:update7:*:*:*:*:*:*", "cpe:2.3:a:adobe:coldfusion:2021:update8:*:*:*:*:*:*", "cpe:2.3:a:adobe:coldfusion:2021:update9:*:*:*:*:*:*" ]
null
7.5
null
null
CVE-2024-27133
Insufficient sanitization in MLflow leads to XSS when running a recipe that uses an untrusted dataset.
Insufficient sanitization in MLflow leads to XSS when running a recipe that uses an untrusted dataset. This issue leads to a client-side RCE when running the recipe in Jupyter Notebook. The vulnerability stems from lack of sanitization over dataset table fields.
[ "cpe:2.3:a:lfprojects:mlflow:*:*:*:*:*:*:*:*" ]
null
7.5
null
null
GHSA-f69p-jvr2-8j5x
kodbox 1.2.x through 1.3.7 has a Sensitive Information Leakage issue.
[]
null
7.5
null
null
ICSA-22-349-01
Prosys OPC UA Simulation Server (Update A)
Prosys OPC UA Simulation server v5.03-64 does not sufficiently protect credentials, which could allow an attacker to obtain user credentials and gain access to system data. CVE-2022-2967 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H).
[]
null
null
6.5
null
CVE-2024-13747
WooMail - WooCommerce Email Customizer <= 3.0.34 - Authenticated (Subscriber+) Missing Authorization to SQL Injection
The WooMail - WooCommerce Email Customizer plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the 'template_delete_saved' function in all versions up to, and including, 3.0.34. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject SQL into an existing post deletion query.
[]
null
4.3
null
null
GHSA-p82h-r998-fmm5
In ape extractor, there is a possible out of bounds read due to a heap buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05561391; Issue ID: ALPS05561391.
[]
null
null
null
null
GHSA-8rpj-mgcc-4hwx
A CSV injection vulnerability exists in the web UI of SolarWinds Serv-U FTP Server v15.1.7.
[]
null
null
null
null
GHSA-m8mv-xfjj-7m87
An issue was discovered on NRadio N8-180 NROS-1.9.2.n3.c5 devices. The /cgi-bin/luci/nradio/basic/radio endpoint is vulnerable to command injection via the 2.4 GHz and 5 GHz name parameters, allowing a remote attacker to execute arbitrary OS commands on the device (with root-level permissions) via crafted input.
[]
null
4.8
null
null
GHSA-jpqr-vh55-xqxf
Apache Tomcat Buffer Over-Read
The AJP connector in Apache Tomcat 5.5.15 uses an incorrect length for chunks, which can cause a buffer over-read in the `ajp_process_callback` in mod_jk, which allows remote attackers to read portions of sensitive memory.
[]
null
null
null
null
GHSA-gc9v-rxqh-j677
IBM QRadar 7.3, 7.4, and 7.5 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 220041.
[]
null
4.8
null
null
GHSA-4g73-w34j-p4w5
Movie Seat Reservation v1 was discovered to contain an unauthenticated file disclosure vulnerability via /index.php?page=home.
[]
null
7.5
null
null
GHSA-62gj-gx39-jgj7
An arbitrary file upload vulnerability has been discovered in ROS Kinetic Kame in ROS_VERSION 1 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code, cause a denial of service (DoS), and obtain sensitive information via crafted payload to the file upload mechanism of the ROS system, including the server’s functionality for handling file uploads and the associated validation processes.
[]
null
null
null
null
CVE-2008-4943
bulmages-servers 0.11.1 allows local users to overwrite arbitrary files via a symlink attack on the (a) /tmp/error.txt, (b) /tmp/errores.txt, and possibly other temporary files, related to the (1) creabulmafact, (2) creabulmacont, and possibly (3) actualizabulmacont, (4) installbulmages-db, and (5) actualizabulmafact scripts.
[ "cpe:2.3:a:iglues:bulmages-servers:0.11.1:*:*:*:*:*:*:*" ]
null
null
null
6.9
ICSA-20-154-05
GE Grid Solutions Reason RT Clocks
The device 's vulnerability in the web application could allow multiple unauthenticated attacks that could cause serious impact. The vulnerability may allow an unauthenticated attacker to execute arbitrary commands and send a request to a specific URL that could cause the device to become unresponsive. The unauthenticated attacker may change the password of the 'configuration' user account, allowing the attacker to modify the configuration of the device via the web interface using the new password. This vulnerability may also allow an unauthenticated attacker to bypass the authentication required to configure the device and reboot the system.CVE-2020-12017 has been assigned to this vulnerability. A CVSS v3 base score of 9.6 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:H).
[]
null
null
9.6
null
CVE-2024-5798
Vault Incorrectly Validated JSON Web Tokens (JWT) Audience Claims
Vault and Vault Enterprise did not properly validate the JSON Web Token (JWT) role-bound audience claim when using the Vault JWT auth method. This may have resulted in Vault validating a JWT the audience and role-bound claims do not match, allowing an invalid login to succeed when it should have been rejected. This vulnerability, CVE-2024-5798, was fixed in Vault and Vault Enterprise 1.17.0, 1.16.3, and 1.15.9
[]
null
2.6
null
null
CVE-2023-21389
In Settings, there is a possible bypass of profile owner restrictions due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
[ "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*" ]
null
7.8
null
null
CVE-2025-31139
In JetBrains TeamCity before 2025.03 base64 encoded password could be exposed in build log
[]
null
4.3
null
null
GHSA-28x6-9x2p-p6mq
Microsoft Internet Explorer 8, and possibly other versions, detects http content in https web pages only when the top-level frame uses https, which allows man-in-the-middle attackers to execute arbitrary web script, in an https site's context, by modifying an http page to include an https iframe that references a script file on an http site, related to "HTTP-Intended-but-HTTPS-Loadable (HPIHSL) pages."
