id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
139k
cpes
sequencelengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
GHSA-3q6w-vp42-26vx
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Ajay Sharma wordpress login form to anywhere allows Stored XSS. This issue affects wordpress login form to anywhere: from n/a through 0.2.
[]
null
5.9
null
null
GHSA-wj5v-7qmm-hqcg
Huawei FusionSphere OpenStack V100R006C000SPC102 (NFV) has an information leak vulnerability due to the use of a low version transmission protocol by default. An attacker could intercept packets transferred by a target device. Successful exploit could cause an information leak.
[]
null
null
3.7
null
GHSA-w9j2-68r5-mpp4
A vulnerability was found in ageerle ruoyi-ai up to 2.0.1 and classified as critical. Affected by this issue is some unknown functionality of the file ruoyi-modules/ruoyi-system/src/main/java/org/ruoyi/system/controller/system/SysModelController.java of the component API Interface. The manipulation leads to improper authorization. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 2.0.2 is able to address this issue. The name of the patch is c0daf641fb25b244591b7a6c3affa35c69d321fe. It is recommended to upgrade the affected component.
[]
6.9
7.3
null
null
CVE-2025-27702
Permissions bypass in the management console of Absolute Secure Access prior to version 13.54
CVE-2025-27702 is a vulnerability in the management console of Absolute Secure Access prior to version 13.54. Attackers with administrative access to the console and who have been assigned a certain set of permissions can bypass those permissions to improperly modify settings. The attack complexity is low, there are no preexisting attack requirements; the privileges required are high, and there is no user interaction required. There is no impact to system confidentiality or availability, impact to system integrity is high.
[]
6.9
null
null
null
CVE-2013-0915
The GPU process in Google Chrome OS before 25.0.1364.173 allows attackers to cause a denial of service or possibly have unspecified other impact via vectors related to an "overflow."
[ "cpe:2.3:o:google:chrome_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.2:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.3:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.5:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.7:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.8:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.9:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.10:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.11:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.12:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.13:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.14:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.15:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.16:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.17:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.18:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.19:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.20:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.21:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.22:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.23:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.24:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.25:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.26:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.27:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.28:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.29:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.30:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.31:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.32:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.33:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.34:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.35:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.36:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.37:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.38:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.39:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.40:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.41:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.42:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.43:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.44:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.45:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.46:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.47:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.48:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.49:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.50:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.51:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.52:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.53:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.54:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.55:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.56:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.57:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.58:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.61:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.62:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.63:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.65:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.66:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.67:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.68:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.70:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.72:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.73:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.74:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.75:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.76:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.77:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.78:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.79:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.80:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.81:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.82:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.84:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.85:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.86:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.87:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.88:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.89:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.90:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.91:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.92:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.93:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.95:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.98:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.99:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.108:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.110:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.112:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.113:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.114:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.115:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.116:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.117:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.118:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.119:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.120:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.121:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.122:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.123:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.124:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.125:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.126:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.152:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.154:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.155:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.156:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.159:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.160:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.161:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.168:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.169:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.170:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:25.0.1364.171:*:*:*:*:*:*:*" ]
null
null
null
10
GHSA-7jhf-r279-2cjx
The SSL client implementation in BEA WebLogic Server 7.0 SP7, 8.1 SP2 through SP6, 9.0, 9.1, 9.2 Gold through MP2, and 10.0 sometimes selects the null cipher when others are available, which might allow remote attackers to intercept communications.
[]
null
null
null
null
CVE-2025-4807
SourceCodester Online Student Clearance System exposure of information through directory listing
A vulnerability, which was classified as problematic, was found in SourceCodester Online Student Clearance System 1.0. This affects an unknown part. The manipulation leads to exposure of information through directory listing. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
[]
6.9
5.3
5.3
5
CVE-1999-0876
Buffer overflow in Internet Explorer 4.0 via EMBED tag.
[ "cpe:2.3:a:microsoft:ie:3.0:*:mac_os:*:*:*:*:*", "cpe:2.3:a:microsoft:ie:3.1:*:mac_os:*:*:*:*:*", "cpe:2.3:a:microsoft:ie:4.0:a:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:4.1:*:*:*:*:*:*:*" ]
null
null
null
10
CVE-2019-14611
Integer overflow in firmware for Intel(R) NUC(R) may allow a privileged user to potentially enable escalation of privilege via local access.
[ "cpe:2.3:o:intel:nuc_8_mainstream_game_kit_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_8_mainstream_game_kit:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc_8_mainstream_game_mini_computer_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc_8_mainstream_game_mini_computer:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc8i7bek_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc8i7bek:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:cd1p64gk_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:cd1p64gk:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc8i3cysm_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc8i3cysm:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc8i7hnk_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc8i7hnk:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc7i7dnke_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc7i7dnke:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc7i5dnke_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc7i5dnke:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc7i3dnhe_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc7i3dnhe:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:stk2mv64cc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:stk2mv64cc:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:stk2m3w64cc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:stk2m3w64cc:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc6i7kyk_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc6i7kyk:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc6i5syh_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc6i5syh:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc7cjyh_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc7cjyh:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:cd1m3128mk_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:cd1m3128mk:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:cd1iv128mk_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:cd1iv128mk:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:nuc6cays_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:nuc6cays:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:de3815tybe_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:de3815tybe:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:d34010wyb_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:d34010wyb:-:*:*:*:*:*:*:*" ]
null
6.7
null
4.6
CVE-2022-49373
watchdog: ts4800_wdt: Fix refcount leak in ts4800_wdt_probe
In the Linux kernel, the following vulnerability has been resolved: watchdog: ts4800_wdt: Fix refcount leak in ts4800_wdt_probe of_parse_phandle() returns a node pointer with refcount incremented, we should use of_node_put() on it when done. Add missing of_node_put() in some error paths.
[]
null
5.5
null
null
CVE-2006-5888
SQL injection vulnerability in viewarticle.asp in Superfreaker Studios UPublisher 1.0 allows remote attackers to execute arbitrary SQL commands via the ID parameter.
