id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
139k
cpes
sequencelengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
GHSA-5r2p-47vm-6fh9
IBM Engineering Lifecycle Optimization 7.0.2 and 7.0.3 is vulnerable to HTTP header injection, caused by improper validation of input by the HOST headers. This could allow an attacker to conduct various attacks against the vulnerable system, including cross-site scripting, cache poisoning or session hijacking. IBM X-Force ID: 268754.
[]
null
5.1
null
null
CVE-2023-27237
LavaLite CMS v 9.0.0 was discovered to be vulnerable to a host header injection attack.
[ "cpe:2.3:a:lavalite:lavalite:9.0.0:*:*:*:*:*:*:*" ]
null
6.1
null
null
GHSA-6q82-84qc-99r9
In sensor driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service in kernel.
[]
null
5.5
null
null
RHSA-2016:1087
Red Hat Security Advisory: Red Hat JBoss Web Server 3.0.3 update
tomcat: directory disclosure tomcat: Session fixation tomcat: CSRF token leak tomcat: security manager bypass via StatusManagerServlet tomcat: Security Manager bypass via persistence mechanisms tomcat: security manager bypass via setGlobalContext()
[ "cpe:/a:redhat:jboss_enterprise_web_server:3.0::el6" ]
null
null
6.3
null
CVE-2009-2947
Cross-site scripting (XSS) vulnerability in Xapian Omega before 1.0.16 allows remote attackers to inject arbitrary web script or HTML via unspecified CGI parameter values, which are sometimes included in exception messages.
[ "cpe:2.3:a:xapian:omega:*:*:*:*:*:*:*:*", "cpe:2.3:a:xapian:omega:0.8.0:*:*:*:*:*:*:*", "cpe:2.3:a:xapian:omega:0.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:xapian:omega:0.8.2:*:*:*:*:*:*:*", "cpe:2.3:a:xapian:omega:0.8.3:*:*:*:*:*:*:*", "cpe:2.3:a:xapian:omega:0.8.4:*:*:*:*:*:*:*", "cpe:2.3:a:xapian:omega:0.8.5:*:*:*:*:*:*:*", "cpe:2.3:a:xapian:omega:0.9.0:*:*:*:*:*:*:*", "cpe:2.3:a:xapian:omega:0.9.1:*:*:*:*:*:*:*", "cpe:2.3:a:xapian:omega:0.9.2:*:*:*:*:*:*:*", "cpe:2.3:a:xapian:omega:0.9.3:*:*:*:*:*:*:*", "cpe:2.3:a:xapian:omega:0.9.4:*:*:*:*:*:*:*", "cpe:2.3:a:xapian:omega:0.9.5:*:*:*:*:*:*:*", "cpe:2.3:a:xapian:omega:0.9.6:*:*:*:*:*:*:*", "cpe:2.3:a:xapian:omega:0.9.7:*:*:*:*:*:*:*", "cpe:2.3:a:xapian:omega:0.9.8:*:*:*:*:*:*:*", "cpe:2.3:a:xapian:omega:0.9.9:*:*:*:*:*:*:*", "cpe:2.3:a:xapian:omega:0.9.10:*:*:*:*:*:*:*", "cpe:2.3:a:xapian:omega:1.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:xapian:omega:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:xapian:omega:1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:xapian:omega:1.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:xapian:omega:1.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:xapian:omega:1.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:xapian:omega:1.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:xapian:omega:1.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:xapian:omega:1.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:xapian:omega:1.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:xapian:omega:1.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:xapian:omega:1.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:xapian:omega:1.0.13:*:*:*:*:*:*:*", "cpe:2.3:a:xapian:omega:1.0.14:*:*:*:*:*:*:*" ]
null
null
null
4.3
GHSA-gq9w-xhj4-qh3r
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.7.18 and earlier. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
[]
null
null
4.9
null
GHSA-899x-jhm8-pc3m
Off-by-one buffer overflow in _xlate_ascii_write() in ProFTPD 1.2.7 through 1.2.9rc2p allows local users to gain privileges via a 1024 byte RETR command.
[]
null
7.8
null
null
GHSA-w2ph-8pcw-pr59
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in kagla GNUPress allows Reflected XSS. This issue affects GNUPress: from n/a through 0.2.9.
[]
null
7.1
null
null
RHSA-2024:0386
Red Hat Security Advisory: kpatch-patch security update
kernel: net/sched: sch_hfsc UAF kernel: use after free in nvmet_tcp_free_crypto in NVMe kernel: IGB driver inadequate buffer size for frames larger than MTU
[ "cpe:/o:redhat:rhel_eus:9.0::baseos" ]
null
7.5
null
null
CVE-2017-14384
In Dell Storage Manager versions earlier than 16.3.20, the EMConfigMigration service is affected by a directory traversal vulnerability. A remote malicious user could potentially exploit this vulnerability to read unauthorized files by supplying specially crafted strings in input parameters of the application. A malicious user cannot delete or modify any files via this vulnerability.
[ "cpe:2.3:a:dell:storage_manager:*:*:*:*:*:*:*:*" ]
null
null
6.5
4
CVE-2022-0107
Use after free in File Manager API in Google Chrome on Chrome OS prior to 97.0.4692.71 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*" ]
null
8.8
null
6.8
cisco-sa-20181107-ems-csrf
Cisco Energy Management Suite Cross-Site Request Forgery Vulnerability
A vulnerability in the web-based management interface of Cisco Energy Management Suite Software could allow an authenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack and perform arbitrary actions on an affected device. The vulnerability is due to insufficient CSRF protections for the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading an authenticated user of the interface to follow a crafted link. A successful exploit could allow the attacker to perform arbitrary actions on a targeted device via a web browser and with the privileges of the user. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-ems-csrf ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-ems-csrf"]
[]
null
null
6.3
null
CVE-2023-5627
Incorrect Implementation of Authentication Algorithm Vulnerability
A vulnerability has been identified in NPort 6000 Series, making the authentication mechanism vulnerable. This vulnerability arises from the incorrect implementation of sensitive information protection, potentially allowing malicious users to gain unauthorized access to the web service.
