id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
139k
cpes
sequencelengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
CVE-2013-2558
Unspecified vulnerability in Microsoft Windows 8 allows remote attackers to cause a denial of service (reboot) or possibly have unknown other impact via a crafted TrueType Font (TTF) file, as demonstrated by the 120612-69701-01.dmp error report.
[ "cpe:2.3:o:microsoft:windows_8:-:-:x64:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8:-:-:x86:*:*:*:*:*" ]
null
null
null
10
RHSA-2023:4022
Red Hat Security Advisory: kernel security and bug fix update
kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation
[ "cpe:/o:redhat:rhel_aus:7.7::server", "cpe:/o:redhat:rhel_e4s:7.7::server", "cpe:/o:redhat:rhel_tus:7.7::server" ]
null
7.8
null
null
GHSA-fj5m-5qc8-rw48
IBM Lotus Notes Traveler before 8.5.1.2 does not reject an attachment download request for an e-mail message with a Prevent Copy attribute, which allows remote authenticated users to bypass intended access restrictions via this request.
[]
null
null
null
null
GHSA-wqmf-63gp-6rjg
The Relish (Verve Connect) VH510 device with firmware before 1.0.1.6L0516 contains undocumented default admin credentials for the web management interface. A remote attacker could exploit this vulnerability to login and execute commands on the device, as well as upgrade the firmware image to a malicious version.
[]
null
null
null
null
GHSA-x7rm-228h-8xh9
A flaw was found in the containerized-data-importer in virt-cdi-cloner, version 1.4, where the host-assisted cloning feature does not determine whether the requesting user has permission to access the Persistent Volume Claim (PVC) in the source namespace. This could allow users to clone any PVC in the cluster into their own namespace, effectively allowing access to other user's data.
[]
null
6.5
null
null
CVE-2017-1715
IBM Rational Quality Manager and IBM Rational Collaborative Lifecycle Management 5.0 through 5.0.2 and 6.0 through 6.0.5 are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 134637.
[ "cpe:2.3:a:ibm:rational_quality_manager:5.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_quality_manager:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_quality_manager:5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_quality_manager:6.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_quality_manager:6.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_quality_manager:6.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_quality_manager:6.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_quality_manager:6.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_quality_manager:6.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:5.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:6.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:6.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:6.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:6.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:6.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:6.0.5:*:*:*:*:*:*:*" ]
null
null
5.4
null
CVE-2020-10413
The way URIs are handled in admin/header.php in Chadha PHPKB Standard Multi-Language 9 allows Reflected XSS (injecting arbitrary web script or HTML) in admin/import-html.php by adding a question mark (?) followed by the payload.
[ "cpe:2.3:a:chadhaajay:phpkb:9.0:*:*:*:*:*:*:*" ]
null
4.8
null
3.5
GHSA-24x4-44mg-fffp
Unrestricted file upload vulnerability in "Add Pen/Author Name" feature in addpen.php in AvailScript Article Script allows remote authenticated users to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in photos/.
[]
null
null
null
null
CVE-2023-48508
Adobe Experience Manager | Cross-site Scripting (Stored XSS) (CWE-79)
Adobe Experience Manager versions 6.5.18 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
[ "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:experience_manager_cloud_service:*:*:*:*:*:*:*:*" ]
null
5.4
null
null
GHSA-48g2-452q-4xqc
Windows Hyper-V Remote Code Execution Vulnerability
[]
null
8.8
null
null
CVE-2015-0607
The Authentication Proxy feature in Cisco IOS does not properly handle invalid AAA return codes from RADIUS and TACACS+ servers, which allows remote attackers to bypass authentication in opportunistic circumstances via a connection attempt that triggers an invalid code, as demonstrated by a connection attempt with a blank password, aka Bug IDs CSCuo09400 and CSCun16016.
[ "cpe:2.3:o:cisco:ios:15.4\\(1\\)t:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.4\\(1\\)t1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.4\\(1\\)t2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.4\\(1\\)t3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.4\\(1\\)t4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.4\\(2\\)t:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.4\\(2\\)t1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.4\\(2\\)t2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.4\\(2\\)t3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.4\\(100\\)t:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.4t:*:*:*:*:*:*:*" ]
null
null
null
4.3
RHSA-2022:6314
Red Hat Security Advisory: pcs security update
pcs: obtaining an authentication token for hacluster user could lead to privilege escalation
[ "cpe:/a:redhat:enterprise_linux:8::highavailability", "cpe:/a:redhat:enterprise_linux:8::resilientstorage" ]
null
8.4
null
null
GHSA-9q3q-62hm-f2qh
The Saan World Clock WordPress plugin through 1.8 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
[]
null
5.4
null
null
CVE-2021-42748
In Beaver Builder through 2.5.0.3, attackers can bypass the visibility controls protection mechanism via the REST API.
[ "cpe:2.3:a:fastlinemedia:beaver_builder:*:*:*:*:lite:wordpress:*:*", "cpe:2.3:a:fastlinemedia:beaver_builder:*:*:*:*:professional:wordpress:*:*" ]
null
5.3
null
5
GHSA-cg87-2898-49f2
An issue was discovered in Mattermost Desktop App before 3.4.0. Strings could be executed as code via injection.
