id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
139k
cpes
sequencelengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
GHSA-pp92-5cx8-mvc6
Cross-site scripting (XSS) vulnerability in index.php in Yet Another Bulletin Board (YaBB) 1.40 and 1.41 allows remote attackers to inject arbitrary web script or HTML via the password (passwrd) parameter.
[]
null
null
null
null
CVE-2021-27646
Use After Free vulnerability in iscsi_snapshot_comm_core in Synology DiskStation Manager (DSM) before 6.2.3-25426-3 allows remote attackers to execute arbitrary code via crafted web requests.
[ "cpe:2.3:a:synology:diskstation_manager:*:*:*:*:*:*:*:*" ]
null
9.8
null
null
CVE-2006-2689
Multiple cross-site scripting (XSS) vulnerabilities in EVA-Web 2.1.2 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) debut_image parameter in (a) article-album.php3, (2) date parameter in (b) rubrique.php3, and the (3) perso and (4) aide parameters to (c) an unknown script, probably index.php.
[ "cpe:2.3:a:eva-web:eva-web:*:*:*:*:*:*:*:*" ]
null
null
null
6.8
CVE-2011-2378
The appendChild function in Mozilla Firefox before 3.6.20, Thunderbird 3.x before 3.1.12, SeaMonkey 2.x, and possibly other products does not properly handle DOM objects, which allows remote attackers to execute arbitrary code via unspecified vectors that lead to dereferencing of a "dangling pointer."
[ "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0:preview_release:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5:beta1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5:beta2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.13:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.14:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.15:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.16:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.17:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.18:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.19:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.20:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.13:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.14:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.15:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.16:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.17:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.5.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.5.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.5.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.5.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.5.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.5.10:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.5.11:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.5.12:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.5.13:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.5.14:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.5.15:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.5.16:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.5.17:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.5.18:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.5.19:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.6.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.6.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.6.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.6.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.6.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.6.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.6.10:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.6.11:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.6.12:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.6.13:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.6.14:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.6.15:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.6.16:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.6.17:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.6.18:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:3.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:3.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:3.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:3.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:3.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:3.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:3.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:3.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:3.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:3.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:3.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:3.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:3.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:3.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:3.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:3.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:3.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:3.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:3.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:3.1.10:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:3.1.11:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0:alpha_1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0:alpha_2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0:alpha_3:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0:beta_1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0:beta_2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0.13:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0.14:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.1:alpha1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.1:alpha2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.1:alpha3:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.1:beta1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.1:beta2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.1:beta3:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.1:rc1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.1:rc2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.2:beta1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.2:beta2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.2:beta3:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.3:beta1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.3:beta2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.3:beta3:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.4:beta1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.4:beta2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.4:beta3:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.5:beta1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.5:beta2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.5:beta3:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.5:beta4:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.6:beta1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.6:beta2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.6:beta3:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.6:beta4:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.7:beta1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.7:beta2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.7:beta3:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.7:beta4:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.7:beta5:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.7.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.8:beta1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.8:beta2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.8:beta3:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.8:beta4:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.8:beta5:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.8:beta6:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.9:beta1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.9:beta2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.9:beta3:*:*:*:*:*:*" ]
null
null
null
10
CVE-2024-3668
PowerPack Pro for Elementor <= 2.10.17 - Authenticated (Contributor+) Privilege Escalation
The PowerPack Pro for Elementor plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 2.10.17. This is due to the plugin not restricting low privileged users from setting a default role for a registration form. This makes it possible for authenticated attackers, with contributor-level access and above, to create a registration form with administrator set as the default role and then register as an administrator.
[ "cpe:2.3:a:ideabox:powerpack_addons_for_elementor:*:*:*:*:*:wordpress:*:*" ]
null
8.8
null
null
CVE-2020-16277
An SQL injection vulnerability in the Analytics component of SAINT Security Suite 8.0 through 9.8.20 allows a remote, authenticated attacker to gain unauthorized access to the database.
[ "cpe:2.3:a:carson-saint:saint_security_suite:*:*:*:*:*:*:*:*" ]
null
8.8
null
6.5
CVE-2018-1000645
LibreHealthIO lh-ehr version <REL-2.0.0 contains an Authenticated Local File Disclosure vulnerability in Importing of templates allows local file disclosure that can result in Disclosure of sensitive files on the server. This attack appear to be exploitable via User controlled variable in import templates function.
[ "cpe:2.3:a:librehealth:librehealth_ehr:*:*:*:*:*:*:*:*" ]
null
null
6.5
4
GHSA-3h3m-gv2v-f7qm
In the Android kernel in the mnh driver there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with System privileges required. User interaction is not needed for exploitation.
[]
null
null
null
null
GHSA-rf23-4mjm-jm7q
A flaw was found in the Red Hat 3scale API Management Platform, where member permissions for an API's admin portal were not properly enforced. This flaw allows an authenticated user to bypass normal account restrictions and access API services where they do not have permission.
[]
null
6.3
null
null
CVE-2005-4723
D-Link DI-524 Wireless Router, DI-624 Wireless Router, and DI-784 allow remote attackers to cause a denial of service (device reboot) via a series of crafted fragmented UDP packets, possibly involving a missing fragment.
[ "cpe:2.3:h:d-link:di-524:3.20:*:*:*:*:*:*:*", "cpe:2.3:h:d-link:di-784:*:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:di-524:*:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:di-624:*:*:*:*:*:*:*:*" ]
null
null
null
5
CVE-2023-7029
The WordPress Button Plugin MaxButtons plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcode(s) in all versions up to, and including 9.7.6 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. NOTE: This vulnerability was partially fixed in version 9.7.6.
[ "cpe:2.3:a:maxfoundry:maxbuttons:*:*:*:*:*:wordpress:*:*" ]
null
6.4
null
null
GHSA-52h8-fmg8-32xq
BKBCopyD.exe in the Batch Management Packages in Yokogawa CENTUM CS 3000 through R3.09.50 and CENTUM VP through R4.03.00 and R5.x through R5.04.00, and Exaopc through R3.72.10, does not require authentication, which allows remote attackers to read arbitrary files via a RETR operation, write to arbitrary files via a STOR operation, or obtain sensitive database-location information via a PMODE operation, a different vulnerability than CVE-2014-0784.
[]
null
null
null
null
CVE-2023-35951
Multiple stack-based buffer overflow vulnerabilities exist in the readOFF.cpp functionality of libigl v2.4.0. A specially-crafted .off file can lead to a buffer overflow. An attacker can arbitrary code execution to trigger these vulnerabilities.This vulnerability exists within the code responsible for parsing geometric vertices of an OFF file.
[ "cpe:2.3:a:libigl:libigl:2.4.0:*:*:*:*:*:*:*" ]
null
7.8
null
null
CVE-2025-25143
WordPress GlobalQuran Plugin <= 1.0 - CSRF to Settings Change vulnerability
Cross-Site Request Forgery (CSRF) vulnerability in ibasit GlobalQuran allows Cross Site Request Forgery. This issue affects GlobalQuran: from n/a through 1.0.
[]
null
4.3
null
null
CVE-2021-31617
In ASQ in Stormshield Network Security (SNS) 1.0.0 through 2.7.8, 2.8.0 through 2.16.0, 3.0.0 through 3.7.20, 3.8.0 through 3.11.8, and 4.0.1 through 4.2.2, mishandling of memory management can lead to remote code execution.