[ "cpe:2.3:a:moxa:nport_6000:*:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:nport_6150-t_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_6150-t:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:nport_6150_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_6150:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:nport_6250-m-sc-t_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_6250-m-sc-t:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:nport_6250-m-sc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_6250-m-sc:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:nport_6250-s-sc-t_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_6250-s-sc-t:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:nport_6250-s-sc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_6250-s-sc:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:nport_6250-t_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_6250-t:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:nport_6250_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_6250:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:nport_6450-t_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_6450-t:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:nport_6450_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_6450:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:nport_6610-16-48v_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_6610-16-48v:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:nport_6610-16_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_6610-16:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:nport_6610-32-48v_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_6610-32-48v:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:nport_6610-32_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_6610-32:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:nport_6610-8-48v_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_6610-8-48v:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:nport_6610-8_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_6610-8:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:nport_6650-16-48v_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_6650-16-48v:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:nport_6650-16-hv-t_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_6650-16-hv-t:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:nport_6650-16-t_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_6650-16-t:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:nport_6650-16_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_6650-16:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:nport_6650-32-48v_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_6650-32-48v:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:nport_6650-32-hv-t_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_6650-32-hv-t:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:nport_6650-32_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_6650-32:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:nport_6650-8-48v_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_6650-8-48v:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:nport_6650-8-hv-t_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_6650-8-hv-t:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:nport_6650-8-t_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_6650-8-t:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:nport_6650-8_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_6650-8:-:*:*:*:*:*:*:*" ]
null
7.5
null
null
RHSA-2020:3389
Red Hat Security Advisory: kernel-rt security and bug fix update
kernel: buffer overflow in mwifiex_cmd_append_vsie_tlv function in drivers/net/wireless/marvell/mwifiex/scan.c kernel: heap-based buffer overflow in mwifiex_ret_wmm_get_status function in drivers/net/wireless/marvell/mwifiex/wmm.c
[ "cpe:/a:redhat:enterprise_mrg:2:server:el6" ]
null
7.1
null
null
GHSA-4mg4-2vjx-5ch2
An information leak in hirochanKAKIwaiting v13.6.1 allows attackers to obtain the channel access token and send crafted messages.
[]
null
7.5
null
null
CVE-2010-1094
SQL injection vulnerability in news.php in DZ EROTIK Auktionshaus V4rgo allows remote attackers to execute arbitrary SQL commands via the id parameter.
[ "cpe:2.3:a:miethner-scripting:dz_erotik_auktionshaus_v4rgo:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-hjqr-c6q5-j324
A vulnerability has been discovered in BigProf Online Clinic Management System 2.2, which does not sufficiently encode user-controlled input, resulting in persistent XSS through /clinic/events_view.php, in the FirstRecord parameter. Exploitation of this vulnerability could allow an attacking user to store dangerous JavaScript payloads on the system that will be triggered when the page loads.
[]
null
6.3
null
null
CVE-2019-6973
Sricam IP CCTV cameras are vulnerable to denial of service via multiple incomplete HTTP requests because the web server (based on gSOAP 2.8.x) is configured for an iterative queueing approach (aka non-threaded operation) with a timeout of several seconds.
[ "cpe:2.3:a:genivia:gsoap:2.8.0:*:*:*:*:*:*:*", "cpe:2.3:h:sricam:nvs001:-:*:*:*:*:*:*:*", "cpe:2.3:h:sricam:sh016:-:*:*:*:*:*:*:*", "cpe:2.3:h:sricam:sh024:-:*:*:*:*:*:*:*", "cpe:2.3:h:sricam:sh026:-:*:*:*:*:*:*:*", "cpe:2.3:h:sricam:sh027:-:*:*:*:*:*:*:*", "cpe:2.3:h:sricam:sp007:-:*:*:*:*:*:*:*", "cpe:2.3:h:sricam:sp008:-:*:*:*:*:*:*:*", "cpe:2.3:h:sricam:sp009:-:*:*:*:*:*:*:*", "cpe:2.3:h:sricam:sp012:-:*:*:*:*:*:*:*", "cpe:2.3:h:sricam:sp015:-:*:*:*:*:*:*:*", "cpe:2.3:h:sricam:sp017:-:*:*:*:*:*:*:*", "cpe:2.3:h:sricam:sp018:-:*:*:*:*:*:*:*", "cpe:2.3:h:sricam:sp019:-:*:*:*:*:*:*:*", "cpe:2.3:h:sricam:sp020:-:*:*:*:*:*:*:*", "cpe:2.3:h:sricam:sp023:-:*:*:*:*:*:*:*" ]
null
null
7.5
5
GHSA-q87g-x228-95pp
Unknown vulnerability in the (1) AgentX dissector, (2) PER dissector, (3) DOCSIS dissector, (4) SCTP graphs, (5) HTTP dissector, (6) DCERPC, (7) DHCP, (8) RADIUS dissector, (9) Telnet dissector, (10) IS-IS LSP dissector, or (11) NCP dissector in Ethereal 0.8.19 through 0.10.11 allows remote attackers to cause a denial of service (application crash or abort) via unknown attack vectors.
[]
null
null
null
null
CVE-2008-1157
Cisco CiscoWorks Internetwork Performance Monitor (IPM) 2.6 creates a process that executes a command shell and listens on a randomly chosen TCP port, which allows remote attackers to execute arbitrary commands.
