id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
57.2k
cpes
sequencelengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
CVE-2015-3713
QuickTime in Apple OS X before 10.10.4 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted movie file.
[ "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:*:*:*:*:*:*:*:*" ]
null
null
null
6.8
GHSA-g5m7-gw4j-cjhj
Buffer overflow in Cisco TACACS+ tac_plus server allows remote attackers to cause a denial of service via a malformed packet with a long length field.
[]
null
null
null
null
GHSA-gcg3-3cx8-rgqh
In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, in the fastrpc kernel driver, a buffer overflow vulnerability from userspace may potentially exist.
[]
null
null
7.8
null
CVE-2016-8429
An elevation of privilege vulnerability in the NVIDIA GPU driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Critical due to the possibility of a local permanent device compromise, which may require reflashing the operating system to repair the device. Product: Android. Versions: Kernel-3.10. Android ID: A-32160775. References: N-CVE-2016-8429.
[ "cpe:2.3:o:linux:linux_kernel:3.10:*:*:*:*:*:*:*" ]
null
null
7.8
9.3
GHSA-824g-39r8-p8w4
Insufficient policy enforcement in Omnibox in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.
[]
null
6.5
null
null
CVE-2019-12579
A vulnerability in the London Trust Media Private Internet Access (PIA) VPN Client v82 for Linux and macOS could allow an authenticated, local attacker to run arbitrary code with elevated privileges. The PIA Linux/macOS binary openvpn_launcher.64 binary is setuid root. This binary accepts several parameters to update the system configuration. These parameters are passed to operating system commands using a "here" document. The parameters are not sanitized, which allow for arbitrary commands to be injected using shell metacharacters. A local unprivileged user can pass special crafted parameters that will be interpolated by the operating system calls.
[ "cpe:2.3:a:londontrustmedia:private_internet_access_vpn_client:82:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*" ]
null
null
7.8
7.2
CVE-2023-33356
IceCMS v1.0.0 is vulnerable to Cross Site Scripting (XSS).
[ "cpe:2.3:a:thecosy:icecms:1.0.0:*:*:*:*:*:*:*" ]
null
5.4
null
null
PYSEC-2020-104
null
An issue was discovered in SaltStack Salt through 3002. Sending crafted web requests to the Salt API, with the SSH client enabled, can result in shell injection.
[]
null
null
null
null
GHSA-9fhq-2p6p-h9p8
A vulnerability has been found in openBI up to 1.0.8 and classified as critical. This vulnerability affects the function uploadIcon of the file /application/index/controller/Icon.php. The manipulation of the argument image leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-252310 is the identifier assigned to this vulnerability.
[]
null
7.3
null
null
GHSA-jq8g-94vx-pgrm
An issue was discovered in swftools through 20200710. A NULL pointer dereference exists in the function traits_dump() located in abc.c. It allows an attacker to cause Denial of Service.
[]
null
null
null
null
GHSA-v5j8-4g8q-9q2c
A NULL pointer dereference vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers who have gained administrator access to launch a denial-of-service (DoS) attack.We have already fixed the vulnerability in the following versions: QTS 5.2.1.2930 build 20241025 and later QuTS hero h5.2.1.2929 build 20241025 and later
[]
5.1
null
null
null
GHSA-55j8-4mpr-wfvp
An issue was discovered in EMC ScaleIO 2.0.1.x. A buffer overflow vulnerability in the SDBG service may potentially allow a remote unauthenticated attacker to execute arbitrary commands with root privileges on an affected server.
[]
null
null
9.8
null
CVE-2014-4005
SAP Brazil add-on has hardcoded credentials, which makes it easier for remote attackers to obtain access via unspecified vectors.
[ "cpe:2.3:a:sap:brazil:-:*:*:*:*:*:*:*" ]
null
null
null
5
CVE-2017-16082
A remote code execution vulnerability was found within the pg module when the remote database or query specifies a specially crafted column name. There are 2 likely scenarios in which one would likely be vulnerable. 1) Executing unsafe, user-supplied sql which contains a malicious column name. 2) Connecting to an untrusted database and executing a query which returns results where any of the column names are malicious.
[ "cpe:2.3:a:node-postgres:pg:*:*:*:*:*:node.js:*:*" ]
null
null
9.8
7.5
GHSA-4426-wxwq-q9rv
HEVC Video Extensions Remote Code Execution Vulnerability This CVE ID is unique from CVE-2020-17106, CVE-2020-17108, CVE-2020-17109, CVE-2020-17110.
[]
null
7.8
null
null
CVE-2024-3875
Tenda F1202 Natlimit fromNatlimit stack-based overflow
A vulnerability was found in Tenda F1202 1.2.0.20(408). It has been rated as critical. This issue affects the function fromNatlimit of the file /goform/Natlimit. The manipulation of the argument page leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-260909 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
[]
null
8.8
8.8
9
GHSA-wv72-9v4w-73w6
A stored cross-site scripting (XSS) vulnerability in /home/user/edit_submit of gougucms v4.08.18 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the headimgurl parameter.
[]
null
5.4
null
null
GHSA-c589-hx7c-9gj9
An FR-GV-203 issue in FreeRADIUS 2.x before 2.2.10 allows "DHCP - Memory leak in decode_tlv()" and a denial of service.
[]
null
null
7.5
null
GHSA-v7vj-pg9w-p92q
Cross-site scripting (XSS) vulnerability in EMC Smarts IP Manager, Smarts Service Assurance Manager, Smarts Server Manager, Smarts VoIP Availability Manager, Smarts Network Protocol Manager, and Smarts MPLS Manager before 9.2 allows remote attackers to inject arbitrary web script or HTML via a crafted URL.