[ "cpe:2.3:a:superfreaker_studios:upublisher:1.0:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-r8xm-w48h-9p2p
A vulnerability in the web application of ctrlX OS allows a remote unauthenticated attacker to conduct various attacks against users of the vulnerable system, including web cache poisoning or Man-in-the-Middle (MitM), via a crafted HTTP request.
[]
null
5
null
null
CVE-2000-0873
netstat in AIX 4.x.x does not properly restrict access to the -Zi option, which allows local users to clear network interface statistics and possibly hide evidence of unusual network activities.
[ "cpe:2.3:o:ibm:aix:4.2:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:aix:4.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:aix:4.3:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:aix:4.3.1:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:aix:4.3.2:*:*:*:*:*:*:*" ]
null
null
null
2.1
CVE-2020-5571
SHARP AQUOS series (AQUOS SH-M02 build number 01.00.05 and earlier, AQUOS SH-RM02 build number 01.00.04 and earlier, AQUOS mini SH-M03 build number 01.00.04 and earlier, AQUOS Keitai SH-N01 build number 01.00.01 and earlier, AQUOS L2 (UQ mobile/J:COM) build number 01.00.05 and earlier, AQUOS sense lite SH-M05 build number 03.00.04 and earlier, AQUOS sense (UQ mobile) build number 03.00.03 and earlier, AQUOS compact SH-M06 build number 02.00.02 and earlier, AQUOS sense plus SH-M07 build number 02.00.02 and earlier, AQUOS sense2 SH-M08 build number 02.00.05 and earlier, and AQUOS sense2 (UQ mobile) build number 02.00.06 and earlier) allow an attacker to obtain the sensitive information of the device via malicious applications installed on the device.
[ "cpe:2.3:o:sharp:aquos_sh-m02_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:aquos_sh-m02:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:aquos_sh-rm02_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:aquos_sh-rm02:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:aquos_mini_sh-m03_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:aquos_mini_sh-m03:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:aquos_l2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:aquos_l2:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:aquos_sense_lite_sh-m05_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:aquos_sense_lite_sh-m05:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:aquos_sense_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:aquos_sense:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:aquos_compact_sh-m06_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:aquos_compact_sh-m06:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:aquos_sense_plus_sh-m07_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:aquos_sense_plus_sh-m07:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:aquos_sense2_sh-m08_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:aquos_sense2_sh-m08:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:aquos_sense2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:aquos_sense2:-:*:*:*:*:*:*:*" ]
null
7.5
null
5
GHSA-2fxx-275j-35vm
EMC RSA Identity Governance and Lifecycle versions 7.0.1, 7.0.2 (all patch levels); RSA Via Lifecycle and Governance version 7.0 (all patch levels); and RSA Identity Management and Governance (IMG) version 6.9.1 (all patch levels) have Stored Cross Site Scripting vulnerabilities that could potentially be exploited by malicious users to compromise an affected system.
[]
null
5.4
null
null
GHSA-p4j8-rc7w-24gr
An improper input validation the CSRF filter results in unsanitized user input written to the application logs.
[]
5.3
null
null
null
CVE-2009-3425
Directory traversal vulnerability in includes/inc.thcms_admin_dirtree.php in MaxCMS 3.11.20b allows remote attackers to read arbitrary files via directory traversal sequences in the thCMS_root parameter.
[ "cpe:2.3:a:databay:maxcms:3.11.20b:*:*:*:*:*:*:*" ]
null
null
null
5
CVE-2014-9962
In all Android releases from CAF using the Linux kernel, a vulnerability exists in the parsing of a DRM provisioning command.
[ "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*" ]
null
null
7.8
9.3
CVE-2025-23593
WordPress EmailPress plugin <= 1.0 - Reflected Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound EmailPress allows Reflected XSS. This issue affects EmailPress: from n/a through 1.0.
[]
null
7.1
null
null
RHSA-2018:0241
Red Hat Security Advisory: openstack-nova security and bug fix update
openstack-nova: Nova Filter Scheduler bypass through rebuild action
[ "cpe:/a:redhat:openstack:12::el7" ]
null
null
5.4
null
CVE-2019-10771
Characters in the GET url path are not properly escaped and can be reflected in the server response.
[ "cpe:2.3:a:iobroker:iobroker.web:*:*:*:*:*:node.js:*:*" ]
null
6.1
null
4.3
CVE-2017-9978
On the OSNEXUS QuantaStor v4 virtual appliance before 4.3.1, a flaw was found with the error message sent as a response for users that don't exist on the system. An attacker could leverage this information to fine-tune and enumerate valid accounts on the system by searching for common usernames.
[ "cpe:2.3:a:osnexus:quantastor:*:*:*:*:*:*:*:*" ]
null
null
5.3
5
cisco-sa-anyconnect-dll-injec-pQnryXLf
Cisco AnyConnect Secure Mobility Client for Windows DLL Injection Vulnerability
A vulnerability in the Network Access Manager and Web Security Agent components of Cisco AnyConnect Secure Mobility Client for Windows could allow an authenticated, local attacker to perform a DLL injection attack. To exploit this vulnerability, the attacker would need to have valid credentials on the Windows system. The vulnerability is due to insufficient validation of resources that are loaded by the application at run time. An attacker could exploit this vulnerability by inserting a configuration file in a specific path in the system which, in turn, causes a malicious DLL file to be loaded when the application starts. A successful exploit could allow the attacker to execute arbitrary code on the affected machine with SYSTEM privileges. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-anyconnect-dll-injec-pQnryXLf ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-anyconnect-dll-injec-pQnryXLf"]
[]
null
7.8
null
null
CVE-2013-1227
Cross-site scripting (XSS) vulnerability in the web framework in Cisco Unified Communications Domain Manager allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka Bug ID CSCug37902.