[ "cpe:2.3:a:cisco:ciscoworks_internetwork_performance_monitor:2.6:*:*:*:*:*:*:*" ]
null
null
null
10
CVE-2014-0733
The Enterprise License Manager (ELM) component in Cisco Unified Communications Manager (Unified CM) 10.0(1) and earlier does not properly enforce authentication requirements, which allows remote attackers to read ELM files via a direct request to a URL, aka Bug ID CSCum46494.
[ "cpe:2.3:a:cisco:unified_communications_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:3.3\\(5\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:3.3\\(5\\)sr1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:3.3\\(5\\)sr2a:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:4.1\\(3\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:4.1\\(3\\)sr1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:4.1\\(3\\)sr2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:4.1\\(3\\)sr3:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:4.1\\(3\\)sr4:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:4.2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:4.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:4.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:4.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:4.2.3sr1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:4.2.3sr2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:4.2.3sr2b:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:4.3:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:10.0:*:*:*:*:*:*:*" ]
null
null
null
5
GHSA-9ccq-7hvh-cv7p
If an application encounters a fatal protocol error and then calls SSL_shutdown() twice (once to send a close_notify, and once to receive one) then OpenSSL can respond differently to the calling application if a 0 byte record is received with invalid padding compared to if a 0 byte record is received with an invalid MAC. If the application then behaves differently based on that in a way that is detectable to the remote peer, then this amounts to a padding oracle that could be used to decrypt data. In order for this to be exploitable "non-stitched" ciphersuites must be in use. Stitched ciphersuites are optimised implementations of certain commonly used ciphersuites. Also the application must call SSL_shutdown() twice even if a protocol error has occurred (applications should not do this but some do anyway). Fixed in OpenSSL 1.0.2r (Affected 1.0.2-1.0.2q).
[]
null
5.9
null
null
GHSA-5ph4-hc7j-m32j
RSA Authentication Manager versions prior to 8.4 P10 contain a stored cross-site scripting vulnerability in the Security Console. A malicious RSA Authentication Manager Security Console administrator with advanced privileges could exploit this vulnerability to store arbitrary HTML or JavaScript code through the Security Console web interface. When other Security Console administrators open the affected report page, the injected scripts could potentially be executed in their browser.
[]
null
4.8
null
null
GHSA-rhqw-486f-x8rq
Improper Control of Generation of Code ('Code Injection') vulnerability in BinaryStash WP Booklet.This issue affects WP Booklet: from n/a through 2.1.8.
[]
null
8.5
null
null
CVE-2014-3628
Cross-site scripting (XSS) vulnerability in the Admin UI Plugin / Stats page in Apache Solr 4.x before 4.10.3 allows remote attackers to inject arbitrary web script or HTML via the fieldvaluecache object.
[ "cpe:2.3:a:apache:solr:4.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:solr:4.0.0:alpha:*:*:*:*:*:*", "cpe:2.3:a:apache:solr:4.0.0:beta:*:*:*:*:*:*", "cpe:2.3:a:apache:solr:4.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:solr:4.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:solr:4.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:solr:4.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:solr:4.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:solr:4.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:solr:4.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:solr:4.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:solr:4.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:solr:4.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:solr:4.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:solr:4.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:solr:4.7.2:*:*:*:*:*:*:*", "cpe:2.3:a:apache:solr:4.8.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:solr:4.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:solr:4.9.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:solr:4.9.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:solr:4.10.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:solr:4.10.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:solr:4.10.2:*:*:*:*:*:*:*" ]
null
null
null
4.3
CVE-2023-0973
Step Tools Third-Party
STEPTools v18SP1 ifcmesh library (v18.1) is affected due to a null pointer dereference, which could allow an attacker to deny application usage when reading a specially constructed file, resulting in an application crash.
[ "cpe:2.3:a:steptools:ifcmesh_library:*:*:*:*:*:*:*:*" ]
null
2.2
null
null
GHSA-4c78-fxq8-6rxg
The IsDriveLetterAvailable method in Driver/Ntdriver.c in TrueCrypt 7.0, VeraCrypt before 1.15, and CipherShed, when running on Windows, does not properly validate drive letter symbolic links, which allows local users to mount an encrypted volume over an existing drive letter and gain privileges via an entry in the /GLOBAL?? directory.
[]
null
null
7.8
null
GHSA-v3cp-jj5w-cffv
An issue was discovered on Samsung mobile devices with O(8.x), P(9.0), and Q(10.0) software. The system area allows arbitrary file overwrites via a symlink attack. The Samsung ID is SVE-2020-17183 (June 2020).
[]
null
null
null
null
RHSA-2007:1165
Red Hat Security Advisory: libexif security update
libexif infinite recursion flaw (DoS) libexif integer overflow
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
CVE-2014-7655
The Dresden Transport Museum (aka de.appack.project.vmd) application 2.2 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[ "cpe:2.3:a:verkehrsmuseum-dresden:dresden_transport_museum:2.2:*:*:*:*:android:*:*" ]
null
null
null
5.4
GHSA-mjcr-h6w7-xcx6
A vulnerability in GitLab CE/EE affecting all versions from 11.3.4 prior to 15.1.5, 15.2 to 15.2.3, 15.3 to 15.3 to 15.3.1 allows an an authenticated user to achieve remote code execution via the Import from GitHub API endpoint
[]
null
9.9
null
null
CVE-2014-6152
Multiple cross-site scripting (XSS) vulnerabilities in IBM Tivoli Integrated Portal (TIP) 2.2.x allow remote authenticated users to inject arbitrary web script or HTML via unspecified vectors.
[ "cpe:2.3:a:ibm:tivoli_integrated_portal:2.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_integrated_portal:2.2:*:*:*:*:*:*:*" ]
null
null
null
3.5
CVE-2016-3318
Microsoft Office 2007 SP3, 2010 SP2, 2013 SP1, and 2013 RT SP1 allow remote attackers to execute arbitrary code via a crafted file, aka "Graphics Component Memory Corruption Vulnerability."
