id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
139k
cpes
sequencelengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
CVE-2021-41118
ReDoS in DynamicPageList3
The DynamicPageList3 extension is a reporting tool for MediaWiki, listing category members and intersections with various formats and details. In affected versions unsanitised input of regular expression date within the parameters of the DPL parser function, allowed for the possibility of ReDoS (Regex Denial of Service). This has been resolved in version 3.3.6. If you are unable to update you may also set `$wgDplSettings['functionalRichness'] = 0;` or disable DynamicPageList3 to mitigate.
[ "cpe:2.3:a:dynamicpagelist3_project:dynamicpagelist3:*:*:*:*:*:mediawiki:*:*" ]
null
5.3
null
null
GHSA-4hxx-7755-cw67
Directory traversal vulnerability in src/func/language.php in webSPELL 4.2.0e and earlier allows remote attackers to include and execute arbitrary local .php files via a .. (dot dot) in a language cookie. NOTE: this can be leveraged for SQL injection by including awards.php.
[]
null
null
null
null
GHSA-j5jv-8x67-rwv6
In bnep_data_ind of bnep_main.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-6.0 Android-6.0.1 Android-7.0 Android-7.1.1 Android-7.1.2 Android-8.0 Android-8.1 Android ID: A-79164722.
[]
null
null
7.5
null
CVE-2023-50861
WordPress HUSKY plugin <= 1.3.4.3 - Cross Site Request Forgery (CSRF) vulnerability
Cross-Site Request Forgery (CSRF) vulnerability in realmag777 HUSKY – Products Filter for WooCommerce (formerly WOOF).This issue affects HUSKY – Products Filter for WooCommerce (formerly WOOF): from n/a through 1.3.4.3.
[]
null
4.3
null
null
GHSA-5579-734j-m88m
Bugzilla 2.14 before 2.14.2, and 2.16 before 2.16rc2, does not properly handle URL-encoded field names that are generated by some browsers, which could cause certain fields to appear to be unset, which has the effect of removing group permissions on bugs when buglist.cgi is provided with the encoded field names.
[]
null
null
null
null
GHSA-wg5v-689x-wgmp
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Riosis Private Limited Rio Photo Gallery allows Reflected XSS. This issue affects Rio Photo Gallery: from n/a through 0.1.
[]
null
7.1
null
null
RHSA-2016:1853
Red Hat Security Advisory: Red Hat OpenShift Enterprise 3.2 security update and bug fix update
libarchive: Archive Entry with type 1 (hardlink), but has a non-zero data size file overwrite
[ "cpe:/a:redhat:openshift:3.2::el7" ]
null
null
7.5
null
GHSA-g536-h677-2w32
SolarWinds Web Help Desk was found to be susceptible to a Java Deserialization Remote Code Execution vulnerability that, if exploited, would allow an attacker to run commands on the host machine.While it was reported as an unauthenticated vulnerability, SolarWinds has been unable to reproduce it without authentication after thorough testing.However, out of an abundance of caution, we recommend all Web Help Desk customers apply the patch, which is now available.
[]
null
9.8
null
null
CVE-2014-8330
Cross-site scripting (XSS) vulnerability in EspoCRM allows remote authenticated users to inject arbitrary web script or HTML via the Name field in a new account.
[ "cpe:2.3:a:espocrm:espocrm:-:*:*:*:*:*:*:*" ]
null
null
null
3.5
CVE-2005-0656
Multiple cross-site scripting (XSS) vulnerabilities in auraCMS 1.5 allow remote attackers to inject arbitrary web script or HTML via the (1) hits parameter to hits.php, (2) query parameter to index.php, or (3) theCount parameter to counter.php.
[ "cpe:2.3:a:arif_supriyanto:auracms:1.5:*:*:*:*:*:*:*" ]
null
null
null
4.3
GHSA-57w2-43hc-hjm2
The lock screen module has defects introduced in the design process. Successful exploitation of this vulnerability may affect system availability.
[]
null
7.5
null
null
CVE-2006-5706
Unspecified vulnerabilities in PHP, probably before 5.2.0, allow local users to bypass open_basedir restrictions and perform unspecified actions via unspecified vectors involving the (1) chdir and (2) tempnam functions. NOTE: the tempnam vector might overlap CVE-2006-1494.
[ "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.1.5:*:*:*:*:*:*:*" ]
null
null
null
7.2
CVE-2021-30130
phpseclib before 2.0.31 and 3.x before 3.0.7 mishandles RSA PKCS#1 v1.5 signature verification.
[ "cpe:2.3:a:phpseclib:phpseclib:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*" ]
null
7.5
null
5
CVE-2017-1000025
GNOME Web (Epiphany) 3.23 before 3.23.5, 3.22 before 3.22.6, 3.20 before 3.20.7, 3.18 before 3.18.11, and prior versions, is vulnerable to a password manager sweep attack resulting in the remote exfiltration of stored passwords for a selected set of websites.