[]
null
null
null
null
CVE-2024-47825
CIDR deny policies may not take effect when a more narrow CIDR allow is present
Cilium is a networking, observability, and security solution with an eBPF-based dataplane. Starting in version 1.14.0 and prior to versions 1.14.16 and 1.15.10, a policy rule denying a prefix that is broader than `/32` may be ignored if there is a policy rule referencing a more narrow prefix (`CIDRSet` or `toFQDN`) and this narrower policy rule specifies either `enableDefaultDeny: false` or `- toEntities: all`. Note that a rule specifying `toEntities: world` or `toEntities: 0.0.0.0/0` is insufficient, it must be to entity `all`.This issue has been patched in Cilium v1.14.16 and v1.15.10. As this issue only affects policies using `enableDefaultDeny: false` or that set `toEntities` to `all`, some workarounds are available. For users with policies using `enableDefaultDeny: false`, remove this configuration option and explicitly define any allow rules required. For users with egress policies that explicitly specify `toEntities: all`, use `toEntities: world`.
[ "cpe:2.3:a:cilium:cilium:*:*:*:*:*:*:*:*" ]
null
4
null
null
CVE-2023-51011
TOTOlink EX1800T v9.1.0cu.2112_B20220316 is vulnerable to unauthorized arbitrary command execution in the lanPriDns parameter’ of the setLanConfig interface of the cstecgi .cgi
[ "cpe:2.3:o:totolink:ex1800t_firmware:9.1.0cu.2112_b20220316:*:*:*:*:*:*:*", "cpe:2.3:h:totolink:ex1800t:-:*:*:*:*:*:*:*" ]
null
9.8
null
null
CVE-2009-2460
Multiple stack-based buffer overflows in mathtex.cgi in mathTeX, when downloaded before 20090713, have unspecified impact and remote attack vectors.
[ "cpe:2.3:a:forkosh:mathtex:-:*:*:*:*:*:*:*" ]
null
null
null
10
GHSA-6jr9-mp6v-mh4x
IBM WebSphere Application Server (WAS) 8.0.x before 8.0.0.10 and 8.5.x before 8.5.5.3, when Load Balancer for IPv4 Dispatcher is enabled, allows remote attackers to cause a denial of service (Load Balancer crash) via unspecified vectors.
[]
null
null
null
null
GHSA-v42f-j8fx-99f3
Queue<T> should have a Send bound on its Send/Sync traits
Affected versions of this crate unconditionally implements `Send`/`Sync` for `Queue<T>`.This allows (1) creating data races to a `T: !Sync` and (2) sending `T: !Send` to other threads, resulting in memory corruption or other undefined behavior.
[]
null
null
null
null
GHSA-h2mj-pqgp-xmmj
A vulnerability in the web interface of the Cisco Adaptive Security Appliance (ASA) could allow an unauthenticated, remote attacker to cause an affected device to reload unexpectedly, resulting in a denial of service (DoS) condition. It is also possible on certain software releases that the ASA will not reload, but an attacker could view sensitive system information without authentication by using directory traversal techniques. The vulnerability is due to lack of proper input validation of the HTTP URL. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. An exploit could allow the attacker to cause a DoS condition or unauthenticated disclosure of information. This vulnerability applies to IPv4 and IPv6 HTTP traffic. This vulnerability affects Cisco ASA Software and Cisco Firepower Threat Defense (FTD) Software that is running on the following Cisco products: 3000 Series Industrial Security Appliance (ISA), ASA 1000V Cloud Firewall, ASA 5500 Series Adaptive Security Appliances, ASA 5500-X Series Next-Generation Firewalls, ASA Services Module for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers, Adaptive Security Virtual Appliance (ASAv), Firepower 2100 Series Security Appliance, Firepower 4100 Series Security Appliance, Firepower 9300 ASA Security Module, FTD Virtual (FTDv). Cisco Bug IDs: CSCvi16029.
[]
null
7.5
null
null
GHSA-j6g4-w2h4-mv5j
Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: JNDI). Supported versions that are affected are 10.3.6.0 and 12.1.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. While the vulnerability is in Oracle WebLogic Server, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.0 Base Score 10.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H).
[]
null
null
10
null
CVE-2022-36301
BF-OS version 3.x up to and including 3.83 do not enforce strong passwords which may allow a remote attacker to brute-force the device password.
[ "cpe:2.3:o:bosch:bf-os:*:*:*:*:*:*:*:*" ]
null
9.8
null
null
CVE-2022-37070
H3C GR-1200W MiniGRW1A0V100R006 was discovered to contain a command injection vulnerability via the param parameter at DelL2tpLNSList.
[ "cpe:2.3:o:h3c:gr-1200w_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:h3c:gr-1200w:-:*:*:*:*:*:*:*" ]
null
9.8
null
null
GHSA-vh56-6f64-v877
Vulnerability in Realtek RtsPer driver for PCIe Card Reader (RtsPer.sys) before 10.0.22000.21355 and Realtek RtsUer driver for USB Card Reader (RtsUer.sys) before 10.0.22000.31274 provides read and write access to the PCI configuration space of the device.
