id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
139k
cpes
sequencelengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
GHSA-9rmr-pw3x-x887
A reachable assertion in the Mobile Management Entity (MME) of Magma versions <= 1.8.0 (fixed in v1.9 commit 08472ba98b8321f802e95f5622fa90fec2dea486) allows remote attackers to crash the MME with an unauthenticated cellphone by sending a NAS packet containing an `Emergency Number List` Information Element.
[]
null
7.5
null
null
CVE-2012-2690
virt-edit in libguestfs before 1.18.0 does not preserve the permissions from the original file and saves the new file with world-readable permissions when editing, which might allow local guest users to obtain sensitive information.
[ "cpe:2.3:a:libguestfs:libguestfs:*:*:*:*:*:*:*:*", "cpe:2.3:a:libguestfs:libguestfs:1.16.0:*:*:*:*:*:*:*", "cpe:2.3:a:libguestfs:libguestfs:1.16.1:*:*:*:*:*:*:*", "cpe:2.3:a:libguestfs:libguestfs:1.16.2:*:*:*:*:*:*:*", "cpe:2.3:a:libguestfs:libguestfs:1.16.3:*:*:*:*:*:*:*", "cpe:2.3:a:libguestfs:libguestfs:1.16.4:*:*:*:*:*:*:*", "cpe:2.3:a:libguestfs:libguestfs:1.16.5:*:*:*:*:*:*:*", "cpe:2.3:a:libguestfs:libguestfs:1.16.6:*:*:*:*:*:*:*", "cpe:2.3:a:libguestfs:libguestfs:1.16.7:*:*:*:*:*:*:*", "cpe:2.3:a:libguestfs:libguestfs:1.16.8:*:*:*:*:*:*:*", "cpe:2.3:a:libguestfs:libguestfs:1.16.9:*:*:*:*:*:*:*", "cpe:2.3:a:libguestfs:libguestfs:1.16.10:*:*:*:*:*:*:*", "cpe:2.3:a:libguestfs:libguestfs:1.16.11:*:*:*:*:*:*:*", "cpe:2.3:a:libguestfs:libguestfs:1.16.12:*:*:*:*:*:*:*", "cpe:2.3:a:libguestfs:libguestfs:1.16.13:*:*:*:*:*:*:*", "cpe:2.3:a:libguestfs:libguestfs:1.16.14:*:*:*:*:*:*:*", "cpe:2.3:a:libguestfs:libguestfs:1.16.15:*:*:*:*:*:*:*", "cpe:2.3:a:libguestfs:libguestfs:1.16.16:*:*:*:*:*:*:*", "cpe:2.3:a:libguestfs:libguestfs:1.16.17:*:*:*:*:*:*:*", "cpe:2.3:a:libguestfs:libguestfs:1.16.18:*:*:*:*:*:*:*", "cpe:2.3:a:libguestfs:libguestfs:1.16.19:*:*:*:*:*:*:*", "cpe:2.3:a:libguestfs:libguestfs:1.16.20:*:*:*:*:*:*:*", "cpe:2.3:a:libguestfs:libguestfs:1.16.21:*:*:*:*:*:*:*", "cpe:2.3:a:libguestfs:libguestfs:1.16.22:*:*:*:*:*:*:*", "cpe:2.3:a:libguestfs:libguestfs:1.16.23:*:*:*:*:*:*:*", "cpe:2.3:a:libguestfs:libguestfs:1.16.24:*:*:*:*:*:*:*", "cpe:2.3:a:libguestfs:libguestfs:1.16.25:*:*:*:*:*:*:*", "cpe:2.3:a:libguestfs:libguestfs:1.16.26:*:*:*:*:*:*:*", "cpe:2.3:a:libguestfs:libguestfs:1.17.0:*:*:*:*:*:*:*", "cpe:2.3:a:libguestfs:libguestfs:1.17.1:*:*:*:*:*:*:*", "cpe:2.3:a:libguestfs:libguestfs:1.17.2:*:*:*:*:*:*:*", "cpe:2.3:a:libguestfs:libguestfs:1.17.3:*:*:*:*:*:*:*", "cpe:2.3:a:libguestfs:libguestfs:1.17.4:*:*:*:*:*:*:*", "cpe:2.3:a:libguestfs:libguestfs:1.17.5:*:*:*:*:*:*:*", "cpe:2.3:a:libguestfs:libguestfs:1.17.6:*:*:*:*:*:*:*", "cpe:2.3:a:libguestfs:libguestfs:1.17.7:*:*:*:*:*:*:*", "cpe:2.3:a:libguestfs:libguestfs:1.17.8:*:*:*:*:*:*:*", "cpe:2.3:a:libguestfs:libguestfs:1.17.9:*:*:*:*:*:*:*", "cpe:2.3:a:libguestfs:libguestfs:1.17.10:*:*:*:*:*:*:*", "cpe:2.3:a:libguestfs:libguestfs:1.17.11:*:*:*:*:*:*:*", "cpe:2.3:a:libguestfs:libguestfs:1.17.12:*:*:*:*:*:*:*", "cpe:2.3:a:libguestfs:libguestfs:1.17.13:*:*:*:*:*:*:*", "cpe:2.3:a:libguestfs:libguestfs:1.17.14:*:*:*:*:*:*:*", "cpe:2.3:a:libguestfs:libguestfs:1.17.15:*:*:*:*:*:*:*", "cpe:2.3:a:libguestfs:libguestfs:1.17.16:*:*:*:*:*:*:*", "cpe:2.3:a:libguestfs:libguestfs:1.17.17:*:*:*:*:*:*:*", "cpe:2.3:a:libguestfs:libguestfs:1.17.18:*:*:*:*:*:*:*", "cpe:2.3:a:libguestfs:libguestfs:1.17.19:*:*:*:*:*:*:*", "cpe:2.3:a:libguestfs:libguestfs:1.17.20:*:*:*:*:*:*:*", "cpe:2.3:a:libguestfs:libguestfs:1.17.21:*:*:*:*:*:*:*", "cpe:2.3:a:libguestfs:libguestfs:1.17.22:*:*:*:*:*:*:*", "cpe:2.3:a:libguestfs:libguestfs:1.17.23:*:*:*:*:*:*:*", "cpe:2.3:a:libguestfs:libguestfs:1.17.24:*:*:*:*:*:*:*", "cpe:2.3:a:libguestfs:libguestfs:1.17.25:*:*:*:*:*:*:*", "cpe:2.3:a:libguestfs:libguestfs:1.17.26:*:*:*:*:*:*:*", "cpe:2.3:a:libguestfs:libguestfs:1.17.27:*:*:*:*:*:*:*", "cpe:2.3:a:libguestfs:libguestfs:1.17.28:*:*:*:*:*:*:*", "cpe:2.3:a:libguestfs:libguestfs:1.17.29:*:*:*:*:*:*:*", "cpe:2.3:a:libguestfs:libguestfs:1.17.30:*:*:*:*:*:*:*", "cpe:2.3:a:libguestfs:libguestfs:1.17.31:*:*:*:*:*:*:*", "cpe:2.3:a:libguestfs:libguestfs:1.17.32:*:*:*:*:*:*:*", "cpe:2.3:a:libguestfs:libguestfs:1.17.33:*:*:*:*:*:*:*", "cpe:2.3:a:libguestfs:libguestfs:1.17.34:*:*:*:*:*:*:*", "cpe:2.3:a:libguestfs:libguestfs:1.17.35:*:*:*:*:*:*:*", "cpe:2.3:a:libguestfs:libguestfs:1.17.36:*:*:*:*:*:*:*", "cpe:2.3:a:libguestfs:libguestfs:1.17.37:*:*:*:*:*:*:*", "cpe:2.3:a:libguestfs:libguestfs:1.17.38:*:*:*:*:*:*:*", "cpe:2.3:a:libguestfs:libguestfs:1.17.39:*:*:*:*:*:*:*", "cpe:2.3:a:libguestfs:libguestfs:1.17.40:*:*:*:*:*:*:*", "cpe:2.3:a:libguestfs:libguestfs:1.17.41:*:*:*:*:*:*:*", "cpe:2.3:a:libguestfs:libguestfs:1.17.42:*:*:*:*:*:*:*" ]
null
null
null
2.1
CVE-2024-5397
itsourcecode Online Student Enrollment System instructorSubjects.php sql injection
A vulnerability classified as critical was found in itsourcecode Online Student Enrollment System 1.0. Affected by this vulnerability is an unknown functionality of the file instructorSubjects.php. The manipulation of the argument instructorId leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-266311.