[ "cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
CVE-2025-1204
The "update" binary in the firmware of the affected product sends attempts to mount to a hard-coded, routable IP address, bypassing existing device network settings to do so. The function triggers if the 'C' button is pressed at a specific time during the boot process. If an attacker is able to control or impersonate this IP address, they could upload and overwrite files on the device.
[]
7.7
null
null
null
CVE-2020-1647
Junos OS: SRX Series: Double free vulnerability can lead to DoS or remote code execution due to the processing of a specific HTTP message when ICAP redirect service is enabled
On Juniper Networks SRX Series with ICAP (Internet Content Adaptation Protocol) redirect service enabled, a double free vulnerability can lead to a Denial of Service (DoS) or Remote Code Execution (RCE) due to processing of a specific HTTP message. Continued processing of this specific HTTP message may result in an extended Denial of Service (DoS). The offending HTTP message that causes this issue may originate both from the HTTP server or the client. This issue affects Juniper Networks Junos OS on SRX Series: 18.1 versions prior to 18.1R3-S9; 18.2 versions prior to 18.2R3-S3; 18.3 versions prior to 18.3R2-S4, 18.3R3-S1; 18.4 versions prior to 18.4R2-S5, 18.4R3; 19.1 versions prior to 19.1R2; 19.2 versions prior to 19.2R1-S2, 19.2R2; 19.3 versions prior to 19.3R2. This issue does not affect Juniper Networks Junos OS prior to 18.1R1.
[ "cpe:2.3:o:juniper:junos:18.1:-:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.1:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.1:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.1:r2-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.1:r2-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.1:r2-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.1:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.1:r3-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.1:r3-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.1:r3-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.1:r3-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.1:r3-s6:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.1:r3-s7:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.1:r3-s8:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.2:-:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.2:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.2:r1:-:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.2:r1-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.2:r1-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.2:r1-s5:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.2:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.2:r2-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.2:r2-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.2:r2-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.2:r2-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.2:r2-s5:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.2:r2-s6:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.2:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.2:r3-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.2:r3-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.3:-:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.3:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.3:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.3:r1-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.3:r1-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.3:r1-s5:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.3:r1-s6:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.3:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.3:r2-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.3:r2-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.3:r2-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.3:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:-:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:r1-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:r1-s5:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:r1-s6:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:r2-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:r2-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:r2-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:r2-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.1:-:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.1:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.1:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.1:r1-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.1:r1-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.1:r1-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.2:-:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.2:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.2:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.3:-:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.3:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.3:r1-s1:*:*:*:*:*:*" ]
null
9.8
null
null
CVE-2008-1764
Unspecified vulnerability in Opera before 9.27 has unknown impact and attack vectors related to "keyboard handling of password inputs."
[ "cpe:2.3:a:opera:opera:*:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera:5..10:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera:5.0:beta_2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera:5.0:beta_3:*:*:*:*:*:*", "cpe:2.3:a:opera:opera:5.0:beta_4:*:*:*:*:*:*", "cpe:2.3:a:opera:opera:5.0:beta_5:*:*:*:*:*:*", "cpe:2.3:a:opera:opera:5.0:beta_6:*:*:*:*:*:*", "cpe:2.3:a:opera:opera:5.0:beta_7:*:*:*:*:*:*", "cpe:2.3:a:opera:opera:5.0:beta_8:*:*:*:*:*:*", "cpe:2.3:a:opera:opera:5.1:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera:5.02:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera:5.2:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera:5.3:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera:5.4:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera:5.5:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera:5.6:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera:5.7:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera:5.8:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera:5.9:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera:5.10:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera:5.11:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera:5.12:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera:6:beta_1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera:6.0:beta_1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera:6.0:beta_2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera:6.0:beta_3:*:*:*:*:*:*", "cpe:2.3:a:opera:opera:6.1:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera:6.01:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera:6.02:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera:6.03:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera:6.04:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera:6.05:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera:6.06:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera:6.11:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera:6.12:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera:7:beta_1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera:7:beta_1.2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera:7.0:beta_1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera:7.0:beta_1v2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera:7.0:beta_2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera:7.01:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera:7.02:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera:7.03:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera:7.10:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera:7.11:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera:7.20:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera:7.20:beta7:*:*:*:*:*:*", "cpe:2.3:a:opera:opera:7.21:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera:7.22:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera:7.23:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera:7.30:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera:7.50:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera:7.50:beta_1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera:7.51:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera:7.52:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera:7.53:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera:7.54:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera:7.54:update_1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera:7.54:update_2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera:7.55:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera:8.0:beta_1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera:8.0:beta_2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera:8.0:beta_3:*:*:*:*:*:*", "cpe:2.3:a:opera:opera:8.01:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera:8.02:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera:8.50:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera:8.51:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera:8.52:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera:8.53:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera:8.54:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera:9.0:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera:9.0:beta_1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera:9.0:beta_2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera:9.01:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera:9.1tp:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera:9.02:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera:9.6:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera:9.10:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera:9.20:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera:9.20:beta_1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera:9.21:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera:9.22:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera:9.23:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera:9.24:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera:9.25:*:*:*:*:*:*:*" ]
null
null
null
9.3
CVE-2017-14749
JerryScript 1.0 allows remote attackers to cause a denial of service (jmem_heap_alloc_block_internal heap memory corruption) or possibly execute arbitrary code via a crafted .js file, because unrecognized \ characters cause incorrect 0x00 characters in bytecode.literal data.
[ "cpe:2.3:a:jerryscript:jerryscript:1.0:*:*:*:*:*:*:*" ]
null
null
7.8
6.8
GHSA-cmxj-wx9v-52qr
Improper Validation of Certificate with Host Mismatch in Not Yet Commons SSL
Certificates.java in Not Yet Commons SSL before 0.3.15 does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
[]
null
null
null
null
GHSA-vrrp-56vv-xwg7
A vulnerability in the Link Layer Discovery Protocol (LLDP) subsystem of Cisco Nexus 9000 Series Application Centric Infrastructure (ACI) Mode Switch Software could allow an adjacent, unauthenticated attacker to cause a denial of service (DoS) condition or execute arbitrary code with root privileges. The vulnerability is due to improper input validation of certain type, length, value (TLV) fields of the LLDP frame header. An attacker could exploit this vulnerability by sending a crafted LLDP packet to the targeted device. A successful exploit may lead to a buffer overflow condition that could either cause a DoS condition or allow the attacker to execute arbitrary code with root privileges. Note: This vulnerability cannot be exploited by transit traffic through the device; the crafted packet must be targeted to a directly connected interface. This vulnerability affects Cisco Nexus 9000 Series Fabric Switches in ACI mode if they are running a Cisco Nexus 9000 Series ACI Mode Switch Software release prior to 13.2(7f) or any 14.x release.
[]
null
8.8
null
null
GHSA-7vm7-m762-pgv3
Windows Mobile Device Management Elevation of Privilege Vulnerability
[]
null
7.8
null
null
CVE-2021-31484
This vulnerability allows remote attackers to execute arbitrary code on affected installations of OpenText Brava! Desktop 16.6.3.84. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of DWF files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-12710.
[ "cpe:2.3:a:opentext:brava\\!_desktop:16.6.3.84:*:*:*:*:*:*:*" ]
null
null
7.8
null
GHSA-8pm5-cfgj-6r8f
IonizeCMS v1.0.8.1 was discovered to contain a SQL injection vulnerability via the id_page parameter in application/models/article_model.php.
