id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
57.2k
cpes
sequencelengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
GHSA-hgrw-f4vv-qw46
A vulnerability classified as critical was found in GE Voluson S8. Affected is the underlying Windows XP operating system. Missing patches might introduce an excessive attack surface. Access to the local network is required for this attack to succeed.
[]
null
7.8
null
null
CVE-2005-3527
Race condition in do_coredump in signal.c in Linux kernel 2.6 allows local users to cause a denial of service by triggering a core dump in one thread while another thread has a pending SIGSTOP.
[ "cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*" ]
null
null
null
4
GHSA-pv5g-gpjf-g9xg
LSCFG in IBM AIX 5.2 and 5.3 does not create temporary files securely, which allows local users to corrupt /etc/passwd and possibly other system files via the trace file.
[]
null
null
null
null
GHSA-xw3x-gmvv-p64m
Moxa EDR-G903 series routers with firmware before 2.11 do not use a sufficient source of entropy for (1) SSH and (2) SSL keys, which makes it easier for man-in-the-middle attackers to spoof a device or modify a client-server data stream by leveraging knowledge of a key from a product installation elsewhere.
[]
null
null
null
null
GHSA-c3cx-8mvg-g7xg
Adobe Reader and Acrobat 10.x before 10.1.15 and 11.x before 11.0.12, Acrobat and Acrobat Reader DC Classic before 2015.006.30060, and Acrobat and Acrobat Reader DC Continuous before 2015.008.20082 on Windows and OS X allow attackers to bypass JavaScript API execution restrictions via unspecified vectors, a different vulnerability than CVE-2015-4438, CVE-2015-4441, CVE-2015-4445, CVE-2015-4447, CVE-2015-4451, CVE-2015-4452, CVE-2015-5085, and CVE-2015-5086.
[]
null
null
null
null
RHSA-2019:1269
Red Hat Security Advisory: firefox security update
mozilla: Cross-origin theft of images with ImageBitmapRenderingContext chromium-browser: Out of bounds read in Skia libpng: use-after-free in png_image_free in png.c Mozilla: Cross-origin theft of images with createImageBitmap Mozilla: Memory safety bugs fixed in Firefox 67 and Firefox ESR 60.7 Mozilla: Type confusion with object groups and UnboxedObjects Mozilla: Stealing of cross-domain images using canvas Mozilla: Compartment mismatch with fetch API Mozilla: Use-after-free of ChromeEventHandler by DocShell Mozilla: Use-after-free in XMLHttpRequest Mozilla: Use-after-free removing listeners in the event listener manager Mozilla: Buffer overflow in WebGL bufferdata on Linux Mozilla: Theft of user history data through drag and drop of hyperlinks to and from bookmarks
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
null
6.1
null
GHSA-2f34-vx7g-x3mg
OMICARD EDM’s API function has insufficient validation for user input. An unauthenticated remote attacker can inject arbitrary SQL commands to access, modify, delete database or disrupt service.
[]
null
9.8
null
null
CVE-2019-19282
A vulnerability has been identified in OpenPCS 7 V8.1 (All versions), OpenPCS 7 V8.2 (All versions), OpenPCS 7 V9.0 (All versions < V9.0 Upd3), SIMATIC BATCH V8.1 (All versions), SIMATIC BATCH V8.2 (All versions < V8.2 Upd12), SIMATIC BATCH V9.0 (All versions < V9.0 SP1 Upd5), SIMATIC NET PC Software V14 (All versions < V14 SP1 Update 14), SIMATIC NET PC Software V15 (All versions), SIMATIC NET PC Software V16 (All versions < V16 Update 1), SIMATIC PCS 7 V8.1 (All versions), SIMATIC PCS 7 V8.2 (All versions), SIMATIC PCS 7 V9.0 (All versions < V9.0 SP3), SIMATIC Route Control V8.1 (All versions), SIMATIC Route Control V8.2 (All versions), SIMATIC Route Control V9.0 (All versions < V9.0 Upd4), SIMATIC WinCC (TIA Portal) V13 (All versions < V13 SP2), SIMATIC WinCC (TIA Portal) V14 (All versions < V14 SP1 Update 10), SIMATIC WinCC (TIA Portal) V15.1 (All versions < V15.1 Update 5), SIMATIC WinCC (TIA Portal) V16 (All versions < V16 Update 1), SIMATIC WinCC V7.3 (All versions), SIMATIC WinCC V7.4 (All versions < V7.4 SP1 Update 14), SIMATIC WinCC V7.5 (All versions < V7.5 SP1 Update 1). Through specially crafted messages, when encrypted communication is enabled, an attacker with network access could use the vulnerability to compromise the availability of the system by causing a Denial-of-Service condition. Successful exploitation requires no system privileges and no user interaction.