[]
null
null
null
null
CVE-2022-49006
tracing: Free buffers when a used dynamic event is removed
In the Linux kernel, the following vulnerability has been resolved: tracing: Free buffers when a used dynamic event is removed After 65536 dynamic events have been added and removed, the "type" field of the event then uses the first type number that is available (not currently used by other events). A type number is the identifier of the binary blobs in the tracing ring buffer (known as events) to map them to logic that can parse the binary blob. The issue is that if a dynamic event (like a kprobe event) is traced and is in the ring buffer, and then that event is removed (because it is dynamic, which means it can be created and destroyed), if another dynamic event is created that has the same number that new event's logic on parsing the binary blob will be used. To show how this can be an issue, the following can crash the kernel: # cd /sys/kernel/tracing # for i in `seq 65536`; do echo 'p:kprobes/foo do_sys_openat2 $arg1:u32' > kprobe_events # done For every iteration of the above, the writing to the kprobe_events will remove the old event and create a new one (with the same format) and increase the type number to the next available on until the type number reaches over 65535 which is the max number for the 16 bit type. After it reaches that number, the logic to allocate a new number simply looks for the next available number. When an dynamic event is removed, that number is then available to be reused by the next dynamic event created. That is, once the above reaches the max number, the number assigned to the event in that loop will remain the same. Now that means deleting one dynamic event and created another will reuse the previous events type number. This is where bad things can happen. After the above loop finishes, the kprobes/foo event which reads the do_sys_openat2 function call's first parameter as an integer. # echo 1 > kprobes/foo/enable # cat /etc/passwd > /dev/null # cat trace cat-2211 [005] .... 2007.849603: foo: (do_sys_openat2+0x0/0x130) arg1=4294967196 cat-2211 [005] .... 2007.849620: foo: (do_sys_openat2+0x0/0x130) arg1=4294967196 cat-2211 [005] .... 2007.849838: foo: (do_sys_openat2+0x0/0x130) arg1=4294967196 cat-2211 [005] .... 2007.849880: foo: (do_sys_openat2+0x0/0x130) arg1=4294967196 # echo 0 > kprobes/foo/enable Now if we delete the kprobe and create a new one that reads a string: # echo 'p:kprobes/foo do_sys_openat2 +0($arg2):string' > kprobe_events And now we can the trace: # cat trace sendmail-1942 [002] ..... 530.136320: foo: (do_sys_openat2+0x0/0x240) arg1= cat-2046 [004] ..... 530.930817: foo: (do_sys_openat2+0x0/0x240) arg1="������������������������������������������������������������������������������������������������" cat-2046 [004] ..... 530.930961: foo: (do_sys_openat2+0x0/0x240) arg1="������������������������������������������������������������������������������������������������" cat-2046 [004] ..... 530.934278: foo: (do_sys_openat2+0x0/0x240) arg1="������������������������������������������������������������������������������������������������" cat-2046 [004] ..... 530.934563: foo: (do_sys_openat2+0x0/0x240) arg1="��������������������������������������� ---truncated---
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.1:rc5:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.1:rc6:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.1:rc7:*:*:*:*:*:*" ]
null
7.8
null
null
GHSA-76m6-h6vf-x33v
libvirt 1.1.1 through 1.2.0 allows context-dependent attackers to bypass the domain:getattr and connect:search_domains restrictions in ACLs and obtain sensitive domain object information via a request to the (1) virConnectDomainEventRegister and (2) virConnectDomainEventRegisterAny functions in the event registration API.
[]
null
null
null
null
GHSA-j9x6-5wqj-262h
The call-handling implementation in Cisco Unity Connection 8.5 before 8.5(1)SU7, 8.6 before 8.6(2a)SU4, 9.x before 9.1(2)SU2, and 10.0 before 10.0(1)SU1, when SIP trunk integration is enabled, allows remote attackers to cause a denial of service (port consumption) by improperly terminating SIP sessions, aka Bug ID CSCul28089.
[]
null
null
null
null
GHSA-fv6q-cpfx-7rj8
IBM Cloud Orchestrator and IBM Cloud Orchestrator Enterprise 2.5 through 2.5.0.9 and 2.4 through 2.4.0.5 stores sensitive information in URL parameters. This may lead to information disclosure if unauthorized parties have access to the URLs via server logs, referrer header or browser history. IBM X-Force ID: 162239
[]
null
6.5
null
null
RHSA-2023:3264
Red Hat Security Advisory: sudo security update
sudo: arbitrary file write with privileges of the RunAs user
[ "cpe:/o:redhat:rhel_aus:7.4::server" ]
null
7.8
null
null
CVE-2019-15793
Mishandling of file-system uid/gid with namespaces in shiftfs
In shiftfs, a non-upstream patch to the Linux kernel included in the Ubuntu 5.0 and 5.3 kernel series, several locations which shift ids translate user/group ids before performing operations in the lower filesystem were translating them into init_user_ns, whereas they should have been translated into the s_user_ns for the lower filesystem. This resulted in using ids other than the intended ones in the lower fs, which likely did not map into the shifts s_user_ns. A local attacker could use this to possibly bypass discretionary access control permissions.
[ "cpe:2.3:o:linux:linux_kernel:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:5.3:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*" ]
null
6.5
null
null
GHSA-ww87-xv54-4xg7
Apple QuickTime before 7.6.9 on Windows sets weak permissions for the Apple Computer directory in the profile of a user account, which allows local users to obtain sensitive information by reading files in this directory.
[]
null
null
null
null
GHSA-hqmg-m6cw-2jmh
The launchURL function in PDF-XChange Viewer 2.5 (Build 314.0) might allow remote attackers to execute arbitrary code via a crafted PDF file.
[]
null
null
7.8
null
GHSA-vx6j-pjrh-vgjh
PHP file inclusion in the Sulu admin panel
Impact_What kind of vulnerability is it? Who is impacted?_An attacker can read arbitrary local files via a PHP file include. In a default configuration this also leads to remote code execution.Compromised components: Arbitrary file read on the server, (Potential) Remote code executionExploitation pre-requisite: User account on the backendPatches_Has the problem been patched? What versions should users upgrade to?_The problem is patched with the Versions 1.6.44, 2.2.18, 2.3.8, 2.4.0Workarounds_Is there a way for users to fix or remediate the vulnerability without upgrading?_Overwrite the service `sulu_route.generator.expression_token_provider` and wrap the translator before passing it to the expression language.References_Are there any links users can visit to find out more?_Currently not.For more informationIf you have any questions or comments about this advisory:Open an issue in [example link to repo](http://example.com)Email us at [example email address](mailto:[email protected])
[]
null
8.5
null
null
GHSA-7hrg-3c44-45cg
An issue in Cesanta mjs 2.20.0 allows a remote attacker to cause a denial of service via the mjs_op_json_parse function in the msj.c file.
[]
null
7.5
null
null
ICSA-24-074-09
Siemens Sinteso EN Cerberus PRO EN Fire Protection Systems
The network communication library in affected systems does not validate the length of certain X.509 certificate attributes which might result in a stack-based buffer overflow. This could allow an unauthenticated remote attacker to execute code on the underlying operating system with root privileges. Successful exploitation requires an on-path attacker that intercepts the communication of the engineering tool in the fire system network; code execution might be possible on the underlying operating system with the privileges of the engineering tool user account. Successful exploitation requires an on-path attacker that intercepts the communication of the engineering tool in the fire system network; code execution might be possible on the underlying operating system with the privileges of the engineering tool user account. Successful exploitation requires an on-path attacker that intercepts the communication of the app in the fire system network; possible impact is limited to the app, not the underlying operating system. The network communication library in affected systems insufficiently validates HMAC values which might result in a buffer overread. This could allow an unauthenticated remote attacker to crash the network service. Successful exploitation requires an on-path attacker that intercepts the communication of the engineering tool in the fire system network; possible impact is limited to the tool, not the underlying operating system. Successful exploitation requires an on-path attacker that intercepts the communication of the engineering tool in the fire system network; possible impact is limited to the tool, not the underlying operating system. Successful exploitation requires an on-path attacker that intercepts the communication of the app in the fire system network; possible impact is limited to the app, not the underlying operating system. The network communication library in affected systems improperly handles memory buffers when parsing X.509 certificates. This could allow an unauthenticated remote attacker to crash the network service. Successful exploitation requires an on-path attacker that intercepts the communication of the engineering tool in the fire system network; possible impact is limited to the tool, not the underlying operating system. Successful exploitation requires an on-path attacker that intercepts the communication of the engineering tool in the fire system network; possible impact is limited to the tool, not the underlying operating system. Successful exploitation requires an on-path attacker that intercepts the communication of the app in the fire system network; possible impact is limited to the app, not the underlying operating system.