[]
null
null
null
null
GHSA-x944-3w5c-5hcg
The Element Pack Elementor Addons (Header Footer, Template Library, Dynamic Grid & Carousel, Remote Arrows) WordPress plugin before 5.10.3 does not validate and escape some of its block options before outputting them back in a page/post where the block is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
[]
null
5.4
null
null
GHSA-v9cj-6wcq-m4j9
Untrusted search path vulnerability in dbmsrv in SAP MaxDB 7.6.03.15 on Linux allows local users to gain privileges via a modified PATH environment variable.
[]
null
null
null
null
CVE-2017-1522
IBM Content Navigator & CMIS 2.0.3, 3.0.0, and 3.0.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 129832.
[ "cpe:2.3:a:ibm:content_navigator:2.0.3.8:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:content_navigator:3.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:content_navigator:3.0.1:*:*:*:*:*:*:*" ]
null
null
5.4
3.5
GHSA-3vfw-f9fg-pj3x
A spoofing vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server, aka 'Microsoft SharePoint Spoofing Vulnerability'.
[]
null
5.4
null
null
GHSA-hr66-f59g-prqh
A vulnerability, which was classified as problematic, was found in SourceCodester Resort Reservation System 1.0. Affected is an unknown function of the file registration.php. The manipulation of the argument fullname leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-227640.
[]
null
null
4.3
null
CVE-2018-1442
IBM Application Performance Management - Response Time Monitoring Agent (IBM Monitoring 8.1.4) is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 139598.
[ "cpe:2.3:a:ibm:monitoring:8.1.4:*:*:*:*:*:*:*" ]
null
null
4.3
null
GHSA-q778-7mc2-5qmc
Versions affected: BIND 9.18.0 When a vulnerable version of named receives a series of specific queries, the named process will eventually terminate due to a failed assertion check.
[]
null
7.5
null
null
GHSA-r5rf-wpwj-h23p
In the Linux kernel, the following vulnerability has been resolved:net: usb: rtl8150: enable basic endpoint checkingSyzkaller reports [1] encountering a common issue of utilizing a wrong usb endpoint type during URB submitting stage. This, in turn, triggers a warning shown below.For now, enable simple endpoint checking (specifically, bulk and interrupt eps, testing control one is not essential) to mitigate the issue with a view to do other related cosmetic changes later, if they are necessary.[1] Syzkaller report: usb 1-1: BOGUS urb xfer, pipe 3 != type 1 WARNING: CPU: 1 PID: 2586 at drivers/usb/core/urb.c:503 usb_submit_urb+0xe4b/0x1730 driv> Modules linked in: CPU: 1 UID: 0 PID: 2586 Comm: dhcpcd Not tainted 6.11.0-rc4-syzkaller-00069-gfc88bb11617> Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 RIP: 0010:usb_submit_urb+0xe4b/0x1730 drivers/usb/core/urb.c:503 Code: 84 3c 02 00 00 e8 05 e4 fc fc 4c 89 ef e8 fd 25 d7 fe 45 89 e0 89 e9 4c 89 f2 48 8> RSP: 0018:ffffc9000441f740 EFLAGS: 00010282 RAX: 0000000000000000 RBX: ffff888112487a00 RCX: ffffffff811a99a9 RDX: ffff88810df6ba80 RSI: ffffffff811a99b6 RDI: 0000000000000001 RBP: 0000000000000003 R08: 0000000000000001 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000001 R12: 0000000000000001 R13: ffff8881023bf0a8 R14: ffff888112452a20 R15: ffff888112487a7c FS: 00007fc04eea5740(0000) GS:ffff8881f6300000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f0a1de9f870 CR3: 000000010dbd0000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: <TASK> rtl8150_open+0x300/0xe30 drivers/net/usb/rtl8150.c:733 __dev_open+0x2d4/0x4e0 net/core/dev.c:1474 __dev_change_flags+0x561/0x720 net/core/dev.c:8838 dev_change_flags+0x8f/0x160 net/core/dev.c:8910 devinet_ioctl+0x127a/0x1f10 net/ipv4/devinet.c:1177 inet_ioctl+0x3aa/0x3f0 net/ipv4/af_inet.c:1003 sock_do_ioctl+0x116/0x280 net/socket.c:1222 sock_ioctl+0x22e/0x6c0 net/socket.c:1341 vfs_ioctl fs/ioctl.c:51 [inline] __do_sys_ioctl fs/ioctl.c:907 [inline] __se_sys_ioctl fs/ioctl.c:893 [inline] __x64_sys_ioctl+0x193/0x220 fs/ioctl.c:893 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7fc04ef73d49 ...This change has not been tested on real hardware.
[]
null
null
null
null
GHSA-2h6h-4q8g-8rmw
The ReadDIBImage function in coders/dib.c in ImageMagick before 6.9.9-0 and 7.x before 7.0.6-1 allows remote attackers to cause a denial of service (memory leak) via a crafted file.
[]
null
null
6.5
null
CVE-2023-21102
In __efi_rt_asm_wrapper of efi-rt-wrapper.S, there is a possible bypass of shadow stack protection due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-260821414References: Upstream kernel
[ "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*" ]
null
7.8
null
null
GHSA-48c3-9c9f-chwr
Vulnerability in the PeopleSoft Enterprise PRTL Interaction Hub component of Oracle PeopleSoft Products (subcomponent: EPPCM_HIER_TOP). The supported version that is affected is 9.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PRTL Interaction Hub. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in PeopleSoft Enterprise PRTL Interaction Hub, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise PRTL Interaction Hub accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise PRTL Interaction Hub accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).
