id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
139k
cpes
sequencelengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
CVE-2017-17725
In Exiv2 0.26, there is an integer overflow leading to a heap-based buffer over-read in the Exiv2::getULong function in types.cpp. Remote attackers can exploit the vulnerability to cause a denial of service via a crafted image file. Note that this vulnerability is different from CVE-2017-14864, which is an invalid memory address dereference.
[ "cpe:2.3:a:exiv2:exiv2:0.26:*:*:*:*:*:*:*" ]
null
null
6.5
4.3
GHSA-rh54-rh9r-p3ph
In the Linux kernel, the following vulnerability has been resolved:net/mlx5e: Fix netif state handlingmlx5e_suspend cleans resources only if netif_device_present() returns true. However, mlx5e_resume changes the state of netif, via mlx5e_nic_enable, only if reg_state == NETREG_REGISTERED. In the below case, the above leads to NULL-ptr Oops[1] and memory leaks:mlx5e_probe _mlx5e_resume mlx5e_attach_netdev mlx5e_nic_enable <-- netdev not reg, not calling netif_device_attach() register_netdev <-- failed for some reason. ERROR_FLOW: _mlx5e_suspend <-- netif_device_present return false, resources aren't freed :(Hence, clean resources in this case as well.[1] BUG: kernel NULL pointer dereference, address: 0000000000000000 PGD 0 P4D 0 Oops: 0010 [#1] SMP CPU: 2 PID: 9345 Comm: test-ovs-ct-gen Not tainted 6.5.0_for_upstream_min_debug_2023_09_05_16_01 #1 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014 RIP: 0010:0x0 Code: Unable to access opcode bytes at0xffffffffffffffd6. RSP: 0018:ffff888178aaf758 EFLAGS: 00010246 Call Trace: <TASK> ? __die+0x20/0x60 ? page_fault_oops+0x14c/0x3c0 ? exc_page_fault+0x75/0x140 ? asm_exc_page_fault+0x22/0x30 notifier_call_chain+0x35/0xb0 blocking_notifier_call_chain+0x3d/0x60 mlx5_blocking_notifier_call_chain+0x22/0x30 [mlx5_core] mlx5_core_uplink_netdev_event_replay+0x3e/0x60 [mlx5_core] mlx5_mdev_netdev_track+0x53/0x60 [mlx5_ib] mlx5_ib_roce_init+0xc3/0x340 [mlx5_ib] __mlx5_ib_add+0x34/0xd0 [mlx5_ib] mlx5r_probe+0xe1/0x210 [mlx5_ib] ? auxiliary_match_id+0x6a/0x90 auxiliary_bus_probe+0x38/0x80 ? driver_sysfs_add+0x51/0x80 really_probe+0xc9/0x3e0 ? driver_probe_device+0x90/0x90 __driver_probe_device+0x80/0x160 driver_probe_device+0x1e/0x90 __device_attach_driver+0x7d/0x100 bus_for_each_drv+0x80/0xd0 __device_attach+0xbc/0x1f0 bus_probe_device+0x86/0xa0 device_add+0x637/0x840 __auxiliary_device_add+0x3b/0xa0 add_adev+0xc9/0x140 [mlx5_core] mlx5_rescan_drivers_locked+0x22a/0x310 [mlx5_core] mlx5_register_device+0x53/0xa0 [mlx5_core] mlx5_init_one_devl_locked+0x5c4/0x9c0 [mlx5_core] mlx5_init_one+0x3b/0x60 [mlx5_core] probe_one+0x44c/0x730 [mlx5_core] local_pci_probe+0x3e/0x90 pci_device_probe+0xbf/0x210 ? kernfs_create_link+0x5d/0xa0 ? sysfs_do_create_link_sd+0x60/0xc0 really_probe+0xc9/0x3e0 ? driver_probe_device+0x90/0x90 __driver_probe_device+0x80/0x160 driver_probe_device+0x1e/0x90 __device_attach_driver+0x7d/0x100 bus_for_each_drv+0x80/0xd0 __device_attach+0xbc/0x1f0 pci_bus_add_device+0x54/0x80 pci_iov_add_virtfn+0x2e6/0x320 sriov_enable+0x208/0x420 mlx5_core_sriov_configure+0x9e/0x200 [mlx5_core] sriov_numvfs_store+0xae/0x1a0 kernfs_fop_write_iter+0x10c/0x1a0 vfs_write+0x291/0x3c0 ksys_write+0x5f/0xe0 do_syscall_64+0x3d/0x90 entry_SYSCALL_64_after_hwframe+0x46/0xb0 CR2: 0000000000000000 ---[ end trace 0000000000000000 ]---
[]
null
5.5
null
null
GHSA-jwmw-wgxx-rh88
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the removeInstance event. The issue results from the lack of validation of the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-6500.
[]
null
null
8.8
null
GHSA-w8hp-x9c3-2p78
Huawei OceanStor 5600 V3 with V300R003C00C10 and earlier versions allows attackers with administrator privilege to inject a command into a specific command's parameters, and run this injected command with root privilege.
[]
null
null
7.2
null
GHSA-wwqc-fg9m-7c4c
The Asus ZenFone 3s Max Android device with a build fingerprint of asus/IN_X00G/ASUS_X00G_1:7.0/NRD90M/IN_X00G-14.02.1807.33-20180706:user/release-keys contains a pre-installed app with a package name of com.asus.loguploaderproxy app (versionCode=1570000020, versionName=7.0.0.4_170901) that allows other pre-installed apps to perform command execution via an accessible app component. This capability can be accessed by any pre-installed app on the device which can obtain signatureOrSystem permissions that are required by other other pre-installed apps that exported their capabilities to other pre-installed app.
[]
null
null
null
null
CVE-2023-26961
Alteryx Server 2022.1.1.42590 does not employ file type verification for uploaded files. This vulnerability allows attackers to upload arbitrary files (e.g., JavaScript content for stored XSS) via the type field in a JSON document within a PUT /gallery/api/media request.
[ "cpe:2.3:a:alteryx:alteryx_server:2022.1.1.42590:*:*:*:*:*:*:*" ]
null
4.8
null
null
CVE-2010-1132
The mlfi_envrcpt function in spamass-milter.cpp in SpamAssassin Milter Plugin 0.3.1, when using the expand option, allows remote attackers to execute arbitrary system commands via shell metacharacters in the RCPT TO field of an email message.
[ "cpe:2.3:a:georg_greve:spamassassin_milter_plugin:0.3.1:*:*:*:*:*:*:*" ]
null
null
null
9.3
CVE-2023-31920
Jerryscript 3.0 (commit 05dbbd1) was discovered to contain an Assertion Failure via the vm_loop at jerry-core/vm/vm.c.
[ "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*" ]
null
5.5
null
null
GHSA-3r7x-vv9v-4xqg
SQL injection vulnerability in index.php in Invision Power Board allows remote attackers to execute arbitrary SQL commands via the pid parameter in a reputation action. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
[]
null
null
null
null
CVE-2016-6597
Sophos EAS Proxy before 6.2.0 for Sophos Mobile Control, when Lotus Traveler is enabled, allows remote attackers to access arbitrary web-resources from the backend mail system via a request for the resource, aka an Open Reverse Proxy vulnerability.
