id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
139k
cpes
sequencelengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
CVE-2014-8643
Mozilla Firefox before 35.0 on Windows allows remote attackers to bypass the Gecko Media Plugin (GMP) sandbox protection mechanism by leveraging access to the GMP process, as demonstrated by the OpenH264 plugin's process.
[ "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*" ]
null
null
null
7.1
GHSA-5mxp-qppg-qw97
An information disclosure vulnerability in libavc in Mediaserver could enable a local malicious application to access data outside of its permission levels. This issue is rated as Moderate because it could be used to access data without permission. Product: Android. Versions: 6.0, 6.0.1, 7.0, 7.1.1. Android ID: A-33551775.
[]
null
null
5.5
null
GHSA-r5qv-ggx3-m45h
Vulnerability in the Oracle Email Center product of Oracle E-Business Suite (component: Message Display). Supported versions that are affected are 12.1.1-12.1.3 and 12.2.3-12.2.9. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Email Center. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Email Center, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Email Center accessible data as well as unauthorized update, insert or delete access to some of Oracle Email Center accessible data. CVSS 3.1 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N).
[]
null
null
null
null
CVE-2024-39886
TONE store App version 3.4.2 and earlier contains an issue with unprotected primary channel. Since TONE store App communicates with TONE store website in cleartext, a man-in-the-middle attack may allow an attacker to obtain and/or alter communications of the affected App.
[]
null
3.7
null
null
CVE-2012-5669
The _bdf_parse_glyphs function in FreeType before 2.4.11 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to BDF fonts and an incorrect calculation that triggers an out-of-bounds read.
[ "cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:freetype:freetype:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:freetype:freetype:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:freetype:freetype:2.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:freetype:freetype:2.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:freetype:freetype:2.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:freetype:freetype:2.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:freetype:freetype:2.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:freetype:freetype:2.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*", "cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*", "cpe:2.3:a:freetype:freetype:2.1.8:rc1:*:*:*:*:*:*", "cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*", "cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*", "cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*", "cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*", "cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*", "cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*", "cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*", "cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*", "cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*", "cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:freetype:freetype:2.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:freetype:freetype:2.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:freetype:freetype:2.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:freetype:freetype:2.4.5:*:*:*:*:*:*:*", "cpe:2.3:a:freetype:freetype:2.4.6:*:*:*:*:*:*:*", "cpe:2.3:a:freetype:freetype:2.4.7:*:*:*:*:*:*:*", "cpe:2.3:a:freetype:freetype:2.4.8:*:*:*:*:*:*:*", "cpe:2.3:a:freetype:freetype:2.4.9:*:*:*:*:*:*:*" ]
null
null
null
4.3
GHSA-vmj5-7v67-82hg
Rejected reason: Not used
[]
null
null
null
null
CVE-2015-6555
Symantec Endpoint Protection Manager (SEPM) 12.1 before 12.1-RU6-MP3 allows remote attackers to execute arbitrary Java code by connecting to the console Java port.
[ "cpe:2.3:a:symantec:endpoint_protection_manager:*:ru6mp2:*:*:*:*:*:*" ]
null
null
null
8.5
GHSA-v34c-74qj-4959
Cisco IOS XR allows remote attackers to cause a denial of service (RSVP process reload) via a malformed RSVP packet, aka Bug ID CSCur69192.
[]
null
null
null
null
GHSA-q2vq-xj2q-g729
Information disclosure in WLAN HAL while handling command through WMI interfaces.
[]
null
5.5
null
null
GHSA-23pc-48q7-q3fw
The "Forminator Contact Form, Poll & Quiz Builder" plugin before 1.6 for WordPress has SQL Injection via the wp-admin/admin.php?page=forminator-entries entry[] parameter if the attacker has the delete permission.
[]
null
null
6.5
null
GHSA-jh62-xx57-p239
Alpine Halo9 DecodeUTF7 Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Alpine Halo9 devices. An attacker must first obtain the ability to pair a malicious Bluetooth device with the target system in order to exploit this vulnerability.The specific flaw exists within the DecodeUTF7 function. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root.Was ZDI-CAN-23249
[]
null
8
null
null
GHSA-9cq3-fj2h-ggj5
Vulnerability in remove function leads to arbitrary code execution via filePath parameters
Aaptjs is a node wraper for aapt. An issue was discovered in the remove function in shenzhim aaptjs 1.3.1, allows attackers to execute arbitrary code via the filePath parameters.
[]
null
9.8
null
null
GHSA-94rj-cgwh-p385
In Wireshark 3.0.0, the Rbm dissector could go into an infinite loop. This was addressed in epan/dissectors/file-rbm.c by handling unknown object types safely.