[]
null
9.8
null
null
GHSA-95pq-v592-p42v
atop: symlink attack possible due to insecure tempfile handling
[]
null
null
null
null
CVE-2017-18835
Certain NETGEAR devices are affected by reflected XSS. This affects M4300-28G before 12.0.2.15, M4300-52G before 12.0.2.15, M4300-28G-POE+ before 12.0.2.15, M4300-52G-POE+ before 12.0.2.15, M4300-8X8F before 12.0.2.15, M4300-12X12F before 12.0.2.15, M4300-24X24F before 12.0.2.15, M4300-24X before 12.0.2.15, M4300-48X before 12.0.2.15, and M4200 before 12.0.2.15.
[ "cpe:2.3:o:netgear:m4300-28g_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:m4300-28g:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:m4300-52g_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:m4300-52g:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:m4300-28g-poe\\+_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:m4300-28g-poe\\+:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:m4300-52g-poe\\+_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:m4300-52g-poe\\+:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:m4300-8x8f_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:m4300-8x8f:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:m4300-12x12f_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:m4300-12x12f:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:m4300-24x24f_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:m4300-24x24f:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:m4300-24x_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:m4300-24x:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:m4300-48x_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:m4300-48x:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:m4200_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:m4200:-:*:*:*:*:*:*:*" ]
null
null
6.1
null
GHSA-g8w7-grwr-hp6m
The Microsoft Office file parser in Comodo Antivirus 7425 and Sophos Anti-Virus 4.61.0 allows remote attackers to bypass malware detection via an Office file with a ustar character sequence at a certain location. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different Office parser implementations.
[]
null
null
null
null
RHSA-2020:2069
Red Hat Security Advisory: libreswan security update
libreswan: DoS attack via malicious IKEv1 informational exchange message
[ "cpe:/a:redhat:rhel_e4s:8.0::appstream" ]
null
7.5
null
null
CVE-2002-0711
Unknown vulnerability in Cluster Interconnect for HP TruCluster Server 5.0A, 5.1, and 5.1A may allow local and remote attackers to cause a denial of service.
[ "cpe:2.3:h:hp:trucluster_server:5.0a:*:*:*:*:*:*:*", "cpe:2.3:h:hp:trucluster_server:5.1:*:*:*:*:*:*:*", "cpe:2.3:h:hp:trucluster_server:5.1a:*:*:*:*:*:*:*" ]
null
null
null
5
GHSA-4hj6-hvcv-72r5
Windows Mobile 6 on the HTC Hermes device makes WLAN passwords available to an auto-completion mechanism for the password input field, which allows physically proximate attackers to bypass password authentication and obtain WLAN access.
[]
null
null
null
null
GHSA-pfc2-9qhm-x6x5
The Telnet service in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 Gold and SP2 allows remote Telnet servers to execute arbitrary code on a client machine by replaying the NTLM credentials of a client user, aka "Telnet Credential Reflection Vulnerability," a related issue to CVE-2000-0834.
[]
null
null
null
null
CVE-2017-6654
A vulnerability in the web-based management interface of Cisco Unified Communications Manager 10.5 through 11.5 could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or allow the attacker to access sensitive browser-based information. Cisco Bug IDs: CSCvc06608.
[ "cpe:2.3:a:cisco:unified_communications_manager:10.5\\(2.10000.5\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:11.0\\(1.10000.10\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:11.5\\(1.10000.6\\):*:*:*:*:*:*:*" ]
null
null
6.1
4.3
CVE-2019-14932
The Recruitment module in Humanica Humatrix 7 1.0.0.681 and 1.0.0.203 allows remote attackers to access all candidates' information on the website via a modified selApp variable to personalData/resumeDetail.cfm. This includes personal information and other sensitive data.
[ "cpe:2.3:a:humanica:humatrix_7:1.0.0.203:*:*:*:*:*:*:*", "cpe:2.3:a:humanica:humatrix_7:1.0.0.681:*:*:*:*:*:*:*" ]
null
null
7.5
5
GHSA-29r2-4vgj-7729
An issue discovered in Telesquare TLR-2005Ksh 1.0.0 and 1.1.4 allows attackers to run arbitrary system commands via the Cmd parameter.
[]
null
8.8
null
null
CVE-2008-5399
Cross-site scripting (XSS) vulnerability in the listonlineusers (aka "Who's online") component in mvnForum before 1.2.1 GA allows remote attackers to inject arbitrary web script or HTML via unspecified parameters.
[ "cpe:2.3:a:mvnforum:mvnforum:*:ga:*:*:*:*:*:*", "cpe:2.3:a:mvnforum:mvnforum:1.0.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:mvnforum:mvnforum:1.0.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:mvnforum:mvnforum:1.0.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:mvnforum:mvnforum:1.0.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:mvnforum:mvnforum:1.0.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:mvnforum:mvnforum:1.0.0:rc3_01:*:*:*:*:*:*", "cpe:2.3:a:mvnforum:mvnforum:1.0.0:rc4:*:*:*:*:*:*", "cpe:2.3:a:mvnforum:mvnforum:1.0.2.:ga:*:*:*:*:*:*", "cpe:2.3:a:mvnforum:mvnforum:1.1:ga:*:*:*:*:*:*" ]
null
null
null
4.3
GHSA-m2fg-q836-9pmq
SpamAssassin 3.0.4 allows attackers to bypass spam detection via an e-mail with a large number of recipients ("To" addresses), which triggers a bus error in Perl.
[]
null
null
null
null
RHSA-2009:1671
Red Hat Security Advisory: kernel security and bug fix update
kernel: x86_64 32 bit process register leak kernel: flood ping cause out-of-iommu error and panic when mtu larger than 1500 kernel: r128 IOCTL NULL pointer dereferences when CCE state is uninitialised kernel: AF_UNIX: Fix deadlock on connecting to shutdown socket
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
CVE-2007-3935
PHP remote file inclusion vulnerability in link_main.php in the SupaNav 1.0.0 module for phpBB allows remote attackers to execute arbitrary PHP code via a URL in the phpbb_root_path parameter.
[ "cpe:2.3:a:phpbb:supanav:1.0.0:*:*:*:*:*:*:*" ]
null
null
null
9.3
RHBA-2017:2642
Red Hat Bug Fix Advisory: OpenShift Container Platform 3.6.1 bug fix and enhancement update
jenkins-plugin-subversion: CSRF vulnerability and insufficient permission checks allow capturing credentials (SECURITY-303) jenkins-plugin-pipeline-build-step: Missing check of Item/Build permission (SECURITY-433) jenkins-plugin-git: CSRF vulnerability allows capturing credentials (SECURITY-528) jenkins-plugin-workflow-cps: Arbitrary code execution due to incomplete sandbox protection (SECURITY-551)
[ "cpe:/a:redhat:openshift:3.6::el7" ]
null
null
8.8
null
CVE-2015-3376
Cross-site scripting (XSS) vulnerability in the Quizzler module before 7-x.1.16 for Drupal allows remote authenticated users to inject arbitrary web script or HTML via a node title.
[ "cpe:2.3:a:quizzler_project:quizzler:*:*:*:*:*:drupal:*:*" ]
null
null
null
3.5
CVE-2016-7650
An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. The issue involves the "Safari Reader" component, which allows remote attackers to conduct UXSS attacks via a crafted web site.