[]
null
5.9
null
null
CVE-2022-0247
Write access to VMO data through copy-on-write in Fuchsia
An issue exists in Fuchsia where VMO data can be modified through access to copy-on-write snapshots. A local attacker could modify objects in the VMO that they do not have permission to. We recommend upgrading past commit d97c05d2301799ed585620a9c5c739d36e7b5d3d or any of the listed versions.
[ "cpe:2.3:o:google:fuchsia:*:*:*:*:*:*:*:*" ]
null
7.5
null
null
GHSA-5gr9-2c49-vhjx
In the Linux kernel 6.0.8, there is an out-of-bounds read in ntfs_attr_find in fs/ntfs/attrib.c.
[]
null
7.1
null
null
GHSA-v7cj-g3gx-p5gf
Remote Directory Traversal and Remote Disclosure of Privileged Information in UCMDB Configuration Management Service, version 10.22, 10.22 CUP1, 10.22 CUP2, 10.22 CUP3, 10.22 CUP4, 10.22 CUP5, 10.22 CUP6, 10.22 CUP7, 10.33, 10.33 CUP1, 10.33 CUP2, 10.33 CUP3, 2018.02, 2018.05, 2018.08, 2018.11. The vulnerabilities could allow Remote Directory Traversal and Remote Disclosure of Privileged Information
[]
null
null
7.5
null
RHSA-2011:1329
Red Hat Security Advisory: httpd and httpd22 security update
httpd: multiple ranges DoS
[ "cpe:/a:redhat:jboss_enterprise_web_server:1::el4", "cpe:/a:redhat:jboss_enterprise_web_server:1::el5", "cpe:/a:redhat:jboss_enterprise_web_server:1::el6" ]
null
null
null
null
CVE-2020-11129
u'During the error occurrence in capture request, the buffer is freed and later accessed causing the camera APP to fail due to memory use-after-free' in Snapdragon Consumer IOT, Snapdragon Mobile in Bitra, Kamorta, QCS605, Saipan, SDM710, SM8250, SXR2130
[ "cpe:2.3:o:qualcomm:bitra_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:bitra:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:kamorta_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:kamorta:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcs605_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcs605:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:saipan_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:saipan:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdm710_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm710:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm8250_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm8250:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sxr2130_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sxr2130:-:*:*:*:*:*:*:*" ]
null
7.8
null
7.2
CVE-2020-15694
In Nim 1.2.4, the standard library httpClient fails to properly validate the server response. For example, httpClient.get().contentLength() does not raise any error if a malicious server provides a negative Content-Length.
[ "cpe:2.3:a:nim-lang:nim:*:*:*:*:*:*:*:*" ]
null
7.5
null
5
GHSA-3r8c-rqqr-c7h4
An Insecure Direct Object Reference (IDOR) vulnerability in Annex Cloud Loyalty Experience Platform <2021.1.0.1 allows any authenticated attacker to modify any existing user, including users assigned to different environments and clients. It was fixed in v2021.1.0.2.
[]
null
4.3
null
null
GHSA-vrff-9qrr-6vqr
Applications based on SAP GUI for HTML in SAP NetWeaver Application Server ABAP store user input in the local browser storage to improve usability. An attacker with administrative privileges or access to the victim�s user directory on the Operating System level would be able to read this data. Depending on the user input provided in transactions, the disclosed data could range from non-critical data to highly sensitive data, causing high impact on confidentiality of the application.
[]
null
6
null
null
CVE-2017-14120
unrar 0.0.1 (aka unrar-free or unrar-gpl) suffers from a directory traversal vulnerability for RAR v2 archives: pathnames of the form ../[filename] are unpacked into the upper directory.
[ "cpe:2.3:a:rarlab:unrar:0.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" ]
null
7.5
null
5
GHSA-57hw-9ccm-w3ch
Multiple SQL injection vulnerabilities in PD9 Software MegaBBS 2.2 allow remote attackers to execute arbitrary SQL commands via the (1) invisible and (2) timeoffset parameters to profile/controlpanel.asp and the (3) attachmentid parameter to forums/attach-file.asp.
[]
null
null
null
null
GHSA-53wq-3m85-4fx6
The aarch64_ext_ldst_reglist function in opcodes/aarch64-dis.c in GNU Binutils 2.28 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during "objdump -D" execution.
[]
null
null
7.8
null
CVE-2020-22016
A heap-based Buffer Overflow vulnerability in FFmpeg 4.2 at libavcodec/get_bits.h when writing .mov files, which might lead to memory corruption and other potential consequences.
[ "cpe:2.3:a:ffmpeg:ffmpeg:4.2:-:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*" ]
null
8.8
null
6.8
GHSA-wx8w-3v99-w2v8
epan/dissectors/packet-zbee-zcl.c in the ZigBee ZCL dissector in Wireshark 1.4.0 through 1.4.1 allows remote attackers to cause a denial of service (infinite loop) via a crafted ZCL packet, related to Discover Attributes.
[]
null
null
null
null
GHSA-r9jr-628j-pc37
Sophos Anti-Virus engine (SAVi) before 3.50.1, as used in VDL 4.97G 9.7.x before 9.7.9, 10.0.x before 10.0.11, and 10.3.x before 10.3.1 does not set an ACL for certain global and session objects, which allows local users to bypass anti-virus protection, cause a denial of service (resource consumption, CPU consumption, and eventual crash) or spoof "ready for update" messages by performing certain operations on mutexes or events including (1) DataUpdateRequest, (2) MmfMutexSAV-****, (3) MmfMutexSAV-Info, (4) ReadyForUpdateSAV-****, (5) ReadyForUpdateSAV-Info, (6) SAV-****, (7) SAV-Info, (8) StateChange, (9) SuspendedSAV-****, (10) SuspendedSAV-Info, (11) UpdateComplete, (12) UpdateMutex, (13) UpdateRequest, or (14) SophosALMonSessionInstance, as demonstrated by triggering a ReadyForUpdateSAV event and modifying the UpdateComplete, UpdateMutex, and UpdateRequest objects.