[ "cpe:2.3:a:gnome:epiphany:3.18.0:*:*:*:*:*:*:*", "cpe:2.3:a:gnome:epiphany:3.18.1:*:*:*:*:*:*:*", "cpe:2.3:a:gnome:epiphany:3.18.2:*:*:*:*:*:*:*", "cpe:2.3:a:gnome:epiphany:3.18.3:*:*:*:*:*:*:*", "cpe:2.3:a:gnome:epiphany:3.18.4:*:*:*:*:*:*:*", "cpe:2.3:a:gnome:epiphany:3.18.5:*:*:*:*:*:*:*", "cpe:2.3:a:gnome:epiphany:3.18.6:*:*:*:*:*:*:*", "cpe:2.3:a:gnome:epiphany:3.18.7:*:*:*:*:*:*:*", "cpe:2.3:a:gnome:epiphany:3.18.8:*:*:*:*:*:*:*", "cpe:2.3:a:gnome:epiphany:3.18.9:*:*:*:*:*:*:*", "cpe:2.3:a:gnome:epiphany:3.18.10:*:*:*:*:*:*:*", "cpe:2.3:a:gnome:epiphany:3.20.0:*:*:*:*:*:*:*", "cpe:2.3:a:gnome:epiphany:3.20.1:*:*:*:*:*:*:*", "cpe:2.3:a:gnome:epiphany:3.20.2:*:*:*:*:*:*:*", "cpe:2.3:a:gnome:epiphany:3.20.3:*:*:*:*:*:*:*", "cpe:2.3:a:gnome:epiphany:3.20.4:*:*:*:*:*:*:*", "cpe:2.3:a:gnome:epiphany:3.20.5:*:*:*:*:*:*:*", "cpe:2.3:a:gnome:epiphany:3.20.6:*:*:*:*:*:*:*", "cpe:2.3:a:gnome:epiphany:3.22.0:*:*:*:*:*:*:*", "cpe:2.3:a:gnome:epiphany:3.22.1:*:*:*:*:*:*:*", "cpe:2.3:a:gnome:epiphany:3.22.2:*:*:*:*:*:*:*", "cpe:2.3:a:gnome:epiphany:3.22.3:*:*:*:*:*:*:*", "cpe:2.3:a:gnome:epiphany:3.22.4:*:*:*:*:*:*:*", "cpe:2.3:a:gnome:epiphany:3.22.5:*:*:*:*:*:*:*", "cpe:2.3:a:gnome:epiphany:3.23.1:*:*:*:*:*:*:*", "cpe:2.3:a:gnome:epiphany:3.23.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:gnome:epiphany:3.23.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:gnome:epiphany:3.23.2:*:*:*:*:*:*:*", "cpe:2.3:a:gnome:epiphany:3.23.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:gnome:epiphany:3.23.3:*:*:*:*:*:*:*", "cpe:2.3:a:gnome:epiphany:3.23.4:*:*:*:*:*:*:*" ]
null
null
7.5
5
GHSA-xg6w-qq7g-f5fh
Stack overflow vulnerability in function gmalloc in goo/gmem.cc in xpdf 4.04, allows local attackers to cause a denial of service.
[]
null
5.5
null
null
GHSA-3ggh-w4r5-27j4
An issue was discovered in certain Apple products. macOS before 10.13.2 is affected. The issue involves the "Intel Graphics Driver" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app.
[]
null
null
7.8
null
GHSA-j2qq-rw4v-jjx2
An error within the "kodak_radc_load_raw()" function (internal/dcraw_common.cpp) related to the "buf" variable in LibRaw versions prior to 0.18.7 can be exploited to cause an out-of-bounds read memory access and subsequently cause a crash.
[]
null
8.8
null
null
GHSA-66v6-qf5f-pgh2
** UNSUPPORTED WHEN ASSIGNED ** A privilege escalation vulnerability was discovered in Avaya Aura Utility Services that may potentially allow a local user to execute specially crafted scripts as a privileged user. Affects all 7.x versions of Avaya Aura Utility Services.
[]
null
8.8
null
null
RHSA-2022:1665
Red Hat Security Advisory: gzip security update
gzip: arbitrary-file-write vulnerability
[ "cpe:/o:redhat:rhel_eus:8.2::baseos" ]
null
8.8
null
null
CVE-2025-30684
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Replication). Supported versions that are affected are 8.0.0-8.0.41, 8.4.0-8.4.4 and 9.0.0-9.2.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
[]
null
4.9
null
null
GHSA-vpr7-cgq2-g5rr
In the Linux kernel, the following vulnerability has been resolved:net/mlx5: DR, Fix slab-out-of-bounds in mlx5_cmd_dr_create_fteWhen adding a rule with 32 destinations, we hit the following out-of-band access issue:BUG: KASAN: slab-out-of-bounds in mlx5_cmd_dr_create_fte+0x18ee/0x1e70This patch fixes the issue by both increasing the allocated buffers to accommodate for the needed actions and by checking the number of actions to prevent this issue when a rule with too many actions is provided.
[]
null
5.5
null
null
GHSA-g3p5-mf5x-xggv
Vulnerability in the Oracle Banking Virtual Account Management product of Oracle Financial Services Applications (component: OBVAM Trn Journal Domain). Supported versions that are affected are 14.5, 14.6 and 14.7. Difficult to exploit vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle Banking Virtual Account Management. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Banking Virtual Account Management accessible data as well as unauthorized update, insert or delete access to some of Oracle Banking Virtual Account Management accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Banking Virtual Account Management. CVSS 3.1 Base Score 6.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:L/A:H).
[]
null
6
null
null
CVE-2010-0517
Heap-based buffer overflow in QuickTime in Apple Mac OS X before 10.6.3 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted movie file with M-JPEG encoding, which causes QuickTime to calculate a buffer size using height and width fields, but to use a different field to control the length of a copy operation.