[ "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*" ]
null
null
4.7
2.6
CVE-2016-4165
The extension manager in Adobe Brackets before 1.7 allows attackers to have an unspecified impact via invalid input.
[ "cpe:2.3:a:adobe:brackets:*:*:*:*:*:*:*:*" ]
null
null
9.8
10
GHSA-vj9c-27hg-w432
In the Linux kernel, the following vulnerability has been resolved:clk: mediatek: mt7622-apmixedsys: Fix an error handling path in clk_mt8135_apmixed_probe()'clk_data' is allocated with mtk_devm_alloc_clk_data(). So calling mtk_free_clk_data() explicitly in the remove function would lead to a double-free.Remove the redundant call.
[]
null
7.8
null
null
CVE-2018-5061
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
[ "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
null
6.5
4.3
GHSA-f3jj-p7rf-6j7f
H3C H200 H200V100R004 was discovered to contain a stack overflow via the function Asp_SetTimingtimeWifiAndLed.
[]
null
9.8
null
null
GHSA-969p-h3hv-f229
Multiple SQL injection vulnerabilities in download.php in Olate Download (od) 3.4.2 allow remote attackers to execute arbitrary SQL commands via the (1) HTTP_REFERER or (2) HTTP_USER_AGENT HTTP header.
[]
null
null
null
null
GHSA-frv6-mjpx-v245
The AAC SDK in RealNetworks RealPlayer before 15.0.6.14, RealPlayer SP 1.0 through 1.1.5, and Mac RealPlayer before 12.0.1.1750 allows remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a crafted AAC file that is not properly handled during decoding.
[]
null
null
null
null
CVE-2014-2088
Unrestricted file upload vulnerability in ilias.php in ILIAS 4.4.1 allows remote authenticated users to execute arbitrary PHP code by using a .php filename in an upload_files action to the uploadFiles command, and then accessing the .php file via a direct request to a certain client_id pathname.
[ "cpe:2.3:a:ilias:ilias:4.4.1:*:*:*:*:*:*:*" ]
null
null
null
6.5
GHSA-6pxh-2557-5cj5
Magento Open Source Path Traversal vulnerability
Magento Open Source versions 2.4.7-p1, 2.4.6-p6, 2.4.5-p8, 2.4.4-p9 and earlier are affected by an Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability that could lead to arbitrary file system read. An attacker could exploit this vulnerability to gain access to files and directories that are outside the restricted directory. Exploitation of this issue does not require user interaction and scope is changed.
[]
6.1
6.8
null
null
CVE-2006-5513
SQL injection vulnerability in GeoNetwork opensource before 2.0.3 allows remote attackers to execute arbitrary SQL commands, and complete a login, via unspecified vectors.
[ "cpe:2.3:a:geonetwork:opensource:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-xvw3-v5p5-pf8m
A vulnerability has been identified in POWER METER SICAM Q100 (All versions < V2.50), POWER METER SICAM Q100 (All versions < V2.50). Affected devices do not properly validate the RecordType-parameter in requests to the web interface on port 443/tcp. This could allow an authenticated remote attacker to crash the device (followed by an automatic reboot) or to execute arbitrary code on the device.
[]
null
8.8
null
null
GHSA-8rp6-x3r7-5qw3
SaltStack Salt is vulnerable to shell injection via ProxyCommand argument
An issue was discovered in SaltStack Salt before 3002.5. The salt-api's ssh client is vulnerable to a shell injection by including ProxyCommand in an argument, or via ssh_options provided in an API request.
[]
null
9.8
null
null
CVE-2008-2509
SQL injection vulnerability in pwd.asp in Excuse Online allows remote attackers to execute arbitrary SQL commands via the pID parameter.
[ "cpe:2.3:a:excuse_online:excuse_online:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
RHSA-2021:3873
Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.2.9 security, bug, and container updates
semver-regex: inefficient regular expression complexity nginx: Off-by-one in ngx_resolver_copy() when labels are followed by a pointer to a root domain name object-path: Type confusion vulnerability can lead to a bypass of CVE-2020-15256 nodejs-set-value: type confusion allows bypass of CVE-2019-10747 redis: Lua scripts can overflow the heap-based Lua stack redis: Integer overflow issue with Streams redis: Integer overflow bug in the ziplist data structure redis: Out of bounds read in lua debugger protocol parser redis: Denial of service via Redis Standard Protocol (RESP) request redis: Integer overflow issue with intsets redis: Integer overflow issue with strings
[ "cpe:/a:redhat:acm:2.2::el7", "cpe:/a:redhat:acm:2.2::el8" ]
null
7.5
null
null
CVE-2021-24795
Filter Portfolio Gallery <= 1.5 - Arbitrary Gallery Deletion via CSRF
The Filter Portfolio Gallery WordPress plugin through 1.5 is lacking Cross-Site Request Forgery (CSRF) check when deleting a Gallery, which could allow attackers to make a logged in admin delete arbitrary Gallery.
[ "cpe:2.3:a:phoeniixx:filter_portfolio_gallery:*:*:*:*:*:wordpress:*:*" ]
null
6.5
null
4.3
CVE-2024-8590
Autodesk AutoCAD 3DM File Parsing Use-After-Free Code Execution Vulnerability
A maliciously crafted 3DM file when parsed in atf_api.dll through Autodesk AutoCAD can force a Use-After-Free vulnerability. A malicious actor can leverage this vulnerability to cause a crash, write sensitive data, or execute arbitrary code in the context of the current process.
[ "cpe:2.3:a:autodesk:autocad:*:*:*:*:*:*:*:*", "cpe:2.3:a:autodesk:autocad_advance_steel:*:*:*:*:*:*:*:*", "cpe:2.3:a:autodesk:autocad_architecture:*:*:*:*:*:*:*:*", "cpe:2.3:a:autodesk:autocad_civil_3d:*:*:*:*:*:*:*:*", "cpe:2.3:a:autodesk:autocad_electrical:*:*:*:*:*:*:*:*", "cpe:2.3:a:autodesk:autocad_mechanical:*:*:*:*:*:*:*:*", "cpe:2.3:a:autodesk:autocad_mep:*:*:*:*:*:*:*:*", "cpe:2.3:a:autodesk:autocad_plant_3d:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
7.8
null
null
CVE-2022-33713
Implicit Intent hijacking vulnerability in Samsung Cloud prior to version 5.2.0 allows attacker to get sensitive information.
[ "cpe:2.3:a:samsung:cloud:*:*:*:*:*:*:*:*" ]
null
7.5
null
5
CVE-2018-9519
In easelcomm_hw_build_scatterlist, there is a possible out of bounds write due to a race condition. This could lead to local escalation of privilege with System privileges required. User interaction is not needed for exploitation. Product: Android. Versions: Android kernel. Android ID: A-69808833.
[ "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*" ]
null
null
6.4
6.9
GHSA-ff7w-pqjq-vf8m
ASUSTOR Data Master 3.1.5 and below allows authenticated remote non-administrative users to read any file on a share by providing the full path. For example, /home/admin/.ash_history.
[]
null
null
6.5
null
RHSA-2002:289
Red Hat Security Advisory: mysql security update
security flaw security flaw security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw" ]
null
null
null
null
CVE-2014-4407
IOKit in Apple iOS before 8 and Apple TV before 7 does not properly initialize kernel memory, which allows attackers to obtain sensitive memory-content information via an application that makes crafted IOKit function calls.