[]
null
null
7.5
null
CVE-2022-30120
XSS in /dashboard/blocks/stacks/view_details/ - old browsers only. When using an older browser with built-in XSS protection disabled, insufficient sanitation where built urls are outputted can be exploited for Concrete 8.5.7 and below as well as Concrete 9.0 through 9.0.2 to allow XSS. This cannot be exploited in modern-day web browsers due to an automatic input escape mechanism. Concrete CMS Security team ranked this vulnerability 3.1with CVSS v3.1 Vector AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N. Sanitation has been added where built urls are output. Credit to Credit to Bogdan Tiron from FORTBRIDGE (https://www.fortbridge.co.uk/ ) for reporting
[ "cpe:2.3:a:concretecms:concrete_cms:*:*:*:*:*:*:*:*" ]
null
6.1
null
4.3
CVE-2020-11736
fr-archive-libarchive.c in GNOME file-roller through 3.36.1 allows Directory Traversal during extraction because it lacks a check of whether a file's parent is a symlink to a directory outside of the intended extraction location.
[ "cpe:2.3:a:gnome:file-roller:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*" ]
null
3.9
null
3.3
CVE-2025-23010
An Improper Link Resolution Before File Access ('Link Following') vulnerability in SonicWall NetExtender Windows (32 and 64 bit) client which allows an attacker to manipulate file paths.
[]
null
7.2
null
null
CVE-2020-10048
A vulnerability has been identified in SIMATIC PCS 7 (All versions), SIMATIC WinCC (All versions < V7.5 SP2). Due to an insecure password verification process, an attacker could bypass the password protection set on protected files, thus being granted access to the protected content, circumventing authentication.
[ "cpe:2.3:a:siemens:simatic_pcs_7:*:*:*:*:*:*:*:*", "cpe:2.3:a:siemens:simatic_wincc:*:*:*:*:*:*:*:*", "cpe:2.3:a:siemens:simatic_wincc:7.5:sp1:*:*:*:*:*:*", "cpe:2.3:a:siemens:simatic_wincc:7.5:sp1_update1:*:*:*:*:*:*", "cpe:2.3:a:siemens:simatic_wincc:7.5:sp1_update2:*:*:*:*:*:*" ]
null
5.5
null
2.1
RHSA-2021:0931
Red Hat Security Advisory: openvswitch2.11 and ovn2.11 security update
lldpd: buffer overflow in the lldp_decode function in daemon/protocols/lldp.c dpdk: librte_vhost Integer overflow in vhost_user_set_log_base() dpdk: librte_vhost Integer truncation in vhost_user_check_and_alloc_queue_pair() dpdk: librte_vhost Missing inputs validation in Vhost-crypto
[ "cpe:/a:redhat:openstack:13::el7" ]
null
5.1
null
null
CVE-2020-2112
Jenkins Git Parameter Plugin 0.9.11 and earlier does not escape the parameter name shown on the UI, resulting in a stored cross-site scripting vulnerability exploitable by users with Job/Configure permission.
[ "cpe:2.3:a:jenkins:git_parameter:*:*:*:*:*:jenkins:*:*" ]
null
5.4
null
3.5
CVE-2024-25592
WordPress Broken Link Checker plugin <= 2.2.3 - Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WPMU DEV Broken Link Checker allows Stored XSS.This issue affects Broken Link Checker: from n/a through 2.2.3.
[]
null
5.9
null
null
GHSA-hh2g-39pc-2575
Use after free in WebRTC in Google Chrome on Windows prior to 110.0.5481.177 allowed a remote attacker who convinced the user to engage in specific UI interactions to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
[]
null
8.8
null
null
CVE-2021-43484
A Remote Code Execution (RCE) vulnerability exists in Simple Client Management System 1.0 in create.php due to the failure to validate the extension of the file being sent in a request.
[ "cpe:2.3:a:simple_client_management_system_project:simple_client_management_system:1.0:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
GHSA-j9c9-whc9-xw8p
Pexip Infinity before 27.3 allows remote attackers to trigger a software abort, and possibly enumerate usernames, via One Touch Join.
[]
null
8.2
null
null
RHSA-2021:1983
Red Hat Security Advisory: idm:DL1 security update
slapi-nis: NULL dereference (DoS) with specially crafted Binding DN
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.5
null
null
GHSA-x525-3wpj-gc6f
In Responsive Filemanager < 9.12.0, an attacker can bypass upload restrictions resulting in RCE.
