id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
57.2k
cpes
sequencelengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
GHSA-8h28-5hcj-h4qw
munin-cgi-graph in Munin 2.0 rc4 allows remote attackers to cause a denial of service (disk or memory consumption) via many image requests with large values in the (1) size_x or (2) size_y parameters.
[]
null
null
null
null
GHSA-gx69-h78g-vjrh
In the Linux kernel, the following vulnerability has been resolved:wifi: ath11k: fix dfs radar event lockingThe ath11k active pdevs are protected by RCU but the DFS radar event handling code calling ath11k_mac_get_ar_by_pdev_id() was not marked as a read-side critical section.Mark the code in question as an RCU read-side critical section to avoid any potential use-after-free issues.Compile tested only.
[]
null
8.8
null
null
CVE-2024-34558
WordPress WOLF plugin <= 1.0.8.2 - Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in realmag777 WOLF allows Stored XSS.This issue affects WOLF: from n/a through 1.0.8.2.
[]
null
5.9
null
null
GHSA-p3q5-qxhp-fpcg
Due to failure in validating the length provided by an attacker-crafted RTPS packet, Wireshark version 4.0.5 and prior, by default, is susceptible to a heap-based buffer overflow, and possibly code execution in the context of the process running Wireshark.
[]
null
8.8
null
null
GHSA-99r6-932q-94cq
An issue was discovered on XIAOMI XIAOAI speaker Pro LX06 1.52.4. Attackers can get root shell by accessing the UART interface and then they can (i) read Wi-Fi SSID or password, (ii) read the dialogue text files between users and XIAOMI XIAOAI speaker Pro LX06, (iii) use Text-To-Speech tools pretend XIAOMI speakers' voice achieve social engineering attacks, (iv) eavesdrop on users and record what XIAOMI XIAOAI speaker Pro LX06 hears, (v) modify system files, (vi) use commands to send any IR code through IR emitter on XIAOMI XIAOAI Speaker Pro LX06, (vii) stop voice assistant service, (viii) enable the XIAOMI XIAOAI Speaker Pro’ SSH or TELNET service as a backdoor, (IX) tamper with the router configuration of the router in the local area networks.
[]
null
null
null
null
CVE-2007-2796
Arris Cadant C3 CMTS allows remote attackers to cause a denial of service (service termination) via a malformed IP packet with an invalid IP option.
[ "cpe:2.3:h:arris:cadant_c3_cmts:*:*:*:*:*:*:*:*" ]
null
null
null
7.8
GHSA-923r-gp72-rmm4
Memory corruption is possible when an attempt is made from userspace or console to write some haptics effects pattern to the haptics debugfs file.
[]
null
6.7
null
null
CVE-2020-14311
There is an issue with grub2 before version 2.06 while handling symlink on ext filesystems. A filesystem containing a symbolic link with an inode size of UINT32_MAX causes an arithmetic overflow leading to a zero-sized memory allocation with subsequent heap-based buffer overflow.
[ "cpe:2.3:a:gnu:grub2:*:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*" ]
null
5.7
null
null
GHSA-x2hc-692w-3vgc
Solaris dmispd dmi_cmd allows local users to fill up restricted disk space by adding files to the /var/dmi/db database.
[]
null
null
null
null
CVE-2018-15133
In Laravel Framework through 5.5.40 and 5.6.x through 5.6.29, remote code execution might occur as a result of an unserialize call on a potentially untrusted X-XSRF-TOKEN value. This involves the decrypt method in Illuminate/Encryption/Encrypter.php and PendingBroadcast in gadgetchains/Laravel/RCE/3/chain.php in phpggc. The attacker must know the application key, which normally would never occur, but could happen if the attacker previously had privileged access or successfully accomplished a previous attack.
[ "cpe:2.3:a:laravel:laravel:*:*:*:*:*:*:*:*" ]
null
8.1
null
6.8
CVE-2019-0174
Logic condition in specific microprocessors may allow an authenticated user to potentially enable partial physical address information disclosure via local access.
[ "cpe:2.3:o:intel:i9-9900x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i9-9900x:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i9-9920x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i9-9920x:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i9-9960x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i9-9960x:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i9-9980xe_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i9-9980xe:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i9-9940x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i9-9940x:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i9-7960x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i9-7960x:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i9-7980xe_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i9-7980xe:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i9-7940x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i9-7940x:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i9-7920x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i9-7920x:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i9-7900x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i9-7900x:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i7-7820x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i7-7820x:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i7-7800x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i7-7800x:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i5-4422e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i5-4422e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i5-4410e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i5-4410e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i5-4402ec_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i5-4402ec:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i5-4402e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i5-4402e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i5-4400e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i5-4400e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i5-4460t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i5-4460t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i5-4460s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i5-4460s:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i5-4460_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i5-4460:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i5-4440s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i5-4440s:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i5-4440_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i5-4440:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i5-4430s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i5-4430s:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i5-4300m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i5-4300m:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i5-4300u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i5-4300u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i5-4300y_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i5-4300y:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i5-4302y_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i5-4302y:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i5-4308u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i5-4308u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i5-4310m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i5-4310m:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i5-4310u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i5-4310u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i5-4330m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i5-4330m:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i5-4340m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i5-4340m:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i5-4350u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i5-4350u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i5-4360u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i5-4360u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i5-4200h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i5-4200h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i5-4200m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i5-4200m:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i5-4200u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i5-4200u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i5-4200y_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i5-4200y:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i5-4202y_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i5-4202y:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i5-4210h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i5-4210h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i5-4210m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i5-4210m:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i5-4210u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i5-4210u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i5-4210y_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i5-4210y:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i5-4220y_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i5-4220y:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i5-4250u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i5-4250u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i5-4258u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i5-4258u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i5-4260u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i5-4260u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i5-4278u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i5-4278u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i5-4288u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i5-4288u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i3-4330_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i3-4330:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i3-4330t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i3-4330t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i3-4330te_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i3-4330te:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i3-4340_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i3-4340:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i3-4340te_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i3-4340te:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i3-4350_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i3-4350:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i3-4350t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i3-4350t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i3-4360_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i3-4360:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i3-4360t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i3-4360t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i3-4370_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i3-4370:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i3-4370t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i3-4370t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i3-4100e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i3-4100e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i3-4100m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i3-4100m:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i3-4100u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i3-4100u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i3-4102e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i3-4102e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i3-4110e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i3-4110e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i3-4110m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i3-4110m:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i3-4112e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i3-4112e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i3-4120u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i3-4120u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i3-4158u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i3-4158u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i3-4170t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i3-4170t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i3-4170_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i3-4170:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i3-4160t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i3-4160t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i3-4160_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i3-4160:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i3-4150t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i3-4150t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i3-4150_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i3-4150:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i3-4130t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i3-4130t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i3-4130_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i3-4130:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i3-4000m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i3-4000m:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i3-4005u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i3-4005u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i3-4010u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i3-4010u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i3-4010y_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i3-4010y:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i3-4012y_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i3-4012y:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i3-4020y_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i3-4020y:