[]
null
null
6.1
null
GHSA-wq3v-33f3-3c29
IBM Financial Transaction Manager for Digital Payments for Multi-Platform 3.2.0 through 3.2.9 is vulnerable to SQL injection. A remote attacker could send specially-crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-Force ID: 166801.
[]
null
9.8
null
null
CVE-2015-5365
Cross-site scripting (XSS) vulnerability in Zurmo CRM 3.0.2 allows remote authenticated users to inject arbitrary web script or HTML via the "What's going on?" profile field.
[ "cpe:2.3:a:zurmo:zurmo_crm:3.0.2:*:*:*:*:*:*:*" ]
null
null
null
3.5
CVE-2014-3838
ownCloud Server before 5.0.16 and 6.0.x before 6.0.3 does not properly check permissions, which allows remote authenticated users to read the names of files of other users by leveraging access to multiple accounts.
[ "cpe:2.3:a:owncloud:owncloud:*:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:5.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:5.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:5.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:5.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:5.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:5.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:5.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:5.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:5.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:5.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:5.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:5.0.13:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:5.0.14:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:5.0.14:a:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:6.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:6.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:6.0.2:*:*:*:*:*:*:*" ]
null
null
null
4
CVE-2016-7659
An issue was discovered in certain Apple products. iOS before 10.2 is affected. macOS before 10.12.2 is affected. watchOS before 3.1.3 is affected. The issue involves the "Audio" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted file.
[ "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*" ]
null
null
8.8
6.8
GHSA-45jj-q8mv-p3p6
Cross-site scripting (XSS) vulnerability in fichiers/add_url.php in Logz CMS 1.3.1 allows remote attackers to inject arbitrary web script or HTML via the art parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
[]
null
null
null
null
GHSA-qv9v-xqjc-jc7f
Cross Site Scripting vulnerability in Quorum onQ OS v.6.0.0.5.2064 allows a remote attacker to obtain sensitive information via the msg parameter in the Login page.
[]
null
6.1
null
null
GHSA-x2cv-5mxq-rr26
Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.37 and earlier and 5.6.17 and earlier allows remote authenticated users to affect confidentiality, integrity, and availability via vectors related to SRINFOSC.
[]
null
null
null
null
GHSA-hh4f-vg35-pgxc
An issue was discovered in AKCMS 6.1. CSRF can delete an article via an admincp deleteitem action to index.php.
[]
null
null
6.5
null
GHSA-2vgm-gvf9-pg8j
An issue was discovered in Ivanti Avalanche for all versions between 5.3 and 6.2. A local user with database access privileges can read the encrypted passwords for users who authenticate via LDAP to Avalanche services. These passwords are stored in the Avalanche databases. This issue only affects customers who have enabled LDAP authentication in their configuration.
[]
null
null
7.8
null
GHSA-2v9x-gpq4-8gg2
CSRF vulnerability in Jenkins Shared Objects Plugin
A cross-site request forgery (CSRF) vulnerability in Jenkins Shared Objects Plugin 0.44 and earlier allows attackers to configure shared objects.
[]
null
4.3
null
null
GHSA-928h-h2fh-4474
SQL injection vulnerability in the wt_directory extension before 1.4.2 for TYPO3 allows remote authenticated users to execute arbitrary SQL commands via unspecified vectors.
[]
null
null
null
null
CVE-2015-4873
Unspecified vulnerability in the Database Scheduler component in Oracle Database Server 11.2.0.4, 12.1.0.1, and 12.1.0.2 allows local users to affect confidentiality, integrity, and availability via unknown vectors.
[ "cpe:2.3:a:oracle:database_server:11.2.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:database_server:12.1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:database_server:12.1.0.2:*:*:*:*:*:*:*" ]
null
null
null
7.2
CVE-2021-21459
SAP 3D Visual Enterprise Viewer, version - 9, allows a user to open manipulated IFF file received from untrusted sources which results in crashing of the application and becoming temporarily unavailable until the user restarts the application, this is caused due to Improper Input Validation.
[ "cpe:2.3:a:sap:3d_visual_enterprise_viewer:9:*:*:*:*:*:*:*" ]
null
null
4.3
null
GHSA-cfch-8h45-r4hc
Multiple cross-site scripting (XSS) vulnerabilities in myadmin/index.php in NextAge Shopping Cart allow remote attackers to inject arbitrary web script or HTML via the (1) username and (2) password parameters.
[]
null
null
null
null
CVE-2016-3028
IBM Security Access Manager for Web 7.0 before IF2 and 8.0 before 8.0.1.4 IF3 and Security Access Manager 9.0 before 9.0.1.0 IF5 allow remote authenticated users to execute arbitrary commands by leveraging LMI admin access.
[ "cpe:2.3:a:ibm:security_access_manager:9.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:security_access_manager:9.0.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:security_access_manager:9.0.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:security_access_manager_for_web:7.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:security_access_manager_for_web:8.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:security_access_manager_for_web:8.0.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:security_access_manager_for_web:8.0.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:security_access_manager_for_web:8.0.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:security_access_manager_for_web:8.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:security_access_manager_for_web:8.0.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:security_access_manager_for_web:8.0.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:security_access_manager_for_web:8.0.1.4:*:*:*:*:*:*:*" ]
null
null
9.1
9
GHSA-6rv4-4qv6-88g2
Prototype Pollution in set-or-get
Prototype pollution vulnerability in ‘set-or-get’ version 1.0.0 through 1.2.10 allows an attacker to cause a denial of service and may lead to remote code execution.