[ "cpe:2.3:o:apple:mac_os_x:10.6.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.6.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.6.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.6.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.6.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.6.2:*:*:*:*:*:*:*" ]
null
null
null
6.8
CVE-2017-18700
Certain NETGEAR devices are affected by stored XSS. This affects D6400 before 1.0.0.60, D7000 before 1.0.1.50, D8500 before 1.0.3.29, EX6200 before 1.0.3.84, EX7000 before 1.0.0.60, R6250 before 1.0.4.16, R6300v2 before 1.0.4.18, R6400 before 1.01.32, R6400v2 before 1.0.2.44, R6700 before 1.0.1.36, R6900 before 1.0.1.34, R6900P before 1.3.0.8, R7000 before 1.0.9.14, R7000P before 1.3.0.8, R7100LG before 1.0.0.34, R7300DST before 1.0.0.56, R7900 before 1.0.1.26, R8000 before 1.0.4.4, R8300 before 1.0.2.106, R8500 before 1.0.2.106, R9000 before 1.0.2.52, WNDR3400v3 before 1.0.1.16, WNR3500Lv2 before 1.2.0.46, and WNDR3700v5 before 1.1.0.48.
[ "cpe:2.3:o:netgear:d6400_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:d6400:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:d7000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:d7000:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:d8500_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:d8500:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:ex6200_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:ex6200:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:ex7000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:ex7000:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r6250_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r6250:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r6300_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r6300:v2:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r6400_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r6400:-:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r6400:v2:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r6700_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r6700:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r6900_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r6900:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r6900p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r6900p:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r7000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r7000:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r7000p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r7000p:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r7100lg_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r7100lg:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r7300dst_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r7300dst:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r7900_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r7900:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r8000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r8000:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r8300_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r8300:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r8500_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r8500:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r9000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r9000:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:wndr3400_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:wndr3400:v3:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:wnr3500l_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:wnr3500l:v2:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:wndr3700_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:wndr3700:v5:*:*:*:*:*:*:*" ]
null
null
5.2
null
RHSA-2022:6094
Red Hat Security Advisory: OpenShift Container Platform 4.10.28 packages and security update
golang: cmd/go: misinterpretation of branch names can lead to incorrect access control golang: crypto/elliptic: IsOnCurve returns true for invalid field elements golang: encoding/pem: fix stack overflow in Decode golang: crypto/elliptic: panic caused by oversized scalar
[ "cpe:/a:redhat:openshift:4.10::el7", "cpe:/a:redhat:openshift:4.10::el8" ]
null
7.5
null
null
CVE-2018-18009
dirary0.js on D-Link DIR-140L, DIR-640L devices allows remote unauthenticated attackers to discover admin credentials.
[ "cpe:2.3:o:dlink:dir-140l_firmware:1.02:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:dir-140l:-:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dir-640l_firmware:1.01ru:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:dir-640l:-:*:*:*:*:*:*:*" ]
null
9.8
null
5
GHSA-jw2p-mf2f-vvwp
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
[]
null
null
null
null
GHSA-2j3r-j4h7-v6hh
The web application component of piSignage before 2.6.4 allows a remote attacker (authenticated as a low-privilege user) to download arbitrary files from the Raspberry Pi via api/settings/log?file=../ path traversal. In other words, this issue is in the player API for log download.
[]
null
null
null
null
CVE-2012-0719
Cross-site scripting (XSS) vulnerability in IBM Tivoli Endpoint Manager (TEM) 8 before 8.2 patch 3 allows remote attackers to inject arbitrary web script or HTML via the ScheduleParam parameter to the webreports program.
[ "cpe:2.3:a:ibm:tivoli_endpoint_manager:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_endpoint_manager:8.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_endpoint_manager:8.2:*:*:*:*:*:*:*" ]
null
null
null
4.3
CVE-2022-37356
This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of JPG files. Crafted data in a JPG file can trigger a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-17630.
[ "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:9.3.361.0:*:*:*:*:*:*:*" ]
null
null
7.8
null
CVE-2009-0507
IBM WebSphere Process Server (WPS) 6.1.2 before 6.1.2.3 and 6.2 before 6.2.0.1 does not properly restrict configuration data during an export of the cluster configuration file from the administrative console, which allows remote authenticated users to obtain the (1) JMSAPI, (2) ESCALATION, and (3) MAILSESSION (aka mail session) cleartext passwords via vectors involving access to a cluster member.
[ "cpe:2.3:a:ibm:websphere_process_server:*:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_process_server:6.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_process_server:6.1.2.1:*:*:*:*:*:*:*" ]
null
null
null
4
CVE-2006-5875
eoc.py in Enemies of Carlotta (EoC) before 1.2.4 allows remote attackers to execute arbitrary commands via shell metacharacters in an "SMTP level e-mail address".
[ "cpe:2.3:a:enemies_of_carlotta:enemies_of_carlotta:1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:enemies_of_carlotta:enemies_of_carlotta:1.2.3:*:*:*:*:*:*:*" ]
null
null
null
6.8
RHSA-2025:2359
Red Hat Security Advisory: firefox security update
firefox: AudioIPC StreamData could trigger a use-after-free in the Browser process firefox: Use-after-free in WebTransportChild firefox: Inconsistent comparator in XSLT sorting led to out-of-bounds access firefox: JIT corruption of WASM i32 return values on 64-bit CPUs firefox: Unexpected GC during RegExp bailout processing firefox: Clickjacking the registerProtocolHandler info-bar Reporter firefox: Adding %00 and a fake extension to a jar: URL changed the interpretation of the contents firefox: thunderbird: Memory safety bugs fixed in Firefox 136, Thunderbird 136, Firefox ESR 115.21, Firefox ESR 128.8, and Thunderbird 128.8 firefox: thunderbird: Memory safety bugs fixed in Firefox 136, Thunderbird 136, Firefox ESR 128.8, and Thunderbird 128.8
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
8.8
null
null
CVE-2024-47604
XSS vulnerability in NuGetGallery HTML attributes handling
NuGet Gallery is a package repository that powers nuget.org. The NuGetGallery has a security vulnerability in its handling of HTML element attributes, which allows an attacker to execute arbitrary HTML or Javascript code in a victim's browser.