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i3-4025u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i3-4025u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i3-4030u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i3-4030u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i3-4030y_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i3-4030y:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:3550m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:3550m:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:3556u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:3556u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:3558u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:3558u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:3560m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:3560m:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:3560y_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:3560y:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:3561y_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:3561y:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:3805u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:3805u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:3825u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:3825u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:2981u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:2981u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:2980u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:2980u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:2970m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:2970m:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:2961y_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:2961y:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:2957u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:2957u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:2955u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:2955u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:2950m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:2950m:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:2002e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:2002e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:2000e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:2000e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e7-8893_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e7-8893:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e7-8891_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e7-8891:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e7-8890_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e7-8890:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e7-8880l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e7-8880l:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e7-8880_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e7-8880:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e7-8870_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e7-8870:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e7-8867_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e7-8867:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e7-8860_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e7-8860:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e7-4850_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e7-4850:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e7-4830_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e7-4830:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e7-4820_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e7-4820:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e7-4809_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e7-4809:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2699_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e5-2699:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-4669_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e5-4669:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2438l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e5-2438l:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-1428l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e5-1428l:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-4667_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e5-4667:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2428l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e5-2428l:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-1620_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e5-1620:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-4660_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e5-4660:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2418l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e5-2418l:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-1630_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e5-1630:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2698_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e5-2698:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-4655_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e5-4655:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2408l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e5-2408l:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2697_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e5-2697:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-1650_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e5-1650:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-4650_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e5-4650:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-1660_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e5-1660:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-4648_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e5-4648:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-1680_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e5-1680:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2695_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e5-2695:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-4640_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e5-4640:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2690_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e5-2690:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-4627_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e5-4627:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2687w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e5-2687w:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-4620_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e5-4620:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-4610_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e5-4610:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2683_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e5-2683:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2680_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e5-2680:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2670_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e5-2670:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2667_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e5-2667:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2660_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e5-2660:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2658a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e5-2658a:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2658_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e5-2658:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2650l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e5-2650l:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2650_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e5-2650:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2648l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e5-2648l:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2643_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e5-2643:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2640_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e5-2640:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2637_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e5-2637:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2630l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e5-2630l:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2630_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e5-2630:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2628l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e5-2628l:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2623_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e5-2623:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2620_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e5-2620:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2618l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e5-2618l:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2609_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e5-2609:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2608l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e5-2608l:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2603_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e5-2603:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e3-1286l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e3-1286l:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e3-1286_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e3-1286:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e3-1285l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e3-1285l:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e3-1285_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e3-1285:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e3-1281_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e3-1281:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e3-1280_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e3-1280:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e3-1276_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e3-1276:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e3-1275l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e3-1275l:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e3-1270_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e3-1270:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e3-1268l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e3-1268l:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e3-1271_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e3-1271:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e3-1275_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e3-1275:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e3-1265l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e3-1265l:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e3-1246_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e3-1246:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e3-1245_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e3-1245:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e3-1241_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e3-1241:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e3-1240l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e3-1240l:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e3-1240_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e3-1240:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e3-1231_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e3-1231:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e3-1230l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e3-1230l:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e3-1230_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e3-1230:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e3-1226_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e3-1226:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e3-1225_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e3-1225:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e3-1220l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e3-1220l:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e3-1220_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e3-1220:3:*:*:*:*:*:*:*" ]
null
null
3.3
2.1
CVE-2024-33575
WordPress User Meta plugin <= 3.0 - Sensitive Data Exposure vulnerability
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in User Meta user-meta.This issue affects User Meta: from n/a through 3.0.
[ "cpe:2.3:a:usermeta:user_meta_user_profile_builder_and_user_management:1.0.0:*:*:*:*:wordpress:*:*" ]
null
5.3
null
null
GHSA-63fp-m4v5-qwjh
Cross-site scripting (XSS) vulnerability in the BibTex Publications (si_bibtex) extension 0.2.3 for TYPO3 allows remote attackers to inject arbitrary web script or HTML via vectors related to the import functionality.
[]
null
null
null
null
CVE-2022-21547
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Federated). Supported versions that are affected are 8.0.29 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
[ "cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*", "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*", "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*" ]
null
4.9
null
null
CVE-2006-1288
Multiple SQL injection vulnerabilities in Invision Power Board (IPB) 2.0.4 and 2.1.4 before 20060105 allow remote attackers to execute arbitrary SQL commands via cookies, related to (1) arrays of id/stamp pairs and (2) the keys in arrays of key/value pairs in ipsclass.php; (3) the topics variable in usercp.php; and the topicsread cookie in (4) topics.php, (5) search.php, and (6) forums.php.