[ "cpe:2.3:a:sophos:mobile_control_eas_proxy:*:*:*:*:*:*:*:*" ]
null
null
8.6
5
CVE-2021-47299
xdp, net: Fix use-after-free in bpf_xdp_link_release
In the Linux kernel, the following vulnerability has been resolved: xdp, net: Fix use-after-free in bpf_xdp_link_release The problem occurs between dev_get_by_index() and dev_xdp_attach_link(). At this point, dev_xdp_uninstall() is called. Then xdp link will not be detached automatically when dev is released. But link->dev already points to dev, when xdp link is released, dev will still be accessed, but dev has been released. dev_get_by_index() | link->dev = dev | | rtnl_lock() | unregister_netdevice_many() | dev_xdp_uninstall() | rtnl_unlock() rtnl_lock(); | dev_xdp_attach_link() | rtnl_unlock(); | | netdev_run_todo() // dev released bpf_xdp_link_release() | /* access dev. | use-after-free */ | [ 45.966867] BUG: KASAN: use-after-free in bpf_xdp_link_release+0x3b8/0x3d0 [ 45.967619] Read of size 8 at addr ffff00000f9980c8 by task a.out/732 [ 45.968297] [ 45.968502] CPU: 1 PID: 732 Comm: a.out Not tainted 5.13.0+ #22 [ 45.969222] Hardware name: linux,dummy-virt (DT) [ 45.969795] Call trace: [ 45.970106] dump_backtrace+0x0/0x4c8 [ 45.970564] show_stack+0x30/0x40 [ 45.970981] dump_stack_lvl+0x120/0x18c [ 45.971470] print_address_description.constprop.0+0x74/0x30c [ 45.972182] kasan_report+0x1e8/0x200 [ 45.972659] __asan_report_load8_noabort+0x2c/0x50 [ 45.973273] bpf_xdp_link_release+0x3b8/0x3d0 [ 45.973834] bpf_link_free+0xd0/0x188 [ 45.974315] bpf_link_put+0x1d0/0x218 [ 45.974790] bpf_link_release+0x3c/0x58 [ 45.975291] __fput+0x20c/0x7e8 [ 45.975706] ____fput+0x24/0x30 [ 45.976117] task_work_run+0x104/0x258 [ 45.976609] do_notify_resume+0x894/0xaf8 [ 45.977121] work_pending+0xc/0x328 [ 45.977575] [ 45.977775] The buggy address belongs to the page: [ 45.978369] page:fffffc00003e6600 refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x4f998 [ 45.979522] flags: 0x7fffe0000000000(node=0|zone=0|lastcpupid=0x3ffff) [ 45.980349] raw: 07fffe0000000000 fffffc00003e6708 ffff0000dac3c010 0000000000000000 [ 45.981309] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 45.982259] page dumped because: kasan: bad access detected [ 45.982948] [ 45.983153] Memory state around the buggy address: [ 45.983753] ffff00000f997f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.984645] ffff00000f998000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 45.985533] >ffff00000f998080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 45.986419] ^ [ 45.987112] ffff00000f998100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 45.988006] ffff00000f998180: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 45.988895] ================================================================== [ 45.989773] Disabling lock debugging due to kernel taint [ 45.990552] Kernel panic - not syncing: panic_on_warn set ... [ 45.991166] CPU: 1 PID: 732 Comm: a.out Tainted: G B 5.13.0+ #22 [ 45.991929] Hardware name: linux,dummy-virt (DT) [ 45.992448] Call trace: [ 45.992753] dump_backtrace+0x0/0x4c8 [ 45.993208] show_stack+0x30/0x40 [ 45.993627] dump_stack_lvl+0x120/0x18c [ 45.994113] dump_stack+0x1c/0x34 [ 45.994530] panic+0x3a4/0x7d8 [ 45.994930] end_report+0x194/0x198 [ 45.995380] kasan_report+0x134/0x200 [ 45.995850] __asan_report_load8_noabort+0x2c/0x50 [ 45.996453] bpf_xdp_link_release+0x3b8/0x3d0 [ 45.997007] bpf_link_free+0xd0/0x188 [ 45.997474] bpf_link_put+0x1d0/0x218 [ 45.997942] bpf_link_release+0x3c/0x58 [ 45.998429] __fput+0x20c/0x7e8 [ 45.998833] ____fput+0x24/0x30 [ 45.999247] task_work_run+0x104/0x258 [ 45.999731] do_notify_resume+0x894/0xaf8 [ 46.000236] work_pending ---truncated---
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:5.14:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:5.14:rc2:*:*:*:*:*:*" ]
null
5.5
null
null
GHSA-4vh6-rxvj-rwh4
An issue was discovered on D-Link DSL-2640B B2 EU_4.01B devices. Authentication can be bypassed when accessing cgi modules. This allows one to perform administrative tasks (e.g., modify the admin password) with no authentication.
[]
null
null
null
null
CVE-2021-34588
Bender Charge Controller: Unprotected data export
In Bender/ebee Charge Controllers in multiple versions are prone to unprotected data export. Backup export is protected via a random key. The key is set at user login. It is empty after reboot .
[ "cpe:2.3:o:bender:cc612_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:bender:cc612:-:*:*:*:*:*:*:*", "cpe:2.3:o:bender:icc15xx_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:bender:cc613:-:*:*:*:*:*:*:*" ]
null
8.6
null
null
CVE-2009-1232
Mozilla Firefox 3.0.8 and earlier 3.0.x versions allows remote attackers to cause a denial of service (memory corruption) via an XML document composed of a long series of start-tags with no corresponding end-tags. NOTE: it was later reported that 3.0.10 and earlier are also affected.
[ "cpe:2.3:a:mozilla:firefox:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0:alpha:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0:beta5:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.8:*:*:*:*:*:*:*" ]
null
null
null
4.3
CVE-2005-3452
Unspecified vulnerability in Web Cache in Oracle Application Server 1.0 up to 9.0.4.2 has unknown impact and attack vectors, as identified by Oracle Vuln# AS13.
[ "cpe:2.3:a:oracle:application_server:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:application_server:1.0.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:application_server:9.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:application_server:9.0.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:application_server:9.0.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:application_server:9.0.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:application_server:9.0.4.2:*:*:*:*:*:*:*" ]
null
null
null
10
GHSA-v86p-p58r-p852
An out-of-bounds write issue was addressed with improved input validation. This issue is fixed in iOS 16.2 and iPadOS 16.2, macOS Ventura 13.1, tvOS 16.2, watchOS 9.2. An app may be able to execute arbitrary code with kernel privileges.
[]
null
7.8
null
null
GHSA-2j7j-jvr9-h35r
Multiple cross-site scripting (XSS) vulnerabilities in Horde IMP before 5.0.18 and Horde Groupware Webmail Edition before 4.0.6 allow remote attackers to inject arbitrary web script or HTML via the (1) composeCache, (2) rtemode, or (3) filename_* parameters to the compose page; (4) formname parameter to the contacts popup window; or (5) IMAP mailbox names. NOTE: some of these details are obtained from third party information.
[]
null
null
null
null
GHSA-q9hf-xxg3-957g
Multiple SQL injection vulnerabilities in the orion.extfeedbackform module before 2.1.3 for Bitrix allow remote authenticated users to execute arbitrary SQL commands via the (1) order or (2) "by" parameter to admin/orion.extfeedbackform_efbf_forms.php.
[]
null
null
8.8
null
GHSA-wh42-8r2w-873x
Magento Open Source allows XML Injection
Adobe Commerce versions 2.4.6 (and earlier), 2.4.5-p2 (and earlier) and 2.4.4-p3 (and earlier) are affected by an XML Injection vulnerability. An attacker with low privileges can trigger a specially crafted script to a security feature bypass. Exploitation of this issue does not require user interaction.
[]
4.9
6.5
null
null
CVE-2019-17049
NETGEAR SRX5308 4.3.5-3 devices allow SQL Injection, as exploited in the wild in September 2019 to add a new user account.
[ "cpe:2.3:o:netgear:srx5308_firmware:4.3.5-3:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:srx5308:-:*:*:*:*:*:*:*" ]
null
7.5
null
5
CVE-2013-2174
Heap-based buffer overflow in the curl_easy_unescape function in lib/escape.c in cURL and libcurl 7.7 through 7.30.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted string ending in a "%" (percent) character.