[ "cpe:2.3:a:microsoft:nugetgallery:*:*:*:*:*:*:*:*" ]
null
8.2
null
null
CVE-2023-33552
Heap Buffer Overflow in the erofs_read_one_data function at data.c in erofs-utils v1.6 allows remote attackers to execute arbitrary code via a crafted erofs filesystem image.
[ "cpe:2.3:a:erofs-utils_project:erofs-utils:1.6:*:*:*:*:*:*:*" ]
null
7.8
null
null
GHSA-j2wc-9599-j92r
Libde265 v1.0.8 was discovered to contain a heap-buffer-overflow vulnerability via ff_hevc_put_hevc_epel_pixels_8_sse in sse-motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted video file.
[]
null
6.5
null
null
CVE-2017-6011
An issue was discovered in icoutils 0.31.1. An out-of-bounds read leading to a buffer overflow was observed in the "simple_vec" function in the "extract.c" source file. This affects icotool.
[ "cpe:2.3:a:icoutils_project:icoutils:0.31.1:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*" ]
null
null
5.5
4.3
CVE-2018-6080
Lack of access control checks in Instrumentation in Google Chrome prior to 65.0.3325.146 allowed a remote attacker who had compromised the renderer process to obtain memory metadata from privileged processes .
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" ]
null
null
6.5
4.3
CVE-2023-25875
Adobe Substance 3D Stager OBJ File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability
Adobe Substance 3D Stager versions 2.0.0 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[ "cpe:2.3:a:adobe:substance_3d_stager:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
5.5
null
null
CVE-2009-3840
The embedded database engine service (aka ovdbrun.exe) in HP OpenView Network Node Manager (OV NNM) 7.51 and 7.53 allows remote attackers to cause a denial of service (daemon crash) via an invalid Error Code field in a packet.
[ "cpe:2.3:a:hp:openview_network_node_manager:7.51:-:hp-ux:*:*:*:*:*", "cpe:2.3:a:hp:openview_network_node_manager:7.51:-:linux:*:*:*:*:*", "cpe:2.3:a:hp:openview_network_node_manager:7.51:-:solaris:*:*:*:*:*", "cpe:2.3:a:hp:openview_network_node_manager:7.51:-:windows:*:*:*:*:*", "cpe:2.3:a:hp:openview_network_node_manager:7.53:-:hp-ux:*:*:*:*:*", "cpe:2.3:a:hp:openview_network_node_manager:7.53:-:linux:*:*:*:*:*", "cpe:2.3:a:hp:openview_network_node_manager:7.53:-:solaris:*:*:*:*:*", "cpe:2.3:a:hp:openview_network_node_manager:7.53:-:windows:*:*:*:*:*" ]
null
null
null
5
CVE-2005-1053
Multiple cross-site scripting (XSS) vulnerabilities in orderwiz.php in ModernBill 4.3.0 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) c_code or (2) aid parameters.
[ "cpe:2.3:a:moderngigabyte:modernbill:*:*:*:*:*:*:*:*" ]
null
null
null
4.3
GHSA-4jr9-pm2m-4f43
Cisco PIX 500 and ASA 5500 Series Security Appliances 7.2.2, when configured to inspect certain TCP-based protocols, allows remote attackers to cause a denial of service (device reboot) via malformed TCP packets.
[]
null
null
null
null
RHSA-2024:8047
Red Hat Security Advisory: .NET 6.0 security update
dotnet: Multiple .NET components susceptible to hash flooding dotnet: System.IO.Packaging - Multiple DoS vectors in use of SortedList dotnet: Denial of Service in System.Text.Json
[ "cpe:/a:redhat:rhel_eus:9.2::appstream", "cpe:/a:redhat:rhel_eus:9.2::crb" ]
null
7.5
null
null
GHSA-rp3p-7w43-mphh
Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used.
[]
null
null
null
null
GHSA-rrv9-xfv2-43m6
In the Linux kernel, the following vulnerability has been resolved:fs/ntfs3: Fix general protection fault in run_is_mapped_fullFixed deleating of a non-resident attribute in ntfs_create_inode() rollback.
[]
null
5.5
null
null
CVE-2020-24345
JerryScript through 2.3.0 allows stack consumption via function a(){new new Proxy(a,{})}JSON.parse("[]",a). NOTE: the vendor states that the problem is the lack of the --stack-limit option
[ "cpe:2.3:a:jerryscript:jerryscript:*:*:*:*:*:*:*:*" ]
null
7.8
null
6.8
GHSA-frv7-rf72-j8fp
Heap-based buffer overflow in the FileFind::FindFile method in (1) MFC42.dll, (2) MFC42u.dll, (3) MFC71.dll, and (4) MFC71u.dll in Microsoft Foundation Class (MFC) Library 8.0, as used by the ListFiles method in hpqutil.dll 2.0.0.138 in Hewlett-Packard (HP) All-in-One and Photo & Imaging Gallery 1.1 and probably other products, allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long first argument.
