id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
139k
cpes
sequencelengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
GHSA-vr57-f797-cqc5
The avatar upload feature in affected versions of Atlassian Jira Server and Data Center allows remote attackers to achieve Denial of Service via a crafted PNG file. The affected versions are before version 8.5.4, from version 8.6.0 before 8.6.2, and from version 8.7.0 before 8.7.1.
[]
null
6.5
null
null
CVE-2024-30050
Windows Mark of the Web Security Feature Bypass Vulnerability
Windows Mark of the Web Security Feature Bypass Vulnerability
[ "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*" ]
null
5.4
null
null
CVE-2013-1822
Multiple cross-site scripting (XSS) vulnerabilities in ownCloud 4.5.x before 4.5.8 allow remote authenticated users with administrator privileges to inject arbitrary web script or HTML via the (1) quota parameter to /core/settings/ajax/setquota.php, or remote authenticated users with group admin privileges to inject arbitrary web script or HTML via the (2) group field to settings.php or (3) "share with" field.
[ "cpe:2.3:a:owncloud:owncloud:4.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:4.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:4.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:4.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:4.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:4.5.5:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:4.5.6:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:4.5.7:*:*:*:*:*:*:*" ]
null
null
null
2.1
GHSA-rrvv-g9v3-737h
A stack-based buffer overflow in Fortinet FortiWeb version 6.3.14 and below, 6.2.4 and below allows attacker to execute unauthorized code or commands via crafted parameters in CLI command execution
[]
null
null
null
null
GHSA-gppm-h73v-3rx6
Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 12.1, tvOS 12.1, watchOS 5.1, Safari 12.0.1, iTunes 12.9.1, iCloud for Windows 7.8.
[]
null
null
8.8
null
GHSA-vjc4-8cmg-4xxh
A configuration issue in Indexhibit 2.1.5 allows authenticated attackers to modify .php files, leading to getshell.
[]
null
null
null
null
GHSA-vm9x-63j8-h9j9
SQL injection vulnerability in mod_auth_mysql.c in the mod-auth-mysql (aka libapache2-mod-auth-mysql) module for the Apache HTTP Server 2.x, when configured to use a multibyte character set that allows a \ (backslash) as part of the character encoding, allows remote attackers to execute arbitrary SQL commands via unspecified inputs in a login request.
[]
null
null
null
null
CVE-2022-48363
In MPD before 0.23.8, as used on Automotive Grade Linux and other platforms, the PipeWire output plugin mishandles a Drain call in certain situations involving truncated files. Eventually there is an assertion failure in libmpdclient because libqtappfw passes in a NULL pointer.
[ "cpe:2.3:a:linuxfoundation:automotive_grade_linux:*:*:*:*:*:*:*:*" ]
null
7.5
null
null
CVE-2007-3286
Multiple buffer overflows in unspecified ActiveX controls in COM objects in Avaya IP Softphone R5.2 before SP3, and R6.0, allow remote attackers to execute arbitrary code via unspecified vectors.
[ "cpe:2.3:a:avaya:ip_soft_phone:*:sp2:*:*:*:*:*:*", "cpe:2.3:a:avaya:ip_soft_phone:6.0:*:*:*:*:*:*:*" ]
null
null
null
6.8
CVE-2022-43393
An improper check for unusual or exceptional conditions in the HTTP request processing function of Zyxel GS1920-24v2 firmware prior to V4.70(ABMH.8)C0, which could allow an unauthenticated attacker to corrupt the contents of the memory and result in a denial-of-service (DoS) condition on a vulnerable device.
[ "cpe:2.3:o:zyxel:gs1350-6hp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:gs1350-6hp:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:gs1350-12hp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:gs1350-12hp:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:gs1350-18hp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:gs1350-18hp:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:gs1350-26hp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:gs1350-26hp:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:gs1915-8_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:gs1915-8:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:gs1915-8ep_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:gs1915-8ep:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:gs1915-24e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:gs1915-24e:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:gs1915-24ep_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:gs1915-24ep:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:gs1920-24v2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:gs1920-24v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:gs1920-48v2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:gs1920-48v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:gs1920-24hpv2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:gs1920-24hpv2:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:gs1920-48hpv2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:gs1920-48hpv2:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:gs2220-10_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:gs2220-10:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:gs2220-28_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:gs2220-28:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:gs2220-50_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:gs2220-50:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:gs2220-10hp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:gs2220-10hp:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:gs2220-28hp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:gs2220-28hp:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:gs2220-50hp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:gs2220-50hp:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:xgs1930-28_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:xgs1930-28:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:xgs1930-28hp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:xgs1930-28hp:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:xgs1930-52_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:xgs1930-52:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:xgs1930-52hp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:xgs1930-52hp:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:xs1930-10_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:xs1930-10:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:xs1930-12hp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:xs1930-12hp:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:xs1930-12f_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:xs1930-12f:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:xgs2210-28_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:xgs2210-28:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:xgs2210-52_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:xgs2210-52:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:xgs2210-28hp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:xgs2210-28hp:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:xgs2210-52hp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:xgs2210-52hp:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:xgs2220-30_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:xgs2220-30:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:xgs2220-30hp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:xgs2220-30hp:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:xgs2220-30f_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:xgs2220-30f:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:xgs2220-54_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:xgs2220-54:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:xgs2220-54hp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:xgs2220-54hp:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:xgs2220-54fp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:xgs2220-54fp:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:xgs4600-32_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:xgs4600-32:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:xgs4600-32f_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:xgs4600-32f:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:xgs4600-52f_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:xgs4600-52f:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:xmg1930-30_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:xmg1930-30:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:xmg1930-30hp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:xmg1930-30hp:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:xs3800-28_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:xs3800-28:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:mgs3500-24s_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:mgs3500-24s:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:mgs3520-28_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:mgs3520-28_firmware:4.10\\(abqm.1\\)c0:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:mgs3520-28:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:mgs3520-28f_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:mgs3520-28f:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:mgs3530-28_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:mgs3530-28_firmware:4.10\\(acfj.0\\)c0:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:mgs3530-28:-:*:*:*:*:*:*:*" ]
null
8.2
null
null
CVE-2022-20190
Product: AndroidVersions: Android kernelAndroid ID: A-208744915References: N/A
[ "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*" ]
null
7.5
null
7.8
GHSA-3qw6-xf3r-vm35
Cross-site request forgery (CSRF) vulnerability in RunCMS 1.6.1 allows remote attackers to hijack the authentication of administrators for requests that (1) add new administrators or (2) modify user profiles via a crafted request to system/admin.php.