[]
null
7.8
null
null
CVE-2024-21434
Microsoft Windows SCSI Class System File Elevation of Privilege Vulnerability
Microsoft Windows SCSI Class System File Elevation of Privilege Vulnerability
[ "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*" ]
null
7.8
null
null
GHSA-rp2c-496x-gf5c
In Pulse Secure Pulse Connect Secure version 9.0RX before 9.0R3.4 and 8.3RX before 8.3R7.1 and Pulse Policy Secure version 9.0RX before 9.0R3.2 and 5.4RX before 5.4R7.1, an unauthenticated, remote attacker can conduct a session hijacking attack.
[]
null
9.8
null
null
GHSA-4244-mrv4-7597
Multiple cross-site request forgery (CSRF) vulnerabilities in password.php in PHPmotion 2.1 and earlier allow remote attackers to hijack the authentication of arbitrary users for requests that modify an account via the (1) password or (2) email_address parameter.
[]
null
null
null
null
CVE-2020-4432
Certain IBM Aspera applications are vulnerable to command injection after valid authentication, which could allow an attacker with intimate knowledge of the system to execute commands in a SOAP API. IBM X-Force ID: 180810.
[ "cpe:2.3:a:ibm:aspera_application_platform_on_demand:*:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:aspera_faspex_on_demand:*:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:aspera_high-speed_transfer_endpoint:*:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:aspera_high-speed_transfer_server:*:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:aspera_high-speed_transfer_server_for_cloud_pak_for_integration:*:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:aspera_proxy_server:*:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:aspera_server_on_demand:*:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:aspera_shares_on_demand:*:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:aspera_streaming:*:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:aspera_transfer_cluster_manager:*:*:*:*:*:*:*:*" ]
null
null
7.5
null
GHSA-mjj5-jqj3-25q9
The imagemagick libmagick library 5.5 and earlier creates temporary files insecurely, which allows local users to create or overwrite arbitrary files.
[]
null
null
null
null
CVE-2012-1384
Unspecified vulnerability in the NetEase Pmail (com.netease.rpmms) application 0.5.0 and 0.5.2 for Android has unknown impact and attack vectors.
[ "cpe:2.3:a:netease:netease_pmail:0.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:netease:netease_pmail:0.5.2:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*" ]
null
null
null
10
GHSA-46x7-62h2-v4mm
SAP BusinessObjects Business Intelligence Platform (Web Intelligence HTML interface), before versions 4.2 and 4.3, does not sufficiently encode user-controlled inputs and allows execution of scripts in the chart title resulting in reflected Cross-Site Scripting
[]
null
5.4
null
null
ICSA-21-266-01
Trane Symbio (Update B)
The affected controllers do not properly sanitize the input containing code syntax. As a result, an attacker could craft code to alter the intended controller flow of the software.CVE-2021-38448 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:P/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:H).
[]
null
null
7.5
null
CVE-2019-8659
This issue was addressed with improved checks. This issue is fixed in watchOS 5.3. Users removed from an iMessage conversation may still be able to alter state.
[ "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*" ]
null
7.5
null
5
PYSEC-2020-14
null
An issue was found in Apache Airflow versions 1.10.10 and below. A remote code/command injection vulnerability was discovered in one of the example DAGs shipped with Airflow which would allow any authenticated user to run arbitrary commands as the user running airflow worker/scheduler (depending on the executor in use). If you already have examples disabled by setting load_examples=False in the config then you are not vulnerable.
[]
null
null
null
null
CVE-2022-34868
WordPress ЮKassa для WooCommerce plugin <= 2.3.0 - Authenticated Arbitrary Settings Update vulnerability
Authenticated Arbitrary Settings Update vulnerability in YooMoney ЮKassa для WooCommerce plugin <= 2.3.0 at WordPress.
[ "cpe:2.3:a:yookassa:yukassa_for_woocommerce:*:*:*:*:*:wordpress:*:*" ]
null
8.8
null
null
GHSA-rg8g-m8wh-j728
An elevation of privilege vulnerability in the Android media framework (libaudiopolicymanager). Product: Android. Versions: 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0. Android ID A-64340921.
[]
null
null
7.8
null
CVE-2022-38296
Cuppa CMS v1.0 was discovered to contain an arbitrary file upload vulnerability via the File Manager.
[ "cpe:2.3:a:cuppacms:cuppacms:1.0:*:*:*:*:*:*:*" ]
null
9.8
null
null
GHSA-4q3g-xq49-mpmw
Cross-site scripting (XSS) vulnerability in index.pl in Open Ticket Request System (OTRS) 2.0.x allows remote attackers to inject arbitrary web script or HTML via the Subaction parameter in an AgentTicketMailbox Action. NOTE: DEBIAN:DSA-1299 originally used this identifier for an ipsec-tools issue, but the proper identifier for the ipsec-tools issue is CVE-2007-1841.
[]
null
null
null
null
CVE-2012-4836
Cross-site scripting (XSS) vulnerability in IBM Cognos Business Intelligence (BI) 8.4.1 before IF1, 10.1 before IF2, 10.1.1 before IF2, and 10.2 before IF1 allows remote authenticated users to inject arbitrary web script or HTML via a crafted string that is not properly handled during rendering of stored data.
[ "cpe:2.3:a:ibm:cognos_business_intelligence:8.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:cognos_business_intelligence:10.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:cognos_business_intelligence:10.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:cognos_business_intelligence:10.2:*:*:*:*:*:*:*" ]
null
null
null
3.5
GHSA-3g9q-pxcf-xr75
A vulnerability was found in PCMan FTP Server 2.0.7 and classified as critical. Affected by this issue is some unknown functionality of the component MODE Command Handler. The manipulation leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
[]
6.9
7.3
null
null
GHSA-w7jr-f865-r43v
admin/index.php in oBlog allows remote attackers to conduct brute-force password guessing attacks via HTTP requests.