[]
null
9.8
null
null
CVE-2023-3232
Zhong Bang CRMEB Image Upload app_auth deserialization
A vulnerability was found in Zhong Bang CRMEB up to 4.6.0 and classified as critical. This issue affects some unknown processing of the file /api/wechat/app_auth of the component Image Upload. The manipulation leads to deserialization. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-231503. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
[ "cpe:2.3:a:crmeb:crmeb:*:*:*:*:*:*:*:*" ]
null
6.3
6.3
5.8
CVE-2018-0267
A vulnerability in the web framework of Cisco Unified Communications Manager could allow an authenticated, local attacker to view sensitive data that should be restricted. This could include LDAP credentials. The vulnerability is due to insufficient protection of database tables over the web interface. An attacker could exploit this vulnerability by browsing to a specific URL. An exploit could allow the attacker to view sensitive information that should have been restricted. Cisco Bug IDs: CSCvf22116.
[ "cpe:2.3:a:cisco:unified_communications_manager:10.5\\(2.10000.5\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:11.0\\(1.10000.10\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:11.5\\(1.10000.6\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:12.0\\(1.10000.10\\):*:*:*:*:*:*:*" ]
null
6.5
null
2.1
GHSA-48w5-c2rf-fc9x
Multiple vulnerabilities in Cisco SD-WAN products could allow an authenticated attacker to perform command injection attacks against an affected device, which could allow the attacker to take certain actions with root privileges on the device. For more information about these vulnerabilities, see the Details section of this advisory.
[]
null
7.8
null
null
GHSA-c6f6-vj36-33pw
A rule file in module-assistant before 0.9.10 causes a temporary file to be created insecurely, which allows local users to conduct unauthorized operations.
[]
null
null
null
null
GHSA-pgrg-w473-pm52
Insufficient validation of the IOCTL (Input Output Control) input buffer in AMD Ryzen™ Master may allow a privileged attacker to provide a null value potentially resulting in a Windows crash leading to denial of service.
[]
null
4.4
null
null
GHSA-968p-4wvh-cqc8
Babel has inefficient RegExp complexity in generated code with .replace when transpiling named capturing groups
ImpactWhen using Babel to compile [regular expression named capturing groups](https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference/Regular_expressions/Named_capturing_group), Babel will generate a polyfill for the `.replace` method that has quadratic complexity on some specific replacement pattern strings (i.e. the second argument passed to `.replace`).Your generated code is vulnerable if _all_ the following conditions are true:You use Babel to compile [regular expression named capturing groups](https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference/Regular_expressions/Named_capturing_group)You use the `.replace` method on a regular expression that contains named capturing groups**Your code uses untrusted strings as the second argument of `.replace`**If you are using `@babel/preset-env` with the [`targets`](https://babeljs.io/docs/options#targets) option, the transform that injects the vulnerable code is automatically enabled if:you use [_duplicated_ named capturing groups](https://github.com/tc39/proposal-duplicate-named-capturing-groups), and target any browser older than Chrome/Edge 126, Opera 112, Firefox 129, Safari 17.4, or Node.js 23you use any [named capturing groups](https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference/Regular_expressions/Named_capturing_group), and target any browser older than Chrome 64, Opera 71, Edge 79, Firefox 78, Safari 11.1, or Node.js 10You can verify what transforms `@babel/preset-env` is using by enabling the [`debug` option](https://babeljs.io/docs/babel-preset-env#debug).PatchesThis problem has been fixed in `@babel/helpers` and `@babel/runtime` 7.26.10 and 8.0.0-alpha.17, please upgrade. It's likely that you do not directly depend on `@babel/helpers`, and instead you depend on `@babel/core` (which itself depends on `@babel/helpers`). Upgrading to `@babel/core` 7.26.10 is not required, but it guarantees that you are on a new enough `@babel/helpers` version.Please note that just updating your Babel dependencies is not enough: you will also need to re-compile your code.WorkaroundsIf you are passing user-provided strings as the second argument of `.replace` on regular expressions that contain named capturing groups, validate the input and make sure it does not contain the substring `$<` if it's then not followed by `>` (possibly with other characters in between).ReferencesThis vulnerability was reported and fixed in https://github.com/babel/babel/pull/17173.
[]
null
6.2
null
null
CVE-2013-1910
yum does not properly handle bad metadata, which allows an attacker to cause a denial of service and possibly have other unspecified impact via a Trojan horse file in the metadata of a remote repository.
[ "cpe:2.3:a:baseurl:yum:3.4.3:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
GHSA-2c44-c825-pqp7
** UNSUPPPORTED WHEN ASSIGNED ** ** UNSUPPORTED WHEN ASSIGNED ** Out-of-bounds Write vulnerability in Hitachi EH-VIEW (Designer) allows local attackers to potentially execute arbitray code on affected EH-VIEW installations. User interaction is required to exploit the vulnerabilities in that the user must open a malicious file. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
[]
null
7.8
null
null
GHSA-852r-9m3w-pq97
Buffer overflow in the png_decompress_chunk function in pngrutil.c in libpng before 1.2.12 allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via unspecified vectors related to "chunk error processing," possibly involving the "chunk_name".