[ "cpe:2.3:a:invision_power_services:invision_power_board:2.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:invision_power_services:invision_power_board:2.1.4:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2024-26450
An issue exists within Piwigo before v.14.2.0 allowing a malicious user to take over the application. This exploit involves chaining a Cross Site Request Forgery vulnerability to issue a Stored Cross Site Scripting payload stored within an Admin user's dashboard, executing remote JavaScript. This can be used to upload a new PHP file under an administrator and directly call that file from the victim's instance to connect back to a malicious listener.
[]
null
5.4
null
null
RHSA-2024:2773
Red Hat Security Advisory: OpenShift Container Platform 4.15.13 bug fix and security update
goproxy: Denial of service (DoS) via unspecified vectors. opentelemetry: DoS vulnerability in otelhttp golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS opentelemetry-go-contrib: DoS vulnerability in otelgrpc due to unbound cardinality metrics golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON jose-go: improper handling of highly compressed data
[ "cpe:/a:redhat:openshift:4.15::el8", "cpe:/a:redhat:openshift:4.15::el9" ]
null
4.3
null
null
CVE-2003-1426
Openwebmail in cPanel 5.0, when run using suid Perl, adds the directory in the SCRIPT_FILENAME environment variable to Perl's @INC include array, which allows local users to execute arbitrary code by modifying SCRIPT_FILENAME to reference a directory containing a malicious openwebmail-shared.pl executable.
[ "cpe:2.3:a:cpanel:cpanel:5.0:*:*:*:*:*:*:*" ]
null
null
null
3.3
cisco-sa-ise-stored-xss-TWwjVPdL
Cisco Identity Services Engine Stored Cross-Site Scripting Vulnerabilities
Multiple vulnerabilities in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user. These vulnerabilities exist because the web-based management interface does not sufficiently validate user-supplied input. An attacker could exploit these vulnerabilities by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit these vulnerabilities, the attacker would need valid administrative credentials. Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.
[]
null
4.8
null
null
CVE-2022-34185
Jenkins Date Parameter Plugin 0.0.4 and earlier does not escape the name and description of Date parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
[ "cpe:2.3:a:jenkins:date_parameter:*:*:*:*:*:jenkins:*:*" ]
null
5.4
null
3.5
GHSA-r8qm-cxjj-8wpg
Improper Neutralization of Special Elements used in an SQL Command leading to Unauthenticated SQL Injection vulnerability, impacting SonicWall GMS 9.3.1-SP2-Hotfix1, Analytics On-Prem 2.5.0.3-2520 and earlier versions.
[]
null
9.8
null
null
CVE-2022-39885
Improper access control vulnerability in BootCompletedReceiver_CMCC in DeviceManagement prior to SMR Nov-2022 Release 1 allows local attacker to access to Device information.
[ "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*" ]
null
5.9
null
null
RHSA-2003:270
Red Hat Security Advisory: kdebase security update
security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws" ]
null
null
null
null
GHSA-5jfm-fvc2-73xf
An issue has been discovered in GitLab CE/EE affecting all versions starting from 9.3 before 16.0.8, all versions starting from 16.1 before 16.1.3, all versions starting from 16.2 before 16.2.2. A Regular Expression Denial of Service was possible via sending crafted payloads which use ProjectReferenceFilter to the preview_markdown endpoint.
[]
null
7.5
null
null
CVE-2013-1174
Cisco Tivoli Business Service Manager (TBSM) in Hosted Collaboration Mediation (HCM) in Cisco Hosted Collaboration Solution allows remote attackers to cause a denial of service (temporary service hang) by sending many TCP packets to certain ports, aka Bug ID CSCue03703.
[ "cpe:2.3:a:cisco:hosted_collaboration_solution:-:*:*:*:*:*:*:*" ]
null
null
null
5
GHSA-39qv-pm69-m738
Cross-Site Request Forgery (CSRF) vulnerability in finnj Frontier Post allows Cross Site Request Forgery.This issue affects Frontier Post: from n/a through 6.1.
[]
null
5.4
null
null
CVE-2017-13796
An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari before 11.0.1 is affected. iCloud before 7.1 on Windows is affected. iTunes before 12.7.1 on Windows is affected. tvOS before 11.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
[ "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "cpe:2.3:a:apple:webkit:-:*:*:*:*:*:*:*" ]
null
null
8.8
6.8
CVE-2022-40899
An issue discovered in Python Charmers Future 0.18.2 and earlier allows remote attackers to cause a denial of service via crafted Set-Cookie header from malicious web server.
[ "cpe:2.3:a:pythoncharmers:python-future:*:*:*:*:*:python:*:*" ]
null
7.5
null
null
GHSA-5rh6-96pv-hfcx
Vulnerability in the PeopleSoft Enterprise PT PeopleTools component of Oracle PeopleSoft Products (subcomponent: SQR). Supported versions that are affected are 8.54, 8.55 and 8.56. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PT PeopleTools. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise PT PeopleTools accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise PT PeopleTools accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of PeopleSoft Enterprise PT PeopleTools. CVSS 3.0 Base Score 7.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L).
[]
null
null
7.3
null
CVE-2017-11565
debian/tor.init in the Debian tor_0.2.9.11-1~deb9u1 package for Tor was designed to execute aa-exec from the standard system pathname if the apparmor package is installed, but implements this incorrectly (with a wrong assumption that the specific pathname would remain the same forever), which allows attackers to bypass intended AppArmor restrictions by leveraging the silent loss of this protection mechanism. NOTE: this does not affect systems, such as default Debian stretch installations, on which Tor startup relies on a systemd unit file (instead of this tor.init script).