[ "cpe:2.3:a:microsoft:office:2007:sp3:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2010:sp2:x64:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2010:sp2:x86:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2013:sp1:*:*:*:*:*:*" ]
null
null
7.8
9.3
CVE-2004-1163
Cisco CNS Network Registrar Central Configuration Management (CCM) server 6.0 through 6.1.1.3 allows remote attackers to cause a denial of service (CPU consumption) by ending a connection after sending a certain sequence of packets.
[ "cpe:2.3:a:cisco:cns_network_registrar:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:cns_network_registrar:6.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:cns_network_registrar:6.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:cns_network_registrar:6.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:cns_network_registrar:6.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:cns_network_registrar:6.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:cns_network_registrar:6.0.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:cns_network_registrar:6.0.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:cns_network_registrar:6.0.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:cns_network_registrar:6.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:cns_network_registrar:6.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:cns_network_registrar:6.1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:cns_network_registrar:6.1.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:cns_network_registrar:6.1.1.3:*:*:*:*:*:*:*" ]
null
null
null
5
CVE-2008-1262
The administration panel on the Airspan WiMax ProST 4.1 antenna with 6.5.38.0 software does not verify authentication credentials, which allows remote attackers to (1) upload malformed firmware or (2) bind the antenna to a different WiMAX base station via unspecified requests to forms under process_adv/.
[ "cpe:2.3:h:airspan:wimax_prost:4.1:*:6.5.38.0:*:*:*:*:*" ]
null
null
null
10
CVE-2024-21204
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: PS). Supported versions that are affected are 8.4.0 and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
[ "cpe:2.3:a:oracle:mysql_server:8.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql_server:9.0.1_and_prior:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:8.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:9.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:9.0.1:*:*:*:*:*:*:*" ]
null
4.9
null
null
GHSA-hw3g-x69p-f6rq
The Easy Social Feed – Social Photos Gallery – Post Feed – Like Box plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'efb_likebox' shortcode in all versions up to, and including, 6.5.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
6.4
null
null
CVE-2021-34925
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View 10.15.0.75. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of JT files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14903.
[ "cpe:2.3:a:bentley:bentley_view:*:*:*:*:*:*:*:*", "cpe:2.3:a:bentley:microstation:*:*:*:*:*:*:*:*" ]
null
null
7.8
null
CVE-2017-13800
An issue was discovered in certain Apple products. macOS before 10.13.1 is affected. The issue involves the "APFS" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app.
[ "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*" ]
null
null
7.8
9.3
GHSA-52cw-mfvg-73mg
Furbo dog camera has insufficient filtering for special parameter of device log management function. An unauthenticated remote attacker in the Bluetooth network with normal user privileges can exploit this vulnerability to perform command injection attack to execute arbitrary system commands or disrupt service.
[]
null
8.8
null
null
CVE-2006-6504
Mozilla Firefox 2.x before 2.0.0.1, 1.5.x before 1.5.0.9, and SeaMonkey before 1.0.7 allows remote attackers to execute arbitrary code by appending an SVG comment DOM node to another type of document, which triggers memory corruption.
[ "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:5.10:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*" ]
null
null
null
9.3
GHSA-r3x5-r85c-grp5
In dotCMS 5.x-22.06, it is possible to call the TempResource multiple times, each time requesting the dotCMS server to download a large file. If done repeatedly, this will result in Tomcat request-thread exhaustion and ultimately a denial of any other requests.
[]
null
5.3
null
null
GHSA-cq4c-8hpc-gx3j
Missing Authorization vulnerability in Avirtum Vision Interactive.This issue affects Vision Interactive: from n/a through 1.7.1.
[]
null
5.3
null
null
CVE-2021-31936
Microsoft Accessibility Insights for Web Information Disclosure Vulnerability
Microsoft Accessibility Insights for Web Information Disclosure Vulnerability
[ "cpe:2.3:a:microsoft:accessibility_insights_for_web:*:*:*:*:*:*:*:*" ]
null
7.4
null
null
CVE-2006-3424
Multiple buffer overflows in WebEx Downloader ActiveX Control, possibly in versions before November 2005, allow remote attackers to execute arbitrary code via unspecified vectors.
[ "cpe:2.3:a:webex_communications:webex_downloader_activex_control:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2020-25199
A heap-based buffer overflow vulnerability exists within the WECON LeviStudioU Release Build 2019-09-21 and prior when processing project files. Opening a specially crafted project file could allow an attacker to exploit and execute code under the privileges of the application.
[ "cpe:2.3:a:we-con:levistudiou:*:*:*:*:*:*:*:*" ]
null
7.8
null
6.8
GHSA-v8mc-4rh6-jf98
The Piraeus Bank WooCommerce Payment Gateway plugin for WordPress is vulnerable to time-based blind SQL Injection via the 'MerchantReference' parameter in all versions up to, and including, 1.6.5.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
[]
null
9.8
null
null
CVE-2023-6431
Cross-site Scripting vulnerability in BigProf products
A vulnerability has been discovered in BigProf Online Invoicing System 2.6, which does not sufficiently encode user-controlled input, resulting in persistent XSS through /inventory/categories_view.php, in the FirstRecord parameter. Exploitation of this vulnerability could allow an attacking user to store dangerous JavaScript payloads on the system that will be triggered when the page loads.
[ "cpe:2.3:a:bigprof:online_invoicing_system:2.6:*:*:*:*:*:*:*" ]
null
6.3
null
null
GHSA-rw3m-wxjr-rg26
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Arefly WP Header Notification allows Stored XSS.This issue affects WP Header Notification: from n/a through 1.2.7.
[]
null
5.9
null
null
CVE-2020-0872
A remote code execution vulnerability exists in Application Inspector version v1.0.23 or earlier when the tool reflects example code snippets from third-party source files into its HTML output, aka 'Remote Code Execution Vulnerability in Application Inspector'.