[ "cpe:2.3:a:haxx:curl:7.7:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:curl:7.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:curl:7.7.2:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:curl:7.7.3:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:curl:7.8:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:curl:7.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:curl:7.9:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:curl:7.9.1:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:curl:7.9.2:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:curl:7.9.3:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:curl:7.9.4:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:curl:7.9.5:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:curl:7.9.6:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:curl:7.9.7:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:curl:7.9.8:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:curl:7.10:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:curl:7.10.1:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:curl:7.10.2:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:curl:7.10.3:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:curl:7.10.4:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:curl:7.10.5:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:curl:7.10.6:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:curl:7.10.7:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:curl:7.10.8:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:curl:7.11.0:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:curl:7.11.1:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:curl:7.11.2:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:curl:7.12.0:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:curl:7.12.1:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:curl:7.12.2:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:curl:7.12.3:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:curl:7.13.0:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:curl:7.13.1:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:curl:7.13.2:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:curl:7.14.0:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:curl:7.14.1:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:curl:7.15.0:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:curl:7.15.1:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:curl:7.15.2:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:curl:7.15.3:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:curl:7.15.4:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:curl:7.15.5:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:curl:7.16.0:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:curl:7.16.1:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:curl:7.16.2:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:curl:7.16.3:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:curl:7.16.4:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:curl:7.17.0:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:curl:7.17.1:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:curl:7.18.0:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:curl:7.18.1:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:curl:7.18.2:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:curl:7.19.0:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:curl:7.19.1:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:curl:7.19.2:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:curl:7.19.3:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:curl:7.19.4:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:curl:7.19.5:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:curl:7.19.6:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:curl:7.19.7:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:curl:7.20.0:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:curl:7.20.1:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:curl:7.21.0:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:curl:7.21.1:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:curl:7.21.2:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:curl:7.21.3:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:curl:7.21.4:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:curl:7.21.5:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:curl:7.21.6:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:curl:7.21.7:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:curl:7.22.0:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:curl:7.23.0:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:curl:7.23.1:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:curl:7.24.0:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:curl:7.25.0:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:curl:7.26.0:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:curl:7.27.0:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:curl:7.28.0:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:curl:7.28.1:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:curl:7.29.0:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:curl:7.30.0:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:libcurl:7.7:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:libcurl:7.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:libcurl:7.7.2:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:libcurl:7.7.3:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:libcurl:7.8:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:libcurl:7.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:libcurl:7.9:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:libcurl:7.9.1:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:libcurl:7.9.2:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:libcurl:7.9.3:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:libcurl:7.9.4:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:libcurl:7.9.5:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:libcurl:7.9.6:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:libcurl:7.9.7:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:libcurl:7.9.8:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:libcurl:7.10:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:libcurl:7.10.1:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:libcurl:7.10.2:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:libcurl:7.10.3:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:libcurl:7.10.4:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:libcurl:7.10.5:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:libcurl:7.10.6:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:libcurl:7.10.7:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:libcurl:7.10.8:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:libcurl:7.11.0:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:libcurl:7.11.1:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:libcurl:7.11.2:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:libcurl:7.12.0:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:libcurl:7.12.1:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:libcurl:7.12.2:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:libcurl:7.12.3:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:libcurl:7.13.0:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:libcurl:7.13.1:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:libcurl:7.13.2:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:libcurl:7.14.0:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:libcurl:7.14.1:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:libcurl:7.15.0:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:libcurl:7.15.1:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:libcurl:7.15.2:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:libcurl:7.15.3:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:libcurl:7.15.4:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:libcurl:7.15.5:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:libcurl:7.16.0:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:libcurl:7.16.1:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:libcurl:7.16.2:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:libcurl:7.16.3:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:libcurl:7.16.4:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:libcurl:7.17.0:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:libcurl:7.17.1:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:libcurl:7.18.0:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:libcurl:7.18.1:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:libcurl:7.18.2:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:libcurl:7.19.0:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:libcurl:7.19.1:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:libcurl:7.19.2:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:libcurl:7.19.3:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:libcurl:7.19.4:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:libcurl:7.19.5:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:libcurl:7.19.6:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:libcurl:7.19.7:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:libcurl:7.20.0:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:libcurl:7.20.1:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:libcurl:7.21.0:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:libcurl:7.21.1:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:libcurl:7.21.2:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:libcurl:7.21.3:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:libcurl:7.21.4:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:libcurl:7.21.5:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:libcurl:7.21.6:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:libcurl:7.21.7:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:libcurl:7.22.0:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:libcurl:7.23.0:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:libcurl:7.23.1:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:libcurl:7.24.0:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:libcurl:7.25.0:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:libcurl:7.26.0:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:libcurl:7.27.0:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:libcurl:7.28.0:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:libcurl:7.28.1:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:libcurl:7.29.0:*:*:*:*:*:*:*", "cpe:2.3:a:haxx:libcurl:7.30.0:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:5:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*" ]
null
null
null
6.8
GHSA-m7cp-cc3g-rq5q
Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 13.2 and iPadOS 13.2, tvOS 13.2, Safari 13.0.3, iTunes for Windows 12.10.2, iCloud for Windows 11.0, iCloud for Windows 7.15. Processing maliciously crafted web content may lead to arbitrary code execution.
[]
null
null
null
null
CVE-2022-22151
CAMS for HIS Log Server contained in the following Yokogawa Electric products fails to properly neutralize log outputs: CENTUM CS 3000 versions from R3.08.10 to R3.09.00, CENTUM VP versions from R4.01.00 to R4.03.00, from R5.01.00 to R5.04.20, and from R6.01.00 to R6.08.00, and Exaopc versions from R3.72.00 to R3.79.00.
[ "cpe:2.3:o:yokogawa:centum_cs_3000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:yokogawa:centum_cs_3000:-:*:*:*:*:*:*:*", "cpe:2.3:o:yokogawa:centum_cs_3000_entry_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:yokogawa:centum_cs_3000_entry:-:*:*:*:*:*:*:*", "cpe:2.3:o:yokogawa:centum_vp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:yokogawa:centum_vp:-:*:*:*:*:*:*:*", "cpe:2.3:o:yokogawa:centum_vp_entry_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:yokogawa:centum_vp_entry:-:*:*:*:*:*:*:*", "cpe:2.3:a:yokogawa:exaopc:*:*:*:*:*:*:*:*" ]
null
8.1
null
4.9
CVE-2007-3496
Cross-site scripting (XSS) vulnerability in SAP Web Dynpro Java (BC-WD-JAV) in SAP NetWeaver Nw04 SP15 through SP19 and Nw04s SP7 through SP11, aka SAP Java Technology Services 640 before SP20 and SAP Web Dynpro Runtime Core Components 700 before SP12, allows remote attackers to inject arbitrary web script or HTML via the User-Agent HTTP header.
[ "cpe:2.3:a:sap:netweaver_nw04:sp15:*:*:*:*:*:*:*", "cpe:2.3:a:sap:netweaver_nw04:sp16:*:*:*:*:*:*:*", "cpe:2.3:a:sap:netweaver_nw04:sp17:*:*:*:*:*:*:*", "cpe:2.3:a:sap:netweaver_nw04:sp18:*:*:*:*:*:*:*", "cpe:2.3:a:sap:netweaver_nw04:sp19:*:*:*:*:*:*:*", "cpe:2.3:a:sap:netweaver_nw04s:sp7:*:*:*:*:*:*:*", "cpe:2.3:a:sap:netweaver_nw04s:sp8:*:*:*:*:*:*:*", "cpe:2.3:a:sap:netweaver_nw04s:sp9:*:*:*:*:*:*:*", "cpe:2.3:a:sap:netweaver_nw04s:sp10:*:*:*:*:*:*:*", "cpe:2.3:a:sap:netweaver_nw04s:sp11:*:*:*:*:*:*:*", "cpe:2.3:a:sap:sap_basis_component_640:*:*:*:*:*:*:*:*", "cpe:2.3:a:sap:sap_basis_component_700:*:*:*:*:*:*:*:*" ]
null
null
null
4.3
RHSA-2024:4041
Red Hat Security Advisory: OpenShift Container Platform 4.15.19 bug fix and security update
golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS jose-go: improper handling of highly compressed data
[ "cpe:/a:redhat:openshift:4.15::el8", "cpe:/a:redhat:openshift:4.15::el9" ]
null
4.3
null
null
CVE-2018-0511
Cross-site scripting vulnerability in WP Retina 2x prior to version 5.2.2 allows an attacker to inject arbitrary web script or HTML via unspecified vectors.
