id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
139k
cpes
sequencelengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
GHSA-85xq-j9vf-c4j9
A vulnerability in the DNS inspection handler of Cisco Adaptive Security Appliance (ASA) Software and Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service condition (DoS) on an affected device. This vulnerability is due to a lack of proper processing of incoming requests. An attacker could exploit this vulnerability by sending crafted DNS requests at a high rate to an affected device. A successful exploit could allow the attacker to cause the device to stop responding, resulting in a DoS condition.
[]
null
7.5
null
null
GHSA-vmq3-255x-fhx5
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an authenticated, remote attacker to execute arbitrary code on an affected device or cause the device to restart unexpectedly, resulting in a denial of service (DoS) condition. These vulnerabilities are due to insufficient validation of user fields within incoming HTTP packets. An attacker could exploit these vulnerabilities by sending a crafted request to the web-based management interface. A successful exploit could allow the attacker to execute arbitrary commands on an affected device with root-level privileges or to cause the device to restart unexpectedly, resulting in a DoS condition. To exploit these vulnerabilities, an attacker would need to have valid Administrator credentials on the affected device. Cisco has not released software updates that address these vulnerabilities.
[]
null
7.2
null
null
GHSA-39fr-7764-c9rw
The PreserveWrapper implementation in Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 does not properly handle the lack of a wrapper, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code by leveraging unintended clearing of the wrapper cache's preserved-wrapper flag.
[]
null
null
null
null
GHSA-884w-99wq-432v
The SAsync (aka com.sasync.sasyncmap) application 1.2.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[]
null
null
null
null
CVE-2024-11903
WP eCards <= 1.3.904 - Authenticated (Contributor+) Stored Cross-Site Scripting
The WP eCards plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'ecard' shortcode in all versions up to, and including, 1.3.904 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
6.4
null
null
GHSA-h6wp-6m5m-gc8m
An incomplete SSL server certification validation vulnerability in the Trend Micro Security 2019 (v15) consumer family of products could allow an attacker to combine this vulnerability with another attack to trick an affected client into downloading a malicious update instead of the expected one. CWE-494: Update files are not properly verified.
[]
null
null
null
null
cisco-sa-cucm-xss-6MCe4kPF
Cisco Unified Communications Products Cross-Site Scripting Vulnerability
A vulnerability in the web-based management interface of Cisco Unified Communications Manager (Unified CM), Cisco Unified CM Session Management Edition (Unified CM SME), and Cisco Unity Connection could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive browser-based information. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
[]
null
6.1
null
null
GHSA-cp4c-qjgv-3j5v
The method PVRSRVBridgePMRPDumpSymbolicAddr allocates puiMemspaceNameInt on the heap, fills the contents of the buffer via PMR_PDumpSymbolicAddr, and then copies the buffer to userspace. The method PMR_PDumpSymbolicAddr may fail, and if it does the buffer will be left uninitialized and despite the error will still be copied to userspace. Kernel leak of uninitialized heap data with no privs required.Product: AndroidVersions: Android SoCAndroid ID: A-236846966
[]
null
7.5
null
null
CVE-2021-37657
Reference binding to nullptr in `MatrixDiagV*` ops in TensorFlow
TensorFlow is an end-to-end open source platform for machine learning. In affected versions an attacker can cause undefined behavior via binding a reference to null pointer in all operations of type `tf.raw_ops.MatrixDiagV*`. The [implementation](https://github.com/tensorflow/tensorflow/blob/84d053187cb80d975ef2b9684d4b61981bca0c41/tensorflow/core/kernels/linalg/matrix_diag_op.cc) has incomplete validation that the value of `k` is a valid tensor. We have check that this value is either a scalar or a vector, but there is no check for the number of elements. If this is an empty tensor, then code that accesses the first element of the tensor is wrong. We have patched the issue in GitHub commit f2a673bd34f0d64b8e40a551ac78989d16daad09. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
[ "cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*", "cpe:2.3:a:google:tensorflow:2.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:tensorflow:2.6.0:rc0:*:*:*:*:*:*", "cpe:2.3:a:google:tensorflow:2.6.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:google:tensorflow:2.6.0:rc2:*:*:*:*:*:*" ]
null
7.1
null
null
CVE-2025-5958
Use after free in Media in Google Chrome prior to 137.0.7151.103 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
[]
null
8.8
null
null
GHSA-wwx9-2w98-9mgg
The Style Kits plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.8.0. This is due to missing or incorrect nonce validation on the update_posts_stylekit() function. This makes it possible for unauthenticated attackers to update style kits for posts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
[]
null
8.8
null
null
GHSA-53rm-9vx8-h5mq
CFNetwork HTTPProtocol in Apple iOS before 9.2 and OS X before 10.11.2 allows man-in-the-middle attackers to bypass the HSTS protection mechanism via a crafted URL.