[ "cpe:2.3:a:microsoft:application_inspector:*:*:*:*:*:*:*:*" ]
null
9.6
null
6.8
GHSA-jxmv-8fwr-5mqh
Stack-based buffer overflow in IBM Tivoli Storage Manager FastBack 5.5 and 6.1.x through 6.1.11.1 allows remote attackers to cause a denial of service (daemon crash) via unspecified vectors, a different vulnerability than CVE-2016-0212 and CVE-2016-0213.
[]
null
null
9.8
null
GHSA-f3v6-qmvg-fhwg
Azure CycleCloud Remote Code Execution Vulnerability
[]
null
9.9
null
null
CVE-2016-9375
In Wireshark 2.2.0 to 2.2.1 and 2.0.0 to 2.0.7, the DTN dissector could go into an infinite loop, triggered by network traffic or a capture file. This was addressed in epan/dissectors/packet-dtn.c by checking whether SDNV evaluation was successful.
[ "cpe:2.3:a:wireshark:wireshark:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:2.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:2.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:2.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:2.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:2.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:2.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:2.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:2.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" ]
null
null
5.9
4.3
CVE-2003-0445
Buffer overflow in webfs before 1.17.1 allows remote attackers to execute arbitrary code via an HTTP request with a long Request-URI.
[ "cpe:2.3:a:webfs:webfs:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2015-4218
The web-based user interface in Cisco Jabber through 9.6(3) and 9.7 through 9.7(5) on Windows allows remote attackers to obtain sensitive information via a crafted value in a GET request, aka Bug IDs CSCuu65622 and CSCuu70858.
[ "cpe:2.3:a:cisco:jabber:9.6\\(0\\):*:*:*:*:windows:*:*", "cpe:2.3:a:cisco:jabber:9.6\\(1\\):*:*:*:*:windows:*:*", "cpe:2.3:a:cisco:jabber:9.6\\(2\\):*:*:*:*:windows:*:*", "cpe:2.3:a:cisco:jabber:9.6\\(3\\):*:*:*:*:windows:*:*", "cpe:2.3:a:cisco:jabber:9.7\\(0\\):*:*:*:*:windows:*:*", "cpe:2.3:a:cisco:jabber:9.7\\(1\\):*:*:*:*:windows:*:*", "cpe:2.3:a:cisco:jabber:9.7\\(2\\):*:*:*:*:windows:*:*", "cpe:2.3:a:cisco:jabber:9.7\\(3\\):*:*:*:*:windows:*:*", "cpe:2.3:a:cisco:jabber:9.7\\(4\\):*:*:*:*:windows:*:*", "cpe:2.3:a:cisco:jabber:9.7\\(5\\):*:*:*:*:windows:*:*" ]
null
null
null
5
CVE-2019-7569
An issue was discovered in DOYO (aka doyocms) 2.3(20140425 update). There is a CSRF vulnerability that can add a super administrator account via admin.php?c=a_adminuser&a=add&run=1.
[ "cpe:2.3:a:wdoyo:doyo:2.3:*:*:*:*:*:*:*" ]
null
null
8.8
6.8
CVE-2017-3128
A stored XSS (Cross-Site-Scripting) vulnerability in Fortinet FortiOS allows attackers to execute unauthorized code or commands via the policy global-label parameter.
[ "cpe:2.3:o:fortinet:fortios:5.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortios:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortios:5.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortios:5.0.3:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortios:5.0.4:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortios:5.0.5:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortios:5.0.6:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortios:5.0.7:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortios:5.0.8:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortios:5.0.9:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortios:5.0.10:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortios:5.0.11:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortios:5.0.12:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortios:5.0.13:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortios:5.0.14:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortios:5.2.0:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortios:5.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortios:5.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortios:5.2.3:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortios:5.2.4:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortios:5.2.5:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortios:5.2.6:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortios:5.2.7:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortios:5.2.8:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortios:5.2.9:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortios:5.2.10:*:*:*:*:*:*:*" ]
null
null
4.8
3.5
GHSA-58hv-2vjm-27h5
Opera, possibly before 9.25, uses the HTTP Host header to determine the context of a document provided in a (1) 4xx or (2) 5xx CONNECT response from a proxy server, which allows man-in-the-middle attackers to execute arbitrary web script by modifying this CONNECT response, aka an "SSL tampering" attack.
[]
null
null
null
null
GHSA-7p3q-gmw8-3xm9
struct2json before 2020-11-18 is affected by a Buffer Overflow because strcpy is used for S2J_STRUCT_GET_string_ELEMENT.
[]
null
null
null
null
GHSA-9rm7-7m57-m6gm
A vulnerability in Cisco Intercloud Fabric for Business and Cisco Intercloud Fabric for Providers could allow an unauthenticated, remote attacker to connect to the database used by these products. More Information: CSCus99394. Known Affected Releases: 7.3(0)ZN(0.99).
[]
null
null
8.8
null
CVE-2023-46216
An attacker sending specially crafted data packets to the Mobile Device Server can cause memory corruption which could result to a Denial of Service (DoS) or code execution.
[ "cpe:2.3:a:ivanti:avalanche:*:*:*:*:premise:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
null
9.8
null
CVE-2023-6868
In some instances, the user-agent would allow push requests which lacked a valid VAPID even though the push manager subscription defined one. This could allow empty messages to be sent from unauthorized parties. *This bug only affects Firefox on Android.* This vulnerability affects Firefox < 121.
[ "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*" ]
null
4.3
null
null
CVE-2017-3838
A vulnerability in Cisco Secure Access Control System (ACS) could allow an unauthenticated, remote attacker to conduct a DOM-based cross-site scripting (XSS) attack against the user of the web interface of the affected system. More Information: CSCvc04838. Known Affected Releases: 5.8(2.5).