[ "cpe:2.3:a:siemens:openpcs_7:9.0:-:*:*:*:*:*:*", "cpe:2.3:a:siemens:openpcs_7:9.0_update_1:*:*:*:*:*:*:*", "cpe:2.3:a:siemens:simatic_batch:9.0:-:*:*:*:*:*:*", "cpe:2.3:a:siemens:simatic_batch:9.0:sp1:*:*:*:*:*:*", "cpe:2.3:a:siemens:simatic_batch:9.0:sp1_update_1:*:*:*:*:*:*", "cpe:2.3:a:siemens:simatic_batch:9.0:sp1_update_2:*:*:*:*:*:*", "cpe:2.3:a:siemens:simatic_batch:9.0:sp1_update_3:*:*:*:*:*:*", "cpe:2.3:a:siemens:simatic_batch:9.0:sp1_update_4:*:*:*:*:*:*", "cpe:2.3:a:siemens:simatic_net_pc:*:*:*:*:*:*:*:*", "cpe:2.3:a:siemens:simatic_net_pc:16:-:*:*:*:*:*:*", "cpe:2.3:a:siemens:simatic_pcs_7:8.1:*:*:*:*:*:*:*", "cpe:2.3:a:siemens:simatic_pcs_7:8.2:*:*:*:*:*:*:*", "cpe:2.3:a:siemens:simatic_pcs_7:9.0:-:*:*:*:*:*:*", "cpe:2.3:a:siemens:simatic_pcs_7:9.0:sp1:*:*:*:*:*:*", "cpe:2.3:a:siemens:simatic_pcs_7:9.0:sp2:*:*:*:*:*:*", "cpe:2.3:a:siemens:simatic_route_control:*:*:*:*:*:*:*:*", "cpe:2.3:a:siemens:simatic_route_control:9.0:-:*:*:*:*:*:*", "cpe:2.3:a:siemens:simatic_wincc:7.4:-:*:*:*:*:*:*", "cpe:2.3:a:siemens:simatic_wincc:7.4:sp1:*:*:*:*:*:*", "cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update_1:*:*:*:*:*:*", "cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update_10:*:*:*:*:*:*", "cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update_11:*:*:*:*:*:*", "cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update_12:*:*:*:*:*:*", "cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update_13:*:*:*:*:*:*", "cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update_2:*:*:*:*:*:*", "cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update_3:*:*:*:*:*:*", "cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update_4:*:*:*:*:*:*", "cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update_5:*:*:*:*:*:*", "cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update_6:*:*:*:*:*:*", "cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update_7:*:*:*:*:*:*", "cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update_8:*:*:*:*:*:*", "cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update_9:*:*:*:*:*:*", "cpe:2.3:a:siemens:simatic_wincc:7.5:-:*:*:*:*:*:*", "cpe:2.3:a:siemens:simatic_wincc:7.5:sp1:-:*:*:*:*:*", "cpe:2.3:a:siemens:simatic_wincc:7.5.1:-:*:*:*:*:*:*", "cpe:2.3:a:siemens:simatic_wincc:13:-:*:*:*:*:*:*", "cpe:2.3:a:siemens:simatic_wincc:13:sp1:*:*:*:*:*:*", "cpe:2.3:a:siemens:simatic_wincc:14.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:siemens:simatic_wincc:15.1:-:*:*:*:*:*:*", "cpe:2.3:a:siemens:simatic_wincc:15.1:update_1:*:*:*:*:*:*", "cpe:2.3:a:siemens:simatic_wincc:15.1:update_2:*:*:*:*:*:*", "cpe:2.3:a:siemens:simatic_wincc:15.1:update_3:*:*:*:*:*:*", "cpe:2.3:a:siemens:simatic_wincc:15.1:update_4:*:*:*:*:*:*", "cpe:2.3:a:siemens:simatic_wincc:16:-:*:*:*:*:*:*" ]
null
7.5
null
null
CVE-2007-0060
Stack-based buffer overflow in the Message Queuing Server (Cam.exe) in CA (formerly Computer Associates) Message Queuing (CAM / CAFT) software before 1.11 Build 54_4 on Windows and NetWare, as used in CA Advantage Data Transport, eTrust Admin, certain BrightStor products, certain CleverPath products, and certain Unicenter products, allows remote attackers to execute arbitrary code via a crafted message to TCP port 3104.
[ "cpe:2.3:a:broadcom:advantage_data_transport:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:broadcom:brightstor_portal:11.1:*:*:*:*:*:*:*", "cpe:2.3:a:broadcom:brightstor_san_manager:11.1:*:*:*:*:*:*:*", "cpe:2.3:a:broadcom:brightstor_san_manager:11.5:*:*:*:*:*:*:*", "cpe:2.3:a:broadcom:cleverpath_aion:10.0:*:*:*:*:*:*:*", "cpe:2.3:a:broadcom:cleverpath_ecm:3.5:*:*:*:*:*:*:*", "cpe:2.3:a:broadcom:cleverpath_olap:5.1:*:*:*:*:*:*:*", "cpe:2.3:a:broadcom:cleverpath_predictive_analysis_server:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:broadcom:cleverpath_predictive_analysis_server:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:broadcom:etrust_admin:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:broadcom:etrust_admin:8.1:*:*:*:*:*:*:*", "cpe:2.3:a:broadcom:unicenter_application_performance_monitor:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:broadcom:unicenter_application_performance_monitor:3.5:*:*:*:*:*:*:*", "cpe:2.3:a:broadcom:unicenter_asset_management:3.1:*:*:*:*:*:*:*", "cpe:2.3:a:broadcom:unicenter_asset_management:3.2:*:*:*:*:*:*:*", "cpe:2.3:a:broadcom:unicenter_asset_management:3.2:sp1:*:*:*:*:*:*", "cpe:2.3:a:broadcom:unicenter_asset_management:3.2:sp2:*:*:*:*:*:*", "cpe:2.3:a:broadcom:unicenter_asset_management:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:broadcom:unicenter_data_transport_option:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:broadcom:unicenter_jasmine:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:broadcom:unicenter_network_and_systems_management:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:broadcom:unicenter_network_and_systems_management:3.1:*:*:*:*:*:*:*", "cpe:2.3:a:broadcom:unicenter_nsm_wireless_network_management_option:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:broadcom:unicenter_remote_control:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:broadcom:unicenter_remote_control:6.0:sp1:*:*:*:*:*:*", "cpe:2.3:a:broadcom:unicenter_service_level_management:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:broadcom:unicenter_service_level_management:3.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:broadcom:unicenter_service_level_management:3.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:broadcom:unicenter_service_level_management:3.5:*:*:*:*:*:*:*", "cpe:2.3:a:broadcom:unicenter_software_delivery:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:broadcom:unicenter_software_delivery:3.1:*:*:*:*:*:*:*", "cpe:2.3:a:broadcom:unicenter_software_delivery:3.1:sp1:*:*:*:*:*:*", "cpe:2.3:a:broadcom:unicenter_software_delivery:3.1:sp2:*:*:*:*:*:*", "cpe:2.3:a:broadcom:unicenter_software_delivery:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:broadcom:unicenter_tng:2.1:*:*:*:*:*:*:*", "cpe:2.3:a:broadcom:unicenter_tng:2.2:*:*:*:*:*:*:*", "cpe:2.3:a:broadcom:unicenter_tng:2.4:*:*:*:*:*:*:*", "cpe:2.3:a:broadcom:unicenter_tng:2.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:ca:etrust_admin:2.1:*:*:*:*:*:*:*", "cpe:2.3:a:ca:etrust_admin:2.4:*:*:*:*:*:*:*", "cpe:2.3:a:ca:etrust_admin:2.7:*:*:*:*:*:*:*", "cpe:2.3:a:ca:etrust_admin:2.9:*:*:*:*:*:*:*", "cpe:2.3:a:ca:unicenter_asset_management:4.0:sp1:*:*:*:*:*:*", "cpe:2.3:a:ca:unicenter_enterprise_job_manager:1.0:sp1:*:*:*:*:*:*", "cpe:2.3:a:ca:unicenter_enterprise_job_manager:1.0:sp2:*:*:*:*:*:*", "cpe:2.3:a:ca:unicenter_management:4.0:*:lotus_notes_domino:*:*:*:*:*", "cpe:2.3:a:ca:unicenter_management:4.0:*:microsoft_exchange:*:*:*:*:*", "cpe:2.3:a:ca:unicenter_management:4.1:*:microsoft_exchange:*:*:*:*:*", "cpe:2.3:a:ca:unicenter_management:5.0:*:web_servers:*:*:*:*:*", "cpe:2.3:a:ca:unicenter_management:5.0.1:*:web_servers:*:*:*:*:*", "cpe:2.3:a:ca:unicenter_software_delivery:4.0:sp1:*:*:*:*:*:*", "cpe:2.3:a:ca:unicenter_tng:2.2:*:*:ja:*:*:*:*" ]
null
null
null
9.3
CVE-2007-2214
Unrestricted file upload vulnerability in includes/upload_file.php in DmCMS allows remote attackers to upload arbitrary PHP scripts by placing a script's contents in both the File2 and File3 parameters, and sending a ok.php?do=act Referer.
