id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
139k
cpes
sequencelengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
GHSA-6chq-r3m4-693f
wmtv 0.6.5 and earlier allows local users to modify arbitrary files via a symlink attack on a configuration file.
[]
null
null
null
null
GHSA-69p7-3985-wf2c
Missing Authorization vulnerability in Envira Gallery Team Envira Photo Gallery allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Envira Photo Gallery: from n/a through 1.8.7.3.
[]
null
4.3
null
null
GHSA-683p-wqpr-jwpc
ICE Hrm 26.2.0 is vulnerable to CSRF that leads to password reset via service.php.
[]
null
null
null
null
GHSA-4pg3-x42q-599h
LRM does not restrict the types of files that can be uploaded to the affected product. A malicious actor can upload any file type, including executable code that allows for a remote code exploit.
[]
null
9.8
null
null
CVE-2024-7167
SourceCodester School Fees Payment System manage_course.php sql injection
A vulnerability was found in SourceCodester School Fees Payment System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /manage_course.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-272581 was assigned to this vulnerability.
[ "cpe:2.3:a:sourcecodester:school_fees_payment_system:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:oretnom23:school_fees_payment_system:1.0:*:*:*:*:*:*:*" ]
5.3
6.3
6.3
6.5
CVE-2000-0655
Netscape Communicator 4.73 and earlier allows remote attackers to cause a denial of service or execute arbitrary commands via a JPEG image containing a comment with an illegal field length of 1.
[ "cpe:2.3:a:mozilla:mozilla:m15:*:*:*:*:*:*:*", "cpe:2.3:a:netscape:communicator:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:netscape:communicator:4.05:*:*:*:*:*:*:*", "cpe:2.3:a:netscape:communicator:4.5:*:*:*:*:*:*:*", "cpe:2.3:a:netscape:communicator:4.5_beta:*:*:*:*:*:*:*", "cpe:2.3:a:netscape:communicator:4.06:*:*:*:*:*:*:*", "cpe:2.3:a:netscape:communicator:4.6:*:*:*:*:*:*:*", "cpe:2.3:a:netscape:communicator:4.07:*:*:*:*:*:*:*", "cpe:2.3:a:netscape:communicator:4.7:*:*:*:*:*:*:*", "cpe:2.3:a:netscape:communicator:4.08:*:*:*:*:*:*:*", "cpe:2.3:a:netscape:communicator:4.51:*:*:*:*:*:*:*", "cpe:2.3:a:netscape:communicator:4.61:*:*:*:*:*:*:*", "cpe:2.3:a:netscape:communicator:4.72:*:*:*:*:*:*:*", "cpe:2.3:a:netscape:communicator:4.73:*:*:*:*:*:*:*" ]
null
null
null
5
CVE-2010-3892
Session fixation vulnerability in the login form in the administrator interface in IBM OmniFind Enterprise Edition 8.x and 9.x allows remote attackers to hijack web sessions by replaying a session ID (aka SID) value.
[ "cpe:2.3:a:ibm:omnifind:8.0:-:enterprise:*:*:*:*:*", "cpe:2.3:a:ibm:omnifind:8.4:-:enterprise:*:*:*:*:*", "cpe:2.3:a:ibm:omnifind:8.5:-:enterprise:*:*:*:*:*", "cpe:2.3:a:ibm:omnifind:9.0:-:enterprise:*:*:*:*:*", "cpe:2.3:a:ibm:omnifind:9.1:-:enterprise:*:*:*:*:*" ]
null
null
null
6.8
CVE-2015-2673
The ec_ajax_update_option and ec_ajax_clear_all_taxrates functions in inc/admin/admin_ajax_functions.php in the WP EasyCart plugin 1.1.30 through 3.0.20 for WordPress allow remote attackers to gain administrator privileges and execute arbitrary code via the option_name and option_value parameters.
[ "cpe:2.3:a:wpeasycart:wp_easycart:1.1.30:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpeasycart:wp_easycart:1.1.31:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpeasycart:wp_easycart:1.1.32:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpeasycart:wp_easycart:1.1.33:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpeasycart:wp_easycart:1.1.34:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpeasycart:wp_easycart:1.1.35:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpeasycart:wp_easycart:1.1.36:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpeasycart:wp_easycart:1.2.0:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpeasycart:wp_easycart:1.2.1:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpeasycart:wp_easycart:1.2.2:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpeasycart:wp_easycart:1.2.3:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpeasycart:wp_easycart:1.2.4:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpeasycart:wp_easycart:1.2.5:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpeasycart:wp_easycart:1.2.6:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpeasycart:wp_easycart:1.2.7:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpeasycart:wp_easycart:1.2.8:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpeasycart:wp_easycart:1.2.9:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpeasycart:wp_easycart:1.2.10:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpeasycart:wp_easycart:1.2.11:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpeasycart:wp_easycart:1.2.12:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpeasycart:wp_easycart:1.2.13:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpeasycart:wp_easycart:1.2.14:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpeasycart:wp_easycart:1.2.15:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpeasycart:wp_easycart:1.2.16:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpeasycart:wp_easycart:2.0.1:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpeasycart:wp_easycart:2.0.1\\@824267:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpeasycart:wp_easycart:2.0.2:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpeasycart:wp_easycart:2.0.3:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpeasycart:wp_easycart:2.0.4:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpeasycart:wp_easycart:2.0.5:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpeasycart:wp_easycart:2.0.6:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpeasycart:wp_easycart:2.0.7:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpeasycart:wp_easycart:2.0.8:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpeasycart:wp_easycart:2.0.9:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpeasycart:wp_easycart:2.0.10:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpeasycart:wp_easycart:2.0.11:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpeasycart:wp_easycart:2.0.12:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpeasycart:wp_easycart:2.0.13:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpeasycart:wp_easycart:2.0.14:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpeasycart:wp_easycart:2.0.15:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpeasycart:wp_easycart:2.0.16:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpeasycart:wp_easycart:2.0.17:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpeasycart:wp_easycart:2.0.18:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpeasycart:wp_easycart:2.0.19:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpeasycart:wp_easycart:2.0.20:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpeasycart:wp_easycart:2.0.21:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpeasycart:wp_easycart:2.0.22:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpeasycart:wp_easycart:2.1.0:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpeasycart:wp_easycart:2.1.1:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpeasycart:wp_easycart:2.1.2:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpeasycart:wp_easycart:2.1.3:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpeasycart:wp_easycart:2.1.4:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpeasycart:wp_easycart:2.1.5:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpeasycart:wp_easycart:2.1.6:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpeasycart:wp_easycart:2.1.7:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpeasycart:wp_easycart:2.1.8:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpeasycart:wp_easycart:2.1.9:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpeasycart:wp_easycart:2.1.10:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpeasycart:wp_easycart:2.1.11:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpeasycart:wp_easycart:2.1.12:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpeasycart:wp_easycart:2.1.13:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpeasycart:wp_easycart:2.1.14:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpeasycart:wp_easycart:2.1.15:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpeasycart:wp_easycart:2.1.16:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpeasycart:wp_easycart:2.1.17:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpeasycart:wp_easycart:2.1.18:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpeasycart:wp_easycart:2.1.19:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpeasycart:wp_easycart:2.1.20:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpeasycart:wp_easycart:2.1.21:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpeasycart:wp_easycart:2.1.22:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpeasycart:wp_easycart:2.1.23:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpeasycart:wp_easycart:2.1.24:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpeasycart:wp_easycart:2.1.25:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpeasycart:wp_easycart:2.1.26:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpeasycart:wp_easycart:2.1.27:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpeasycart:wp_easycart:2.1.28:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpeasycart:wp_easycart:2.1.29:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpeasycart:wp_easycart:2.1.30:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpeasycart:wp_easycart:2.1.31:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpeasycart:wp_easycart:2.1.32:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpeasycart:wp_easycart:2.1.33:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpeasycart:wp_easycart:2.1.34:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpeasycart:wp_easycart:2.1.35:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpeasycart:wp_easycart:2.1.36:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpeasycart:wp_easycart:3.0.0:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpeasycart:wp_easycart:3.0.1:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpeasycart:wp_easycart:3.0.2:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpeasycart:wp_easycart:3.0.3:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpeasycart:wp_easycart:3.0.4:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpeasycart:wp_easycart:3.0.5:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpeasycart:wp_easycart:3.0.6:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpeasycart:wp_easycart:3.0.7:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpeasycart:wp_easycart:3.0.8:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpeasycart:wp_easycart:3.0.9:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpeasycart:wp_easycart:3.0.10:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpeasycart:wp_easycart:3.0.11:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpeasycart:wp_easycart:3.0.12:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpeasycart:wp_easycart:3.0.13:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpeasycart:wp_easycart:3.0.14:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpeasycart:wp_easycart:3.0.15:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpeasycart:wp_easycart:3.0.16:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpeasycart:wp_easycart:3.0.17:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpeasycart:wp_easycart:3.0.18:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpeasycart:wp_easycart:3.0.19:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpeasycart:wp_easycart:3.0.20:*:*:*:*:wordpress:*:*" ]
null
null
8.8
6.5
CVE-2005-4895
Multiple integer overflows in TCMalloc (tcmalloc.cc) in gperftools before 0.4 make it easier for context-dependent attackers to perform memory-related attacks such as buffer overflows via a large size value, which causes less memory to be allocated than expected.
[ "cpe:2.3:a:csilvers:gperftools:*:*:*:*:*:*:*:*", "cpe:2.3:a:csilvers:gperftools:0.1:*:*:*:*:*:*:*", "cpe:2.3:a:csilvers:gperftools:0.2:*:*:*:*:*:*:*" ]
null
null
null
5
GHSA-c4h6-84f3-72cf
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Thimo Grauerholz WP-Spreadplugin allows Stored XSS.This issue affects WP-Spreadplugin: from n/a through 4.8.9.
[]
null
5.9
null
null
GHSA-hx5r-m6gq-f3fp
Cross Site Scripting (XSS) vulnerability in WofficeIO Woffice Core allows Reflected XSS.This issue affects Woffice Core: from n/a through 5.4.8.
[]
null
7.1
null
null
CVE-2007-3347
The D-Link DPH-540/DPH-541 phone accepts SIP INVITE messages that are not from the Call Server's IP address, which allows remote attackers to engage in arbitrary SIP communication with the phone, as demonstrated by communication with forged caller ID.
[ "cpe:2.3:h:d-link:dph-540:1.00.03:*:*:*:*:*:*:*", "cpe:2.3:h:d-link:dph-540:1.00.14:*:*:*:*:*:*:*", "cpe:2.3:h:d-link:dph-541:1.00.03:*:*:*:*:*:*:*", "cpe:2.3:h:d-link:dph-541:1.00.14:*:*:*:*:*:*:*" ]
null
null
null
7.8
CVE-2002-1408
Unknown vulnerability or vulnerabilities in HP OpenView EMANATE 14.2 snmpModules allow the SNMP read-write community name to be exposed, related to (1) "'read-only' community access," and/or (2) an easily guessable community name.
[ "cpe:2.3:a:hp:openview_emanate_snmp_agent:14.2:*:*:*:*:*:*:*", "cpe:2.3:o:hp:vvos:11.04:*:*:*:*:*:*:*" ]
null
null
null
7.5
RHSA-2005:432
Red Hat Security Advisory: gaim security update
security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws" ]
null
null
null
null
CVE-2020-24924
A Persistent Cross-site Scripting vulnerability is found in ElkarBackup v1.3.3, where an attacker can steal the user session cookie using this vulnerability present on Policies >> action >> Name Parameter
[ "cpe:2.3:a:elkarbackup:elkarbackup:1.3.3:*:*:*:*:*:*:*" ]
null
5.4
null
3.5
RHSA-2024:0145
Red Hat Security Advisory: ipa security update
ipa: Invalid CSRF protection
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
6.5
null
null
CVE-2022-20172
In onbind of ShannonRcsService.java, there is a possible access to protect data due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-206987222References: N/A
[ "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*" ]
null
5.5
null
2.1
RHSA-2019:1197
Red Hat Security Advisory: libvirt security update
hardware: Microarchitectural Store Buffer Data Sampling (MSBDS) hardware: Micro-architectural Load Port Data Sampling - Information Leak (MLPDS) hardware: Microarchitectural Fill Buffer Data Sampling (MFBDS) hardware: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)
[ "cpe:/o:redhat:rhel_aus:6.5::server" ]
null
null
3.8
null
RHBA-2023:1649
Red Hat Bug Fix Advisory: OpenShift Container Platform 4.11.35 packages and security update
golang: out-of-bounds read in golang.org/x/text/language leads to DoS haproxy: request smuggling attack in HTTP/1 header parsing
[ "cpe:/a:redhat:openshift:4.11::el8" ]
null
8.2
null
null
GHSA-48r4-vgjh-mw65
NTFS Elevation of Privilege Vulnerability
[]
null
7.8
null
null
GHSA-jwgg-6gv4-m9cx
The getHTTPResponse function in miniwget.c in MiniUPnP 1.9 allows remote attackers to cause a denial of service (crash) via crafted headers that trigger an out-of-bounds read.