[]
null
null
null
null
GHSA-2993-5qvm-pg7x
In Xpdf 4.01.01, there is a heap-based buffer over-read in the function JBIG2Stream::readTextRegionSeg() located at JBIG2Stream.cc. It can, for example, be triggered by sending a crafted PDF document to the pdftoppm tool. It might allow an attacker to cause Information Disclosure.
[]
null
5.5
null
null
RHSA-2025:3490
Red Hat Security Advisory: Satellite 6.16.4 Async Update
graphql-ruby: Remote code execution when loading a crafted GraphQL schema rack: rubygem-rack: Local File Inclusion in Rack::Static
[ "cpe:/a:redhat:satellite:6.16::el8", "cpe:/a:redhat:satellite:6.16::el9", "cpe:/a:redhat:satellite_capsule:6.16::el8", "cpe:/a:redhat:satellite_capsule:6.16::el9", "cpe:/a:redhat:satellite_maintenance:6.16::el8", "cpe:/a:redhat:satellite_maintenance:6.16::el9", "cpe:/a:redhat:satellite_utils:6.16::el8", "cpe:/a:redhat:satellite_utils:6.16::el9" ]
null
7.5
null
null
CVE-2018-5552
DocuTrac DTISQLInstaller.exe Hard-Coded Salt
Versions of DocuTrac QuicDoc and Office Therapy that ship with DTISQLInstaller.exe version 1.6.4.0 and prior contains a hard-coded cryptographic salt, "S@l+&pepper".
[ "cpe:2.3:a:docutracinc:dtisqlinstaller:*:*:*:*:*:*:*:*" ]
null
null
2.9
null
RHSA-2009:1688
Red Hat Security Advisory: condor security update
Condor: queue super user cannot drop privs
[ "cpe:/a:redhat:enterprise_mrg:1.0::el4" ]
null
null
null
null
GHSA-r53w-cgff-xvw2
An issue was discovered on Momentum Axel 720P 5.1.8 devices. A password of EHLGVG is hard-coded for the root and admin accounts, which makes it easier for physically proximate attackers to login at the console.
[]
null
null
6.8
null
CVE-2011-2318
Unspecified vulnerability in the Oracle WebLogic Server component in Oracle Fusion Middleware 9.2.4.0, 10.0.2.0, 10.3.3.0, 10.3.4.0, and 10.3.5.0 allows local users to affect confidentiality, related to WLS Security.
[ "cpe:2.3:a:oracle:fusion_middleware:9.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:fusion_middleware:10.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:fusion_middleware:10.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:fusion_middleware:10.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:fusion_middleware:10.3.5:*:*:*:*:*:*:*" ]
null
null
null
1.5
GHSA-5hpp-r359-82qx
Server-Side Request Forgery (SSRF) vulnerability in Joe Waymark allows Server Side Request Forgery. This issue affects Waymark: from n/a through 1.5.2.
[]
null
4.9
null
null
GHSA-79pr-23xj-fhhq
MuleSoft is aware of a XML External Entity (XXE) vulnerability affecting certain versions of a Mule runtime component that may affect both CloudHub and on-premise customers. Affected versions: Mule 4.x runtime released before February 2, 2021.
[]
null
null
null
null
CVE-2017-10239
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.1.24. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox as well as unauthorized update, insert or delete access to some of Oracle VM VirtualBox accessible data and unauthorized read access to a subset of Oracle VM VirtualBox accessible data. CVSS 3.0 Base Score 7.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:H).
[ "cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*" ]
null
null
7.3
4.6
GHSA-2gp8-fw4p-p6jj
index.php/admin/permissions in Ignited CMS through 2017-02-19 allows CSRF to add an administrator.