[]
null
null
null
null
CVE-2021-29548
Division by 0 in `QuantizedBatchNormWithGlobalNormalization`
TensorFlow is an end-to-end open source platform for machine learning. An attacker can cause a runtime division by zero error and denial of service in `tf.raw_ops.QuantizedBatchNormWithGlobalNormalization`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/55a97caa9e99c7f37a0bbbeb414dc55553d3ae7f/tensorflow/core/kernels/quantized_batch_norm_op.cc) does not validate all constraints specified in the op's contract(https://www.tensorflow.org/api_docs/python/tf/raw_ops/QuantizedBatchNormWithGlobalNormalization). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
[ "cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*" ]
null
2.5
null
null
GHSA-v4xx-crpm-hh5w
A vulnerability in the web framework of Cisco Firepower Management Center could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web interface. Affected Products: Cisco Firepower Management Center Releases 5.4.1.x and prior. More Information: CSCuy88951. Known Affected Releases: 5.4.1.6.
[]
null
null
5.4
null
CVE-2024-45672
IBM Security Verify Bridge data manipulation
IBM Security Verify Bridge 1.0.0 through 1.0.15 could allow a local privileged user to overwrite files due to excessive privileges granted to the agent. which could also cause a denial of service.
[]
null
6
null
null
GHSA-pmmp-33fg-6g8f
Azure Guest Configuration and Azure Arc-enabled servers Elevation of Privilege Vulnerability.
[]
null
7.8
null
null
CVE-2009-3949
cp/profile.php in VivaPrograms Infinity 2.0.5 and earlier does not require administrative authentication for the donewauthor action, which allows remote attackers to create administrative accounts via the name, password, and conf_password parameters.
[ "cpe:2.3:a:vivaprograms:infinity_script:*:*:*:*:*:*:*:*", "cpe:2.3:a:vivaprograms:infinity_script:2.0.0:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-v3ph-2ff8-mh78
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the Form count property. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-6477.
[]
null
null
8.8
null
CVE-2001-1556
The log files in Apache web server contain information directly supplied by clients and does not filter or quote control characters, which could allow remote attackers to hide HTTP requests and spoof source IP addresses when logs are viewed with UNIX programs such as cat, tail, and grep.
[ "cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*" ]
null
null
null
5
CVE-2023-24152
A command injection vulnerability in the serverIp parameter in the function meshSlaveUpdate of TOTOLINK T8 V4.1.5cu allows attackers to execute arbitrary commands via a crafted MQTT packet.
[ "cpe:2.3:o:totolink:t8_firmware:v4.1.5cu:*:*:*:*:*:*:*", "cpe:2.3:h:totolink:t8:-:*:*:*:*:*:*:*" ]
null
9.8
null
null
CVE-2011-1776
The is_gpt_valid function in fs/partitions/efi.c in the Linux kernel before 2.6.39 does not check the size of an Extensible Firmware Interface (EFI) GUID Partition Table (GPT) entry, which allows physically proximate attackers to cause a denial of service (heap-based buffer overflow and OOPS) or obtain sensitive information from kernel heap memory by connecting a crafted GPT storage device, a different vulnerability than CVE-2011-1577.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_aus:5.6:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_eus:5.6:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*" ]
null
6.1
null
5.6
GHSA-v5g9-wqg7-v2q8
A size-validation issue was discovered in opj_j2k_write_sot in lib/openjp2/j2k.c in OpenJPEG 2.2.0. The vulnerability causes an out-of-bounds write, which may lead to remote denial of service (heap-based buffer overflow affecting opj_write_bytes_LE in lib/openjp2/cio.c) or possibly remote code execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2017-14152.
[]
null
8.8
null
null
GHSA-f4f8-xfww-r4hf
OS command injection occurring in versions of OpenEMR before 5.0.1.4 allows a remote authenticated attacker to execute arbitrary commands by making a crafted request to interface/fax/fax_dispatch.php after modifying the "hylafax_enscript" global variable in interface/super/edit_globals.php.
[]
null
null
8.8
null
ICSMA-22-151-01
BD Pyxis
Specific BD Pyxis products were installed with default credentials and may still operate with these credentials. There may be scenarios where BD Pyxis products are installed with the same default local operating system credentials or domain-joined server(s) credentials that may be shared across product types. Threat actors could exploit this vulnerability to gain privileged access to the underlying file system and exploit or gain access to ePHI or other sensitive information.CVE-2022-22767 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been assigned; the CVSS vector string is (AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
[]
null
null
8.8
null
GHSA-w5pm-jf53-p26g
This issue was addressed with improved entitlements. This issue affected versions prior to iOS 12.1.1.