[]
null
null
null
null
GHSA-25x2-3h45-fchh
The NCTAudioEditor2 ActiveX control in NCTWMAFile2.dll 2.6.2.157, as distributed in NCTAudioEditor and NCTAudioStudio 2.7, allows remote attackers to overwrite arbitrary files via the CreateFile method.
[]
null
null
null
null
GHSA-h525-7gmx-5gmx
YMS VIS Pro is an information system for veterinary and food administration, veterinarians and farm. Due to a combination of improper method for system credentials generation and weak password policy, passwords can be easily guessed and enumerated through brute force attacks. Successful attacks can lead to unauthorised access and execution of operations based on assigned user permissions. This vulnerability affects VIS Pro in versions <= 3.3.0.6. This vulnerability has been mitigated by changes in authentication mechanisms and implementation of additional authentication layer and strong password policies.
[]
null
9.8
null
null
CVE-2006-3519
Multiple cross-site scripting (XSS) vulnerabilities in The Banner Engine (tbe) 4.0 allow remote attackers to execute arbitrary web script or HTML via the (1) text parameter in a search action to (a) top.php, and the (2) adminpass or (3) adminlogin parameter to (b) signup.php.
[ "cpe:2.3:a:native_solutions:the_banner_engine:4.0:*:*:*:*:*:*:*" ]
null
null
null
5.8
CVE-2012-2298
Multiple cross-site scripting (XSS) vulnerabilities in the RealName module 6.x-1.x before 6.x-1.5 for Drupal allow remote attackers to inject arbitrary web script or HTML via vectors related to (1) "user names in page titles" and (2) "autocomplete callbacks."
[ "cpe:2.3:a:drupal:realname:6.x-1.2:*:*:*:*:*:*:*", "cpe:2.3:a:nancy_wichmann:realname:6.x-1.0:*:*:*:*:*:*:*", "cpe:2.3:a:nancy_wichmann:realname:6.x-1.0:alpha1:*:*:*:*:*:*", "cpe:2.3:a:nancy_wichmann:realname:6.x-1.0:beta:*:*:*:*:*:*", "cpe:2.3:a:nancy_wichmann:realname:6.x-1.1:*:*:*:*:*:*:*", "cpe:2.3:a:nancy_wichmann:realname:6.x-1.1:rc1:*:*:*:*:*:*", "cpe:2.3:a:nancy_wichmann:realname:6.x-1.1:rc2:*:*:*:*:*:*", "cpe:2.3:a:nancy_wichmann:realname:6.x-1.1:rc3:*:*:*:*:*:*", "cpe:2.3:a:nancy_wichmann:realname:6.x-1.2:*:*:*:*:*:*:*", "cpe:2.3:a:nancy_wichmann:realname:6.x-1.3:*:*:*:*:*:*:*", "cpe:2.3:a:nancy_wichmann:realname:6.x-1.4:*:*:*:*:*:*:*", "cpe:2.3:a:nancy_wichmann:realname:6.x-1.x:dev:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:-:*:*:*:*:*:*:*" ]
null
null
null
4.3
CVE-2017-3888
A vulnerability in the web-based management interface of Cisco Unified Communications Manager could allow an authenticated, remote attacker to conduct a reflected cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. This vulnerability affects Cisco Unified Communications Manager with a default configuration running an affected software release with the attacker authenticated as the administrative user. More Information: CSCvc83712. Known Affected Releases: 12.0(0.98000.452). Known Fixed Releases: 12.0(0.98000.750) 12.0(0.98000.708) 12.0(0.98000.707) 12.0(0.98000.704) 12.0(0.98000.554) 12.0(0.98000.546) 12.0(0.98000.543) 12.0(0.98000.248) 12.0(0.98000.244) 12.0(0.98000.242).
[ "cpe:2.3:a:cisco:unified_communications_manager:12.0\\(0.98000.452\\):*:*:*:*:*:*:*" ]
null
null
5.4
3.5
GHSA-c8wh-6jw4-2h79
Potential unauthorized access to stored request & session data when plugin is misconfigured in October CMS Debugbar
ImpactThe debugbar contains a perhaps little known feature where it will log all requests (and all information pertaining to each request including session data) whenever it is enabled. This presents a problem if the plugin is ever enabled on a system that is open to untrusted users as the potential exists for them to use this feature to view all requests being made to the application and obtain sensitive information from those requests. There even exists the potential for account takeovers of authenticated users by non-authenticated public users, which would then lead to a number of other potential issues as an attacker could theoretically get full access to the system if the required conditions existed.PatchesIssue has been patched in v3.1.0 by locking down access to the debugbar to all users; it now requires an authenticated backend user with a specifically enabled permission before it is even usable, and the feature that allows access to stored request information is restricted behind a different permission that's more restrictive.WorkaroundsApply https://github.com/rainlab/debugbar-plugin/commit/86dd29f9866d712de7d98f5f9dc67751b82ecd18 to your installation manually if unable to upgrade to v3.1.0.For more informationIf you have any questions or comments about this advisory:Email us at [[email protected]](mailto:[email protected]) & [[email protected]](mailto:[email protected])AcknowledgementsThanks to [Freddie Poser](https://twitter.com/vogonjeltz101) for reporting the issue to the RainLab team.
[]
null
6.1
null
null
GHSA-hp76-v43v-2h6c
In eicPresentationRetrieveEntryValue of acropora/app/identity/libeic/EicPresentation.c, there is a possible information disclosure due to a race condition. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-196388042References: N/A
[]
null
4.1
null
null
GHSA-3q3h-cf5f-xf24
RAV antivirus allows remote attackers to bypass antivirus protection via a compressed file with both local and global headers set to zero, which does not prevent the compressed file from being opened on a target system.
[]
null
null
null
null
CVE-2017-8355
In ImageMagick 7.0.5-5, the ReadMTVImage function in mtv.c allows attackers to cause a denial of service (memory leak) via a crafted file.
[ "cpe:2.3:a:imagemagick:imagemagick:7.0.5-5:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" ]
null
null
6.5
4.3
CVE-2009-4945
AdPeeps 8.5d1 has a default password of admin for the admin account, which makes it easier for remote attackers to obtain access via requests to index.php.
