id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
139k
cpes
sequencelengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
GHSA-9f4f-vcpj-64xm
Multiple buffer overflows in BarCodeWiz BarCode before 6.7 ActiveX control (BarcodeWiz.DLL) allow remote attackers to execute arbitrary code via a long argument to the (1) BottomText or (2) TopText property.
[]
null
null
8.8
null
CVE-2016-2460
mediaserver in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-05-01 does not initialize certain data structures, which allows attackers to obtain sensitive information via a crafted application, related to IGraphicBufferConsumer.cpp and IGraphicBufferProducer.cpp, aka internal bug 27555981.
[ "cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.2:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.3:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.3.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.4:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.4.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.4.2:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.4.3:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:5.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*" ]
null
null
5.5
4.3
GHSA-9rg8-mfh8-fg8v
Photoshop Desktop versions 24.7.4, 25.11 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[]
null
7.8
null
null
GHSA-fc33-wf68-wr6h
In modify_for_next_stage of fdt.rs, there is a possible way to render KASLR ineffective due to improperly used crypto. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
[]
null
9.8
null
null
GHSA-5fjm-57qj-h2pj
The DGifDecompressLine function in dgif_lib.c in GIFLIB (possibly version 3.0.x), as later shipped in cgif.c in sam2p 0.49.4, has a heap-based buffer overflow because a certain "Private->RunningCode - 2" array index is not checked. This will lead to a denial of service or possibly unspecified other impact.
[]
null
null
8.8
null
CVE-2019-7742
An issue was discovered in Joomla! before 3.9.3. A combination of specific web server configurations, in connection with specific file types and browser-side MIME-type sniffing, causes an XSS attack vector.
[ "cpe:2.3:a:joomla:joomla\\!:*:*:*:*:*:*:*:*" ]
null
null
6.1
4.3
CVE-2011-4597
The SIP over UDP implementation in Asterisk Open Source 1.4.x before 1.4.43, 1.6.x before 1.6.2.21, and 1.8.x before 1.8.7.2 uses different port numbers for responses to invalid requests depending on whether a SIP username exists, which allows remote attackers to enumerate usernames via a series of requests.
[ "cpe:2.3:a:digium:asterisk:1.8.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.0:beta4:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.0:beta5:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.0:rc4:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.0:rc5:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.1:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.2:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.3:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.3:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.3:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.3:rc3:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.4:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.4:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.4:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.4:rc3:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.5:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.5:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.6.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.6.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.6.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.7.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.7.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.6.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.6.2.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.6.2.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.6.2.0:rc4:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.6.2.0:rc5:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.6.2.0:rc6:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.6.2.0:rc7:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.6.2.0:rc8:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.6.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.6.2.1:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.6.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.6.2.3:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.6.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.6.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.6.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.6.2.6:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.6.2.6:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.6.2.15:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.6.2.16:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.6.2.16:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.6.2.16.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.6.2.16.2:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.6.2.17:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.6.2.17:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.6.2.17:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.6.2.17:rc3:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.6.2.17.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.6.2.17.2:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.6.2.17.3:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.6.2.18:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.6.2.18:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.6.2.19:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.6.2.19:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.6.2.20:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.6.2.21:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.0:beta4:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.5:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.6:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.7:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.8:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.9:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.10:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.10.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.11:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.12:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.12.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.13:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.14:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.15:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.16:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.16.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.16.2:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.17:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.18:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.19:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.19:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.19:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.19:rc3:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.19:rc4:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.19.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.19.2:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.20:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.20:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.20:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.20:rc3:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.20.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.21:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.21:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.21:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.21.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.21.2:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.22:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.22:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.22:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.22:rc3:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.22:rc4:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.22:rc5:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.22.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.22.2:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.23:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.23:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.23:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.23:rc3:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.23:rc4:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.23.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.23.2:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.24:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.24:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.24.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.25:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.25:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.25.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.26:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.26:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.26:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.26:rc3:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.26:rc4:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.26:rc5:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.26:rc6:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.26.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.26.2:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.26.3:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.27:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.27:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.27:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.27:rc3:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.27:rc4:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.27:rc5:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.27.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.28:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.28:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.29:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.29:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.29.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.30:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.30:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.30:rc3:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.31:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.31:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.31:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.32:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.32:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.33:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.33:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.33:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.33.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.34:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.34:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.34:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.35:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.35:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.36:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.36:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.37:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.37:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.38:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.38:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.39:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.39:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.39.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.39.2:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.40:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.40:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.40:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.40:rc3:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.40.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.40.2:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.41:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.41:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.41.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.41.2:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.42:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.42:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.42:rc2:*:*:*:*:*:*" ]
null
null
null
5
CVE-2024-47830
Plane allows server side request forgery via /_next/image endpoint
Plane is an open-source project management tool. Plane uses the ** wildcard support to retrieve the image from any hostname as in /web/next.config.js. This may permit an attacker to induce the server side into performing requests to unintended locations. This vulnerability is fixed in 0.23.0.
[ "cpe:2.3:a:plane:plane:*:*:*:*:*:*:*:*" ]
null
9.3
null
null
GHSA-wq7q-x8vc-j7p4
SQL Injection vulnerability in SEMCMS v.4.8 allows a remote attacker to obtain sensitive information via the ID parameter in the SEMCMS_User.php component.
[]
null
9.8
null
null
GHSA-7w46-7mwp-f24r
Directory traversal vulnerability in archeryscores.php in the Archery Scores (com_archeryscores) component 1.0.6 for Joomla! allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the controller parameter to index.php.