[]
null
null
3.3
null
CVE-2002-0257
Cross-site scripting vulnerability in auction.pl of MakeBid Auction Deluxe 3.30 allows remote attackers to obtain information from other users via the form fields (1) TITLE, (2) DESCTIT, (3) DESC, (4) searchstring, (5) ALIAS, (6) EMAIL, (7) ADDRESS1, (8) ADDRESS2, (9) ADDRESS3, (10) PHONE1, (11) PHONE2, (12) PHONE3, or (13) PHONE4.
[ "cpe:2.3:a:apache:http_server:1.3.17:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:1.3.18:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:1.3.19:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:1.3.20:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:1.3.22:*:*:*:*:*:*:*", "cpe:2.3:a:usanet_creations:makebid_auction_deluxe:3.30:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-6hr4-77vc-5v97
An issue wan discovered in admin\controllers\database.php in HongCMS 3.0.0. There is a SQL Injection vulnerability via an admin/index.php/database/operate?dbaction=emptytable&tablename= URI.
[]
null
null
7.2
null
CVE-2021-41805
HashiCorp Consul Enterprise before 1.8.17, 1.9.x before 1.9.11, and 1.10.x before 1.10.4 has Incorrect Access Control. An ACL token (with the default operator:write permissions) in one namespace can be used for unintended privilege escalation in a different namespace.
[ "cpe:2.3:a:hashicorp:consul:*:*:*:*:enterprise:*:*:*" ]
null
8.8
null
6.5
GHSA-mjc4-qpgx-fg5c
In memory management driver, there is a possible out of bounds write due to uninitialized data. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android SoCAndroid ID: A-185196175
[]
null
7.8
null
null
GHSA-pf37-jwfx-9v75
SQL injection vulnerability in form.php in WebMember 1.0 allows remote authenticated users to execute arbitrary SQL commands via the formID parameter.
[]
null
null
null
null
GHSA-vf7p-j8x6-xvwp
Incorrect Authorization in Apache Solr
When using ConfigurableInternodeAuthHadoopPlugin for authentication, Apache Solr versions prior to 8.8.2 would forward/proxy distributed requests using server credentials instead of original client credentials. This would result in incorrect authorization resolution on the receiving hosts.
[]
null
9.1
null
null
CVE-2024-48224
Funadmin v5.0.2 has an arbitrary file read vulnerability in /curd/index/editfile.
[ "cpe:2.3:a:funadmin:funadmin:5.0.2:*:*:*:*:*:*:*" ]
null
7.5
null
null
CVE-2004-1179
The debstd script in debmake 3.6.x before 3.6.10 and 3.7.x before 3.7.7 allows local users to overwrite arbitrary files via a symlink attack on temporary directories.
[ "cpe:2.3:a:debian:debmake:*:*:*:*:*:*:*:*" ]
null
null
null
2.1
CVE-2017-7941
The ReadSGIImage function in sgi.c in ImageMagick 7.0.5-4 allows remote attackers to consume an amount of available memory via a crafted file.
[ "cpe:2.3:a:imagemagick:imagemagick:7.0.5-4:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" ]
null
null
6.5
4.3
GHSA-3vw6-2x4m-gr8r
Equation Editor in Microsoft Office 2007, Microsoft Office 2010, Microsoft Office 2013, and Microsoft Office 2016 allows a remote code execution vulnerability due to the way objects are handled in memory, aka "Microsoft Office Remote Code Execution Vulnerability".
[]
null
null
8.8
null
CVE-2015-3351
Multiple cross-site request forgery (CSRF) vulnerabilities in the Log Watcher module before 6.x-1.2 for Drupal allow remote attackers to hijack the authentication of administrators for requests that (1) enable, (2) disable, or (3) delete a report via unspecified vectors.
[ "cpe:2.3:a:log_watcher_project:log_watcher:*:*:*:*:*:drupal:*:*" ]
null
null
null
6.8
GHSA-w9pm-7cxw-vw6j
The product allows user input to control or influence paths or file names that are used in filesystem operations, allowing the attacker to access or modify system files or other files that are critical to the application.
[]
null
9.9
null
null
CVE-2012-1427
The TAR file parser in Quick Heal (aka Cat QuickHeal) 11.00, Norman Antivirus 6.06.12, and Sophos Anti-Virus 4.61.0 allows remote attackers to bypass malware detection via a POSIX TAR file with a \57\69\6E\5A\69\70 character sequence at a certain location. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations.