[ "cpe:2.3:a:itsourcecode:online_student_enrollment_system:1.0:*:*:*:*:*:*:*" ]
5.3
6.3
6.3
6.5
CVE-2024-48788
An issue in YESCAM (com.yescom.YesCam.zwave) 1.0.2 allows a remote attacker to obtain sensitive information via the firmware update process.
[ "cpe:2.3:o:yescam:yescam_firmware:1.0.2:*:*:*:*:*:*:*" ]
null
7.5
null
null
CVE-2022-31301
Haraj v3.7 was discovered to contain a stored cross-site scripting (XSS) vulnerability in the Post Ads component.
[ "cpe:2.3:a:angtech:haraj:3.7:*:*:*:*:*:*:*" ]
null
5.4
null
3.5
GHSA-mmcm-8vr2-mmc9
A path handling issue was addressed with improved validation. This issue is fixed in macOS Sonoma 14.6, iOS 17.6 and iPadOS 17.6. An app may be able to access protected user data.
[]
null
5.5
null
null
RHSA-2014:0136
Red Hat Security Advisory: java-1.5.0-ibm security update
OpenJDK: jarsigner does not detect unsigned bytecode injected into signed jars ICU: Layout Engine LookupProcessor insufficient input checks (JDK 2D, 8025034) OpenJDK: insufficient Socket checkListen checks (Networking, 8011786) OpenJDK: SnmpStatusException handling issues (Serviceability, 7068126) OpenJDK: document builder missing security checks (JAXP, 8027201, 8025018) OpenJDK: TLS/SSL handshake timing issues (JSSE, 8023069) OpenJDK: insecure subject principals set handling (JAAS, 8024306) JDK: unspecified vulnerability fixed in 5.0u71, 6u71 and 7u51 (2D) OpenJDK: insufficient package access checks in the Naming component (JNDI, 8025758) OpenJDK: XXE issue in decoder (Beans, 8023245) OpenJDK: insufficient security checks in IIOP streams (CORBA, 8025767)
[ "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server", "cpe:/a:redhat:rhel_extras:6" ]
null
null
null
null
CVE-2024-57647
An issue in the row_insert_cast component of openlink virtuoso-opensource v7.2.11 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
[]
null
7.5
null
null
GHSA-5gfx-64wm-m22c
An issue was discovered in Zammad before 3.4.1. There is Stored XSS via a Tags element in a TIcket.
[]
null
null
null
null
CVE-2020-12488
Broken Access Control Vulnerability in Jovi Smart Scene
The attacker can access the sensitive information stored within the jovi Smart Scene module by entering carefully constructed commands without requesting permission.
[ "cpe:2.3:a:vivo:jovi_smart_scene:*:*:*:*:*:*:*:*" ]
null
5.5
null
null
CVE-2022-28713
Improper authentication vulnerability in Scheduler of Cybozu Garoon 4.10.0 to 5.5.1 allows a remote attacker to obtain some data of Facility Information without logging in to the product.
[ "cpe:2.3:a:cybozu:garoon:*:*:*:*:*:*:*:*" ]
null
5.3
null
5
CVE-2007-3105
Stack-based buffer overflow in the random number generator (RNG) implementation in the Linux kernel before 2.6.22 might allow local root users to cause a denial of service or gain privileges by setting the default wakeup threshold to a value greater than the output pool size, which triggers writing random numbers to the stack by the pool transfer function involving "bound check ordering". NOTE: this issue might only cross privilege boundaries in environments that have granular assignment of privileges for root.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
null
null
null
4.6
GHSA-wf6p-hgq4-x57x
An exploitable out-of-bounds write vulnerability exists in the XMP image handling functionality of the FreeImage library. A specially crafted XMP file can cause an arbitrary memory overwrite resulting in code execution. An attacker can provide a malicious image to trigger this vulnerability.
[]
null
null
7.8
null
CVE-2024-21772
Uncontrolled search path in some Intel(R) Advisor software before version 2024.0 may allow an authenticated user to potentially enable escalation of privilege via local access.
[ "cpe:2.3:a:intel:advisor:*:*:*:*:*:*:*:*", "cpe:2.3:a:intel:oneapi_base_toolkit:*:*:*:*:*:*:*:*" ]
null
6.7
null
null
CVE-2024-0778
Uniview ISC 2500-S VM.php setNatConfig os command injection
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as critical, has been found in Uniview ISC 2500-S up to 20210930. Affected by this issue is the function setNatConfig of the file /Interface/DevManage/VM.php. The manipulation of the argument natAddress/natPort/natServerPort leads to os command injection. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-251696. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced.
[ "cpe:2.3:o:uniview:isc_2500-s_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:uniview:isc_2500-s:-:*:*:*:*:*:*:*" ]
null
8
8
7.7
CVE-2024-36681
SQL Injection vulnerability in the module "Isotope" (pk_isotope) <=1.7.3 from Promokit.eu for PrestaShop allows attackers to obtain sensitive information and cause other impacts via `pk_isotope::saveData` and `pk_isotope::removeData` methods.