[]
null
8.8
null
null
CVE-2023-42828
This issue was addressed by removing the vulnerable code. This issue is fixed in macOS Ventura 13.5. An app may be able to gain root privileges.
[ "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*" ]
null
7.8
null
null
GHSA-9cp7-c9w3-64vv
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader 11.2.2.53575. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of AcroForms. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-17545.
[]
null
7.8
null
null
GHSA-98g9-33hv-jcxp
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WP Darko Top Bar allows Stored XSS.This issue affects Top Bar: from n/a through 3.0.5.
[]
null
5.9
null
null
GHSA-wmw2-pm8r-7xv5
An exploitable arbitrary read exists in the XLS parsing of the Lexmark Perspective Document Filters conversion functionality. A crafted XLS document can lead to a arbitrary read resulting in memory disclosure. The vulnerability was confirmed on versions 11.3.0.2228 and 11.3.0.2400
[]
null
null
3.3
null
CVE-2022-34811
A missing permission check in Jenkins XPath Configuration Viewer Plugin 1.1.1 and earlier allows attackers with Overall/Read permission to access the XPath Configuration Viewer page.
[ "cpe:2.3:a:jenkins:xpath_configuration_viewer:*:*:*:*:*:jenkins:*:*" ]
null
4.3
null
4
GHSA-4qp4-ccmr-483g
Out of bounds write in JavaScript in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.
[]
null
8.8
null
null
GHSA-mh83-jcw5-rjh8
XML External Entity Reference in edu.stanford.nlp:stanford-corenlp
The TransformXML() function makes use of SAXParser generated from a SAXParserFactory with no FEATURE_SECURE_PROCESSING set, allowing for XXE attacks.
[]
null
null
6.1
null
GHSA-8m78-cfpj-v8gh
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in ISS BlackICE PC Protection and classified as critical. Affected by this issue is the component Cross Site Scripting Detection. The manipulation as part of POST/PUT/DELETE/OPTIONS Request leads to privilege escalation. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. It is recommended to upgrade the affected component. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
[]
null
9.8
null
null
GHSA-xmg8-w465-mr56
SQL Injection in Translation Export API
ImpactSQL injection is a web security vulnerability that allows an attacker to interfere with the queries that an application makes to its database. It generally allows an attacker to view data that they are not normally able to retrieve. This might include data belonging to other users, or any other data that the application itself is able to access.In many cases, an attacker can modify or delete this data, causing persistent changes to the application's content or behavior. In some situations, an attacker can escalate an SQL injection attack to compromise the underlying server or other back-end infrastructure, or perform a denial-of-service attack. It was observed that the reported API endpoint accessible by an authenticated administrator user and is vulnerable to SQL injection via the "filter" GET parameter. The parameter accepts JSON formatted data. The value of JSON key "property" inside "filter" is not sanitized properly and is used in a SQL statement in an unsafe manner, resulting in SQL injectionPatchesUpdate to version 10.5.21 or apply this patch manually https://github.com/pimcore/pimcore/commit/c6c80905e58c7724c776f980570a56df7016c6d1.patchWorkaroundsApply patch https://github.com/pimcore/pimcore/commit/c6c80905e58c7724c776f980570a56df7016c6d1.patch manually.References#14968
[]
null
8.8
null
null
GHSA-fq8h-f93c-3m89
LG On-Screen Phone (OSP) before 4.3.010 allows remote attackers to bypass authorization via a crafted request.
[]
null
null
null
null
cisco-sa-esa-afw-bGG2UsjH
Cisco Secure Email Gateway Arbitrary File Write Vulnerability
A vulnerability in the content scanning and message filtering features of Cisco Secure Email Gateway could allow an unauthenticated, remote attacker to overwrite arbitrary files on the underlying operating system. This vulnerability is due to improper handling of email attachments when file analysis and content filters are enabled. An attacker could exploit this vulnerability by sending an email that contains a crafted attachment through an affected device. A successful exploit could allow the attacker to replace any file on the underlying file system. The attacker could then perform any of the following actions: add users with root privileges, modify the device configuration, execute arbitrary code, or cause a permanent denial of service (DoS) condition on the affected device. Note: Manual intervention is required to recover from the DoS condition. Customers are advised to contact the Cisco Technical Assistance Center (TAC) to help recover a device in this condition. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
[]
null
9.8
null
null
CVE-2024-40776
A use-after-free issue was addressed with improved memory management. This issue is fixed in iOS 16.7.9 and iPadOS 16.7.9, Safari 17.6, iOS 17.6 and iPadOS 17.6, watchOS 10.6, tvOS 17.6, visionOS 1.3, macOS Sonoma 14.6. Processing maliciously crafted web content may lead to an unexpected process crash.