[]
null
null
null
null
CVE-2013-4861
Directory traversal vulnerability in cgi-bin/cmh/get_file.sh in MiCasaVerde VeraLite with firmware 1.5.408 allows remote authenticated users to read arbirary files via a .. (dot dot) in the filename parameter.
[ "cpe:2.3:o:micasaverde:veralite_firmware:1.5.408:*:*:*:*:*:*:*", "cpe:2.3:h:micasaverde:veralite:-:*:*:*:*:*:*:*" ]
null
6.5
null
4
GHSA-g6cp-4pc8-6jfr
Race condition in the kernel in Sun Solaris 8 through 10 allows local users to cause a denial of service (panic) via unspecified vectors related to "the handling of thread contexts."
[]
null
null
null
null
GHSA-8p3v-4rh7-r554
Zoom Call Recording 6.3.1 from ZOOM International is vulnerable to Java Deserialization attacks targeting the inbuilt RMI service. A remote unauthenticated attacker can exploit this vulnerability by sending crafted RMI requests to execute arbitrary code on the target host.
[]
null
null
null
null
GHSA-h976-8v6c-8j56
In the Linux kernel, the following vulnerability has been resolved:net: dsa: bcm_sf2: don't use devres for mdiobusAs explained in commits: 74b6d7d13307 ("net: dsa: realtek: register the MDIO bus under devres") 5135e96a3dd2 ("net: dsa: don't allocate the slave_mii_bus using devres")mdiobus_free() will panic when called from devm_mdiobus_free() <- devres_release_all() <- __device_release_driver(), and that mdiobus was not previously unregistered.The Starfighter 2 is a platform device, so the initial set of constraints that I thought would cause this (I2C or SPI buses which call ->remove on ->shutdown) do not apply. But there is one more which applies here.If the DSA master itself is on a bus that calls ->remove from ->shutdown (like dpaa2-eth, which is on the fsl-mc bus), there is a device link between the switch and the DSA master, and device_links_unbind_consumers() will unbind the bcm_sf2 switch driver on shutdown.So the same treatment must be applied to all DSA switch drivers, which is: either use devres for both the mdiobus allocation and registration, or don't use devres at all.The bcm_sf2 driver has the code structure in place for orderly mdiobus removal, so just replace devm_mdiobus_alloc() with the non-devres variant, and add manual free where necessary, to ensure that we don't let devres free a still-registered bus.
[]
null
null
null
null
CVE-2022-34386
Dell SupportAssist for Home PCs (version 3.11.4 and prior) and SupportAssist for Business PCs (version 3.2.0 and prior) contain cryptographic weakness vulnerability. An authenticated non-admin user could potentially exploit the issue and obtain sensitive information.
[ "cpe:2.3:a:dell:supportassist_for_business_pcs:*:*:*:*:*:*:*:*", "cpe:2.3:a:dell:supportassist_for_home_pcs:*:*:*:*:*:*:*:*" ]
null
5.5
null
null
CVE-2021-24982
Child Theme Generator <= 2.2.7 - Reflected Cross-Site Scripting
The Child Theme Generator WordPress plugin through 2.2.7 does not sanitise escape the parade parameter before outputting it back, leading to a Reflected Cross-Site Scripting in the admin dashboard
[ "cpe:2.3:a:childtheme-generator:child_theme_generator:*:*:*:*:*:wordpress:*:*" ]
null
6.4
null
3.5
CVE-2020-1364
A denial of service vulnerability exists in the way that the WalletService handles files, aka 'Windows WalletService Denial of Service Vulnerability'.
[ "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*" ]
null
7.1
null
3.6
CVE-2023-1528
Use after free in Passwords in Google Chrome prior to 111.0.5563.110 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*" ]
null
8.8
null
null
GHSA-g9g4-w2mf-449q
In the Linux kernel, the following vulnerability has been resolved:wireguard: socket: free skb in send6 when ipv6 is disabledI got a memory leak report:unreferenced object 0xffff8881191fc040 (size 232): comm "kworker/u17:0", pid 23193, jiffies 4295238848 (age 3464.870s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff814c3ef4>] slab_post_alloc_hook+0x84/0x3b0 [<ffffffff814c8977>] kmem_cache_alloc_node+0x167/0x340 [<ffffffff832974fb>] __alloc_skb+0x1db/0x200 [<ffffffff82612b5d>] wg_socket_send_buffer_to_peer+0x3d/0xc0 [<ffffffff8260e94a>] wg_packet_send_handshake_initiation+0xfa/0x110 [<ffffffff8260ec81>] wg_packet_handshake_send_worker+0x21/0x30 [<ffffffff8119c558>] process_one_work+0x2e8/0x770 [<ffffffff8119ca2a>] worker_thread+0x4a/0x4b0 [<ffffffff811a88e0>] kthread+0x120/0x160 [<ffffffff8100242f>] ret_from_fork+0x1f/0x30In function wg_socket_send_buffer_as_reply_to_skb() or wg_socket_send_ buffer_to_peer(), the semantics of send6() is required to free skb. But when CONFIG_IPV6 is disable, kfree_skb() is missing. This patch adds it to fix this bug.
[]
null
5.5
null
null
CVE-2023-25961
WordPress Darcie Theme <= 1.1.5 is vulnerable to Cross Site Scripting (XSS)
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Catch Themes Darcie theme <= 1.1.5 versions.