[ "cpe:2.3:a:promokit:pk_isotope:-:*:*:*:*:*:*:*" ]
null
9.8
null
null
GHSA-x744-f9cr-wcfc
Uncontrolled search path elements in the Intel(R) Datacenter Group Event Android application, all versions, may allow an authenticated user to potentially enable escalation of privilege via local access.
[]
null
7.8
null
null
RHSA-2016:0675
Red Hat Security Advisory: java-1.7.0-openjdk security update
OpenJDK: insufficient thread consistency checks in ObjectInputStream (Serialization, 8129952) OpenJDK: insufficient byte type checks (Hotspot, 8132051) OpenJDK: insufficient DSA key parameters checks (Security, 8138593) OpenJDK: incorrect handling of surrogate pairs in XML attribute values (JAXP, 8143167) OpenJDK: unrestricted deserialization of authentication credentials (JMX, 8144430)
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
CVE-2020-12469
admin/blocks.php in Subrion CMS through 4.2.1 allows PHP Object Injection (with resultant file deletion) via serialized data in the subpages value within a block to blocks/edit.
[ "cpe:2.3:a:intelliants:subrion:*:*:*:*:*:*:*:*" ]
null
6.5
null
5.5
CVE-2020-0689
A security feature bypass vulnerability exists in secure boot, aka 'Microsoft Secure Boot Security Feature Bypass Vulnerability'.
[ "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*" ]
null
6.7
null
4.6
GHSA-c8xg-hw5v-j58h
An OS command injection vulnerability exists in the m2m DELETE_FILE cmd functionality of Siretta QUARTZ-GOLD G5.0.1.5-210720-141020. A specially-crafted network request can lead to arbitrary command execution. An attacker can send a network request to trigger this vulnerability.
[]
null
9.8
null
null
RHSA-2025:7694
Red Hat Security Advisory: thunderbird security update
firefox: thunderbird: Privilege escalation in Firefox Updater firefox: thunderbird: Process isolation bypass using "javascript:" URI links in cross-origin frames firefox: thunderbird: Unsafe attribute access during XPath parsing firefox: thunderbird: Memory safety bugs fixed in Firefox 138, Thunderbird 138, Firefox ESR 128.10, and Thunderbird 128.10 firefox: thunderbird: Memory safety bug fixed in Firefox ESR 128.10 and Thunderbird 128.10
[ "cpe:/a:redhat:rhel_eus:9.2::appstream" ]
null
8.8
null
null
GHSA-r2jr-v83g-c59g
An exploitable stack buffer overflow vulnerability vulnerability exists in the iocheckd service ‘I/O-Check’ functionality of WAGO PFC 200 Firmware version 03.02.02(14). A specially crafted XML cache file written to a specific location on the device can cause a stack buffer overflow, resulting in code execution. An attacker can send a specially crafted packet to trigger the parsing of this cache file. The destination buffer sp+0x440 is overflowed with the call to sprintf() for any subnetmask values that are greater than 1024-len(‘/etc/config-tools/config_interfaces interface=X1 state=enabled subnet-mask=‘) in length. A subnetmask value of length 0x3d9 will cause the service to crash.
[]
null
null
null
null
CVE-2019-15224
The rest-client gem 1.6.10 through 1.6.13 for Ruby, as distributed on RubyGems.org, included a code-execution backdoor inserted by a third party. Versions <=1.6.9 and >=1.6.14 are unaffected.
[ "cpe:2.3:a:rest-client_project:rest-client:*:*:*:*:*:ruby:*:*" ]
null
null
9.8
7.5
GHSA-w7wr-8ggv-cvqw
A memory leak in the cx23888_ir_probe() function in drivers/media/pci/cx23885/cx23888-ir.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering kfifo_alloc() failures, aka CID-a7b2df76b42b.
[]
null
4.7
null
null
CVE-2009-5155
In the GNU C Library (aka glibc or libc6) before 2.28, parse_reg_exp in posix/regcomp.c misparses alternatives, which allows attackers to cause a denial of service (assertion failure and application exit) or trigger an incorrect result by attempting a regular-expression match.
[ "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:cloud_backup:*:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*" ]
null
null
7.5
5
CVE-2025-1326
Homey - Booking and Rentals WordPress Theme <= 2.4.4 - Missing Authorization to Authenticated (Subscriber+) Arbitrary Reservation & Post Deletion
The Homey theme for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the homey_reservation_del() function in all versions up to, and including, 2.4.4. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary reservations and posts.
[]
null
4.3
null
null
GHSA-9qjj-g7jc-qv64
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Neil Gee Smoothscroller plugin <= 1.0.0 versions.
[]
null
5.9
null
null
CVE-2025-2551
D-Link DIR-618/DIR-605L formSetPortTr access control
A vulnerability was found in D-Link DIR-618 and DIR-605L 2.02/3.02. It has been classified as problematic. This affects an unknown part of the file /goform/formSetPortTr. The manipulation leads to improper access controls. Access to the local network is required for this attack. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
[]
5.3
4.3
4.3
3.3
CVE-2015-4074
Directory traversal vulnerability in the Helpdesk Pro plugin before 1.4.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the filename parameter in a ticket.download_attachment task.
[ "cpe:2.3:a:helpdesk_pro_project:helpdesk_pro:*:*:*:*:*:joomla\\!:*:*" ]
null
null
7.5
5
CVE-2001-0801
lpstat in IRIX 6.5.13f and earlier allows local users to gain root privileges by specifying a Trojan Horse nettype shared library.
[ "cpe:2.3:o:sgi:irix:*:*:*:*:*:*:*:*" ]
null
null
null
7.2
CVE-2025-22884
ISPSoft File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability
Delta Electronics ISPSoft version 3.20 is vulnerable to a Stack-Based buffer overflow vulnerability that could allow an attacker to execute arbitrary code when parsing DVP file.
[]
null
7.8
null
null
CVE-2023-30737
Improper access control vulnerability in Samsung Health prior to version 6.24.3.007 allows attackers to access sensitive information via implicit intent.
[ "cpe:2.3:a:samsung:health:*:*:*:*:*:*:*:*" ]
null
4
null
null
CVE-2024-51550
Data Validation / Sanitization
Data Validation / Data Sanitization vulnerabilities in Linux allows unvalidated and unsanitized data to be injected in an Aspect device.  Affected products: ABB ASPECT - Enterprise v3.08.02; NEXUS Series v3.08.02; MATRIX Series v3.08.02
[ "cpe:2.3:a:abb:aspect_enterprise:*:*:*:*:*:*:*:*", "cpe:2.3:a:abb:nexus_series:*:*:*:*:*:*:*:*", "cpe:2.3:a:abb:matrix_series:*:*:*:*:*:*:*:*" ]
9.3
10
null
null
CVE-2008-5686
IBM Tivoli Provisioning Manager (TPM) before 5.1.1.1 IF0006, when its LDAP service is shared with other applications, does not require that an LDAP user be listed in the TPM user records, which allows remote authenticated users to execute SOAP commands that access arbitrary TPM functionality, as demonstrated by running provisioning workflows.