[ "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:tvos:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:tvos:6.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:tvos:6.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:tvos:6.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:tvos:6.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:tvos:6.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:7.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:7.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:7.0.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:7.0.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:7.0.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:7.0.6:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:7.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:7.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*" ]
null
null
3.3
4.3
GHSA-jf5q-85p7-vjm3
Cerebrate 1.12 does not properly consider organisation_id during creation of API keys.
[]
null
9.1
null
null
CVE-2021-36964
Windows Event Tracing Elevation of Privilege Vulnerability
Windows Event Tracing Elevation of Privilege Vulnerability
[ "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:-:*:-:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:-:*:-:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:-:r2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2183:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2183:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2183:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2183:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1801:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1801:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1809:10.0.18363.1801:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1237:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1237:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1237:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.230:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1809:10.0.19041.1237:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2004:10.0.19041.1237:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_20h2:10.0.19042.1237:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_20h2:10.0.19042.1237:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_server_20h2:10.0.19042.1237:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19060:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19060:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.4651:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.4651:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.4651:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:6.1.7601.25712:sp1:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_7:6.1.7601.25712:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20120:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20120:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_rt_8.1:6.3.9600.20120:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21218:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21218:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_server_2008_r2:6.1.7601.25712:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23462:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012_r2:6.3.9600.20120:*:*:*:*:*:x64:*" ]
null
7.8
null
null
GHSA-fxjp-p9mj-r6h8
A vulnerability, which was classified as critical, was found in code-projects Simple Admin Panel 1.0. Affected is an unknown function of the file addVariationController.php. The manipulation of the argument qty leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
[]
5.3
6.3
null
null
GHSA-hgc7-5rw6-5h4m
NETGEAR Prosafe WC9500 5.1.0.17, WC7600 5.1.0.17, and WC7520 2.5.0.35 devices allow a remote attacker to execute code with root privileges via shell metacharacters in the reqMethod parameter to login_handler.php.
[]
null
null
null
null
CVE-2022-20353
In onSaveRingtone of DefaultRingtonePreference.java, there is a possible inappropriate file read due to improper input validation. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-221041256
[ "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*" ]
null
5.5
null
null
CVE-2024-38002
The workflow component in Liferay Portal 7.3.2 through 7.4.3.111, and Liferay DXP 2023.Q4.0 through 2023.Q4.5, 2023.Q3.1 through 2023.Q3.8, 7.4 GA through update 92 and 7.3 GA through update 36 does not properly check user permissions before updating a workflow definition, which allows remote authenticated users to modify workflow definitions and execute arbitrary code (RCE) via the headless API.
[ "cpe:2.3:a:liferay:portal:*:*:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:*:*:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:*:*:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.3:-:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_1:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_2:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.3:service_pack_1:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.3:service_pack_3:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.3:update10:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.3:update11:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.3:update12:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.3:update13:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.3:update14:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.3:update15:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.3:update16:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.3:update17:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.3:update18:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.3:update19:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.3:update20:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.3:update21:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.3:update22:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.3:update23:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.3:update24:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.3:update25:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.3:update26:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.3:update27:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.3:update28:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.3:update29:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.3:update30:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.3:update31:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.3:update32:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.3:update33:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.3:update34:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.3:update35:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.3:update36:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.3:update4:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.3:update5:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.3:update6:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.3:update7:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.3:update8:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.3:update9:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.4:-:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.4:update1:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.4:update10:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.4:update11:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.4:update12:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.4:update13:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.4:update14:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.4:update15:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.4:update16:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.4:update17:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.4:update18:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.4:update19:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.4:update2:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.4:update20:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.4:update21:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.4:update22:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.4:update23:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.4:update24:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.4:update25:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.4:update26:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.4:update27:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.4:update28:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.4:update29:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.4:update3:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.4:update30:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.4:update31:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.4:update32:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.4:update33:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.4:update34:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.4:update35:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.4:update36:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.4:update37:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.4:update38:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.4:update39:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.4:update4:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.4:update40:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.4:update41:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.4:update42:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.4:update43:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.4:update44:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.4:update45:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.4:update46:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.4:update47:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.4:update48:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.4:update49:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.4:update5:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.4:update50:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.4:update51:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.4:update52:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.4:update53:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.4:update54:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.4:update55:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.4:update56:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.4:update57:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.4:update58:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.4:update59:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.4:update6:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.4:update60:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.4:update61:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.4:update62:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.4:update63:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.4:update64:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.4:update65:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.4:update66:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.4:update67:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.4:update68:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.4:update69:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.4:update7:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.4:update70:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.4:update71:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.4:update72:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.4:update73:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.4:update74:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.4:update75:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.4:update76:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.4:update77:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.4:update78:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.4:update79:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.4:update8:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.4:update80:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.4:update81:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.4:update82:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.4:update83:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.4:update84:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.4:update85:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.4:update86:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.4:update87:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.4:update88:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.4:update89:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.4:update9:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.4:update90:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.4:update91:*:*:*:*:*:*", "cpe:2.3:a:liferay:digital_experience_platform:7.4:update92:*:*:*:*:*:*", "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*" ]
null
9
null
null
CVE-2008-3003
Microsoft Office Excel 2007 Gold and SP1 does not properly delete the PWD (password) string from connections.xml when a .xlsx file is configured not to save the remote data session password, which allows local users to obtain sensitive information and obtain access to a remote data source, aka the "Excel Credential Caching Vulnerability."
[ "cpe:2.3:a:microsoft:office:2007:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2007:*:gold:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2007:sp1:*:*:*:*:*:*" ]
null
null
null
6.6
CVE-2023-6987
String Locator <= 2.6.5 - Reflected Cross-Site Scripting
The String locator plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'sql-column' parameter in all versions up to, and including, 2.6.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. This required WP_DEBUG to be enabled in order to be exploited.
[ "cpe:2.3:a:instawp:string_locator:*:*:*:*:*:wordpress:*:*" ]
null
6.1
null
null
GHSA-7rmc-hrm5-375w
The Booster for WooCommerce WordPress plugin before 5.4.9 does not sanitise and escape the wcj_notice parameter before outputting it back in the admin dashboard when the Pdf Invoicing module is enabled, leading to a Reflected Cross-Site Scripting
[]
null
null
null
null
RHSA-2024:2097
Red Hat Security Advisory: container-tools:4.0 security update
buildah: full container escape at build time
[ "cpe:/a:redhat:rhel_eus:8.6::appstream" ]
null
8.6
null
null
CVE-2007-5938
The iwl_set_rate function in compatible/iwl3945-base.c in iwlwifi 1.1.21 and earlier dereferences an iwl_get_hw_mode return value without checking for NULL, which might allow remote attackers to cause a denial of service (kernel panic) via unspecified vectors during module initialization.
[ "cpe:2.3:h:intel:pro_wireless_3945abg:1.1.21:*:*:*:*:*:*:*", "cpe:2.3:h:intel:wireless_wifi_link_4965agn:1.1.21:*:*:*:*:*:*:*" ]
null
null
null
5
CVE-2016-0837
MPEG4Extractor.cpp in libstagefright in mediaserver in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-04-01 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read and memory corruption) via a crafted media file, aka internal bug 27208621.