[]
null
null
null
null
CVE-2024-29120
Apache StreamPark: Information leakage vulnerability
In Streampark (version < 2.1.4), when a user logged in successfully, the Backend service would return "Authorization" as the front-end authentication credential. User can use this credential to request other users' information, including the administrator's username, password, salt value, etc.  Mitigation: all users should upgrade to 2.1.4
[]
null
5.9
null
null
GHSA-9556-8jgg-j6p9
The way URIs are handled in admin/header.php in Chadha PHPKB Standard Multi-Language 9 allows Reflected XSS (injecting arbitrary web script or HTML) in admin/manage-categories.php by adding a question mark (?) followed by the payload.
[]
null
4.8
null
null
CVE-2024-23849
In rds_recv_track_latency in net/rds/af_rds.c in the Linux kernel through 6.7.1, there is an off-by-one error for an RDS_MSG_RX_DGRAM_TRACE_MAX comparison, resulting in out-of-bounds access.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
null
5.5
null
null
RHSA-2023:0468
Red Hat Security Advisory: Red Hat OpenShift GitOps security update
ArgoCD: JWT audience claim is not verified
[ "cpe:/a:redhat:openshift_gitops:1.5::el8" ]
null
8.8
null
null
GHSA-593c-xgp7-3qpp
Cross-site scripting (XSS) vulnerability in the web interface on the Huawei E355 CH1E355SM modem with software 21.157.37.01.910 and Web UI 11.001.08.00.03 allows remote attackers to inject arbitrary web script or HTML via an SMS message.
[]
null
null
null
null
GHSA-8fqm-6hfr-ppwc
Tenda AC6 US_AC6V1.0BR_V15.03.05.16_multi_TD01.bin is vulnerable to Buffer Overflow via function "fromGetWirelessRepeat."
[]
null
9.8
null
null
CVE-2017-11816
The Microsoft Windows Graphics Device Interface (GDI) on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an information disclosure vulnerability in the way it handles objects in memory, aka "Windows GDI Information Disclosure Vulnerability".
[ "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*" ]
null
null
5.5
2.1
GHSA-77x4-55q7-4vmj
Apache HugeGraph-Hubble: SSRF in Hubble connection page
Server-Side Request Forgery (SSRF) vulnerability in Apache HugeGraph-Hubble. This issue affects Apache HugeGraph-Hubble: from 1.0.0 before 1.3.0.Users are recommended to upgrade to version 1.3.0, which fixes the issue.
[]
null
5.3
null
null
CVE-2018-11982
In Snapdragon (Mobile, Wear) in version MDM9206, MDM9607, MDM9635M, MDM9640, MDM9645, MDM9655, MSM8909W, MSM8996AU, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 450, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 810, SD 820, SD 835, Snapdragon_High_Med_2016, a double free of ASN1 heap memory used for EUTRA CAP container occurs during UTRAN to LTE Capability inquiry procedure.
[ "cpe:2.3:o:qualcomm:mdm9206_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9206:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9607_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9607:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9635m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9635m:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9640_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9640:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9645_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9645:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9655_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9655:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:msm8909w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:msm8909w:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:msm8996au:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd210_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd210:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd212_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd212:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd205_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd205:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd410_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd410:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd412_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd412:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd425_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd425:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd427_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd427:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd430_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd430:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd435_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd435:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd450_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd450:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd615_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd615:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd616_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd616:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd415_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd415:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd617_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd617:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd625_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd625:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd650_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd650:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd652_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd652:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd810_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd810:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd820_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd820:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd835_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd835:-:*:*:*:*:*:*:*" ]
null
null
8.8
8.3
CVE-2024-43796
express vulnerable to XSS via response.redirect()
Express.js minimalist web framework for node. In express < 4.20.0, passing untrusted user input - even after sanitizing it - to response.redirect() may execute untrusted code. This issue is patched in express 4.20.0.
[ "cpe:2.3:a:openjsf:express:*:*:*:*:*:node.js:*:*", "cpe:2.3:a:openjsf:express:5.0.0:alpha1:*:*:*:node.js:*:*", "cpe:2.3:a:openjsf:express:5.0.0:alpha2:*:*:*:node.js:*:*", "cpe:2.3:a:openjsf:express:5.0.0:alpha3:*:*:*:node.js:*:*", "cpe:2.3:a:openjsf:express:5.0.0:alpha4:*:*:*:node.js:*:*", "cpe:2.3:a:openjsf:express:5.0.0:alpha5:*:*:*:node.js:*:*", "cpe:2.3:a:openjsf:express:5.0.0:alpha6:*:*:*:node.js:*:*", "cpe:2.3:a:openjsf:express:5.0.0:alpha7:*:*:*:node.js:*:*", "cpe:2.3:a:openjsf:express:5.0.0:alpha8:*:*:*:node.js:*:*", "cpe:2.3:a:openjsf:express:5.0.0:beta1:*:*:*:node.js:*:*", "cpe:2.3:a:openjsf:express:5.0.0:beta2:*:*:*:node.js:*:*", "cpe:2.3:a:openjsf:express:5.0.0:beta3:*:*:*:node.js:*:*" ]
null
5
null
null
CVE-2020-20949
Bleichenbacher's attack on PKCS #1 v1.5 padding for RSA in STM32 cryptographic firmware library software expansion for STM32Cube (UM1924). The vulnerability can allow one to use Bleichenbacher's oracle attack to decrypt an encrypted ciphertext by making successive queries to the server using the vulnerable library, resulting in remote information disclosure.