[]
null
null
null
null
GHSA-9hpv-r424-hr95
When dynamic templates are used (OTRSTicketForms), admin can use OTRS tags which are not masked properly and can reveal sensitive information. This issue affects: OTRS AG OTRSTicketForms 6.0.x version 6.0.40 and prior versions; 7.0.x version 7.0.29 and prior versions; 8.0.x version 8.0.3 and prior versions.
[]
null
null
null
null
CVE-2002-0495
csSearch.cgi in csSearch 2.3 and earlier allows remote attackers to execute arbitrary Perl code via the savesetup command and the setup parameter, which overwrites the setup.cgi configuration file that is loaded by csSearch.cgi.
[ "cpe:2.3:a:cgiscript:cssearch_professional:*:*:*:*:*:*:*:*" ]
null
null
null
10
GHSA-j274-79c7-46r9
csstart program in iCal 2.1 Patch 2 searches for the cshttpd program in the current working directory, which allows local users to gain root privileges by creating a Trojan Horse cshttpd program in a directory and calling csstart from that directory.
[]
null
null
null
null
CVE-2023-31427
Knowledge of full path name
Brocade Fabric OS versions before Brocade Fabric OS v9.1.1c, and v9.2.0 Could allow an authenticated, local user with knowledge of full path names inside Brocade Fabric OS to execute any command regardless of assigned privilege. Starting with Fabric OS v9.1.0, “root” account access is disabled.
[ "cpe:2.3:o:broadcom:fabric_operating_system:*:*:*:*:*:*:*:*" ]
null
7.8
null
null
CVE-2022-46394
An issue was discovered in the Arm Mali GPU Kernel Driver. A non-privileged user can make improper GPU processing operations to gain access to already freed memory. This affects Valhall r39p0 through r41p0 before r42p0, and Avalon r41p0 before r42p0.
[ "cpe:2.3:a:arm:avalon_gpu_kernel_driver:r41p0:*:*:*:*:*:*:*", "cpe:2.3:a:arm:valhall_gpu_kernel_driver:*:*:*:*:*:*:*:*" ]
null
8.8
null
null
CVE-2014-0200
The Red Hat Enterprise Virtualization Manager reports (rhevm-reports) package before 3.3.3-1 uses world-readable permissions on the datasource configuration file (js-jboss7-ds.xml), which allows local users to obtain sensitive information by reading the file.
[ "cpe:2.3:a:redhat:rhevm-reports:*:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:rhevm-reports:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:rhevm-reports:3.1:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:rhevm-reports:3.2:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:rhevm-reports:3.3:*:*:*:*:*:*:*" ]
null
null
null
2.1
GHSA-vccc-5v6j-w7p6
Cross-site scripting (XSS) vulnerability in the Drupal 4.7 Userreview module before 1.19 2006/09/12 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
[]
null
null
null
null
GHSA-8wpm-73cm-3g25
Taocms v3.0.2 was discovered to contain a cross-site scripting (XSS) vulnerability via the Management Column component.
[]
null
null
null
null
CVE-2022-46155
Airtable.js credentials exposed in browser builds
Airtable.js is the JavaScript client for Airtable. Prior to version 0.11.6, Airtable.js had a misconfigured build script in its source package. When the build script is run, it would bundle environment variables into the build target of a transpiled bundle. Specifically, the AIRTABLE_API_KEY and AIRTABLE_ENDPOINT_URL environment variables are inserted during Browserify builds due to being referenced in Airtable.js code. This only affects copies of Airtable.js built from its source, not those installed via npm or yarn. Airtable API keys set in users’ environments via the AIRTABLE_API_KEY environment variable may be bundled into local copies of Airtable.js source code if all of the following conditions are met: 1) the user has cloned the Airtable.js source onto their machine, 2) the user runs the `npm prepare` script, and 3) the user' has the AIRTABLE_API_KEY environment variable set. If these conditions are met, a user’s local build of Airtable.js would be modified to include the value of the AIRTABLE_API_KEY environment variable, which could then be accidentally shipped in the bundled code. Users who do not meet all three of these conditions are not impacted by this issue. Users should upgrade to Airtable.js version 0.11.6 or higher; or, as a workaround unset the AIRTABLE_API_KEY environment variable in their shell and/or remove it from your .bashrc, .zshrc, or other shell configuration files. Users should also regenerate any Airtable API keys they use, as the keysy may be present in bundled code.
[ "cpe:2.3:a:airtable:airtable:*:*:*:*:*:node.js:*:*" ]
null
7.6
null
null
CVE-2018-11720
Xovis PC2, PC2R, and PC3 devices through 3.6.0 allow Directory Traversal.
[ "cpe:2.3:o:xovis:pc2r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:xovis:pc2r:-:*:*:*:*:*:*:*", "cpe:2.3:o:xovis:pc3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:xovis:pc3:-:*:*:*:*:*:*:*", "cpe:2.3:o:xovis:pc2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:xovis:pc2:-:*:*:*:*:*:*:*" ]
null
null
7.5
5
CVE-2018-20181
rdesktop versions up to and including v1.8.3 contain an Integer Underflow that leads to a Heap-Based Buffer Overflow in the function seamless_process() and results in memory corruption and probably even a remote code execution.