[ "cpe:2.3:a:cisco:unified_communications_domain_manager:-:*:*:*:*:*:*:*" ]
null
null
null
4.3
GHSA-3cj3-jrrp-9rxf
Unchecked Return Value in xcb
An issue was discovered in the xcb crate through 2021-02-04 for Rust. It has a soundness violation because transmutation to the wrong type can happen after xcb::base::cast_event uses std::mem::transmute to return a reference to an arbitrary type.
[]
null
8.8
null
null
GHSA-v379-6hwf-84m7
The do_tmem_op function in the Transcendent Memory (TMEM) in Xen 4.0, 4.1, and 4.2 allow local guest OS users to cause a denial of service (host crash) and possibly have other unspecified impacts via unspecified vectors related to "broken locking checks" in an "error path." NOTE: this issue was originally published as part of CVE-2012-3497, which was too general; CVE-2012-3497 has been SPLIT into this ID and others.
[]
null
null
null
null
GHSA-jwrv-r6rm-vqh2
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View 10.15.0.75. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of JT files. Crafted data in a JT file can trigger a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14829.
[]
null
null
null
null
CVE-2019-13951
The set_ipv4() function in zscan_rfc1035.rl in gdnsd 3.x before 3.2.1 has a stack-based buffer overflow via a long and malformed IPv4 address in zone data.
[ "cpe:2.3:a:gdnsd:gdnsd:3.2.0:*:*:*:*:*:*:*" ]
null
null
9.8
7.5
GHSA-6625-2573-pv96
CouchDB version 3.0.0 shipped with a new configuration setting that governs access control to the entire database server called `require_valid_user_except_for_up`. It was meant as an extension to the long standing setting `require_valid_user`, which in turn requires that any and all requests to CouchDB will have to be made with valid credentials, effectively forbidding any anonymous requests. The new `require_valid_user_except_for_up` is an off-by-default setting that was meant to allow requiring valid credentials for all endpoints except for the `/_up` endpoint. However, the implementation of this made an error that lead to not enforcing credentials on any endpoint, when enabled. CouchDB versions 3.0.1[1] and 3.1.0[2] fix this issue.
[]
null
null
null
null
CVE-2019-17651
An Improper Neutralization of Input vulnerability in the description and title parameters of a Device Maintenance Schedule in FortiSIEM version 5.2.5 and below may allow a remote authenticated attacker to perform a Stored Cross Site Scripting attack (XSS) by injecting malicious JavaScript code into the description field of a Device Maintenance schedule.
[ "cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*" ]
null
5.4
null
3.5
GHSA-hqr6-633p-3x2j
A vulnerability in the application protocol handling features of Cisco Jabber for Windows could allow an unauthenticated, remote attacker to execute arbitrary commands. The vulnerability is due to improper handling of input to the application protocol handlers. An attacker could exploit this vulnerability by convincing a user to click a link within a message sent by email or other messaging platform. A successful exploit could allow the attacker to execute arbitrary commands on a targeted system with the privileges of the user account that is running the Cisco Jabber client software.
[]
null
null
null
null
GHSA-24c6-8h6m-mfm3
Multiple low security issues were discovered and fixed in a security audit of Mozilla VPN 2.x branch as part of a 3rd party security audit. This vulnerability affects Mozilla VPN < 2.3.
[]
null
null
null
null
GHSA-m5gm-p83p-6vg3
The Belkin WeMo Home Automation firmware before 3949 does not properly use the STUN and TURN protocols, which allows remote attackers to hijack connections and possibly have unspecified other impact by leveraging access to a single WeMo device.
[]
null
null
null
null
GHSA-rrgq-q24f-79wv
AVEVA Wonderware System Platform 2017 Update 2 and prior uses an ArchestrA network user account for authentication of system processes and inter-node communications. A user with low privileges could make use of an API to obtain the credentials for this account.
[]
null
8.8
null
null
GHSA-2hgm-xvx6-w372
Netwrix Password Secure through 9.2 allows command injection.
[]
null
9.8
null
null
CVE-2006-4019
Dynamic variable evaluation vulnerability in compose.php in SquirrelMail 1.4.0 to 1.4.7 allows remote attackers to overwrite arbitrary program variables and read or write the attachments and preferences of other users.
[ "cpe:2.3:a:squirrelmail:squirrelmail:1.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:squirrelmail:squirrelmail:1.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:squirrelmail:squirrelmail:1.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:squirrelmail:squirrelmail:1.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:squirrelmail:squirrelmail:1.4.3_r3:*:*:*:*:*:*:*", "cpe:2.3:a:squirrelmail:squirrelmail:1.4.3_rc1:*:*:*:*:*:*:*", "cpe:2.3:a:squirrelmail:squirrelmail:1.4.3a:*:*:*:*:*:*:*", "cpe:2.3:a:squirrelmail:squirrelmail:1.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:squirrelmail:squirrelmail:1.4.4_rc1:*:*:*:*:*:*:*", "cpe:2.3:a:squirrelmail:squirrelmail:1.4.5:*:*:*:*:*:*:*", "cpe:2.3:a:squirrelmail:squirrelmail:1.4.6:*:*:*:*:*:*:*", "cpe:2.3:a:squirrelmail:squirrelmail:1.4.6_rc1:*:*:*:*:*:*:*", "cpe:2.3:a:squirrelmail:squirrelmail:1.4.7:*:*:*:*:*:*:*", "cpe:2.3:a:squirrelmail:squirrelmail:1.4_rc1:*:*:*:*:*:*:*", "cpe:2.3:a:squirrelmail:squirrelmail:1.44:*:*:*:*:*:*:*" ]
null
null
null
6.4
GHSA-r62h-rf3r-q857
The onReadyRead function in core/coreauthhandler.cpp in Quassel before 0.12.4 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via invalid handshake data.
[]
null
null
7.5
null
GHSA-v9v2-h9rf-2p2j
Tenda AX3 v16.03.12.10_CN was discovered to contain a stack overflow in the function formSetVirtualSer. This vulnerability allows attackers to cause a Denial of Service (DoS) via the list parameter.