[]
null
null
null
null
CVE-2025-32406
An XXE issue in the Director NBR component in NAKIVO Backup & Replication 10.3.x through 11.0.1 before 11.0.2 allows remote attackers fetch and parse the XML response.
[]
null
8.6
null
null
GHSA-mch7-w8fj-4pc4
Multiple integer overflows in the (1) strtod, (2) strtof, (3) strtold, (4) strtod_l, and other unspecified "related functions" in stdlib in GNU C Library (aka glibc or libc6) 2.16 allow local users to cause a denial of service (application crash) and possibly execute arbitrary code via a long string, which triggers a stack-based buffer overflow.
[]
null
null
null
null
CVE-2021-24593
Business Hours Indicator < 2.3.5 - Authenticated Stored XSS
The Business Hours Indicator WordPress plugin before 2.3.5 does not sanitise or escape its 'Now closed message" setting when outputting it in the backend and frontend, leading to an Authenticated Stored Cross-Site Scripting issue
[ "cpe:2.3:a:business_hours_indicator_project:business_hours_indicator:*:*:*:*:*:wordpress:*:*" ]
null
5.4
null
3.5
GHSA-8h4q-hf82-q8rj
The 3Com TippingPoint IPS do not properly handle certain full-width and half-width Unicode character encodings in an HTTP POST request, which might allow remote attackers to evade detection of HTTP traffic.
[]
null
null
null
null
CVE-2021-0167
Improper access control in software for Intel(R) PROSet/Wireless Wi-Fi and Killer(TM) Wi-Fi in Windows 10 and 11 may allow a privileged user to potentially enable escalation of privilege via local access.
[ "cpe:2.3:o:intel:amt_ac_8260_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:amt_ac_8260:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:amt_ac_8265_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:amt_ac_8265:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:amt_ac_9260_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:amt_ac_9260:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:amt_ac_9560_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:amt_ac_9560:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:amt_wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:amt_wi-fi_6_ax200:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:amt_wi-fi_6_ax201_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:amt_wi-fi_6_ax201:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:amt_wi-fi_6_ax210_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:amt_wi-fi_6_ax210:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:proset_ac_3165_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:proset_ac_3165:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:proset_ac_3168_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:proset_ac_3168:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:proset_ac_8260_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:proset_ac_8260:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:proset_ac_8265_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:proset_ac_8265:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:proset_ac_9260_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:proset_ac_9260:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:proset_ac_9461_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:proset_ac_9461:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:proset_ac_9462_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:proset_ac_9462:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:proset_ac_9560_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:proset_ac_9560:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:proset_wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:proset_wi-fi_6_ax200:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:proset_wi-fi_6_ax201_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:proset_wi-fi_6_ax201:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:proset_wi-fi_6e_ax210_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:proset_wi-fi_6e_ax210:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:proset_wireless_7265_\\(rev_d\\)_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:proset_wireless_7265_\\(rev_d\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:killer_ac_1550_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:killer_ac_1550:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:killer_wi-fi_6_ax1650_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:killer_wi-fi_6_ax1650:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:killer_wi-fi_6e_ax1675_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:killer_wi-fi_6e_ax1675:-:*:*:*:*:*:*:*" ]
null
6.7
null
4.6
GHSA-jgvj-jh34-hqv3
SpiderControl SCADA Webserver versions 2.08 and prior are vulnerable to path traversal. An attacker with administrative privileges could overwrite files on the webserver using the HMI's upload file feature. This could create size zero files anywhere on the webserver, potentially overwriting system files and creating a denial-of-service condition.
[]
null
6.5
null
null
GHSA-2wgw-3mv7-47xf
MIT Kerberos 5 (aka krb5) before 1.17.2 and 1.18.x before 1.18.3 allows unbounded recursion via an ASN.1-encoded Kerberos message because the lib/krb5/asn.1/asn1_encode.c support for BER indefinite lengths lacks a recursion limit.
[]
null
7.5
null
null
GHSA-rpq8-q44m-2rpg
Microsoft Identity Web Exposes Client Secrets and Certificate Information in Service Logs
Impact_What kind of vulnerability is it? Who is impacted?_**Description:** This vulnerability affects confidential client applications, including daemons, web apps, and web APIs. Under specific circumstances, sensitive information such as client secrets or certificate details may be exposed in the service logs of these applications. Service logs are intended to be handled securely.**Impact:** The vulnerability impacts service logs that meet the following criteria:**Logging Level:** Logs are generated at the information level.**Credential Descriptions:** containing:Local file paths with passwords.Base64 encoded values.Client secret.Additionally, logs of services using Base64 encoded certificates or certificate paths with password credential descriptions are also affected if the certificates are invalid or expired, regardless of the log level. Note that these credentials are not usable due to their invalid or expired status.If your service logs are handled securely, you are not impacted.Otherwise, the following table shows when you can be impacted   | Log Level Information for Microsoft.Identity.Web | Invalid Certificate -- | -- | -- One of the ClientCredentials credential description has a CredentialSource = Base64Encoded or (CredentialSource = Path) | Impacted | Impacted One of the ClientCredentials credential description is a Client secret (CredentialSource = ClientSecret) | Impacted | Not impacted Other credential descriptions | Not Impacted | Not ImpactedPatches_Has the problem been patched? What versions should users upgrade to?_ To mitigate this vulnerability, update to Microsoft.Identity.Web 3.8.2 or Microsoft.Identity.Abstractions 9.0.0.Workarounds_Is there a way for users to fix or remediate the vulnerability without upgrading?_ You can work around the issue in the following ways:Ensure that service logs are handled securely and access to logs is restrictedDon’t use `LogLevel = Information` for the Microsoft.Identity.Web namespaceRecommendation for production environmentAvoid using `ClientCredentials` with [`CredentialDescriptions`](https://learn.microsoft.com/en-us/dotnet/api/microsoft.identity.abstractions.credentialdescription.base64encodedvalue?view=msal-model-dotnet-latest) which `CredentialSource` is `ClientSecret`, or `Base64Encoded`, or `Path`. Rather use certificate from KeyVault or a certificate store, or Federation identity credential with Managed identity.References_Are there any links users can visit to find out more?_
[]
null
4.7
null
null
GHSA-rwp6-cpw3-hxxx
A vulnerability has been identified in POWER METER SICAM Q100 (All versions < V2.41), POWER METER SICAM Q100 (All versions < V2.41), POWER METER SICAM Q100 (All versions < V2.41), POWER METER SICAM Q100 (All versions < V2.41). The affected firmware contains a buffer overflow vulnerability in the web application that could allow a remote attacker with engineer or admin priviliges to potentially perform remote code execution.