[ "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*" ]
null
6.5
null
null
GHSA-48x9-64j6-vm38
Submitty before v22.06.00 is vulnerable to Incorrect Access Control. An attacker can delete any post in the forum by modifying request parameter.
[]
null
5.3
null
null
GHSA-9hcr-77rj-6rj7
Microsoft Internet Explorer 7 through 11 and Microsoft Edge allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Memory Corruption Vulnerability," a different vulnerability than CVE-2015-2486, CVE-2015-2487, CVE-2015-2490, CVE-2015-2492, CVE-2015-2498, and CVE-2015-2499.
[]
null
null
null
null
GHSA-g24j-pvr2-f826
Buffer overflow in SmartMail Server 1.0 Beta 10 allows remote attackers to cause a denial of service (crash) via a long request to (1) TCP port 25 (SMTP) or (2) TCP port 110 (POP3).
[]
null
null
null
null
CVE-2005-1630
Unknown vulnerability in Attachment Mod before 2.3.13, related to a "serious issue with realnames," has unknown impact and attack vectors.
[ "cpe:2.3:a:opentools:attachment_mod:2.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:opentools:attachment_mod:2.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:opentools:attachment_mod:2.3.6:*:*:*:*:*:*:*", "cpe:2.3:a:opentools:attachment_mod:2.3.7:*:*:*:*:*:*:*", "cpe:2.3:a:opentools:attachment_mod:2.3.8:*:*:*:*:*:*:*", "cpe:2.3:a:opentools:attachment_mod:2.3.9:*:*:*:*:*:*:*", "cpe:2.3:a:opentools:attachment_mod:2.3.10:*:*:*:*:*:*:*", "cpe:2.3:a:opentools:attachment_mod:2.3.11:*:*:*:*:*:*:*", "cpe:2.3:a:opentools:attachment_mod:2.3.12:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2017-11853
Windows kernel in Windows 7 SP1, Windows Server 2008 SP2 and R2 SP1, Windows 8.1 and RT 8.1, Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and 1709, Windows Server 2016, and Windows Server, version 1709 allows an attacker to log in and run a specially crafted application due to the Windows kernel improperly initializing a memory address, aka "Windows Kernel Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-11842, CVE-2017-11849, and CVE-2017-11851.
[ "cpe:2.3:o:microsoft:windows_10:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:itanium:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*", "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*" ]
null
null
5.5
4.3
GHSA-f46m-96mg-hpgw
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Tauhidul Alam Simple Portfolio Gallery plugin <= 0.1 versions.
[]
null
5.9
null
null
CVE-2025-32581
WordPress WordPress Spam Blocker Plugin <= 2.0.4 - CSRF to Stored XSS vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Ankit Singla WordPress Spam Blocker allows Stored XSS. This issue affects WordPress Spam Blocker: from n/a through 2.0.4.
[]
null
7.1
null
null
CVE-2024-6806
Missing Authorization Checks In NI VeriStand Gateway For Project Resources
The NI VeriStand Gateway is missing authorization checks when an actor attempts to access Project resources. These missing checks may result in remote code execution. This affects NI VeriStand 2024 Q2 and prior versions.
[ "cpe:2.3:a:ni:veristand:*:*:*:*:*:*:*:*", "cpe:2.3:a:ni:veristand:2024:q2:*:*:*:*:*:*" ]
null
9.8
null
null
CVE-2024-9885
Widget or Sidebar Shortcode <= 0.6.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode
The Widget or Sidebar Shortcode plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'sidebar' shortcode in all versions up to, and including, 0.6.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
6.4
null
null
CVE-1999-0369
The Sun sdtcm_convert calendar utility for OpenWindows has a buffer overflow which can gain root access.