[]
null
null
null
null
ICSA-23-173-02
Advantech R-SeeNet
Advantech R-SeeNet is installed with a hidden root-level user that is not available in the users list. This hidden user has a password that cannot be changed by users. Advantech R-SeeNet allows low-level users to access and load the content of local files.
[]
null
null
8.8
null
GHSA-38hh-g82x-9mpc
Windows Media Remote Code Execution Vulnerability
[]
null
7.8
null
null
CVE-2021-30916
A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 15.1 and iPadOS 15.1, macOS Monterey 12.0.1, iOS 14.8.1 and iPadOS 14.8.1, Security Update 2021-007 Catalina, macOS Big Sur 11.6.1. A malicious application may be able to execute arbitrary code with kernel privileges.
[ "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:ipados:15.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:15.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-002:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-003:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-004:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-005:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-006:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:supplemental_update:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:12.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*" ]
null
7.8
null
9.3
CVE-2023-28402
Improper input validation in some Intel(R) BIOS Guard firmware may allow a privileged user to potentially enable escalation of privilege via local access.
[ "cpe:2.3:h:intel:whiskey_lake:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:alder_lake:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:tiger_lake:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:rocket_lake:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:ice_lake:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:comet_lake:-:*:*:*:client:*:*:*" ]
null
7.2
null
null
GHSA-wr27-p9q7-3cvx
The MagicMotion Flamingo 2 application for Android stores data on an sdcard under com.vt.magicmotion/files/Pictures, whence it can be read by other applications.
[]
null
null
null
null
GHSA-fwvv-qp3c-qpq6
OTFCC commit 617837b was discovered to contain a heap buffer overflow via /release-x64/otfccdump+0x6b04de.
[]
null
6.5
null
null
CVE-2021-35438
phpIPAM 1.4.3 allows Reflected XSS via app/dashboard/widgets/ipcalc-result.php and app/tools/ip-calculator/result.php of the IP calculator.
[ "cpe:2.3:a:phpipam:phpipam:1.4.3:*:*:*:*:*:*:*" ]
null
6.1
null
4.3
CVE-2025-27913
Passbolt API before 5, if the server is misconfigured (with an incorrect installation process and disregarding of Health Check results), can send email messages with a domain name taken from an attacker-controlled HTTP Host header.
[]
2.1
null
null
null
RHSA-2006:0577
Red Hat Security Advisory: mutt security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
GHSA-2r5h-6r7v-5m7c
Symphony Vulnerable to PHP Code Injection via YAML Parsing
The `Yaml::parse` function in Symfony 2.0.x before 2.0.22 remote attackers to execute arbitrary PHP code via a PHP file, a different vulnerability than CVE-2013-1397.
[]
null
null
null
null
GHSA-f78g-q7r4-9wcv
Division by 0 in `FractionalAvgPool`
ImpactAn attacker can cause a runtime division by zero error and denial of service in `tf.raw_ops.FractionalAvgPool`:This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/acc8ee69f5f46f92a3f1f11230f49c6ac266f10c/tensorflow/core/kernels/fractional_avg_pool_op.cc#L85-L89) computes a divisor quantity by dividing two user controlled values:The user controls the values of `input_size[i]` and `pooling_ratio_[i]` (via the `value.shape()` and `pooling_ratio` arguments). If the value in `input_size[i]` is smaller than the `pooling_ratio_[i]`, then the floor operation results in `output_size[i]` being 0. The `DCHECK_GT` line is a no-op outside of debug mode, so in released versions of TF this does not trigger.Later, these computed values [are used as arguments](https://github.com/tensorflow/tensorflow/blob/acc8ee69f5f46f92a3f1f11230f49c6ac266f10c/tensorflow/core/kernels/fractional_avg_pool_op.cc#L96-L99) to [`GeneratePoolingSequence`](https://github.com/tensorflow/tensorflow/blob/acc8ee69f5f46f92a3f1f11230f49c6ac266f10c/tensorflow/core/kernels/fractional_pool_common.cc#L100-L108). There, the first computation is a division in a modulo operation:Since `output_length` can be 0, this results in runtime crashing.PatchesWe have patched the issue in GitHub commit [548b5eaf23685d86f722233d8fbc21d0a4aecb96](https://github.com/tensorflow/tensorflow/commit/548b5eaf23685d86f722233d8fbc21d0a4aecb96).The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.For more informationPlease consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.AttributionThis vulnerability has been reported by Ying Wang and Yakun Zhang of Baidu X-Team.
[]
2
2.5
null
null
GHSA-h47c-3xp5-g7fx
Cross-site request forgery (CSRF) vulnerability in hosting/admin_ac.php in ScriptsEz Mini Hosting Panel allows remote attackers to hijack the authentication of administrators for requests that alter administrative settings via a cp action.
[]
null
null
null
null
GHSA-wr26-78p7-gpjj
The Data Camouflage (aka FairCom Standard Encryption) algorithm in FairCom c-treeACE does not ensure that a decryption key is needed for accessing database contents, which allows context-dependent attackers to read cleartext database records by copying a database to another system that has a certain default configuration.
[]
null
null
null
null
GHSA-7p7j-x9w2-xpj5
Advantech WebAccess 8.4.2 and 8.4.4 allows XSS via the username column of the bwRoot.asp page of WADashboard.
[]
null
null
null
null
CVE-2024-36307
A security agent link following vulnerability in Trend Micro Apex One and Apex One as a Service could allow a local attacker to disclose sensitive information about the agent on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
[ "cpe:2.3:a:trendmicro:apex_one:2019:*:*:*:*:*:*:*", "cpe:2.3:a:trendmicro:apex_one:-:*:*:*:*:saas:*:*" ]
null
4.7
null
null
CVE-2023-21649
Buffer Copy Without Checking Size of Input (`Classic Buffer Overflow`) in WLAN
Memory corruption in WLAN while running doDriverCmd for an unspecific command.