[ "cpe:2.3:a:meowapps:wp_retina_2x:*:*:*:*:*:wordpress:*:*" ]
null
null
6.1
4.3
GHSA-wwj3-573j-rvvm
Magento Open Source Improper Authorization vulnerability
Adobe Commerce versions 2.4.7, 2.4.6-p5, 2.4.5-p7, 2.4.4-p8 and earlier are affected by an Improper Authorization vulnerability that could result in a Security feature bypass. An attacker could leverage this vulnerability to bypass security measures and gain unauthorized access, leading to both confidentiality and integrity impact. Exploitation of this issue does not require user interaction.
[]
8.7
8.2
null
null
GHSA-ggrx-pp2h-rw56
CA Clarity 15.8 and below and 15.9.0 contain an insecure XML parsing vulnerability that could allow a remote attacker to potentially view the contents of any file on the system.
[]
null
7.5
null
null
GHSA-vwcr-cpgw-p977
A vulnerability was found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20240814. It has been classified as critical. This affects the function sprintf of the file /cgi-bin/hd_config.cgi. The manipulation of the argument f_mount leads to command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed that the product is end-of-life. It should be retired and replaced.
[]
5.3
6.3
null
null
GHSA-r737-4vhq-r95j
An issue was discovered on Samsung mobile devices with M(6.x) and N(7.x) software. There is information disclosure of the kbase_context address of a GPU memory node. The Samsung ID is SVE-2017-8907 (December 2017).
[]
null
null
null
null
GHSA-fcp2-76rf-pjrc
In the Linux kernel, the following vulnerability has been resolved:svcrdma: fix miss destroy percpu_counter in svc_rdma_proc_init()There's issue as follows: RPC: Registered rdma transport module. RPC: Registered rdma backchannel transport module. RPC: Unregistered rdma transport module. RPC: Unregistered rdma backchannel transport module. BUG: unable to handle page fault for address: fffffbfff80c609a PGD 123fee067 P4D 123fee067 PUD 123fea067 PMD 10c624067 PTE 0 Oops: Oops: 0000 [#1] PREEMPT SMP KASAN NOPTI RIP: 0010:percpu_counter_destroy_many+0xf7/0x2a0 Call Trace: <TASK> __die+0x1f/0x70 page_fault_oops+0x2cd/0x860 spurious_kernel_fault+0x36/0x450 do_kern_addr_fault+0xca/0x100 exc_page_fault+0x128/0x150 asm_exc_page_fault+0x26/0x30 percpu_counter_destroy_many+0xf7/0x2a0 mmdrop+0x209/0x350 finish_task_switch.isra.0+0x481/0x840 schedule_tail+0xe/0xd0 ret_from_fork+0x23/0x80 ret_from_fork_asm+0x1a/0x30 </TASK>If register_sysctl() return NULL, then svc_rdma_proc_cleanup() will not destroy the percpu counters which init in svc_rdma_proc_init(). If CONFIG_HOTPLUG_CPU is enabled, residual nodes may be in the 'percpu_counters' list. The above issue may occur once the module is removed. If the CONFIG_HOTPLUG_CPU configuration is not enabled, memory leakage occurs. To solve above issue just destroy all percpu counters when register_sysctl() return NULL.
[]
null
5.5
null
null
CVE-2006-2879
SQL injection vulnerability in newscomments.php in Alex News-Engine 1.5.0 and earlier allows remote attackers to execute arbitrary SQL commands via the newsid parameter.
[ "cpe:2.3:a:alex:news-engine:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-xw4p-crpj-vjx2
A Server-Side Forgery Request can be activated unmarshalling with XStream to access data streams from an arbitrary URL referencing a resource in an intranet or the local host
ImpactThe vulnerability may allow a remote attacker to request data from internal resources that are not publicly available only by manipulating the processed input stream with a Java runtime version 14 to 8. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types.PatchesIf you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.18.WorkaroundsSee [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs.ReferencesSee full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-39152](https://x-stream.github.io/CVE-2021-39152.html).Creditsm0d9 of the Security Team of Alibaba Cloud found and reported the issue to XStream and provided the required information to reproduce it.For more informationIf you have any questions or comments about this advisory:Open an issue in [XStream](https://github.com/x-stream/xstream/issues)Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user)
[]
null
8.5
null
null
GHSA-8g74-32fg-5ghc
Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') vulnerability in Apache APISIX when using `forward-auth` plugin.This issue affects Apache APISIX: from 3.8.0, 3.9.0.Users are recommended to upgrade to version 3.8.1, 3.9.1 or higher, which fixes the issue.
[]
null
6.3
null
null
GHSA-4hm7-3pqc-622q
Windows iSCSI Discovery Service Remote Code Execution Vulnerability.
[]
null
7.1
null
null
GHSA-wh2w-39f4-rpv2
Hyperledger Indy's update process of a DID does not check who signs the request
NameUpdating a DID with a nym transaction will be written to the ledger if neither ROLE or VERKEY are being changed, regardless of sender.DescriptionA malicious DID with no particular role can ask an update for another DID (but cannot modify its verkey or role). This is bad because:Any DID can write a nym transaction to the ledger (i.e., any DID can spam the ledger with nym transactions).Any DID can change any other DID's alias.The update transaction modifies the ledger metadata associated with a DID.Expected vs ObservedWe expect that if a DID (with no role) wants to update another DID (not its own or one it is the endorser), then the nodes should refuse the request. We can see that requirements in the [Indy default auth_rules](https://github.com/hyperledger/indy-node/blob/master/docs/source/auth_rules.md) in Section "Who is the owner" in the last point of "Endorser using".We observe that with a normal DID, we can update the field `from` for a random DID, for example, the one of a TRUSTEE. It creates then a new transaction on the ledger.Explanation of the attackWe first begin to connect to the pool and open a wallet. Then, we will use a TRUSTEE (but can also be a STEWARD or an ENDORSER) DID `V4SGRU86Z58d6TV7PBUe6f`. We ask the information about `V4SGRU86Z58d6TV7PBUe6f` with a get-nym. We create a new DID `V4SGRU86Z58d6TV7PBUe1a` signed by `V4SGRU86Z58d6TV7PBUe6f` with no role. For the rest of the attack, we will use `V4SGRU86Z58d6TV7PBUe1a` to sign new transactions. We send a `ledger nym did=V4SGRU86Z58d6TV7PBUe6f extra=hello` to see if `V4SGRU86Z58d6TV7PBUe1a` can send an update of a TRUSTEE identity. When we ask information to the ledger about `V4SGRU86Z58d6TV7PBUe6f`, it answers that the `from` field is `V4SGRU86Z58d6TV7PBUe1a` (to compare with the first get-nym we did with `from` field = `V4SGRU86Z58d6TV7PBUe6f`). To see the log of the attack, I modified my indy-cli to print the json request and the json response directly on the terminal. You can find the log file `indy.log` in this archive.Implementation notes[NymHandler](https://github.com/hyperledger/indy-node/blob/e5676b703d625e42c9547333bd03bb8307ed534c/indy_node/server/request_handlers/domain_req_handlers/nym_handler.py) method `update_state`, line 62. I think that we need to check if the DID which signs the transaction, owns the DID or is its endorser.Steps to ReproduceEnvironmentUbuntu 18.04 Docker version 19.03.8 [indy-cli](https://github.com/hyperledger/indy-sdk/tree/master/cli) [indy-ci](https://github.com/hyperledger/indy-sdk/tree/master/ci) Dockerfile is copied in this archive To install indy-cli, run `./install_indy_cli.sh`CommandHere is the script to create the container, run the attack and remove the container and the image. Find below the command to execute each step separately.Installation of the environmentInstall indy-cli and create an image with tag `test` from DockerfileExploitUninstallation of the environmentSuppress the container `test` and remove the image `test`AnalysisWe are grateful to @alexandredeleze for discovering and responsibly disclosing the issue.We were previously aware that any DID on the ledger can "update" the state (seqNo + txnTime) if it doesn't change the state data itself. We considered this a minor bug because only the seqNo and txnTime changed. But seeing that this can also affect the "parent" DID means that it has a higher severity.