[ "cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.2:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.3:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.3.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.4:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.4.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.4.2:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.4.3:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:5.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:5.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*" ]
null
null
9.8
10
GHSA-rgg2-xp4r-28h4
X File Explorer (aka xfe) might allow local users to bypass intended access restrictions and gain access to arbitrary files by leveraging failure to use directory masks when creating files on Samba and NFS shares.
[]
null
null
5.5
null
GHSA-hvp5-xq7g-8w42
In CloudForms Management Engine (cfme) before 5.7.3 and 5.8.x before 5.8.1, it was found that privilege check is missing when invoking arbitrary methods via filtering on VMs that MiqExpression will execute that is triggerable by API users. An attacker could use this to execute actions they should not be allowed to (e.g. destroying VMs).
[]
null
null
8.8
null
CVE-2019-16909
An issue was discovered in the Infosysta "In-App & Desktop Notifications" app before 1.6.14_J8 for Jira. It is possible to obtain a list of all Jira projects (with authentication as a Jira user, but without authorization for specific projects) via the plugins/servlet/nfj/NotificationSettings URI.
[ "cpe:2.3:a:infosysta:in-app_\\&_desktop_notifications:*:*:*:*:*:jira:*:*" ]
null
4.3
null
4
GHSA-c2xw-mj3m-66cw
A vulnerability classified as critical has been found in Hospital Management Center. Affected is an unknown function of the file patient-info.php. The manipulation of the argument pt_id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-213786 is the identifier assigned to this vulnerability.
[]
null
9.8
null
null
CVE-2009-3448
npvmgr.exe in BakBone NetVault Backup 8.22 Build 29 allows remote attackers to cause a denial of service (daemon crash) via a packet to (1) TCP or (2) UDP port 20031 with a large value in an unspecified size field, which is not properly handled in a malloc operation. NOTE: some of these details are obtained from third party information.
[ "cpe:2.3:a:bakbone:netvault:8.22:*:*:*:*:*:*:*" ]
null
null
null
5
CVE-2024-49523
Adobe Experience Manager | Cross-site Scripting (Stored XSS) (CWE-79)
Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
[ "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*", "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*" ]
null
5.4
null
null
CVE-2012-1827
The web service in AutoFORM PDM Archive before 7.1 does not have authorization requirements, which allows remote authenticated users to perform database operations via a SOAP request, as demonstrated by the initializeQueryDatabase2 request.
[ "cpe:2.3:a:efstechnology:autoform_pdm_archive:*:*:*:*:*:*:*:*", "cpe:2.3:a:efstechnology:autoform_pdm_archive:6.920:*:*:*:*:*:*:*" ]
null
null
null
6.5
CVE-2024-36023
Julia Lawall reported this null pointer dereference, this should fix it.
In the Linux kernel, the following vulnerability has been resolved: Julia Lawall reported this null pointer dereference, this should fix it.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
null
5.5
null
null
RHSA-2024:5102
Red Hat Security Advisory: kernel-rt security update
kernel: tracing: Restructure trace_clock_global() to never block kernel: net: ieee802154: fix null deref in parse dev addr kernel: isdn: mISDN: netjet: Fix crash in nj_probe kernel: tcp: fix tcp_init_transfer() to not reset icsk_ca_initialized kernel: irqchip/gic-v3-its: Fix potential VPE leak on error kernel: netfilter: conntrack: serialize hash resizes and cleanups kernel: userfaultfd: fix a race between writeprotect and exit_mmap() kernel: isdn: mISDN: Fix sleeping function called from invalid context kernel: mm: khugepaged: skip huge page collapse for special files kernel: ethernet: hisilicon: hns: hns_dsaf_misc: fix a possible array overflow in hns_dsaf_ge_srst_by_port() kernel: ovl: fix warning in ovl_create_real() kernel: net/sunrpc: fix reference count leaks in rpc_sysfs_xprt_state_change kernel: i2c: mlxbf: prevent stack overflow in mlxbf_i2c_smbus_start_transaction() kernel: net: amd-xgbe: Fix skb data length underflow kernel: block: Fix wrong offset in bio_truncate() kernel: net: fix information leakage in /proc/net/ptype kernel: efivarfs: force RO when remounting if SetVariable is not supported kernel: use-after-free in kv_parse_power_table kernel: null pointer dereference issues in ice_ptp.c kernel: drm: Don't unref the same fb many times by mistake due to deadlock handling kernel: wifi: mac80211: fix potential key use-after-free kernel: pstore/ram: Fix crash when setting number of cpus to an odd number kernel: ext4: avoid online resizing failures due to oversized flex bg kernel: SUNRPC: Fix a suspicious RCU usage warning kernel: drm/vmwgfx: Unmap the surface before resetting it on a plane state kernel: SUNRPC: fix a memleak in gss_import_v2_context kernel: Revert &#34;net/mlx5: Block entering switchdev mode with ns inconsistency&#34; kernel: drm/vmwgfx: fix a memleak in vmw_gmrid_man_get_node kernel: of: Fix double free in of_parse_phandle_with_args_map kernel: sched/psi: Fix use-after-free in ep_remove_wait_queue() kernel: mmc: sdio: fix possible resource leaks in some error paths kernel: pwm: Fix double shift bug kernel: virtio-blk: fix implicit overflow on virtio_max_dma_size kernel: media: gspca: cpia1: shift-out-of-bounds in set_flicker kernel: wifi: ath11k: fix gtk offload status event locking kernel: bonding: stop the device in bond_setup_by_slave() kernel: i2c: core: Run atomic i2c xfer when !preemptible kernel: ipvlan: add ipvlan_route_v6_outbound() helper kernel: SUNRPC: Fix RPC client cleaned up the freed pipefs dentries kernel: scsi: ibmvfc: Remove BUG_ON in the case of an empty event pool kernel: wifi: mac80211: don&#39;t return unset power in ieee80211_get_tx_power() kernel: atl1c: Work around the DMA RX overflow issue kernel: tipc: Change nla_policy for bearer-related names to NLA_NUL_STRING kernel: media: bttv: fix use after free error due to btv->timeout timer kernel: platform/x86: wmi: Fix opening of char device hw: cpu: intel: Native Branch History Injection (BHI) kernel: dmaengine/idxd: hardware erratum allows potential security problem with direct access by untrusted application kernel: crash due to a missing check for leb_size kernel: mlxsw: spectrum_acl_tcam: Fix stack corruption kernel: tcp: make sure init the accept_queue&#39;s spinlocks once kernel: tcp: add sanity checks to rx zerocopy kernel: drm/amd/display: Implement bounds check for stream encoder creation in DCN301 kernel: net/sched: flower: Fix chain template offload kernel: fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats kernel: ext4: fix double-free of blocks due to wrong extents moved_len kernel: arp: Prevent overflow in arp_req_get(). kernel: net/sched: act_mirred: use the backlog for mirred ingress kernel: ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal() kernel: ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found() kernel: stmmac: Clear variable when destroying workqueue kernel: vfio/pci: Lock external INTx masking ops kernel: net: bridge: switchdev: Skip MDB