[ "cpe:2.3:a:debian:tor:0.2.9.11-1:*:*:*:*:*:*:*" ]
null
null
7.5
5
CVE-2020-14131
The Xiaomi Security Center expresses heartfelt thanks to ADLab of VenusTech ! At the same time, we also welcome more outstanding and professional security experts and security teams to join the Mi Security Center (MiSRC) to jointly ensure the safe access of millions of Xiaomi users worldwide Life.
[ "cpe:2.3:a:mi:xiaomi:-:*:*:*:*:*:*:*" ]
null
9.8
null
null
GHSA-g759-wxh6-x7jp
Evernote 6.15 on Windows has an incorrectly repaired stored XSS vulnerability. An attacker can use this XSS issue to inject Node.js code under Present mode. After a victim opens an affected note under Present mode, the attacker can read the victim's files and achieve remote execution command on the victim's computer.
[]
null
null
null
null
CVE-2005-4817
Format string vulnerability in ui.c in Textbased MSN Client (TMSNC) before 0.2.5 allows attackers to cause a denial of service and possibly execute arbitrary code via unknown attack vectors that cause format strings to be injected into the wprintw function.
[ "cpe:2.3:a:tmsnc:tmsnc:0.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:tmsnc:tmsnc:0.1.0a:*:*:*:*:*:*:*", "cpe:2.3:a:tmsnc:tmsnc:0.1.0b:*:*:*:*:*:*:*", "cpe:2.3:a:tmsnc:tmsnc:0.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:tmsnc:tmsnc:0.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:tmsnc:tmsnc:0.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:tmsnc:tmsnc:0.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:tmsnc:tmsnc:0.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:tmsnc:tmsnc:0.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:tmsnc:tmsnc:0.2.0b:*:*:*:*:*:*:*", "cpe:2.3:a:tmsnc:tmsnc:0.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:tmsnc:tmsnc:0.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:tmsnc:tmsnc:0.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:tmsnc:tmsnc:0.2.4:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-h7c9-gjhc-27w5
A vulnerability has been identified in XHQ (All versions < V6.0.0.2). The web interface could allow for an an attacker to craft the input in a form that is not expected, causing the application to behave in unexpected ways for legitimate users. Successful exploitation requires for an attacker to be authenticated to the web interface. A successful attack could cause the application to have unexpected behavior. This could allow the attacker to modify contents of the web application. At the time of advisory publication no public exploitation of this security vulnerability was known.
[]
null
null
null
null
CVE-2021-31180
Microsoft Office Graphics Remote Code Execution Vulnerability
Microsoft Office Graphics Remote Code Execution Vulnerability
[ "cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:*:*", "cpe:2.3:a:microsoft:office:2013:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2013:sp1:*:*:rt:*:*:*", "cpe:2.3:a:microsoft:office:2019:*:*:*:*:-:*:*", "cpe:2.3:a:microsoft:word:2013:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:word:2013:sp1:*:*:rt:*:*:*", "cpe:2.3:a:microsoft:word:2016:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2013:sp1:*:*:*:*:x86:*", "cpe:2.3:a:microsoft:office:2013:sp1:*:*:*:*:x64:*" ]
null
7.8
null
null
GHSA-cw43-6v89-qww5
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
[]
null
null
null
null
GHSA-77j3-wqmc-3rp8
The Ultimate Member WordPress plugin before 2.6.7 does not prevent visitors from creating user accounts with arbitrary capabilities, effectively allowing attackers to create administrator accounts at will. This is actively being exploited in the wild.
[]
null
9.8
null
null
CVE-2023-1429
Cross-site Scripting (XSS) - Reflected in pimcore/pimcore
Cross-site Scripting (XSS) - Reflected in GitHub repository pimcore/pimcore prior to 10.5.19.
[ "cpe:2.3:a:pimcore:pimcore:*:*:*:*:*:*:*:*" ]
null
null
4
null
CVE-2020-14825
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via IIOP, T3 to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
[ "cpe:2.3:a:oracle:weblogic_server:12.2.1.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:weblogic_server:14.1.1.0.0:*:*:*:*:*:*:*" ]
null
9.8
null
null
CVE-2017-9208
libqpdf.a in QPDF 6.0.0 allows remote attackers to cause a denial of service (infinite recursion and stack consumption) via a crafted PDF document, related to releaseResolved functions, aka qpdf-infiniteloop1.
[ "cpe:2.3:a:qpdf_project:qpdf:6.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*" ]
null
null
5.5
4.3
GHSA-4jcj-f5hc-phm8
SuiteCRM before 7.10.33 and 7.11.22 allows information disclosure via Directory Traversal. An attacker can partially include arbitrary files via the importFile parameter of the RefreshMapping import functionality.
[]
null
null
null
null
CVE-2021-46343
There is an Assertion 'context_p->token.type == LEXER_LITERAL' failed at /jerry-core/parser/js/js-parser-expr.c in JerryScript 3.0.0.
[ "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*" ]
null
5.5
null
4.3
GHSA-xcwm-wrf2-369r
An issue was addressed with improved handling of temporary files. This issue is fixed in macOS Monterey 12.7.2, macOS Ventura 13.6.3, iOS 17.2 and iPadOS 17.2, iOS 16.7.3 and iPadOS 16.7.3, macOS Sonoma 14.2. An app may be able to modify protected parts of the file system.
[]
null
5.5
null
null
CVE-2009-1669
The smarty_function_math function in libs/plugins/function.math.php in Smarty 2.6.22 allows context-dependent attackers to execute arbitrary commands via shell metacharacters in the equation attribute of the math function. NOTE: some of these details are obtained from third party information.