[ "cpe:2.3:a:cat:quick_heal:11.00:*:*:*:*:*:*:*", "cpe:2.3:a:norman:norman_antivirus_\\&_antispyware:6.06.12:*:*:*:*:*:*:*", "cpe:2.3:a:sophos:sophos_anti-virus:4.61.0:*:*:*:*:*:*:*" ]
null
null
null
4.3
CVE-2021-3177
Python 3.x through 3.9.1 has a buffer overflow in PyCArg_repr in _ctypes/callproc.c, which may lead to remote code execution in certain Python applications that accept floating-point numbers as untrusted input, as demonstrated by a 1e300 argument to c_double.from_param. This occurs because sprintf is used unsafely.
[ "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*", "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*", "cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:22.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:communications_offline_mediation_controller:12.0.0.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:communications_pricing_design_center:12.0.0.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
CVE-2023-22714
WordPress Coming Soon by Supsystic Plugin <= 1.7.10 is vulnerable to Cross Site Request Forgery (CSRF)
Cross-Site Request Forgery (CSRF) vulnerability in Supsystic Coming Soon by Supsystic plugin <= 1.7.10 versions.
[ "cpe:2.3:a:supsystic:coming_soon:*:*:*:*:*:wordpress:*:*" ]
null
4.3
null
null
GHSA-g5pm-xmgf-pjcq
Improper input validation in XmlCli feature for UEFI firmware for some Intel(R) processors may allow privileged user to potentially enable escalation of privilege via local access.
[]
8.7
7.5
null
null
GHSA-vf45-6r45-mrvj
An out of bounds read was discovered in H5O_fill_new_decode and H5O_fill_old_decode in H5Ofill.c in the HDF HDF5 1.10.2 library. It could allow a remote denial of service or information disclosure attack.
[]
null
null
8.1
null
GHSA-4gq5-gf4j-j5rc
SQL injection vulnerability in admin/delete.php in BilboBlog 0.2.1, when magic_quotes_gpc is disabled, allows remote authenticated administrators to execute arbitrary SQL commands via the num parameter.
[]
null
null
null
null
CVE-2022-34155
WordPress OAuth Single Sign On – SSO (OAuth Client) Plugin <= 6.23.3 is vulnerable to Broken Authentication
Improper Authentication vulnerability in miniOrange OAuth Single Sign On – SSO (OAuth Client) plugin allows Authentication Bypass.This issue affects OAuth Single Sign On – SSO (OAuth Client): from n/a through 6.23.3.
[ "cpe:2.3:a:miniorange:oauth_single_sign_on:*:*:*:*:*:wordpress:*:*" ]
null
8.8
null
null
GHSA-j8xg-fqg3-53r7
word-wrap vulnerable to Regular Expression Denial of Service
All versions of the package word-wrap are vulnerable to Regular Expression Denial of Service (ReDoS) due to the usage of an insecure regular expression within the result variable.
[]
null
5.3
null
null
CVE-2017-0107
Microsoft SharePoint Server fails to sanitize crafted web requests, allowing remote attackers to run cross-script in local security context, aka "Microsoft SharePoint XSS Vulnerability."
[ "cpe:2.3:a:microsoft:sharepoint_foundation:2013:sp1:*:*:*:*:*:*" ]
null
null
6.1
4.3
GHSA-cwpg-2qv7-g34j
The CM Email Registration Blacklist and Whitelist WordPress plugin before 1.4.9 does not have CSRF check when adding or deleting an item from the blacklist or whitelist, which could allow attackers to make a logged in admin add or delete settings from the blacklist or whitelist menu via a CSRF attack
[]
null
8.1
null
null
GHSA-8vcg-h82j-6975
IBM MQ and IBM MQ Appliance 7.1, 7.5, 8.0, 9.0 LTS, 9.1 LTS, and 9.1 CD is vulnerable to a denial of service attack that would allow an authenticated user to crash the queue and require a restart due to an error processing error messages. IBM X-Force ID: 170967.
[]
null
null
null
null
CVE-2023-25749
Android applications with unpatched vulnerabilities can be launched from a browser using Intents, exposing users to these vulnerabilities. Firefox will now confirm with users that they want to launch an external application before doing so. <br>*This bug only affects Firefox for Android. Other versions of Firefox are unaffected.*. This vulnerability affects Firefox < 111.
[ "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:android:*:*" ]
null
4.3
null
null
GHSA-g6f6-787v-hqqp
Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information.