replays of deferred events on offload kernel: cachefiles: fix memory leak in cachefiles_add_cache() kernel: efi: runtime: Fix potential overflow of soft-reserved region size kernel: net/ipv6: avoid possible UAF in ip6_route_mpath_notify() kernel: igc: avoid returning frame twice in XDP_REDIRECT kernel: NFSv4.2: fix nfs4_listxattr kernel BUG at mm/usercopy.c:102 kernel: quota: Fix potential NULL pointer dereference kernel: inet: inet_defrag: prevent sk release while still in use kernel: netfilter: nf_tables: release mutex after nft_gc_seq_end from abort path kernel: drm/vmwgfx: Create debugfs ttm_resource_manager entry only if needed kernel: nfs: fix UAF in direct writes kernel: mm: swap: fix race between free_swap_and_cache() and swapoff() kernel: mac802154: fix llsec key resources release in mac802154_llsec_key_del kernel: net/sched: Fix mirred deadlock on device recursion kernel: netfilter: nf_tables: fix memleak in map from abort path kernel: netfilter: nf_tables: Fix potential data-race in __nft_obj_type_get() kernel: netfilter: nf_tables: Fix potential data-race in __nft_expr_type_get() kernel: nbd: null check for nla_nest_start kernel: netfilter: nf_tables: do not compare internal table flags on updates kernel: SUNRPC: fix some memleaks in gssx_dec_option_array kernel: net: openvswitch: Fix Use-After-Free in ovs_ct_exit kernel: wifi: iwlwifi: mvm: don&#39;t set the MFP flag for the GTK kernel: genirq/cpuhotplug, x86/vector: Prevent vector leak during CPU offline kernel: ipvlan: Dont Use skb-&gt;sk in ipvlan_process_v{4,6}_outbound kernel: usb: typec: altmodes/displayport: create sysfs nodes as driver&#39;s default device attribute group kernel: x86/fpu: Keep xfd_state in sync with MSR_IA32_XFD kernel: ext4: fix corruption during on-line resize kernel: drm/vmwgfx: Fix the lifetime of the bo cursor memory kernel: swiotlb: Fix double-allocation of slots due to broken alignment handling kernel: irqchip/gic-v3-its: Prevent double free on error kernel: x86/mce: Make sure to grab mce_sysfs_mutex in set_bank() kernel: net/sched: act_skbmod: prevent kernel-infoleak kernel: netfilter: validate user input for expected length kernel: netfilter: nf_tables: discard table flag update with pending basechain deletion kernel: netfilter: nf_tables: flush pending destroy work before exit_net release kernel: netfilter: nf_tables: reject new basechain after table flag update kernel: tcp: properly terminate timers for kernel sockets kernel: wifi: iwlwifi: mvm: rfi: fix potential response leaks kernel: usb: typec: ucsi: Limit read size on v1.2 kernel: block: prevent division by zero in blk_rq_stat_sum() kernel: scsi: lpfc: Fix possible memory leak in lpfc_rcv_padisc() kernel: wifi: cfg80211: check A-MSDU format more carefully kernel: wifi: ath11k: decrease MHI channel buffer length to 8KB kernel: wifi: rtw89: fix null pointer access when abort scan kernel: dyndbg: fix old BUG_ON in &gt;control parser kernel: drm/ast: Fix soft lockup kernel: mm/hugetlb: fix missing hugetlb_lock for resv uncharge kernel: netfilter: nf_tables: honor table dormant flag from netdev release event path kernel: mlxsw: spectrum_acl_tcam: Fix incorrect list API usage kernel: igb: Fix string truncation warnings in igb_set_fw_version kernel: tty: n_gsm: fix possible out-of-bounds in gsm0_receive() kernel: rtnetlink: Correct nested IFLA_VF_VLAN_LIST attribute validation kernel: i40e: fix vf may be used uninitialized in this function warning kernel: scsi: qla2xxx: Fix off by one in qla_edif_app_getstats() kernel: netfilter: tproxy: bail out if IP has been disabled on the device kernel: netfilter: nfnetlink_queue: acquire rcu_read_lock() in instance_destroy_rcu() kernel: tls: fix missing memory barrier in tls_init kernel: TIPC message reassembly use-after-free remote code execution vulnerability kernel: mptcp: ensure snd_nxt is properly initialized on connect kernel: USB: core: Fix access violation during port device removal kernel: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique(). kernel: tcp: defer shutdown(SEND_SHUTDOWN) for TCP_SYN_RECV sockets kernel: block: fix overflow in blk_ioctl_discard() kernel: wifi: iwlwifi: mvm: guard against invalid STA ID on removal kernel: ipv4: Fix uninit-value access in __ip_make_skb() kernel: net: core: reject skb_copy(_expand) for fraglist GSO skbs kernel: nsh: Restore skb-&gt;{protocol,data,mac_header} for outer header in nsh_gso_segment(). kernel: pinctrl: core: delete incorrect free in pinctrl_enable() kernel: wifi: nl80211: don&#39;t free NULL coalescing rule kernel: firewire: ohci: mask bus reset interrupts between ISR and bottom half kernel: tipc: fix a possible memleak in tipc_buf_append kernel: drm/vmwgfx: Fix invalid reads in fence signaled events kernel: net: kernel: UAF in network route management kernel: net: sched: sch_multiq: fix possible OOB write in multiq_tune() kernel: net: bridge: mst: fix vlan use-after-free kernel: net: bridge: xmit: make sure we have at least eth header len bytes kernel: net/mlx5: Discard command completions in internal error kernel: cppc_cpufreq: Fix possible null pointer dereference kernel: wifi: brcmfmac: pcie: handle randbuf allocation failure kernel: af_unix: Fix data races in unix_release_sock/unix_stream_sendmsg kernel: cpufreq: exit() callback is optional kernel: stm class: Fix a double free in stm_register_device() kernel: ext4: fix mb_cache_entry's e_refcnt leak in ext4_xattr_block_cache_find() kernel: xfs: fix log recovery buffer allocation for the legacy h_size fixup kernel: md/raid5: fix deadlock that raid5d() wait for itself to clear MD_SB_CHANGE_PENDING kernel: bonding: Fix out-of-bounds read in bond_option_arp_ip_targets_set() kernel: ionic: fix use after netif_napi_del() kernel: xhci: Handle TD clearing for multiple streams case
[ "cpe:/a:redhat:enterprise_linux:8::nfv", "cpe:/a:redhat:enterprise_linux:8::realtime" ]
null
6.1
null
null
GHSA-q598-5464-x6q8
Bit Assist plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 1.5.2 via the fileID Parameter. This makes it possible for authenticated attackers, with Subscriber-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information.
[]
null
6.5
null
null
CVE-2006-4427
index.php in eFiction before 2.0.7 allows remote attackers to bypass authentication and gain privileges by setting the (1) adminloggedin, (2) loggedin, and (3) level parameters to "1".
[ "cpe:2.3:a:efiction:efiction:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:efiction:efiction:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:efiction:efiction:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:efiction:efiction:2.0.6:*:*:*:*:*:*:*" ]
null
null
null
5.1
GHSA-9p34-3252-9gh9
openvpnserv.exe (aka the interactive service helper) in OpenVPN 2.4.x before 2.4.6 allows a local attacker to cause a double-free of memory by sending a malformed request to the interactive service. This could cause a denial-of-service through memory corruption or possibly have unspecified other impact including privilege escalation.
[]
null
null
7.8
null
CVE-2021-42688
An Integer Overflow vulnerability exists in Accops HyWorks Windows Client prior to v 3.2.8.200. The IOCTL Handler 0x22005B in the Accops HyWorks Windows Client prior to v 3.2.8.200 allow local attackers to execute arbitrary code in kernel mode or cause a denial of service (memory corruption and OS crash) via specially crafted I/O Request Packet.