[ "cpe:2.3:a:atutor:acollab:1.2:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2017-6206
D-Link DGS-1510-28XMP, DGS-1510-28X, DGS-1510-52X, DGS-1510-52, DGS-1510-28P, DGS-1510-28, and DGS-1510-20 Websmart devices with firmware before 1.31.B003 allow attackers to conduct Unauthenticated Information Disclosure attacks via unspecified vectors.
[ "cpe:2.3:o:dlink:websmart_dgs-1510_series_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:websmart_dgs-1510-20:-:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:websmart_dgs-1510-28:-:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:websmart_dgs-1510-28p:-:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:websmart_dgs-1510-28xmp:-:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:websmart_dgs-1510-52:-:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:websmart_dgs-1510-52x:-:*:*:*:*:*:*:*" ]
null
null
7.5
5
CVE-2017-5649
Apache Geode before 1.1.1, when a cluster has enabled security by setting the security-manager property, allows remote authenticated users with CLUSTER:READ but not DATA:READ permission to access the data browser page in Pulse and consequently execute an OQL query that exposes data stored in the cluster.
[ "cpe:2.3:a:apache:geode:*:*:*:*:*:*:*:*" ]
null
null
7.5
4
GHSA-g5hv-c3g8-mc9x
A use-after-free issue was addressed with improved memory management. This issue is fixed in iOS 16.6 and iPadOS 16.6, macOS Big Sur 11.7.9, macOS Monterey 12.6.8, tvOS 16.6, macOS Ventura 13.5, watchOS 9.6. An app may be able to execute arbitrary code with kernel privileges.
[]
null
7.8
null
null
cisco-sa-tcl-ace-C9KuVKmm
Cisco IOS and IOS XE Software Tcl Arbitrary Code Execution Vulnerability
A vulnerability in the Tool Command Language (Tcl) interpreter of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, local attacker with privileged EXEC credentials to execute arbitrary code on the underlying operating system (OS) with root privileges. The vulnerability is due to insufficient input validation of data passed to the Tcl interpreter. An attacker could exploit this vulnerability by loading malicious Tcl code on an affected device. A successful exploit could allow the attacker to cause memory corruption or execute the code with root privileges on the underlying OS of the affected device. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-tcl-ace-C9KuVKmm ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-tcl-ace-C9KuVKmm"]
[]
null
null
6.7
null
GHSA-6hv6-62gq-jmq6
Netgear D6220 with Firmware Version 1.0.0.80, D8500 with Firmware Version 1.0.3.60, R6700 with Firmware Version 1.0.2.26, and R6900 with Firmware Version 1.0.2.26 are vulnerable to Command Injection. If an attacker gains web management privileges, they can inject commands into the post request parameters, gaining shell privileges.
[]
null
8.8
null
null
GHSA-9m38-2292-v3f7
Unspecified vulnerability in the Portable Clusterware component in Oracle Database Server 11.2.0.4 and 12.1.0.2 allows remote attackers to affect availability via unknown vectors.
[]
null
null
7.5
null
GHSA-hv63-698c-9x4g
PHP remote file inclusion vulnerability in (1) about.php or (2) auth.php in TotalCalendar allows remote attackers to execute arbitrary PHP code via a URL in the inc_dir parameter.
[]
null
null
null
null
CVE-2020-12364
Null pointer reference in some Intel(R) Graphics Drivers for Windows* before version 26.20.100.7212 and before version Linux kernel version 5.5 may allow a privileged user to potentially enable a denial of service via local access.
[ "cpe:2.3:a:intel:graphics_drivers:*:*:*:*:*:windows:*:*", "cpe:2.3:a:intel:graphics_drivers:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
null
5.5
null
2.1
GHSA-q4v4-q7v7-cvq2
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Wolfgang Ertl weebotLite plugin <= 1.0.0 versions.
[]
null
5.9
null
null
GHSA-v9v2-h9rf-2p2j
Tenda AX3 v16.03.12.10_CN was discovered to contain a stack overflow in the function formSetVirtualSer. This vulnerability allows attackers to cause a Denial of Service (DoS) via the list parameter.
[]
null
null
null
null
CVE-2016-4846
Untrusted search path vulnerability in the installer of PhishWall Client Internet Explorer before 3.7.8.2.
[ "cpe:2.3:a:securebrain:phishwall_client:*:*:*:*:*:internet_explorer:*:*" ]
null
null
7.8
9.3
GHSA-67fg-wqh7-5m7j
Wi-Fi in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-04-01 does not prevent use of a Wi-Fi CA certificate in an unrelated CA role, which allows attackers to gain privileges via a crafted application, as demonstrated by obtaining Signature or SignatureOrSystem access, aka internal bug 26324357.
[]
null
null
7.8
null
CVE-2023-33217
Missing integrity check on upgrade package
By abusing a design flaw in the firmware upgrade mechanism of the impacted terminal it's possible to cause a permanent denial of service for the terminal. the only way to recover the terminal is by sending back the terminal to the manufacturer
[ "cpe:2.3:o:idemia:sigma_lite_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:idemia:sigma_lite:-:*:*:*:*:*:*:*", "cpe:2.3:o:idemia:sigma_lite\\+_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:idemia:sigma_lite\\+:-:*:*:*:*:*:*:*", "cpe:2.3:o:idemia:sigma_extreme_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:idemia:sigma_extreme:-:*:*:*:*:*:*:*", "cpe:2.3:o:idemia:sigma_wide_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:idemia:sigma_wide:-:*:*:*:*:*:*:*", "cpe:2.3:o:idemia:morphowave_compact_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:idemia:morphowave_compact:-:*:*:*:*:*:*:*", "cpe:2.3:o:idemia:morphowave_xp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:idemia:morphowave_xp:-:*:*:*:*:*:*:*", "cpe:2.3:o:idemia:visionpass_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:idemia:visionpass:-:*:*:*:*:*:*:*", "cpe:2.3:o:idemia:morphowave_sp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:idemia:morphowave_sp:-:*:*:*:*:*:*:*" ]
null
4.9
null
null
CVE-2024-8323
Pricing Tables WordPress Plugin – Easy Pricing Tables <= 3.2.6 - Authenticated (Contributor+) Stored Cross-Site Scripting via fontFamily Attribute
The Pricing Tables WordPress Plugin – Easy Pricing Tables plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘fontFamily’ attribute in all versions up to, and including, 3.2.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[ "cpe:2.3:a:fatcatapps:easy_pricing_tables:*:*:*:*:*:wordpress:*:*" ]
null
6.4
null
null
GHSA-69mg-69f4-94mp
The Weaver Show Posts Plugin for WordPress is vulnerable to stored Cross-Site Scripting due to insufficient escaping of the profile display name in versions up to, and including, 1.6. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
6.4
null
null
GHSA-f3f8-g7h4-j8c8
The transfer and transferFrom functions of a smart contract implementation for Easy Trading Token (ETT), an Ethereum token, have an integer overflow.