[ "cpe:2.3:a:smarty:smarty:2.6.22:*:*:*:*:*:*:*" ]
null
null
null
10
RHSA-2021:4859
Red Hat Security Advisory: kpatch-patch security update
kernel: use-after-free in drivers/infiniband/core/ucma.c ctx use-after-free
[ "cpe:/o:redhat:rhel_eus:8.2::baseos" ]
null
7.8
null
null
CVE-2011-0117
WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.
[ "cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:4.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:4.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:4.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:4.5:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:4.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:4.6:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:4.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:4.7:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:4.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:4.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:4.7.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:4.8.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:4.9.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:5.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:6.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:6.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:6.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:6.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:6.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:6.0.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:6.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:7.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:7.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:7.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:7.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:7.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:7.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:7.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:7.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:7.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:7.4:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:7.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:7.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:7.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:7.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:7.5:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:7.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:7.6:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:7.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:7.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:7.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:7.7:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:7.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:7.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:8.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:8.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:8.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:8.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:8.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:8.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:8.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:9.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:9.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:9.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:9.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:9.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:9.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:10.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:10.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:10.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:10.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:webkit:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*" ]
null
null
null
7.6
GHSA-f7cx-mjqx-2qmw
Rockwell Automation MicroLogix 1400 Controllers Series B v21.001 and prior, Series A, all versions, MicroLogix 1100 Controller, all versions, RSLogix 500 Software v12.001 and prior, The cryptographic function utilized to protect the password in MicroLogix is discoverable.
[]
null
null
null
null
CVE-2024-7409
Qemu: denial of service via improper synchronization in qemu nbd server during socket closure
A flaw was found in the QEMU NBD Server. This vulnerability allows a denial of service (DoS) attack via improper synchronization during socket closure when a client keeps a socket open as the server is taken offline.
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb", "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:rhel_eus:9.2::appstream", "cpe:/a:redhat:rhel_eus:9.4::appstream", "cpe:/a:redhat:openshift:4.13::el8", "cpe:/a:redhat:openshift:4.13::el9", "cpe:/a:redhat:openshift:4.14::el8", "cpe:/a:redhat:openshift:4.14::el9", "cpe:/a:redhat:openshift:4.15::el9", "cpe:/a:redhat:openshift:4.15::el8", "cpe:/a:redhat:openshift:4.16::el9", "cpe:/a:redhat:openshift:4.17::el9", "cpe:/o:redhat:enterprise_linux:6", "cpe:/o:redhat:enterprise_linux:7", "cpe:/a:redhat:advanced_virtualization:8::el8" ]
null
null
7.5
null
CVE-2020-19697
Cross Site Scripting vulnerability found in Pandao Editor.md v.1.5.0 allows a remote attacker to execute arbitrary code via a crafted script in the <iframe>src parameter.
[ "cpe:2.3:a:ipandao:editor.md:1.5.0:*:*:*:*:*:*:*" ]
null
6.1
null
null
GHSA-x9fc-f93f-rjcg
Vulnerability in wordpress plugin add-edit-delete-listing-for-member-module v1.0, The plugin author does not sanitize user supplied input via $act before passing it into an SQL statement.
[]
null
null
7.2
null
GHSA-9723-3qmw-g98x
Imlib before 1.9.13 sometimes uses the NetPBM package to load trusted images, which could allow attackers to cause a denial of service (crash) and possibly execute arbitrary code via certain weaknesses of NetPBM.
[]
null
null
null
null
GHSA-h632-qvv7-2623
A use of uninitialized pointer vulnerability exists in the GRO format res functionality of Open Babel 3.1.1 and master commit 530dbfa3. A specially crafted malformed file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.
[]
null
9.8
null
null
GHSA-949q-m2rc-xq42
Buffer overflow in ntdll.dll on Microsoft Windows NT 4.0, Windows NT 4.0 Terminal Server Edition, Windows 2000, and Windows XP allows remote attackers to execute arbitrary code, as demonstrated via a WebDAV request to IIS 5.0.
[]
null
null
null
null
CVE-2024-26159
Microsoft ODBC Driver Remote Code Execution Vulnerability
Microsoft ODBC Driver Remote Code Execution Vulnerability
[ "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*" ]
null
8.8
null
null
CVE-2018-8569
A remote code execution vulnerability exists in the Yammer desktop application due to the loading of arbitrary content, aka "Yammer Desktop Application Remote Code Execution Vulnerability." This affects Yammer Desktop App.
[ "cpe:2.3:a:microsoft:yammer:-:*:*:*:*:*:*:*" ]
null
null
7.8
6.8
CVE-2019-1020008
stacktable.js before 1.0.4 allows XSS.
[ "cpe:2.3:a:stacktable.js_project:stacktable.js:*:*:*:*:*:jquery:*:*" ]
null
null
6.1
4.3
GHSA-q33x-v84x-v9q4
Cross-site scripting (XSS) vulnerability in the Uk Cookie (aka uk-cookie) plugin for WordPress allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
[]
null
null
null
null
CVE-2009-3698
An unspecified function in the Dalvik API in Android 1.5 and earlier allows remote attackers to cause a denial of service (system process restart) via a crafted application, possibly a related issue to CVE-2009-2656.
[ "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*" ]
null
null
null
4.3
GHSA-8xvc-jc9j-m9q3
In all Android releases from CAF using the Linux kernel, an untrusted pointer dereference vulnerability exists in WideVine DRM.
[]
null
null
7.8
null
CVE-2009-4352
Multiple cross-site scripting (XSS) vulnerabilities in TransWARE Active! mail 2003 build 2003.0139.0871 and earlier, and possibly other versions before 2003.0139.0939, allow remote attackers to inject arbitrary web script or HTML via the (1) From, (2) To, (3) Cc, and (4) Bcc parameters.