[ "cpe:2.3:a:rdesktop:rdesktop:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" ]
null
null
9.8
7.5
CVE-2019-3667
DLL Search Order Hijacking
DLL Search Order Hijacking vulnerability in the Microsoft Windows client in McAfee Tech Check 3.0.0.17 and earlier allows local users to execute arbitrary code via the local folder placed there by an attacker.
[ "cpe:2.3:a:mcafee:techcheck:*:*:*:*:*:*:*:*" ]
null
6.6
null
null
GHSA-xvfq-f68m-7mwg
In MailStore Outlook Add-in (and Email Archive Outlook Add-in) through 12.1.2, the login process does not validate the validity of the certificate presented by the server.
[]
null
5.9
null
null
CVE-2021-36385
A SQL Injection vulnerability in Cerner Mobile Care 5.0.0 allows remote unauthenticated attackers to execute arbitrary SQL commands via a Fullwidth Apostrophe (aka U+FF07) in the default.aspx User ID field. Arbitrary system commands can be executed through the use of xp_cmdshell.
[ "cpe:2.3:a:cerner:mobile_care:5.0.0:*:*:*:*:*:*:*" ]
null
9.8
null
10
CVE-2024-35200
NGINX HTTP/3 QUIC vulnerability
When NGINX Plus or NGINX OSS are configured to use the HTTP/3 QUIC module, undisclosed HTTP/3 requests can cause NGINX worker processes to terminate.
[ "cpe:2.3:a:f5:nginx_plus:r30:-:*:*:*:*:*:*", "cpe:2.3:a:f5:nginx:1.25.0:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*" ]
null
5.3
null
null
CVE-2018-20881
cPanel before 74.0.8 allows self stored XSS on the Security Questions login page (SEC-446).
[ "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*" ]
null
null
5.4
3.5
GHSA-4vc4-pm9p-xmjm
In radare2 through 3.5.1, cmd_mount in libr/core/cmd_mount.c has a double free for the ms command.
[]
null
null
null
null
CVE-2017-18183
An issue was discovered in QPDF before 7.0.0. There is an infinite loop in the QPDFWriter::enqueueObject() function in libqpdf/QPDFWriter.cc.
[ "cpe:2.3:a:qpdf_project:qpdf:*:*:*:*:*:*:*:*" ]
null
null
5.5
4.3
CVE-2020-6155
A heap overflow vulnerability exists in the Pixar OpenUSD 20.05 while parsing compressed value rep arrays in binary USD files. A specially crafted malformed file can trigger a heap overflow, which can result in remote code execution. To trigger this vulnerability, the victim needs to access an attacker-provided malformed file.
[ "cpe:2.3:a:pixar:openusd:20.05:*:*:*:*:*:*:*" ]
null
null
8.8
null
GHSA-252h-69rw-g2rp
The str_buf_cat function in string.c in Ruby 1.9.3, 2.0.0, and 2.1 allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a long string.
[]
null
null
null
null
RHSA-2024:3636
Red Hat Security Advisory: Red Hat Product OCP Tools 4.13 OpenShift Jenkins security update
ssh: Prefix truncation attack on Binary Packet Protocol (BPP) jetty: stop accepting new connections from valid clients jenkins-2-plugins: git-server plugin arbitrary file read vulnerability jenkins-2-plugins: matrix-project plugin path traversal vulnerability golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON jenkins-2-plugins: Improper input sanitization in HTML Publisher Plugin jenkins-plugin/script-security: sandbox bypass via crafted constructor bodies jenkins-plugin/script-security: sandbox bypass via sandbox-defined classes
[ "cpe:/a:redhat:ocp_tools:4.13::el8" ]
null
8.8
null
null
CVE-2024-25255
Sublime Text 4 was discovered to contain a command injection vulnerability via the New Build System module. NOTE: multiple third parties report that this is intended behavior.
[ "cpe:2.3:a:sublimetext:sublime_text_4:*:*:*:*:*:*:*:*" ]
null
9.8
null
null
GHSA-hj32-3rpc-p9j5
IBM BigFix Platform 9.2 and 9.5 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 140761.
[]
null
null
8.8
null
GHSA-4ggc-fh42-w6g4
Adobe Dimension versions 3.4.3 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious SVG file.
[]
null
null
null
null
GHSA-4x83-gp9m-6f2g
An authentication vulnerability in HPE BSM Platform Application Performance Management System Health product versions 9.26, 9.30 and 9.40, allows remote users to delete arbitrary files via servlet directory traversal.
[]
null
null
6.5
null
RHSA-2003:390
Red Hat Security Advisory: : Updated gnupg packages disable ElGamal keys
security flaw
[ "cpe:/o:redhat:linux:7.1", "cpe:/o:redhat:linux:7.2", "cpe:/o:redhat:linux:7.3", "cpe:/o:redhat:linux:8.0", "cpe:/o:redhat:linux:9" ]
null
null
null
null
GHSA-p5c5-45cp-hjw4
vim is vulnerable to Heap-based Buffer Overflow
[]
null
8
null
null
GHSA-vqpf-hpm5-9vf4
D-Link DIR-823G A1V1.0.2B05 was discovered to contain a buffer overflow via the Mac parameter in the SetParentsControlInfo function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.
[]
null
7.5
null
null
CVE-2024-32163
CMSeasy 7.7.7.9 is vulnerable to code execution.
[ "cpe:2.3:a:cmseasy:cmseasy:*:*:*:*:*:*:*:*" ]
null
6.4
null
null
GHSA-wjjg-qcjc-rrj3
Vulnerability in authentication process for SMTP service in Microsoft Windows 2000 allows remote attackers to use incorrect credentials to gain privileges and conduct activities such as mail relaying.