[]
null
null
7.5
null
GHSA-5hmf-j4j4-rx89
An improper access control vulnerability in Trend Micro Apex One could allow a local attacker to escalate privileges on affected installations.Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
[]
null
7.8
null
null
CVE-2018-14249
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the exportDataObject method. By performing actions in JavaScript, an attacker can trigger a type confusion condition. An attacker can leverage this vulnerability to execute code under the context of the current process. Was ZDI-CAN-6012.
[ "cpe:2.3:a:foxitsoftware:foxit_reader:*:*:*:*:*:*:*:*", "cpe:2.3:a:foxitsoftware:phantompdf:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
null
8.8
6.8
RHSA-2022:0431
Red Hat Security Advisory: Red Hat Advanced Cluster Security 3.68 security and enhancement update
golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet
[ "cpe:/a:redhat:advanced_cluster_security:3.68::el8" ]
null
7.3
null
null
CVE-2010-3127
Untrusted search path vulnerability in Adobe PhotoShop CS2 through CS5 allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse dwmapi.dll or Wintab32.dll that is located in the same folder as a PSD or other file that is processed by PhotoShop. NOTE: some of these details are obtained from third party information.
[ "cpe:2.3:a:adobe:photoshop:9.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:photoshop:9.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:photoshop:9.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:photoshop:10.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:photoshop:11.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:photoshop:12.0:*:*:*:*:*:*:*" ]
null
null
null
9.3
CVE-2019-7123
Adobe Acrobat and Reader versions 2019.010.20098 and earlier, 2019.010.20098 and earlier, 2017.011.30127 and earlier version, and 2015.006.30482 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure .
[ "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
null
7.5
5
CVE-2016-4646
Audio in Apple OS X before 10.11.6 mishandles a size value, which allows remote attackers to obtain sensitive information or cause a denial of service (out-of-bounds read) via a crafted audio file.
[ "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*" ]
null
null
6.5
4.3
GHSA-7jqx-j6cc-vf9q
WeBid auction script 0.5.4 stores sensitive information under the web root with insufficient access control, which allows remote attackers to obtain SQL query logs via a direct request for logs/cron.log.
[]
null
null
null
null
CVE-2024-45808
Malicious log injection via access logs in envoy
Envoy is a cloud-native high-performance edge/middle/service proxy. A vulnerability has been identified in Envoy that allows malicious attackers to inject unexpected content into access logs. This is achieved by exploiting the lack of validation for the `REQUESTED_SERVER_NAME` field for access loggers. This issue has been addressed in versions 1.31.2, 1.30.6, 1.29.9, and 1.28.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.
[ "cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*" ]
null
6.5
null
null
GHSA-vg5w-8wf5-8234
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Java SE, Java SE Embedded, JRockit. While the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 4.0 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N).
[]
null
null
4
null
CVE-2022-48718
drm: mxsfb: Fix NULL pointer dereference
In the Linux kernel, the following vulnerability has been resolved: drm: mxsfb: Fix NULL pointer dereference mxsfb should not ever dereference the NULL pointer which drm_atomic_get_new_bridge_state is allowed to return. Assume a fixed format instead.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:5.17:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:5.17:rc2:*:*:*:*:*:*" ]
null
5.5
null
null
CVE-2018-2634
Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JGSS). Supported versions that are affected are Java SE: 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. While the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 6.8 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N).
[ "cpe:2.3:a:oracle:jdk:1.7.0:update161:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.8.0:update152:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:9.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update161:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.8.0:update152:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:9.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*", "cpe:2.3:a:schneider-electric:struxureware_data_center_expert:*:*:*:*:*:*:*:*", "cpe:2.3:a:hp:xp_command_view:*:*:*:*:advanced:*:*:*", "cpe:2.3:a:hp:xp_p9000_command_view:*:*:*:*:advanced:*:*:*", "cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*" ]
null
6.8
null
4.3
GHSA-whg3-7342-p9mg
EIC e-document system does not perform completed identity verification for sorting and filtering personnel data. The vulnerability allows remote attacker to obtain users’ credential information without logging in the system, and further acquire the privileged permissions and execute arbitrary commends.
[]
null
null
null
null
RHSA-2005:103
Red Hat Security Advisory: perl security update
security flaw security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
CVE-2015-5697
The get_bitmap_file function in drivers/md/md.c in the Linux kernel before 4.1.6 does not initialize a certain bitmap data structure, which allows local users to obtain sensitive information from kernel memory via a GET_BITMAP_FILE ioctl call.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
null
null
null
2.1
CVE-2024-8020
Denial of Service in lightning-ai/pytorch-lightning
A vulnerability in lightning-ai/pytorch-lightning version 2.3.2 allows an attacker to cause a denial of service by sending an unexpected POST request to the `/api/v1/state` endpoint of `LightningApp`. This issue occurs due to improper handling of unexpected state values, which results in the server shutting down.
[]
null
null
7.5
null
RHSA-2021:5235
Red Hat Security Advisory: postgresql:12 security update
postgresql: memory disclosure in certain queries postgresql: server processes unencrypted bytes from man-in-the-middle
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8.1
null
null
CVE-2024-40620
Rockwell Automation Pavilion8® Unencrypted Data Vulnerability via HTTP protocol
CVE-2024-40620 IMPACT A vulnerability exists in the affected product due to lack of encryption of sensitive information. The vulnerability results in data being sent between the Console and the Dashboard without encryption, which can be seen in the logs of proxy servers, potentially impacting the data's confidentiality.
[]
5.3
null
null
null
GHSA-7v8x-4fxf-3hxx
IBM Planning Analytics Workspace 2.0 could be vulnerable to malicious file upload by not validating the file types or sizes. Attackers can make use of this weakness and upload malicious executable files into the system and it can be sent to victim for performing further attacks. IBM X-Force ID: 214025.
[]
null
8
null
null
CVE-2009-0257
Multiple cross-site scripting (XSS) vulnerabilities in TYPO3 4.0.0 through 4.0.9, 4.1.0 through 4.1.7, and 4.2.0 through 4.2.3 allow remote attackers to inject arbitrary web script or HTML via the (1) name and (2) content of indexed files to the (a) Indexed Search Engine (indexed_search) system extension; (b) unspecified test scripts in the ADOdb system extension; and (c) unspecified vectors in the Workspace module.