[ "cpe:2.3:a:transware:active_mail_2003:*:*:*:*:*:*:*:*" ]
null
null
null
4.3
CVE-2021-26305
An issue was discovered in Deserializer::read_vec in the cdr crate before 0.2.4 for Rust. A user-provided Read implementation can gain access to the old contents of newly allocated heap memory, violating soundness.
[ "cpe:2.3:a:cdr_project:cdr:*:*:*:*:*:rust:*:*" ]
null
9.8
null
7.5
CVE-2023-32398
A use-after-free issue was addressed with improved memory management. This issue is fixed in watchOS 9.5, tvOS 16.5, macOS Ventura 13.4, iOS 15.7.6 and iPadOS 15.7.6, macOS Big Sur 11.7.7, macOS Monterey 12.6.6, iOS 16.5 and iPadOS 16.5. An app may be able to execute arbitrary code with kernel privileges.
[ "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*" ]
null
7.8
null
null
GHSA-455w-hgxv-564m
A Time-of-Check to Time-of-Use (TOCTOU) vulnerability has been identified in the driver of the NDD Print solution, which could allow an unprivileged user to exploit this flaw and gain SYSTEM-level access on the device. The vulnerability affects version 5.24.3 and before of the software.
[]
null
7.8
null
null
GHSA-wxcf-mf79-c7x3
Rejected reason: This is unused.
[]
null
null
null
null
GHSA-92m2-25h5-v72m
TP-Link M7350 devices through 1.0.16 Build 181220 Rel.1116n allow portMappingProtocol OS Command Injection (issue 3 of 5).
[]
null
9.8
null
null
CVE-2011-4063
chan_sip.c in the SIP channel driver in Asterisk Open Source 1.8.x before 1.8.7.1 and 10.x before 10.0.0-rc1 does not properly initialize variables during request parsing, which allows remote authenticated users to cause a denial of service (daemon crash) via a malformed request.
[ "cpe:2.3:a:asterisk:open_source:1.8.7:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:10.0.0:*:*:*:*:*:*:*" ]
null
null
null
6.8
CVE-2020-25494
Xinuos (formerly SCO) Openserver v5 and v6 allows attackers to execute arbitrary commands via shell metacharacters in outputform or toclevels parameter to cgi-bin/printbook.
[ "cpe:2.3:a:xinuos:openserver:5.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:xinuos:openserver:6.0:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
CVE-2020-27782
A flaw was found in the Undertow AJP connector. Malicious requests and abrupt connection closes could be triggered by an attacker using query strings with non-RFC compliant characters resulting in a denial of service. The highest threat from this vulnerability is to system availability. This affects Undertow 2.1.5.SP1, 2.0.33.SP2, and 2.2.3.SP1.
[ "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:openshift_application_runtimes:-:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:undertow:2.0.33:sp2:*:*:*:*:*:*", "cpe:2.3:a:redhat:undertow:2.1.5:sp1:*:*:*:*:*:*", "cpe:2.3:a:redhat:undertow:2.2.3:sp1:*:*:*:*:*:*" ]
null
7.5
null
7.8
CVE-2014-0231
The mod_cgid module in the Apache HTTP Server before 2.4.10 does not have a timeout mechanism, which allows remote attackers to cause a denial of service (process hang) via a request to a CGI script that does not read from its stdin file descriptor.
[ "cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*" ]
null
null
null
5
GHSA-p5cg-9ppf-9gvh
Microsoft Internet Explorer 6 and 8 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."
[]
null
null
null
null
CVE-2017-5251
In version 1012 and prior of Insteon's Insteon Hub, the radio transmissions used for communication between the hub and connected devices are not encrypted.
[ "cpe:2.3:o:insteon:insteon_hub_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:insteon:insteon_hub:-:*:*:*:*:*:*:*" ]
null
null
8.1
6.8
CVE-2025-22354
WordPress Digi Store theme <= 1.1.4 - Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Code Themes Digi Store allows DOM-Based XSS.This issue affects Digi Store: from n/a through 1.1.4.
[]
null
6.5
null
null
CVE-2020-35678
Autobahn|Python before 20.12.3 allows redirect header injection.
[ "cpe:2.3:a:crossbar:autobahn:*:*:*:*:*:*:*:*" ]
null
6.1
null
5.8
CVE-2016-6497
main/java/org/apache/directory/groovyldap/LDAP.java in the Groovy LDAP API in Apache allows attackers to conduct LDAP entry poisoning attacks by leveraging setting returnObjFlag to true for all search methods.
[ "cpe:2.3:a:apache:groovy_ldap:*:*:*:*:*:*:*:*" ]
null
7.5
null
5
CVE-2015-10048
bmattoso desafio_buzz_woody sql injection
A vulnerability was found in bmattoso desafio_buzz_woody. It has been rated as critical. This issue affects some unknown processing. The manipulation leads to sql injection. The identifier of the patch is cb8220cbae06082c969b1776fcb2fdafb3a1006b. It is recommended to apply a patch to fix this issue. The identifier VDB-218357 was assigned to this vulnerability.
[ "cpe:2.3:a:desafio_buzz_woody_project:desafio_buzz_woody:*:*:*:*:*:*:*:*" ]
null
5.5
5.5
5.2
CVE-2023-31002
IBM Security Access Manager Container information disclosure
IBM Security Access Manager Container 10.0.0.0 through 10.0.6.1 temporarily stores sensitive information in files that could be accessed by a local user. IBM X-Force ID: 254657.
