id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
139k
cpes
sequencelengths
0
4.89k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
CVE-2024-11805
Quick License Manager – WooCommerce Plugin <= 2.4.17 - Reflected Cross-Site Scripting
The Quick License Manager – WooCommerce Plugin plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'submit_qlm_products' parameter in all versions up to, and including, 2.4.17 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
[]
null
6.1
null
null
RHBA-2020:4346
Red Hat Bug Fix Advisory: Satellite 6.7.5 Async Bug Fix Update
Satellite: Local user impersonation by Single sign-on (SSO) user leads to account takeover
[ "cpe:/a:redhat:satellite:6.7::el7", "cpe:/a:redhat:satellite_capsule:6.7::el7" ]
null
7.5
null
null
RHSA-2017:3193
Red Hat Security Advisory: httpd security update
httpd: ap_get_basic_auth_pw() authentication bypass httpd: mod_ssl NULL pointer dereference httpd: ap_find_token() buffer overread httpd: mod_mime buffer overread httpd: Uninitialized memory reflection in mod_auth_digest httpd: Use-after-free by limiting unregistered HTTP method (Optionsbleed)
[ "cpe:/o:redhat:rhel_eus:7.2::computenode", "cpe:/o:redhat:rhel_eus:7.2::server" ]
null
null
5.9
null
CVE-2021-45463
load_cache in GEGL before 0.4.34 allows shell expansion when a pathname in a constructed command line is not escaped or filtered. This is caused by use of the system library function for execution of the ImageMagick convert fallback in magick-load. NOTE: GEGL releases before 0.4.34 are used in GIMP releases before 2.10.30; however, this does not imply that GIMP builds enable the vulnerable feature.
[ "cpe:2.3:a:gegl:gegl:*:*:*:*:*:*:*:*", "cpe:2.3:a:gimp:gimp:*:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*" ]
null
7.8
null
6.8
RHSA-2024:2551
Red Hat Security Advisory: bind security update
bind9: Parsing large DNS messages may cause excessive CPU load bind9: Querying RFC 1918 reverse zones may cause an assertion failure when “nxdomain-redirect” is enabled bind9: Enabling both DNS64 and serve-stale may cause an assertion failure during recursive resolution bind9: Specific recursive query patterns may lead to an out-of-memory condition bind9: KeyTrap - Extreme CPU consumption in DNSSEC validator bind9: Preparing an NSEC3 closest encloser proof can exhaust CPU resources
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
7.5
null
null
GHSA-r8mv-whv9-j8cj
Vulnerability of improper access permission in the process management module Impact: Successful exploitation of this vulnerability may affect service confidentiality.
[]
null
6.8
null
null
CVE-2018-3036
Vulnerability in the Oracle Banking Corporate Lending component of Oracle Financial Services Applications (subcomponent: Core module). Supported versions that are affected are 12.3.0, 12.4.0, 12.5.0, 14.0.0 and 14.1.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Banking Corporate Lending. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Banking Corporate Lending accessible data as well as unauthorized read access to a subset of Oracle Banking Corporate Lending accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Banking Corporate Lending. CVSS 3.0 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L).
[ "cpe:2.3:a:oracle:banking_corporate_lending:12.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:banking_corporate_lending:12.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:banking_corporate_lending:12.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:banking_corporate_lending:14.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:banking_corporate_lending:14.1.0:*:*:*:*:*:*:*" ]
null
null
6.3
6.5
CVE-2018-12626
An issue was discovered in Eventum 3.5.0. /htdocs/popup.php has XSS via the cat parameter.
[ "cpe:2.3:a:eventum_project:eventum:*:*:*:*:*:*:*:*" ]
null
null
6.1
4.3
CVE-2011-2569
Cisco Nexus OS (aka NX-OS) 4.2 and 5.0 and Cisco Unified Computing System with software 1.4 and 2.0 do not properly restrict command-line options, which allows local users to gain privileges via unspecified vectors, aka Bug IDs CSCtf40008, CSCtg18363, CSCtr44645, CSCts10195, and CSCts10188.
[ "cpe:2.3:o:cisco:nx-os:4.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:5.0:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:unified_computing_system:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.4\\(1j\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:2.0\\(1q\\):*:*:*:*:*:*:*" ]
null
null
null
6.8
CVE-2013-2330
Unspecified vulnerability in HP Storage Data Protector 6.20, 6.21, 7.00, and 7.01 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1638.
[ "cpe:2.3:a:hp:storage_data_protector:6.20:-:*:*:*:hp-ux:*:*", "cpe:2.3:a:hp:storage_data_protector:6.20:-:*:*:*:redhat_enterprise_linux:*:*", "cpe:2.3:a:hp:storage_data_protector:6.20:-:*:*:*:sunos:*:*", "cpe:2.3:a:hp:storage_data_protector:6.20:-:*:*:*:suse_linux:*:*", "cpe:2.3:a:hp:storage_data_protector:6.20:-:*:*:*:windows_server_2003:*:*", "cpe:2.3:a:hp:storage_data_protector:6.20:-:*:*:*:windows_server_2008:*:*", "cpe:2.3:a:hp:storage_data_protector:6.21:-:*:*:*:hp-ux:*:*", "cpe:2.3:a:hp:storage_data_protector:6.21:-:*:*:*:redhat_enterprise_linux:*:*", "cpe:2.3:a:hp:storage_data_protector:6.21:-:*:*:*:sunos:*:*", "cpe:2.3:a:hp:storage_data_protector:6.21:-:*:*:*:suse_linux:*:*", "cpe:2.3:a:hp:storage_data_protector:6.21:-:*:*:*:windows_server_2003:*:*", "cpe:2.3:a:hp:storage_data_protector:6.21:-:*:*:*:windows_server_2008:*:*", "cpe:2.3:a:hp:storage_data_protector:7.00:-:*:*:*:hp-ux:*:*", "cpe:2.3:a:hp:storage_data_protector:7.00:-:*:*:*:redhat_enterprise_linux:*:*", "cpe:2.3:a:hp:storage_data_protector:7.00:-:*:*:*:suse_linux:*:*", "cpe:2.3:a:hp:storage_data_protector:7.00:-:*:*:*:windows_server_2003:*:*", "cpe:2.3:a:hp:storage_data_protector:7.00:-:*:*:*:windows_server_2008:*:*", "cpe:2.3:a:hp:storage_data_protector:7.01:-:*:*:*:hp-ux:*:*", "cpe:2.3:a:hp:storage_data_protector:7.01:-:*:*:*:redhat_enterprise_linux:*:*", "cpe:2.3:a:hp:storage_data_protector:7.01:-:*:*:*:suse_linux:*:*", "cpe:2.3:a:hp:storage_data_protector:7.01:-:*:*:*:windows_server_2003:*:*", "cpe:2.3:a:hp:storage_data_protector:7.01:-:*:*:*:windows_server_2008:*:*" ]
null
null
null
10
CVE-2004-1486
Unknown vulnerability in Serviceguard A.11.13 through A.11.16.00 and Cluster Object Manager A.01.03 and B.01.04 through B.03.00.01 on HP-UX, Serviceguard A.11.14.04 and A.11.15.04 and Cluster Object Manager B.02.01.02 and B.02.02.02 on HP Linux, allow remote attackers to gain privileges via unknown attack vectors.