[]
8.7
7.5
null
null
GHSA-3rvp-xpmc-fgrf
Microsoft Speech Application Programming Interface (SAPI) Remote Code Execution Vulnerability
[]
null
8.8
null
null
GHSA-c9v3-wqvp-m35p
ping in Solaris 2.3 through 2.6 allows local users to cause a denial of service (crash) via a ping request to a multicast address through the loopback interface, e.g. via ping -i.
[]
null
null
null
null
GHSA-587h-jw63-jwf2
Anuko Time Tracker v1.19.23.5311 lacks rate limit on the password reset module which allows attacker to perform Denial of Service attack on any legitimate user's mailbox
[]
null
null
null
null
CVE-2019-2258
Improper validation of array index causes OOB write and then leads to memory corruption in MMCP in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in MDM9150, MDM9607, MDM9615, MDM9625, MDM9635M, MDM9640, MDM9650, MDM9655, MSM8909W, MSM8996AU, QCS605, Qualcomm 215, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 615/16/SD 415, SD 625, SD 632, SD 636, SD 650/52, SD 665, SD 675, SD 712 / SD 710 / SD 670, SD 730, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SD 8CX, SDA660, SDM439, SDM630, SDM660, SDX20, Snapdragon_High_Med_2016, SXR1130
[ "cpe:2.3:o:qualcomm:mdm9150_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9150:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9607_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9607:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9615_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9615:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9625_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9625:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9635m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9635m:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9640_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9640:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9650:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9655_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9655:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:msm8909w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:msm8909w:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:msm8996au:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcs605_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcs605:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qualcomm_215_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qualcomm_215:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_210_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_210:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_212_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_212:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_205_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_205:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_425_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_425:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_427_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_427:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_430_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_430:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_435_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_435:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_439_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_439:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_429_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_429:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_450_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_450:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_615_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_615:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_616_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_616:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_415_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_415:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_625_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_625:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_632_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_632:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_636_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_636:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_650_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_650:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_652_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_652:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_665_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_665:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_675_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_675:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_712_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_712:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_710_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_710:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_670_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_670:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_730_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_730:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_820_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_820:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_820a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_820a:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_835_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_835:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_845_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_845:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_850_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_850:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_855_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_855:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_8cx_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_8cx:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sda660_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sda660:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdm439_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm439:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdm630_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm630:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdm660_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm660:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdx20_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdx20:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_high_med_2016_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_high_med_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sxr1130_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sxr1130:-:*:*:*:*:*:*:*" ]
null
9.8
null
10
CVE-2023-51504
WordPress Dan's Embedder for Google Calendar Plugin <= 1.2 is vulnerable to Cross Site Scripting (XSS)
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Dan Dulaney Dan's Embedder for Google Calendar allows Stored XSS.This issue affects Dan's Embedder for Google Calendar: from n/a through 1.2.
[ "cpe:2.3:a:dandulaney:dan\\'s_embedder_for_google_calendar:*:*:*:*:*:wordpress:*:*" ]
null
6.5
null
null
CVE-2011-2598
The WebGL implementation in Mozilla Firefox 4.x allows remote attackers to obtain screenshots of the windows of arbitrary desktop applications via vectors involving an SVG filter, an IFRAME element, and uninitialized data in graphics memory.
[ "cpe:2.3:a:mozilla:firefox:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:4.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:4.0:beta10:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:4.0:beta11:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:4.0:beta12:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:4.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:4.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:4.0:beta4:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:4.0:beta5:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:4.0:beta6:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:4.0:beta7:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:4.0:beta8:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:4.0:beta9:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:4.0.1:*:*:*:*:*:*:*" ]
null
null
null
4.3
CVE-2019-12419
Apache CXF before 3.3.4 and 3.2.11 provides all of the components that are required to build a fully fledged OpenId Connect service. There is a vulnerability in the access token services, where it does not validate that the authenticated principal is equal to that of the supplied clientId parameter in the request. If a malicious client was able to somehow steal an authorization code issued to another client, then they could exploit this vulnerability to obtain an access token for the other client.
[ "cpe:2.3:a:apache:cxf:*:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:commerce_guided_search:11.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:enterprise_manager_base_platform:13.2.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:flexcube_private_banking:12.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:flexcube_private_banking:12.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:retail_order_broker:15.0:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
RHSA-2009:1307
Red Hat Security Advisory: ecryptfs-utils security, bug fix, and enhancement update
ecryptfs-utils: potential provided password disclosure in the process table
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
CVE-2021-41867
An information disclosure vulnerability in OnionShare 2.3 before 2.4 allows remote unauthenticated attackers to retrieve the full list of participants of a non-public OnionShare node via the --chat feature.
[ "cpe:2.3:a:onionshare:onionshare:*:*:*:*:*:*:*:*" ]
null
5.3
null
5
RHSA-2024:3473
Red Hat Security Advisory: OpenShift Virtualization 4.14.6 Images security update
axios: exposure of confidential data stored in cookies
[ "cpe:/a:redhat:container_native_virtualization:4.14::el9" ]
null
6.5
null
null
CVE-2025-30160
Redlib allows a Denial of Service via DEFLATE Decompression Bomb in restore_preferences Form
Redlib is an alternative private front-end to Reddit. A vulnerability has been identified in Redlib where an attacker can cause a denial-of-service (DOS) condition by submitting a specially crafted base2048-encoded DEFLATE decompression bomb to the restore_preferences form. This leads to excessive memory consumption and potential system instability, which can be exploited to disrupt Redlib instances. This vulnerability is fixed in 0.36.0.
[]
8.7
null
null
null
GHSA-8c68-g8rx-85g8
Samba 4.10.x before 4.10.5 has a NULL pointer dereference, leading to an AD DC LDAP server Denial of Service. This is related to an attacker using the paged search control. The attacker must have directory read access in order to attempt an exploit.
[]
null
null
null
null
GHSA-w985-973m-gqr2
An issue in the sqlg_group_node component of openlink virtuoso-opensource v7.2.11 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
[]
null
7.5
null
null
RHSA-2023:4160
Red Hat Security Advisory: java-1.8.0-ibm security update
JDK: unsafe deserialization flaw in the Object Request Broker (ORB) OpenJDK: improper connection handling during TLS handshake (8294474) OpenJDK: missing string checks for NULL characters (8296622) OpenJDK: incorrect handling of NULL characters in ProcessBuilder (8295304) OpenJDK: Swing HTML parsing issue (8296832) OpenJDK: certificate validation issue in TLS session negotiation (8298310) OpenJDK: missing check for slash characters in URI-to-path conversion (8298667)
[ "cpe:/a:redhat:rhel_extras:7" ]
null
3.7
null
null
PYSEC-2022-164
null
A flaw was found in Ansible Engine's ansible-connection module, where sensitive information such as the Ansible user credentials is disclosed by default in the traceback error message. The highest threat from this vulnerability is to confidentiality.
[]
null
null
null
null
GHSA-8gcq-hc82-pqq2
OS Command injection vulnerability in D-Link DIR-867 DIR_867_FW1.30B07 allows attackers to execute arbitrary commands via a crafted LocalIPAddress parameter for the SetVirtualServerSettings to HNAP1.
[]
null
9.8
null
null
GHSA-2qf4-9rx4-94ww
The cross-site scripting vulnerability has been reported to affect earlier versions of Photo Station. If exploited, the vulnerability could allow remote attackers to inject malicious code. This issue affects: QNAP Systems Inc. Photo Station versions prior to 5.7.11; versions prior to 6.0.10.