[ "cpe:2.3:a:ibm:security_access_manager_container:*:*:*:*:*:*:*:*" ]
null
5.1
null
null
CVE-2019-15251
Cisco SPA100 Series Analog Telephone Adapters Remote Code Execution Vulnerabilities
Multiple vulnerabilities in Cisco SPA100 Series Analog Telephone Adapters (ATAs) could allow an authenticated, adjacent attacker to execute arbitrary code with elevated privileges. The vulnerabilities are due to improper validation of user-supplied input to the web-based management interface. An attacker could exploit these vulnerabilities by authenticating to the web-based management interface and sending crafted requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code with elevated privileges. Note: The web-based management interface is enabled by default.
[ "cpe:2.3:o:cisco:spa112_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:spa112_firmware:1.4.1:-:*:*:*:*:*:*", "cpe:2.3:o:cisco:spa112_firmware:1.4.1:sr1:*:*:*:*:*:*", "cpe:2.3:o:cisco:spa112_firmware:1.4.1:sr2:*:*:*:*:*:*", "cpe:2.3:o:cisco:spa112_firmware:1.4.1:sr3:*:*:*:*:*:*", "cpe:2.3:o:cisco:spa112_firmware:1.4.1:sr4:*:*:*:*:*:*", "cpe:2.3:h:cisco:spa112:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:spa122_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:spa122_firmware:1.4.1:-:*:*:*:*:*:*", "cpe:2.3:o:cisco:spa122_firmware:1.4.1:sr1:*:*:*:*:*:*", "cpe:2.3:o:cisco:spa122_firmware:1.4.1:sr2:*:*:*:*:*:*", "cpe:2.3:o:cisco:spa122_firmware:1.4.1:sr3:*:*:*:*:*:*", "cpe:2.3:o:cisco:spa122_firmware:1.4.1:sr4:*:*:*:*:*:*", "cpe:2.3:h:cisco:spa122:-:*:*:*:*:*:*:*" ]
null
null
8
null
GHSA-g636-q5fc-4pr7
accounts: Hash account number using Salt
@alovak found that currently when we build hash of account number we do not "salt" it. Which makes it vulnerable to rainbow table attack.**What did you expect to see?** I expected salt (some random number from configuration) to be used in [hash.AccountNumber](https://github.com/moov-io/customers/blob/master/pkg/secrets/hash/account_number.go#L13)I would generate salt per tenant at least (maybe per organization).
[]
null
null
null
null
CVE-2025-28913
WordPress WP Add Active Class To Menu Item plugin <=1.0 - Cross Site Request Forgery (CSRF) vulnerability
Cross-Site Request Forgery (CSRF) vulnerability in Aftab Ali Muni WP Add Active Class To Menu Item allows Cross Site Request Forgery. This issue affects WP Add Active Class To Menu Item: from n/a through 1.0.
[]
null
4.3
null
null
CVE-2020-13860
An issue was discovered on Mofi Network MOFI4500-4GXeLTE 4.0.8-std devices. The one-time password algorithm for the undocumented system account mofidev generates a predictable six-digit password.
[ "cpe:2.3:o:mofinetwork:mofi4500-4gxelte_firmware:4.0.8-std:*:*:*:*:*:*:*", "cpe:2.3:h:mofinetwork:mofi4500-4gxelte:-:*:*:*:*:*:*:*" ]
null
7.5
null
5
CVE-2022-41678
Apache ActiveMQ: Insufficient API restrictions on Jolokia allow authenticated users to perform RCE
Once an user is authenticated on Jolokia, he can potentially trigger arbitrary code execution.  In details, in ActiveMQ configurations, jetty allows org.jolokia.http.AgentServlet to handler request to /api/jolokia org.jolokia.http.HttpRequestHandler#handlePostRequest is able to create JmxRequest through JSONObject. And calls to org.jolokia.http.HttpRequestHandler#executeRequest. Into deeper calling stacks, org.jolokia.handler.ExecHandler#doHandleRequest can be invoked through refection. This could lead to RCE through via various mbeans. One example is unrestricted deserialization in jdk.management.jfr.FlightRecorderMXBeanImpl which exists on Java version above 11. 1 Call newRecording. 2 Call setConfiguration. And a webshell data hides in it. 3 Call startRecording. 4 Call copyTo method. The webshell will be written to a .jsp file. The mitigation is to restrict (by default) the actions authorized on Jolokia, or disable Jolokia. A more restrictive Jolokia configuration has been defined in default ActiveMQ distribution. We encourage users to upgrade to ActiveMQ distributions version including updated Jolokia configuration: 5.16.6, 5.17.4, 5.18.0, 6.0.0.
[ "cpe:2.3:a:apache:activemq:*:*:*:*:*:*:*:*" ]
null
8.8
null
null
GHSA-5pg2-qg87-vmj7
Cross-site Scripting in microweber
Cross-site Scripting (XSS) - Stored in GitHub repository microweber/microweber prior to 1.2.19.
[]
null
5.4
null
null
GHSA-p5ch-7hc9-cv48
SAP Business One - version 10.0, allows an admin user to view DB password in plain text over the network, which should otherwise be encrypted. For an attacker to discover vulnerable function in-depth application knowledge is required, but once exploited the attacker may be able to completely compromise confidentiality, integrity, and availability of the application.
[]
null
null
null
null
GHSA-cp2r-29q5-494x
The CRM WordPress Plugin – RepairBuddy plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 3.8120. This is due to the plugin not properly validating a user's identity prior to updating their email through the wc_update_user_data AJAX action. This makes it possible for authenticated attackers, with subscriber-level access and above, to change arbitrary user's email addresses, including administrators, and leverage that to reset the user's password and gain access to their account.