[]
null
null
null
null
CVE-2016-4008
The _asn1_extract_der_octet function in lib/decoding.c in GNU Libtasn1 before 4.8, when used without the ASN1_DECODE_FLAG_STRICT_DER flag, allows remote attackers to cause a denial of service (infinite recursion) via a crafted certificate.
[ "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:libtasn1:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:*" ]
null
null
5.9
4.3
GHSA-9gfq-v95v-9hrx
The vds_installer in Red Hat Enterprise Virtualization Manager (RHEV-M) before 3.1, when adding a host, uses the -k curl parameter when downloading deployUtil.py and vds_bootstrap.py, which prevents SSL certificates from being validated and allows remote attackers to execute arbitrary Python code via a man-in-the-middle attack.
[]
null
null
null
null
CVE-2004-0717
Opera 7.51 for Windows and 7.50 for Linux does not properly prevent a frame in one domain from injecting content into a frame that belongs to another domain, which facilitates web site spoofing and other attacks, aka the frame injection vulnerability.
[ "cpe:2.3:a:opera:opera_browser:7.50:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.51:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2022-45083
WordPress ProfilePress Plugin <= 4.3.2 is vulnerable to PHP Object Injection
Deserialization of Untrusted Data vulnerability in ProfilePress Membership Team Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content – ProfilePress.This issue affects Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content – ProfilePress: from n/a through 4.3.2.
[ "cpe:2.3:a:properfraction:profilepress:*:*:*:*:*:wordpress:*:*" ]
null
6.6
null
null
GHSA-2c5h-8vr9-5p47
A vulnerability was found in FeiFeiCMS 2.7.130201. It has been classified as problematic. This affects an unknown part of the file \Public\system\slide_add.html of the component Extension Tool. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-223557 was assigned to this vulnerability.
[]
null
5.4
null
null
CVE-2009-3059
Multiple SQL injection vulnerabilities in Joker Board (aka JBoard) 2.0 and earlier allow remote attackers to execute arbitrary SQL commands via (1) core/select.php or (2) the city parameter to top_add.inc.php, reachable through sboard.php.
[ "cpe:2.3:a:allpublication:jboard:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2022-31163
TZInfo relative path traversal vulnerability allows loading of arbitrary files
TZInfo is a Ruby library that provides access to time zone data and allows times to be converted using time zone rules. Versions prior to 0.36.1, as well as those prior to 1.2.10 when used with the Ruby data source tzinfo-data, are vulnerable to relative path traversal. With the Ruby data source, time zones are defined in Ruby files. There is one file per time zone. Time zone files are loaded with `require` on demand. In the affected versions, `TZInfo::Timezone.get` fails to validate time zone identifiers correctly, allowing a new line character within the identifier. With Ruby version 1.9.3 and later, `TZInfo::Timezone.get` can be made to load unintended files with `require`, executing them within the Ruby process. Versions 0.3.61 and 1.2.10 include fixes to correctly validate time zone identifiers. Versions 2.0.0 and later are not vulnerable. Version 0.3.61 can still load arbitrary files from the Ruby load path if their name follows the rules for a valid time zone identifier and the file has a prefix of `tzinfo/definition` within a directory in the load path. Applications should ensure that untrusted files are not placed in a directory on the load path. As a workaround, the time zone identifier can be validated before passing to `TZInfo::Timezone.get` by ensuring it matches the regular expression `\A[A-Za-z0-9+\-_]+(?:\/[A-Za-z0-9+\-_]+)*\z`.
[ "cpe:2.3:a:tzinfo_project:tzinfo:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*" ]
null
7.5
null
null
GHSA-gwp7-6x23-ww9g
Multiple "javascript vulerabilities in BB code" in BirdBlog before 1.3.1 allow remote attackers to inject arbitrary Javascript.
[]
null
null
null
null
CVE-2013-4883
Multiple cross-site scripting (XSS) vulnerabilities in McAfee ePolicy Orchestrator 4.6.6 and earlier, and the ePO Extension for the McAfee Agent (MA) 4.5 through 4.6, allow remote attackers to inject arbitrary web script or HTML via the (1) instanceId parameter core/loadDisplayType.do; (2) instanceId or (3) monitorUrl parameter to console/createDashboardContainer.do; uid parameter to (4) ComputerMgmt/sysDetPanelBoolPie.do or (5) ComputerMgmt/sysDetPanelSummary.do; (6) uid, (7) orion.user.security.token, or (8) ajaxMode parameter to ComputerMgmt/sysDetPanelQry.do; or (9) uid, (10) orion.user.security.token, or (11) ajaxMode parameter to ComputerMgmt/sysDetPanelSummary.do.