[ "cpe:2.3:a:hp:cluster_object_manager:a.01.03:*:*:*:*:*:*:*", "cpe:2.3:a:hp:cluster_object_manager:b.01.04:*:*:*:*:*:*:*", "cpe:2.3:a:hp:cluster_object_manager:b.02.01.02:*:*:*:*:*:*:*", "cpe:2.3:a:hp:cluster_object_manager:b.02.02.00:*:*:*:*:*:*:*", "cpe:2.3:a:hp:cluster_object_manager:b.02.02.02:*:*:*:*:*:*:*", "cpe:2.3:a:hp:cluster_object_manager:b.03.00.00:*:*:*:*:*:*:*", "cpe:2.3:a:hp:cluster_object_manager:b.03.00.01:*:*:*:*:*:*:*", "cpe:2.3:a:hp:serviceguard:a.11.13:*:*:*:*:*:*:*", "cpe:2.3:a:hp:serviceguard:a.11.14:*:*:*:*:*:*:*", "cpe:2.3:a:hp:serviceguard:a.11.14.04:*:linux:*:*:*:*:*", "cpe:2.3:a:hp:serviceguard:a.11.15.00:*:*:*:*:*:*:*", "cpe:2.3:a:hp:serviceguard:a.11.15.04:*:linux:*:*:*:*:*", "cpe:2.3:a:hp:serviceguard:a.11.16.00:*:*:*:*:*:*:*" ]
null
null
null
10
GHSA-j3mc-884p-f75v
An issue was discovered in OneThink v1.1. There is a CSRF vulnerability in admin.php?s=/User/add.html that can add a user.
[]
null
null
8.8
null
CVE-2024-10007
Pre-Receive Hook Path Collision Vulnerability in GitHub Enterprise Server Allowing Privilege Escalation
A path collision and arbitrary code execution vulnerability was identified in GitHub Enterprise Server that allowed container escape to escalate to root via ghe-firejail path. Exploitation of this vulnerability requires Enterprise Administrator access to the GitHub Enterprise Server instance. This vulnerability affected all versions of GitHub Enterprise prior to 3.15 and was fixed in versions 3.14.3, 3.13.6, 3.12.11, and 3.11.17. This vulnerability was reported via the GitHub Bug Bounty program.
[ "cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*" ]
8.7
null
null
null
GHSA-552w-ccwr-xp2x
Multiple unspecified vulnerabilities in Free-SA before 1.2.2 allow remote attackers to execute arbitrary code via unspecified vectors involving certain (1) sprintf and (2) vsprintf calls in (a) r_index.c, (b) r_reports.c, (c) r_topsites.c, (d) r_topuser.c, (e) r_typical.c, (f) r_userdatetime.c, and (g) r_users.c in reports/; and (h) w_fs.c, (i) w_internal.c, and (j) w_log_operations.c in work/, probably related to buffer overflows. NOTE: some of these details are obtained from third party information.
[]
null
null
null
null
CVE-2013-7082
Cross-site scripting (XSS) vulnerability in the errorAction method in the ActionController base class in TYPO3 Flow (formerly FLOW3) 1.1.x before 1.1.1 and 2.0.x before 2.0.1 allows remote attackers to inject arbitrary web script or HTML via unspecified input, which is returned in an error message.
[ "cpe:2.3:a:typo3:flow:1.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:flow:2.0.0:*:*:*:*:*:*:*" ]
null
null
null
4.3
RHSA-2016:1423
Red Hat Security Advisory: flash-plugin security update
flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25
[ "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server", "cpe:/a:redhat:rhel_extras:6" ]
null
null
8.8
null
CVE-2016-4030
Samsung SM-G920F build G920FXXU2COH2 (Galaxy S6), SM-N9005 build N9005XXUGBOK6 (Galaxy Note 3), GT-I9192 build I9192XXUBNB1 (Galaxy S4 mini), GT-I9195 build I9195XXUCOL1 (Galaxy S4 mini LTE), and GT-I9505 build I9505XXUHOJ2 (Galaxy S4) devices have unintended availability of the modem in USB configuration number 2 within the secure lockscreen state, allowing an attacker to make phone calls, send text messages, or issue commands, aka SVE-2016-5301.
[ "cpe:2.3:o:samsung:galaxy_s6_firmware:g920fxxu2coh2:*:*:*:*:*:*:*", "cpe:2.3:h:samsung:galaxy_s6:-:*:*:*:*:*:*:*", "cpe:2.3:o:samsung:galaxy_note_3_firmware:n9005xxugbob6:*:*:*:*:*:*:*", "cpe:2.3:h:samsung:galaxy_note_3:-:*:*:*:*:*:*:*", "cpe:2.3:o:samsung:galaxy_s4_mini_firmware:i9192xxubnb1:*:*:*:*:*:*:*", "cpe:2.3:h:samsung:galaxy_s4_mini:-:*:*:*:*:*:*:*", "cpe:2.3:o:samsung:galaxy_s4_mini_lte_firmware:i9195xxucol1:*:*:*:*:*:*:*", "cpe:2.3:h:samsung:galaxy_s4_mini_lte:-:*:*:*:*:*:*:*", "cpe:2.3:o:samsung:galaxy_s4_firmware:i9505xxuhoj2:*:*:*:*:*:*:*", "cpe:2.3:h:samsung:galaxy_s4:-:*:*:*:*:*:*:*" ]
null
null
6.8
4.6
GHSA-88g4-46fj-wmhh
GUI overlay vulnerability in Mozilla Firefox 1.5.x before 1.5.0.10 and 2.x before 2.0.0.2, and SeaMonkey before 1.0.8 allows remote attackers to spoof certain user interface elements, such as the host name or security indicators, via the CSS3 hotspot property with a large, transparent, custom cursor.
[]
null
null
null
null
GHSA-53cj-vhvg-mmqf
An issue was discovered in Treck IPv6 before 6.0.1.68. Improper input validation in the IPv6 component when handling a packet sent by an unauthenticated remote attacker could result in an out-of-bounds read of up to three bytes via network access.
[]
null
null
null
null
GHSA-45hq-53gh-j483
Read/Write vulnerability in the image decoding module Impact: Successful exploitation of this vulnerability will affect availability.
[]
null
6.5
null
null
GHSA-43w3-fxw8-8m47
An out-of-bounds read in SANE Backends before 1.0.30 may allow a malicious device connected to the same local network as the victim to read important information, such as the ASLR offsets of the program, aka GHSL-2020-081.
[]
null
4.3
null
null
GHSA-f265-j59f-f7vh
Multiple SQL injection vulnerabilities in the Downloads module for PHP-Nuke 7.6 allow remote attackers to inject arbitrary web script or HTML via (1) the email or url parameters in the Add function, (2) the min parameter in the viewsdownload function, or (3) the min parameter in the search function.