[]
null
8.8
null
null
GHSA-p72g-cgh9-ghjg
Failing DTLS handshakes may cause throttling to block processing of records
ImpactFailing handshakes didn't cleanup counters for throttling. In consequence the threshold may get reached and will not be released again. The results in permanently dropping records. The issues was reported for certificate based handshakes, but it can't be excluded, that this happens also for PSK based handshakes. It generally affects client and server as well.Patchesmain: commit 726bac57659410da463dcf404b3e79a7312ac0b9 2.7.x: commit 5648a0c27c2c2667c98419254557a14bac2b1f3fUsers are requested to update to 3.7.0. If Californium 2 support is required, users are requested to update to 2.7.4.Workaroundsnone.
[]
null
8.2
null
null
GHSA-4f8m-x9c7-gvcq
Before version 4.8.2, WordPress mishandled % characters and additional placeholder values in $wpdb->prepare, and thus did not properly address the possibility of plugins and themes enabling SQL injection attacks.
[]
null
null
9.8
null
GHSA-3fcg-g48j-hrrr
The ElementsKit Elementor addons plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 3.0.3 via the ekit_widgetarea_content function. This makes it possible for unauthenticated attackers to obtain contents of posts in draft, private or pending review status that should not be visible to the general public. This applies to posts created with Elementor only.
[]
null
5.3
null
null
GHSA-r36w-qc6c-g892
A crafted request with invalid offsets may cause an out-of-bounds read or write access in CODESYS V2 Runtime Toolkit 32 Bit full and PLCWinNT prior to versions V2.4.7.56, resulting in a denial-of-service condition or local memory overwrite.
[]
null
8.1
null
null
GHSA-82jw-whc4-3j7f
Microsoft Internet Explorer 7 through 11 and Microsoft Edge allow remote attackers to bypass the ASLR protection mechanism via a crafted web site, aka "Microsoft Browser ASLR Bypass."
[]
null
null
null
null
CVE-2021-34696
Cisco ASR 900 and ASR 920 Series Aggregation Services Routers Access Control List Bypass Vulnerability
A vulnerability in the access control list (ACL) programming of Cisco ASR 900 and ASR 920 Series Aggregation Services Routers could allow an unauthenticated, remote attacker to bypass a configured ACL. This vulnerability is due to incorrect programming of hardware when an ACL is configured using a method other than the configuration CLI. An attacker could exploit this vulnerability by attempting to send traffic through an affected device. A successful exploit could allow the attacker to bypass an ACL on the affected device.
[ "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_902:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_903:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_907:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_920-10sz-pd:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_920-10sz-pd_r:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_920-12cz-a:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_920-12cz-a_r:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_920-12cz-d:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_920-12cz-d_r:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_920-12sz-im:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_920-12sz-im_r:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_920-24sz-im:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_920-24sz-im_r:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_920-24sz-m:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_920-24sz-m_r:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_920-24tz-m:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_920-24tz-m_r:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_920-4sz-a:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_920-4sz-a_r:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_920-4sz-d:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_920-4sz-d_r:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_920u-12sz-im:-:*:*:*:*:*:*:*" ]
null
5.8
null
null
GHSA-rvhx-68h5-664f
Diagnostics functionality on D-Link DSL-3782 devices with firmware EU v. 1.01 has a buffer overflow, allowing authenticated remote attackers to execute arbitrary code via a long Addr value to the 'set Diagnostics_Entry' function in an HTTP request, related to /userfs/bin/tcapi.
[]
null
null
8.8
null
CVE-2025-21361
Microsoft Outlook Remote Code Execution Vulnerability
Microsoft Outlook Remote Code Execution Vulnerability
[]
null
7.8
null
null
CVE-2000-0031
The initscripts package in Red Hat Linux allows local users to gain privileges via a symlink attack.
[ "cpe:2.3:o:redhat:linux:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:linux:6.1:*:*:*:*:*:*:*" ]
null
null
null
6.2
CVE-2025-3793
Buddypress Force Password Change <= 0.1 - Authenticated (Subscriber+) Account Takeover via Password Update
The Buddypress Force Password Change plugin for WordPress is vulnerable to authenticated account takeover due to the plugin not properly validating a user's identity prior to updating their password through the 'bp_force_password_ajax' function in all versions up to, and including, 0.1. This makes it possible for authenticated attackers, with subscriber-level access and above and under certain prerequisites, to change arbitrary user's passwords, including administrators, and leverage that to gain access to their accounts.
[]
null
4.2
null
null
GHSA-qc22-6662-58rj
A technical user has hardcoded credentials in Wallstreet Suite TRM 7.4.83 (64-bit edition) with higher privilege than the average authenticated user.
[]
null
null
null
null
CVE-2024-11032
Parsi Date <= 5.1.1 - Reflected Cross-Site Scripting via add_query_arg Parameter
The Parsi Date plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 5.1.1. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
[]
null
6.1
null
null
GHSA-9g32-9j7m-w6rc
An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
[]
null
null
8.8
null
GHSA-37c7-c3v8-w5p9
The (1) Aruba Mobility Controllers 200, 600, 2400, and 6000 and (2) Alcatel-Lucent OmniAccess Wireless 43xx and 6000 do not properly implement authentication and privilege assignment for the guest account, which allows remote attackers to access administrative interfaces or the WLAN.
[]
null
null
null
null
GHSA-7h3f-x6h2-qjgj
A vulnerability in the remote access SSL VPN features of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to improper validation of errors that are logged as a result of client connections that are made using remote access VPN. An attacker could exploit this vulnerability by sending crafted requests to an affected system. A successful exploit could allow the attacker to cause the affected device to restart, resulting in a DoS condition.
[]
null
7.5
null
null
GHSA-jv5w-jhcc-wx4g
A vulnerability in pam_modules of SUSE Linux Enterprise allows attackers to log into accounts that should have been disabled. Affected releases are SUSE Linux Enterprise: versions prior to 12.
[]
null
null
9.8
null