[ "cpe:2.3:a:typo3:typo3:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:4.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:4.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:4.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:4.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:4.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:4.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:4.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:4.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:4.1.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:4.1.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:4.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:4.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:4.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:4.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:4.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:4.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:4.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:4.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:4.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:4.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:4.2.3:*:*:*:*:*:*:*" ]
null
null
null
4.3
RHSA-2020:0279
Red Hat Security Advisory: virt:rhel security update
hw: TSX Transaction Asynchronous Abort (TAA)
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
null
6.5
null
CVE-2024-12115
Poll Maker <= 5.5.4 - Cross-Site Request Forgery to Poll Duplication
The Poll Maker – Versus Polls, Anonymous Polls, Image Polls plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 5.5.4. This is due to missing or incorrect nonce validation on the duplicate_poll() function. This makes it possible for unauthenticated attackers to duplicate polls via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
[]
null
4.3
null
null
CVE-2023-47636
Full Path Disclosure via re-export document in pimcore/admin-ui-classic-bundle
The Pimcore Admin Classic Bundle provides a Backend UI for Pimcore. Full Path Disclosure (FPD) vulnerabilities enable the attacker to see the path to the webroot/file. e.g.: /home/omg/htdocs/file/. Certain vulnerabilities, such as using the load_file() (within a SQL Injection) query to view the page source, require the attacker to have the full path to the file they wish to view. In the case of pimcore, the fopen() function here doesn't have an error handle when the file doesn't exist on the server so the server response raises the full path "fopen(/var/www/html/var/tmp/export-{ uniqe id}.csv)". This issue has been patched in commit `10d178ef771` which has been included in release version 1.2.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.
[ "cpe:2.3:a:pimcore:admin_classic_bundle:*:*:*:*:*:pimcore:*:*" ]
null
5.3
null
null
GHSA-35vq-jv5m-667c
The SNMP module in Cisco IOS XE 3.5E allows remote authenticated users to cause a denial of service (device reload) by polling frequently, aka Bug ID CSCug65204.
[]
null
null
null
null
GHSA-gfc8-6qcc-3mvm
BIG-IP monitor functionality may allow an attacker to bypass access control restrictions, regardless of the port lockdown settings.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
[]
8.6
7.2
null
null
CVE-2023-26400
ZDI-CAN-20232: Adobe Dimension USD File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability
Adobe Dimension version 3.4.8 (and earlier) is affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[ "cpe:2.3:a:adobe:dimension:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
5.5
null
null
GHSA-7w57-3xw4-6hgx
Cross-site scripting (XSS) vulnerability in Microsoft Internet Explorer allows remote attackers to inject arbitrary web script or HTML via a UTF-7 encoded URL that is returned in a large HTTP 404 error message without an explicit charset, a related issue to CVE-2006-0032.
[]
null
null
null
null
GHSA-hw9r-qgrq-45q6
Cross-site scripting (XSS) vulnerability in track.php in phpmyfamily 1.4.1 allows remote attackers to inject arbitrary web script or HTML via the name parameter.
[]
null
null
null
null
GHSA-pxfw-cxx3-vxv8
In Unify CP IP Phone firmware 1.10.4.3, Weak Credentials are used (a hardcoded root password).
[]
null
8.8
null
null
CVE-2019-11785
Improper access control in mail module (followers) in Odoo Community 13.0 and earlier and Odoo Enterprise 13.0 and earlier, allows remote authenticated users to obtain access to messages posted on business records there were not given access to, and subscribe to receive future messages.
[ "cpe:2.3:a:odoo:odoo:*:*:*:*:community:*:*:*", "cpe:2.3:a:odoo:odoo:*:*:*:*:enterprise:*:*:*" ]
null
null
6.5
null
GHSA-gcx2-gvj7-pxv3
Insufficient Protection against HTTP Request Smuggling in mitmproxy
ImpactIn mitmproxy 7.0.4 and below, a malicious client or server is able to perform [HTTP request smuggling](https://en.wikipedia.org/wiki/HTTP_request_smuggling) attacks through mitmproxy. This means that a malicious client/server could smuggle a request/response through mitmproxy as part of another request/response's HTTP message body. While mitmproxy would only see one request, the target server would see multiple requests. A smuggled request is still captured as part of another request's body, but it does not appear in the request list and does not go through the usual mitmproxy event hooks, where users may have implemented custom access control checks or input sanitization.Unless you use mitmproxy to protect an HTTP/1 service, no action is required.PatchesThe vulnerability has been fixed in mitmproxy 8.0.0 and above.AcknowledgementsWe thank Zeyu Zhang (@zeyu2001) for responsibly disclosing this vulnerability to the mitmproxy team.Timeline**2022-03-15**: Received initial report.**2022-03-15**: Verified report and confirmed receipt.**2022-03-16**: Shared patch with researcher.**2022-03-16**: Received confirmation that patch is working.**2022-03-19**: Published patched release and advisory.
[]
9.3
9.8
null
null
GHSA-5r3q-w36x-6v9v
Cross-Site Request Forgery (CSRF) vulnerability in EricH The Visitor Counter allows Stored XSS. This issue affects The Visitor Counter: from n/a through 1.4.3.
[]
null
7.1
null
null
GHSA-34q7-j45w-p4jq
IBM Cognos Analytics 11.0, 11.1.0, and 11.1.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 158335.
[]
null
null
null
null
GHSA-xvwv-6wvx-px9x
Plone Open Redirect
By linking to a specific url in Plone 2.5-5.1rc1 with a parameter, an attacker could send you to his own website. On its own this is not so bad: the attacker could more easily link directly to his own website instead. But in combination with another attack, you could be sent to the Plone login form and login, then get redirected to the specific url, and then get a second redirect to the attacker website.
[]
5.3
null
6.1
null
GHSA-c583-987f-5r26
Cross-site scripting (XSS) vulnerability in Enkai-kun before 110916 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
[]
null
null
null
null
CVE-2022-45796
SHARP Multifunction Printer - Command Injection
Command injection vulnerability in nw_interface.html in SHARP multifunction printers (MFPs)'s Digital Full-color Multifunctional System 202 or earlier, 120 or earlier, 600 or earlier, 121 or earlier, 500 or earlier, 402 or earlier, 790 or earlier, and Digital Multifunctional System (Monochrome) 200 or earlier, 211 or earlier, 102 or earlier, 453 or earlier, 400 or earlier, 202 or earlier, 602 or earlier, 500 or earlier, 401 or earlier allows remote attackers to execute arbitrary commands via unspecified vectors.