[ "cpe:2.3:a:catchthemes:darcie:*:*:*:*:*:wordpress:*:*" ]
null
7.1
null
null
GHSA-mmmh-j7wc-66pp
Vulnerability in the Oracle Trade Management product of Oracle E-Business Suite (component: Claim Line LOV). Supported versions that are affected are 12.2.3-12.2.13. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Trade Management. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Trade Management accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
[]
null
7.5
null
null
GHSA-7qgr-qq23-9qqw
HMS v1.0 was discovered to contain a SQL injection vulnerability via the component admin.php.
[]
null
null
null
null
CVE-2017-11125
libxar.so in xar 1.6.1 has a NULL pointer dereference in the xar_get_path function in util.c.
[ "cpe:2.3:a:xar_project:xar:1.6.1:*:*:*:*:*:*:*" ]
null
null
9.8
7.5
GHSA-2w9q-2gq5-vqqj
The RgSecurity form in the HTTP server for the Thomson TCW690 cable modem running firmware 2.1 and software ST42.03.0a does not properly validate the password before performing changes, which allows remote attackers on the LAN to gain access via a direct POST request.
[]
null
null
null
null
GHSA-493f-vcwv-8c8r
In SUPERAntiSpyware Professional Trial 6.0.1254, the driver file (SASKUTIL.SYS) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x9C402080.
[]
null
null
7.8
null
CVE-2010-4379
Heap-based buffer overflow in RealNetworks RealPlayer 11.0 through 11.1, RealPlayer SP 1.0 through 1.1.4, RealPlayer Enterprise 2.1.2, Mac RealPlayer 11.0 through 11.1, Linux RealPlayer 11.0.2.1744, and possibly HelixPlayer 1.0.6 and other versions, allows remote attackers to have an unspecified impact via a crafted SIPR file.
[ "cpe:2.3:a:realnetworks:realplayer:11.0:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer:11.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer:11.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer:11.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer:11.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer:11.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer:11.1:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer_sp:1.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer_sp:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer_sp:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer_sp:1.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer_sp:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer_sp:1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer_sp:1.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer_sp:1.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer_sp:1.1.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer:11.0.2.1744:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer:2.1.2:*:enterprise:*:*:*:*:*" ]
null
null
null
9.3
CVE-2021-21258
XSS injection in ajax/kanban
GLPI is an open-source asset and IT management software package that provides ITIL Service Desk features, licenses tracking and software auditing. In GLPI from version 9.5.0 and before version 9.5.4, there is a cross-site scripting injection vulnerability when using ajax/kanban.php. This is fixed in version 9.5.4.
[ "cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*" ]
null
6.8
null
null
CVE-2025-0786
ESAFENET CDG appDetail.jsp sql injection
A vulnerability was found in ESAFENET CDG V5. It has been classified as critical. Affected is an unknown function of the file /appDetail.jsp. The manipulation of the argument flowId leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
[]
5.3
6.3
6.3
6.5
GHSA-ghc8-5cgm-5rpf
Inventory fails to prohibit standard library access prior to initialization of Rust standard library runtime
Affected versions allow arbitrary caller-provided code to execute before the lifetime of `main`.If the caller-provided code accesses particular pieces of the standard library that require an initialized Rust runtime, such as `std::io` or `std::thread`, these may not behave as documented. Panics are likely; UB is possible.The flaw was corrected by enforcing that only code written within the `inventory` crate, which is guaranteed not to access runtime-dependent parts of the standard library, runs before `main`. Caller-provided code is restricted to running at compile time.
[]
null
null
null
null
GHSA-rq78-g3q7-3xqv
Unspecified vulnerability on the ASUS WL-330gE has unknown impact and remote attack vectors, as demonstrated by a certain module in VulnDisco Pack Professional 8.11. NOTE: as of 20090903, this disclosure has no actionable information. However, because the VulnDisco Pack author is a reliable researcher, the issue is being assigned a CVE identifier for tracking purposes.
[]
null
null
null
null
GHSA-qwp7-fcxc-qfx5
PRTG Network Monitor before 18.3.44.2054 allows a remote authenticated attacker (with read-write privileges) to execute arbitrary code and OS commands with system privileges. When creating an HTTP Advanced Sensor, the user's input in the POST parameter 'proxyport_' is mishandled. The attacker can craft an HTTP request and override the 'writeresult' command-line parameter for HttpAdvancedSensor.exe to store arbitrary data in an arbitrary place on the file system. For example, the attacker can create an executable file in the \Custom Sensors\EXE directory and execute it by creating EXE/Script Sensor.
[]
null
null
8.8
null
CVE-2024-53617
A Cross Site Scripting vulnerability in LibrePhotos before commit 32237 allows attackers to takeover any account via uploading an HTML file on behalf of the admin user using IDOR in file upload.
[]
null
4.8
null
null
CVE-2005-1653
Cross-site scripting (XSS) vulnerability in message.htm for Woppoware PostMaster 4.2.2 (build 3.2.5) allows remote attackers to inject arbitrary web script or HTML via the email parameter.
[ "cpe:2.3:a:woppoware:postmaster:4.2.2_build3.2.5:*:*:*:*:*:*:*" ]
null
null
null
6.8
GHSA-f5x8-55gx-hm4v
Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have a Heap Overflow vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
[]
null
null
9.8
null
RHSA-2023:7024
Red Hat Security Advisory: python3.11 security update
python: tarfile module directory traversal python: file path truncation at \0 characters
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
7.5
null
null
CVE-2020-8797
Juplink RX4-1500 v1.0.3 allows remote attackers to gain root access to the Linux subsystem via an unsanitized exec call (aka Command Line Injection), if the undocumented telnetd service is enabled and the attacker can authenticate as admin from the local network.