[ "cpe:2.3:a:cisco:secure_access_control_system:5.8\\(2.5\\):*:*:*:*:*:*:*" ]
null
null
6.1
4.3
GHSA-f935-fh29-4mfr
PacsOne Server (PACS Server In One Box) below 7.1.1 is affected by incorrect access control, which can result in remotely gaining administrator privileges.
[]
null
null
null
null
GHSA-9qrm-8x3f-j2vq
netentsec NS-ASG 6.3 is vulnerable to SQL Injection via /WebPages/history.php.
[]
null
6.3
null
null
CVE-2020-6018
Valve's Game Networking Sockets prior to version v1.2.0 improperly handles long encrypted messages in function AES_GCM_DecryptContext::Decrypt() when compiled using libsodium, leading to a Stack-Based Buffer Overflow and resulting in a memory corruption and possibly even a remote code execution.
[ "cpe:2.3:a:valvesoftware:game_networking_sockets:*:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
GHSA-hv54-cc8f-42jq
Cross-Site Request Forgery in Jenkins Recipe Plugin
A cross-site request forgery (CSRF) vulnerability in Jenkins Recipe Plugin 1.2 and earlier allows attackers to send an HTTP request to an attacker-specified URL and parse the response as XML.
[]
null
7.1
null
null
GHSA-2hhx-vp2f-m5hf
Tenda AC8V4 V16.03.34.06 was discovered to contain a stack overflow via the shareSpeed parameter in the sub_49E098 function.
[]
null
9.8
null
null
GHSA-73w2-5f6g-jx42
An issue has been discovered in GitLab CE/EE affecting all versions starting from 10.3 before 15.11.10, all versions starting from 16.0 before 16.0.6, all versions starting from 16.1 before 16.1.1. A Regular Expression Denial of Service was possible via sending crafted payloads to the preview_markdown endpoint.
[]
null
7.5
null
null
GHSA-9cfh-j5rr-38cm
Argument injection vulnerability in Microsoft Internet Explorer, when running on systems with SeaMonkey installed and certain URIs registered, allows remote attackers to conduct cross-browser scripting attacks and execute arbitrary commands via shell metacharacters in a mailto URI, which are inserted into the command line that is created when invoking SeaMonkey.exe, a related issue to CVE-2007-3670.
[]
null
null
null
null
CVE-2024-36199
Adobe Experience Manager | Cross-site Scripting (Stored XSS) (CWE-79)
Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
[ "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*" ]
null
5.4
null
null
CVE-2022-31827
MonstaFTP v2.10.3 was discovered to contain a Server-Side Request Forgery (SSRF) via the function performFetchRequest at HTTPFetcher.php.
[ "cpe:2.3:a:monstaftp:monstaftp:2.10.3:*:*:*:*:*:*:*" ]
null
9.1
null
6.4
GHSA-qxq3-p28m-qc36
A vulnerability has been identified in SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00). Affected devices do not properly validate parameters of POST requests. This could allow an authenticated attacker to set the device to a denial of service state or to control the program counter and, thus, execute arbitrary code on the device.
[]
null
8.8
null
null
CVE-2013-3206
Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3201, CVE-2013-3203, CVE-2013-3207, and CVE-2013-3209.
[ "cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*" ]
null
null
null
9.3
GHSA-xh44-7m8v-gqg4
A use-of-uninitialized-pointer vulnerability exists in the Forward Open connection_management_entry functionality of EIP Stack Group OpENer development commit 58ee13c. A specially-crafted EtherNet/IP request can lead to use of a null pointer, causing the server to crash. An attacker can send a series of EtherNet/IP requests to trigger this vulnerability.
[]
null
7.5
null
null
GHSA-g3g3-hhxv-74r2
Directory traversal vulnerability in Huawei eSight before V300R003C20SPC005 allows remote authenticated users to read arbitrary files via unspecified vectors.
[]
null
null
6.5
null
CVE-2017-16340
An attacker could send an authenticated HTTP request to trigger this vulnerability in Insteon Hub running firmware version 1012. At 0x9d01c0e8 the value for the s_dport key is copied using strcpy to the buffer at 0xa000180c. This buffer is 6 bytes large, sending anything longer will cause a buffer overflow.
[ "cpe:2.3:o:insteon:hub_firmware:1012:*:*:*:*:*:*:*", "cpe:2.3:h:insteon:hub:-:*:*:*:*:*:*:*" ]
null
null
8.5
null
CVE-2016-4269
Adobe Reader and Acrobat before 11.0.17, Acrobat and Acrobat Reader DC Classic before 15.006.30198, and Acrobat and Acrobat Reader DC Continuous before 15.017.20050 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4191, CVE-2016-4192, CVE-2016-4193, CVE-2016-4194, CVE-2016-4195, CVE-2016-4196, CVE-2016-4197, CVE-2016-4198, CVE-2016-4199, CVE-2016-4200, CVE-2016-4201, CVE-2016-4202, CVE-2016-4203, CVE-2016-4204, CVE-2016-4205, CVE-2016-4206, CVE-2016-4207, CVE-2016-4208, CVE-2016-4211, CVE-2016-4212, CVE-2016-4213, CVE-2016-4214, CVE-2016-4250, CVE-2016-4251, CVE-2016-4252, CVE-2016-4254, CVE-2016-4265, CVE-2016-4266, CVE-2016-4267, CVE-2016-4268, and CVE-2016-4270.
[ "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:reader:*:*:*:*:*:*:*:*" ]
null
null
9.8
10
CVE-2018-9128
DVD X Player Standard 5.5.3.9 has a Buffer Overflow via a crafted .plf file, a related issue to CVE-2007-3068.