[ "cpe:2.3:a:st:stm32cubef0:-:*:*:*:*:*:*:*", "cpe:2.3:a:st:stm32cubef1:-:*:*:*:*:*:*:*", "cpe:2.3:a:st:stm32cubef2:-:*:*:*:*:*:*:*", "cpe:2.3:a:st:stm32cubef3:-:*:*:*:*:*:*:*", "cpe:2.3:a:st:stm32cubef4:-:*:*:*:*:*:*:*", "cpe:2.3:a:st:stm32cubef7:-:*:*:*:*:*:*:*", "cpe:2.3:a:st:stm32cubeg0:-:*:*:*:*:*:*:*", "cpe:2.3:a:st:stm32cubeg4:-:*:*:*:*:*:*:*", "cpe:2.3:a:st:stm32cubeh7:-:*:*:*:*:*:*:*", "cpe:2.3:a:st:stm32cubeide:-:*:*:*:*:*:*:*", "cpe:2.3:a:st:stm32cubel0:-:*:*:*:*:*:*:*", "cpe:2.3:a:st:stm32cubel1:-:*:*:*:*:*:*:*", "cpe:2.3:a:st:stm32cubel4:-:*:*:*:*:*:*:*", "cpe:2.3:a:st:stm32cubel4\\+:-:*:*:*:*:*:*:*", "cpe:2.3:a:st:stm32cubel5:-:*:*:*:*:*:*:*", "cpe:2.3:a:st:stm32cubemonitor:-:*:*:*:*:*:*:*", "cpe:2.3:a:st:stm32cubemp1:-:*:*:*:*:*:*:*", "cpe:2.3:a:st:stm32cubemx:-:*:*:*:*:*:*:*", "cpe:2.3:a:st:stm32cubeprogrammer:-:*:*:*:*:*:*:*", "cpe:2.3:a:st:stm32cubewb:-:*:*:*:*:*:*:*", "cpe:2.3:a:st:stm32cubewl:-:*:*:*:*:*:*:*", "cpe:2.3:a:ietf:public_key_cryptography_standards_\\#1:1.5:*:*:*:*:*:*:*" ]
null
5.9
null
4.3
CVE-2012-6112
classes/GoogleSpell.php in the PHP Spellchecker (aka Google Spellchecker) addon before 2.0.6.1 for TinyMCE, as used in Moodle 2.1.x before 2.1.10, 2.2.x before 2.2.7, 2.3.x before 2.3.4, and 2.4.x before 2.4.1 and other products, does not properly handle control characters, which allows remote attackers to trigger arbitrary outbound HTTP requests via a crafted string.
[ "cpe:2.3:a:tinymce:spellchecker_php:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:tinymce:spellchecker_php:2.0:a1:*:*:*:*:*:*", "cpe:2.3:a:tinymce:spellchecker_php:2.0:a2:*:*:*:*:*:*", "cpe:2.3:a:tinymce:spellchecker_php:2.0:b1:*:*:*:*:*:*", "cpe:2.3:a:tinymce:spellchecker_php:2.0:b2:*:*:*:*:*:*", "cpe:2.3:a:tinymce:spellchecker_php:2.0:b3:*:*:*:*:*:*", "cpe:2.3:a:tinymce:spellchecker_php:2.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:tinymce:spellchecker_php:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:tinymce:spellchecker_php:2.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:tinymce:spellchecker_php:2.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:tinymce:spellchecker_php:2.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.1.8:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.1.9:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.4.0:*:*:*:*:*:*:*" ]
null
null
null
5
GHSA-5rjr-j9m9-qpm9
A vulnerability, which was classified as critical, was found in SourceCodester Clinics Patient Management System 2.0. Affected is an unknown function of the file /pms/update_user.php?user_id=1. The manipulation of the argument profile_picture with the input <?php phpinfo();?> leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
[]
null
8.8
null
null
GHSA-jv9r-mgx5-pqq6
Baxter ExactaMix EM 2400 Versions 1.10, 1.11 and ExactaMix EM1200 Versions 1.1, 1.2 systems store device data with sensitive information in an unencrypted database. This could allow an attacker with network access to view or modify sensitive data including PHI.
[]
null
null
null
null
GHSA-qq74-54g4-qw47
A Cross-site Scripting (XSS) vulnerability in the J-Web component of Juniper Networks Junos OS allows an unauthenticated attacker to run malicious scripts reflected off of J-Web to the victim's browser in the context of their session within J-Web. This issue affects Juniper Networks Junos OS all versions prior to 19.1R3-S9; 19.2 versions prior to 19.2R3-S6; 19.3 versions prior to 19.3R3-S7; 19.4 versions prior to 19.4R2-S7, 19.4R3-S8; 20.1 versions prior to 20.1R3-S5; 20.2 versions prior to 20.2R3-S5; 20.3 versions prior to 20.3R3-S5; 20.4 versions prior to 20.4R3-S4; 21.1 versions prior to 21.1R3-S4; 21.2 versions prior to 21.2R3-S1; 21.3 versions prior to 21.3R3; 21.4 versions prior to 21.4R2; 22.1 versions prior to 22.1R2.
[]
null
6.1
null
null
GHSA-r5fm-h248-qf2j
The SNMP Trap Agent service in Cisco Unified Communications Manager (CUCM) 4.1 before 4.1(3)SR6, 4.2 before 4.2(3)SR3, 4.3 before 4.3(2), 5.x before 5.1(3), and 6.x before 6.1(1) allows remote attackers to cause a denial of service (core dump and service restart) via a series of malformed UDP packets, as demonstrated by the IP Stack Integrity Checker (ISIC), aka Bug ID CSCsj24113.