[ "cpe:2.3:o:sun:solaris:*:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:solaris:1.1.3:u1:*:*:*:*:*:*", "cpe:2.3:o:sun:solaris:1.1.4:*:jl:*:*:*:*:*", "cpe:2.3:o:sun:solaris:2.4:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:solaris:2.5:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*", "cpe:2.3:o:sun:sunos:4.1.3:*:*:*:*:*:*:*", "cpe:2.3:o:sun:sunos:4.1.4:*:*:*:*:*:*:*", "cpe:2.3:o:sun:sunos:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:sun:sunos:5.1:*:*:*:*:*:*:*", "cpe:2.3:o:sun:sunos:5.2:*:*:*:*:*:*:*", "cpe:2.3:o:sun:sunos:5.3:*:*:*:*:*:*:*", "cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*", "cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*", "cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*" ]
null
null
null
7.2
GHSA-83xw-9x6g-hh74
ARM mbed TLS before 1.3.22, before 2.1.10, and before 2.7.0 allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow) via a crafted certificate chain that is mishandled during RSASSA-PSS signature verification within a TLS or DTLS session.
[]
null
null
9.8
null
CVE-2018-11168
Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 26 of 46).
[ "cpe:2.3:a:quest:disk_backup:*:*:*:*:*:*:*:*" ]
null
null
8.8
6.5
cisco-sa-ios-xe-webui-multi-vfTkk7yr
Cisco IOS XE Software Web Management Framework Vulnerabilities
Multiple vulnerabilities in the web management framework of Cisco IOS XE Software could allow an authenticated, remote attacker with read-only privileges to gain unauthorized read access to sensitive data or cause the web management software to hang or crash, resulting in a denial of service (DoS) condition. For more information about these vulnerabilities, see the Details ["#details"] section of this advisory. Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-xe-webui-multi-vfTkk7yr ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-xe-webui-multi-vfTkk7yr"]
[]
null
4.3
null
null
RHSA-2002:173
Red Hat Security Advisory: krb5 security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as" ]
null
null
null
null
CVE-2006-3082
parse-packet.c in GnuPG (gpg) 1.4.3 and 1.9.20, and earlier versions, allows remote attackers to cause a denial of service (gpg crash) and possibly overwrite memory via a message packet with a large length (long user ID string), which could lead to an integer overflow, as demonstrated using the --no-armor option.
[ "cpe:2.3:a:gnupg:gnupg:*:*:*:*:*:*:*:*", "cpe:2.3:a:gnupg:gnupg:1.4.3:*:*:*:*:*:*:*" ]
null
null
null
5
GHSA-q6gq-756p-9g2g
Improper access control in GearManagerStub prior to SMR May-2023 Release 1 allows a local attacker to delete applications installed by watchmanager.
[]
null
4.7
null
null
GHSA-g4ph-fxgr-3cfh
Job Board Script Software allows SQL Injection via the PATH_INFO to a /job-details URI.
[]
null
null
9.8
null
GHSA-qpmg-vp4h-xhxc
Heap-based buffer overflow in the QualifierList retrieve_qualifier_list function in Medicomp MEDCIN Engine before 2.22.20153.226 might allow remote attackers to execute arbitrary code via a long list name in a packet on port 8190.
[]
null
null
null
null
CVE-2022-23499
Cross-Site Scripting Protection bypass in HTML Sanitizer
HTML sanitizer is written in PHP, aiming to provide XSS-safe markup based on explicitly allowed tags, attributes and values. In versions prior to 1.5.0 or 2.1.1, malicious markup used in a sequence with special HTML CDATA sections cannot be filtered and sanitized due to a parsing issue in the upstream package masterminds/html5. This allows bypassing the cross-site scripting mechanism of typo3/html-sanitizer. The upstream package masterminds/html5 provides HTML raw text elements (`script`, `style`, `noframes`, `noembed` and `iframe`) as DOMText nodes, which were not processed and sanitized further. None of the mentioned elements were defined in the default builder configuration, that's why only custom behaviors, using one of those tag names, were vulnerable to cross-site scripting. This issue has been fixed in versions 1.5.0 and 2.1.1.