[ "cpe:2.3:a:dvd-x-player:dvd_x_player:5.5.3.9:*:*:*:standard:*:*:*" ]
null
null
7.8
6.8
GHSA-87qj-872v-w6wg
The Administrative Web Interface in Citrix NetScaler Application Delivery Controller (ADC) and NetScaler Gateway 11.x before 11.0 Build 64.34, 10.5 before 10.5 Build 59.13, 10.5.e before Build 59.1305.e, and 10.1 allows remote attackers to conduct clickjacking attacks via unspecified vectors.
[]
null
null
6.1
null
CVE-2017-8160
The Madapt Driver of some Huawei smart phones with software Earlier than Vicky-AL00AC00B172 versions,Vicky-AL00CC768B122,Vicky-TL00AC01B167,Earlier than Victoria-AL00AC00B172 versions,Victoria-TL00AC00B123,Victoria-TL00AC01B167 has a use after free (UAF) vulnerability. An attacker can trick a user to install a malicious application which has a high privilege to exploit this vulnerability, Successful exploitation may cause arbitrary code execution.
[ "cpe:2.3:o:huawei:vicky-al00a_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:vicky-al00a:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:vicky-al00c_firmware:vicky-al00cc768b122:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:vicky-al00c:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:vicky-tl00a_firmware:vicky-tl00ac01b167:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:vicky-tl00a:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:victoria-al00a_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:victoria-al00a:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:victoria-tl00a_firmware:victoria-tl00ac00b123:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:victoria-tl00a:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:victoria-tl00a_firmware:victoria-tl00ac01b167:*:*:*:*:*:*:*" ]
null
null
7.8
9.3
GHSA-h862-m45v-wg8w
Format string vulnerability in PunkBuster 1.180 and earlier, as used by Soldier of Fortune II and possibly other games, allows remote attackers to cause a denial of service (server crash) and possibly execute arbitrary code via format string specifiers in invalid cvar values, which are not properly handled when the server kicks the player and records the reason.
[]
null
null
null
null
GHSA-cgqx-hv7c-9fq5
The server process in Novell Messenger 2.1 and 2.2.x before 2.2.1, and Novell GroupWise Messenger 2.04 and earlier, allows remote attackers to read from arbitrary memory locations via a crafted command.
[]
null
null
null
null
CVE-2019-7041
Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have a security bypass vulnerability. Successful exploitation could lead to privilege escalation.
[ "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
null
8.8
6.8
CVE-2011-2718
Multiple directory traversal vulnerabilities in the relational schema implementation in phpMyAdmin 3.4.x before 3.4.3.2 allow remote authenticated users to include and execute arbitrary local files via directory traversal sequences in an export type field, related to (1) libraries/schema/User_Schema.class.php and (2) schema_export.php.
[ "cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.3.1:*:*:*:*:*:*:*" ]
null
null
null
6
GHSA-9c9q-3xvx-4wqh
The ocfs2_prepare_page_for_write function in fs/ocfs2/aops.c in the Oracle Cluster File System 2 (OCFS2) subsystem in the Linux kernel before 2.6.39-rc1 does not properly handle holes that cross page boundaries, which allows local users to obtain potentially sensitive information from uninitialized disk locations by reading a file.
[]
null
null
null
null
CVE-2021-21163
Insufficient data validation in Reader Mode in Google Chrome on iOS prior to 89.0.4389.72 allowed a remote attacker to leak cross-origin data via a crafted HTML page and a malicious server.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:-:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*" ]
null
6.5
null
4.3
CVE-2024-2589
SQL injection vulnerability in AMSS++
Vulnerability in AMSS++ version 4.31 that allows SQL injection through /amssplus/modules/book/main/bookdetail_school_person.php, in multiple parameters. This vulnerability could allow a remote attacker to send a specially crafted SQL query to the server and retrieve all the information stored in the DB.
[ "cpe:2.3:a:amssplus:amss_plus:4.31:*:*:*:*:*:*:*" ]
null
8.2
null
null
GHSA-2v7h-rhjc-hq44
Cross-Site Request Forgery (CSRF) vulnerability in Skpstorm SK WP Settings Backup allows Object Injection.This issue affects SK WP Settings Backup: from n/a through 1.0.
[]
null
8.8
null
null
CVE-2002-1774
NOTE: this issue has been disputed by the vendor. Symantec Norton AntiVirus 2002 allows remote attackers to send viruses that bypass the e-mail scanning via a NULL character in the MIME header before the virus. NOTE: the vendor has disputed this issue, acknowledging that the initial scan is bypassed, but the AutoProtect feature would detect the virus before it is executed
[ "cpe:2.3:a:symantec:norton_antivirus:2002:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2019-11508
In Pulse Secure Pulse Connect Secure (PCS) before 8.1R15.1, 8.2 before 8.2R12.1, 8.3 before 8.3R7.1, and 9.0 before 9.0R3.4, an authenticated attacker (via the admin web interface) can exploit Directory Traversal to execute arbitrary code on the appliance.