[]
null
9.8
null
null
GHSA-m2q8-9rr2-r2ww
A mechanism to spoof the Firefox for Android addressbar using a "javascript:" URI. On Firefox for Android, the base domain is parsed incorrectly, making the resulting location less visibly a spoofed site and showing an incorrect domain in appended notifications. This vulnerability affects Firefox < 53.
[]
null
null
7.5
null
GHSA-f9f8-xghc-582j
Multiple cross-site scripting (XSS) vulnerabilities in the Zingiri Web Shop plugin 2.4.0 for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) page parameter in zing.inc.php or (2) notes parameter in fws/pages-front/onecheckout.php.
[]
null
null
null
null
CVE-2015-5165
The C+ mode offload emulation in the RTL8139 network card device model in QEMU, as used in Xen 4.5.x and earlier, allows remote attackers to read process heap memory via unspecified vectors.
[ "cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:4.5.1:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*", "cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp1:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*", "cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:ltss:*:*:*", "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:openstack:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:openstack:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:virtualization:3.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_compute_node_eus:7.1:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_compute_node_eus:7.2:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_compute_node_eus:7.3:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_compute_node_eus:7.4:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_compute_node_eus:7.5:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_compute_node_eus:7.6:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_compute_node_eus:7.7:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_eus_compute_node:6.7:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:6.7_ppc64:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.1_ppc64:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.2_ppc64:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.3_ppc64:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.4_ppc64:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.5_ppc64:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.6_ppc64:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.7_ppc64:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.1:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.7:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_eus_from_rhui:6.7:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:7.2:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:7.3:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:7.4:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:7.6:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:7.7:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:arista:eos:4.12:*:*:*:*:*:*:*", "cpe:2.3:o:arista:eos:4.13:*:*:*:*:*:*:*", "cpe:2.3:o:arista:eos:4.14:*:*:*:*:*:*:*", "cpe:2.3:o:arista:eos:4.15:*:*:*:*:*:*:*", "cpe:2.3:o:oracle:linux:7:0:*:*:*:*:*:*" ]
null
null
null
9.3
CVE-2014-9731
The UDF filesystem implementation in the Linux kernel before 3.18.2 does not ensure that space is available for storing a symlink target's name along with a trailing \0 character, which allows local users to obtain sensitive information via a crafted filesystem image, related to fs/udf/symlink.c and fs/udf/unicode.c.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
null
null
null
2.1
RHSA-2017:2731
Red Hat Security Advisory: kernel security and bug fix update
kernel: stack buffer overflow in the native Bluetooth stack
[ "cpe:/o:redhat:rhel_aus:6.6::server", "cpe:/o:redhat:rhel_tus:6.6::server" ]
null
null
7.5
null
GHSA-hrfm-36wx-2cfx
The WPC Admin Columns plugin for WordPress is vulnerable to privilege escalation in versions 2.0.6 to 2.1.0. This is due to the plugin not properly restricting user meta values that can be updated through the ajax_edit_save() function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update their role to that of an administrator.
[]
null
8.8
null
null
GHSA-mfqq-q5rf-3hvq
Telerik.Web.UI.dll in Progress Telerik UI for ASP.NET AJAX before R2 2017 SP1 and Sitefinity before 10.0.6412.0 does not properly protect Telerik.Web.UI.DialogParametersEncryptionKey or the MachineKey, which makes it easier for remote attackers to defeat cryptographic protection mechanisms, leading to a MachineKey leak, arbitrary file uploads or downloads, XSS, or ASP.NET ViewState compromise.
[]
null
null
9.8
null
CVE-2023-39392
Vulnerability of insecure signatures in the OsuLogin module. Successful exploitation of this vulnerability may cause OsuLogin to be maliciously modified and overwritten.
[ "cpe:2.3:o:huawei:emui:12.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*" ]
null
7.5
null
null
CVE-2007-1633
Directory traversal vulnerability in bbcode_ref.php in the Giorgio Ciranni Splatt Forum 4.0 RC1 module for PHP-Nuke allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the name parameter, as demonstrated by injecting PHP sequences into an Apache HTTP Server log file, which is then included by bbcode_ref.php.
[ "cpe:2.3:a:giorgio_ciranni:splatt_forum:4.0_rc1:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-9c9v-ch99-46qw
The Remote Installation Service (RIS) in Microsoft Windows 2000 SP4 uses a TFTP server that allows anonymous access, which allows remote attackers to upload and overwrite arbitrary files to gain privileges on systems that use RIS.
[]
null
null
null
null
GHSA-7wwm-57j8-wx2j
An issue was discovered in net/ceph/messenger_v2.c in the Linux kernel before 6.4.5. There is an integer signedness error, leading to a buffer overflow and remote code execution via HELLO or one of the AUTH frames. This occurs because of an untrusted length taken from a TCP packet in ceph_decode_32.
[]
null
8.8
null
null
GHSA-4r48-94p2-qwq4
The Disable Auto Updates plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.4. This is due to missing or incorrect nonce validation on the 'disable-auto-updates' page. This makes it possible for unauthenticated attackers to disable all auto updates via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
[]
null
4.3
null
null
GHSA-h3v7-cvf6-7jhw
The AWV component of Mitel MiCollab before 9.2 could allow an attacker to gain access to a web conference due to insufficient access control for conference codes.