[]
null
null
null
null
GHSA-49rq-5w7r-4rrp
In the Linux kernel before 5.17, an error path in dwc3_qcom_acpi_register_core in drivers/usb/dwc3/dwc3-qcom.c lacks certain platform_device_put and kfree calls.
[]
null
7.8
null
null
GHSA-g623-x8rq-wrr5
Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier and 5.6.21 and earlier allows remote attackers to affect availability via unknown vectors related to Server : Replication, a different vulnerability than CVE-2015-0381.
[]
null
null
null
null
GHSA-mrwv-wxq5-q8v6
Cross-site request forgery (CSRF) vulnerability in the WP Limit Posts Automatically plugin 0.7 and earlier for WordPress allows remote attackers to hijack the authentication of administrators for requests that conduct cross-site scripting (XSS) attacks via the lpa_post_letters parameter in the wp-limit-posts-automatically.php page to wp-admin/options-general.php.
[]
null
null
null
null
GHSA-h84v-w3gp-m42f
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 8.0.15 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
[]
null
4.9
null
null
GHSA-m6vv-x5w9-cwmh
IBM i2 Analyst's Notebook Premium (IBM i2 Analyze 4.3.0, 4.3.1, and 4.3.2) could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. IBM X-Force ID: 202680.
[]
null
null
null
null
GHSA-v7w7-wwgq-qmfw
An issue in nature fitness saijo mini-app on Line v13.6.1 allows attackers to send crafted malicious notifications via leakage of the channel access token.
[]
null
5.4
null
null
CVE-2025-2239
Absolute Path Disclosure Vulnerability in Hillstone Next Generation FireWall
Generation of Error Message Containing Sensitive Information vulnerability in Hillstone Networks Hillstone Next Generation FireWall.This issue affects Hillstone Next Generation FireWall: from 5.5R8P1 before 5.5R8P23.
[]
null
5.3
null
null
CVE-2024-46684
binfmt_elf_fdpic: fix AUXV size calculation when ELF_HWCAP2 is defined
In the Linux kernel, the following vulnerability has been resolved: binfmt_elf_fdpic: fix AUXV size calculation when ELF_HWCAP2 is defined create_elf_fdpic_tables() does not correctly account the space for the AUX vector when an architecture has ELF_HWCAP2 defined. Prior to the commit 10e29251be0e ("binfmt_elf_fdpic: fix /proc/<pid>/auxv") it resulted in the last entry of the AUX vector being set to zero, but with that change it results in a kernel BUG. Fix that by adding one to the number of AUXV entries (nitems) when ELF_HWCAP2 is defined.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.11:rc5:*:*:*:*:*:*" ]
null
5.5
null
null
CVE-2024-31755
cJSON v1.7.17 was discovered to contain a segmentation violation, which can trigger through the second parameter of function cJSON_SetValuestring at cJSON.c.
[ "cpe:2.3:a:cjson_project:cjson:*:*:*:*:*:*:*:*" ]
null
7.6
null
null
GHSA-6j6v-f6cj-wwmw
DedeCMS v6.1.9 was discovered to contain a Cross-Site Request Forgery (CSRF) which allows attackers to arbitrarily add Administrator accounts and modify Admin passwords.
[]
null
8.8
null
null
GHSA-2mhf-732c-q449
A cross-site scripting (XSS) vulnerability in the administration web panel on NETGEAR JGS516PE/GS116Ev2 v2.6.0.43 devices allows remote attackers to inject arbitrary web script or HTML via the language parameter.
[]
null
null
null
null
CVE-2024-7361
SourceCodester Tracking Monitoring Management System ajax.php sql injection
A vulnerability classified as critical was found in SourceCodester Tracking Monitoring Management System 1.0. This vulnerability affects unknown code of the file /ajax.php?action=save_establishment. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-273340.
[ "cpe:2.3:a:sourcecodester:tracking_monitoring_management_system:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:oretnom23:tracking_monitoring_management_system:1.0:*:*:*:*:*:*:*" ]
5.3
6.3
6.3
6.5
CVE-2017-12511
A Remote Code Execution vulnerability in HPE Intelligent Management Center (iMC) PLAT version PLAT 7.3 (E0504) was found. The problem was resolved in HPE Intelligent Management Center PLAT v7.3 (E0506) or any subsequent version.
[ "cpe:2.3:a:hp:intelligent_management_center:7.3:e0504:*:*:*:*:*:*" ]
null
null
8.8
9
GHSA-xj5p-wxr5-6r73
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Naa986 WP Stripe Checkout.This issue affects WP Stripe Checkout: from n/a through 1.2.2.37.
[]
null
7.5
null
null
CVE-2018-6547
plays_service.exe in the plays.tv service before 1.27.7.0, as distributed in AMD driver-installation packages and Gaming Evolved products, contains an HTTP message parsing function that takes a user-defined path and writes non-user controlled data as SYSTEM to the file when the extract_files parameter is used. This occurs without properly authenticating the user.
[ "cpe:2.3:a:plays.tv:plays.tv:*:*:*:*:*:*:*:*" ]
null
null
9.1
9.4
GHSA-h339-q93v-5mgr
The WP Not Login Hide (WPNLH) WordPress plugin through 1.0 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
[]
null
4.8
null
null
GHSA-gpmj-wcx3-mvp9
Stack-based buffer overflow in Nostra DivX Player 2.1, 2.2.00.0, and possibly earlier, allows remote attackers to execute arbitrary code via a long string in an M3U file. NOTE: The provenance of this information is unknown; the details are obtained solely from third party information.