[ "cpe:2.3:a:ibm:tivoli_provisioning_manager:5.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_provisioning_manager:5.1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_provisioning_manager:5.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_provisioning_manager:5.1.1.1:*:*:*:*:*:*:*" ]
null
null
null
8.5
CVE-2008-3229
Stack-based buffer overflow in op before Changeset 563, when xauth support is enabled, allows local users to gain privileges via a long XAUTHORITY environment variable.
[ "cpe:2.3:a:swapoff:op:1.1.10:*:*:*:*:*:*:*", "cpe:2.3:a:swapoff:op:1.1.19:*:*:*:*:*:*:*", "cpe:2.3:a:swapoff:op:1.20:*:*:*:*:*:*:*", "cpe:2.3:a:swapoff:op:1.21:*:*:*:*:*:*:*", "cpe:2.3:a:swapoff:op:1.22:*:*:*:*:*:*:*", "cpe:2.3:a:swapoff:op:1.23:*:*:*:*:*:*:*", "cpe:2.3:a:swapoff:op:1.24:*:*:*:*:*:*:*", "cpe:2.3:a:swapoff:op:1.25:*:*:*:*:*:*:*", "cpe:2.3:a:swapoff:op:1.26:*:*:*:*:*:*:*", "cpe:2.3:a:swapoff:op:1.27:*:*:*:*:*:*:*", "cpe:2.3:a:swapoff:op:1.28:*:*:*:*:*:*:*", "cpe:2.3:a:swapoff:op:1.29:*:*:*:*:*:*:*", "cpe:2.3:a:swapoff:op:1.30:*:*:*:*:*:*:*", "cpe:2.3:a:swapoff:op:1.31:*:*:*:*:*:*:*", "cpe:2.3:a:swapoff:op:1.32:*:*:*:*:*:*:*" ]
null
null
null
6.9
GHSA-x5vw-mf64-c93p
The ProcGetReservedColormapEntries function in the TOG-CUP extension in X.Org Xserver before 1.4.1 allows context-dependent attackers to read the contents of arbitrary memory locations via a request containing a 32-bit value that is improperly used as an array index.
[]
null
null
null
null
CVE-2006-5788
PHP remote file inclusion vulnerability in (1) index.php and (2) admin/index.php in IPrimal Forums as of 20061105 allows remote attackers to execute arbitrary PHP code via a URL in the p parameter.
[ "cpe:2.3:a:iprimal:iprimal_forums:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-g2xg-vq5p-8wvv
The reset password page in Puppet Enterprise before 3.0.1 does not force entry of the current password, which allows attackers to modify user passwords by leveraging session hijacking, an unattended workstation, or other vectors.
[]
null
null
null
null
GHSA-wrgf-6m9j-q9hq
Directory traversal vulnerability in PostNuke 0.723 and earlier allows remote attackers to include arbitrary files named theme.php via the theme parameter to index.php.
[]
null
null
null
null
RHSA-2020:4291
Red Hat Security Advisory: virt:8.2 and virt-devel:8.2 security and bug fix update
QEMU: usb: out-of-bounds r/w access issue while processing usb packets
[ "cpe:/a:redhat:advanced_virtualization:8.2::el8" ]
null
5
null
null
GHSA-9jmh-rhgv-38vc
IBM WebSphere Application Server 8.5 and 9.0 could provide weaker than expected security, caused by the improper encoding in a local configuration file. IBM X-Force ID: 258637.
[]
null
5.1
null
null
CVE-2021-26199
An issue was discovered in JerryScript 2.4.0. There is a heap-use-after-free in ecma_bytecode_ref in ecma-helpers.c file.
[ "cpe:2.3:a:jerryscript:jerryscript:2.4.0:*:*:*:*:*:*:*" ]
null
6.5
null
4.3
CVE-2017-17996
A buffer overflow vulnerability in "Add command" functionality exists in Flexense SyncBreeze Enterprise <= 10.3.14. The vulnerability can be triggered by an authenticated attacker who submits more than 5000 characters as the command name. It will cause termination of the SyncBreeze Enterprise server and possibly remote command execution with SYSTEM privilege.
[ "cpe:2.3:a:flexense:syncbreeze:*:*:*:*:enterprise:*:*:*" ]
null
null
8.8
9
CVE-2017-9211
The crypto_skcipher_init_tfm function in crypto/skcipher.c in the Linux kernel through 4.11.2 relies on a setkey function that lacks a key-size check, which allows local users to cause a denial of service (NULL pointer dereference) via a crafted application.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
null
null
5.5
4.9
CVE-2023-1778
Default Credential Vulnerability in GajShield Data Security Firewall
This vulnerability exists in GajShield Data Security Firewall firmware versions prior to v4.28 (except v4.21) due to insecure default credentials which allows remote attacker to login as superuser by using default username/password via web-based management interface and/or exposed SSH port thereby enabling remote attackers to execute arbitrary commands with administrative/superuser privileges on the targeted systems. The vulnerability has been addressed by forcing the user to change their default password to a new non-default password.