[ "cpe:2.3:o:juplink:rx4-1500_firmware:1.0.3:*:*:*:*:*:*:*", "cpe:2.3:h:juplink:rx4-1500:-:*:*:*:*:*:*:*" ]
null
6.7
null
6.9
CVE-2020-25022
An issue was discovered in Noise-Java through 2020-08-27. AESGCMFallbackCipherState.encryptWithAd() allows out-of-bounds access.
[ "cpe:2.3:a:noise-java_project:noise-java:*:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
CVE-2008-4020
Cross-site scripting (XSS) vulnerability in Microsoft Office XP SP3 allows remote attackers to inject arbitrary web script or HTML via a document that contains a "Content-Disposition: attachment" header and is accessed through a cdo: URL, which renders the content instead of raising a File Download dialog box, aka "Vulnerability in Content-Disposition Header Vulnerability."
[ "cpe:2.3:a:microsoft:office:xp:sp3:*:*:*:*:*:*" ]
null
null
null
4.3
GHSA-7j6w-p859-464f
Froxlor allows Multiple Accounts to Share the Same Email Address Leading to Potential Privilege Escalation or Account Takeover
Summarythe vulnerability is that users (such as resellers or customers) are able to create accounts with the same email address as an existing account (e.g., if the admin has [[email protected]](mailto:[email protected]), others can also create an account using the same email). This creates potential issues with account identification and security.ImpactLocal/Authenticated: This vulnerability can be exploited by authenticated users (e.g., reseller, customer) who can create accounts with the same email address that has already been used by another account, such as the admin. Email-based: The attack vector is email-based, as the system does not prevent multiple accounts from registering the same email address, leading to possible conflicts and security issues.
[]
null
5.8
null
null
CVE-2013-1167
Cisco IOS XE 3.2 through 3.4 before 3.4.2S, and 3.5, on 1000 series Aggregation Services Routers (ASR), when bridge domain interface (BDI) is enabled, allows remote attackers to cause a denial of service (card reload) via packets that are not properly handled during the processing of encapsulation, aka Bug ID CSCtt11558.
[ "cpe:2.3:o:cisco:ios_xe:3.2.00.xo.15.0\\(2\\)xo:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.2.0s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.2.0sg:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.2.0xo:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.2.1s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.2.1sg:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.2.2s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.2.2sg:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.2.3sg:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.2.4sg:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.3.0s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.3.0sg:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.3.1s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.3.1sg:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.3.2s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.3.3s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.4.0as:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.4.0s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.4.1s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.5.0s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.5.1s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.5.2s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.5.xs:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_1001:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_1002:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_1002-x:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_1002_fixed_router:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_1004:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_1006:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_1013:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_1023_router:-:*:*:*:*:*:*:*" ]
null
null
null
7.1
CVE-2016-2067
drivers/gpu/msm/kgsl.c in the MSM graphics driver (aka GPU driver) for the Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, mishandles the KGSL_MEMFLAGS_GPUREADONLY flag, which allows attackers to gain privileges by leveraging accidental read-write mappings, aka Qualcomm internal bug CR988993.
[ "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
null
7.8
null
9.3
CVE-2003-0373
Multiple buffer overflows in libnasl in Nessus before 2.0.6 allow local users with plugin upload privileges to cause a denial of service (core dump) and possibly execute arbitrary code via (1) a long proto argument to the scanner_add_port function, (2) a long user argument to the ftp_log_in function, (3) a long pass argument to the ftp_log_in function.
[ "cpe:2.3:a:nessus:nessus:*:*:*:*:*:*:*:*" ]
null
null
null
4.4
GHSA-mpw4-6r28-83wc
epan/dissectors/packet-wsp.c in the WSP dissector in Wireshark 1.12.x before 1.12.13 and 2.x before 2.0.5 allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
[]
null
null
5.9
null
CVE-2022-37966
Windows Kerberos RC4-HMAC Elevation of Privilege Vulnerability
Windows Kerberos RC4-HMAC Elevation of Privilege Vulnerability
[ "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:management_services_for_element_software:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:management_services_for_netapp_hci:-:*:*:*:*:*:*:*", "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*" ]
null
8.1
null
null
GHSA-p8c8-w89w-gvv5
IBM Spectrum Virtualize 8.2, 8.3, and 8.4 could allow an attacker to allow unauthorized access due to the reuse of support generated credentials. IBM X-Force ID: 212609.
[]
null
9.8
null
null
GHSA-68r5-44xv-q47r
Multiple cross-site scripting (XSS) vulnerabilities in e-Courier CMS allow remote attackers to inject arbitrary web script or HTML via the UserGUID parameter to home/index.asp and other unspecified vectors.