[ "cpe:2.3:o:qualcomm:apq8096au_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:aqt1000_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9628_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6390_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6420_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6421_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6426_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6430_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6431_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6436_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6554a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6564a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6564au_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6574_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6574a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6595_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca8337_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcc5100_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcn9074_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcs410_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcs610_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa6145p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa6150p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa8145p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa8150p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa8195p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd480_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd695_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd855_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd865_5g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd870_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sda429w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdx55m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdxr2_5g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm4375_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sw5100_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sw5100p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9341_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn3610_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn3660b_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn3680b_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn3991_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn3998_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn6850_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn6851_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:apq8096au:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:aqt1000:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9628:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9650:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6390:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6391:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6420:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6421:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6426:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6430:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6431:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6436:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6554a:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6564a:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6564au:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6574:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6574a:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6584au:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6595:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6595au:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6696:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca8337:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcc5100:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcn9074:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcs410:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcs610:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa6145p:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa6150p:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa6155p:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa8145p:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa8150p:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa8155p:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa8195p:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd480:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd695:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd855:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd865_5g:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd870:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sda429w:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdx55:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdx55m:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdxr2_5g:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm4375:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sw5100:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sw5100p:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9341:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9375:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn3610:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn3660b:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn3680b:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn3950:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn3980:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn3988:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn3991:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn3998:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn6850:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn6851:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wsa8810:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wsa8815:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*" ]
null
6.7
null
null
GHSA-699m-mcjm-9cw8
actionpack vulnerable to Cross-site Scripting
Cross-site scripting (XSS) vulnerability in `actionpack/lib/action_view/helpers/translation_helper.rb` in the internationalization component in Ruby on Rails 3.x before 3.2.16 and 4.x before 4.0.2 allows remote attackers to inject arbitrary web script or HTML via a crafted string that triggers generation of a fallback string by the i18n gem.
[]
null
null
null
null
GHSA-ffpc-23x7-9cwj
The Yougler Blogger Profile Page plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, v1.01. This is due to missing or incorrect nonce validation on the 'yougler-plugin.php' page. This makes it possible for unauthenticated attackers to update the plugin's settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
[]
null
4.3
null
null
GHSA-wm3w-4jjh-w57r
IBM Rational Rhapsody Design Manager 5.0 through 5.0.2 and 6.0 through 6.0.5 and IBM Rational Software Architect Design Manager 5.0 through 5.0.2 and 6.0 through 6.0.1 are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 142558.
[]
null
null
5.4
null
GHSA-qvg6-9fpw-3vw9
LibTIFF version 4.0.7 is vulnerable to a heap-based buffer over-read in tif_lzw.c resulting in DoS or code execution via a crafted bmp image to tools/bmp2tiff.
[]
null
null
8.8
null
CVE-2024-21663
Remote code execution on ReconServer due to improper input sanitization on the prips command
Discord-Recon is a Discord bot created to automate bug bounty recon, automated scans and information gathering via a discord server. Discord-Recon is vulnerable to remote code execution. An attacker is able to execute shell commands in the server without having an admin role. This vulnerability has been fixed in version 0.0.8.
[ "cpe:2.3:a:demon1a:discord-recon:*:*:*:*:*:discord:*:*", "cpe:2.3:a:demon1a:discord-recon:0.0.8:beta:*:*:*:discord:*:*" ]
null
10
null
null
GHSA-qh4m-mqcp-x24m
A privacy issue was addressed by moving sensitive data to a more secure location. This issue is fixed in iOS 18 and iPadOS 18, watchOS 11, macOS Sequoia 15. An app may be able to access user-sensitive data.
[]
null
5.5
null
null
GHSA-gmxm-pr58-v5jc
Jenkins Azure Key Vault Plugin does not properly mask credentials
Multiple Jenkins plugins do not properly mask (i.e., replace with asterisks) credentials printed in the build log from Pipeline steps like sh and bat, when both of the following conditions are met:The credentials are printed in build steps executing on an agent (typically inside a node block).Push mode for durable task logging is enabled. This is a hidden option in Pipeline: Nodes and Processes that can be enabled through the Java system property org.jenkinsci.plugins.workflow.steps.durable_task.DurableTaskStep.USE_WATCHING. It is also automatically enabled by some plugins, e.g., OpenTelemetry and Pipeline Logging over CloudWatch.The following plugins are affected by this vulnerability:Kubernetes 3909.v1f2c633e8590 and earlier (SECURITY-3079 / CVE-2023-30513)Azure Key Vault 187.va_cd5fecd198a_ and earlier (SECURITY-3051 / CVE-2023-30514)Thycotic DevOps Secrets Vault 1.0.0 (SECURITY-3078 / CVE-2023-30515)The following plugins have been updated to properly mask credentials in the build log when push mode for durable task logging is enabled:Kubernetes 3910.ve59cec5e33ea_ (SECURITY-3079 / CVE-2023-30513)Azure Key Vault 188.vf46b_7fa_846a_1 (SECURITY-3051 / CVE-2023-30514)As of publication of this advisory, there is no fix available for the following plugin:Thycotic DevOps Secrets Vault 1.0.0 (SECURITY-3078 / CVE-2023-30515)
[]
null
4.3
null
null
CVE-2008-2859
Unspecified vulnerability in the IMAP service in NetWin SurgeMail before 3.9g2 allows remote attackers to cause a denial of service (daemon crash) via unknown vectors related to an "imap command."