[]
null
null
null
null
CVE-2019-15068
A broken access control vulnerability discovered in Smart Battery A4
A broken access control vulnerability in Smart Battery A4, a multifunctional portable charger, firmware version ?<= r1.7.9 allows an attacker to get/reset administrator’s password without any authentication.
[ "cpe:2.3:o:gigastone:smart_battery_a4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:gigastone:smart_battery_a4:-:*:*:*:*:*:*:*" ]
null
9.8
null
10
ICSA-19-106-02
WAGO Series 750-88x and 750-87x
By exploiting the undocumented service access, it is possible to change the settings of a device and access web-based management with administrator privileges. An attacker can exploit this vulnerability to lock other users out from the device or open closed network ports. It is also possible to use this service access as an FTP user and exchange or delete the application.CVE-2019-10712 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
[]
null
null
9.8
null
GHSA-v66p-hmjm-wrxm
Target influence via framing vulnerability in the web interface in McAfee Network Security Management (NSM) before 8.2.7.42.2 allows remote attackers to inject arbitrary web script or HTML via application pages inability to break out of 3rd party HTML frames.
[]
null
null
6.1
null
GHSA-4mcf-r6j9-cvfh
The GUP generic update process in Notepad++ before 4.8.1 does not properly verify the authenticity of updates, which allows man-in-the-middle attackers to execute arbitrary code via a Trojan horse update, as demonstrated by evilgrade and DNS cache poisoning.
[]
null
null
null
null
CVE-2020-8742
Improper input validation in the firmware for Intel(R) NUCs may allow a privileged user to potentially enable escalation of privilege via local access.
[ "cpe:2.3:o:intel:nuc8i7behga_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc8i7behga:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc8i7bekqa_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc8i7bekqa:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc8i3behfa_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc8i3behfa:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc8i5behfa_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc8i5behfa:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc8i5bekpa_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc8i5bekpa:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc8i3beh_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc8i3beh:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc8i3behs_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc8i3behs:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc8i3bek_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc8i3bek:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc8i5beh_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc8i5beh:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc8i5behs_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc8i5behs:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc8i5bek_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc8i5bek:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc8i7beh_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc8i7beh:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc8i7bek_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc8i7bek:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:cd1c32gk_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:cd1c32gk:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:cd1c64gk_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:cd1c64gk:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:cd1p64gk_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:cd1p64gk:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc8i7hnkqc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc8i7hnkqc:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc8i7hvkva_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc8i7hvkva:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc8i7hvkvaw_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc8i7hvkvaw:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc8i7hnk_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc8i7hnk:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc8i7hvk_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc8i7hvk:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc7i7dnbe_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc7i7dnbe:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc7i7dnhe_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc7i7dnhe:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc7i7dnke_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc7i7dnke:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc7i5dnkpc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc7i5dnkpc:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc7i5dnbe_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc7i5dnbe:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc7i5dnhe_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc7i5dnhe:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc7i5dnke_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc7i5dnke:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc7i3dnhnc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc7i3dnhnc:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc7i3dnktc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc7i3dnktc:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc7i3dnbe_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc7i3dnbe:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc7i3dnhe_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc7i3dnhe:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc7i3dnke_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc7i3dnke:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:stk2mv64cc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:stk2mv64cc:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc6i7kyk_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc6i7kyk:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc7cjysal_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc7cjysal:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc7cjyh_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc7cjyh:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc7pjyh_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc7pjyh:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc7i7bnhxg_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc7i7bnhxg:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc7i7bnkq_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc7i7bnkq:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc7i3bnhxf_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc7i3bnhxf:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc7i5bnhxf_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc7i5bnhxf:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc7i5bnkp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc7i5bnkp:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc7i3bnb_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc7i3bnb:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc7i5bnb_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc7i5bnb:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc7i7bnb_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc7i7bnb:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc7i3bnh_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc7i3bnh:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc7i3bnhx1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc7i3bnhx1:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc7i3bnk_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc7i3bnk:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc7i5bnh_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc7i5bnh:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc7i5bnhx1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc7i5bnhx1:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc7i5bnk_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc7i5bnk:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc7i7bnh_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc7i7bnh:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc7i7bnhx1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc7i7bnhx1:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc6cayh_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc6cayh:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc6cays_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc6cays:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:de3815tybe_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:de3815tybe:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:de3815tykhe_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:de3815tykhe:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc5cpyh_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc5cpyh:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc5pgyh_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc5pgyh:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc5ppyh_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc5ppyh:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc5i3ryh_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc5i3ryh:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc5i3ryhs_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc5i3ryhs:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc5i3ryhsn_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc5i3ryhsn:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc5i3ryk_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc5i3ryk:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc5i5ryh_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc5i5ryh:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc5i5ryhs_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc5i5ryhs:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc5i5ryk_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc5i5ryk:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc5i7ryh_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc5i7ryh:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc5i5mybe_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc5i5mybe:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc5i5myhe_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc5i5myhe:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc5i3mybe_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc5i3mybe:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc5i3myhe_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc5i3myhe:-:*:*:*:*:*:*:*" ]
null
6.7
null
4.6
GHSA-6xx7-89q7-8hw4
Unrestricted file upload vulnerability in editimage.php in eZoneScripts Living Local 1.1 allows remote authenticated administrators to execute arbitrary PHP code by uploading a file with an executable extension, then accessing it via a direct request to the uploaded file.