[ "cpe:2.3:a:dmcms:dmcms:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
ICSA-24-023-01
APsystems Energy Communication Unit (ECU-C) Power Control Software
APsystems ENERGY COMMUNICATION UNIT (ECU-C) Power Control Software V4.1NA, V3.11.4, W2.1NA, V4.1SAA, C1.2.2 allows attackers to access sensitive data and execute specific commands and functions with full admin rights. This could lead to multiple attacks in the product's range.
[]
null
8.8
null
null
GHSA-f3ww-87xf-9498
Heap-based buffer overflow in the ASN.1 decoder in Mozilla Network Security Services (NSS) before 3.19.2.1 and 3.20.x before 3.20.1, as used in Firefox before 42.0 and Firefox ESR 38.x before 38.4 and other products, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted OCTET STRING data.
[]
null
null
9.8
null
CVE-2019-4298
IBM Robotic Process Automation with Automation Anywhere 11 uses a high privileged PostgreSQL account for database access which could allow a local user to perform actions they should not have privileges to execute. IBM X-Force ID: 160764.
[ "cpe:2.3:a:ibm:robotic_process_automation_with_automation_anywhere:*:*:*:*:*:*:*:*" ]
null
null
7.7
null
CVE-2023-49377
JFinalCMS v5.0.0 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/tag/update.
[ "cpe:2.3:a:jfinalcms_project:jfinalcms:5.0.0:*:*:*:*:*:*:*" ]
null
8.8
null
null
RHSA-2013:0158
Red Hat Security Advisory: tomcat6 security update
Web: Bypass of security constraints
[ "cpe:/a:redhat:jboss_enterprise_web_server:1::el5", "cpe:/a:redhat:jboss_enterprise_web_server:1::el6" ]
null
null
null
null
GHSA-cc5r-5c3q-fh45
class.vfs_dav.inc.php in phpGroupWare 0.9.16.000 does not create .htaccess files to enable authorization checks for access to users' home-directory files, which allows remote attackers to obtain sensitive information from these files.
[]
null
null
null
null
GHSA-wcv4-mvxp-h397
An invalid memory address dereference was discovered in the huffcode function (libfaac/huff2.c) in Freeware Advanced Audio Coder (FAAC) 1.29.9.2. The vulnerability causes a segmentation fault and application crash, which leads to denial of service in the book 8 case.
[]
null
null
5.5
null
GHSA-973m-857j-grqw
The OpenShift Enterprise 3 router does not properly sort routes when processing newly added routes. An attacker with access to create routes can potentially overwrite existing routes and redirect network traffic for other users to their own site.
[]
null
null
7.7
null
RHSA-2022:4959
Red Hat Security Advisory: java-1.8.0-ibm security update
OpenJDK: Excessive memory allocation in HashMap and HashSet (Utility, 8266097) java-11-openj9,java-1_8_0-openj9: unverified methods can be invoked using MethodHandles OpenJDK: Improper object-to-string conversion in AnnotationInvocationHandler (Libraries, 8277672) OpenJDK: Missing check for negative ObjectIdentifier (Libraries, 8275151) OpenJDK: URI parsing inconsistencies (JNDI, 8278972)
[ "cpe:/a:redhat:rhel_extras:7" ]
null
5.3
null
null
CVE-2004-1792
swnet.dll in YaSoft Switch Off 2.3 and earlier allows remote attackers to cause a denial of service (infinite loop) via a long packet with two CRLF sequences to the service management port (TCP 8000).
[ "cpe:2.3:a:yatsoft:switch_off:0.7:*:*:*:*:*:*:*", "cpe:2.3:a:yatsoft:switch_off:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:yatsoft:switch_off:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:yatsoft:switch_off:1.2:*:*:*:*:*:*:*", "cpe:2.3:a:yatsoft:switch_off:1.3:*:*:*:*:*:*:*", "cpe:2.3:a:yatsoft:switch_off:1.4:*:*:*:*:*:*:*", "cpe:2.3:a:yatsoft:switch_off:1.5:*:*:*:*:*:*:*", "cpe:2.3:a:yatsoft:switch_off:1.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:yatsoft:switch_off:1.6:*:*:*:*:*:*:*", "cpe:2.3:a:yatsoft:switch_off:1.7:*:*:*:*:*:*:*", "cpe:2.3:a:yatsoft:switch_off:1.8:*:*:*:*:*:*:*", "cpe:2.3:a:yatsoft:switch_off:1.9:*:*:*:*:*:*:*", "cpe:2.3:a:yatsoft:switch_off:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:yatsoft:switch_off:2.1:*:*:*:*:*:*:*", "cpe:2.3:a:yatsoft:switch_off:2.2:*:*:*:*:*:*:*", "cpe:2.3:a:yatsoft:switch_off:2.3:*:*:*:*:*:*:*" ]
null
null
null
5
GHSA-jh89-gfwm-r5hg
Efone 20000723 stores config.inc under the web document root with insufficient access control, which allows remote attackers to obtain sensitive information.
[]
null
null
null
null
GHSA-3fcf-gf78-2qgj
A CSRF vulnerability exists in the Upload Center Forms Component of Web File Manager in Rumpus FTP 8.2.9.1. This could allow an attacker to delete, create, and update the upload forms via RAPR/TriggerServerFunction.html.
[]
null
null
null
null
CVE-2021-45473
In MediaWiki through 1.37, Wikibase item descriptions allow XSS, which is triggered upon a visit to an action=info URL (aka a page-information sidebar).
[ "cpe:2.3:a:mediawiki:mediawiki:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*" ]
null
6.1
null
4.3
RHSA-2023:1931
Red Hat Security Advisory: emacs security update
emacs: command injection vulnerability in org-mode
[ "cpe:/a:redhat:rhel_eus:8.6::appstream", "cpe:/o:redhat:rhel_eus:8.6::baseos" ]
null
7.8
null
null
CVE-2001-0931
Directory traversal vulnerability in Cooolsoft PowerFTP Server 2.03 allows attackers to list or read arbitrary files and directories via a .. (dot dot) in (1) LS or (2) GET.