[ "cpe:2.3:a:netwin:surgemail:*:*:*:*:*:*:*:*", "cpe:2.3:a:netwin:surgemail:3.8a:*:*:*:*:*:*:*", "cpe:2.3:a:netwin:surgemail:3.8b:*:*:*:*:*:*:*", "cpe:2.3:a:netwin:surgemail:3.8d:*:*:*:*:*:*:*", "cpe:2.3:a:netwin:surgemail:3.8f:*:*:*:*:*:*:*", "cpe:2.3:a:netwin:surgemail:3.8f2:*:*:*:*:*:*:*", "cpe:2.3:a:netwin:surgemail:3.8f3:*:*:*:*:*:*:*", "cpe:2.3:a:netwin:surgemail:3.8i:*:*:*:*:*:*:*", "cpe:2.3:a:netwin:surgemail:3.8i2:*:*:*:*:*:*:*", "cpe:2.3:a:netwin:surgemail:3.8i3:*:*:*:*:*:*:*", "cpe:2.3:a:netwin:surgemail:3.8k:*:*:*:*:*:*:*", "cpe:2.3:a:netwin:surgemail:3.8k2:*:*:*:*:*:*:*", "cpe:2.3:a:netwin:surgemail:3.8k3:*:*:*:*:*:*:*", "cpe:2.3:a:netwin:surgemail:3.8k4:*:*:*:*:*:*:*", "cpe:2.3:a:netwin:surgemail:3.8m:*:*:*:*:*:*:*", "cpe:2.3:a:netwin:surgemail:3.8o:*:*:*:*:*:*:*", "cpe:2.3:a:netwin:surgemail:3.8q:*:*:*:*:*:*:*", "cpe:2.3:a:netwin:surgemail:3.8s:*:*:*:*:*:*:*", "cpe:2.3:a:netwin:surgemail:3.8u:*:*:*:*:*:*:*", "cpe:2.3:a:netwin:surgemail:3.9a:*:*:*:*:*:*:*", "cpe:2.3:a:netwin:surgemail:3.9c:*:*:*:*:*:*:*", "cpe:2.3:a:netwin:surgemail:3.9e:*:*:*:*:*:*:*" ]
null
null
null
5
GHSA-233h-59m2-qqf2
ChakraCore Remote Code Execution Vulnerability
A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0968.
[]
null
7.5
null
null
GHSA-293h-f2f3-6fqq
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Exeebit phpinfo() WP.This issue affects phpinfo() WP: from n/a through 5.0.
[]
null
5.3
null
null
GHSA-r69p-rc7c-rr2m
A vulnerability was found in the way RemoteMessageChannel, introduced in jboss-remoting versions 3.3.10, reads from an empty buffer. An attacker could use this flaw to cause denial of service via high CPU caused by an infinite loop.
[]
null
null
7.5
null
CVE-2015-9224
In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Automobile, Snapdragon Mobile, Snapdragon Wear, and Small Cell SoC FSM9055, MDM9206, MDM9607, MDM9615, MDM9625, MDM9635M, MDM9640, MDM9645, MDM9650, MDM9655, MSM8909W, SD 210/SD 212/SD 205, SD 400, SD 410/12, SD 425, SD 430, SD 450, SD 600, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 800, SD 808, SD 810, SD 820, SD 820A, SD 835, SD 845, SD 850, and SDX20, lack of input Validation in QURTK_write() can cause potential buffer overflow.
[ "cpe:2.3:o:qualcomm:mdm9206_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9206:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9607_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9607:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9615_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9615:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9625_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9625:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9635m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9635m:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9640_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9640:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9645_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9645:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9650:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9655_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9655:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:msm8909w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:msm8909w:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_210_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_210:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_212_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_212:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_205_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_205:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_400_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_400:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_410_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_410:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_412_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_412:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_425_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_425:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_430_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_430:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_450_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_450:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_615_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_615:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_616_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_616:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_415_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_415:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_617_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_617:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_625_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_625:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_650_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_650:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_652_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_652:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_800_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_800:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_808_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_808:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_810_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_810:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_820_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_820:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_835_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_835:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_845_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_845:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdx20_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdx20:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_850_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_850:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:fsm9055_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:fsm9055:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_600_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_600:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_820a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_820a:-:*:*:*:*:*:*:*" ]
null
null
9.8
10
GHSA-cwp3-9497-rjgj
The tx Smart (aka com.wooriwm.txsmart) application 7.05 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[]
null
null
null
null
GHSA-q3c6-7v99-vxjx
In getCredentialManagerPolicy of DevicePolicyManagerService.java, there is a possible method for users to select credential managers without permission due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
[]
null
7.8
null
null
GHSA-h94c-3966-p96m
Cross-zone scripting vulnerability in Sleipnir 2.49 and earlier, and Portable Sleipnir 2.45 and earlier, allows remote attackers to bypass Web content zone restrictions via certain script contained in RSS data. NOTE: some of these details are obtained from third party information.
[]
null
null
null
null
GHSA-972m-28wj-hr23
DMMFX Trade for Android 1.5.0 and earlier, DMMFX DEMO Trade for Android 1.5.0 and earlier, and GAITAMEJAPAN FX Trade for Android 1.4.0 and earlier do not verify SSL certificates.
[]
null
null
5.9
null
GHSA-xgv8-vx7r-x752
An out-of-bounds read flaw was found in the parse_module function in bfd/vms-alpha.c in Binutils.
[]
null
6.3
null
null
GHSA-9q47-75mf-qmf9
setup.cgi on NETGEAR R6020 1.0.0.48 devices allows an admin to execute arbitrary shell commands via shell metacharacters in the ntp_server field.
[]
null
null
null
null
CVE-2024-27142
Pre-authenticated XXE injection
Toshiba printers use XML communication for the API endpoint provided by the printer. For the endpoint, XML parsing library is used and it is vulnerable to a time-based blind XML External Entity (XXE) vulnerability. An attacker can DoS the printers. An attacker can exploit the XXE to retrieve information. As for the affected products/models/versions, see the reference URL.
[]
null
5.9
null
null
CVE-2001-0408
vim (aka gvim) processes VIM control codes that are embedded in a file, which could allow attackers to execute arbitrary commands when another user opens a file containing malicious VIM control codes.