[]
null
null
null
null
CVE-2025-24242
This issue was addressed with improved handling of symlinks. This issue is fixed in macOS Sequoia 15.4. An app with root privileges may be able to access private information.
[]
null
4.4
null
null
CVE-2020-8887
Telestream Tektronix Medius before 10.7.5 and Sentry before 10.7.5 have a SQL injection vulnerability allowing an unauthenticated attacker to dump database contents via the page parameter in a page=login request to index.php (aka the server login page).
[ "cpe:2.3:a:telestream:medius:*:*:*:*:*:*:*:*", "cpe:2.3:a:telestream:sentry:*:*:*:*:*:*:*:*" ]
null
7.5
null
5
GHSA-72r5-8cg4-8h5f
SQL injection vulnerability in /SASStudio/sasexec/sessions/{sessionID}/sql in SAS Studio 9.4 allows remote attacker to execute arbitrary SQL commands via the POST body request.
[]
null
8.8
null
null
CVE-2025-32863
A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected application is vulnerable to SQL injection through the internally used 'UnlockTraceLevelSettings' method. This could allow an authenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with "NT AUTHORITY\NetworkService" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on.
[]
8.7
8.8
null
null
GHSA-gpp7-gqhm-5827
A vulnerability was found in the search-api container in Red Hat Advanced Cluster Management for Kubernetes when a query in the search filter gets parsed by the backend. This flaw allows an attacker to craft specific strings containing special characters that lead to crashing the pod and affects system availability while restarting.
[]
null
6.5
null
null
GHSA-v99j-m2v5-3c7x
A SQL injection vulnerability in zzzphp v1.8.0 through /form/index.php?module=getjson may lead to a possible access restriction bypass.
[]
null
null
null
null
CVE-2024-23715
In PMRWritePMPageList of pmr.c, there is a possible out of bounds write due to a logic error in the code. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation.
[ "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*" ]
null
7.8
null
null
CVE-2021-0416
In memory management driver, there is a possible system crash due to improper input validation. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05336700.
[ "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*" ]
null
5.5
null
4.9
CVE-2010-4963
SQL injection vulnerability in folder/list in Hulihan BXR 0.6.8 allows remote attackers to execute arbitrary SQL commands via the order_by parameter.
[ "cpe:2.3:a:hulihanapplications:hulihan_bxr:0.6.8:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-4w93-8hmg-4r2c
Directory traversal vulnerability in getfile.asp in Ultimate HelpDesk allows remote attackers to read arbitrary files via a .. (dot dot) in the filename parameter.
[]
null
null
null
null
CVE-2022-22722
A CWE-798: Use of Hard-coded Credentials vulnerability exists that could result in information disclosure. If an attacker were to obtain the SSH cryptographic key for the device and take active control of the local operational network connected to the product they could potentially observe and manipulate traffic associated with product configuration. Affected Product: Easergy P5 (All firmware versions prior to V01.401.101)
[ "cpe:2.3:o:schneider-electric:easergy_p5_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:easergy_p5:-:*:*:*:*:*:*:*" ]
null
7.5
null
5.4
CVE-2017-1002021
Vulnerability in wordpress plugin surveys v1.01.8, The code in individual_responses.php does not sanitize the survey_id variable before placing it inside of an SQL query.
[ "cpe:2.3:a:surveys_project:surveys:1.01.8:*:*:*:*:wordpress:*:*" ]
null
null
9.8
7.5
CVE-2014-8536
McAfee Network Data Loss Prevention (NDLP) before 9.2.2 allows local users to obtain sensitive information by reading unspecified error messages.
[ "cpe:2.3:a:mcafee:network_data_loss_prevention:*:*:*:*:*:*:*:*", "cpe:2.3:a:mcafee:network_data_loss_prevention:8.6:*:*:*:*:*:*:*", "cpe:2.3:a:mcafee:network_data_loss_prevention:9.2.0:*:*:*:*:*:*:*" ]
null
null
null
2.1
CVE-2013-3889
Microsoft Excel 2007 SP3, 2010 SP1 and SP2, 2013, and 2013 RT; Office 2007 SP3, 2010 SP1 and SP2, 2013, and 2013 RT; Office for Mac 2011; Excel Viewer; Office Compatibility Pack SP3; and Excel Services and Word Automation Services in SharePoint Server 2013 allow remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Excel Memory Corruption Vulnerability."
[ "cpe:2.3:a:microsoft:excel:2010:sp2:*:*:*:*:x64:*", "cpe:2.3:a:microsoft:excel:2010:sp2:*:*:*:x86:*:*", "cpe:2.3:a:microsoft:excel:2013:*:*:*:*:*:x64:*", "cpe:2.3:a:microsoft:excel:2013:*:*:*:*:x86:*:*", "cpe:2.3:a:microsoft:excel_viewer:*:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2007:sp3:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2010:sp1:x64:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2010:sp1:x86:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2011:*:mac:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2013:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office_2013_rt:-:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office_compatibility_pack:*:sp3:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office_web_apps:2010:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office_web_apps:2010:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sharepoint_server:2007:sp3:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sharepoint_server:2013:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sharepoint_server:2010:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sharepoint_server:2010:sp2:*:*:*:*:*:*" ]
null
null
null
9.3
RHSA-2024:1911
Red Hat Security Advisory: firefox security update
Mozilla: Permission prompt input delay could expire when not in focus Mozilla: Denial of Service using HTTP/2 CONTINUATION frames Mozilla: GetBoundName in the JIT returned the wrong object Mozilla: Out-of-bounds-read after mis-optimized switch statement Mozilla: Incorrect JITting of arguments led to use-after-free during garbage collection Mozilla: Integer-overflow led to out-of-bounds-read in the OpenType sanitizer Mozilla: Potential use-after-free due to AlignedBuffer self-move Mozilla: Memory safety bug fixed in Firefox 125, Firefox ESR 115.10, and Thunderbird 115.10
[ "cpe:/a:redhat:rhel_aus:8.4::appstream", "cpe:/a:redhat:rhel_e4s:8.4::appstream", "cpe:/a:redhat:rhel_tus:8.4::appstream" ]
null
7.5
null
null
CVE-2018-1114
It was found that URLResource.getLastModified() in Undertow closes the file descriptors only when they are finalized which can cause file descriptors to exhaust. This leads to a file handler leak.