[ "cpe:2.3:a:cooolsoft:powerftp:2.03:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-8xcf-7jjj-p7rh
An issue was discovered in Kaseya Unitrends Backup Appliance before 10.5.5. A buffer overflow existed in the vaultServer component. This was exploitable by a remote unauthenticated attacker.
[]
null
9.8
null
null
GHSA-33rw-2cg2-2mpc
In the Linux kernel, the following vulnerability has been resolved:mm: revert "mm: shmem: fix data-race in shmem_getattr()"Revert d949d1d14fa2 ("mm: shmem: fix data-race in shmem_getattr()") as suggested by Chuck [1]. It is causing deadlocks when accessing tmpfs over NFS.As Hugh commented, "added just to silence a syzbot sanitizer splat: added where there has never been any practical problem".
[]
null
4.7
null
null
CVE-2022-4436
Use after free in Blink Media in Google Chrome prior to 108.0.5359.124 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" ]
null
8.8
null
null
CVE-2024-8374
Arbitrary Code Injection in Cura
UltiMaker Cura slicer versions 5.7.0-beta.1 through 5.7.2 are vulnerable to code injection via the 3MF format reader (/plugins/ThreeMFReader.py). The vulnerability arises from improper handling of the drop_to_buildplate property within 3MF files, which are ZIP archives containing the model data. When a 3MF file is loaded in Cura, the value of the drop_to_buildplate property is passed to the Python eval() function without proper sanitization, allowing an attacker to execute arbitrary code by crafting a malicious 3MF file. This vulnerability poses a significant risk as 3MF files are commonly shared via 3D model databases.
[ "cpe:2.3:a:ultimaker:cura:*:*:*:*:*:*:*:*", "cpe:2.3:a:ultimaker:ultimaker_cura:5.7.0:-:*:*:*:*:*:*", "cpe:2.3:a:ultimaker:ultimaker_cura:5.7.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:ultimaker:ultimaker_cura:5.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:ultimaker:ultimaker_cura:5.7.2:rc2:*:*:*:*:*:*", "cpe:2.3:a:ultimaker:ultimaker_cura:5.8.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:ultimaker:ultimaker_cura:5.8.0:beta1_rc1:*:*:*:*:*:*", "cpe:2.3:a:ultimaker:ultimaker_cura:5.8.0:beta1_rc2:*:*:*:*:*:*" ]
null
7.8
null
null
CVE-2017-12263
A vulnerability in the web interface of Cisco License Manager software could allow an unauthenticated, remote attacker to download and view files within the application that should be restricted, aka Directory Traversal. The issue is due to improper sanitization of user-supplied input in HTTP request parameters that describe filenames. An attacker could exploit this vulnerability by using directory traversal techniques to submit a path to a desired file location. An exploit could allow the attacker to view application files that may contain sensitive information. Cisco Bug IDs: CSCvd83577.
[ "cpe:2.3:a:cisco:license_manager:3.2.6:*:*:*:*:*:*:*" ]
null
null
7.5
5
GHSA-q5x8-3vm4-xrh9
.NET Denial of Service Vulnerability
[]
null
7.5
null
null
CVE-2024-44234
The issue was addressed with improved bounds checks. This issue is fixed in macOS Sonoma 14.7.1, macOS Ventura 13.7.1, visionOS 2.1, watchOS 11.1, tvOS 18.1, iOS 17.7.1 and iPadOS 17.7.1, iOS 18.1 and iPadOS 18.1. Parsing a maliciously crafted video file may lead to unexpected system termination.
[ "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:ipados:18.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:18.0:-:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*" ]
null
6.5
null
null
GHSA-7xgj-rr5f-9wv9
The mod_dav_svn Apache HTTPD server module in Subversion 1.6.x through 1.6.20 and 1.7.0 through 1.7.8 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a PROPFIND request for an activity URL.
[]
null
null
null
null
RHSA-2014:1335
Red Hat Security Advisory: python-django-horizon security and bug fix update
openstack-horizon: persistent XSS in Horizon Host Aggregates interface
[ "cpe:/a:redhat:openstack:5::el7" ]
null
null
null
null
CVE-2007-5981
Lantronix SCS3200 does not properly handle public-key requests, which allows remote attackers to cause a denial of service (unresponsive device) via unspecified keyscan requests. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
[ "cpe:2.3:h:lantronix:scs3200:*:*:*:*:*:*:*:*" ]
null
null
null
3.3
GHSA-342w-jw3g-59cj
steghide 0.5.1 relies on a certain 32-bit seed value, which makes it easier for attackers to detect hidden data.
[]
null
7.5
null
null
GHSA-hx54-chxq-7878
Ingenico Telium 2 POS terminals have a buffer overflow via the RemotePutFile command of the NTPT3 protocol. This is fixed in Telium 2 SDK v9.32.03 patch N.
[]
null
null
null
null
GHSA-wfcg-m45x-v8xf
Buffer overflow in the key exchange functionality in Icon Labs Iconfidant SSL Server before 1.3.0 allows remote attackers to execute arbitrary code via a client master key packet in which the sum of unspecified length fields is greater than a certain value.
[]
null
null
null
null
GHSA-75jg-xqjf-hxq8
Multiple PHP remote file inclusion vulnerabilities in interact 2.2, when register_globals is enabled, allow remote attackers to execute arbitrary PHP code via a URL in the (1) CONFIG[BASE_PATH] parameter in (a) admin/autoprompter.php and (b) includes/common.inc.php, and the (2) CONFIG[LANGUAGE_CPATH] parameter in (c) admin/autoprompter.php.
[]
null
null
null
null
CVE-2023-35754
D-Link DAP-2622 DDP Set AG Profile NMS URL Stack-based Buffer Overflow Remote Code Execution Vulnerability
D-Link DAP-2622 DDP Set AG Profile NMS URL Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DAP-2622 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the DDP service. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. . Was ZDI-CAN-20082.
[ "cpe:2.3:o:dlink:dap_2622_firmware:*:*:*:*:*:*:*:*" ]
null
null
8.8
null
GHSA-4545-9hjr-7769
The BOOTPD component in Enterasys NetSight Console 2.1 and NetSight Inventory Manager 2.1, and possibly earlier, on Windows allows remote attackers to cause a denial of service (daemon crash) via a UDP packet that contains an invalid "packet type" field.