[ "cpe:2.3:a:typo3:html_sanitizer:*:*:*:*:*:*:*:*" ]
null
6.1
null
null
GHSA-m987-qx3x-536h
Multiple SQL injection vulnerabilities in NICE Recording eXpress (aka Cybertech eXpress) 6.5.7 and earlier allow remote attackers to execute arbitrary SQL commands via unspecified vectors.
[]
null
null
null
null
CVE-2017-5207
Firejail before 0.9.44.4, when running a bandwidth command, allows local users to gain root privileges via the --shell argument.
[ "cpe:2.3:a:firejail_project:firejail:*:*:*:*:*:*:*:*" ]
null
null
7.8
7.2
CVE-2022-45315
Mikrotik RouterOs before stable v7.6 was discovered to contain an out-of-bounds read in the snmp process. This vulnerability allows attackers to execute arbitrary code via a crafted packet.
[ "cpe:2.3:o:mikrotik:routeros:*:*:*:*:*:*:*:*" ]
null
9.8
null
null
GHSA-m757-m826-j8h2
The web server control panel in 602LAN SUITE 2004 allows remote attackers to make it more difficult for the administrator to read portions of log files via a "</pre><!-" sequence in an HTTP GET request in the logon, possibly due to a cross-site scripting (XSS) vulnerability.
[]
null
null
null
null
RHSA-2020:4390
Red Hat Security Advisory: python-django security update
Django: Incorrect HTTP detection with reverse-proxy connecting via HTTPS Django: backtracking in a regular expression in django.utils.text.Truncator leads to DoS Django: the behavior of the underlying HTMLParser leading to DoS Django: SQL injection possibility in key and index lookups for JSONField/HStoreField Django: Potential memory exhaustion in django.utils.encoding.uri_to_iri()
[ "cpe:/a:redhat:openstack:13::el7" ]
null
null
5.3
null
GHSA-72r6-qv32-4jvm
A memory corruption issue existed in the processing of font files. This issue was addressed with improved input validation. This issue is fixed in iOS 14.0 and iPadOS 14.0, macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave, macOS Big Sur 11.0.1, watchOS 7.0, tvOS 14.0. Processing a maliciously crafted font file may lead to arbitrary code execution.
[]
null
7.8
null
null
CVE-2002-0949
Telindus 1100 series ADSL router allows remote attackers to gain privileges to the device via a certain packet to UDP port 9833, which generates a reply that includes the router's password and other sensitive information in cleartext.
[ "cpe:2.3:h:telindus:adsl_router:1110:*:*:*:*:*:*:*", "cpe:2.3:h:telindus:adsl_router:1120:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-cw86-8wwr-vh33
Vulnerability in the PeopleSoft Enterprise SCM Service Procurement component of Oracle PeopleSoft Products (subcomponent: Usability). The supported version that is affected is 9.2. Easily "exploitable" vulnerability allows high privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise SCM Service Procurement. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all PeopleSoft Enterprise SCM Service Procurement accessible data as well as unauthorized access to critical data or complete access to all PeopleSoft Enterprise SCM Service Procurement accessible data. CVSS 3.0 Base Score 6.5 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N).
[]
null
null
6.5
null
ICSA-22-314-02
Siemens Web Server Login Page of Industrial Controllers
The login endpoint /FormLogin in affected web services does not apply proper origin checking. This could allow authenticated remote attackers to track the activities of other users via a login cross-site request forgery attack. CVE-2022-30694 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated. the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N)
[]
null
6.5
null
null
GHSA-qmpx-29w7-4qjr
Vulnerability in the MIT-SHM extension of the X server on Linux (XFree86) 4.2.1 and earlier allows local users to read and write arbitrary shared memory, possibly to cause a denial of service or gain privileges.
[]
null
null
null
null
CVE-2020-5549
Cross-site request forgery (CSRF) vulnerability in EasyBlocks IPv6 Ver. 2.0.1 and earlier and Enterprise Ver. 2.0.1 and earlier allows remote attackers to hijack the authentication of administrators via unspecified vectors.
[ "cpe:2.3:o:plathome:easyblocks_ipv6_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:plathome:easyblocks_ipv6:-:*:*:*:*:*:*:*", "cpe:2.3:o:plathome:easyblocks_ipv6_enterprise_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:plathome:easyblocks_ipv6_enterprise:-:*:*:*:*:*:*:*" ]
null
8.8
null
6.8
GHSA-443p-64xr-9cq7
A vulnerability was found in Netentsec NS-ASG Application Security Gateway 6.3. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /admin/add_postlogin.php. The manipulation of the argument SingleLoginId leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-259711.