[]
null
null
null
null
GHSA-mm82-783m-xjph
Multiple cross-site scripting (XSS) vulnerabilities in PhpForums.net mcGallery 1.1 allow remote attackers to inject arbitrary web script or HTML via the lang parameter to (1) admin.php, (2) index.php, (3) sess.php, (4) stats.php, (5) detail.php, (6) resize.php, and (7) show.php. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
[]
null
null
null
null
GHSA-fv3m-jf9j-44vh
Cross-Site Scripting vulnerability in Devklan's Alma Blog that affects versions 2.1.10 and earlier. This vulnerability could allow an attacker to store a malicious JavaScript payload within the application by adding the payload to 'Community Description' or 'Community Rules'.
[]
null
5.8
null
null
CVE-2023-1248
Possible XSS in Ticket Actions
Improper Input Validation vulnerability in OTRS AG OTRS (Ticket Actions modules), OTRS AG ((OTRS)) Community Edition (Ticket Actions modules) allows Cross-Site Scripting (XSS).This issue affects OTRS: from 7.0.X before 7.0.42; ((OTRS)) Community Edition: from 6.0.1 through 6.0.34.
[ "cpe:2.3:a:otrs:otrs:*:*:*:*:community:*:*:*", "cpe:2.3:a:otrs:otrs:*:*:*:*:*:*:*:*" ]
null
6.1
null
null
RHSA-2017:3093
Red Hat Security Advisory: python-django security update
python-django: Open redirect and possible XSS attack via user-supplied numeric redirect URLs
[ "cpe:/a:redhat:openstack:11::el7" ]
null
null
6.1
null
CVE-2025-20061
mySCADA myPRO Manager OS Command Injection
mySCADA myPRO does not properly neutralize POST requests sent to a specific port with email information. This vulnerability could be exploited by an attacker to execute arbitrary commands on the affected system.
[]
9.3
9.8
null
null
CVE-2016-5034
dwarf_elf_access.c in libdwarf before 20160923 allows remote attackers to cause a denial of service (out-of-bounds write) via a crafted file, related to relocation records.
[ "cpe:2.3:a:libdwarf_project:libdwarf:*:*:*:*:*:*:*:*" ]
null
6.5
null
4.3
GHSA-g5fc-q72r-xgfm
The ICMPv6 parser in tcpdump before 4.9.2 has a buffer over-read in print-icmp6.c:icmp6_print().
[]
null
null
9.8
null
CVE-2021-1419
Cisco Access Points SSH Management Privilege Escalation Vulnerability
A vulnerability in the SSH management feature of multiple Cisco Access Points (APs) platforms could allow a local, authenticated user to modify files on the affected device and possibly gain escalated privileges. The vulnerability is due to improper checking on file operations within the SSH management interface. A network administrator user could exploit this vulnerability by accessing an affected device through SSH management to make a configuration change. A successful exploit could allow the attacker to gain privileges equivalent to the root user.
[ "cpe:2.3:o:cisco:aironet_1542d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:aironet_1542d:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:aironet_1562d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:aironet_1562d:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:aironet_1815m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:aironet_1815m:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:aironet_1830e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:aironet_1830e:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:aironet_1840i_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:aironet_1840i:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:aironet_1850e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:aironet_1850e:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:aironet_2800i_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:aironet_2800i:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:aironet_3800p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:aironet_3800p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:aironet_4800_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:aironet_4800:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:catalyst_9105axi_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9105axi:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:catalyst_9115axe_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9115axe:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:catalyst_9117_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9117axi:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:catalyst_9120axi_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9120axi:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:catalyst_9124axd_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9124axd:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:catalyst_9130axe_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9130axe:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:catalyst_iw6300_ac_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_iw6300_ac:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:esw6300_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:esw6300:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:1100-8p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:1100-8p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:1120_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:1120:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:1160_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:1160_integrated_services_router:-:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:wireless_lan_controller_software:*:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:catalyst_9800_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:catalyst_9800_firmware:17.4:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9800-l:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:aironet_1542i_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:aironet_1542i:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9800-cl:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9800-40:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9800-80:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:aironet_1562e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:aironet_1562e:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:aironet_1562i_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:aironet_1562i:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:aironet_1815w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:aironet_1815w:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:aironet_1815t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:aironet_1815t:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:aironet_1815i_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:aironet_1815i:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:aironet_1830i_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:aironet_1830i:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:aironet_1850i_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:aironet_1850i:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:aironet_2800e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:aironet_2800e:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:aironet_3800i_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:aironet_3800i:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:aironet_3800e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:aironet_3800e:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:catalyst_9105axw_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9105axw:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:catalyst_9115axi_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9115axi:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:catalyst_9120axp_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9120axp:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:catalyst_9120axe_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9120axe:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:catalyst_9124axi_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9124axi:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:catalyst_9130axi_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9130axi:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:catalyst_iw6300_dc_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_iw6300_dc:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:catalyst_iw6300_dcw_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_iw6300_dcw:-:*:*:*:*:*:*:*" ]
null
7.8
null
null
GHSA-274w-2j5w-m2xj
Magento 2 Community Edition Information Disclosure
Names of disabled downloadable products could be disclosed due to inadequate validation of user input in Magento Open Source prior to 1.9.4.2, and Magento Commerce prior to 1.14.4.2, Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2.
[]
null
null
5.3
null
RHSA-2024:4015
Red Hat Security Advisory: thunderbird security update
Mozilla: Use-after-free in JavaScript object transplant Mozilla: External protocol handlers leaked by timing attack Mozilla: Sandboxed iframes were able to bypass sandbox restrictions to open a new window Mozilla: Cross-Origin Image leak via Offscreen Canvas Mozilla: Memory Corruption in Text Fragments Mozilla: Memory safety bugs fixed in Firefox 127, Firefox ESR 115.12, and Thunderbird 115.12 Mozilla: Use-after-free in networking
[ "cpe:/a:redhat:rhel_e4s:9.0::appstream" ]
null
7.5
null
null
GHSA-pmc9-x67w-5fv5
Heap-based buffer overflow in the KeyView PDF filter in IBM Domino 8.5.x before 8.5.3 FP6 IF13 and 9.x before 9.0.1 FP6 allows remote attackers to execute arbitrary code via a crafted PDF document, a different vulnerability than CVE-2016-0277, CVE-2016-0279, and CVE-2016-0301.