[ "cpe:2.3:a:redhat:undertow:-:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:virtualization:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:virtualization:4.2:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*" ]
null
null
6.5
null
GHSA-hp4x-r8hj-mqj6
Vulnerability in the Java SE component of Oracle Java SE (subcomponent: JCE). The supported version that is affected is Java SE: 8u212. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
[]
null
null
3.7
null
CVE-2024-22385
File and Directory Permission Vulnerability in Hitachi Storage Provider for VMware vCenter
Incorrect Default Permissions vulnerability in Hitachi Storage Provider for VMware vCenter allows local users to read and write specific files.This issue affects Hitachi Storage Provider for VMware vCenter: from 3.1.0 before 3.7.4.
[]
null
4.4
null
null
CVE-2023-2268
Plane v0.7.1 - Unauthorized access to files
Plane version 0.7.1 allows an unauthenticated attacker to view all stored server files of all users.
[ "cpe:2.3:a:plane:plane:0.7.1:*:*:*:*:*:*:*" ]
null
7.1
null
null
CVE-2024-45944
In J2eeFAST <=2.7, the backend function has unsafe filtering, which allows an attacker to trigger certain sensitive functions resulting in arbitrary code execution.
[ "cpe:2.3:a:j2eefast:j2eefast:*:*:*:*:*:*:*:*" ]
null
9.8
null
null
CVE-2023-2111
HollerBox < 2.1.4 - Admin+ SQL Injection
The Fast & Effective Popups & Lead-Generation for WordPress plugin before 2.1.4 concatenates user input into an SQL query without escaping it first in the plugin's report API endpoint, which could allow administrators in multi-site configuration to leak sensitive information from the site's database.
[ "cpe:2.3:a:groundhogg:hollerbox:*:*:*:*:*:wordpress:*:*" ]
null
4.9
null
null
GHSA-chrg-5pr2-gqgj
In the reference implementation of FUSE before 2.9.8 and 3.x before 3.2.5, local attackers were able to specify the allow_other option even if forbidden in /etc/fuse.conf, leading to exposure of FUSE filesystems to other users. This issue only affects systems with SELinux active.
[]
null
null
null
null
CVE-2009-1775
Multiple cross-site scripting (XSS) vulnerabilities in Ulteo Open Virtual Desktop 1.0 allow remote attackers to inject arbitrary web script or HTML via the id parameter to (1) admin/applications.php, (2) admin/appsgroup.php, (3) admin/users.php, (4) admin/usersgroup.php, and (5) admin/tasks.php; (6) show parameter to admin/logs.php; and (7) mode parameter to admin/configuration-partial.php. NOTE: some of these details are obtained from third party information.
[ "cpe:2.3:a:ulteo:open_virtual_desktop:1.0:*:*:*:*:*:*:*" ]
null
null
null
4.3
GHSA-vmhp-cggp-f572
In CMS Made Simple (CMSMS) through 2.2.7, the "file rename" operation in the admin dashboard contains a sensitive information disclosure vulnerability, exploitable by an admin user, that can cause DoS by moving config.php to the upload/ directory.
[]
null
null
6.5
null
CVE-2021-30114
Web-School ERP V 5.0 contains a cross-site request forgery (CSRF) vulnerability that allows a remote attacker to create a voucher payment request through module/accounting/voucher/create. The application fails to validate the CSRF token for a POST request using admin privilege.
[ "cpe:2.3:a:web-school:enterprise_resource_planning:5.0:*:*:*:*:*:*:*" ]
null
6.5
null
4.3
GHSA-27cf-pw5g-62cx
Untrusted search path vulnerability in PGP Desktop 9.9.0 Build 397, 9.10.x, 10.0.0 Build 2732, and probably other versions allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse tsp.dll or tvttsp.dll that is located in the same folder as a .p12, .pem, .pgp, .prk, .prvkr, .pubkr, .rnd, or .skr file.