[ "cpe:2.3:o:sharp:bp-30c25_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-30c25:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30c25t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-30c25t:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30c25y_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-30c25y:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30c25z_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-30c25z:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30m28_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-30m28:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30m28t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-30m28t:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30m31_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-30m31:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30m31t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-30m31t:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30m35_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-30m35:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30m35t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-30m35t:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50c26_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-50c26:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50c31_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-50c31:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50c36_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-50c36:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50c45_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-50c45:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50c55_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-50c55:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50c65_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-50c65:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50m26_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-50m26:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50m31_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-50m31:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50m36_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-50m36:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50m45_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-50m45:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50m50_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-50m50:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50m55_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-50m55:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-55c26_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-55c26:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-60c31_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-60c31:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-60c36_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-60c36:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-60c45_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-60c45:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70c31_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-70c31:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70c36_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-70c36:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70c45_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-70c45:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70c55_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-70c55:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70c65_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-70c65:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70m31_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-70m31:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70m36_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-70m36:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70m45_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-70m45:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70m55_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-70m55:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70m65_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-70m65:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70m75_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-70m75:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70m90_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:bp-70m90:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-2630n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-2630n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-2651_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-2651:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3050n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-3050n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3050n_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-3050n_a:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3050v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-3050v:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3050v_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-3050v_a:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3051_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-3051:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3060n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-3060n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3060v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-3060v:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3061_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-3061:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3061s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-3061s:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3070n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-3070n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3070n_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-3070n_a:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3070v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-3070v:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3070v_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-3070v_a:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3071_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-3071:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3071s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-3071s:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3550n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-3550n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3550v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-3550v:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3551_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-3551:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3560n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-3560n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3560v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-3560v:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3561_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-3561:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3561s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-3561s:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3570n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-3570n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3570v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-3570v:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3571_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-3571:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3571s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-3571s:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4050n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-4050n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4050v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-4050v:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4051_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-4051:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4060n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-4060n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4060v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-4060v:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4061_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-4061:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4061s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-4061s:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4070n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-4070n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4070n_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-4070n_a:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4070v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-4070v:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4070v_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-4070v_a:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4071_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-4071:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4071s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-4071s:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-5050n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-5050n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-5050v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-5050v:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-5051_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-5051:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-5070n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-5070n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-5070v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-5070v:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-5071_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-5071:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-5071s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-5071s:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6050n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-6050n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6050v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-6050v:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6051_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-6051:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6070n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-6070n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6070n_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-6070n_a:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6070v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-6070v:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6070v_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-6070v_a:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6071_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-6071:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6071s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-6071s:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6580n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-6580n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-7081_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-7081:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-7090n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-7090n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-7580n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-7580n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-8081_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-8081:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-8090n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-8090n:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b355w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-b355w:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b355wt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-b355wt:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b355wz_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-b355wz:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b356w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-b356w:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b356wh_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-b356wh:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b376w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-b376w:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b376wh_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-b376wh:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b455w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-b455w:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b455wt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-b455wt:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b455wz_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-b455wz:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b456w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-b456w:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b456wh_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-b456wh:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b476w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-b476w:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b476wh_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-b476wh:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-c303_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-c303:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-c303w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-c303w:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-c303wh_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-c303wh:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-c304_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-c304:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-c304w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-c304w:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-c304wh_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-c304wh:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m1056_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m1056:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m1206_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m1206:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m2630_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m2630:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m2630_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m2630_a:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m2651_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m2651:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3050_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m3050:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3050_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m3050_a:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3051_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m3051:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3070_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m3070:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3070_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m3070_a:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3071_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m3071:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3071s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m3071s:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3550_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m3550:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3551_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m3551:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3570_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m3570:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3571_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m3571:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3571s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m3571s:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m4050_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m4050:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m4051_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m4051:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m4070_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m4070:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m4070_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m4070_a:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m4071_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m4071:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m4071s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m4071s:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m5050_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m5050:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m5051_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m5051:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m5070_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m5070:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m5071_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m5071:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m5071s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m5071s:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m6050_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m6050:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m6051_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m6051:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m6070_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m6070:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m6070_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m6070_a:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m6071_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m6071:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m6071s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m6071s:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m6570_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m6570:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m7570_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m7570:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m905_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:mx-m905:-:*:*:*:*:*:*:*" ]
null
9.1
null
null
CVE-2009-3459
Heap-based buffer overflow in Adobe Reader and Acrobat 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2 allows remote attackers to execute arbitrary code via a crafted PDF file that triggers memory corruption, as exploited in the wild in October 2009. NOTE: some of these details are obtained from third party information.
[ "cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:3.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:4.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:4.0.5a:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:4.0.5c:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:5.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:5.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:5.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:6.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:6.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:6.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:6.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:6.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:reader:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:reader:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:reader:4.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:reader:4.0.5a:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:reader:4.0.5c:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:reader:4.5:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:reader:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:reader:5.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:reader:5.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:reader:5.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:reader:5.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:reader:5.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:reader:5.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:reader:5.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:reader:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:reader:6.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:reader:6.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:reader:6.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:reader:6.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:reader:6.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:reader:7.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:reader:7.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:reader:7.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:reader:7.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:reader:7.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:reader:7.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:reader:7.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:reader:7.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:reader:7.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:reader:7.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:reader:8.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:reader:8.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:reader:8.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:reader:8.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:reader:9.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:reader:9.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:reader:9.1.2:*:*:*:*:*:*:*" ]
null
null
null
9.3
GHSA-xggx-fx6w-v7ch
Improper Neutralization of Wildcards or Matching Symbols
This affects Spring Data JPA in versions up to and including 2.1.6, 2.0.14 and 1.11.20. ExampleMatcher using ExampleMatcher.StringMatcher.STARTING, ExampleMatcher.StringMatcher.ENDING or ExampleMatcher.StringMatcher.CONTAINING could return more results than anticipated when a maliciously crafted example value is supplied.
[]
null
null
5.3
null
CVE-2001-0062
procfs in FreeBSD and possibly other operating systems allows local users to cause a denial of service by calling mmap on the process' own mem file, which causes the kernel to hang.