[]
null
null
7.8
null
CVE-2019-4204
IBM Business Automation Workflow 18.0.0.0, 18.0.0.1, 18.0.0.2, and 19.0.0.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 159125.
[ "cpe:2.3:a:ibm:business_automation_workflow:*:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.5.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.5.7.0:cf2016.06:*:*:*:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.5.7.0:cf2016.09:*:*:*:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.5.7.0:cf2016.12:*:*:*:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.5.7.0:cf2017.03:*:*:*:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.5.7.0:cf2017.06:*:*:*:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.6.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.6.0.0:cf201803:*:*:*:*:*:*" ]
null
null
5.4
null
GHSA-pq94-73jh-jg9w
A stored cross-site scripting (XSS) vulnerability in the /devices.php function inrConfig 3.9.5 has been fixed for version 3.9.6. This vulnerability allowed remote attackers to perform arbitrary Javascript execution through entering a crafted payload into the 'Model' field then saving.
[]
null
null
null
null
GHSA-c4hh-96wh-qcjh
Lead Management System v1.0 is vulnerable to SQL Injection via the id parameter in removeCategories.php.
[]
null
9.8
null
null
CVE-2025-27343
WordPress WooCommerce HTML5 Video Plugin <= 1.7.10 - Reflected Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Webilop WooCommerce HTML5 Video allows Reflected XSS. This issue affects WooCommerce HTML5 Video: from n/a through 1.7.10.
[]
null
7.1
null
null
CVE-2021-33531
WEIDMUELLER: WLAN devices affected by Hard-coded Credentials vulnerability
In Weidmueller Industrial WLAN devices in multiple versions an exploitable use of hard-coded credentials vulnerability exists in multiple iw_* utilities. The device operating system contains an undocumented encryption password, allowing for the creation of custom diagnostic scripts. An attacker can send diagnostic scripts while authenticated as a low privilege user to trigger this vulnerability.
[ "cpe:2.3:o:weidmueller:ie-wl-bl-ap-cl-eu_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:weidmueller:ie-wl-bl-ap-cl-eu:-:*:*:*:*:*:*:*", "cpe:2.3:o:weidmueller:ie-wlt-bl-ap-cl-eu_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:weidmueller:ie-wlt-bl-ap-cl-eu:-:*:*:*:*:*:*:*", "cpe:2.3:o:weidmueller:ie-wl-bl-ap-cl-us_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:weidmueller:ie-wl-bl-ap-cl-us:-:*:*:*:*:*:*:*", "cpe:2.3:o:weidmueller:ie-wlt-bl-ap-cl-us_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:weidmueller:ie-wlt-bl-ap-cl-us:-:*:*:*:*:*:*:*", "cpe:2.3:o:weidmueller:ie-wl-vl-ap-br-cl-eu_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:weidmueller:ie-wl-vl-ap-br-cl-eu:-:*:*:*:*:*:*:*", "cpe:2.3:o:weidmueller:ie-wlt-vl-ap-br-cl-eu_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:weidmueller:ie-wlt-vl-ap-br-cl-eu:-:*:*:*:*:*:*:*", "cpe:2.3:o:weidmueller:ie-wl-vl-ap-br-cl-us_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:weidmueller:ie-wl-vl-ap-br-cl-us:-:*:*:*:*:*:*:*", "cpe:2.3:o:weidmueller:ie-wlt-vl-ap-br-cl-us_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:weidmueller:ie-wlt-vl-ap-br-cl-us:-:*:*:*:*:*:*:*" ]
null
8.8
null
null
CVE-2009-3793
Unspecified vulnerability in Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, allows attackers to cause a denial of service (memory consumption) or possibly execute arbitrary code via unknown vectors.
[ "cpe:2.3:a:adobe:flash_player:9.0.16:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.20:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.20.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.28:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.28.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.31:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.31.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.45.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.47.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.48.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.124.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.125.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.151.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.152.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.159.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.246.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.260.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.262.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.0.0.584:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.0.12.10:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.0.12.36:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.0.15.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.0.22.87:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.0.32.18:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.0.42.34:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:6.0.79:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:7.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:7.0.14.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:7.0.19.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:7.0.24.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:7.0.25:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:7.0.53.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:7.0.60.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:7.0.61.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:7.0.63:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:7.0.66.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:7.0.67.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:7.0.68.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:7.0.69.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:7.0.70.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:7.0.73.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:7.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:7.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:7.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:8.0.22.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:8.0.24.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:8.0.33.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:8.0.34.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:8.0.35.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:8.0.39.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:8.0.42.0:*:*:*:*:*:*:*", "cpe:2.3:a:macromedia:flash_player:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:macromedia:flash_player:5.0.30.0:*:*:*:*:*:*:*", "cpe:2.3:a:macromedia:flash_player:5.0.41.0:*:*:*:*:*:*:*", "cpe:2.3:a:macromedia:flash_player:5.0.42.0:*:*:*:*:*:*:*", "cpe:2.3:a:macromedia:flash_player:5.0.58.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air:1.5:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air:1.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air:1.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air:1.5.3:*:*:*:*:*:*:*" ]
null
null
null
9.3
GHSA-446j-7c44-9q8x
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Brevo for WooCommerce Sendinblue for WooCommerce.This issue affects Sendinblue for WooCommerce: from n/a through 4.0.17.
[]
null
8.5
null
null
GHSA-9qpf-g9g2-qwrx
An information disclosure vulnerability exists in the Windows kernel that could allow an attacker to retrieve information that could lead to a Kernel Address Space Layout Randomization (ASLR) bypass, aka "Windows Kernel Information Disclosure Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-0887, CVE-2018-0960, CVE-2018-0968, CVE-2018-0969, CVE-2018-0970, CVE-2018-0972, CVE-2018-0973, CVE-2018-0974, CVE-2018-0975.
[]
null
null
5.5
null
GHSA-r8ch-vw3q-8h8q
Tenda i29 v1.0 V1.0.0.5 was discovered to contain a buffer overflow via the time parameter in the sysTimeInfoSet function.
[]
null
9.8
null
null
CVE-2020-6346
SAP 3D Visual Enterprise Viewer, version - 9, allows a user to open manipulated BMP file received from untrusted sources which results in crashing of the application and becoming temporarily unavailable until the user restarts the application, this is caused due to Improper Input Validation.