[]
null
null
null
null
CVE-2009-0055
Cross-site request forgery (CSRF) vulnerability in the administration interface in Cisco IronPort Encryption Appliance 6.2.4 before 6.2.4.1.1, 6.2.5, 6.2.6, 6.2.7 before 6.2.7.7, 6.3 before 6.3.0.4, and 6.5 before 6.5.0.2; and Cisco IronPort PostX 6.2.1 before 6.2.1.1 and 6.2.2 before 6.2.2.3; allows remote attackers to modify appliance preferences as arbitrary users via unspecified vectors.
[ "cpe:2.3:h:cisco:ironport_encryption_appliance:6.2.4:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ironport_encryption_appliance:6.2.4.1:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ironport_encryption_appliance:6.2.5:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ironport_encryption_appliance:6.2.6:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ironport_encryption_appliance:6.2.7:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ironport_encryption_appliance:6.2.7.1:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ironport_encryption_appliance:6.2.7.2:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ironport_encryption_appliance:6.2.7.3:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ironport_encryption_appliance:6.2.7.4:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ironport_encryption_appliance:6.2.7.5:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ironport_encryption_appliance:6.2.7.6:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ironport_encryption_appliance:6.3:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ironport_encryption_appliance:6.3.0.1:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ironport_encryption_appliance:6.3.0.2:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ironport_encryption_appliance:6.3.0.3:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ironport_encryption_appliance:6.5:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ironport_encryption_appliance:6.5.0.1:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ironport_postx:6.2.1:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ironport_postx:6.2.2:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ironport_postx:6.2.2.1:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ironport_postx:6.2.2.2:*:*:*:*:*:*:*" ]
null
null
null
6.8
GHSA-7jxv-2xpm-95jx
ECOA BAS controller is vulnerable to insecure direct object references that occur when the application provides direct access to objects based on user-supplied input. As a result of this vulnerability, attackers with general user's privilege can remotely bypass authorization and access the hidden resources in the system and execute privileged functionalities.
[]
null
null
null
null
CVE-2007-2371
admin/index.php in Gregory Kokanosky phpMyNewsletter 0.8 beta5 and earlier provides access to configuration modification before login, which allows remote attackers to cause a denial of service (loss of configuration data), and possibly perform direct static code injection, via a saveGlobalconfig action.
[ "cpe:2.3:a:gregory_kokanosky:phpmynewsletter:*:*:*:*:*:*:*:*" ]
null
null
null
10
GHSA-xxqp-r9x6-3h94
JetBrains Toolbox before 1.15.5605 was resolving an internal URL via a cleartext http connection.
[]
null
5.9
null
null
RHSA-2016:2704
Red Hat Security Advisory: qemu-kvm-rhev security, bug fix, and enhancement update
Qemu: OOB access in address_space_rw leads to segmentation fault Qemu: OOB access in address_space_rw leads to segmentation fault Qemu: net: out of bounds read in net_checksum_calculate()
[ "cpe:/a:redhat:openstack:7::el7" ]
null
null
4.7
null
ICSA-18-107-02
Schneider Electric Triconex Tricon
System calls read directly from memory addresses within the control program area without any verification. Manipulating this data could allow attacker data to be copied anywhere within memory. When a system call is made, registers are stored to a fixed memory location. Modifying the data in this location could allow attackers to gain supervisor-level access and control system states.
[]
null
null
7.9
null
CVE-2011-0145
WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.
[ "cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:4.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:4.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:4.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:4.5:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:4.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:4.6:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:4.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:4.7:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:4.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:4.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:4.7.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:4.8.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:4.9.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:5.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:6.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:6.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:6.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:6.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:6.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:6.0.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:6.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:7.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:7.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:7.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:7.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:7.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:7.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:7.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:7.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:7.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:7.4:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:7.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:7.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:7.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:7.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:7.5:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:7.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:7.6:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:7.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:7.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:7.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:7.7:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:7.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:7.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:8.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:8.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:8.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:8.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:8.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:8.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:8.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:9.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:9.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:9.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:9.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:9.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:9.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:10.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:10.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:10.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:10.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:webkit:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*" ]
null
null
null
7.6
CVE-2012-0366
Cisco Unity Connection before 7.1.3b(Su2) allows remote authenticated users to change the administrative password by leveraging the Help Desk Administrator role, aka Bug ID CSCtd45141.
[ "cpe:2.3:a:cisco:unity_connection:*:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unity_connection:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unity_connection:1.1\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unity_connection:1.1\\(1\\)_es1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unity_connection:1.1\\(1\\)_es12:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unity_connection:1.1\\(1\\)_sr1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unity_connection:1.2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unity_connection:1.2\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unity_connection:1.2\\(1\\)_es65:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unity_connection:1.2\\(1\\)sr2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unity_connection:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unity_connection:2.0\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unity_connection:2.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unity_connection:2.1\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unity_connection:2.1\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unity_connection:2.1\\(3\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unity_connection:2.1\\(3b\\)su1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unity_connection:2.1\\(4\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unity_connection:2.1\\(4\\)su1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unity_connection:2.1\\(4a\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unity_connection:2.1\\(4a\\)su2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unity_connection:2.1\\(5\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unity_connection:2.1\\(5\\)su1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unity_connection:2.1\\(5\\)su2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unity_connection:2.1\\(5\\)su3:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unity_connection:6.1\\(3b\\)su1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unity_connection:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unity_connection:7.0\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unity_connection:7.0\\(2a\\)su2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unity_connection:7.0\\(2a\\)su3:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unity_connection:7.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unity_connection:7.1\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unity_connection:7.1\\(2a\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unity_connection:7.1\\(2a\\)su1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unity_connection:7.1\\(2b\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unity_connection:7.1\\(2b\\)su1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unity_connection:7.1\\(3\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unity_connection:7.1\\(3a\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unity_connection:7.1\\(3a\\)su1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unity_connection:7.1\\(3a\\)su1a:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unity_connection:7.1\\(3b\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unity_connection:7.1\\(5\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unity_connection:7.1\\(5\\)su1a:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unity_connection:7.1\\(5a\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unity_connection:7.1\\(5b\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unity_connection:7.1\\(5b\\)su2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unity_connection:7.1\\(5b\\)su3:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unity_connection:7.1\\(5b\\)su4:*:*:*:*:*:*:*" ]
null
null
null
9
CVE-2020-28849
Cross Site Scripting (XSS) vulnerability in ChurchCRM version 4.2.1, allows remote attckers to execute arbitrary code and gain sensitive information via crafted payload in Add New Deposit field in View All Deposit module.
[ "cpe:2.3:a:churchcrm:churchcrm:*:*:*:*:*:*:*:*" ]
null
5.4
null
null
GHSA-v283-44v6-4392
SQL injection vulnerability in the Yannick Gaultier sh404SEF component before 2.1.8.777 for Joomla! allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
[]
null
null
null
null
CVE-2020-5404
Authentication Leak On Redirect With Reactor Netty HttpClient
The HttpClient from Reactor Netty, versions 0.9.x prior to 0.9.5, and versions 0.8.x prior to 0.8.16, may be used incorrectly, leading to a credentials leak during a redirect to a different domain. In order for this to happen, the HttpClient must have been explicitly configured to follow redirects.