[]
null
6.1
null
null
RHSA-2013:0586
Red Hat Security Advisory: jbosssx security update
JBoss: allows empty password to authenticate against LDAP
[ "cpe:/a:redhat:jboss_enterprise_brms_platform:5.3.1", "cpe:/a:redhat:jboss_enterprise_portal_platform:4.3.0:update7", "cpe:/a:redhat:jboss_enterprise_portal_platform:5.2.2", "cpe:/a:redhat:jboss_enterprise_soa_platform:4.2.0:update5", "cpe:/a:redhat:jboss_enterprise_soa_platform:4.3.0:update5", "cpe:/a:redhat:jboss_enterprise_soa_platform:5.3.1" ]
null
null
null
null
GHSA-jj2m-7f8j-222w
The Quick Code WordPress plugin through 1.0 does not have CSRF check in some places, and is missing sanitisation as well as escaping, which could allow attackers to make logged in admin add Stored XSS payloads via a CSRF attack.
[]
null
6.1
null
null
GHSA-6qq7-3hqc-p5w4
Wallabag vulnerable to Allocation of Resources Without Limits or Throttling
A vulnerability was found in wallabag 2.5.4. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /config of the component Profile Config. The manipulation of the argument Name leads to allocation of resources. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-233359. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
[]
null
6.5
null
null
GHSA-p594-jv9h-cv8f
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Tidekey allows Reflected XSS. This issue affects Tidekey: from n/a through 1.1.
[]
null
7.1
null
null
GHSA-6rmq-x2hv-vxpp
Drupal core third-party PEAR Archive_Tar library is vulnerable to Deserialization of Untrusted Data
In Drupal Core versions 7.x prior to 7.62, 8.6.x prior to 8.6.6 and 8.5.x prior to 8.5.9; Drupal core uses the third-party PEAR Archive_Tar library. This library has released a security update which impacts some Drupal configurations. Refer to CVE-2018-1000888 for details
[]
null
null
8
null
CVE-2024-7752
SourceCodester Clinics Patient Management System update_medicine.php cross site scripting
A vulnerability was found in SourceCodester Clinics Patient Management System 1.0. It has been classified as problematic. This affects an unknown part of the file /update_medicine.php. The manipulation of the argument medicine_name leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
[ "cpe:2.3:a:sourcecodester:clinics_patient_management_system:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:oretnom23:clinic\\'s_patient_management_system:1.0:*:*:*:*:*:*:*" ]
5.3
3.5
3.5
4
CVE-2025-5706
PHPGurukul Human Metapneumovirus Testing Management System new-user-testing.php sql injection
A vulnerability was found in PHPGurukul Human Metapneumovirus Testing Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /new-user-testing.php. The manipulation of the argument state leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.
[]
6.9
7.3
7.3
7.5
CVE-2024-27375
An issue was discovered in Samsung Mobile Processor Exynos 980, Exynos 850, Exynos 1280, Exynos 1380, and Exynos 1330. In the function slsi_nan_followup_get_nl_params(), there is no input validation check on hal_req->sdea_service_specific_info_len coming from userspace, which can lead to a heap overwrite.
[ "cpe:2.3:h:samsung:exynos_980:-:*:*:*:*:*:*:*", "cpe:2.3:h:samsung:exynos_850:-:*:*:*:*:*:*:*", "cpe:2.3:h:samsung:exynos_1280:-:*:*:*:*:*:*:*", "cpe:2.3:h:samsung:exynos_1380:-:*:*:*:*:*:*:*", "cpe:2.3:h:samsung:exynos_1330:-:*:*:*:*:*:*:*", "cpe:2.3:o:samsung:exynos_980_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:samsung:exynos_850_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:samsung:exynos_1280_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:samsung:exynos_1380_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:samsung:exynos_1330_firmware:-:*:*:*:*:*:*:*" ]
null
6.7
null
null
GHSA-x65r-wv8w-xvpx
Cross-site scripting (XSS) vulnerability in FileNet P8 Platform Documentation Installable Info Center 4.5.1 through 5.2.0 in IBM FileNet Business Process Manager 4.5.1 through 5.1.0, FileNet Content Manager 4.5.1 through 5.2.0, and Case Foundation 5.2.0 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
[]
null
null
null
null
RHSA-2020:2684
Red Hat Security Advisory: containernetworking-plugins security update
containernetworking/plugins: IPv6 router advertisements allow for MitM attacks on IPv4 clusters
[ "cpe:/a:redhat:rhel_extras_other:7" ]
null
6
null
null
GHSA-v5gf-j9pm-jvj5
The Serial Peripheral Interface driver in Android before 2016-08-05 on Nexus 5X and 6P devices allows attackers to gain privileges via a crafted application, aka internal bug 28817378.
[]
null
null
7
null
CVE-2023-2388
Netgear SRX5308 Web Management Interface cross site scripting
A vulnerability, which was classified as problematic, has been found in Netgear SRX5308 up to 4.3.5-3. Affected by this issue is some unknown functionality of the file scgi-bin/platform.cgi?page=firewall_logs_email.htm of the component Web Management Interface. The manipulation of the argument smtpServer.fromAddr leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-227666 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
[ "cpe:2.3:o:netgear:srx5308_firmware:4.3.5-3:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:srx5308:-:*:*:*:*:*:*:*" ]
null
2.4
2.4
3.3
CVE-2008-4793
The node module API in Drupal 5.x before 5.11 allows remote attackers to bypass node validation and have unspecified other impact via unknown vectors related to contributed modules.
[ "cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:5.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:5.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:5.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:5.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:5.1:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:5.2:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:5.3:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:5.4:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:5.5:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:5.6:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:5.7:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:5.8:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:5.9:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2010-2291
Unspecified vulnerability in the web interface in snom VoIP Phone firmware 8 before 8.2.35 allows remote attackers to bypass intended restrictions and modify user credentials via unknown vectors. NOTE: some of these details are obtained from third party information.
[ "cpe:2.3:a:snom:voip_phone_firmware:8.0.11:beta:*:*:*:*:*:*", "cpe:2.3:a:snom:voip_phone_firmware:8.0.12:beta:*:*:*:*:*:*", "cpe:2.3:a:snom:voip_phone_firmware:8.0.13:beta:*:*:*:*:*:*", "cpe:2.3:a:snom:voip_phone_firmware:8.1.1:beta:*:*:*:*:*:*", "cpe:2.3:a:snom:voip_phone_firmware:8.1.2:beta:*:*:*:*:*:*", "cpe:2.3:a:snom:voip_phone_firmware:8.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:snom:voip_phone_firmware:8.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:snom:voip_phone_firmware:8.2.2:beta:*:*:*:*:*:*", "cpe:2.3:a:snom:voip_phone_firmware:8.2.3:beta:*:*:*:*:*:*", "cpe:2.3:a:snom:voip_phone_firmware:8.2.4:beta:*:*:*:*:*:*", "cpe:2.3:a:snom:voip_phone_firmware:8.2.5:beta:*:*:*:*:*:*", "cpe:2.3:a:snom:voip_phone_firmware:8.2.6:beta:*:*:*:*:*:*", "cpe:2.3:a:snom:voip_phone_firmware:8.2.7:beta:*:*:*:*:*:*", "cpe:2.3:a:snom:voip_phone_firmware:8.2.8:beta:*:*:*:*:*:*", "cpe:2.3:a:snom:voip_phone_firmware:8.2.9:beta:*:*:*:*:*:*", "cpe:2.3:a:snom:voip_phone_firmware:8.2.10:beta:*:*:*:*:*:*", "cpe:2.3:a:snom:voip_phone_firmware:8.2.11:beta:*:*:*:*:*:*", "cpe:2.3:a:snom:voip_phone_firmware:8.2.16:beta:*:*:*:*:*:*", "cpe:2.3:a:snom:voip_phone_firmware:8.2.17:beta:*:*:*:*:*:*", "cpe:2.3:a:snom:voip_phone_firmware:8.2.18:beta:*:*:*:*:*:*", "cpe:2.3:a:snom:voip_phone_firmware:8.2.19:beta:*:*:*:*:*:*", "cpe:2.3:a:snom:voip_phone_firmware:8.2.20:beta:*:*:*:*:*:*", "cpe:2.3:a:snom:voip_phone_firmware:8.2.21:beta:*:*:*:*:*:*", "cpe:2.3:a:snom:voip_phone_firmware:8.2.22:beta:*:*:*:*:*:*", "cpe:2.3:a:snom:voip_phone_firmware:8.2.23:beta:*:*:*:*:*:*", "cpe:2.3:a:snom:voip_phone_firmware:8.2.24:beta:*:*:*:*:*:*", "cpe:2.3:a:snom:voip_phone_firmware:8.2.25:beta:*:*:*:*:*:*", "cpe:2.3:a:snom:voip_phone_firmware:8.2.26:beta:*:*:*:*:*:*", "cpe:2.3:a:snom:voip_phone_firmware:8.2.27:beta:*:*:*:*:*:*", "cpe:2.3:a:snom:voip_phone_firmware:8.2.28:beta:*:*:*:*:*:*", "cpe:2.3:a:snom:voip_phone_firmware:8.2.29:beta:*:*:*:*:*:*", "cpe:2.3:a:snom:voip_phone_firmware:8.2.30:beta:*:*:*:*:*:*", "cpe:2.3:a:snom:voip_phone_firmware:8.2.31:beta:*:*:*:*:*:*", "cpe:2.3:a:snom:voip_phone_firmware:8.2.32:beta:*:*:*:*:*:*", "cpe:2.3:a:snom:voip_phone_firmware:8.2.33:beta:*:*:*:*:*:*", "cpe:2.3:a:snom:voip_phone_firmware:8.2.34:beta:*:*:*:*:*:*" ]
null
null
null
3.3
GHSA-cxw8-j5f9-53mh
In the Linux kernel, the following vulnerability has been resolved:gpio: prevent potential speculation leaks in gpio_device_get_desc()Userspace may trigger a speculative read of an address outside the gpio descriptor array. Users can do that by calling gpio_ioctl() with an offset out of range. Offset is copied from user and then used as an array index to get the gpio descriptor without sanitization in gpio_device_get_desc().This change ensures that the offset is sanitized by using array_index_nospec() to mitigate any possibility of speculative information leaks.This bug was discovered and resolved using Coverity Static Analysis Security Testing (SAST) by Synopsys, Inc.