[ "cpe:2.3:a:sap:3d_visual_enterprise_viewer:9:*:*:*:*:*:*:*" ]
null
null
4.3
null
GHSA-f87p-9hqc-9w9r
Redmine before 3.2.6 and 3.3.x before 3.3.3 mishandles the rendering of wiki links, which allows remote attackers to obtain sensitive information.
[]
null
null
7.5
null
CVE-2010-2489
Buffer overflow in Ruby 1.9.x before 1.9.1-p429 on Windows might allow local users to gain privileges via a crafted ARGF.inplace_mode value that is not properly handled when constructing the filenames of the backup files.
[ "cpe:2.3:a:ruby-lang:ruby:1.9.0-0:*:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.9.0-1:*:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.9.0-2:*:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.9.0-20060415:*:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.9.0-20070709:*:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.9.1:-p0:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.9.1:-p129:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.9.1:-p243:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.9.1:-p376:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.9.1:-p429:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.9.1:-preview_1:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.9.1:-preview_2:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.9.1:-rc1:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:1.9.1:-rc2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*" ]
null
null
null
7.2
CVE-2010-4363
Multiple SQL injection vulnerabilities in contact.php in MRCGIGUY (MCG) FreeTicket 1.0.0, when magic_quotes_gpc is disabled, allow remote attackers to execute arbitrary SQL commands via the (1) id and (2) email parameters in a showtickets action.
[ "cpe:2.3:a:mrcgiguy:freeticket:1.0.0:*:*:*:*:*:*:*" ]
null
null
null
6.8
GHSA-7mpj-wcrp-p76g
Vulnerability in the Siebel UI Framework component of Oracle Siebel CRM (subcomponent: Open UI). The supported version that is affected is 16.1. Difficult to exploit vulnerability allows low privileged attacker with network access via HTTP to compromise Siebel UI Framework. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Siebel UI Framework accessible data. CVSS v3.0 Base Score 3.1 (Integrity impacts).
[]
null
null
3.1
null
CVE-2016-7659
An issue was discovered in certain Apple products. iOS before 10.2 is affected. macOS before 10.12.2 is affected. watchOS before 3.1.3 is affected. The issue involves the "Audio" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted file.
[ "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*" ]
null
null
8.8
6.8
GHSA-pxx3-8xw2-8x5x
Insertion of Sensitive Information into Log File vulnerability in Inisev Backup Migration.This issue affects Backup Migration: from n/a through 1.4.3.
[]
null
5.3
null
null
CVE-2022-28874
Multiple Denial-of-Service (DoS) Vulnerabilities
Multiple Denial-of-Service vulnerabilities was discovered in the F-Secure Atlant and in certain WithSecure products while scanning fuzzed PE32-bit files cause memory corruption and heap buffer overflow which eventually can crash the scanning engine. The exploit can be triggered remotely by an attacker.
[ "cpe:2.3:a:f-secure:atlant:*:*:*:*:*:*:*:*", "cpe:2.3:a:f-secure:elements_endpoint_protection:*:*:*:*:*:*:*:*", "cpe:2.3:a:f-secure:linux_security:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "cpe:2.3:a:withsecure:cloud_protection_for_salesforce:*:*:*:*:*:*:*:*", "cpe:2.3:a:withsecure:elements_collaboration_protection:*:*:*:*:*:*:*:*" ]
null
4.3
null
null
GHSA-r8j5-h5cx-65gg
ReDOS in IS-SVG
A vulnerability was discovered in IS-SVG version 4.3.1 and below where a Regular Expression Denial of Service (ReDOS) occurs if the application is provided and checks a crafted invalid SVG string.
[]
null
7.5
null
null
RHSA-2024:10265
Red Hat Security Advisory: kernel security update
kernel: xprtrdma: fix pointer derefs in error cases of rpcrdma_ep_create kernel: mptcp: pm: Fix uaf in __timer_delete_sync
[ "cpe:/o:redhat:rhel_aus:8.4::baseos", "cpe:/o:redhat:rhel_e4s:8.4::baseos", "cpe:/o:redhat:rhel_tus:8.4::baseos" ]
null
7
null
null
CVE-2022-38980
The HwAirlink module has a heap overflow vulnerability in processing data packets of the proprietary protocol.Successful exploitation of this vulnerability may allow attackers to obtain process control permissions.
[ "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:2.1:*:*:*:*:*:*:*" ]
null
9.8
null
null
CVE-2000-0569
Sybergen Sygate allows remote attackers to cause a denial of service by sending a malformed DNS UDP packet to its internal interface.
[ "cpe:2.3:a:sybergen:sygate:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:sybergen:sygate:3.11:*:*:*:*:*:*:*" ]
null
null
null
5
CVE-2007-6016
Multiple stack-based buffer overflows in the PVATLCalendar.PVCalendar.1 ActiveX control in pvcalendar.ocx in the scheduler component in the Media Server in Symantec Backup Exec for Windows Server (BEWS) 11d 11.0.6235 and 11.0.7170, and 12.0 12.0.1364, allow remote attackers to execute arbitrary code via a long (1) _DOWText0, (2) _DOWText1, (3) _DOWText2, (4) _DOWText3, (5) _DOWText4, (6) _DOWText5, (7) _DOWText6, (8) _MonthText0, (9) _MonthText1, (10) _MonthText2, (11) _MonthText3, (12) _MonthText4, (13) _MonthText5, (14) _MonthText6, (15) _MonthText7, (16) _MonthText8, (17) _MonthText9, (18) _MonthText10, or (19) _MonthText11 property value when executing the Save method. NOTE: the vendor states "Authenticated user involvement required," but authentication is not needed to attack a client machine that loads this control.
[ "cpe:2.3:a:symantec:backup_exec_for_windows_server:11d:11.0.6235:*:*:*:*:*:*", "cpe:2.3:a:symantec:backup_exec_for_windows_server:11d:11.0.7170:*:*:*:*:*:*", "cpe:2.3:a:symantec:backup_exec_for_windows_server:12.0:12.0.1364:*:*:*:*:*:*" ]
null
null
null
9.3
CVE-2010-4417
Unspecified vulnerability in the Services for Beehive component in Oracle Fusion Middleware 2.0.1.0, 2.0.1.1, 2.0.1.2, 2.0.1.2.1, and 2.0.1.3 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the January 2011 CPU. Oracle has not commented on claims from a reliable third party coordinator that voice-servlet/prompt-qa/Index.jspf does not properly handle null (%00) bytes in the evaluation parameter that is used in a filename, which allows attackers to create a file with an executable extension and execute arbitrary JSP code.