[ "cpe:2.3:a:pivotal:reactor_netty:*:*:*:*:*:*:*:*" ]
null
null
6.5
null
RHSA-2024:0957
Red Hat Security Advisory: thunderbird security update
Mozilla: Out-of-bounds memory read in networking channels Mozilla: Alert dialog could have been spoofed on another site Mozilla: Fullscreen Notification could have been hidden by select element Mozilla: Custom cursor could obscure the permission dialog Mozilla: Mouse cursor re-positioned unexpectedly could have led to unintended permission grants Mozilla: Multipart HTTP Responses would accept the Set-Cookie header in response parts Mozilla: Incorrect code generation on 32-bit ARM devices Mozilla: Memory safety bugs fixed in Firefox 123, Firefox ESR 115.8, and Thunderbird 115.8
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
7.5
null
null
CVE-2022-2290
Cross-site Scripting (XSS) - Reflected in zadam/trilium
Cross-site Scripting (XSS) - Reflected in GitHub repository zadam/trilium prior to 0.52.4, 0.53.1-beta.
[ "cpe:2.3:a:trilium_project:trilium:*:*:*:*:*:*:*:*" ]
null
null
6.4
null
CVE-2016-8372
An issue was discovered in Moxa ioLogik E1210, firmware Version V2.4 and prior, ioLogik E1211, firmware Version V2.3 and prior, ioLogik E1212, firmware Version V2.4 and prior, ioLogik E1213, firmware Version V2.5 and prior, ioLogik E1214, firmware Version V2.4 and prior, ioLogik E1240, firmware Version V2.3 and prior, ioLogik E1241, firmware Version V2.4 and prior, ioLogik E1242, firmware Version V2.4 and prior, ioLogik E1260, firmware Version V2.4 and prior, ioLogik E1262, firmware Version V2.4 and prior, ioLogik E2210, firmware versions prior to V3.13, ioLogik E2212, firmware versions prior to V3.14, ioLogik E2214, firmware versions prior to V3.12, ioLogik E2240, firmware versions prior to V3.12, ioLogik E2242, firmware versions prior to V3.12, ioLogik E2260, firmware versions prior to V3.13, and ioLogik E2262, firmware versions prior to V3.12. A password is transmitted in a format that is not sufficiently secure.
[ "cpe:2.3:o:moxa:iologik_e1200_series_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:iologik_e1210:-:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:iologik_e1212:-:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:iologik_e1214:-:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:iologik_e1241:-:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:iologik_e1242:-:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:iologik_e1260:-:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:iologik_e1262:-:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:iologik_e1211:-:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:iologik_e1240:-:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:iologik_e1213:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:iologik_e2200_series_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:iologik_e2214:-:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:iologik_e2240:-:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:iologik_e2242:-:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:iologik_e2262:-:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:iologik_e2210:-:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:iologik_e2260:-:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:iologik_e2212:-:*:*:*:*:*:*:*" ]
null
8.1
null
4.3
CVE-2015-1425
JAKWEB Gecko CMS has Multiple Input Validation Vulnerabilities
[ "cpe:2.3:a:jakweb:gecko_cms:2.2:*:*:*:*:*:*:*", "cpe:2.3:a:jakweb:gecko_cms:2.3:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
CVE-2008-5152
inmail-show in mh-book 200605 allows local users to overwrite arbitrary files via a symlink attack on a (1) /tmp/inmail#####.log or (2) /tmp/inmail#####.stdin temporary file.
[ "cpe:2.3:a:peter_s_galbraith:mh-book:2000605:*:*:*:*:*:*:*" ]
null
null
null
6.9
GHSA-m2cg-g9cq-3r53
The Directorist: AI-Powered WordPress Business Directory Plugin with Classified Ads Listings plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 8.0.12 via the /wp-json/directorist/v1/users/ endpoint. This makes it possible for unauthenticated attackers to extract sensitive data including including usernames, email addresses, names, and more information about users.
[]
null
5.3
null
null
RHSA-2004:636
Red Hat Security Advisory: ImageMagick security update
security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
GHSA-999v-xqcq-xhxj
misc.php in DeluxeBB 1.3 allows remote attackers to register accounts without a valid email address via a valemail action with the valmem set to a pre-assigned user ID, which is visible from a memberlist action.
[]
null
null
null
null
CVE-2017-12116
An exploitable improper authorization vulnerability exists in miner_setGasPrice API of cpp-ethereum's JSON-RPC (commit 4e1015743b95821849d001618a7ce82c7c073768). A JSON request can cause an access to the restricted functionality resulting in authorization bypass. An attacker can send JSON to trigger this vulnerability.
[ "cpe:2.3:a:ethereum:aleth:-:*:*:*:*:*:*:*" ]
null
null
6.8
null
CVE-2021-24396
GSEOR <= 1.3 - Authenticated SQL Injection
A pageid GET parameter of the GSEOR – WordPress SEO Plugin WordPress plugin through 1.3 is not sanitised, escaped or validated before inserting to a SQL statement, leading to SQL injection.
[ "cpe:2.3:a:bestiaweb:gseor:*:*:*:*:*:wordpress:*:*" ]
null
7.2
null
6.5
CVE-2023-51888
Buffer Overflow vulnerability in the nomath() function in Mathtex v.1.05 and before allows a remote attacker to cause a denial of service via a crafted string in the application URL.
[ "cpe:2.3:a:ctan:mathtex:*:*:*:*:*:*:*:*" ]
null
7.5
null
null
GHSA-29pj-p885-q429
An issue was discovered in Selesta Visual Access Manager (VAM) 4.15.0 through 4.29. An attacker without authentication is able to execute arbitrary SQL SELECT statements by injecting the HTTP (POST or GET) parameter persoid into /tools/VamPersonPhoto.php. The SQL Injection type is Error-based (this means that relies on error messages thrown by the database server to obtain information about the structure of the database).
[]
null
null
null
null
CVE-2021-32675
DoS vulnerability in Redis
Redis is an open source, in-memory database that persists on disk. When parsing an incoming Redis Standard Protocol (RESP) request, Redis allocates memory according to user-specified values which determine the number of elements (in the multi-bulk header) and size of each element (in the bulk header). An attacker delivering specially crafted requests over multiple connections can cause the server to allocate significant amount of memory. Because the same parsing mechanism is used to handle authentication requests, this vulnerability can also be exploited by unauthenticated users. The problem is fixed in Redis versions 6.2.6, 6.0.16 and 5.0.14. An additional workaround to mitigate this problem without patching the redis-server executable is to block access to prevent unauthenticated users from connecting to Redis. This can be done in different ways: Using network access control tools like firewalls, iptables, security groups, etc. or Enabling TLS and requiring users to authenticate using client side certificates.