[ "cpe:2.3:o:gajshield:data_security_firewall_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:gajshield:data_security_firewall:-:*:*:*:*:*:*:*" ]
null
10
null
null
GHSA-vhgj-m2g2-6jfx
A vulnerability, which was classified as critical, was found in CodeZips Project Management System 1.0. This affects an unknown part of the file /index.php. The manipulation of the argument email leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
[]
6.9
7.3
null
null
GHSA-932h-84vw-p6cw
In the Linux kernel, the following vulnerability has been resolved:net/mlx5e: Avoid field-overflowing memcpy()In preparation for FORTIFY_SOURCE performing compile-time and run-time field bounds checking for memcpy(), memmove(), and memset(), avoid intentionally writing across neighboring fields.Use flexible arrays instead of zero-element arrays (which look like they are always overflowing) and split the cross-field memcpy() into two halves that can be appropriately bounds-checked by the compiler.We were doing:target is wqe->eth.inline_hdr.start (which the compiler sees as being 2 bytes in size), but copying 18, intending to write across start (really vlan_tci, 2 bytes). The remaining 16 bytes get written into wqe->data[0], covering byte_count (4 bytes), lkey (4 bytes), and addr (8 bytes).struct mlx5e_tx_wqe { struct mlx5_wqe_ctrl_seg ctrl; /* 0 16 */ struct mlx5_wqe_eth_seg eth; /* 16 16 */ struct mlx5_wqe_data_seg data[]; /* 32 0 */};struct mlx5_wqe_eth_seg { u8 swp_outer_l4_offset; /* 0 1 */ u8 swp_outer_l3_offset; /* 1 1 */ u8 swp_inner_l4_offset; /* 2 1 */ u8 swp_inner_l3_offset; /* 3 1 */ u8 cs_flags; /* 4 1 */ u8 swp_flags; /* 5 1 */ __be16 mss; /* 6 2 */ __be32 flow_table_metadata; /* 8 4 */ union { struct { __be16 sz; /* 12 2 */ u8 start[2]; /* 14 2 */ } inline_hdr; /* 12 4 */ struct { __be16 type; /* 12 2 */ __be16 vlan_tci; /* 14 2 */ } insert; /* 12 4 */ __be32 trailer; /* 12 4 */ }; /* 12 4 */};struct mlx5_wqe_data_seg { __be32 byte_count; /* 0 4 */ __be32 lkey; /* 4 4 */ __be64 addr; /* 8 8 */};So, split the memcpy() so the compiler can reason about the buffer sizes."pahole" shows no size nor member offset changes to struct mlx5e_tx_wqe nor struct mlx5e_umr_wqe. "objdump -d" shows no meaningful object code changes (i.e. only source line number induced differences and optimizations).
[]
null
null
null
null
GHSA-rfgw-5vq3-wrjf
Buffer Overflow vulnerability in HDFGroup hdf5-h5dump 1.12.0 through 1.13.0 allows attackers to cause a denial of service via h5tools_str_sprint in /hdf5/tools/lib/h5tools_str.c.
[]
null
7.5
null
null
GHSA-2qcm-46qf-rxjj
A vulnerability in local FTP to the Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to cause a partial denial of service (DoS) condition when the FTP application unexpectedly quits. More Information: CSCux68539. Known Affected Releases: 9.1.0-032 9.7.1-000. Known Fixed Releases: 9.1.1-038.
[]
null
null
7.5
null
GHSA-qmx9-wr57-3mx9
Simple Customer Relationship Management System v1.0 was discovered to contain a SQL injection vulnerability via the name parameter on the registration page.
[]
null
5.4
null
null
GHSA-j7j7-g4ww-pxg5
Missing certificate validation in Apache JMeter
In Apache JMeter 2.X and 3.X, when using Distributed Test only (RMI based), jmeter server binds RMI Registry to wildcard host. This could allow an attacker to get Access to JMeterEngine and send unauthorized code. This only affect those running in Distributed mode.In distributed mode, JMeter makes an architectural assumption that it is operating on a 'safe' network. i.e. everyone with access to the network is considered trusted.
[]
null
null
9.8
null
CVE-2013-5510
The remote-access VPN implementation in Cisco Adaptive Security Appliance (ASA) Software 7.x before 7.2(5.12), 8.x before 8.2(5.46), 8.3.x before 8.3(2.39), 8.4.x before 8.4(6), 8.6.x before 8.6(1.12), 9.0.x before 9.0(3.1), and 9.1.x before 9.1(2.5), when an override-account-disable option is enabled, does not properly parse AAA LDAP responses, which allows remote attackers to bypass authentication via a VPN connection attempt, aka Bug ID CSCug83401.
[ "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(0\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(4\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(5\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(5.2\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(6\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(6.7\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(7\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(8\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.1.4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.4.3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.5:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.6:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.7:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.8:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.8:interim:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1\\(2.5\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1\\(2.27\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1\\(2.48\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1\\(2.49\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1\\(5\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(1.22\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.5\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.7\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.8\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.10\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.14\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.15\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.16\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.17\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.18\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.19\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.48\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(3\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(4\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(5\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0\\(3\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0\\(4\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0\\(5\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0\\(5.28\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0\\(5.31\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.5:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(3\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(3.9\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(4\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(4.1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(4.4\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(5\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(5.35\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(5.38\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\(1.11\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\(2.11\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\(3\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\(4.11\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\(5\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6\\(1.10\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1\\(1.7\\):*:*:*:*:*:*:*" ]
null
null
null
4.3
GHSA-5xfp-w3p6-rw45
Multiple PHP file inclusion vulnerabilities in 2BGal 3.0 allow remote attackers to execute arbitrary PHP code via the lang parameter to (1) admin/configuration.inc.php, (2) admin/creer_album.inc.php, (3) admin/changepwd.php.inc, and unspecified other files. NOTE: the provenance of this information is unknown; the details are obtained from third party information.
[]
null
null
null
null
GHSA-m65h-2c6x-9769
Improper limitation of a pathname to a restricted directory ('Path Traversal') vulnerability container volume management component in Synology Docker before 18.09.0-0515 allows local users to read or write arbitrary files via unspecified vectors.
[]
null
null
null
null
ICSMA-18-156-01
Philips' IntelliVue Patient and Avalon Fetal Monitors
The vulnerability allows an unauthenticated attacker to access memory (write-what-where) from an attacker-chosen device address within the same subnet.CVE-2018-10597 has been assigned to this vulnerability. A CVSS v3 base score of 8.3 has been calculated; the CVSS vector string is (AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H). The vulnerability allows an unauthenticated attacker to read memory from an attacker-chosen device address within the same subnet.CVE-2018-10599 has been assigned to this vulnerability. A CVSS v3 base score of 6.4 has been calculated; the CVSS vector string is (AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L). The vulnerability exposes an echo service, in which an attacker-sent buffer to an attacker-chosen device address within the same subnet is copied to the stack with no boundary checks, hence resulting in stack overflow.CVE-2018-10601 has been assigned to this vulnerability. A CVSS v3 base score of 8.2 has been calculated; the CVSS vector string is (AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:H).
[]
null
null
8.2
null
CVE-2022-49334
mm/huge_memory: Fix xarray node memory leak
In the Linux kernel, the following vulnerability has been resolved: mm/huge_memory: Fix xarray node memory leak If xas_split_alloc() fails to allocate the necessary nodes to complete the xarray entry split, it sets the xa_state to -ENOMEM, which xas_nomem() then interprets as "Please allocate more memory", not as "Please free any unnecessary memory" (which was the intended outcome). It's confusing to use xas_nomem() to free memory in this context, so call xas_destroy() instead.
[]
null
5.5
null
null
CVE-2015-1171
Stack-based buffer overflow in GSM SIM Utility (aka SIM Card Editor) 6.6 allows remote attackers to execute arbitrary code via a long entry in a .sms file.