[ "cpe:2.3:o:freebsd:freebsd:3.5.1:*:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:4.1:*:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:4.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:4.2:*:*:*:*:*:*:*" ]
null
null
null
2.1
CVE-2020-15030
NeDi 1.9C is vulnerable to cross-site scripting (XSS) attack. The application allows an attacker to execute arbitrary JavaScript code via the Topology-Routes.php rtr parameter.
[ "cpe:2.3:a:nedi:nedi:1.9c:*:*:*:*:*:*:*" ]
null
5.4
null
3.5
RHSA-2020:5528
Red Hat Security Advisory: Red Hat Single Sign-On 7.4.4 security update on RHEL 8
keycloak: Account REST API can update user metadata attributes
[ "cpe:/a:redhat:red_hat_single_sign_on:7::el8" ]
null
4.2
null
null
GHSA-vc7v-xwv2-3v83
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound WP Frontend Submit allows Cross-Site Scripting (XSS). This issue affects WP Frontend Submit: from n/a through 1.1.0.
[]
null
7.1
null
null
GHSA-2p56-f9g8-8p2x
analyzer/protocol/dnp3/DNP3.cc in Bro before 2.3.2 does not reject certain non-zero values of a packet length, which allows remote attackers to cause a denial of service (buffer overflow or buffer over-read) via a crafted DNP3 packet.
[]
null
null
7.5
null
GHSA-355q-cc88-rh65
Heap-based buffer overflow in FutureSoft TFTP Server Multithreaded (MT) 1.1 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code by sending a crafted packet to port 69/UDP, which triggers the overflow when constructing an absolute path name. NOTE: Some details are obtained from third party information.
[]
null
null
null
null
CVE-2018-15776
iDRAC7, iDRAC8 - Improper Error Handling
Dell EMC iDRAC7/iDRAC8 versions prior to 2.61.60.60 contain an improper error handling vulnerability. An unauthenticated attacker with physical access to the system could potentially exploit this vulnerability to get access to the u-boot shell.
[ "cpe:2.3:o:dell:idrac7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:dell:idrac8_firmware:*:*:*:*:*:*:*:*" ]
null
null
6.4
null
CVE-2022-49225
mt76: mt7921s: fix a possible memory leak in mt7921_load_patch
In the Linux kernel, the following vulnerability has been resolved: mt76: mt7921s: fix a possible memory leak in mt7921_load_patch Always release fw data at the end of mt7921_load_patch routine.
[]
null
5.5
null
null
CVE-2020-12706
Multiple Cross-site scripting vulnerabilities in PHP-Fusion 9.03.50 allow remote attackers to inject arbitrary web script or HTML via the go parameter to faq/faq_admin.php or shoutbox_panel/shoutbox_admin.php
[ "cpe:2.3:a:php-fusion:php-fusion:9.03.50:*:*:*:*:*:*:*" ]
null
5.4
null
3.5
GHSA-wmmf-jh7w-h9g8
Missing Authorization vulnerability in a3rev Software WooCommerce Predictive Search allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WooCommerce Predictive Search: from n/a through 5.8.0.
[]
null
5.3
null
null
CVE-2008-4982
rkhunter in rkhunter 1.3.2 allows local users to overwrite arbitrary files via a symlink attack on the /tmp/rkhunter-debug temporary file. NOTE: this is probably a different vulnerability than CVE-2005-1270.
[ "cpe:2.3:a:john_horne:rkhunter:1.3.2:*:*:*:*:*:*:*" ]
null
null
null
6.9
CVE-2023-28792
WordPress Continuous Image Carousel With Lightbox Plugin <= 1.0.15 is vulnerable to Cross Site Scripting (XSS)
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in I Thirteen Web Solution Continuous Image Carousel With Lightbox plugin <= 1.0.15 versions.
[ "cpe:2.3:a:i13websolution:continuous_image_carosel_with_lightbox:*:*:*:*:*:wordpress:*:*" ]
null
7.1
null
null
CVE-2025-0797
MicroWorld eScan Antivirus Quarantine Microworld default permission
A vulnerability was found in MicroWorld eScan Antivirus 7.0.32 on Linux. It has been declared as problematic. This vulnerability affects unknown code of the file /var/Microworld/ of the component Quarantine Handler. The manipulation leads to incorrect default permissions. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
[]
4.8
3.3
3.3
1.7
CVE-2014-4938
SQL injection vulnerability in the WP Rss Poster (wp-rss-poster) plugin 1.0.0 for WordPress allows remote attackers to execute arbitrary SQL commands via the id parameter in the wrp-add-new page to wp-admin/admin.php.
[ "cpe:2.3:a:wp_rss_poster_plugin_project:wp-rss-poster:1.0.0:*:*:*:*:wordpress:*:*" ]
null
null
null
7.5
CVE-2023-52909
nfsd: fix handling of cached open files in nfsd4_open codepath
In the Linux kernel, the following vulnerability has been resolved: nfsd: fix handling of cached open files in nfsd4_open codepath Commit fb70bf124b05 ("NFSD: Instantiate a struct file when creating a regular NFSv4 file") added the ability to cache an open fd over a compound. There are a couple of problems with the way this currently works: It's racy, as a newly-created nfsd_file can end up with its PENDING bit cleared while the nf is hashed, and the nf_file pointer is still zeroed out. Other tasks can find it in this state and they expect to see a valid nf_file, and can oops if nf_file is NULL. Also, there is no guarantee that we'll end up creating a new nfsd_file if one is already in the hash. If an extant entry is in the hash with a valid nf_file, nfs4_get_vfs_file will clobber its nf_file pointer with the value of op_file and the old nf_file will leak. Fix both issues by making a new nfsd_file_acquirei_opened variant that takes an optional file pointer. If one is present when this is called, we'll take a new reference to it instead of trying to open the file. If the nfsd_file already has a valid nf_file, we'll just ignore the optional file and pass the nfsd_file back as-is. Also rework the tracepoints a bit to allow for an "opened" variant and don't try to avoid counting acquisitions in the case where we already have a cached open file.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.2:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.2:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.2:rc3:*:*:*:*:*:*" ]
null
4.7
null
null
GHSA-c8c6-r35g-cvjv
Rejected reason: DO NOT USE THIS CVE RECORD. Consult IDs: CVE-2024-6655. Reason: This record is a reservation duplicate of CVE-2024-6655. Notes: All CVE users should reference CVE-2024-6655 instead of this record. All references and descriptions in this record have been removed to prevent accidental usage.
[]
null
null
null
null