[ "cpe:2.3:a:redis:redis:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:management_services_for_element_software:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:management_services_for_netapp_hci:-:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:communications_operations_monitor:4.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:communications_operations_monitor:4.4:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:communications_operations_monitor:5.0:*:*:*:*:*:*:*" ]
null
7.5
null
null
CVE-2006-3308
Unspecified vulnerability in the wpprop code for Project EROS bbsengine before 20060622-0315 has unknown impact and remote attack vectors via [img] tags, possibly cross-site scripting (XSS).
[ "cpe:2.3:a:zoid_technologies:project_eros_bbsengine:*:*:*:*:*:*:*:*", "cpe:2.3:a:zoid_technologies:project_eros_bbsengine:2006-02-23:*:*:*:*:*:*:*", "cpe:2.3:a:zoid_technologies:project_eros_bbsengine:2006-04-29:*:*:*:*:*:*:*", "cpe:2.3:a:zoid_technologies:project_eros_bbsengine:2006-05-01:*:*:*:*:*:*:*", "cpe:2.3:a:zoid_technologies:project_eros_bbsengine:2006-05-09:*:*:*:*:*:*:*", "cpe:2.3:a:zoid_technologies:project_eros_bbsengine:2006-05-10:*:*:*:*:*:*:*", "cpe:2.3:a:zoid_technologies:project_eros_bbsengine:2006-05-12:*:*:*:*:*:*:*", "cpe:2.3:a:zoid_technologies:project_eros_bbsengine:2006-05-19:*:*:*:*:*:*:*", "cpe:2.3:a:zoid_technologies:project_eros_bbsengine:2006-05-20:*:*:*:*:*:*:*" ]
null
null
null
9.3
CVE-2024-8608
Stored XSS in Oceanic Software's ValeApp
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Oceanic Software ValeApp allows Stored XSS.This issue affects ValeApp: before v2.0.0.
[ "cpe:2.3:a:oceanicsoft:valeapp:*:*:*:*:*:*:*:*" ]
7.2
null
null
null
RHSA-2013:0610
Red Hat Security Advisory: qemu-kvm-rhev security update
qemu: e1000 driver buffer overflow when processing large packets when SBP and LPE flags are disabled
[ "cpe:/a:redhat:enterprise_linux:6::hypervisor" ]
null
null
null
null
CVE-2022-3126
Frontend File Manager < 21.4 - File Upload via CSRF
The Frontend File Manager Plugin WordPress plugin before 21.4 does not have CSRF check when uploading files, which could allow attackers to make logged in users upload files on their behalf
[ "cpe:2.3:a:najeebmedia:frontend_file_manager_plugin:*:*:*:*:*:wordpress:*:*" ]
null
4.3
null
null
CVE-2025-30896
WordPress WP ERP plugin <= 1.13.4 - Broken Access Control vulnerability
Missing Authorization vulnerability in weDevs WP ERP allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects WP ERP: from n/a through 1.13.4.
[]
null
5.4
null
null
CVE-2024-44809
A remote code execution (RCE) vulnerability exists in the Pi Camera project, version 1.0, maintained by RECANTHA. The issue arises from improper sanitization of user input passed to the "position" GET parameter in the tilt.php script. An attacker can exploit this by sending crafted input data that includes malicious command sequences, allowing arbitrary commands to be executed on the server with the privileges of the web server user. This vulnerability is exploitable remotely and poses significant risk if the application is exposed to untrusted networks.
[ "cpe:2.3:a:recantha:pi_camera_project:*:*:*:*:*:*:*:*" ]
null
9.8
null
null
GHSA-r865-37rj-vvpm
Unspecified vulnerability in the Oracle Data Integrator component in Oracle Fusion Middleware 11.1.1.3.0 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Data Quality based on Trillium, a different vulnerability than CVE-2015-0443, CVE-2015-0444, CVE-2015-0445, CVE-2015-0446, CVE-2015-2634, CVE-2015-2635, CVE-2015-2636, and CVE-2015-4758.
[]
null
null
null
null
CVE-2023-43013
Asset Management System v1.0 - Unauthenticated SQL Injection (SQLi)
Asset Management System v1.0 is vulnerable to an unauthenticated SQL Injection vulnerability on the 'email' parameter of index.php page, allowing an external attacker to dump all the contents of the database contents and bypass the login control.
[ "cpe:2.3:a:projectworlds:asset_management_system:1.0:*:*:*:*:*:*:*" ]
null
9.8
null
null
CVE-2010-1129
The safe_mode implementation in PHP before 5.2.13 does not properly handle directory pathnames that lack a trailing / (slash) character, which allows context-dependent attackers to bypass intended access restrictions via vectors related to use of the tempnam function.
[ "cpe:2.3:a:php:php:5.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.2.7:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.2.8:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.2.9:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.2.10:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.2.11:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.2.12:*:*:*:*:*:*:*" ]
null
null
null
7.5
RHSA-2021:0247
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3.5 security update
apache-httpclient: incorrect handling of malformed authority component in request URIs resteasy-client: potential sensitive information leakage in JAX-RS RESTEasy Client's WebApplicationException handling wildfly: resource adapter logs plaintext JMS password at warning level on connection error wildfly-core: memory leak in WildFly host-controller in domain mode while not able to reconnect to domain-controller undertow: special character in query results in server errors wildfly: Potential Memory leak in Wildfly when using OpenTracing
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el7" ]
null
5.9
null
null
CVE-2019-19460
An issue was discovered in SALTO ProAccess SPACE 5.4.3.0. The product's webserver runs as a Windows service with local SYSTEM permissions by default. This is against the principle of least privilege. An attacker who is able to exploit CVE-2019-19458 or CVE-2019-19459 is basically able to write to every single path on the file system, because the webserver is running with the highest privileges available.
[ "cpe:2.3:a:saltosystem:proaccess_space:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
5.5
null
6.6
GHSA-x4h7-rg57-2fqw
Exposure of Sensitive Information to an Unauthorized Actor in PoDoFo v0.9.6 allows attackers to obtain sensitive information via 'IsNextToken' in the component 'src/base/PdfToenizer.cpp'.
[]
null
null
null
null
GHSA-5mv8-rhrv-42gh
A vulnerability, which was classified as critical, has been found in SourceCodester Doctors Appointment System 1.0. This issue affects some unknown processing of the file /admin/edit-doc.php. The manipulation of the argument oldmail leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-221825 was assigned to this vulnerability.
[]
null
8.8
null
null
CVE-2017-7058
An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. The issue involves the "Notifications" component. It allows physically proximate attackers to read unintended notifications on the lock screen.
[ "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" ]
null
null
2.4
2.1
GHSA-4967-9mw7-522q
An issue was discovered in Libreswan before 4.12. When an IKEv2 Child SA REKEY packet contains an invalid IPsec protocol ID number of 0 or 1, an error notify INVALID_SPI is sent back. The notify payload's protocol ID is copied from the incoming packet, but the code that verifies outgoing packets fails an assertion that the protocol ID must be ESP (2) or AH(3) and causes the pluto daemon to crash and restart. NOTE: the earliest affected version is 3.20.