[]
null
null
null
null
GHSA-pvqf-f4m8-593f
Stage-2 fault will occur while writing to an ION system allocation which has been assigned to non-HLOS memory which is non-standard in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music in APQ8017, APQ8053, APQ8096AU, MDM9206, MDM9207C, MDM9607, MDM9640, MSM8953, QCN7605, QCS605, SC8180X, SDA845, SDM429, SDM439, SDM450, SDM632, SDX20, SDX24, SDX55, SM8150, SXR1130
[]
null
null
null
null
GHSA-jg3q-ww74-69wg
Snapgear Lite+ firewall 1.5.4 and 1.5.3 allows remote attackers to cause a denial of service (crash) via a large number of connections to (1) the HTTP web management port, or (2) the PPTP port.
[]
null
null
null
null
RHSA-2013:1268
Red Hat Security Advisory: firefox security update
Mozilla: Miscellaneous memory safety hazards (rv:17.0.9) (MFSA 2013-76) Mozilla: Use-after-free in Animation Manager during stylesheet cloning (MFSA 2013-79) Mozilla: Calling scope for new Javascript objects can lead to memory corruption (MFSA 2013-82) Mozilla: Compartment mismatch re-attaching XBL-backed nodes (MFSA 2013-88) Mozilla: Buffer overflow with multi-column, lists, and floats (MFSA 2013-89) Mozilla: Memory corruption involving scrolling (MFSA 2013-90) Mozilla: Memory corruption involving scrolling (MFSA 2013-90) Mozilla: User-defined properties on DOM proxies get the wrong "this" object (MFSA 2013-91)
[ "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
CVE-2024-47176
cups-browsed binds to `INADDR_ANY:631`, trusting any packet from any source
CUPS is a standards-based, open-source printing system, and `cups-browsed` contains network printing functionality including, but not limited to, auto-discovering print services and shared printers. `cups-browsed` binds to `INADDR_ANY:631`, causing it to trust any packet from any source, and can cause the `Get-Printer-Attributes` IPP request to an attacker controlled URL. When combined with other vulnerabilities, such as CVE-2024-47076, CVE-2024-47175, and CVE-2024-47177, an attacker can execute arbitrary commands remotely on the target machine without authentication when a malicious printer is printed to.
[ "cpe:2.3:a:openprinting:cups:*:*:*:*:*:*:*:*" ]
null
5.3
null
null
CVE-2023-28017
HCL Connections is vulnerable to cross-site scripting
HCL Connections is vulnerable to a cross-site scripting attack where an attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user after visiting the vulnerable URL which leads to executing malicious script code. This may let the attacker steal cookie-based authentication credentials and comprise a user's account then launch other attacks.
[ "cpe:2.3:a:hcltech:connections:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:hcltech:connections:6.5:*:*:*:*:*:*:*", "cpe:2.3:a:hcltech:connections:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:hcltech:connections:8.0:*:*:*:*:*:*:*" ]
null
5.4
null
null
GHSA-5359-92wf-c9gq
An issue was discovered on Accellion FTA devices before FTA_9_12_180. Because a regular expression (intended to match local https URLs) lacks an initial ^ character, courier/web/1000@/wmProgressval.html allows SSRF attacks with a file:///etc/passwd#https:// URL pattern.
[]
null
null
10
null
GHSA-m5vr-h7fw-fcf2
cPanel before 80.0.22 allows remote code execution by a demo account because of incorrect URI dispatching (SEC-501).
[]
null
null
null
null
CVE-2023-25222
A heap-based buffer overflow vulnerability exits in GNU LibreDWG v0.12.5 via the bit_read_RC function at bits.c.
[ "cpe:2.3:a:gnu:libredwg:0.12.5:*:*:*:*:*:*:*" ]
null
8.8
null
null
CVE-2020-5775
Server-Side Request Forgery in Canvas LMS 2020-07-29 allows a remote, unauthenticated attacker to cause the Canvas application to perform HTTP GET requests to arbitrary domains.
[ "cpe:2.3:a:instructure:canvas_learning_management_service:2020-07-29:*:*:*:*:*:*:*" ]
null
5.8
null
5
GHSA-gg2f-5qcm-2x9p
A vulnerability classified as critical was found in itsourcecode Loan Management System 1.0. This vulnerability affects unknown code of the file login.php of the component Login Page. The manipulation of the argument username leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-269164.
[]
6.9
7.3
null
null
CVE-2018-15417
Cisco Webex Network Recording Player and Cisco Webex Player Remote Code Execution Vulnerabilities
A vulnerability in the Cisco Webex Network Recording Player for Microsoft Windows and the Cisco Webex Player for Microsoft Windows could allow an attacker to execute arbitrary code on an affected system. The vulnerability exist because the affected software improperly validates Advanced Recording Format (ARF) and Webex Recording Format (WRF) files. An attacker could exploit this vulnerability by sending a user a malicious ARF or WRF file via a link or an email attachment and persuading the user to open the file by using the affected software. A successful exploit could allow the attacker to execute arbitrary code on the affected system.