[ "cpe:2.3:a:gsm:sim_card_editor:6.6:*:*:*:*:*:*:*" ]
null
null
null
10
RHSA-2024:8703
Red Hat Security Advisory: container-tools:rhel8 security update
buildah: Buildah allows arbitrary directory mount
[ "cpe:/a:redhat:rhel_aus:8.6::appstream", "cpe:/a:redhat:rhel_e4s:8.6::appstream", "cpe:/a:redhat:rhel_tus:8.6::appstream" ]
null
7.8
null
null
CVE-2016-5974
Cross-site scripting (XSS) vulnerability in the Web UI in IBM Security Privileged Identity Manager (ISPIM) Virtual Appliance 2.x before 2.0.2 FP8 allows remote authenticated users to inject arbitrary web script or HTML via an embedded string.
[ "cpe:2.3:a:ibm:security_privileged_identity_manager_virtual_appliance:*:*:*:*:*:*:*:*" ]
null
null
5.4
3.5
CVE-2006-4306
Unspecified vulnerability in Sun Solaris 8 and 9 before 20060821 allows local users to execute arbitrary commands via unspecified vectors, involving the default Role-Based Access Control (RBAC) settings in the "File System Management" profile.
[ "cpe:2.3:o:sun:solaris:8.0:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:solaris:9.0:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:solaris:9.0:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*" ]
null
null
null
7.2
GHSA-6vcw-rc44-857p
A vulnerability in the Trusted Platform Module (TPM) functionality of software for Cisco Nexus 9000 Series Fabric Switches in Application Centric Infrastructure (ACI) mode could allow an unauthenticated, local attacker with physical access to view sensitive information on an affected device. The vulnerability is due to a lack of proper data-protection mechanisms for disk encryption keys that are used within the partitions on an affected device hard drive. An attacker could exploit this vulnerability by obtaining physical access to the affected device to view certain cleartext keys. A successful exploit could allow the attacker to execute a custom boot process or conduct further attacks on an affected device.
[]
null
null
null
null
CVE-2001-1418
AOL Instant Messenger (AIM) 4.7 allows remote attackers to cause a denial of service (application crash) via a malformed WAV file.
[ "cpe:2.3:a:aol:instant_messenger:4.7:*:*:*:*:*:*:*" ]
null
null
null
5
GHSA-rfp9-6j63-rc88
This issue was addressed with additional entitlement checks. This issue is fixed in macOS Sonoma 14.5, macOS Ventura 13.6.7, macOS Monterey 12.7.5, iOS 16.7.8 and iPadOS 16.7.8. An unprivileged app may be able to log keystrokes in other apps including those using secure input mode.
[]
null
3.3
null
null
CVE-2020-23992
Cross Site Scripting (XSS) in Nagios XI 5.7.1 allows remote attackers to run arbitrary code via returnUrl parameter in a crafted GET request.
[ "cpe:2.3:a:nagios:nagios_xi:5.7.1:*:*:*:*:*:*:*" ]
null
6.1
null
null
GHSA-96hp-38wx-j3wc
Pimcore vulnerable to Cross Site Scripting in Email Blacklist
ImpactThe attacker can execute arbitrary JavaScript and steal Cookies information and use them to hijack the user's session.PatchesUpdate to version 10.5.18 or apply this patch manually https://github.com/pimcore/pimcore/pull/14467.patchWorkaroundsApply https://github.com/pimcore/pimcore/pull/14467.patch manually.Referenceshttps://huntr.dev/bounties/3245ff99-9adf-4db9-af94-f995747e09d1/
[]
null
5.4
null
null
CVE-2019-9767
Stack-based buffer overflow in Free MP3 CD Ripper 2.6, when converting a file, allows user-assisted remote attackers to execute arbitrary code via a crafted .wma file.
[ "cpe:2.3:a:cleanersoft:free_mp3_cd_ripper:2.6:*:*:*:*:*:*:*" ]
null
null
7.8
6.8
CVE-2019-5274
USG9500 with versions of V500R001C30;V500R001C60 have a denial of service vulnerability. Due to a flaw in the X.509 implementation in the affected products which can result in an infinite loop, an attacker may exploit the vulnerability via a malicious certificate to perform a denial of service attack on the affected products.
[ "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:usg9500_firmware:v500r001c60:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*" ]
null
7.5
null
5
CVE-2019-19000
eSOMS Cachecontrol (Pragma) HTTP Header
For ABB eSOMS 4.0 to 6.0.3, the Cache-Control and Pragma HTTP header(s) have not been properly configured within the application response. This can potentially allow browsers and proxies to cache sensitive information.
[ "cpe:2.3:a:hitachienergy:esoms:*:*:*:*:*:*:*:*" ]
null
6.5
null
null
GHSA-f6g5-qxjh-9963
libnetcore in Apple iOS before 8.3, Apple OS X before 10.10.3, and Apple TV before 7.2 allows attackers to cause a denial of service (memory corruption and application crash) via a crafted configuration profile.
[]
null
null
null
null
GHSA-58xv-7h9r-mx3c
Drupal Malicious file upload with filenames stating with dot
Drupal 8 core's file_save_upload() function does not strip the leading and trailing dot ('.') from filenames, like Drupal 7 did.Users with the ability to upload files with any extension in conjunction with contributed modules may be able to use this to upload system files such as .htaccess in order to bypass protections afforded by Drupal's default .htaccess file.After this fix, file_save_upload() now trims leading and trailing dots from filenames.
[]
null
null
null
null
CVE-2016-3353
Microsoft Internet Explorer 9 through 11 mishandles .url files from the Internet zone, which allows remote attackers to bypass intended access restrictions via a crafted file, aka "Internet Explorer Security Feature Bypass."
[ "cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*" ]
null
null
8.3
5.1
CVE-2024-50060
io_uring: check if we need to reschedule during overflow flush
In the Linux kernel, the following vulnerability has been resolved: io_uring: check if we need to reschedule during overflow flush In terms of normal application usage, this list will always be empty. And if an application does overflow a bit, it'll have a few entries. However, nothing obviously prevents syzbot from running a test case that generates a ton of overflow entries, and then flushing them can take quite a while. Check for needing to reschedule while flushing, and drop our locks and do so if necessary. There's no state to maintain here as overflows always prune from head-of-list, hence it's fine to drop and reacquire the locks at the end of the loop.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
null
5.5
null
null
CVE-2017-17321
Huawei eNSP software with software of versions earlier than V100R002C00B510 has a buffer overflow vulnerability. Due to the improper validation of specific command line parameter, a local attacker could exploit this vulnerability to cause the software process abnormal.
[ "cpe:2.3:o:huawei:ensp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:ensp:-:*:*:*:*:*:*:*" ]
null
null
3.3
2.1
CVE-2010-2233
tif_getimage.c in LibTIFF 3.9.0 and 3.9.2 on 64-bit platforms, as used in ImageMagick, does not properly perform vertical flips, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted TIFF image, related to "downsampled OJPEG input."