[]
null
null
null
null
GHSA-rvwv-8rrq-q84r
In the Linux kernel, the following vulnerability has been resolved:tipc: force a dst refcount before doing decryptionAs it says in commit 3bc07321ccc2 ("xfrm: Force a dst refcount before entering the xfrm type handlers"):"Crypto requests might return asynchronous. In this case we leave the rcu protected region, so force a refcount on the skb's destination entry before we enter the xfrm type input/output handlers."On TIPC decryption path it has the same problem, and skb_dst_force() should be called before doing decryption to avoid a possible crash.Shuang reported this issue when this warning is triggered:[] WARNING: include/net/dst.h:337 tipc_sk_rcv+0x1055/0x1ea0 [tipc] [] Kdump: loaded Tainted: G W --------- - - 4.18.0-496.el8.x86_64+debug [] Workqueue: crypto cryptd_queue_worker [] RIP: 0010:tipc_sk_rcv+0x1055/0x1ea0 [tipc] [] Call Trace: [] tipc_sk_mcast_rcv+0x548/0xea0 [tipc] [] tipc_rcv+0xcf5/0x1060 [tipc] [] tipc_aead_decrypt_done+0x215/0x2e0 [tipc] [] cryptd_aead_crypt+0xdb/0x190 [] cryptd_queue_worker+0xed/0x190 [] process_one_work+0x93d/0x17e0
[]
null
null
null
null
CVE-2001-1529
Buffer overflow in rpc.yppasswdd (yppasswd server) in AIX allows attackers to gain unauthorized access via a long string. NOTE: due to lack of details in the vendor advisory, it is not clear if this is the same issue as CVE-2001-0779.
[ "cpe:2.3:o:ibm:aix:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2024-7573
Relevanssi Live Ajax Search <= 2.4 - Unauthenticated WP_Query Argument Injection
The Relevanssi Live Ajax Search plugin for WordPress is vulnerable to argument injection in all versions up to, and including, 2.4. This is due to insufficient validation of input supplied via POST data in the 'search' function. This makes it possible for unauthenticated attackers to inject arbitrary arguments into a WP_Query query and potentially expose sensitive information such as attachments or private posts.
[ "cpe:2.3:a:relevanssi:relevanssi-live-ajax-search:*:*:*:*:*:*:*:*" ]
null
5.3
null
null
CVE-2014-3065
Unspecified vulnerability in IBM Java Runtime Environment (JRE) 7 R1 before SR2 (7.1.2.0), 7 before SR8 (7.0.8.0), 6 R1 before SR8 FP2 (6.1.8.2), 6 before SR16 FP2 (6.0.16.2), and before SR16 FP8 (5.0.16.8) allows local users to execute arbitrary code via vectors related to the shared classes cache.
[ "cpe:2.3:a:ibm:java:5.0.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:java:5.0.11.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:java:5.0.11.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:java:5.0.11.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:java:5.0.12.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:java:5.0.12.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:java:5.0.12.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:java:5.0.12.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:java:5.0.12.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:java:5.0.12.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:java:5.0.13.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:java:5.0.14.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:java:5.0.15.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:java:5.0.16.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:java:5.0.16.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:java:5.0.16.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:java:5.0.16.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:java:6.0.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:java:6.0.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:java:6.0.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:java:6.0.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:java:6.0.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:java:6.0.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:java:6.0.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:java:6.0.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:java:6.0.8.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:java:6.0.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:java:6.0.9.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:java:6.0.9.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:java:6.0.9.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:java:6.0.10.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:java:6.0.10.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:java:6.0.11.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:java:6.0.12.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:java:6.0.13.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:java:6.0.13.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:java:6.0.13.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:java:6.0.14.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:java:7.0.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:java:7.0.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:java:7.0.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:java:7.0.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:java:7.0.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:java:7.0.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:java:7.0.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:java:7.0.5.0:*:*:*:*:*:*:*" ]
null
null
null
6.9
CVE-2013-0205
Cross-site request forgery (CSRF) vulnerability in the RESTful Web Services (restws) module 7.x-1.x before 7.x-1.2 and 7.x-2.x before 7.x-2.0-alpha4 for Drupal allows remote attackers to hijack the authentication of arbitrary users via unknown vectors.
[ "cpe:2.3:a:restful_web_services_project:restful_web_services:*:*:*:*:*:drupal:*:*", "cpe:2.3:a:restful_web_services_project:restful_web_services:7.x-2.0:-:*:*:*:drupal:*:*", "cpe:2.3:a:restful_web_services_project:restful_web_services:7.x-2.0:alpha1:*:*:*:drupal:*:*", "cpe:2.3:a:restful_web_services_project:restful_web_services:7.x-2.0:alpha2:*:*:*:drupal:*:*", "cpe:2.3:a:restful_web_services_project:restful_web_services:7.x-2.0:alpha3:*:*:*:drupal:*:*", "cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*" ]
null
null
null
6.8
GHSA-ph95-5jr4-4x7p
Multiple cross-site scripting (XSS) vulnerabilities in EncapsGallery 1.11.2 allow remote attackers to inject arbitrary web script or HTML via the file parameter to (1) watermark.php and (2) catalog_watermark.php in core/. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
[]
null
null
null
null