[ "cpe:2.3:a:mcafee:epolicy_orchestrator:*:*:*:*:*:*:*:*", "cpe:2.3:a:mcafee:epolicy_orchestrator:4.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:mcafee:epolicy_orchestrator:4.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:mcafee:epolicy_orchestrator:4.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:mcafee:epolicy_orchestrator:4.6.3:*:*:*:*:*:*:*", "cpe:2.3:a:mcafee:epolicy_orchestrator:4.6.4:*:*:*:*:*:*:*", "cpe:2.3:a:mcafee:epolicy_orchestrator:4.6.5:*:*:*:*:*:*:*", "cpe:2.3:a:mcafee:epolicy_orchestrator_agent:4.5:*:*:*:*:*:*:*", "cpe:2.3:a:mcafee:epolicy_orchestrator_agent:4.6:*:*:*:*:*:*:*" ]
null
null
null
4.3
CVE-2009-3133
Microsoft Office Excel 2002 SP3, Office 2004 and 2008 for Mac, and Open XML File Format Converter for Mac allow remote attackers to execute arbitrary code via a spreadsheet containing a malformed object that triggers memory corruption, related to "loading Excel records," aka "Excel Document Parsing Memory Corruption Vulnerability."
[ "cpe:2.3:a:microsoft:compatibility_pack_word_excel_powerpoint:2007:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:compatibility_pack_word_excel_powerpoint:2007:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:excel:2002:sp3:*:*:*:*:*:*", "cpe:2.3:a:microsoft:excel:2003:sp3:*:*:*:*:*:*", "cpe:2.3:a:microsoft:excel:2007:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:excel:2007:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:excel_viewer:*:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:excel_viewer:*:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:excel_viewer:2003:sp3:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2004:*:mac:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2008:*:mac:*:*:*:*:*", "cpe:2.3:a:microsoft:open_xml_file_format_converter:*:*:mac:*:*:*:*:*" ]
null
null
null
9.3
GHSA-652h-xwhf-q4h6
OS Command Injection in ssh2
ssh2 is client and server modules written in pure JavaScript for node.js. In ssh2 before version 1.4.0 there is a command injection vulnerability. The issue only exists on Windows. This issue may lead to remote code execution if a client of the library calls the vulnerable method with untrusted input. This is fixed in version 1.4.0.
[]
null
7.5
null
null
RHSA-2016:2082
Red Hat Security Advisory: Red Hat Storage Console 2 security and bug fix update
rhscon-ceph: password leak by command line parameter
[ "cpe:/a:redhat:rhscon:2::el7" ]
null
null
4.8
null
GHSA-rvh8-75gg-f2cc
Zohocorp ManageEngine ADAudit Plus versions below 8110 are vulnerable to authenticated SQL Injection in attack surface analyzer's dashboard.
[]
null
8.3
null
null
CVE-2018-15710
Nagios XI 5.5.6 allows local authenticated attackers to escalate privileges to root via Autodiscover_new.php.
[ "cpe:2.3:a:nagios:nagios_xi:5.5.6:*:*:*:*:*:*:*" ]
null
null
7.8
7.2
GHSA-fx4x-h2gf-2w4f
Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK & Compiler before 20.0.0.204 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-8045, CVE-2015-8047, CVE-2015-8408, CVE-2015-8416, CVE-2015-8417, CVE-2015-8418, CVE-2015-8419, CVE-2015-8443, CVE-2015-8444, CVE-2015-8451, and CVE-2015-8455.
[]
null
null
null
null
CVE-2022-2365
Cross-site Scripting (XSS) - Stored in zadam/trilium
Cross-site Scripting (XSS) - Stored in GitHub repository zadam/trilium prior to 0.53.3.
[ "cpe:2.3:a:trilium_project:trilium:*:*:*:*:*:*:*:*" ]
null
null
4
null
GHSA-4836-xwrp-jpv6
Cross-site scripting (XSS) vulnerability in Open Ticket Request System (OTRS) Help Desk 2.4.x before 2.4.15, 3.0.x before 3.0.17, and 3.1.x before 3.1.11 allows remote attackers to inject arbitrary web script or HTML via an e-mail message body with whitespace before a javascript: URL in the SRC attribute of an element, as demonstrated by an IFRAME element.
[]
null
null
null
null
cisco-sa-20180905-webex-pe
Cisco Webex Meetings Client for Windows Privilege Escalation Vulnerability
A vulnerability in the folder permissions of Cisco Webex Meetings client for Windows could allow an authenticated, local attacker to modify locally stored files and execute code on a targeted device with the privilege level of the user. The vulnerability is due to folder permissions that grant a user the permission to read, write, and execute files in the Webex folders. An attacker could exploit this vulnerability to write malicious files to the Webex client directory, affecting all other users of the targeted device. A successful exploit could allow a user to execute commands with elevated privileges. Attacks on single-user systems are less likely to occur, as the attack must be carried out by the user on the user's own system. Multiuser systems have a higher risk of exploitation because folder permissions have an impact on all users of the device. For an attacker to exploit this vulnerability successfully, a second user must execute the locally installed malicious file to allow remote code execution to occur. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180905-webex-pe ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180905-webex-pe"]
[]
null
null
7.3
null
CVE-2017-15089
It was found that the Hotrod client in Infinispan before 9.2.0.CR1 would unsafely read deserialized data on information from the cache. An authenticated attacker could inject a malicious object into the data cache and attain deserialization on the client, and possibly conduct further attacks.