[]
null
null
null
null
CVE-2024-2822
DedeCMS vote_edit.php cross-site request forgery
A vulnerability, which was classified as problematic, was found in DedeCMS 5.7. This affects an unknown part of the file /src/dede/vote_edit.php. The manipulation of the argument aid leads to cross-site request forgery. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-257709 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
[ "cpe:2.3:a:dedecms:dedecms:*:*:*:*:*:*:*:*" ]
null
4.3
4.3
5
GHSA-3pxq-4mq2-m2mc
The UPnP IGD implementation in Edimax EdiLinux on the Edimax BR-6104K with firmware before 3.25, Edimax 6114Wg, Canyon-Tech CN-WF512 with firmware 1.83, Canyon-Tech CN-WF514 with firmware 2.08, Sitecom WL-153 with firmware before 1.39, and Sweex LB000021 with firmware 3.15 allows remote attackers to execute arbitrary commands via shell metacharacters.
[]
null
null
null
null
GHSA-93mm-w2p9-c6mq
Projectsworlds Online Shopping System PHP 1.0 is vulnerable to SQL injection via the id parameter in cart_remove.php.
[]
null
null
null
null
CVE-2019-8579
An input validation issue was addressed with improved memory handling. This issue is fixed in macOS Mojave 10.14.4, Security Update 2019-002 High Sierra, Security Update 2019-002 Sierra. An application may be able to gain elevated privileges.
[ "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*" ]
null
7.8
null
4.6
RHSA-2022:1013
Red Hat Security Advisory: Red Hat Integration Camel Extensions for Quarkus 2.2.1 security update
guava: local information disclosure via temporary directory created with unsafe permissions bouncycastle: Timing issue within the EC math library mysql-connector-java: unauthorized access to critical kubernetes-client: Insecure deserialization in unmarshalYaml method protobuf-java: potential DoS in the parsing procedure for binary data maven: Block repositories using http by default jersey: Local information disclosure via system temporary directory jakarta-el: ELParserTokenManager enables invalid EL expressions to be evaluate mina-sshd-core: Memory leak denial of service in Apache Mina SSHD Server netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way xml-security: XPath Transform abuse allows for information disclosure cron-utils: template Injection leading to unauthenticated Remote Code Execution h2: Remote Code Execution in Console
[ "cpe:/a:redhat:camel_quarkus:2.2.1" ]
null
9.8
null
null
GHSA-6ccc-xf3v-r6w3
The mama.cn (aka cn.ziipin.mama.ui) application 1.02 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[]
null
null
null
null
GHSA-8hwp-gqff-c4f8
Unrestricted file upload vulnerability in Collabtive 0.4.8 allows remote authenticated users to execute arbitrary code by uploading a file with an executable extension and using a text/plain MIME type, then accessing it via a direct request to the file in files/, related to (1) the showproject action in managefile.php or (2) the Messages feature.
[]
null
null
null
null
CVE-2012-2010
The ACMELOGIN implementation in HP OpenVMS 8.3 and 8.4 on the Alpha platform, and 8.3, 8.3-1H1, and 8.4 on the Itanium platform, when the SYS$ACM system service is enabled, allows local users to gain privileges via unspecified vectors.
[ "cpe:2.3:o:hp:openvms:8.3:*:*:*:*:*:*:*", "cpe:2.3:o:hp:openvms:8.3:*:alpha:*:*:*:*:*", "cpe:2.3:o:hp:openvms:8.3-1h1:*:integrity_servers:*:*:*:*:*", "cpe:2.3:o:hp:openvms:8.4:*:alpha:*:*:*:*:*", "cpe:2.3:o:hp:openvms:8.4:*:itanium:*:*:*:*:*" ]
null
null
null
6.9
GHSA-wxmm-ppfr-m8cp
Unspecified vulnerability in Oracle Java SE 7u45 and JavaFX 2.2.45 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to JavaFX.
[]
null
null
null
null
GHSA-4rrg-w6rp-6fcw
A remote code execution vulnerability in the Android media framework. Product: Android. Versions: 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2. Android ID: A-33974623.
[]
null
null
7.8
null
GHSA-f9j2-hv33-h2gp
An exploitable local privilege elevation vulnerability exists in the file system permissions of Moxa MXView series 3.1.8 installation. Depending on the vector chosen, an attacker can either add code to a script or replace a binary. By default MXViewService, which starts as a NT SYSTEM authority user executes a series of Node.Js scripts to start additional application functionality.
[]
null
7.8
null
null
CVE-2024-53989
Possible XSS vulnerability with certain configurations of rails-html-sanitizer 1.6.0
rails-html-sanitizer is responsible for sanitizing HTML fragments in Rails applications. There is a possible XSS vulnerability with certain configurations of Rails::HTML::Sanitizer 1.6.0 when used with Rails >= 7.1.0. A possible XSS vulnerability with certain configurations of Rails::HTML::Sanitizer may allow an attacker to inject content if HTML5 sanitization is enabled and the application developer has overridden the sanitizer's allowed tags for the the "noscript" element. This vulnerability is fixed in 1.6.1.
[]
2.3
null
null
null
RHSA-2024:10705
Red Hat Security Advisory: postgresql:12 security update
postgresql: PostgreSQL PL/Perl environment variable changes execute arbitrary code
[ "cpe:/a:redhat:rhel_aus:8.6::appstream", "cpe:/a:redhat:rhel_e4s:8.6::appstream", "cpe:/a:redhat:rhel_tus:8.6::appstream" ]
null
8.8
null
null
GHSA-fc44-mphx-vpc6
Use-after-free vulnerability in ext/spl/spl_dllist.c in the SPL component in PHP through 5.5.14 allows context-dependent attackers to cause a denial of service or possibly have unspecified other impact via crafted iterator usage within applications in certain web-hosting environments.
[]
null
null
null
null
CVE-2024-50465
WordPress Premium SEO Pack plugin <= 1.6.001 - SQL Injection vulnerability
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in WP SEO – Calin Vingan Premium SEO Pack allows SQL Injection.This issue affects Premium SEO Pack: from n/a through 1.6.001.
[ "cpe:2.3:a:squirrly:premium_seo_pack:*:*:*:*:*:wordpress:*:*" ]
null
8.5
null
null
CVE-2008-1035
Use-after-free vulnerability in Apple iCal 3.0.1 on Mac OS X allows remote CalDAV servers, and user-assisted remote attackers, to trigger memory corruption or possibly execute arbitrary code via an "ATTACH;VALUE=URI:S=osumi" line in a .ics file, which triggers a "resource liberation" bug. NOTE: CVE-2008-2007 was originally used for this issue, but this is the appropriate identifier.
[ "cpe:2.3:a:apple:ical:3.0.1:*:os_x:*:*:*:*:*" ]
null
null
null
4.3
GHSA-m893-jcpr-3937
A Stored Cross Site Scripting (XSS) vulnerability exists in Sourcecodtester Hospital's Patient Records Management System 1.0 via the description parameter in room_types.