[ "cpe:2.3:a:libtiff:libtiff:3.9.0:*:*:*:*:*:*:*", "cpe:2.3:a:libtiff:libtiff:3.9.2:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2009-0889
Heap-based buffer overflow in the JBIG2 filter in Adobe Reader 7 and Acrobat 7 before 7.1.3, Adobe Reader 8 and Acrobat 8 before 8.1.6, and Adobe Reader 9 and Acrobat 9 before 9.1.2 might allow remote attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2009-0510, CVE-2009-0511, CVE-2009-0512, and CVE-2009-0888.
[ "cpe:2.3:a:adobe:acrobat:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0:*:professional:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0:*:standard:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.1:*:professional:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.1:*:standard:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.2:*:professional:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.2:*:standard:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.3:*:professional:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.3:*:standard:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.4:*:professional:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.4:*:standard:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.5:*:professional:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.5:*:standard:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.6:*:professional:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.6:*:standard:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.7:*:professional:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.7:*:standard:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.8:*:elements:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.8:*:professional:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.8:*:standard:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.9:*:professional:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.1:*:professional:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.1:*:standard:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.1.1:*:standard:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.0:*:professional:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.0:*:standard:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1:*:standard:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1.1:*:professional:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1.1:*:standard:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1.2:*:professional:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1.2:*:standard:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1.2:security_update:professional:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1.3:*:professional:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1.3:*:standard:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1.4:*:professional:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1.4:*:standard:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.0:*:standard:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.1:*:standard:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:7.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:7.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:7.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:7.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:7.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:7.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:7.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:7.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:7.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:7.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:7.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:8.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:8.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:8.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:8.1.2:security_update:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:8.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:8.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:8.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:9:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:9.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:9.1.1:*:*:*:*:*:*:*" ]
null
null
null
9.3
CVE-2014-3764
Cross-site scripting (XSS) vulnerability in the web-based device management interface in Palo Alto Networks PAN-OS before 5.0.15, 5.1.x before 5.1.10, and 6.0.x before 6.0.6 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka Ref ID 64563.
[ "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:5.1:*:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:5.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:5.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:5.1.3:*:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:5.1.4:*:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:5.1.5:*:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:5.1.6:*:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:5.1.7:*:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:5.1.8:*:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:5.1.9:*:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:6.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:6.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:6.0.3:*:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:6.0.4:*:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:6.0.5:*:*:*:*:*:*:*" ]
null
null
null
4.3
GHSA-3vrx-9pq3-23gp
Compaq TruCluster 1.5 allows remote attackers to cause a denial of service via a port scan from a system that does not have a DNS PTR record, which causes the cluster to enter a "split-brain" state.
[]
null
null
null
null
GHSA-2hjv-5gg5-2v4c
Multiple SQL injection vulnerabilities in TCExam before 5.1.000 allow remote attackers to execute arbitrary SQL commands via unspecified vectors.
[]
null
null
null
null
CVE-2022-30546
Out-of-bounds read vulnerability exists in the simulator module contained in the graphic editor 'V-SFT' versions prior to v6.1.6.0, which may allow an attacker to obtain information and/or execute arbitrary code by having a user to open a specially crafted image file.
[ "cpe:2.3:a:fujielectric:monitouch_v-sft:*:*:*:*:*:*:*:*" ]
null
7.8
null
6.8
RHSA-2022:6560
Red Hat Security Advisory: Openshift Logging Bug Fix Release and Security Update (5.3.12)
golang: compress/gzip: stack exhaustion in Reader.Read
[ "cpe:/a:redhat:logging:5.3::el8" ]
null
7.5
null
null
GHSA-hgvv-9m7h-78q7
Some smartphones have configuration issues. Successful exploitation of this vulnerability may cause kernel privilege escalation, which results in system service exceptions.
[]
null
9.8
null
null
CVE-2023-3541
ThinuTech ThinuCMS author_posts.php cross site scripting
A vulnerability has been found in ThinuTech ThinuCMS 1.5 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /author_posts.php. The manipulation of the argument author with the input g6g12<script>alert(1)</script>o8sdm leads to cross site scripting. The attack can be launched remotely. The identifier VDB-233293 was assigned to this vulnerability.
[ "cpe:2.3:a:thinutech:thinu-cms:1.5:*:*:*:*:*:*:*" ]
null
3.5
3.5
4
cisco-sa-ndb-mhcvuln-vpsBPJ9y
Cisco Nexus Dashboard Unauthorized Access Vulnerabilities
Multiple vulnerabilities in Cisco Nexus Dashboard could allow an unauthenticated, remote attacker to execute arbitrary commands, read or upload container image files, or perform a cross-site request forgery attack. For more information about these vulnerabilities, see the Details ["#details"] section of this advisory. Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.
[]
null
8.8
null
null
CVE-2022-47415
LogicalDOC Messaging Stored XSS
LogicalDOC Enterprise and Community Edition (CE) are vulnerable to a stored (persistent, or "Type II") cross-site scripting (XSS) condition in the in-app messaging system (both subject and message bodies).
[ "cpe:2.3:a:logicaldoc:logicaldoc:8.7.3:*:*:*:community:*:*:*", "cpe:2.3:a:logicaldoc:logicaldoc:8.8.2:*:*:*:enterprise:*:*:*" ]
null
5.4
null
null
GHSA-qp9p-388h-gp24
A vulnerability in all versions of Kuba allows attackers to overwrite arbitrary files in arbitrary directories with crafted Zip files due to improper validation of file paths in .zip archives.
[]
null
null
null
null
CVE-2021-3258
Question2Answer Q2A Ultimate SEO Version 1.3 is affected by cross-site scripting (XSS), which may lead to arbitrary remote code execution.
[ "cpe:2.3:a:qa-themes:q2a_ultimate_seo:1.3:*:*:*:*:question2answer:*:*" ]
null
5.4
null
3.5
GHSA-3862-fmr3-4f3h
Broadleaf vulnerable to Cross-site Scripting
Broadleaf 5.x and 6.x (including 5.2.25-GA and 6.2.6-GA) was discovered to contain a cross-site scripting (XSS) vulnerability via a customer signup with a crafted email address. This is fixed in 6.2.7-GA.
[]
null
6.1
null
null
GHSA-4f9h-qqq9-757g
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Apache Software Foundation apache fineract. Authorized users may be able to exploit this for limited impact on components. This issue affects apache fineract: from 1.4 through 1.8.2.