[ "cpe:2.3:a:ivanti:connect_secure:7.1:*:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:7.1:r1.0:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:7.1:r1.1:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:7.1:r10.0:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:7.1:r11.0:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:7.1:r12.0:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:7.1:r13.0:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:7.1:r14.0:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:7.1:r15.0:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:7.1:r16.0:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:7.1:r17.0:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:7.1:r18.0:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:7.1:r19.0:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:7.1:r19.1:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:7.1:r2.0:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:7.1:r20.0:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:7.1:r20.1:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:7.1:r20.2:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:7.1:r21.0:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:7.1:r22.0:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:7.1:r22.1:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:7.1:r22.2:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:7.1:r22.3:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:7.1:r22.4:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:7.1:r3.0:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:7.1:r4.0:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:7.1:r4.1:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:7.1:r5.0:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:7.1:r6.0:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:7.1:r7.0:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:7.1:r8.0:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:7.1:r9.0:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:7.4:r1.0:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:7.4:r10.0:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:7.4:r11.0:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:7.4:r11.1:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:7.4:r12.0:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:7.4:r13.0:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:7.4:r13.1:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:7.4:r13.2:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:7.4:r13.3:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:7.4:r13.4:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:7.4:r13.5:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:7.4:r13.6:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:7.4:r2.0:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:7.4:r3.0:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:7.4:r4.0:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:7.4:r5.0:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:7.4:r6.0:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:7.4:r7.0:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:7.4:r8.0:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:7.4:r9.0:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:7.4:r9.1:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:7.4:r9.2:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:7.4:r9.3:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:8.1:*:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:8.1:r1.0:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:8.1:r1.1:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:8.1:r10.0:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:8.1:r11.0:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:8.1:r11.1:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:8.1:r12.0:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:8.1:r12.1:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:8.1:r13.0:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:8.1:r14.0:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:8.1:r2.0:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:8.1:r2.1:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:8.1:r3.1:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:8.1:r3.2:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:8.1:r4.0:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:8.1:r4.1:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:8.1:r5.0:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:8.1:r6.0:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:8.1:r7.0:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:8.1:r8.0:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:8.1:r9.0:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:8.1:r9.1:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:8.1:r9.2:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:8.2:r1.0:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:8.2:r1.1:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:8.2:r10.0:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:8.2:r11.0:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:8.2:r12.0:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:8.2:r2.0:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:8.2:r3.0:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:8.2:r3.1:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:8.2:r4.0:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:8.2:r4.1:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:8.2:r5.0:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:8.2:r5.1:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:8.2:r6.0:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:8.2:r7.0:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:8.2:r7.1:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:8.2:r8.0:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:8.2:r8.1:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:8.2:r8.2:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:8.2:r9.0:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:8.3:r1:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:8.3:r2:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:8.3:r2.1:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:8.3:r3:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:8.3:r4:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:8.3:r5:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:8.3:r5.1:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:8.3:r5.2:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:8.3:r6:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:8.3:r6.1:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:8.3:r7:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:9.0:r1:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:9.0:r2:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:9.0:r2.1:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:9.0:r3:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:9.0:r3.1:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:9.0:r3.2:*:*:*:*:*:*", "cpe:2.3:a:pulsesecure:pulse_connect_secure:7.4:*:*:*:*:*:*:*" ]
null
null
8.6
null
CVE-2022-31055
Improper Access Control in kctf
kCTF is a Kubernetes-based infrastructure for capture the flag (CTF) competitions. Prior to version 1.6.0, the kctf cluster set-src-ip-ranges was broken and allowed traffic from any IP. The problem has been patched in v1.6.0. As a workaround, those who want to test challenges privately can mark them as `public: false` and use `kctf chal debug port-forward` to connect.
[ "cpe:2.3:a:google:kctf:*:*:*:*:*:*:*:*" ]
null
7.5
null
null
CVE-2024-58115
Buffer overflow vulnerability in the SVG parsing module of the ArkUI framework Impact: Successful exploitation of this vulnerability may affect availability.
[]
null
4
null
null
GHSA-63q7-72w2-qvvv
Authorization Bypass Through User-Controlled Key vulnerability in Software Engineering Consultancy Machine Equipment Limited Company Hearing Tracking System allows Authentication Abuse.This issue affects Hearing Tracking System: before for IOS 7.0, for Android Latest release 1.0.
[]
null
8.8
null
null
GHSA-vqq3-6hq7-qcxr
In CyberArk Endpoint Privilege Manager (formerly Viewfinity), Privilege Escalation is possible if the attacker has one process that executes as Admin.
[]
null
null
9.8
null
GHSA-q4hm-fwc9-hmv6
Insecure temporary file used in com.squareup:connect
This affects all versions of package com.squareup:connect. The method prepareDownloadFilecreates creates a temporary file with the permissions bits of -rw-r--r-- on unix-like systems. On unix-like systems, the system temporary directory is shared between users. As such, the contents of the file downloaded by downloadFileFromResponse will be visible to all other users on the local system. A workaround fix for this issue is to set the system property java.io.tmpdir to a safe directory as remediation. Note: This version of the SDK is end of life and no longer maintained, please upgrade to the latest version.
[]
null
3.3
null
null
CVE-2021-36319
Dell Networking OS10 versions 10.4.3.x, 10.5.0.x and 10.5.1.x contain an information exposure vulnerability. A low privileged authenticated malicious user can gain access to SNMP authentication failure messages.
[ "cpe:2.3:o:dell:networking_os10:*:*:*:*:*:*:*:*" ]
null
3.3
null
null
CVE-2016-4618
Cross-site scripting (XSS) vulnerability in Safari Reader in Apple iOS before 10 and Safari before 10 allows remote attackers to inject arbitrary web script or HTML via a crafted web site, aka "Universal XSS (UXSS)."
[ "cpe:2.3:a:apple:safari:9.1.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" ]
null
null
6.1
4.3
CVE-2006-6238
The AutoFill feature in Apple Safari 2.0.4 does not properly verify that all automatically populated form fields are visible to the user, which allows remote attackers to obtain sensitive information, such as usernames and passwords, via input fields of zero width, a variant of CVE-2006-6077.
[ "cpe:2.3:a:apple:safari:2.0.4:*:*:*:*:*:*:*" ]
null
null
null
5
GHSA-vgpm-hvwj-9wc9
In FreeBSD before 11.0-STABLE, 11.0-RELEASE-p10, 10.3-STABLE, and 10.3-RELEASE-p19, ipfilter using "keep state" or "keep frags" options can cause a kernel panic when fed specially crafted packet fragments due to incorrect memory handling.
[]
null
null
7.5
null