[ "cpe:2.3:a:cisco:webex_meetings_online:*:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:webex_meetings_server:2.5:maintenance_release2_patch1:*:*:*:*:*:*", "cpe:2.3:a:cisco:webex_meetings_server:2.5:maintenance_release5_patch1:*:*:*:*:*:*", "cpe:2.3:a:cisco:webex_meetings_server:2.5:maintenance_release6_patch2:*:*:*:*:*:*", "cpe:2.3:a:cisco:webex_meetings_server:2.5:maintenance_release6_patch3:*:*:*:*:*:*", "cpe:2.3:a:cisco:webex_meetings_server:2.5:maintenance_release6_patch4:*:*:*:*:*:*", "cpe:2.3:a:cisco:webex_meetings_server:2.5.1.29:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:webex_meetings_server:2.6:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:webex_meetings_server:2.6:maintenance_release1_patch1:*:*:*:*:*:*", "cpe:2.3:a:cisco:webex_meetings_server:2.6:maintenance_release2_patch1:*:*:*:*:*:*", "cpe:2.3:a:cisco:webex_meetings_server:2.6:maintenance_release3_patch1:*:*:*:*:*:*", "cpe:2.3:a:cisco:webex_meetings_server:2.6:maintenance_release3_patch2:*:*:*:*:*:*", "cpe:2.3:a:cisco:webex_meetings_server:2.7:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:webex_meetings_server:2.7:base:*:*:*:*:*:*", "cpe:2.3:a:cisco:webex_meetings_server:2.7:maintenance_release1_patch1:*:*:*:*:*:*", "cpe:2.3:a:cisco:webex_meetings_server:2.7:maintenance_release2_patch1:*:*:*:*:*:*", "cpe:2.3:a:cisco:webex_meetings_server:2.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:webex_meetings_server:2.8:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:webex_meetings_server:2.8:base:*:*:*:*:*:*", "cpe:2.3:a:cisco:webex_business_suite_32:*:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:webex_business_suite_33:*:*:*:*:*:*:*:*" ]
null
null
7.8
9.3
CVE-2007-4656
backup-manager-upload in Backup Manager before 0.6.3 provides the FTP server hostname, username, and password as plaintext command line arguments during FTP uploads, which allows local users to obtain sensitive information by listing the process and its arguments, a different vulnerability than CVE-2007-2766.
[ "cpe:2.3:a:backup_manager:backup_manager:*:*:*:*:*:*:*:*" ]
null
null
null
2.1
RHSA-2023:0630
Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.7.0 security and bug fix updates
nodejs-minimatch: ReDoS via the braceExpand function golang: crypto/tls: session tickets lack random ticket_age_add crewjam/saml: Authentication bypass when processing SAML responses containing multiple Assertion elements luxon: Inefficient regular expression complexity in luxon.js
[ "cpe:/a:redhat:acm:2.7::el8" ]
null
7.5
null
null
GHSA-3f6x-6xxh-4m9v
In Ashlar-Vellum Graphite v13.0.48, the affected application lacks proper validation of user-supplied data when parsing VC6 files. This could lead to an out-of-bounds read. An attacker could leverage this vulnerability to execute arbitrary code in the context of the current process.
[]
null
7.8
null
null
CVE-2018-9040
In Advanced SystemCare Ultimate 11.0.1.58, the driver file (Monitor_win10_x64.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x9c4060c4.
[ "cpe:2.3:a:iobit:advanced_systemcare_ultimate:11.0.1.58:*:*:*:*:*:*:*" ]
null
null
7.8
6.1
GHSA-g559-2fpc-qhgf
wolfSSL wolfMQTT 1.9 has a heap-based buffer overflow in MqttClient_DecodePacket (called from MqttClient_WaitType and MqttClient_Unsubscribe).
[]
null
null
null
null
GHSA-jhcv-c76w-jfvj
The fragment_add_seq_common function in epan/reassemble.c in the ASN.1 BER dissector in Wireshark before r48943 has an incorrect pointer dereference during a comparison, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.
[]
null
null
null
null
CVE-2001-0170
glibc 2.1.9x and earlier does not properly clear the RESOLV_HOST_CONF, HOSTALIASES, or RES_OPTIONS environmental variables when executing setuid/setgid programs, which could allow local users to read arbitrary files.
[ "cpe:2.3:a:immunix:immunix:7.0_beta:*:*:*:*:*:*:*", "cpe:2.3:o:conectiva:linux:4.0:*:*:*:*:*:*:*", "cpe:2.3:o:conectiva:linux:4.0es:*:*:*:*:*:*:*", "cpe:2.3:o:conectiva:linux:4.1:*:*:*:*:*:*:*", "cpe:2.3:o:conectiva:linux:4.2:*:*:*:*:*:*:*", "cpe:2.3:o:conectiva:linux:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:conectiva:linux:5.1:*:*:*:*:*:*:*", "cpe:2.3:o:conectiva:linux:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:conectiva:linux:ecommerce:*:*:*:*:*:*:*", "cpe:2.3:o:conectiva:linux:graficas:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:2.3:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:linux:7.0:*:alpha:*:*:*:*:*", "cpe:2.3:o:redhat:linux:7.0:*:i386:*:*:*:*:*" ]
null
null
null
2.1
GHSA-2895-67p4-w37q
Unspecified vulnerability in Futomi's CGI Cafe KMail CGI 1.0.3 and earlier allows remote attackers to bypass authentication and obtain unauthorized email access via unspecified vectors.
[]
null
null
null
null
GHSA-qm59-f7vh-3m2p
A fully compromised ESXi host can force VMware Tools to fail to authenticate host-to-guest operations, impacting the confidentiality and integrity of the guest virtual machine.