[]
null
4.8
null
null
GHSA-f4v6-fqq8-p9x5
The Themify Post Type Builder Search Addon WordPress plugin before 1.4.0 does not properly escape the current page URL before reusing it in a HTML attribute, leading to a reflected cross site scripting vulnerability.
[]
null
6.1
null
null
GHSA-x34m-wh8g-2mpf
Failure to assign a new report ID to an imported guest may potentially result in an SEV-SNP guest VM being tricked into trusting a dishonest Migration Agent (MA).
[]
null
5.5
null
null
GHSA-mg6c-gfh2-q76m
A cross-site-scripting (XSS) vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server, aka 'Microsoft Office SharePoint XSS Vulnerability'.
[]
null
5.4
null
null
CVE-2022-22637
A logic issue was addressed with improved state management. This issue is fixed in macOS Monterey 12.3, Safari 15.4, watchOS 8.5, iOS 15.4 and iPadOS 15.4, tvOS 15.4. A malicious website may cause unexpected cross-origin behavior.
[ "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*" ]
null
8.8
null
null
CVE-2022-32492
Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by using an SMI to gain arbitrary code execution in SMRAM.
[ "cpe:2.3:o:dell:bios:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_5820_tower:-:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_7820_tower:-:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_7920_tower:-:*:*:*:*:*:*:*" ]
null
7.5
null
null
GHSA-g5wm-487r-4228
AIX passwd allows local users to gain root access.
[]
null
null
null
null
CVE-2014-3178
Use-after-free vulnerability in core/dom/Node.cpp in Blink, as used in Google Chrome before 37.0.2062.120, allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging improper handling of render-tree inconsistencies.
[ "cpe:2.3:a:google:chrome:37.0.2062.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.2:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.3:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.4:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.5:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.6:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.7:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.8:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.9:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.10:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.11:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.12:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.13:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.14:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.15:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.16:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.17:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.18:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.19:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.20:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.21:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.22:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.23:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.24:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.25:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.26:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.27:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.28:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.29:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.30:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.31:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.32:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.33:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.34:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.35:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.36:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.37:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.39:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.43:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.44:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.45:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.46:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.47:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.48:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.49:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.50:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.51:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.52:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.53:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.54:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.55:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.56:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.57:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.58:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.59:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.60:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.61:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.62:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.63:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.64:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.65:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.66:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.67:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.68:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.69:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.70:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.71:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.72:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.73:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.74:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.75:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.76:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.77:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.78:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.80:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.81:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.89:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.90:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.91:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.92:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.93:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.94:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.95:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.96:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.97:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.99:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.100:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.113:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-wcqr-2wvg-p8mc
The Clock In Portal- Staff & Attendance Management WordPress plugin through 2.1 does not have CSRF check when deleting Staff members, which could allow attackers to make logged in admins delete arbitrary Staff via a CSRF attack
[]
null
4.3
null
null
GHSA-99fr-5jwf-5mf5
Faveo 5.0.1 allows remote attackers to obtain sensitive information via a modified user ID in an Insecure Direct Object Reference (IDOR) attack.
[]
null
6.5
null
null
CVE-2012-2548
Use-after-free vulnerability in Microsoft Internet Explorer 9 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Layout Use After Free Vulnerability."
[ "cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:9:beta1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:9:rc1:*:*:*:*:*:*" ]
null
null
null
9.3
CVE-2009-1444
PHP remote file inclusion vulnerability in indexk.php in WebPortal CMS 0.8-beta allows remote attackers to execute arbitrary PHP code via a URL in the lib_path parameter.
[ "cpe:2.3:a:webportal:webportal_cms:0.8_beta:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2025-21423
Improper Validation of Array Index in Display
Memory corruption occurs when handling client calls to EnableTestMode through an Escape call.
[]
null
7.8
null
null
CVE-2011-1886
win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP3 does not properly validate the arguments to functions, which allows local users to read arbitrary data from kernel memory via a crafted application that triggers a NULL pointer dereference, aka "Win32k Incorrect Parameter Validation Allows Information Disclosure Vulnerability."
[ "cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*" ]
null
null
null
2.1
CVE-2002-0382
XChat IRC client allows remote attackers to execute arbitrary commands via a /dns command on a host whose DNS reverse lookup contains shell metacharacters.
[ "cpe:2.3:a:xchat:xchat:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-f9h4-h7gc-c283
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
[]
null
null
null
null
GHSA-9q4p-wv38-76g5
Absolute directory traversal vulnerability in a certain ActiveX control in the VB To VSI Support Library (VBTOVSI.DLL) 1.0.0.0 in Microsoft Visual Studio 6.0 allows remote attackers to create or overwrite arbitrary files via a full pathname in the argument to the SaveAs method. NOTE: contents can be copied from local files via the Load method.