[]
null
null
null
null
GHSA-87jj-5mq8-98pw
Certain NETGEAR devices are affected by disclosure of sensitive information. This affects D1500 before 1.0.0.27, D500 before 1.0.0.27, D6100 before 1.0.0.58, D6200 before 1.1.00.30, D6220 before 1.0.0.46, D6400 before 1.0.0.82, D7000 before 1.0.1.68, D7000v2 before 1.0.0.51, D7800 before 1.0.1.42, D8500 before 1.0.3.42, DC112A before 1.0.0.40, DGN2200Bv4 before 1.0.0.102, DGN2200v4 before 1.0.0.102, JNR1010v2 before 1.1.0.54, JR6150 before 1.0.1.18, JWNR2010v5 before 1.1.0.54, PR2000 before 1.0.0.24, R6020 before 1.0.0.34, R6050 before 1.0.1.18, R6080 before 1.0.0.34, R6100 before 1.0.1.22, R6120 before 1.0.0.42, R6220 before 1.1.0.68, R6250 before 1.0.4.30, R6300v2 before 1.0.4.32, R6400 before 1.0.1.44, R6400v2 before 1.0.2.60, R6700 before 1.0.1.48, R6700v2 before 1.2.0.24, R6800 before 1.2.0.24, R6900 before 1.0.1.48, R6900P before 1.3.1.44, R6900v2 before 1.2.0.24, R7000 before 1.0.9.34, R7000P before 1.3.1.44, R7100LG before 1.0.0.48, R7300 before 1.0.0.68, R7500 before 1.0.0.124, R7500v2 before 1.0.3.38, R7900 before 1.0.2.16, R7900P before 1.4.1.24, R8000 before 1.0.4.18, R8000P before 1.4.1.24, R8300 before 1.0.2.122, R8500 before 1.0.2.122, WN3000RP before 1.0.0.68, WN3000RPv2 before 1.0.0.68, WNDR3400v3 before 1.0.1.18, WNDR3700v4 before 1.0.2.102, WNDR3700v5 before 1.1.0.54, WNDR4300v1 before 1.0.2.104, WNDR4300v2 before 1.0.0.56, WNDR4500v3 before 1.0.0.56, WNR1000v4 before 1.1.0.54, WNR2020 before 1.1.0.54, WNR2050 before 1.1.0.54, and WNR3500Lv2 before 1.2.0.54.
[]
null
null
null
null
CVE-2003-1355
Buffer overflow in the remote console (rcon) in Battlefield 1942 1.2 and 1.3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long user name and password.
[ "cpe:2.3:a:electronic_arts:battlefield_1942:1.2:*:*:*:*:*:*:*", "cpe:2.3:a:electronic_arts:battlefield_1942:1.3:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2009-10004
Turante Sandbox Theme functions.php sandbox_body_class cross site scripting
A vulnerability was found in Turante Sandbox Theme up to 1.5.2. It has been classified as problematic. This affects the function sandbox_body_class of the file functions.php. The manipulation of the argument page leads to cross site scripting. It is possible to initiate the attack remotely. Upgrading to version 1.6.1 is able to address this issue. The identifier of the patch is 8045b1e10970342f558b2c5f360e0bd135af2b10. It is recommended to upgrade the affected component. The identifier VDB-225357 was assigned to this vulnerability.
[ "cpe:2.3:a:sandbox_theme_project:sandbox_theme:*:*:*:*:*:*:*:*" ]
null
3.5
3.5
4
GHSA-c45x-r3w2-p779
Vulnerability in the Oracle E-Business Suite Secure Enterprise Search product of Oracle E-Business Suite (component: Search Integration Engine). Supported versions that are affected are 12.1.3 and 12.2.3 - 12.2.10. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle E-Business Suite Secure Enterprise Search. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle E-Business Suite Secure Enterprise Search accessible data as well as unauthorized access to critical data or complete access to all Oracle E-Business Suite Secure Enterprise Search accessible data. CVSS 3.1 Base Score 9.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N).
[]
null
null
null
null
GHSA-7cr9-4h7r-hh9g
The default configuration of consolehelper in system-config-network before 1.5.10-1 on Fedora 8 lacks the USER=root directive, which allows local users of the workstation console to gain privileges and change the network configuration.
[]
null
null
null
null
CVE-2022-32593
In vowe, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07138493; Issue ID: ALPS07138493.
[ "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*" ]
null
6.7
null
null
GHSA-p4q7-3j6p-6gv6
On-Premises Data Gateway Information Disclosure Vulnerability
[]
null
6.4
null
null
CVE-2018-1723
IBM Spectrum Scale 4.1.1.0, 4.1.1.20, 4.2.0.0, 4.2.3.10, 5.0.0 and 5.0.1.2 could allow an unprivileged, authenticated user with access to a GPFS node to read arbitrary files available on this node. IBM X-Force ID: 147373.
[ "cpe:2.3:a:ibm:spectrum_scale:*:*:*:*:*:*:*:*" ]
null
null
6.2
null
PYSEC-2017-60
null
Multiple open redirect vulnerabilities in Plone CMS 5.x through 5.0.6, 4.x through 4.3.11, and 3.3.x through 3.3.6 allow remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the referer parameter to (1) %2b%2bgroupdashboard%2b%2bplone.dashboard1%2bgroup/%2b/portlets.Actions or (2) folder/%2b%2bcontextportlets%2b%2bplone.footerportlets/%2b /portlets.Actions or the (3) came_from parameter to /login_form.
[]
null
null
null
null
GHSA-7722-mg32-4c33
The graphite2::TtfUtil::CmapSubtable12Lookup function in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted Graphite smart font, a different vulnerability than CVE-2016-2801.
[]
null
null
8.8
null
GHSA-m42f-g5c9-vqgx
Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an attacker to do any of the following: Execute arbitrary code Elevate privileges Execute arbitrary commands Bypass authentication and authorization protections Fetch and run unsigned software Cause denial of service (DoS) For more information about these vulnerabilities, see the Details section of this advisory.