[ "cpe:2.3:a:oracle:beehive:2.0.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:beehive:2.0.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:beehive:2.0.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:beehive:2.0.1.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:beehive:2.0.1.3:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-p2jx-4425-chh9
Multiple cross-site scripting (XSS) vulnerabilities in OrbitHYIP 2.0 and earlier allow remote attackers to inject arbitrary web script via the (1) referral parameter to signup.php or (2) id parameter to members.php.
[]
null
null
null
null
CVE-2020-10225
An unauthenticated file upload vulnerability has been identified in admin/gallery.php in PHPGurukul Job Portal 1.0. The vulnerability could be exploited by an unauthenticated remote attacker to upload content to the server, including PHP files, which could result in command execution.
[ "cpe:2.3:a:phpgurukul:job_portal:1.0:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
GHSA-v5h8-96h5-6hm4
SettingsBase.php in Pinnacle ShowCenter 1.51 allows remote attackers to cause a denial of service (web interface errors) via an invalid Skin parameter.
[]
null
null
null
null
CVE-2013-0193
Cross-site Scripting (XSS) in Piwik before 1.10.1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. NOTE: This is a different vulnerability than CVE-2013-0194 and CVE-2013-0195.
[ "cpe:2.3:a:matomo:matomo:*:*:*:*:*:*:*:*" ]
null
6.1
null
4.3
CVE-2020-1427
An elevation of privilege vulnerability exists in the way that the Windows Network Connections Service handles objects in memory, aka 'Windows Network Connections Service Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1373, CVE-2020-1390, CVE-2020-1428, CVE-2020-1438.
[ "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*" ]
null
7.8
null
4.6
CVE-2023-6721
Improper Restriction of XML External Entity Reference in Repox
An XEE vulnerability has been found in Repox, which allows a remote attacker to interfere with the application's XML data processing in the fileupload function, resulting in interaction between the attacker and the server's file system.
[ "cpe:2.3:a:europeana:repox:2.3.7:*:*:*:*:*:*:*" ]
null
8.3
null
null
GHSA-r9mp-qr63-99pq
Northern.tech Mender Client 4.x before 4.0.5 has Insecure Permissions.
[]
null
9.1
null
null
CVE-2019-0643
An information disclosure vulnerability exists in the way that Microsoft Edge handles cross-origin requests, aka 'Microsoft Edge Information Disclosure Vulnerability'.
[ "cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*" ]
null
null
4.3
4.3
GHSA-r32h-gpw9-p8r4
NVIDIA GeForce Experience all versions prior to 3.14.1 contains a potential vulnerability when GameStream is enabled where improper access control may lead to a denial of service, escalation of privileges, or both.
[]
null
null
7
null
GHSA-5mw9-mr3r-536c
An integer overflow in the search_in_range function in regexec.c in Oniguruma 6.x before 6.9.4_rc2 leads to an out-of-bounds read, in which the offset of this read is under the control of an attacker. (This only affects the 32-bit compiled version). Remote attackers can cause a denial-of-service or information disclosure, or possibly have unspecified other impact, via a crafted regular expression.
[]
null
null
null
null
CVE-2013-0145
Buffer overflow in the TFTPD service in Serva32 2.1.0 allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a long string in a read request.
[ "cpe:2.3:a:vercot:serva32:2.1.0:*:*:*:*:*:*:*" ]
null
null
null
5
CVE-2006-5234
Multiple PHP remote file inclusion vulnerabilities in phpWebSite 0.10.2 allow remote attackers to execute arbitrary PHP code via a URL in the PHPWS_SOURCE_DIR parameter in (1) init.php, (2) users.php, (3) Cookie.php, (4) forms.php, (5) Groups.php, (6) ModSetting.php, (7) Calendar.php, (8) DateTime.php, (9) core.php, (10) ImgLibrary.php, (11) Manager.php, and (12) Template.php, and (13) EZform.php. NOTE: CVE disputes this report, since "PHPWS_SOURCE_DIR" is defined as a constant, not accessed as a variable
[ "cpe:2.3:a:phpwebsite:phpwebsite:0.10.2:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2022-34872
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Centreon. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of Virtual Metrics. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise. Was ZDI-CAN-16336.
[ "cpe:2.3:a:centreon:centreon:21.10.2:*:*:*:*:*:*:*" ]
null
null
6.5
null
GHSA-83x5-3w6q-xwfg
Untrusted search path vulnerability in Invensys Wonderware InTouch 2012 and earlier, as used in Wonderware Application Server, Wonderware Information Server, Foxboro Control Software, InFusion CE/FE/SCADA, InBatch, and Wonderware Historian, allows local users to gain privileges via a Trojan horse DLL in an unspecified directory.
[]
null
null
null
null
GHSA-pf6w-3pfw-fxvw
Magento SQL Injection vulnerability
Magento versions 2.4.0 and 2.3.5 (and earlier) are affected by an SQL Injection vulnerability that could lead to sensitive information disclosure. This vulnerability could be exploited by an authenticated user with permissions to the product listing page to read data from the database.
[]
null
7.1
null
null
CVE-2023-2793
Stack exhaustion in PreparePostForClientWithEmbedsAndImages
Mattermost fails to validate links on external websites when constructing a preview for a linked website, allowing an attacker to cause a denial-of-service by a linking to a specially crafted webpage in a message.
[ "cpe:2.3:a:mattermost:mattermost:*:*:*:*:*:*:*:*", "cpe:2.3:a:mattermost:mattermost:7.10.0:*:*:*:*:*:*:*" ]
null
6.5
null
null
CVE-2024-46754
bpf: Remove tst_run from lwt_seg6local_prog_ops.
In the Linux kernel, the following vulnerability has been resolved: bpf: Remove tst_run from lwt_seg6local_prog_ops. The syzbot reported that the lwt_seg6 related BPF ops can be invoked via bpf_test_run() without without entering input_action_end_bpf() first. Martin KaFai Lau said that self test for BPF_PROG_TYPE_LWT_SEG6LOCAL probably didn't work since it was introduced in commit 04d4b274e2a ("ipv6: sr: Add seg6local action End.BPF"). The reason is that the per-CPU variable seg6_bpf_srh_states::srh is never assigned in the self test case but each BPF function expects it. Remove test_run for BPF_PROG_TYPE_LWT_SEG6LOCAL.
[]
null
null
null
null