[]
null
null
null
null
GHSA-w254-6wjf-3v8j
Uebimiau Webmail allows remote attackers to obtain sensitive information via a request to demo/pop3/error.php with an invalid value of the (1) smarty or (2) selected_theme parameter, which reveals the path in various error messages.
[]
null
null
null
null
CVE-2024-57655
An issue in the dfe_n_in_order component of openlink virtuoso-opensource v7.2.11 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
[]
null
7.5
null
null
CVE-2022-49386
net: ethernet: ti: am65-cpsw-nuss: Fix some refcount leaks
In the Linux kernel, the following vulnerability has been resolved: net: ethernet: ti: am65-cpsw-nuss: Fix some refcount leaks of_get_child_by_name() returns a node pointer with refcount incremented, we should use of_node_put() on it when not need anymore. am65_cpsw_init_cpts() and am65_cpsw_nuss_probe() don't release the refcount in error case. Add missing of_node_put() to avoid refcount leak.
[]
null
5.5
null
null
GHSA-p7qv-f46f-46p7
The Visualizations component of TIBCO Software Inc.'s TIBCO Spotfire Analyst, TIBCO Spotfire Analytics Platform for AWS Marketplace, TIBCO Spotfire Deployment Kit, TIBCO Spotfire Desktop, and TIBCO Spotfire Desktop Language Packs contains a vulnerability that theoretically allows an attacker with permission to write DXP files to the Spotfire library to remotely execute code of their choice on the user account of other users who access the affected system. This attack is a risk only when the attacker has write access to a network file system shared with the affected system. Affected releases are TIBCO Software Inc.'s TIBCO Spotfire Analyst: versions 7.11.1 and below, versions 7.12.0, 7.13.0, 7.14.0, 10.0.0, 10.1.0, 10.2.0, 10.3.0, 10.3.1, and 10.3.2, versions 10.4.0, 10.5.0, and 10.6.0, TIBCO Spotfire Analytics Platform for AWS Marketplace: version 10.6.0, TIBCO Spotfire Deployment Kit: versions 7.11.1 and below, TIBCO Spotfire Desktop: versions 7.11.1 and below, versions 7.12.0, 7.13.0, 7.14.0, 10.0.0, 10.1.0, 10.2.0, 10.3.0, 10.3.1, and 10.3.2, versions 10.4.0, 10.5.0, and 10.6.0, and TIBCO Spotfire Desktop Language Packs: versions 7.11.1 and below.
[]
null
null
null
null
GHSA-r9p6-cffj-3xwp
Vulnerability in the Oracle Access Manager product of Oracle Fusion Middleware (component: Federation). Supported versions that are affected are 11.1.2.3.0 and 12.2.1.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Access Manager. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Access Manager. CVSS 3.0 Base Score 4.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L).
[]
null
null
null
null
GHSA-g2v3-62rj-h6p6
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 7.0.16. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H).
[]
null
6.5
null
null
GHSA-2cj3-wx97-62jm
The Process Steps Template Designer plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.2.1. This is due to missing or incorrect nonce validation on the save() function. This makes it possible for unauthenticated attackers to save field icons via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
[]
null
4.3
null
null
GHSA-7397-v773-mg5p
Missing authentication for the remote configuration port 1236/tcp on the Cohu 3960HD allows an attacker to change configuration parameters such as IP address and username/password via specially crafted XML SOAP packets.
[]
null
null
9.8
null
CVE-2005-2041
Buffer overflow in addschup in HAURI ViRobot 2.0, and possibly other products, allows remote attackers to execute arbitrary code via a long ViRobot_ID cookie (HTTP_COOKIE).
[ "cpe:2.3:a:hauri:virobot_linux_server:2.0:*:*:*:*:*:*:*" ]
null
null
null
5
CVE-2023-41953
WordPress ProfilePress plugin <= 4.13.1 - Broken Access Control vulnerability
Missing Authorization vulnerability in ProfilePress Membership Team ProfilePress.This issue affects ProfilePress: from n/a through 4.13.1.
[ "cpe:2.3:a:profilepress:profilepress:*:*:*:*:pro:wordpress:*:*" ]
null
5.3
null
null
RHSA-2024:1941
Red Hat Security Advisory: thunderbird security update
Mozilla: Permission prompt input delay could expire when not in focus Mozilla: Denial of Service using HTTP/2 CONTINUATION frames Mozilla: GetBoundName in the JIT returned the wrong object Mozilla: Out-of-bounds-read after mis-optimized switch statement Mozilla: Incorrect JITting of arguments led to use-after-free during garbage collection Mozilla: Integer-overflow led to out-of-bounds-read in the OpenType sanitizer Mozilla: Potential use-after-free due to AlignedBuffer self-move Mozilla: Memory safety bug fixed in Firefox 125, Firefox ESR 115.10, and Thunderbird 115.10
[ "cpe:/a:redhat:rhel_eus:9.2::appstream" ]
null
7.5
null
null
GHSA-wgvx-9rh5-4g4m
Jenkins Benchmark Evaluator Plugin vulnerable to cross-site request forgery
Jenkins Benchmark Evaluator Plugin 1.0.1 and earlier does not perform a permission check in a method implementing form validation.This allows attackers with Overall/Read permission to connect to an attacker-specified URL and to check for the existence of directories, `.csv`, and `.ycsb` files on the Jenkins controller file system.Additionally, this form validation method does not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability.
[]
null
8.8
null
null
GHSA-wh82-w6g6-vr7h
Integer signedness error in the oz_hcd_get_desc_cnf function in drivers/staging/ozwpan/ozhcd.c in the OZWPAN driver in the Linux kernel through 4.0.5 allows remote attackers to cause a denial of service (system crash) or possibly execute arbitrary code via a crafted packet.
[]
null
null
null
null
GHSA-r6qf-x4mq-x26g
Heap-based buffer overflow in the flx_decode_delta_fli function in gst/flx/gstflxdec.c in the FLIC decoder in GStreamer before 1.10.2 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) by providing a 'skip count' that goes beyond initialized buffer.
[]
null
null
9.8
null
GHSA-x75j-f3wm-2gwg
An issue was discovered in certain Apple products. iOS before 10.3 is affected. macOS before 10.12.4 is affected. tvOS before 10.2 is affected. watchOS before 3.2 is affected. The issue involves the "Kernel" component. A buffer overflow allows attackers to execute arbitrary code in a privileged context via a crafted app.
[]
null
null
7.8
null
GHSA-33mg-w6qx-r88m
Huawei DP300 V500R002C00, RP200 V500R002C00, V600R006C00, TE30 V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C10, V500R002C00, V600R006C00 have a out-of-bounds read vulnerability. Due to insufficient input validation, an authenticated, remote attacker could send malformed SOAP packets to the target device. Successful exploit could make the device access invalid memory and might reset a process.