[]
null
null
null
null
CVE-2019-1823
Cisco Prime Infrastructure and Evolved Programmable Network Manager Remote Code Execution Vulnerabilities
A vulnerability in the web-based management interface of Cisco Prime Infrastructure (PI) and Cisco Evolved Programmable Network (EPN) Manager could allow an authenticated, remote attacker to execute code with root-level privileges on the underlying operating system. This vulnerability exist because the software improperly validates user-supplied input. An attacker could exploit this vulnerability by uploading a malicious file to the administrative web interface. A successful exploit could allow the attacker to execute code with root-level privileges on the underlying operating system.
[ "cpe:2.3:a:cisco:evolved_programmable_network_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:network_level_service:3.0\\(0.0.83b\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:prime_infrastructure:*:*:*:*:*:*:*:*" ]
null
null
8.8
null
GHSA-7ppq-h9vg-8jm8
When a user opens manipulated Radiance Picture (.hdr, hdr.x3d) files received from untrusted sources in SAP 3D Visual Enterprise Viewer, the application crashes and becomes temporarily unavailable to the user until restart of the application.
[]
null
5.5
null
null
GHSA-8mq5-f87c-x4p2
A logic issue was addressed with improved checks. This issue is fixed in visionOS 2.4, iOS 18.4 and iPadOS 18.4, tvOS 18.4, macOS Sequoia 15.4. Processing maliciously crafted web content may result in the disclosure of process memory.
[]
null
6.5
null
null
GHSA-42qq-mf68-hprg
Cross-site scripting vulnerability in Movable Type Movable Type 7 r.5301 and earlier (Movable Type 7 Series), Movable Type Advanced 7 r.5301 and earlier (Movable Type Advanced 7 Series), Movable Type 6.8.7 and earlier (Movable Type 6 Series), Movable Type Advanced 6.8.7 and earlier (Movable Type Advanced 6 Series), Movable Type Premium 1.53 and earlier, and Movable Type Premium Advanced 1.53 and earlier allows a remote unauthenticated attacker to inject an arbitrary script.
[]
null
6.1
null
null
GHSA-p83q-99rc-vfmv
Code injection in Duke
Duke v1.2 and below was discovered to contain a code injection vulnerability via the component no.priv.garshol.duke.server.CommonJTimer.init.
[]
null
9.8
null
null
GHSA-xvr2-gxcm-5972
Vulnerability in the Oracle One-to-One Fulfillment component of Oracle E-Business Suite (subcomponent: User Interface). Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5 and 12.2.6. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle One-to-One Fulfillment. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle One-to-One Fulfillment, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle One-to-One Fulfillment accessible data as well as unauthorized update, insert or delete access to some of Oracle One-to-One Fulfillment accessible data. CVSS v3.0 Base Score 8.2 (Confidentiality and Integrity impacts).
[]
null
null
8.2
null
GHSA-c8qw-jpg3-vv7v
** UNSUPPPORTED WHEN ASSIGNED ** ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as critical, was found in D-Link DAR-8000 up to 20151231. This affects an unknown part of the file /Tool/querysql.php. The manipulation leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-240249 was assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced.
[]
null
null
6.3
null
GHSA-7frj-jj6h-vhfx
Cross-Site Request Forgery (CSRF) vulnerability in Oren Yomtov Mass Custom Fields Manager allows Reflected XSS.This issue affects Mass Custom Fields Manager: from n/a through 1.5.
[]
null
7.1
null
null
GHSA-6fgh-mc9w-xhpv
In Pixel cellular firmware, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-239240808References: N/A
[]
null
5.5
null
null
GHSA-cf5v-p8qx-329f
Use after free in Safe Browsing in Google Chrome prior to 98.0.4758.80 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page.
[]
null
9.6
null
null
RHSA-2022:4889
Red Hat Security Advisory: thunderbird security update
Mozilla: Braille space character caused incorrect sender email to be shown for a digitally signed email Mozilla: Cross-Origin resource's length leaked Mozilla: Heap buffer overflow in WebGL Mozilla: Browser window spoof using fullscreen mode Mozilla: Register allocation problem in WASM on arm64 Mozilla: Uninitialized variable leads to invalid memory read Mozilla: Querying a WebAuthn token with a large number of allowCredential entries may have leaked cross-origin information Mozilla: Memory safety bugs fixed in Firefox 101 and Firefox ESR 91.10
[ "cpe:/a:redhat:rhel_eus:8.4::appstream" ]
null
9.8
6.1
null
CVE-2018-20909
cPanel before 70.0.23 allows arbitrary file-chmod operations during legacy incremental backups (SEC-338).
[ "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*" ]
null
null
7.1
3.6