[]
null
3.9
null
null
GHSA-hqq7-j9qc-g7j5
JBossWeb Bayeux has reflected XSS
[]
null
null
null
null
GHSA-f825-f98c-gj3g
automattic/mongoose vulnerable to Prototype pollution via Schema.path
Mongoose is a MongoDB object modeling tool designed to work in an asynchronous environment. Affected versions of this package are vulnerable to Prototype Pollution. The `Schema.path()` function is vulnerable to prototype pollution when setting the schema object. This vulnerability allows modification of the Object prototype and could be manipulated into a Denial of Service (DoS) attack.
[]
null
7
null
null
CVE-2021-43838
Regular Expression Denial of Service (ReDoS) in jsx-slack
jsx-slack is a library for building JSON objects for Slack Block Kit surfaces from JSX. In versions prior to 4.5.1 users are vulnerable to a regular expression denial-of-service (ReDoS) attack. If attacker can put a lot of JSX elements into `<blockquote>` tag, an internal regular expression for escaping characters may consume an excessive amount of computing resources. jsx-slack v4.5.1 has patched to a regex for escaping blockquote characters. Users are advised to upgrade as soon as possible.
[ "cpe:2.3:a:jsx-slack_project:jsx-slack:*:*:*:*:*:node.js:*:*" ]
null
5.3
null
null
CVE-2025-25468
FFmpeg git-master before commit d5873b was discovered to contain a memory leak in the component libavutil/mem.c.
[]
null
6.5
null
null
CVE-2021-2262
Vulnerability in the Oracle Purchasing product of Oracle E-Business Suite (component: Endeca). The supported version that is affected is 12.1.3. Easily exploitable vulnerability allows low privileged attacker with network access via HTTPS to compromise Oracle Purchasing. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Purchasing accessible data as well as unauthorized access to critical data or complete access to all Oracle Purchasing accessible data. CVSS 3.1 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N).
[ "cpe:2.3:a:oracle:purchasing:12.1.3:*:*:*:*:*:*:*" ]
null
8.1
null
null
CVE-2022-3440
Rock Convert < 2.6.0 - Reflected Cross-Site Scripting
The Rock Convert WordPress plugin before 2.11.0 does not sanitise and escape an URL before outputting it back in an attribute when a specific widget is present on a page, leading to a Reflected Cross-Site Scripting
[ "cpe:2.3:a:rockcontent:rock_convert:*:*:*:*:*:wordpress:*:*" ]
null
6.1
null
null
GHSA-2898-phr2-m6mc
An issue was discovered on Securifi Almond, Almond+, and Almond 2015 devices with firmware AL-R096. The device provides a user with the capability of changing the administrative password for the web management interface. It seems that the device does not implement any cross site request forgery protection mechanism which allows an attacker to trick a user who is logged in to the web management interface to change a user's password. Also this is a systemic issue.
[]
null
null
8.8
null
GHSA-28ff-x3xj-mx7q
An information disclosure vulnerability in libstagefright in Mediaserver in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, 6.x before 2016-11-01, and 7.0 before 2016-11-01 could enable a local malicious application to access data outside of its permission levels. This issue is rated as Moderate because it could be used to access sensitive data without permission. Android ID: A-31091777.
[]
null
null
5.5
null
GHSA-h55v-q2qg-8h8m
An unsafe authentication interface was discovered in Smart Battery A4, a multifunctional portable charger, firmware version ?<= r1.7.9 . An attacker can bypass authentication without modifying device file and gain web page management privilege.
[]
null
null
null
null
CVE-2024-36383
An issue was discovered in Logpoint SAML Authentication before 6.0.3. An attacker can place a crafted filename in the state field of a SAML SSO-URL response, and the file corresponding to this filename will ultimately be deleted. This can lead to a SAML Authentication login outage.
[]
null
5.3
null
null
GHSA-f7j8-j35p-xgv9
Unrestricted file upload vulnerability in uploadrequest.asp in Layton HelpBox 3.7.1 allows remote authenticated users to upload and execute arbitrary ASP files, related to not properly checking file extensions.
[]
null
null
null
null
CVE-2020-20663
libiec_iccp_mod v1.5 contains a heap-buffer-overflow in the component mms_client_connection.c.
[ "cpe:2.3:a:libiec_iccp_mod_project:libiec_iccp_mod:1.5:*:*:*:*:*:*:*" ]
null
6.5
null
4.3
CVE-2022-24563
In Genixcms v1.1.11, a stored Cross-Site Scripting (XSS) vulnerability exists in /gxadmin/index.php?page=themes&view=options" via the intro_title and intro_image parameters.
[ "cpe:2.3:a:metalgenix:genixcms:1.1.11:*:*:*:*:*:*:*" ]
null
5.4
null
3.5
RHSA-2023:2029
Red Hat Security Advisory: OpenShift Security Profiles Operator bug fix update
go-getter: go-getter vulnerable to denial of service via malicious compressed archive containerd: Supplementary groups are not set up properly
[ "cpe:/a:redhat:openshift_security_profiles_operator_stable:::el8" ]
null
7.3
null
null
GHSA-cqg6-36p8-qxg8
A Denial Of Service vulnerability exists when Connected User Experiences and Telemetry Service fails to validate certain function values, aka "Connected User Experiences and Telemetry Service Denial of Service Vulnerability." This affects Windows Server 2016, Windows 10, Windows Server 2019, Windows 10 Servers.
[]
null
null
5.5
null
GHSA-xx89-xmcq-2q77
IBM WebSphere Partner Gateway (WPG) 6.1.0 before 6.1.0.1 and 6.1.1 before 6.1.1.1 allows remote authenticated users to obtain sensitive information via vectors related to the "schema DB2 instance id" and the bcgarchive (aka the archiver script).
[]
null
null
null
null