[ "cpe:2.3:a:infinispan:infinispan:*:*:*:*:*:*:*:*", "cpe:2.3:a:infinispan:infinispan:9.2.0:alpha1:*:*:*:*:*:*", "cpe:2.3:a:infinispan:infinispan:9.2.0:alpha2:*:*:*:*:*:*", "cpe:2.3:a:infinispan:infinispan:9.2.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:infinispan:infinispan:9.2.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:infinispan:infinispan:9.2.0:cr1:*:*:*:*:*:*" ]
null
null
8.8
6.5
CVE-2021-23928
OX App Suite through 7.10.3 allows XSS via the ajax/apps/manifests query string.
[ "cpe:2.3:a:open-xchange:open-xchange_appsuite:*:*:*:*:*:*:*:*" ]
null
6.1
null
4.3
GHSA-26jj-qj2r-hxmv
Logical vulnerability in the mobile application (com.transsion.carlcare) may lead to user information leakage risks.
[]
null
7.5
null
null
CVE-2011-1849
tftpserver.exe in HP Intelligent Management Center (IMC) 5.0 before E0101L02 allows remote attackers to create or overwrite files, and subsequently execute arbitrary code, via a crafted WRQ request.
[ "cpe:2.3:a:hp:intelligent_management_center:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:hp:intelligent_management_center:5.0:e0101:*:*:*:*:*:*", "cpe:2.3:a:hp:intelligent_management_center:5.0:e0101l01:*:*:*:*:*:*" ]
null
null
null
10
CVE-2022-21460
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Logging). Supported versions that are affected are 5.7.37 and prior and 8.0.28 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data. CVSS 3.1 Base Score 4.4 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N).
[ "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*", "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*", "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*" ]
null
4.4
null
null
CVE-2018-5203
DEXTUploadX5 version Between 1.0.0.0 and 2.2.0.0 contains a vulnerability that could allow remote attacker to download and execute remote arbitrary file by setting the arguments to the activex method. this can be leveraged for code execution.
[ "cpe:2.3:a:dextsolution:dextuploadx5:*:*:*:*:*:*:*:*" ]
null
null
9.8
7.5
GHSA-xcc9-7f55-xfmj
In updateUidProcState of AppOpsService.java, there is a possible permission bypass due to a logic error. This could lead to local information disclosure of location data with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-148180766
[]
null
null
null
null
CVE-2024-3704
SQL Injection vulnerability in OpenGnsys
SQL Injection Vulnerability has been found on OpenGnsys product affecting version 1.1.1d (Espeto). This vulnerability allows an attacker to inject malicious SQL code into login page to bypass it or even retrieve all the information stored in the database.
[ "cpe:2.3:a:opengnsys:opengnsys:*:*:*:*:*:*:*:*" ]
null
9.8
null
null
CVE-2023-51390
Information Disclosure Vulnerability in Journalpump
journalpump is a daemon that takes log messages from journald and pumps them to a given output. A logging vulnerability was found in journalpump which logs out the configuration of a service integration in plaintext to the supplied logging pipeline, including credential information contained in the configuration if any. The problem has been patched in journalpump 2.5.0.
[ "cpe:2.3:a:aiven:journalpump:*:*:*:*:*:*:*:*" ]
null
6.5
null
null
GHSA-4q2j-4mf3-x29x
Symantec Endpoint Protection, prior to 14.2 RU2, may be susceptible to an unsigned code execution vulnerability, which may allow an individual to execute code without a resident proper digital signature.
[]
null
null
null
null
GHSA-v9qw-g4pq-87mj
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an authenticated, remote attacker to execute arbitrary code on an affected device or cause the device to restart unexpectedly, resulting in a denial of service (DoS) condition. These vulnerabilities are due to insufficient validation of user fields within incoming HTTP packets. An attacker could exploit these vulnerabilities by sending a crafted request to the web-based management interface. A successful exploit could allow the attacker to execute arbitrary commands on an affected device with root-level privileges or to cause the device to restart unexpectedly, resulting in a DoS condition. To exploit these vulnerabilities, an attacker would need to have valid Administrator credentials on the affected device. Cisco has not released software updates that address these vulnerabilities.
[]
null
7.2
null
null
GHSA-5rwf-hpx5-32g3
SQL injection vulnerability in the JE Ajax Event Calendar (com_jeajaxeventcalendar) component 1.0.5 for Joomla! allows remote attackers to execute arbitrary SQL commands via the view parameter to index.php.
[]
null
null
null
null
CVE-2016-6663
Race condition in Oracle MySQL before 5.5.52, 5.6.x before 5.6.33, 5.7.x before 5.7.15, and 8.x before 8.0.1; MariaDB before 5.5.52, 10.0.x before 10.0.28, and 10.1.x before 10.1.18; Percona Server before 5.5.51-38.2, 5.6.x before 5.6.32-78-1, and 5.7.x before 5.7.14-8; and Percona XtraDB Cluster before 5.5.41-37.0, 5.6.x before 5.6.32-25.17, and 5.7.x before 5.7.14-26.17 allows local users with certain permissions to gain privileges by leveraging use of my_copystat by REPAIR TABLE to repair a MyISAM table.
[ "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "cpe:2.3:a:percona:percona_server:*:*:*:*:*:*:*:*", "cpe:2.3:a:percona:xtradb_cluster:*:*:*:*:*:*:*:*", "cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:8.0:*:*:*:*:*:*:*" ]
null
null
7
4.4
GHSA-g8hh-whpr-gfp2
Squid before 2.3STABLE5 in HTTP accelerator mode does not enable access control lists (ACLs) when the httpd_accel_host and http_accel_with_proxy off settings are used, which allows attackers to bypass the ACLs and conduct unauthorized activities such as port scanning.