[]
null
5.5
null
null
CVE-2006-3315
PHP remote file inclusion vulnerability in page.php in an unspecified RahnemaCo.com product, possibly eShop, allows remote attackers to execute arbitrary PHP code via a URL in the osCsid parameter.
[ "cpe:2.3:a:rahnemaco:rahnemaco:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2024-4381
CB (legacy) <= 0.9.4.18 - Admin+ Stored XSS
The CB (legacy) WordPress plugin through 0.9.4.18 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
[ "cpe:2.3:a:wielebenwir:commonsbooking:*:*:*:*:*:wordpress:*:*" ]
null
4.8
null
null
CVE-2021-38133
Possible Improper authentication Vulnerability in OpenText eDirectory
Possible External Service Interaction attack in eDirectory has been discovered in OpenText™ eDirectory. This impact all version before 9.2.6.0000.
[ "cpe:2.3:a:microfocus:edirectory:*:*:*:*:*:*:*:*" ]
null
7.4
null
null
CVE-2022-26387
When installing an add-on, Firefox verified the signature before prompting the user; but while the user was confirming the prompt, the underlying add-on file could have been modified and Firefox would not have noticed. This vulnerability affects Firefox < 98, Firefox ESR < 91.7, and Thunderbird < 91.7.
[ "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*" ]
null
7.5
null
null
GHSA-483m-67m4-vjw4
A vulnerability was found in zhangyanbo2007 youkefu up to 4.2.0 and classified as problematic. Affected by this issue is the function impsave of the file m\web\handler\admin\system\TemplateController.java. The manipulation of the argument dataFile leads to deserialization. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
[]
5.3
4.3
null
null
CVE-2016-2995
Cross-site scripting (XSS) vulnerability in the Web UI in IBM Connections 4.0 through CR4, 4.5 through CR5, 5.0 before CR4, and 5.5 before CR1 allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2016-2997, CVE-2016-3005, and CVE-2016-3010.
[ "cpe:2.3:a:ibm:connections:4.0.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:connections:4.5.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:connections:5.0.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:connections:5.5.0.0:*:*:*:*:*:*:*" ]
null
null
5.4
3.5
GHSA-g2x7-rq6p-w7gg
Cross-site scripting (XSS) vulnerability in the Inline Entity Form module 7.x-1.x before 7.x-1.6 for Drupal allows remote authenticated users with permission to create or edit fields to inject arbitrary web script or HTML via unspecified vectors.
[]
null
null
null
null
CVE-2020-36751
The Coupon Creator plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 3.1. This is due to missing or incorrect nonce validation on the save_meta() function. This makes it possible for unauthenticated attackers to save meta fields via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
[ "cpe:2.3:a:jesseeproductions:coupon_creator:*:*:*:*:*:wordpress:*:*" ]
null
4.3
null
null
RHSA-2024:0756
Red Hat Security Advisory: runc security update
runc: file descriptor leak
[ "cpe:/a:redhat:rhel_eus:9.0::appstream" ]
null
8.6
null
null
GHSA-fvx8-gwc7-qjhw
An invalid free vulnerability exists in gpac 1.1.0 via the gf_svg_delete_attribute_value function, which causes a segmentation fault and application crash.
[]
null
5.5
null
null
GHSA-rgc3-xv9w-g763
Buffer Overflow vulnerability in GifLib Project GifLib v.5.2.1 allows a local attacker to obtain sensitive information via the DumpSCreen2RGB function in gif2rgb.c
[]
null
7.1
null
null
GHSA-gc66-4m5h-mc5r
The Delete Custom Fields plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 0.3.1. This is due to missing or incorrect nonce validation on the ajax_delete_field() function. This makes it possible for unauthenticated attackers to delete arbitrary post meta data via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
[]
null
6.1
null
null
GHSA-4mjh-9fxc-hm78
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Think201 Data Dash allows Reflected XSS. This issue affects Data Dash: from n/a through 1.2.3.
[]
null
7.1
null
null
CVE-2024-10954
Prompt Injection Leading to RCE in binary-husky/gpt_academic Plugin `manim`
In the `manim` plugin of binary-husky/gpt_academic, versions prior to the fix, a vulnerability exists due to improper handling of user-provided prompts. The root cause is the execution of untrusted code generated by the LLM without a proper sandbox. This allows an attacker to perform remote code execution (RCE) on the app backend server by injecting malicious code through the prompt.
[]
null
null
8.8
null
RHSA-2022:4655
Red Hat Security Advisory: kpatch-patch security update
kernel: cgroups v1 release_agent feature may allow privilege escalation
[ "cpe:/o:redhat:enterprise_linux:7::server" ]
null
7
null
null
GHSA-fpc4-2vcc-ch77
The GenerateFunction function in bindings/scripts/code_generator_v8.pm in Blink, as used in Google Chrome before 33.0.1750.149, does not implement a certain cross-origin restriction for the EventTarget::dispatchEvent function, which allows remote attackers to conduct Universal XSS (UXSS) attacks via vectors involving events.
[]
null
null
null
null
GHSA-fwmm-vfgg-4f84
A vulnerability in the packet processing functionality of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to inefficient memory management. An attacker could exploit this vulnerability by sending a high rate of IPv4 or IPv6 traffic through an affected device. This traffic would need to match a configured block action in an access control policy. An exploit could allow the attacker to cause a memory exhaustion condition on the affected device, which would result in a DoS for traffic transiting the device, as well as sluggish performance of the management interface. Once the flood is stopped, performance should return to previous states.
[]
null
null
null
null
cisco-sa-ise-7Q4TNYUx
Cisco Identity Services Engine Vulnerabilities
Multiple vulnerabilities in Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to inject arbitrary operating system commands, bypass security protections, and conduct cross-site scripting attacks. For more information about these vulnerabilities, see the Details ["#details"] section of this advisory. Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.