[ "cpe:2.3:a:vim_development_group:vim:5.7:*:*:*:*:*:*:*" ]
null
null
null
5.1
GHSA-6p3r-79mc-w88g
Unspecified vulnerability in the HotSpot Server component in Oracle Java SE and Java for Business 6 Update 18, 5.0, Update, and 23 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
[]
null
null
null
null
RHSA-2023:3705
Red Hat Security Advisory: kpatch-patch security update
kernel: use-after-free vulnerability in the perf_group_detach function of the Linux Kernel Performance Events kernel: netfilter: use-after-free in nf_tables when processing batch requests can lead to privilege escalation
[ "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
7.8
null
null
GHSA-2rg6-3m8g-8x9g
CiscoWorks Common Management Foundation (CMF) 2.1 and earlier allows the guest user to obtain restricted information and possibly gain administrative privileges by changing the "guest" user to the Admin user on the Modify or delete users pages.
[]
null
null
null
null
CVE-2014-0155
The ioapic_deliver function in virt/kvm/ioapic.c in the Linux kernel through 3.14.1 does not properly validate the kvm_irq_delivery_to_apic return value, which allows guest OS users to cause a denial of service (host OS crash) via a crafted entry in the redirection table of an I/O APIC. NOTE: the affected code was moved to the ioapic_service function before the vulnerability was announced.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
null
null
null
5.5
GHSA-5q2v-rq3q-xc6m
PHP remote file inclusion vulnerability in index.php in Segue CMS 1.8.4 and earlier, when register_globals is disabled, allows remote attackers to execute arbitrary PHP code via a URL in the themesdir parameter, a different vector than CVE-2006-5497. NOTE: this issue was disputed, but the dispute was retracted after additional analysis.
[]
null
null
null
null
cisco-sa-httpsrvr-dos-yOZThut
Cisco IOS XE Software HTTP Server Telephony Services Denial of Service Vulnerability
A vulnerability in the HTTP Server feature of Cisco IOS XE Software when the Telephony Service feature is enabled could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to a null pointer dereference when accessing specific URLs. An attacker could exploit this vulnerability by sending crafted HTTP traffic to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, causing a DoS condition on the affected device. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is part of the September 2024 release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: September 2024 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication ["https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75169"].
[]
null
8.6
null
null
CVE-2022-0896
Improper Neutralization of Special Elements Used in a Template Engine in microweber/microweber
Improper Neutralization of Special Elements Used in a Template Engine in GitHub repository microweber/microweber prior to 1.3.
[ "cpe:2.3:a:microweber:microweber:*:*:*:*:*:*:*:*" ]
null
null
7.1
null
GHSA-pmg9-q8pq-2g6h
Heap-based buffer overflow in the encodeURI and decodeURI functions in the kjs JavaScript interpreter engine in KDE 3.2.0 through 3.5.0 allows remote attackers to execute arbitrary code via a crafted, UTF-8 encoded URI.
[]
null
null
null
null
GHSA-vqjc-r797-frf8
SQL injection vulnerability in global.php3 of AttilaPHP 3.0, and possibly earlier versions, allows remote attackers to bypass authentication via a modified cook_id parameter.
[]
null
null
null
null
GHSA-rh56-v4f2-38m7
DHCP Server Service Denial of Service Vulnerability
[]
null
7.5
null
null
GHSA-8gf7-cp3h-9hx6
Vulnerability in the Oracle FLEXCUBE Universal Banking component of Oracle Financial Services Applications (subcomponent: Infrastructure). Supported versions that are affected are 11.3.0, 11.4.0, 12.0.1, 12.0.2, 12.0.3, 12.1.0, 12.2.0 and 12.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle FLEXCUBE Universal Banking. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle FLEXCUBE Universal Banking, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle FLEXCUBE Universal Banking accessible data as well as unauthorized read access to a subset of Oracle FLEXCUBE Universal Banking accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).
[]
null
null
6.1
null
CVE-2018-17184
A malicious user with enough administration entitlements can inject html-like elements containing JavaScript statements into Connector names, Report names, AnyTypeClass keys and Policy descriptions. When another user with enough administration entitlements edits one of the Entities above via Admin Console, the injected JavaScript code is executed.
[ "cpe:2.3:a:apache:syncope:*:*:*:*:*:*:*:*" ]
null
null
5.4
3.5
CVE-2025-24264
The issue was addressed with improved memory handling. This issue is fixed in visionOS 2.4, tvOS 18.4, iPadOS 17.7.6, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4, Safari 18.4. Processing maliciously crafted web content may lead to an unexpected Safari crash.
[]
null
9.8
null
null
GHSA-8hm3-x962-r5c7
A lack of rate limiting in the OTP validation component of Digitory Multi Channel Integrated POS v1.0 allows attackers to gain access to the ordering system and place an excessive amount of food orders.
[]
null
9.1
null
null
CVE-2022-3197
Use after free in PDF in Google Chrome prior to 105.0.5195.125 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: High)
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*" ]
null
8.8
null
null
CVE-2023-41734
WordPress Insert Estimated Reading Time Plugin <= 1.2 is vulnerable to Cross Site Scripting (XSS)
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in nigauri Insert Estimated Reading Time plugin <= 1.2 versions.
[ "cpe:2.3:a:nigauri:insert_estimated_reading_time:*:*:*:*:*:wordpress:*:*" ]
null
5.9
null
null
CVE-2017-14428
D-Link DIR-850L REV. A (with firmware through FW114WWb07_h2ab_beta1) and REV. B (with firmware through FW208WWb02) devices have 0666 /var/run/hostapd* permissions.