[]
null
7.5
null
null
GHSA-p7q6-9gm8-m4c5
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Eightweb Interactive Read More Without Refresh plugin <= 3.1 versions.
[]
null
5.9
null
null
CVE-2024-31241
WordPress LearnPress Export Import plugin <= 4.0.3 - Auth. SQL Injection vulnerability
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in ThimPress LearnPress Export Import.This issue affects LearnPress Export Import: from n/a through 4.0.3.
[ "cpe:2.3:a:thimpress:learnpress:-:*:*:*:*:wordpress:*:*" ]
null
7.6
null
null
CVE-2007-2485
PHP remote file inclusion vulnerability in myflash-button.php in the myflash 1.00 and earlier plugin for WordPress allows remote attackers to execute arbitrary PHP code via a URL in the wpPATH parameter.
[ "cpe:2.3:a:ruben_boelinger:myflash:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2017-14454
Multiple exploitable buffer overflow vulnerabilities exists in the PubNub message handler for the "control" channel of Insteon Hub running firmware version 1012. Specially crafted replies received from the PubNub service can cause buffer overflows on a global section overwriting arbitrary data. An attacker should impersonate PubNub and answer an HTTPS GET request to trigger this vulnerability. The `strcpy` at [18] overflows the buffer `insteon_pubnub.channel_al`, which has a size of 16 bytes.
[ "cpe:2.3:o:insteon:hub_firmware:1012:*:*:*:*:*:*:*", "cpe:2.3:h:insteon:hub:-:*:*:*:*:*:*:*" ]
null
null
8.5
null
GHSA-j6xf-p8r5-qhgw
A vulnerability has been identified in JT2Go (All versions < V13.2), Teamcenter Visualization (All versions < V13.2). The DL180CoolType.dll library in affected applications lacks proper validation of user-supplied data when parsing PDF files. This could result in an out of bounds write past the end of an allocated structure. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-13380)
[]
null
null
null
null
RHSA-2020:4490
Red Hat Security Advisory: gnupg2 security, bug fix, and enhancement update
gnupg2: Cross site request forgery in dirmngr resulting in an information disclosure or denial of service GnuPG: interaction between the sks-keyserver code and GnuPG allows for a Certificate Spamming Attack which leads to persistent DoS
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
null
6.5
null
RHSA-2019:2682
Red Hat Security Advisory: go-toolset-1.11 and go-toolset-1.11-golang security update
HTTP/2: flood using PING frames results in unbounded memory growth HTTP/2: flood using HEADERS frames results in unbounded memory growth
[ "cpe:/a:redhat:devtools:2019" ]
null
null
7.5
null
GHSA-2wv8-r8jx-c9hx
The create_user_ns function in kernel/user_namespace.c in the Linux kernel before 3.8.6 does not check whether a chroot directory exists that differs from the namespace root directory, which allows local users to bypass intended filesystem restrictions via a crafted clone system call.
[]
null
null
null
null
RHSA-2005:543
Red Hat Security Advisory: ruby security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
CVE-2000-1116
Buffer overflow in TransSoft Broker FTP Server before 4.3.0.1 allows remote attackers to cause a denial of service and possibly execute arbitrary commands via a long command.
[ "cpe:2.3:a:transsoft:broker_ftp_server:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:transsoft:broker_ftp_server:3.0_build_1:*:*:*:*:*:*:*", "cpe:2.3:a:transsoft:broker_ftp_server:4.0:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2010-0492
Use-after-free vulnerability in mstime.dll in Microsoft Internet Explorer 8 allows remote attackers to execute arbitrary code via vectors related to the TIME2 behavior, the CTimeAction object, and destruction of markup, leading to memory corruption, aka "HTML Object Memory Corruption Vulnerability."
[ "cpe:2.3:a:microsoft:ie:8:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:8.0.6001:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2003_server:*:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2003_server:*:sp2:itanium:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:*:x64:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:r2:itanium:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:r2:x64:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:*:*:x64:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:*" ]
null
8.1
null
9.3
RHSA-2023:1879
Red Hat Security Advisory: java-17-openjdk security and bug fix update
OpenJDK: improper connection handling during TLS handshake (8294474) OpenJDK: missing string checks for NULL characters (8296622) OpenJDK: incorrect handling of NULL characters in ProcessBuilder (8295304) OpenJDK: Swing HTML parsing issue (8296832) OpenJDK: incorrect enqueue of references in garbage collector (8298191) OpenJDK: certificate validation issue in TLS session negotiation (8298310) OpenJDK: missing check for slash characters in URI-to-path conversion (8298667)
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
3.7
null
null
GHSA-mxrx-hwh2-j2jm
Cacti through 1.2.7 is affected by a graphs.php?template_id= SQL injection vulnerability affecting how template identifiers are handled when a string and id composite value are used to identify the template type and id. An authenticated attacker can exploit this to extract data from the database, or an unauthenticated remote attacker could exploit this via Cross-Site Request Forgery.
[]
null
null
null
null
CVE-2020-36666
Multiple e-plugins - Subscriber+ Privilege Escalation
The directory-pro WordPress plugin before 1.9.5, final-user-wp-frontend-user-profiles WordPress plugin before 1.2.2, producer-retailer WordPress plugin through TODO, photographer-directory WordPress plugin before 1.0.9, real-estate-pro WordPress plugin before 1.7.1, institutions-directory WordPress plugin before 1.3.1, lawyer-directory WordPress plugin before 1.2.9, doctor-listing WordPress plugin before 1.3.6, Hotel Listing WordPress plugin before 1.3.7, fitness-trainer WordPress plugin before 1.4.1, wp-membership WordPress plugin before 1.5.7, sold by the same developer (e-plugins), do not implementing any security measures in some AJAX calls. For example in the file plugin.php, the function iv_directories_update_profile_setting() uses update_user_meta with any data provided by the ajax call, which can be used to give the logged in user admin capabilities. Since the plugins allow user registration via a custom form (even if the blog does not allow users to register) it makes any site using it vulnerable.
[ "cpe:2.3:a:e-plugins:directory_pro:*:*:*:*:*:wordpress:*:*", "cpe:2.3:a:e-plugins:final_user:*:*:*:*:*:wordpress:*:*", "cpe:2.3:a:e-plugins:fitness_trainer:*:*:*:*:*:wordpress:*:*", "cpe:2.3:a:e-plugins:hospital_\\&_doctor_directory:*:*:*:*:*:wordpress:*:*", "cpe:2.3:a:e-plugins:hotel_directory:*:*:*:*:*:wordpress:*:*", "cpe:2.3:a:e-plugins:institutions_directory:*:*:*:*:*:wordpress:*:*", "cpe:2.3:a:e-plugins:lawyer_directory:*:*:*:*:*:wordpress:*:*", "cpe:2.3:a:e-plugins:photographer-directory:*:*:*:*:*:wordpress:*:*", "cpe:2.3:a:e-plugins:producer-retailer:-:*:*:*:*:wordpress:*:*", "cpe:2.3:a:e-plugins:real_estate_pro:*:*:*:*:*:wordpress:*:*", "cpe:2.3:a:e-plugins:wp_membership:*:*:*:*:*:wordpress:*:*" ]
null
8.8
null
null
GHSA-h4qw-99jp-7g9f
A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server could trigger a Denial-of-Service condition by sending specifically crafted packets to port 7061/tcp. This vulnerability is independent from CVE-2019-18310. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known.