[]
null
null
4.3
null
GHSA-x2h2-gcv9-w3gx
A vulnerability has been identified in Solid Edge SE2023 (All versions < V223.0 Update 7). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted PSM files. This could allow an attacker to execute code in the context of the current process.
[]
null
7.8
null
null
GHSA-7vmr-cgfv-q59w
Google Chrome before 15.0.874.102 does not properly handle javascript: URLs, which allows remote attackers to bypass intended access restrictions and read cookies via unspecified vectors.
[]
null
null
null
null
CVE-2022-25413
Maxsite CMS v108 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the parameter f_tags at /admin/page_edit/3.
[ "cpe:2.3:a:max-3000:maxsite_cms:108:*:*:*:*:*:*:*" ]
null
5.4
null
3.5
CVE-2016-2870
Buffer overflow in the CLI on IBM WebSphere DataPower XC10 appliances 2.1 and 2.5 allows remote authenticated users to cause a denial of service via unspecified vectors.
[ "cpe:2.3:o:ibm:websphere_datapower_xc10_appliance_firmware:2.1:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:websphere_datapower_xc10_appliance_firmware:2.5:*:*:*:*:*:*:*", "cpe:2.3:h:ibm:websphere_datapower_xc10_appliance:-:*:*:*:*:*:*:*" ]
null
null
2.7
5
CVE-2013-6206
Unspecified vulnerability in HP Rapid Deployment Pack (RDP) and Insight Control Server Deployment allows remote attackers to obtain sensitive information, modify data, or cause a denial of service via unknown vectors.
[ "cpe:2.3:a:hp:insight_control_server_deployment:-:*:*:*:*:*:*:*", "cpe:2.3:a:hp:rapid_deployment_pack:-:*:*:*:*:*:*:*" ]
null
null
null
9
CVE-2025-0172
code-projects Chat System deleteroom.php sql injection
A vulnerability has been found in code-projects Chat System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /admin/deleteroom.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
[]
5.3
6.3
6.3
6.5
CVE-2004-0594
The memory_limit functionality in PHP 4.x up to 4.3.7, and 5.x up to 5.0.0RC3, under certain conditions such as when register_globals is enabled, allows remote attackers to execute arbitrary code by triggering a memory_limit abort during execution of the zend_hash_init function and overwriting a HashTable destructor pointer before the initialization of key data structures is complete.
[ "cpe:2.3:a:openpkg:openpkg:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:openpkg:openpkg:2.1:*:*:*:*:*:*:*", "cpe:2.3:h:avaya:converged_communications_server:2.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*", "cpe:2.3:o:hp:hp-ux:b.11.00:*:*:*:*:*:*:*", "cpe:2.3:o:hp:hp-ux:b.11.11:*:*:*:*:*:*:*", "cpe:2.3:o:hp:hp-ux:b.11.22:*:*:*:*:*:*:*", "cpe:2.3:o:hp:hp-ux:b.11.23:*:*:*:*:*:*:*", "cpe:2.3:o:trustix:secure_linux:1.5:*:*:*:*:*:*:*", "cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*", "cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.0.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.0.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.0.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.0.0:beta4:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.0.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.0.0:rc2:*:*:*:*:*:*" ]
null
null
null
5.1
GHSA-g2vw-843m-4hr9
The convert.bas program in the Novell web server allows a remote attackers to read any file on the system that is internally accessible by the web server.
[]
null
null
null
null
CVE-2012-4923
Multiple cross-site scripting (XSS) vulnerabilities in Endian Firewall 2.4 allow remote attackers to inject arbitrary web script or HTML via the (1) createrule parameter to dnat.cgi, (2) addrule parameter to dansguardian.cgi, or (3) PATH_INFO to openvpn_users.cgi.
[ "cpe:2.3:a:endian:firewall:2.4:*:*:*:*:*:*:*" ]
null
null
null
4.3
CVE-2017-2965
Adobe Acrobat Reader versions 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier have an exploitable memory corruption vulnerability in the image conversion engine, related to TIFF file parsing. Successful exploitation could lead to arbitrary code execution.
[ "cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:reader:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*" ]
null
null
7.8
9.3
RHSA-2025:1130
Red Hat Security Advisory: OpenShift Container Platform 4.15.45 packages and security update
jinja2: Jinja has a sandbox breakout through malicious filenames jinja2: Jinja has a sandbox breakout through indirect reference to format method
[ "cpe:/a:redhat:openshift:4.15::el8", "cpe:/a:redhat:openshift:4.15::el9", "cpe:/a:redhat:openshift_ironic:4.15::el9" ]
null
6.3
null
null
CVE-2023-38306
An issue was discovered in Webmin 2.021. A Cross-site Scripting (XSS) Bypass vulnerability was discovered in the file upload functionality. Normally, the application restricts the upload of certain file types such as .svg, .php, etc., and displays an error message if a prohibited file type is detected. However, by following certain steps, an attacker can bypass these restrictions and inject malicious code.
[ "cpe:2.3:a:webmin:webmin:2.021:*:*:*:*:*:*:*" ]
null
6.1
null
null
GHSA-4w29-23fj-v8v5
Certain NETGEAR devices are affected by incorrect configuration of security settings. This affects R7500v2 before 1.0.3.20, R7800 before 1.0.2.38, WN3000RPv3 before 1.0.2.50, WNDR4300v2 before 1.0.0.50, and WNDR4500v3 before 1.0.0.50.
[]
null
null
null
null
CVE-2024-37490
WordPress Bard theme <= 2.210 - Cross Site Request Forgery (CSRF) vulnerability
Cross-Site Request Forgery (CSRF) vulnerability in WP Royal Bard allows Cross Site Request Forgery.This issue affects Bard: from n/a through 2.210.
[]
null
4.3
null
null
CVE-2016-1176
Buffer overflow in the ActiveX control in Sharp EVA Animeter allows remote attackers to execute arbitrary code via a crafted web page.
[ "cpe:2.3:a:sharp:eva_animator:-:*:*:*:*:*:*:*" ]
null
null
6.3
6.8
CVE-2010-3957
Double free vulnerability in the OpenType Font (OTF) driver in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 allows local users to gain privileges via a crafted OpenType font, aka "OpenType Font Double Free Vulnerability."