[]
null
null
null
null
CVE-2012-3522
Cross-site scripting (XSS) vulnerability in contrib/langwiz.php in GeSHi before 1.0.8.11 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
[ "cpe:2.3:a:qbnz:geshi:*:*:*:*:*:*:*:*", "cpe:2.3:a:qbnz:geshi:1.0.8.4:*:*:*:*:*:*:*", "cpe:2.3:a:qbnz:geshi:1.0.8.5:*:*:*:*:*:*:*", "cpe:2.3:a:qbnz:geshi:1.0.8.6:*:*:*:*:*:*:*", "cpe:2.3:a:qbnz:geshi:1.0.8.7:*:*:*:*:*:*:*", "cpe:2.3:a:qbnz:geshi:1.0.8.8:*:*:*:*:*:*:*", "cpe:2.3:a:qbnz:geshi:1.0.8.9:*:*:*:*:*:*:*" ]
null
null
null
4.3
CVE-2009-5021
Cobbler before 1.6.1 does not properly determine whether an installation has the default password, which makes it easier for attackers to obtain access by using this password.
[ "cpe:2.3:a:michael_dehaan:cobbler:*:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:0.1.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:0.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:0.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:0.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:0.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:0.2.7:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:0.2.8:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:0.2.9:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:0.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:0.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:0.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:0.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:0.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:0.3.6:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:0.3.7:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:0.3.9:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:0.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:0.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:0.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:0.4.5:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:0.4.6:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:0.4.7:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:0.4.8:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:0.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:0.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:0.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:0.6.3:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:0.6.4:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:0.6.5:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:0.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:0.8.3:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:1.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:1.0.2-1:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:1.0.3-1:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:1.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:1.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:1.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:1.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:1.2.7:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:1.2.8:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:1.2.8-1:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:1.2.9:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:1.2.9-1:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:1.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:1.3.1-1:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:1.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:1.3.3-1:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:1.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:1.3.4-1:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:1.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:1.4.0-2:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:1.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:1.4.1-1:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:1.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:1.4.2-1:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:1.4.3:*:*:*:*:*:*:*" ]
null
null
null
7.5
RHSA-2016:0122
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.6 update on RHEL 6
jakarta-taglibs-standard: XXE and RCE via XSL extension in JSTL XML tags
[ "cpe:/a:redhat:jboss_enterprise_application_platform:6::el6" ]
null
null
7.6
null
CVE-2021-34125
An issue discovered in Yuneec Mantis Q and PX4-Autopilot v 1.11.3 and below allow attacker to gain access to sensitive information via various nuttx commands.
[ "cpe:2.3:a:dronecode:px4_drone_autopilot:*:*:*:*:*:*:*:*", "cpe:2.3:o:yuneec:mantis_q_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:yuneec:mantis_q:-:*:*:*:*:*:*:*" ]
null
7.5
null
null
GHSA-2rj6-jjxr-v6wr
NVIDIA Shield TV Experience prior to v8.0.1, NVIDIA Tegra software contains a vulnerability in the bootloader, where it does not validate the fields of the boot image, which may lead to code execution, denial of service, escalation of privileges, and information disclosure.
[]
null
null
null
null
CVE-2021-46542
Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via mjs_print at src/mjs_builtin.c. This vulnerability can lead to a Denial of Service (DoS).
[ "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*" ]
null
5.5
null
4.3
CVE-2022-30727
Improper handling of insufficient permissions vulnerability in addAppPackageNameToAllowList in PersonaManagerService prior to SMR Jun-2022 Release 1 allows local attackers to set some setting value in work space.
[ "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*" ]
null
6.2
null
null
GHSA-vp4v-pgq4-9fhp
An issue found in Entetsu Store v.13.4.1 allows a remote attacker to gain access to sensitive information via the channel access token in the miniapp Entetsu Store function.
[]
null
7.5
null
null
GHSA-px8f-pf56-946w
HP Security Manager is potentially vulnerable to Remote Code Execution as a result of code vulnerability within the product's solution open-source libraries.
[]
null
9.8
null
null
GHSA-gvr6-vw53-xh39
In Wireshark 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the Bazaar dissector could go into an infinite loop. This was addressed in epan/dissectors/packet-bzr.c by ensuring that backwards parsing cannot occur.
[]
null
null
7.5
null
GHSA-c3jj-h8cx-frp8
There is a buffer overflow vulnerability in CV81-WDM FW 01.70.49.29.46. Successful exploitation of this vulnerability may lead to privilege escalation.
[]
null
9.8
null
null
GHSA-677p-wrj2-2cg2
NVIDIA Jetson TX2 contains a vulnerability in the kernel driver where input/output control (IOCTL) handling for user mode requests could create a non-trusted pointer dereference, which may lead to information disclosure, denial of service, escalation of privileges, or code execution. The updates apply to all versions prior to R28.3.