[]
null
null
null
null
CVE-2025-0973
CmsEasy index.php backAll_action path traversal
A vulnerability classified as critical was found in CmsEasy 7.7.7.9. This vulnerability affects the function backAll_action in the library lib/admin/database_admin.php of the file /index.php?case=database&act=backAll&admin_dir=admin&site=default. The manipulation of the argument select[] leads to path traversal. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
[]
5.3
5.4
5.4
5.5
GHSA-83gg-hw83-97hx
Buffer overflow in BreakPoint Software Hex Workshop 5.1.4 allows user-assisted attackers to cause a denial of service and possibly execute arbitrary code via a long mapping reference in a Color Mapping (.cmap) file.
[]
null
null
null
null
GHSA-gg44-xm5p-x9cm
Jenkins ElasticBox CI Plugin missing permission check
Jenkins ElasticBox CI Plugin 5.0.1 and earlier does not perform permission checks in several HTTP endpoints.This allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.Additionally, these HTTP endpoints do not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability.
[]
null
4.3
null
null
CVE-2004-2547
NetWin (1) SurgeMail before 2.0c and (2) WebMail allow remote attackers to obtain sensitive information via HTTP requests that (a) specify the / URI, (b) specify the /scripts/ URI, or (c) specify a non-existent file, which reveal the path in an error message.
[ "cpe:2.3:a:netwin:surgemail:1.0c:*:*:*:*:*:*:*", "cpe:2.3:a:netwin:surgemail:1.0d:*:*:*:*:*:*:*", "cpe:2.3:a:netwin:surgemail:1.1a:*:*:*:*:*:*:*", "cpe:2.3:a:netwin:surgemail:1.1b:*:*:*:*:*:*:*", "cpe:2.3:a:netwin:surgemail:1.1c:*:*:*:*:*:*:*", "cpe:2.3:a:netwin:surgemail:1.1d:*:*:*:*:*:*:*", "cpe:2.3:a:netwin:surgemail:1.2a:*:*:*:*:*:*:*", "cpe:2.3:a:netwin:surgemail:1.2b:*:*:*:*:*:*:*", "cpe:2.3:a:netwin:surgemail:1.2c:*:*:*:*:*:*:*", "cpe:2.3:a:netwin:surgemail:1.3a:*:*:*:*:*:*:*", "cpe:2.3:a:netwin:surgemail:1.3a_rc1:*:*:*:*:*:*:*", "cpe:2.3:a:netwin:surgemail:1.3b:*:*:*:*:*:*:*", "cpe:2.3:a:netwin:surgemail:1.3c:*:*:*:*:*:*:*", "cpe:2.3:a:netwin:surgemail:1.3d:*:*:*:*:*:*:*", "cpe:2.3:a:netwin:surgemail:1.3e:*:*:*:*:*:*:*", "cpe:2.3:a:netwin:surgemail:1.3f:*:*:*:*:*:*:*", "cpe:2.3:a:netwin:surgemail:1.3g:*:*:*:*:*:*:*", "cpe:2.3:a:netwin:surgemail:1.3h:*:*:*:*:*:*:*", "cpe:2.3:a:netwin:surgemail:1.3i:*:*:*:*:*:*:*", "cpe:2.3:a:netwin:surgemail:1.3j:*:*:*:*:*:*:*", "cpe:2.3:a:netwin:surgemail:1.3k:*:*:*:*:*:*:*", "cpe:2.3:a:netwin:surgemail:1.3l:*:*:*:*:*:*:*", "cpe:2.3:a:netwin:surgemail:1.4a:*:*:*:*:*:*:*", "cpe:2.3:a:netwin:surgemail:1.4b:*:*:*:*:*:*:*", "cpe:2.3:a:netwin:surgemail:1.4c:*:*:*:*:*:*:*", "cpe:2.3:a:netwin:surgemail:1.5a:*:*:*:*:*:*:*", "cpe:2.3:a:netwin:surgemail:1.5b:*:*:*:*:*:*:*", "cpe:2.3:a:netwin:surgemail:1.5c:*:*:*:*:*:*:*", "cpe:2.3:a:netwin:surgemail:1.5d:*:*:*:*:*:*:*", "cpe:2.3:a:netwin:surgemail:1.5d2:*:*:*:*:*:*:*", "cpe:2.3:a:netwin:surgemail:1.5f:*:*:*:*:*:*:*", "cpe:2.3:a:netwin:surgemail:1.6a:*:*:*:*:*:*:*", "cpe:2.3:a:netwin:surgemail:1.6b:*:*:*:*:*:*:*", "cpe:2.3:a:netwin:surgemail:1.6d:*:*:*:*:*:*:*", "cpe:2.3:a:netwin:surgemail:1.6e:*:*:*:*:*:*:*", "cpe:2.3:a:netwin:surgemail:1.6e2:*:*:*:*:*:*:*", "cpe:2.3:a:netwin:surgemail:1.7a:*:*:*:*:*:*:*", "cpe:2.3:a:netwin:surgemail:1.7b3:*:*:*:*:*:*:*", "cpe:2.3:a:netwin:surgemail:1.8a:*:*:*:*:*:*:*", "cpe:2.3:a:netwin:surgemail:1.8b3:*:*:*:*:*:*:*", "cpe:2.3:a:netwin:surgemail:1.8d:*:*:*:*:*:*:*", "cpe:2.3:a:netwin:surgemail:1.8e:*:*:*:*:*:*:*", "cpe:2.3:a:netwin:surgemail:1.8g3:*:*:*:*:*:*:*", "cpe:2.3:a:netwin:surgemail:1.9b2:*:*:*:*:*:*:*", "cpe:2.3:a:netwin:surgemail:2.0a2:*:*:*:*:*:*:*", "cpe:2.3:a:netwin:webmail:3.1d:*:*:*:*:*:*:*" ]
null
null
null
2.6
GHSA-jvf5-x86m-gp68
Apple Safari before 6.2.5, 7.x before 7.1.5, and 8.x before 8.0.5, as used on iOS before 8.3 and other platforms, does not properly delete browsing-history data from the history.plist file, which allows attackers to obtain sensitive information by reading this file.
[]
null
null
null
null
CVE-2022-38935
An issue was discovered in NiterForum version 2.5.0-beta in /src/main/java/cn/niter/forum/api/SsoApi.java and /src/main/java/cn/niter/forum/controller/AdminController.java, allows attackers to gain escalated privileges.