[]
null
null
null
null
CVE-2022-30062
ftcms <=2.1 was discovered to be vulnerable to Arbitrary File Read via tp.php
[ "cpe:2.3:a:ftcms:ftcms:*:*:*:*:*:*:*:*" ]
null
6.5
null
4
CVE-2022-27946
NETGEAR R8500 1.0.2.158 devices allow remote authenticated users to execute arbitrary commands (such as telnetd) via shell metacharacters in the sysNewPasswd and sysConfirmPasswd parameters to admin_account.cgi.
[ "cpe:2.3:o:netgear:r8500_firmware:1.0.2.158:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r8500:-:*:*:*:*:*:*:*" ]
null
8.8
null
9
CVE-2019-6114
An issue was discovered in Corel PaintShop Pro 2019 21.0.0.119. An integer overflow in the jp2 parsing library allows an attacker to overwrite memory and to execute arbitrary code.
[ "cpe:2.3:a:corel:paintshop_pro_2019:21.0.0.119:*:*:*:*:*:*:*" ]
null
null
8.8
6.8
CVE-2023-40328
WordPress Carrot Plugin <= 1.1.0 is vulnerable to Cross Site Scripting (XSS)
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Carrrot plugin <= 1.1.0 versions.
[ "cpe:2.3:a:carrrot:carrrot:*:*:*:*:*:wordpress:*:*" ]
null
5.9
null
null
CVE-2021-47380
HID: amd_sfh: Fix potential NULL pointer dereference
In the Linux kernel, the following vulnerability has been resolved: HID: amd_sfh: Fix potential NULL pointer dereference devm_add_action_or_reset() can suddenly invoke amd_mp2_pci_remove() at registration that will cause NULL pointer dereference since corresponding data is not initialized yet. The patch moves initialization of data before devm_add_action_or_reset(). Found by Linux Driver Verification project (linuxtesting.org). [[email protected]: rebase]
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:5.15:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:5.15:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:5.15:rc3:*:*:*:*:*:*" ]
null
5.5
null
null
CVE-2003-0653
The OSI networking kernel (sys/netiso) in NetBSD 1.6.1 and earlier does not use a BSD-required "PKTHDR" mbuf when sending certain error responses to the sender of an OSI packet, which allows remote attackers to cause a denial of service (kernel panic or crash) via certain OSI packets.
[ "cpe:2.3:o:netbsd:netbsd:1.5:*:*:*:*:*:*:*", "cpe:2.3:o:netbsd:netbsd:1.5.1:*:*:*:*:*:*:*", "cpe:2.3:o:netbsd:netbsd:1.5.2:*:*:*:*:*:*:*", "cpe:2.3:o:netbsd:netbsd:1.5.3:*:*:*:*:*:*:*", "cpe:2.3:o:netbsd:netbsd:1.6:*:*:*:*:*:*:*", "cpe:2.3:o:netbsd:netbsd:1.6.1:*:*:*:*:*:*:*" ]
null
null
null
5
GHSA-r7cw-73w2-3p23
A remote denial of service vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.
[]
null
null
7.5
null
GHSA-5883-cq6h-c598
Type confusion in V8 in Google Chrome prior to 85.0.4183.121 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page.
[]
null
null
null
null
GHSA-jrxv-q9r4-5w75
Cross-site request forgery (CSRF) vulnerability in the Dropdown Menu Widget plugin 1.9.1 for WordPress allows remote attackers to hijack the authentication of arbitrary users for requests that insert cross-site scripting (XSS) sequences.
[]
null
null
null
null
GHSA-hprp-8mpx-26q9
NetMotion Mobility before 11.73 and 12.x before 12.02 allows unauthenticated remote attackers to execute arbitrary code as SYSTEM because of Java deserialization in webrepdb StatusServlet.
[]
null
null
null
null
CVE-2019-18340
A vulnerability has been identified in Control Center Server (CCS) (All versions < V1.5.0), Control Center Server (CCS) (All versions >= V1.5.0), SiNVR/SiVMS Video Server (All versions < V5.0.0), SiNVR/SiVMS Video Server (All versions >= V5.0.0). Both the SiVMS/SiNVR Video Server and the Control Center Server (CCS) store user and device passwords by applying weak cryptography. A local attacker could exploit this vulnerability to extract the passwords from the user database and/or the device configuration files to conduct further attacks.
[ "cpe:2.3:a:siemens:sinvr_3_central_control_server:*:*:*:*:*:*:*:*", "cpe:2.3:a:siemens:sinvr_3_video_server:*:*:*:*:*:*:*:*" ]
null
5.5
null
null
GHSA-2454-7cjj-wj2v
Cross-site request forgery in Icegram Email Subscribers & Newsletters Plugin for WordPress v4.4.8 allows a remote attacker to send forged emails by tricking legitimate users into clicking a crafted link.
[]
null
null
null
null
GHSA-hw33-x8j9-76jp
\upload\plugins\sys\admin\Setting.php in CScms 4.1 allows CSRF via admin.php/setting/ftp_save.
[]
null
null
8.8
null
GHSA-v5qv-jjr8-5wpj
Libsixel prior to v1.8.3 contains a stack buffer overflow in the function gif_process_raster at fromgif.c.
[]
null
6.5
null
null
CVE-2022-25598
Apache DolphinScheduler user registration is vulnerable to ReDoS attacks
Apache DolphinScheduler user registration is vulnerable to Regular express Denial of Service (ReDoS) attacks, Apache DolphinScheduler users should upgrade to version 2.0.5 or higher.
[ "cpe:2.3:a:apache:dolphinscheduler:*:*:*:*:*:*:*:*" ]
null
7.5
null
5
GHSA-fwg4-q55q-w62p
Book Stack version 23.10.2 allows filtering local files on the server. This is possible because the application is vulnerable to SSRF.