[ "cpe:2.3:a:accops:hyworks_windows_client:*:*:*:*:*:*:*:*" ]
null
8.8
null
7.2
CVE-2004-0833
Sendmail before 8.12.3 on Debian GNU/Linux, when using sasl and sasl-bin, uses a Sendmail configuration script with a fixed username and password, which could allow remote attackers to use Sendmail as an open mail relay and send spam messages.
[ "cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*" ]
null
null
null
7.5
GHSA-cr36-9r2x-97q5
Unspecified vulnerability in Novell Forum (formerly SiteScape Forum) 7.0, 7.1, 7.2, 7.3, and 8.0 allows remote attackers to execute arbitrary TCL code via a modified URL. NOTE: this might overlap CVE-2007-6515.
[]
null
null
null
null
GHSA-2vcj-c8c3-rrf8
Multiple vulnerabilities in Cisco TelePresence Collaboration Endpoint (CE) Software and Cisco RoomOS Software could allow an attacker to conduct path traversal attacks, view sensitive data, or write arbitrary files on an affected device. For more information about these vulnerabilities, see the Details section of this advisory.
[]
null
7.1
null
null
GHSA-6fvx-97p6-hw44
In the Linux kernel, the following vulnerability has been resolved:bluetooth/hci: disallow setting handle bigger than HCI_CONN_HANDLE_MAXSyzbot hit warning in hci_conn_del() caused by freeing handle that was not allocated using ida allocator.This is caused by handle bigger than HCI_CONN_HANDLE_MAX passed by hci_le_big_sync_established_evt(), which makes code think it's unset connection.Add same check for handle upper bound as in hci_conn_set_handle() to prevent warning.
[]
null
7.1
null
null
CVE-2012-4825
Multiple cross-site scripting (XSS) vulnerabilities in servlet/traveler/ILNT.mobileconfig in IBM Lotus Notes Traveler before 8.5.3.2 allow remote attackers to inject arbitrary web script or HTML via the (1) userId or (2) address parameter in a getClientConfigFile action.
[ "cpe:2.3:a:ibm:lotus_notes_traveler:*:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_notes_traveler:8.5.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_notes_traveler:8.5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_notes_traveler:8.5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_notes_traveler:8.5.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_notes_traveler:8.5.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_notes_traveler:8.5.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_notes_traveler:8.5.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_notes_traveler:8.5.3:*:*:*:*:*:*:*" ]
null
null
null
4.3
GHSA-qmmq-6cfg-qc67
HCL Domino is susceptible to a lockout policy bypass vulnerability in the LDAP service. An unauthenticated attacker could use this vulnerability to mount a brute force attack against the LDAP service. Fixes are available in HCL Domino versions 9.0.1 FP10 IF6, 10.0.1 FP6 and 11.0.1 FP1 and later.
[]
null
null
null
null
CVE-2022-37030
Weak permissions on the configuration file in the PAM module in Grommunio Gromox 0.5 through 1.x before 1.28 allow a local unprivileged user in the gromox group to have the PAM stack execute arbitrary code upon loading the Gromox PAM module.
[ "cpe:2.3:a:grommunio:gromox:*:*:*:*:*:*:*:*" ]
null
7.8
null
null
CVE-2024-10184
SW Kick Integration - Blocks and Shortcodes for Embedding Kick Streams <= 1.1.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via sw-kick-embed Shortcode
The StreamWeasels Kick Integration plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's sw-kick-embed shortcode in all versions up to, and including, 1.1.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
6.4
null
null
ICSA-20-056-03
Moxa PT-7528 and PT-7828 Series Ethernet Switches
A buffer overflow in the web server allows remote attackers to cause a denial-of-service condition or execute arbitrary code. CVE-2020-6989 has been assigned to this vulnerability. A CVSS v3 base score of 10.0 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H ). The affected products use a weak cryptographic algorithm, which may allow confidential information to be disclosed. CVE-2020-6987 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N). The affected products use a hard-coded cryptographic key, which increases the possibility that confidential data can be recovered. CVE-2020-6983 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). These devices use a hard-coded service code for access to the console. CVE-2020-6985 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). The application utilizes weak password requirements, which may allow an attacker to gain unauthorized access. CVE-2020-6995 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). An attacker can access to sensitive information from the web service without authorization. CVE-2020-6993 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).
[]
null
null
5.3
null
GHSA-q9m8-r9fr-8x4q
IBM Cloud Pak System 2.3 has insufficient logout controls which could allow an authenticated privileged user to impersonate another user on the system. IBM X-Force ID: 191395.
[]
null
null
null
null
GHSA-9r57-f699-h3mm
IBM Security Verify Bridge uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 196617.
[]
null
null
null
null
GHSA-94pf-92hw-2hjc
XWiki Platform vulnerable to Code injection through NotificationRSSService
ImpactAny user who can edit their own user profile and notification settings can execute arbitrary script macros including Groovy and Python macros that allow remote code execution including unrestricted read and write access to all wiki contents. This can be reproduced with the following steps:Login as a user without script or programming right.Go to the notifications preferences in your user profile.Disable the "Own Events Filter" and enable notifications in the notification menu for "Like".Set your first name to `{{cache id="security" timeToLive="1"}}{{groovy}}println("Hello from groovy!"){{/groovy}}{{/cache}}`Click on the like button at the bottom left of the user profile.Click on the notifications bell in the top bar and then on "RSS Feed".If the text "Profile of Hello from groovy!" and/or "liked by Hello from groovy!" is displayed, the attack succeeded. The expected result would have been that the entered first name is displayed as-is in the description of the feed.PatchesThis has been patched in XWiki 14.10.6 and 15.2RC1.WorkaroundsThe main security fix can be manually applied by patching the affected document `XWiki.Notifications.Code.NotificationRSSService` as shown in the [patch](https://github.com/xwiki/xwiki-platform/commit/217e5bb7a657f2991b154a16ef4d5ae9c29ad39c#diff-7221a548809fa2ba34348556f4b5bd436463c559ebdf691197932ee7ce4478ca). This will break the link to the differences, though as this requires additional changes to Velocity templates as shown in the patch. While the [default](https://github.com/xwiki/xwiki-platform/commit/217e5bb7a657f2991b154a16ef4d5ae9c29ad39c#diff-b261c6eac3108c3e6e734054c28a78f59d3439ab72fe8582dadf87670a0d15a4) template is available in the instance and can be easily patched, the template for mentions is contained in a `.jar`-file and thus cannot be fixed without replacing that jar.Referenceshttps://jira.xwiki.org/browse/XWIKI-20610https://github.com/xwiki/xwiki-platform/commit/217e5bb7a657f2991b154a16ef4d5ae9c29ad39c
[]
null
9.9
null
null
CVE-2023-25260
Stimulsoft Designer (Web) 2023.1.3 is vulnerable to Local File Inclusion.
[ "cpe:2.3:a:stimulsoft:designer:2023.1.3:*:*:*:web:*:*:*", "cpe:2.3:a:stimulsoft:designer:2023.1.4:*:*:*:web:*:*:*" ]
null
7.5
null
null
CVE-2023-1219
Heap buffer overflow in Metrics in Google Chrome prior to 111.0.5563.64 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" ]
null
8.8
null
null