[ "cpe:2.3:a:niter:niterforum:2.5.0:beta:*:*:*:*:*:*" ]
null
8.8
null
null
CVE-2023-30904
A security vulnerability in HPE Insight Remote Support may result in the local disclosure of privileged LDAP information.
[ "cpe:2.3:a:hpe:insight_remote_support:*:*:*:*:*:*:*:*" ]
null
5.5
null
null
GHSA-8pr8-xhpc-5qqx
Buffer overflow in web-admin tool in NetXRay 2.6 allows remote attackers to cause a denial of service, and possibly execute arbitrary commands, via a long HTTP request.
[]
null
null
null
null
CVE-2020-26515
An insufficiently protected credentials issue was discovered in Intland codeBeamer ALM 10.x through 10.1.SP4. The remember-me cookie (CB_LOGIN) issued by the application contains the encrypted user's credentials. However, due to a bug in the application code, those credentials are encrypted using a NULL encryption key.
[ "cpe:2.3:a:intland:codebeamer:*:*:*:*:*:*:*:*", "cpe:2.3:a:intland:codebeamer:10.1.0:-:*:*:*:*:*:*", "cpe:2.3:a:intland:codebeamer:10.1.0:sp1:*:*:*:*:*:*", "cpe:2.3:a:intland:codebeamer:10.1.0:sp2:*:*:*:*:*:*", "cpe:2.3:a:intland:codebeamer:10.1.0:sp3:*:*:*:*:*:*", "cpe:2.3:a:intland:codebeamer:10.1.0:sp4:*:*:*:*:*:*" ]
null
7.5
null
5
GHSA-pwf4-rc9f-r3rx
Use after free in Tabs in Google Chrome prior to 127.0.6533.72 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)
[]
null
8.8
null
null
RHSA-2020:4277
Red Hat Security Advisory: kernel security update
kernel: net: bluetooth: type confusion while processing AMP packets kernel: net: bluetooth: information leak when processing certain AMP packets
[ "cpe:/o:redhat:rhel_eus:7.7::computenode", "cpe:/o:redhat:rhel_eus:7.7::server" ]
null
5.3
null
null
ICSA-20-343-07
Siemens SICAM A8000 RTUs
A web server misconfiguration of the affected device can cause insecure ciphers usage by a user´s browser. An attacker in a privileged position could decrypt the communication and compromise confidentiality and integrity of the transmitted information.
[]
null
8.1
null
null
GHSA-33wf-4crm-2322
Improper Access Control in librenms
Improper Access Control in Packagist librenms/librenms prior to 22.2.0.
[]
null
null
7.1
null
GHSA-mvgw-crv9-m67p
A buffer copy without checking size of input vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated administrators to execute code via a network.We have already fixed the vulnerability in the following versions: QTS 5.0.1.2425 build 20230609 and later QTS 5.1.0.2444 build 20230629 and later QTS 4.5.4.2467 build 20230718 and later QuTS hero h5.0.1.2515 build 20230907 and later QuTS hero h5.1.0.2424 build 20230609 and later QuTS hero h4.5.4.2476 build 20230728 and later QuTScloud c5.1.0.2498 and later
[]
null
3.8
null
null
CVE-2009-2982
An unspecified certificate in Adobe Reader and Acrobat 9.x before 9.2, 8.x before 8.1.7, and possibly 7.x through 7.1.4 might allow remote attackers to conduct a "social engineering attack" via unknown vectors.
[ "cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:7.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:7.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:7.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:7.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:7.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:7.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:7.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:7.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:7.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:7.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:7.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:7.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:8.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:8.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:8.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:8.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:8.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:8.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:8.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:9.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:9.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:9.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:9.1.2:*:*:*:*:*:*:*" ]
null
null
null
9.3
CVE-2016-6223
The TIFFReadRawStrip1 and TIFFReadRawTile1 functions in tif_read.c in libtiff before 4.0.7 allows remote attackers to cause a denial of service (crash) or possibly obtain sensitive information via a negative index in a file-content buffer.
[ "cpe:2.3:a:libtiff:libtiff:*:*:*:*:*:*:*:*" ]
null
null
9.1
6.4
CVE-2023-39524
PrestaShop vulnerable to boolean SQL injection in search product in BO
PrestaShop is an open source e-commerce web application. Prior to version 8.1.1, SQL injection possible in the product search field, in BO's product page. Version 8.1.1 contains a patch for this issue. There are no known workarounds.
[ "cpe:2.3:a:prestashop:prestashop:*:*:*:*:*:*:*:*" ]
null
6.7
null
null
GHSA-f933-7c3x-46v4
Softing OPC UA C++ SDK (Software Development Kit) versions from 5.59 to 5.64 exported library functions don't properly validate received extension objects, which may allow an attacker to crash the software by sending a variety of specially crafted packets to access several unexpected memory locations.
[]
null
7.5
null
null
GHSA-p3wq-v5cw-mp2f
Microsoft Lync for Mac 2011 fails to properly validate certificates, allowing remote attackers to alter server-client communications, aka "Microsoft Lync for Mac Certificate Validation Vulnerability."
[]
null
null
7.5
null
RHSA-2007:1083
Red Hat Security Advisory: thunderbird security update
jar: protocol XSS Multiple flaws in Firefox Mozilla Cross-site Request Forgery flaw
[ "cpe:/a:redhat:rhel_productivity:5", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client" ]
null
null
null
null
GHSA-5v86-x755-pfw5
Adobe Bridge versions 12.0.4 (and earlier) and 13.0.3 (and earlier) are affected by a Use After Free vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[]
null
5.5
null
null
GHSA-3h2m-jjrw-87hw
The User::matchEditToken function in includes/User.php in MediaWiki before 1.23.12, 1.24.x before 1.24.5, 1.25.x before 1.25.4, and 1.26.x before 1.26.1 does not perform token comparison in constant time before determining if a debugging message should be logged, which allows remote attackers to guess the edit token and bypass CSRF protection via a timing attack, a different vulnerability than CVE-2015-8623.
[]
null
null
8.8
null
CVE-2019-13001
An issue was discovered in GitLab Community and Enterprise Edition 11.9 and later through 12.0.2. GitLab Snippets were vulnerable to an authorization issue that allowed unauthorized users to add comments to a private snippet. It allows authentication bypass.
[ "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*" ]
null
4.3
null
4
CVE-2024-21919
Rockwell Automation Arena Simulation Vulnerable To Uninitialized Pointer
An uninitialized pointer in Rockwell Automation Arena Simulation software could potentially allow a malicious user to insert unauthorized code to the software by leveraging the pointer after it is properly. Once inside, the threat actor can run harmful code on the system. This affects the confidentiality, integrity, and availability of the product. To trigger this, the user would unwittingly need to open a malicious file shared by the threat actor.
[ "cpe:2.3:a:rockwellautomation:arena_simulation:16.00.00:*:*:*:*:*:*:*", "cpe:2.3:a:rockwellautomation:arena:*:*:*:*:*:*:*:*" ]
null
7.8
null
null