[]
null
7.1
null
null
CVE-2025-22531
WordPress Urdu Formatter – Shamil plugin <= 0.1 - Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in M Bilal M Urdu Formatter – Shamil allows Stored XSS.This issue affects Urdu Formatter – Shamil: from n/a through 0.1.
[]
null
6.5
null
null
CVE-2023-47415
Cypress Solutions CTM-200 v2.7.1.5600 and below was discovered to contain an OS command injection vulnerability via the cli_text parameter.
[ "cpe:2.3:o:cypress:ctm-200_firmware:*:*:*:*:*:*:*:*" ]
null
7.5
null
null
CVE-2023-46978
TOTOLINK X6000R V9.4.0cu.852_B20230719 is vulnerable to Incorrect Access Control.Attackers can reset login password & WIFI passwords without authentication.
[ "cpe:2.3:o:totolink:x6000r_firmware:9.4.0cu.852_b20230719:*:*:*:*:*:*:*", "cpe:2.3:h:totolink:x6000r:-:*:*:*:*:*:*:*" ]
null
7.5
null
null
GHSA-5qf5-xcc6-qrmw
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Adam DeHaven Perfect Pullquotes allows Stored XSS.This issue affects Perfect Pullquotes: from n/a through 1.7.5.
[]
null
6.5
null
null
CVE-2022-43034
An issue was discovered in Bento4 v1.6.0-639. There is a heap buffer overflow vulnerability in the AP4_BitReader::SkipBits(unsigned int) function in mp42ts.
[ "cpe:2.3:a:axiosys:bento4:1.6.0-639:*:*:*:*:*:*:*" ]
null
6.5
null
null
CVE-2021-43809
Local Code Execution through Argument Injection via dash leading git url parameter in Gemfile
`Bundler` is a package for managing application dependencies in Ruby. In `bundler` versions before 2.2.33, when working with untrusted and apparently harmless `Gemfile`'s, it is not expected that they lead to execution of external code, unless that's explicit in the ruby code inside the `Gemfile` itself. However, if the `Gemfile` includes `gem` entries that use the `git` option with invalid, but seemingly harmless, values with a leading dash, this can be false. To handle dependencies that come from a Git repository instead of a registry, Bundler uses various commands, such as `git clone`. These commands are being constructed using user input (e.g. the repository URL). When building the commands, Bundler versions before 2.2.33 correctly avoid Command Injection vulnerabilities by passing an array of arguments instead of a command string. However, there is the possibility that a user input starts with a dash (`-`) and is therefore treated as an optional argument instead of a positional one. This can lead to Code Execution because some of the commands have options that can be leveraged to run arbitrary executables. Since this value comes from the `Gemfile` file, it can contain any character, including a leading dash. To exploit this vulnerability, an attacker has to craft a directory containing a `Gemfile` file that declares a dependency that is located in a Git repository. This dependency has to have a Git URL in the form of `-u./payload`. This URL will be used to construct a Git clone command but will be interpreted as the upload-pack argument. Then this directory needs to be shared with the victim, who then needs to run a command that evaluates the Gemfile, such as `bundle lock`, inside. This vulnerability can lead to Arbitrary Code Execution, which could potentially lead to the takeover of the system. However, the exploitability is very low, because it requires a lot of user interaction. Bundler 2.2.33 has patched this problem by inserting `--` as an argument before any positional arguments to those Git commands that were affected by this issue. Regardless of whether users can upgrade or not, they should review any untrustred `Gemfile`'s before running any `bundler` commands that may read them, since they can contain arbitrary ruby code.
[ "cpe:2.3:a:bundler:bundler:*:*:*:*:*:ruby:*:*" ]
null
6.7
null
null
CVE-2023-31857
Sourcecodester Online Computer and Laptop Store 1.0 allows unrestricted file upload and can lead to remote code execution. The vulnerability path is /classes/Users.php?f=save.
[ "cpe:2.3:a:oretnom23:online_computer_and_laptop_store:1.0:*:*:*:*:*:*:*" ]
null
9.8
null
null
GHSA-3cwv-x695-72xm
A vulnerability, which was classified as critical, was found in Campcodes Complete Web-Based School Management System 1.0. Affected is an unknown function of the file /view/student_payment_details4.php. The manipulation of the argument index leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-265098 is the identifier assigned to this vulnerability.
[]
5.3
6.3
null
null
GHSA-8899-pjpj-8p5v
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV160, RV160W, RV260, RV260P, and RV260W VPN Routers could allow an unauthenticated, remote attacker to execute arbitrary code as the root user on an affected device. These vulnerabilities exist because HTTP requests are not properly validated. An attacker could exploit these vulnerabilities by sending a crafted HTTP request to the web-based management interface of an affected device. A successful exploit could allow the attacker to remotely execute arbitrary code on the device.
[]
null
null
null
null
GHSA-cv2h-wxc2-2v4j
It was possible for double OGNL evaluation in certain redirect action and in WebWork URL and Anchor tags in JSP files to occur. An attacker who can access the web interface of Fisheye or Crucible or who hosts a website that a user who can access the web interface of Fisheye or Crucible visits, is able to exploit this vulnerability to execute Java code of their choice on systems that run a vulnerable version of Fisheye or Crucible. All versions of Fisheye and Crucible before 4.4.5 (the fixed version for 4.4.x) and from 4.5.0 before 4.5.2 (the fixed version for 4.5.x) are affected by this vulnerability.