[]
null
null
7.8
null
CVE-2024-51758
Exported files stored in default (`public`) filesystem if not reconfigured in filament
Filament is a collection of full-stack components for accelerated Laravel development. All Filament features that interact with storage use the `default_filesystem_disk` config option. This allows the user to easily swap their storage driver to something production-ready like `s3` when deploying their app, without having to touch multiple configuration options and potentially forgetting about some. The default disk is set to `public` when you first install Filament, since this allows users to quickly get started developing with a functional disk that allows features such as file upload previews locally without the need to set up an S3 disk with temporary URL support. However, some features of Filament such as exports also rely on storage, and the files that are stored contain data that should often not be public. This is not an issue for the many deployed applications, since many use a secure default disk such as S3 in production. However, [CWE-1188](https://cwe.mitre.org/data/definitions/1188.html) suggests that having the `public` disk as the default disk in Filament is a security vulnerability itself. As such, we have implemented a measure to protect users whereby if the `public` disk is set as the default disk, the exports feature will automatically swap it out for the `local` disk, if that exists. Users who set the default disk to `local` or `s3` already are not affected. If a user wants to continue to use the `public` disk for exports, they can by setting the export disk deliberately. This change has been included in the 3.2.123 release and all users who use the `public` disk are advised to upgrade.
[ "cpe:2.3:a:filament:excel_export:*:*:*:*:*:*:*:*" ]
2.3
null
null
null
GHSA-pqp8-qh2v-v728
The Secure Empty Trash feature in Finder in Apple OS X before 10.11 improperly deletes Trash files, which might allow local users to obtain sensitive information by reading storage media, as demonstrated by reading a flash drive.
[]
null
null
null
null
CVE-2003-0025
Multiple SQL injection vulnerabilities in IMP 2.2.8 and earlier allow remote attackers to perform unauthorized database activities and possibly gain privileges via certain database functions such as check_prefs() in db.pgsql, as demonstrated using mailbox.php3.
[ "cpe:2.3:a:horde:imp:2.2:*:*:*:*:*:*:*", "cpe:2.3:a:horde:imp:2.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:horde:imp:2.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:horde:imp:2.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:horde:imp:2.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:horde:imp:2.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:horde:imp:2.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:horde:imp:2.2.7:*:*:*:*:*:*:*", "cpe:2.3:a:horde:imp:2.2.8:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-6xrw-q954-8cqh
A stored cross-site scripting vulnerability exists in TCExam <= 14.8.1. Valid files uploaded via tce_filemanager.php with a filename beggining with a period will be rendered as text/html. An attacker with access to tce_filemanager.php could upload a malicious javascript payload which would be triggered when another user views the file.
[]
null
null
null
null
GHSA-88x8-58wq-2gj5
Certain NETGEAR devices are affected by command injection by an unauthenticated attacker. This affects CBR40 before 2.5.0.24, CBR750 before 4.6.3.6, RBK752 before 3.2.17.12, RBR750 before 3.2.17.12, RBS750 before 3.2.17.12, RBK852 before 3.2.17.12, RBR850 before 3.2.17.12, and RBS850 before 3.2.17.12.
[]
null
null
null
null
CVE-2021-27269
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 10.1.0.37527. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of U3D objects in PDF files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated structure. An attacker can leverage this vulnerability to execute code in the context of the current process Was ZDI-CAN-12390.
[ "cpe:2.3:a:foxitsoftware:foxit_reader:*:*:*:*:*:*:*:*", "cpe:2.3:a:foxitsoftware:phantompdf:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
null
7.8
null
CVE-2020-26816
SAP AS JAVA (Key Storage Service), versions - 7.10, 7.11, 7.20 ,7.30, 7.31, 7.40, 7.50, has the key material which is stored in the SAP NetWeaver AS Java Key Storage service stored in the database in the DER encoded format and is not encrypted. This enables an attacker who has administrator access to the SAP NetWeaver AS Java to decode the keys because of missing encryption and get some application data and client credentials of adjacent systems. This highly impacts Confidentiality as information disclosed could contain client credentials of adjacent systems.
[ "cpe:2.3:a:sap:netweaver_application_server_java:7.10:*:*:*:*:*:*:*", "cpe:2.3:a:sap:netweaver_application_server_java:7.11:*:*:*:*:*:*:*", "cpe:2.3:a:sap:netweaver_application_server_java:7.20:*:*:*:*:*:*:*", "cpe:2.3:a:sap:netweaver_application_server_java:7.30:*:*:*:*:*:*:*", "cpe:2.3:a:sap:netweaver_application_server_java:7.31:*:*:*:*:*:*:*", "cpe:2.3:a:sap:netweaver_application_server_java:7.40:*:*:*:*:*:*:*", "cpe:2.3:a:sap:netweaver_application_server_java:7.50:*:*:*:*:*:*:*" ]
null
null
5.4
null
GHSA-xvc4-7pr5-9qg4
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).
[]
null
3.1
null
null
GHSA-629c-j867-3v45
Malicious Package in bitcoisnj-lib
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.RecommendationAny computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
[]
null
9.1
null
null
RHSA-2020:3756
Red Hat Security Advisory: librepo security update
librepo: missing path validation in repomd.xml may lead to directory traversal
[ "cpe:/o:redhat:rhel_e4s:8.0::baseos" ]
null
8
null
null
GHSA-vcrv-vj6h-fr9c
cPanel before 82.0.15 allows self XSS in the SSL Key Delete interface (SEC-526).
[]
null
null
null
null
CVE-2025-30801
WordPress TWB Woocommerce Reviews plugin <= 1.7.7 - Cross Site Request Forgery (CSRF) vulnerability
Cross-Site Request Forgery (CSRF) vulnerability in Abu Bakar TWB Woocommerce Reviews allows Cross Site Request Forgery. This issue affects TWB Woocommerce Reviews: from n/a through 1.7.7.
[]
null
4.3
null
null
GHSA-cfp2-gfv9-jqxx
The WordPress Google Map Professional (Map In Your Language) WordPress plugin through 1.0 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.