[]
null
4.8
null
null
CVE-2019-1003087
A missing permission check in Jenkins Chef Sinatra Plugin in the ChefBuilderConfiguration.DescriptorImpl#doTestConnection form validation method allows attackers with Overall/Read permission to initiate a connection to an attacker-specified server.
[ "cpe:2.3:a:jenkins:chef_sinatra:*:*:*:*:*:jenkins:*:*" ]
null
6.5
null
4
CVE-2018-18406
An issue was discovered in Tufin SecureTrack 18.1 with TufinOS 2.16 build 1179(Final). The Audit Report module is affected by a blind XXE vulnerability when a new Best Practices Report is saved using a special payload inside the xml input field. The XXE vulnerability is blind since the response doesn't directly display a requested file, but rather returns it inside the name data field when the report is saved. An attacker is able to view restricted operating system files. This issue affects all types of users: administrators or normal users.
[ "cpe:2.3:a:tufin:securetrack:18.1:*:*:*:*:*:*:*", "cpe:2.3:o:tufin:tufinos:2.16:build_1179:*:*:*:*:*:*" ]
null
null
9.9
6.5
GHSA-3w39-v724-v74w
In the Linux kernel, the following vulnerability has been resolved:wifi: iwlwifi: mvm: fix a crash when we run out of stationsA DoS tool that injects loads of authentication frames made our AP crash. The iwl_mvm_is_dup() function couldn't find the per-queue dup_data which was not allocated.The root cause for that is that we ran out of stations in the firmware and we didn't really add the station to the firmware, yet we didn't return an error to mac80211. Mac80211 was thinking that we have the station and because of that, sta_info::uploaded was set to 1. This allowed ieee80211_find_sta_by_ifaddr() to return a valid station object, but that ieee80211_sta didn't have any iwl_mvm_sta object initialized and that caused the crash mentioned earlier when we got Rx on that station.
[]
null
5.5
null
null
CVE-2016-10033
The mailSend function in the isMail transport in PHPMailer before 5.2.18 might allow remote attackers to pass extra parameters to the mail command and consequently execute arbitrary code via a \" (backslash double quote) in a crafted Sender property.
[ "cpe:2.3:a:phpmailer_project:phpmailer:*:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:*:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
CVE-2023-45358
Archer Platform 6.x before 6.13 P2 HF2 (6.13.0.2.2) contains a stored cross-site scripting (XSS) vulnerability. A remote authenticated malicious Archer user could potentially exploit this vulnerability to store malicious HTML or JavaScript code in a trusted application data store. When victim users access the data store through their browsers, the malicious code gets executed by the web browser in the context of the vulnerable application. 6.14 (6.14.0) is also a fixed release.
[ "cpe:2.3:a:archerirm:archer:*:*:*:*:*:*:*:*" ]
null
8.5
null
null
GHSA-hph6-79wj-qqmw
PHP-Memcached v2.2.0 and below contains an improper NULL termination which allows attackers to execute CLRF injection.
[]
null
9.8
null
null
GHSA-gxvh-f4g9-p9wp
In the Linux kernel, the following vulnerability has been resolved:scsi: ufs: core: Remove SCSI host only if addedIf host tries to remove ufshcd driver from a UFS device it would cause a kernel panic if ufshcd_async_scan fails during ufshcd_probe_hba before adding a SCSI host with scsi_add_host and MCQ is enabled since SCSI host has been defered after MCQ configuration introduced by commit 0cab4023ec7b ("scsi: ufs: core: Defer adding host to SCSI if MCQ is supported").To guarantee that SCSI host is removed only if it has been added, set the scsi_host_added flag to true after adding a SCSI host and check whether it is set or not before removing it.
[]
null
5.5
null
null
GHSA-3cwx-q62p-7m5h
Missing custom error page vulnerability in Synology Web Station before 2.1.3-0139 allows remote attackers to conduct phishing attacks via a crafted URL.
[]
null
null
6.1
null
CVE-2013-4878
The default configuration of Parallels Plesk Panel 9.0.x and 9.2.x on UNIX, and Small Business Panel 10.x on UNIX, has an improper ScriptAlias directive for phppath, which makes it easier for remote attackers to execute arbitrary code via a crafted request, a different vulnerability than CVE-2012-1823.
[ "cpe:2.3:a:parallels:parallels_plesk_panel:9.0:*:*:*:*:*:*:*", "cpe:2.3:a:parallels:parallels_plesk_panel:9.2:*:*:*:*:*:*:*", "cpe:2.3:a:parallels:parallels_small_business_panel:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2008-0510
SQL injection vulnerability in index.php in the Newsletter (com_newsletter) component for Mambo 4.5 and Joomla! allows remote attackers to execute arbitrary SQL commands via the listid parameter.
[ "cpe:2.3:a:joomla:com_newsletter:*:*:*:*:*:*:*:*", "cpe:2.3:a:mambo:com_newsletter:*:*:*:*:*:*:*:*", "cpe:2.3:a:mambo:mambo:4.5:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-874w-4q4h-wg36
Fortinet FortiWLC 6.1-2-29 and earlier, 7.0-9-1, 7.0-10-0, 8.0-5-0, 8.1-2-0, and 8.2-4-0 allow administrators to obtain sensitive user credentials by reading the pam.log file.
[]
null
null
7.2
null
CVE-2024-21194
Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
[ "cpe:2.3:a:oracle:mysql_server:8.0.39_and_prior:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql_server:8.4.2_and_prior:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql_server:9.0.1_and_prior:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:9.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:9.0.1:*:*:*:*:*:*:*" ]
null
4.9
null
null
GHSA-hh92-wg7v-8vfr
Gleez CMS Vulnerability Allows Forced Browsing to Profile Page of Other Users
An issue was discovered in Gleez CMS v1.2.0. Because of an Insecure Direct Object Reference vulnerability, it is possible for attackers (logged in users) to view profile page of other users, as demonstrated by navigating to `user/3` on `demo.gleezcms.org`.
[]
null
null
4.3
null
CVE-2007-3762
Stack-based buffer overflow in the IAX2 channel driver (chan_iax2) in Asterisk before 1.2.22 and 1.4.x before 1.4.8, Business Edition before B.2.2.1, AsteriskNOW before beta7, Appliance Developer Kit before 0.5.0, and s800i before 1.0.2 allows remote attackers to execute arbitrary code by sending a long (1) voice or (2) video RTP frame.
[ "cpe:2.3:a:asterisk:asterisk:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:asterisk:1.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:asterisk:1.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:asterisk:1.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:asterisk:1.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:asterisk:1.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:asterisk:1.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:asterisk:1.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:asterisk:1.2.0_beta1:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:asterisk:1.2.0_beta2:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:asterisk:1.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:asterisk:1.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:asterisk:1.2.7:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:asterisk:1.2.8:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:asterisk:1.2.9:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:asterisk:1.2.10:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:asterisk:1.2.11:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:asterisk:1.2.12:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:asterisk:1.2.13:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:asterisk:1.2.14:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:asterisk:1.2.15:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:asterisk:1.2.16:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:asterisk:1.2.17:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:asterisk:1.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:asterisk:1.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:asterisk:1.4.4_2007-04-27:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:asterisk:1.4_beta:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:asterisk:a:*:business:*:*:*:*:*", "cpe:2.3:a:asterisk:asterisk:b.1.3.2:*:business:*:*:*:*:*", "cpe:2.3:a:asterisk:asterisk:b.1.3.3:*:business:*:*:*:*:*", "cpe:2.3:a:asterisk:asterisk:b.2.2.0:*:business:*:*:*:*:*", "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:*:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:asterisknow:beta_5:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:asterisknow:beta_6:*:*:*:*:*:*:*", "cpe:2.3:h:asterisk:s800i_appliance:1.0:*:*:*:*:*:*:*", "cpe:2.3:h:asterisk:s800i_appliance:1.0.1:*:*:*:*:*:*:*" ]
null
null
null
9.3