[ "cpe:2.3:o:microsoft:windows_2003_server:*:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2003_server:*:sp2:itanium:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:*:itanium:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:*:x32:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:*:x64:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:r2:itanium:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:r2:x64:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x32:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:itanium:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:*" ]
null
7.3
null
6.9
RHSA-2022:0237
Red Hat Security Advisory: Red Hat OpenStack Platform 16.2 (etcd) security update
golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet golang: crypto/tls: certificate of wrong type is causing TLS client to panic golang: net/http: limit growth of header canonicalization cache
[ "cpe:/a:redhat:openstack:16.2::el8" ]
null
7.5
null
null
CVE-2000-0652
IBM WebSphere allows remote attackers to read source code for executable web files by directly calling the default InvokerServlet using a URL which contains the "/servlet/file" string.
[ "cpe:2.3:a:ibm:websphere_application_server:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:3.0.21:*:*:*:*:*:*:*" ]
null
null
null
5
GHSA-x52f-h74p-9jh8
node-sqlite is malware
The `node-sqlite` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.All versions have been unpublished from the npm registry.RecommendationAs this package is malware, if you find it installed in your environment, the real security concern is determining how it got there.If you have found this installed in your environment, you should:Delete the packageClear your npm cacheEnsure it is not present in any other package.json files on your systemRegenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables.Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
[]
null
null
7.5
null
CVE-2007-1603
admin/contest.php in Weekly Drawing Contest 0.0.1 allows remote attackers to bypass authentication, and insert new contest information into a database, via a direct POST request.
[ "cpe:2.3:a:weekly_drawing_contest:weekly_drawing_contest:0.0.1:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2024-27372
An issue was discovered in Samsung Mobile Processor Exynos 980, Exynos 850, Exynos 1280, Exynos 1380, and Exynos 1330. In the function slsi_nan_config_get_nl_params(), there is no input validation check on disc_attr->infrastructure_ssid_len coming from userspace, which can lead to a heap overwrite.
[ "cpe:2.3:o:samsung:exynos_850_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:samsung:exynos_980_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:samsung:exynos_1280_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:samsung:exynos_1380_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:samsung:exynos_1330_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:samsung:exynos_980_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:samsung:exynos_980:-:*:*:*:*:*:*:*", "cpe:2.3:o:samsung:exynos_850_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:samsung:exynos_850:-:*:*:*:*:*:*:*", "cpe:2.3:o:samsung:exynos_1280_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:samsung:exynos_1280:-:*:*:*:*:*:*:*", "cpe:2.3:o:samsung:exynos_1380_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:samsung:exynos_1380:-:*:*:*:*:*:*:*", "cpe:2.3:o:samsung:exynos_1330_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:samsung:exynos_1330:-:*:*:*:*:*:*:*" ]
null
6.7
null
null
GHSA-q87w-hjgf-6vfw
Insertion of debug information into log file during building the elastic search index allows reading of sensitive information from articles.This issue affects OTRS: from 7.0.X through 7.0.48, from 8.0.X through 8.0.37, from 2023.X through 2023.1.1.
[]
null
4.9
null
null
GHSA-qjxf-mc72-wjr2
Devise-Two-Factor Authentication Uses Insufficient Default OTP Shared Secret Length
SummaryUnder the default configuration, Devise-Two-Factor versions 1.0.0 or >= 4.0.0 & < 6.0.0 generate TOTP shared secrets that are 120 bits instead of the 128-bit minimum defined by [RFC 4226](https://datatracker.ietf.org/doc/html/rfc4226). Using a shared secret shorter than the minimum to generate a multi-factor authentication code could make it easier for an attacker to guess the shared secret and generate valid TOTP codes.RemediationDevise-Two-Factor should be upgraded to version v6.0.0 as soon as possible. After upgrading, the length of shared secrets and TOTP URLs generated by the library will increase since the new shared secrets will be longer.If upgrading is not possible, you can override the default `otp_secret_length` attribute in the model when configuring `two_factor_authenticable` and set it to a value of at least 26 to ensure newly generated shared secrets are at least 128-bits long.After upgrading or implementing the workaround, applications using Devise-Two-Factor may wish to migrate users to the new OTP length to provide increased protection for those accounts. Turning off OTP for users by setting `otp_required_for_login` to false is not recommended since it would leave accounts unprotected. However, you may wish to implement application logic that checks the length of a user's shared secret and prompts users to re-enroll in OTP.BackgroundDevise-Two-Factor uses [ROTP](https://github.com/mdp/rotp) to generate shared secrets for TOTP. In ROTP < 5.0.0, the first argument to the `ROTP::Base32#random_base32` function represented the number of bytes to read from SecureRandom which were then returned as a base32-encoded string. In ROTP 5.1.0, this function was changed so that the first argument now represents the length of the base32-encoded string returned by the function instead of the number of bytes to read from SecureRandom resulting in a shorter key being generated for the same input value. (https://github.com/mdp/rotp/commit/15d5104e3cb99f97d36c772f8f09cf7e2e77de20).
[]
6
5.3
null
null
cisco-sa-ftd-statcred-dFC8tXT5
Cisco Firepower Threat Defense Software for Firepower 1000, 2100, 3100, and 4200 Series Static Credential Vulnerability
A vulnerability in Cisco Firepower Threat Defense (FTD) Software for Cisco Firepower 1000, 2100, 3100, and 4200 Series could allow an unauthenticated, local attacker to access an affected system using static credentials. This vulnerability is due to the presence of static accounts with hard-coded passwords on an affected system. An attacker could exploit this vulnerability by logging in to the CLI of an affected device with these credentials. A successful exploit could allow the attacker to access the affected system and retrieve sensitive information, perform limited troubleshooting actions, modify some configuration options, or render the device unable to boot to the operating system, requiring a reimage of the device. Cisco has released software updates that address this vulnerability. There are workarounds that address this vulnerability. This advisory is part of the October 2024 release of the Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: October 2024 Semiannual Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication ["https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75300"].
[]
null
9.3
null
null
CVE-2021-43858
User privilege escalation in MinIO
MinIO is a Kubernetes native application for cloud storage. Prior to version `RELEASE.2021-12-27T07-23-18Z`, a malicious client can hand-craft an HTTP API call that allows for updating policy for a user and gaining higher privileges. The patch in version `RELEASE.2021-12-27T07-23-18Z` changes the accepted request body type and removes the ability to apply policy changes through this API. There is a workaround for this vulnerability: Changing passwords can be disabled by adding an explicit `Deny` rule to disable the API for users.
[ "cpe:2.3:a:minio:minio:*:*:*:*:*:*:*:*" ]
null
8.8
null
null
GHSA-w3xp-69rr-q6gw
A select option could partially obscure security prompts. This could be used by a malicious site to trick a user into granting permissions. *This issue only affects Android versions of Firefox.* This vulnerability affects Firefox < 129.
[]
null
8.1
null
null