[]
null
null
9.8
null
RHSA-2020:1445
Red Hat Security Advisory: Red Hat AMQ Broker 7.4.3 release and security update
activemq: Corrupt MQTT frame can cause broker shutdown HTTP/2: large amount of data requests leads to denial of service HTTP/2: flood using PING frames results in unbounded memory growth HTTP/2: flood using HEADERS frames results in unbounded memory growth HTTP/2: flood using SETTINGS frames results in unbounded memory growth HTTP/2: 0-length headers lead to denial of service HTTP/2: request for large response leads to denial of service HTTP/2: flood using empty frames results in excessive resource consumption jetty: using specially formatted URL against DefaultServlet or ResourceHandler leads to XSS conditions jetty: error path information disclosure netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers netty: HTTP request smuggling netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling
[ "cpe:/a:redhat:amq_broker:7" ]
null
7.5
7.5
null
GHSA-8cpv-pp42-ppmr
An issue was discovered on Innovaphone PBX before 14r1 devices. It provides different responses to incoming requests in a way that reveals information to an attacker.
[]
null
5.3
null
null
CVE-2020-13793
Unsafe storage of AD credentials in Ivanti DSM netinst 5.1 due to a static, hard-coded encryption key.
[ "cpe:2.3:a:ivanti:dsm_netinst:5.1:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
GHSA-rv49-vc49-4rpp
nopCommerce 4.50.1 is vulnerable to Cross Site Scripting (XSS). At Apply for vendor account feature, an attacker can upload an arbitrary file to the system.
[]
null
6.1
null
null
GHSA-qw5m-vmp3-f553
Magento Open Source allows Incorrect Authorization
Adobe Commerce versions 2.4.6 (and earlier), 2.4.5-p2 (and earlier) and 2.4.4-p3 (and earlier) are affected by an Incorrect Authorization vulnerability that could result in a security feature bypass. An attacker could leverage this vulnerability to bypass a minor functionality. Exploitation of this issue does not require user interaction.
[]
6.9
5.3
null
null
GHSA-9qhr-489p-hcrq
A SQL injection vulnerability in /view/emarks_range_grade_update_form.php in Campcodes Complete Web-Based School Management System 1.0 allows an attacker to execute arbitrary SQL commands via the conversation_id parameter.
[]
null
9.8
null
null
GHSA-w62m-q72r-mx47
In Argent RecoveryManager before 0xdc350d09f71c48c5D22fBE2741e4d6A03970E192, the executeRecovery function does not require any signatures in the zero-guardian case, which allows attackers to cause a denial of service (locking) or a takeover.
[]
null
null
null
null
CVE-2019-10112
An issue was discovered in GitLab Community and Enterprise Edition before 11.7.8, 11.8.x before 11.8.4, and 11.9.x before 11.9.2. The construction of the HMAC key was insecurely derived.
[ "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*" ]
null
null
7.5
5
RHSA-2018:1877
Red Hat Security Advisory: sssd and ding-libs security and bug fix update
sssd: unsanitized input when searching in local cache database
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
4.3
null
GHSA-m8rx-f843-vqgg
The Advanced Google reCAPTCHA plugin for WordPress is vulnerable to generic SQL Injection via the ‘sSearch’ parameter in all versions up to, and including, 1.29 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries, particularly when the plugin’s settings page hasn’t been visited and its welcome message has not been dismissed. This issue can be used to extract sensitive information from the database.
[]
null
5.3
null
null
GHSA-5qfh-qxwg-gpxg
Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vulnerability in UBIT Information Technologies Student Information Management System.This issue affects Student Information Management System: before 20211126.
[]
null
6.1
null
null
RHSA-2019:2033
Red Hat Security Advisory: patch security and bug fix update
patch: Out-of-bounds access in pch_write_line function in pch.c patch: Double free of memory in pch.c:another_hunk() causes a crash
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
3.3
null
GHSA-pfc3-fmmp-mxgw
OpenEXR 2.3.0 has a memory leak in ThreadPool in IlmBase/IlmThread/IlmThreadPool.cpp, as demonstrated by exrmultiview.
[]
null
null
4.3
null
GHSA-8hhw-p6vr-v3wv
A use after free issue was addressed with improved memory management. This issue is fixed in macOS Ventura 13, iOS 16.1 and iPadOS 16, Safari 16.1. Processing maliciously crafted web content may lead to arbitrary code execution.
[]
null
8.8
null
null
GHSA-jqxq-7f92-m7ww
Crypt::Random Perl package 1.05 through 1.55 may use rand() function, which is not cryptographically strong, for cryptographic functions.Crypt::Random::rand 1.05 through 1.55 uses the rand() function. If the Provider is not specified and /dev/urandom or an Entropy Gathering Daemon (egd) service is not available Crypt::Random will default to use the insecure Crypt::Random::rand provider.In particular, Windows versions of perl will encounter this issue by default.
[]
null
8.8
null
null
GHSA-4c38-cvx5-fh22
In Android before security patch level 2018-04-05 on Qualcomm Snapdragon Mobile and Snapdragon Wear MDM9206, MDM9607, MSM8909W, SD 210/SD 212/SD 205, SD 425, SD 430, SD 450, SD 625, SD 650/52, debug policy can potentially be bypassed.
[]
null
null
9.8
null
GHSA-rrqf-vmwv-g72p
A vulnerability was found in knightliao Disconf 2.6.36. It has been classified as critical. This affects an unknown part of the file /api/config/list of the component Configuration Center. The manipulation leads to improper authentication. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
[]
6.9
5.3
null
null