[]
null
6.1
null
null
CVE-2007-5331
Queue.dll for the message queuing service (LQserver.exe) in CA BrightStor ARCServe BackUp v9.01 through R11.5, and Enterprise Backup r10.5, allows remote attackers to execute arbitrary code via a malformed ONRPC protocol request for operation 0x76, which causes ARCserve Backup to dereference arbitrary pointers.
[ "cpe:2.3:a:broadcom:brightstor_arcserve_backup:9.01:*:*:*:*:*:*:*", "cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:*:*:*:*:*:*", "cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.5:*:*:*:*:*:*:*", "cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.5:*:*:*:*:*:*:*", "cpe:2.3:a:broadcom:business_protection_suite:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:broadcom:server_protection_suite:2:*:*:*:*:*:*:*", "cpe:2.3:a:ca:brightstor_arcserve_backup:11:*:windows:*:*:*:*:*", "cpe:2.3:a:ca:business_protection_suite:2.0:*:microsoft_small_business_server_premium:*:*:*:*:*", "cpe:2.3:a:ca:business_protection_suite:2.0:*:microsoft_small_business_server_standard:*:*:*:*:*" ]
null
null
null
10
GHSA-6gfj-9c5p-w3pw
Cisco Small Business 220 devices with firmware before 1.0.1.1 have a hardcoded SNMP community, which allows remote attackers to read or modify SNMP objects by leveraging knowledge of this community, aka Bug ID CSCuz76216.
[]
null
null
9.8
null
CVE-2024-5408
Cross-site Scripting vulnerability in RhinOS from SaltOS
Vulnerability in RhinOS 3.0-1190 consisting of an XSS through the "search" parameter of /portal/search.htm. This vulnerability could allow a remote attacker to steal details of a victim's user session by submitting a specially crafted URL.
[]
null
7.1
null
null
CVE-2010-4178
MySQL-GUI-tools (mysql-administrator) leaks passwords into process list after with launch of mysql text console
[ "cpe:2.3:a:oracle:mysql-gui-tools:-:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:12:*:*:*:*:*:*:*" ]
null
5.5
null
2.1
GHSA-69r6-jccq-6m9h
Absolute path traversal vulnerability in includes/functions_portal.php in IntegraMOD Portal 2.x and earlier, when magic_quotes_gpc is disabled, allows remote attackers to read arbitrary files via an absolute pathname in the phpbb_root_path parameter.
[]
null
null
null
null
CVE-2015-3801
The document.cookie API implementation in the CFNetwork Cookies subsystem in WebKit in Apple iOS before 9 allows remote attackers to bypass an intended single-cookie restriction via unspecified vectors.
[ "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*" ]
null
null
null
5
GHSA-6263-577f-x76p
lib/Locale/Po4a/Po.pm in po4a before 0.32 allows local users to overwrite arbitrary files via a symlink attack on the gettextization.failed.po temporary file.
[]
null
null
null
null
GHSA-h877-88g5-8mh5
Cross-site scripting (XSS) vulnerability in IBM Content Navigator 2.x before 2.0.2.2-ICN-FP002 allows remote authenticated users to inject arbitrary web script or HTML via an unspecified parameter.
[]
null
null
null
null
CVE-2019-1391
A denial of service vulnerability exists when Windows improperly handles objects in memory, aka 'Windows Denial of Service Vulnerability'. This CVE ID is unique from CVE-2018-12207.
[ "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*" ]
null
5.5
null
4.9
RHSA-2024:4173
Red Hat Security Advisory: Red Hat build of Cryostat 3.0.0: new RHEL 8 container image security update
bc-java: BouncyCastle vulnerable to a timing variant of Bleichenbacher (Marvin Attack)
[ "cpe:/a:redhat:cryostat:3::el8" ]
null
5.9
null
null
GHSA-f729-m528-5h64
This issue was addressed with improved validation of symlinks. This issue is fixed in macOS Ventura 13.7.1, macOS Sonoma 14.7.1. A malicious app may be able to create symlinks to protected regions of the disk.
[]
null
5.5
null
null
GHSA-gw7g-cgfh-x45p
Buffer overflow in Firewall Authentication Proxy for FTP and/or Telnet Sessions for Cisco IOS 12.2ZH and 12.2ZL, 12.3 and 12.3T, and 12.4 and 12.4T allows remote attackers to cause a denial of service and possibly execute arbitrary code via crafted user authentication credentials.
[]
null
null
null
null
GHSA-w9mh-mv37-65p8
IBM Security Verify Governance 10.0.2 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.
[]
null
5.4
null
null
CVE-2025-23478
WordPress Photo Video Store plugin <= 21.07 - Reflected Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Photo Video Store allows Reflected XSS. This issue affects Photo Video Store: from n/a through 21.07.
[]
null
7.1
null
null
CVE-2017-12608
A vulnerability in Apache OpenOffice Writer DOC file parser before 4.1.4, and specifically in ImportOldFormatStyles, allows attackers to craft malicious documents that cause denial of service (memory corruption and application crash) potentially resulting in arbitrary code execution.
[ "cpe:2.3:a:apache:openoffice:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" ]
null
7.8
null
6.8
CVE-2018-18657
An issue was discovered in Arcserve Unified Data Protection (UDP) through 6.5 Update 4. There is a DDI-VRT-2018-18 Unauthenticated Sensitive Information Disclosure via /gateway/services/EdgeServiceImpl issue.