[]
null
null
null
null
CVE-2022-49607
perf/core: Fix data race between perf_event_set_output() and perf_mmap_close()
In the Linux kernel, the following vulnerability has been resolved: perf/core: Fix data race between perf_event_set_output() and perf_mmap_close() Yang Jihing reported a race between perf_event_set_output() and perf_mmap_close(): CPU1 CPU2 perf_mmap_close(e2) if (atomic_dec_and_test(&e2->rb->mmap_count)) // 1 - > 0 detach_rest = true ioctl(e1, IOC_SET_OUTPUT, e2) perf_event_set_output(e1, e2) ... list_for_each_entry_rcu(e, &e2->rb->event_list, rb_entry) ring_buffer_attach(e, NULL); // e1 isn't yet added and // therefore not detached ring_buffer_attach(e1, e2->rb) list_add_rcu(&e1->rb_entry, &e2->rb->event_list) After this; e1 is attached to an unmapped rb and a subsequent perf_mmap() will loop forever more: again: mutex_lock(&e->mmap_mutex); if (event->rb) { ... if (!atomic_inc_not_zero(&e->rb->mmap_count)) { ... mutex_unlock(&e->mmap_mutex); goto again; } } The loop in perf_mmap_close() holds e2->mmap_mutex, while the attach in perf_event_set_output() holds e1->mmap_mutex. As such there is no serialization to avoid this race. Change perf_event_set_output() to take both e1->mmap_mutex and e2->mmap_mutex to alleviate that problem. Additionally, have the loop in perf_mmap() detach the rb directly, this avoids having to wait for the concurrent perf_mmap_close() to get around to doing it to make progress.
[]
null
4.7
null
null
CVE-2009-2408
Mozilla Network Security Services (NSS) before 3.12.3, Firefox before 3.0.13, Thunderbird before 2.0.0.23, and SeaMonkey before 1.1.18 do not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority. NOTE: this was originally reported for Firefox before 3.5.
[ "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:*:*:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise:10.0:-:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise:11.0:-:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*" ]
null
5.9
null
6.8
GHSA-p786-v2xq-fcfr
IBM DB2 for Linux, UNIX and Windows (includes DB2 Connect Server) 9.7, 10.1, 10.5, 11.1, and 11.5 db2fm is vulnerable to a buffer overflow, caused by improper bounds checking which could allow a local attacker to execute arbitrary code on the system with root privileges. IBM X-Force ID: 193661.
[]
null
null
null
null
GHSA-jpwr-2mxg-6vpf
An arbitrary file upload vulnerability in the Add Student's Profile Picture function of Student Enrollment In PHP v1.0 allows attackers to execute arbitrary code via uploading a crafted PHP file.
[]
null
9.8
null
null
cisco-sa-iosxr-dhcp-dos-3tgPKRdm
Cisco IOS XR Software DHCP Version 4 Server Denial of Service Vulnerability
A vulnerability in the DHCP version 4 (DHCPv4) server feature of Cisco IOS XR Software could allow an unauthenticated, remote attacker to trigger a crash of the dhcpd process, resulting in a denial of service (DoS) condition. This vulnerability exists because certain DHCPv4 messages are improperly validated when they are processed by an affected device. An attacker could exploit this vulnerability by sending a malformed DHCPv4 message to an affected device. A successful exploit could allow the attacker to cause a crash of the dhcpd process. While the dhcpd process is restarting, which may take approximately two minutes, DHCPv4 server services are unavailable on the affected device. This could temporarily prevent network access to clients that join the network during that time period and rely on the DHCPv4 server of the affected device. Notes: Only the dhcpd process crashes and eventually restarts automatically. The router does not reload. This vulnerability only applies to DHCPv4. DHCP version 6 (DHCPv6) is not affected. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is part of the March 2024 release of the Cisco IOS XR Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: March 2024 Semiannual Cisco IOS XR Software Security Advisory Bundled Publication ["https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75299"].
[]
null
5.3
null
null
GHSA-3gvr-wc48-xw73
The Multilevel Referral Affiliate Plugin for WooCommerce plugin for WordPress is vulnerable to SQL Injection via the 'orderby' parameter in all versions up to, and including, 2.27 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
[]
null
6.5
null
null
CVE-2000-1126
Vulnerability in auto_parms and set_parms in HP-UX 11.00 and earlier allows remote attackers to execute arbitrary commands or cause a denial of service.
[ "cpe:2.3:o:hp:hp-ux:10.01:*:*:*:*:*:*:*", "cpe:2.3:o:hp:hp-ux:10.10:*:*:*:*:*:*:*", "cpe:2.3:o:hp:hp-ux:10.20:*:*:*:*:*:*:*", "cpe:2.3:o:hp:hp-ux:10.24:*:*:*:*:*:*:*", "cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*", "cpe:2.3:o:hp:hp-ux:11.4:*:*:*:*:*:*:*" ]
null
null
null
10
GHSA-c26p-5f2j-p2gv
A buffer overflow in the RecvSocketData function of Inovance HCPLC_AM401-CPU1608TPTN 21.38.0.0, HCPLC_AM402-CPU1608TPTN 41.38.0.0, and HCPLC_AM403-CPU1608TN 81.38.0.0 allows attackers to cause a Denial of Service (DoS) or execute arbitrary code via a crafted Modbus message.
[]
null
6.5
null
null
PYSEC-2021-170
null
TensorFlow is an end-to-end open source platform for machine learning. An attacker can trigger a denial of service via a `CHECK` failure by passing an empty image to `tf.raw_ops.DrawBoundingBoxes`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/ea34a18dc3f5c8d80a40ccca1404f343b5d55f91/tensorflow/core/kernels/image/draw_bounding_box_op.cc#L148-L165) uses `CHECK_*` assertions instead of `OP_REQUIRES` to validate user controlled inputs. Whereas `OP_REQUIRES` allows returning an error condition back to the user, the `CHECK_*` macros result in a crash if the condition is false, similar to `assert`. In this case, `height` is 0 from the `images` input. This results in `max_box_row_clamp` being negative and the assertion being falsified, followed by aborting program execution. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
[]
null
null
null
null