[ "cpe:2.3:o:dlink:dir-850l_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dir-850l_firmware:fw114wwb07_h2ab:beta1:*:*:*:*:*:*", "cpe:2.3:h:dlink:dir-850l:-:*:*:*:*:*:*:*" ]
null
7.8
null
2.1
GHSA-gf8p-7594-m58r
In the Linux kernel, the following vulnerability has been resolved:ptr_ring: do not block hard interrupts in ptr_ring_resize_multiple()Jakub added a lockdep_assert_no_hardirq() check in __page_pool_put_page() to increase test coverage.syzbot found a splat caused by hard irq blocking in ptr_ring_resize_multiple() [1]As current users of ptr_ring_resize_multiple() do not require hard irqs being masked, replace it to only block BH.Rename helpers to better reflect they are safe against BH only.ptr_ring_resize_multiple() to ptr_ring_resize_multiple_bh()skb_array_resize_multiple() to skb_array_resize_multiple_bh()[1]WARNING: CPU: 1 PID: 9150 at net/core/page_pool.c:709 __page_pool_put_page net/core/page_pool.c:709 [inline] WARNING: CPU: 1 PID: 9150 at net/core/page_pool.c:709 page_pool_put_unrefed_netmem+0x157/0xa40 net/core/page_pool.c:780 Modules linked in: CPU: 1 UID: 0 PID: 9150 Comm: syz.1.1052 Not tainted 6.11.0-rc3-syzkaller-00202-gf8669d7b5f5d #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 RIP: 0010:__page_pool_put_page net/core/page_pool.c:709 [inline] RIP: 0010:page_pool_put_unrefed_netmem+0x157/0xa40 net/core/page_pool.c:780 Code: 74 0e e8 7c aa fb f7 eb 43 e8 75 aa fb f7 eb 3c 65 8b 1d 38 a8 6a 76 31 ff 89 de e8 a3 ae fb f7 85 db 74 0b e8 5a aa fb f7 90 <0f> 0b 90 eb 1d 65 8b 1d 15 a8 6a 76 31 ff 89 de e8 84 ae fb f7 85 RSP: 0018:ffffc9000bda6b58 EFLAGS: 00010083 RAX: ffffffff8997e523 RBX: 0000000000000000 RCX: 0000000000040000 RDX: ffffc9000fbd0000 RSI: 0000000000001842 RDI: 0000000000001843 RBP: 0000000000000000 R08: ffffffff8997df2c R09: 1ffffd40003a000d R10: dffffc0000000000 R11: fffff940003a000e R12: ffffea0001d00040 R13: ffff88802e8a4000 R14: dffffc0000000000 R15: 00000000ffffffff FS: 00007fb7aaf716c0(0000) GS:ffff8880b9300000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fa15a0d4b72 CR3: 00000000561b0000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: <TASK> tun_ptr_free drivers/net/tun.c:617 [inline] __ptr_ring_swap_queue include/linux/ptr_ring.h:571 [inline] ptr_ring_resize_multiple_noprof include/linux/ptr_ring.h:643 [inline] tun_queue_resize drivers/net/tun.c:3694 [inline] tun_device_event+0xaaf/0x1080 drivers/net/tun.c:3714 notifier_call_chain+0x19f/0x3e0 kernel/notifier.c:93 call_netdevice_notifiers_extack net/core/dev.c:2032 [inline] call_netdevice_notifiers net/core/dev.c:2046 [inline] dev_change_tx_queue_len+0x158/0x2a0 net/core/dev.c:9024 do_setlink+0xff6/0x41f0 net/core/rtnetlink.c:2923 rtnl_setlink+0x40d/0x5a0 net/core/rtnetlink.c:3201 rtnetlink_rcv_msg+0x73f/0xcf0 net/core/rtnetlink.c:6647 netlink_rcv_skb+0x1e3/0x430 net/netlink/af_netlink.c:2550
[]
null
null
null
null
GHSA-v98g-m79j-fq3q
Vulnerability in the Oracle iStore product of Oracle E-Business Suite (component: Shopping Cart). Supported versions that are affected are 12.1.1-12.1.3. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle iStore. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle iStore accessible data as well as unauthorized access to critical data or complete access to all Oracle iStore accessible data. CVSS 3.1 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N).
[]
null
null
null
null
GHSA-wh7h-qh97-7vjv
The issue searching component in Jira before version 8.1.0 allows remote attackers to deny access to Jira service via denial of service vulnerability in issue search when ordering by "Epic Name".
[]
null
null
6.5
null
GHSA-hrr3-r677-j752
Microsoft Internet Explorer 6 through 9 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing a deleted object, aka "Body Element Remote Code Execution Vulnerability."
[]
null
null
null
null
GHSA-w2wf-2p6x-gv2x
A null pointer vulnerability in Trend Micro Apex One and Worry-Free Business Security 10.0 SP1 could allow an attacker to crash the CGI program on affected installations.
[]
null
null
null
null
CVE-2020-23371
Cross-site scripting (XSS) vulnerability in static/admin/js/kindeditor/plugins/multiimage/images/swfupload.swf in noneCms v1.3.0 allows remote attackers to inject arbitrary web script or HTML via the movieName parameter.
[ "cpe:2.3:a:5none:nonecms:1.3.0:*:*:*:*:*:*:*" ]
null
6.1
null
4.3
CVE-2015-1484
Unquoted Windows search path vulnerability in the agent in Symantec Workspace Streaming (SWS) 6.1 before SP8 MP2 HF7 and 7.5 before SP1 HF4, when AppMgrService.exe is configured as a service, allows local users to gain privileges via a Trojan horse executable file in the %SYSTEMDRIVE% directory, as demonstrated by program.exe.
[ "cpe:2.3:a:symantec:workspace_streaming:6.1:sp8:*:*:*:*:*:*", "cpe:2.3:a:symantec:workspace_streaming:7.5:sp1:*:*:*:*:*:*" ]
null
null
null
6.9
GHSA-7cqj-6r5p-jp63
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in neoslab Database Toolset allows Path Traversal. This issue affects Database Toolset: from n/a through 1.8.4.
[]
null
8.6
null
null
GHSA-fj6q-h8w7-mx3g
An integer overflow was addressed with improved input validation. This issue is fixed in macOS Sequoia 15.4, tvOS 18.4, iPadOS 17.7.6, macOS Sonoma 14.7.5, iOS 18.4 and iPadOS 18.4, watchOS 11.4, visionOS 2.4. An attacker on the local network may be able to cause a denial-of-service.
[]
null
5.5
null
null