[ "cpe:2.3:a:arcserve:udp:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:arcserve:udp:6.0:1:*:*:*:*:*:*", "cpe:2.3:a:arcserve:udp:6.0:2:*:*:*:*:*:*", "cpe:2.3:a:arcserve:udp:6.0:3:*:*:*:*:*:*", "cpe:2.3:a:arcserve:udp:6.5:*:*:*:*:*:*:*", "cpe:2.3:a:arcserve:udp:6.5:1:*:*:*:*:*:*", "cpe:2.3:a:arcserve:udp:6.5:2:*:*:*:*:*:*", "cpe:2.3:a:arcserve:udp:6.5:3:*:*:*:*:*:*", "cpe:2.3:a:arcserve:udp:6.5:4:*:*:*:*:*:*" ]
null
null
7.5
5
CVE-2017-11538
When ImageMagick 7.0.6-1 processes a crafted file in convert, it can lead to a Memory Leak in the WriteOnePNGImage() function in coders/png.c.
[ "cpe:2.3:a:imagemagick:imagemagick:7.0.6-1:*:*:*:*:*:*:*" ]
null
null
6.5
4.3
CVE-2021-24125
Contact Form Submissions < 1.7.1 - Authenticated SQL Injection
Unvalidated input in the Contact Form Submissions WordPress plugin before 1.7.1, could lead to SQL injection in the wpcf7_contact_form GET parameter when submitting a filter request as a high privilege user (admin+)
[ "cpe:2.3:a:contact_form_submissions_project:contact_form_submissions:*:*:*:*:*:wordpress:*:*" ]
null
7.2
null
6.5
CVE-2019-8599
A logic issue was addressed with improved restrictions. This issue is fixed in iOS 12.3. A person with physical access to an iOS device may be able to see the email address used for iTunes.
[ "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" ]
null
2.4
null
2.1
GHSA-x73w-g8hx-v7rp
Code injection in electerm
An issue was discovered in Electerm 1.3.22, allows attackers to execute arbitrary code via unverified request to electerms service.
[]
null
9.8
null
null
GHSA-qfrv-fmc5-hmmh
Ember ZNet between v7.2.0 and v7.4.0 used software AES-CCM instead of integrated hardware cryptographic accelerators, potentially increasing risk of electromagnetic and differential power analysis sidechannel attacks.
[]
null
6.2
null
null
GHSA-3m7x-5crf-j7qc
Multiple cross-site scripting (XSS) vulnerabilities in vtiger CRM 4.2.4, and possibly earlier, allow remote attackers to inject arbitrary web script or HTML via the (1) description parameter in unspecified modules or the (2) solution parameter in the HelpDesk module.
[]
null
null
null
null
GHSA-5rw6-vf4w-p4j3
Use after free in WebRTC in Google Chrome prior to 114.0.5735.133 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
[]
null
8.8
null
null
GHSA-2h6w-rcrp-4x6j
An elevation of privilege vulnerability exists when Windows Mobile Device Management (MDM) Diagnostics improperly handles junctions, aka 'Windows Mobile Device Management Diagnostics Elevation of Privilege Vulnerability'.
[]
null
null
null
null
GHSA-54v6-qx46-f6g6
Unrestricted file upload vulnerability in NetArt Media Car Portal 3.0 allows remote attackers to execute arbitrary PHP code by uploading a file a double extension, as demonstrated by .php%00.jpg.
[]
null
null
null
null
GHSA-5q86-fgf8-6xg8
SQL injection vulnerability in vb_board_functions.php in MKPortal 1.1, as used with vBulletin 3.5.4 and earlier, allows remote attackers to execute arbitrary SQL commands via the userid parameter.
[]
null
null
null
null
GHSA-g93m-hx8j-2qmq
This HTTP Headers WordPress plugin before 1.18.11 allows arbitrary data to be written to arbitrary files, leading to a Remote Code Execution vulnerability.
[]
null
7.2
null
null
CVE-2022-35916
Cross chain utilities for Arbitrum L2 see EOA calls as cross chain calls
OpenZeppelin Contracts is a library for secure smart contract development. Contracts using the cross chain utilities for Arbitrum L2, `CrossChainEnabledArbitrumL2` or `LibArbitrumL2`, will classify direct interactions of externally owned accounts (EOAs) as cross chain calls, even though they are not started on L1. This issue has been patched in v4.7.2. Users are advised to upgrade. There are no known workarounds for this issue.
[ "cpe:2.3:a:openzeppelin:contracts:*:*:*:*:*:node.js:*:*", "cpe:2.3:a:openzeppelin:contracts_upgradeable:*:*:*:*:*:node.js:*:*" ]
null
5.3
null
null
CVE-2020-14484
OpenClinic GA versions 5.09.02 and 5.89.05b may allow an attacker to bypass the system’s account lockout protection, which may allow brute force password attacks.
[ "cpe:2.3:a:openclinic_ga_project:openclinic_ga:5.09.02:*:*:*:*:*:*:*", "cpe:2.3:a:openclinic_ga_project:openclinic_ga:5.89.05b:*:*:*:*:*:*:*" ]
null
9.8
null
5
RHSA-2011:0144
Red Hat Security Advisory: Red Hat Enterprise Linux Extended Update Support 5.4 6-Month EOL Notice
This is the 6-month notification of the End Of Life plans for Red Hat Enterprise Linux Extended Update Support Add-On (EUS) 5.4.
[ "cpe:/o:redhat:rhel_eus:5.4" ]
null
null
null
null
RHSA-2020:4951
Red Hat Security Advisory: freetype security update
freetype: Heap-based buffer overflow due to integer truncation in Load_SBit_Png
[ "cpe:/o:redhat:rhel_eus:8.2::baseos" ]
null
8.6
null
null