[]
null
6.3
null
null
CVE-2018-1000846
FreshDNS version 1.0.3 and earlier contains a Cross ite Request Forgery (CSRF) vulnerability in All (authenticated) API calls in index.php / class.manager.php that can result in Editing domains and zones with victim's privileges. This attack appear to be exploitable via Victim must open a website containing attacker's javascript. This vulnerability appears to have been fixed in 1.0.5 and later.
[ "cpe:2.3:a:freshdns_project:freshdns:*:*:*:*:*:*:*:*" ]
null
null
8.8
6.8
CVE-2008-7290
Memory leak in the ldap_explode_rdn API function in IBM Tivoli Directory Server (TDS) 5.2 before 5.2.0.5-TIV-ITDS-LA0007 allows remote authenticated users to cause a denial of service (memory consumption) by making many function calls.
[ "cpe:2.3:a:ibm:tivoli_directory_server:5.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_directory_server:5.2.0.4:*:*:*:*:*:*:*" ]
null
null
null
4
CVE-2020-14811
Vulnerability in the Oracle Applications Manager product of Oracle E-Business Suite (component: AMP EBS Integration). Supported versions that are affected are 12.1.3 and 12.2.3 - 12.2.10. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Applications Manager. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Applications Manager accessible data. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).
[ "cpe:2.3:a:oracle:applications_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:applications_manager:12.1.3:*:*:*:*:*:*:*" ]
null
5.3
null
null
GHSA-4h4q-q4v8-2vq3
An issue was discovered in Squid 2.x, 3.x, and 4.x through 4.8. Due to incorrect data management, it is vulnerable to information disclosure when processing HTTP Digest Authentication. Nonce tokens contain the raw byte value of a pointer that sits within heap memory allocation. This information reduces ASLR protections and may aid attackers isolating memory areas to target for remote code execution attacks.
[]
null
null
null
null
CVE-2017-17825
The Batch Manager component of Piwigo 2.9.2 is vulnerable to Persistent Cross Site Scripting via tags-* array parameters in an admin.php?page=batch_manager&mode=unit request. An attacker can exploit this to hijack a client's browser along with the data stored in it.
[ "cpe:2.3:a:piwigo:piwigo:2.9.2:*:*:*:*:*:*:*" ]
null
null
4.8
3.5
CVE-2008-0406
HTTP File Server (HFS) before 2.2c, when account names are used as log filenames, allows remote attackers to cause a denial of service (daemon crash) via a long account name.
[ "cpe:2.3:a:hfs:http_file_server:*:*:*:*:*:*:*:*" ]
null
null
null
5
CVE-2014-0229
Apache Hadoop 0.23.x before 0.23.11 and 2.x before 2.4.1, as used in Cloudera CDH 5.0.x before 5.0.2, do not check authorization for the (1) refreshNamenodes, (2) deleteBlockPool, and (3) shutdownDatanode HDFS admin commands, which allows remote authenticated users to cause a denial of service (DataNodes shutdown) or perform unnecessary operations by issuing a command.
[ "cpe:2.3:a:cloudera:cdh:5.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:cloudera:cdh:5.0.0:beta:*:*:*:*:*:*", "cpe:2.3:a:cloudera:cdh:5.0.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:apache:hadoop:0.23.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:hadoop:0.23.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:hadoop:0.23.3:*:*:*:*:*:*:*", "cpe:2.3:a:apache:hadoop:0.23.4:*:*:*:*:*:*:*", "cpe:2.3:a:apache:hadoop:0.23.5:*:*:*:*:*:*:*", "cpe:2.3:a:apache:hadoop:0.23.6:*:*:*:*:*:*:*", "cpe:2.3:a:apache:hadoop:0.23.7:*:*:*:*:*:*:*", "cpe:2.3:a:apache:hadoop:0.23.8:*:*:*:*:*:*:*", "cpe:2.3:a:apache:hadoop:0.23.9:*:*:*:*:*:*:*", "cpe:2.3:a:apache:hadoop:0.23.10:*:*:*:*:*:*:*", "cpe:2.3:a:apache:hadoop:2.0.0:alpha:*:*:*:*:*:*", "cpe:2.3:a:apache:hadoop:2.0.1:alpha:*:*:*:*:*:*", "cpe:2.3:a:apache:hadoop:2.0.2:alpha:*:*:*:*:*:*", "cpe:2.3:a:apache:hadoop:2.0.3:alpha:*:*:*:*:*:*", "cpe:2.3:a:apache:hadoop:2.0.4:alpha:*:*:*:*:*:*", "cpe:2.3:a:apache:hadoop:2.0.5:alpha:*:*:*:*:*:*", "cpe:2.3:a:apache:hadoop:2.0.6:alpha:*:*:*:*:*:*", "cpe:2.3:a:apache:hadoop:2.1.0:beta:*:*:*:*:*:*", "cpe:2.3:a:apache:hadoop:2.1.1:beta:*:*:*:*:*:*", "cpe:2.3:a:apache:hadoop:2.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:hadoop:2.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:hadoop:2.4.0:*:*:*:*:*:*:*" ]
null
null
6.5
4
GHSA-mc83-gm47-m9vc
A vulnerability in the call-handling functionality of Session Initiation Protocol (SIP) Software for Cisco IP Phone 7800 Series and 8800 Series could allow an unauthenticated, remote attacker to cause an affected phone to reload unexpectedly, resulting in a temporary denial of service (DoS) condition. The vulnerability is due to incomplete error handling when XML data within a SIP packet is parsed. An attacker could exploit this vulnerability by sending a SIP packet that contains a malicious XML payload to an affected phone. A successful exploit could allow the attacker to cause the affected phone to reload unexpectedly, resulting in a temporary DoS condition.
[]
null
null
null
null
CVE-2020-18169
A vulnerability in the Windows installer XML (WiX) toolset of TechSmith Snagit 19.1.1.2860 allows attackers to escalate privileges. NOTE: Exploit of the Snagit installer would require the end user to ignore other safety mechanisms provided by the Host OS. See reference document for more details
[ "cpe:2.3:a:techsmith:snagit:19.1.1.2860:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
7.8
null
4.4
GHSA-wvph-mf6h-fpww
The WP Church Donation plugin for WordPress is vulnerable to Stored Cross-Site Scripting via several donation form submission parameters in all versions up to, and including, 1.7 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
7.2
null
null
CVE-2025-2857
Following the recent Chrome sandbox escape (CVE-2025-2783), various Firefox developers identified a similar pattern in our IPC code. A compromised child process could cause the parent process to return an unintentionally powerful handle, leading to a sandbox escape. The original vulnerability was being exploited in the wild. *This only affects Firefox on Windows. Other operating systems are unaffected.* This vulnerability affects Firefox < 136.0.4, Firefox ESR < 128.8.1, and Firefox ESR < 115.21.1.
[]
null
10
null
null