[]
null
6.3
null
null
CVE-2023-43570
A potential vulnerability was reported in the SMI callback function of the OemSmi driver that may allow a local attacker with elevated permissions to execute arbitrary code.
[ "cpe:2.3:o:lenovo:ideacentre_c5-14imb05_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_c5-14imb05:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_3-07ada05_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_3-07ada05:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_3-07imb05_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_3-07imb05:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_5_14iab7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_5_14iab7:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_5_14irb8_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_5_14irb8:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_5-14acn6_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_5-14acn6:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_t540-15ama_g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_t540-15ama_g:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_neo_70t_gen_3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_neo_70t_gen_3:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_neo_50t_gen_3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_neo_50t_gen_3:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_neo_50a_24_gen_4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_neo_50a_24_gen_4:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_neo_50a_24_gen_3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_neo_50a_24_gen_3:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_neo_30a_27_gen_4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_neo_30a_27_gen_4_firmware:o5nkt33a:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_neo_30a_27_gen_4:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_neo_30a_27_gen_3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_neo_30a_27_gen_3:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_neo_30a_24_gen_4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_neo_30a_24_gen_4:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_neo_30a_24_gen_3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_neo_30a_24_gen_3:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_neo_30a_22_gen_4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_neo_30a_22_gen_4:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_neo_30a_22_gen_3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_neo_30a_22_gen_3:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m920z_all-in-one_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m920z_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m90t_gen_3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m90t_gen_3:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m90t_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m90t:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m90s_gen_3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m90s_gen_3:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m90s_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m90s:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m90q_tiny_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m90q_tiny:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m90q_gen_3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m90q_gen_3:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m90q_gen_2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m90q_gen_2:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m90a_pro_gen_3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m90a_pro_gen_3:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m90a_gen_3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m90a_gen_3:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m90a_gen_2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m90a_gen_2:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m90a_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m90a:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m80t_gen_3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m80t_gen_3:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m80t_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m80t:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m80s_gen_3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m80s_gen_3:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m80s_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m80s:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m80q_gen_3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m80q_gen_3:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m80q_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m80q:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m75t_gen_2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m75t_gen_2:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m75s_gen_2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m75s_gen_2:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m75q_gen_2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m75q_gen_2:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m75n_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m75n:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m70t_gen_3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m70t_gen_3:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m70t_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m70t:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m70s_gen_3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m70s_gen_3:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m70s_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m70s:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m70q_gen_2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m70q_gen_2:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m70q_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m70q:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m70c_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m70c:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m70a_gen_3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m70a_gen_3:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m630e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m630e:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkcentre_m625q_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkcentre_m625q:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:loq_17irb8_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:loq_17irb8:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:legion_t5_26iab7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:legion_t5_26iab7:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:legion_t7-34imz5_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:legion_t7-34imz5:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:legion_t7-34iaz7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:legion_t7-34iaz7:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:legion_t7_34irz8_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:legion_t7_34irz8:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:legion_t5_26irb8_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:legion_t5_26irb8:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_mini_5-01imh05_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_mini_5-01imh05:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_mini_5_01iaq7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_mini_5_01iaq7:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_gaming_5-14iob6_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_gaming_5-14iob6:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_gaming_5-14acn6_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_gaming_5-14acn6:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_gaming_5_17iab7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_gaming_5_17iab7:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_gaming_5_17acn7_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_gaming_5_17acn7:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_g5-14imb05_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_g5-14imb05:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_g5-14amr05_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_g5-14amr05:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_creator_5-14iob6_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_creator_5-14iob6:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_aio_5_27iah7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_aio_5_27iah7:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_aio_5_24iah7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_aio_5_24iah7:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_aio_3-27itl6_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_aio_3-27itl6:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_aio_3-27imb05_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_aio_3-27imb05:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_aio_3-24itl6_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_aio_3-24itl6:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_aio_3-24imb05_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_aio_3-24imb05:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_aio_3-24iil5_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_aio_3-24iil5:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_aio_3-24alc6_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_aio_3-24alc6:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_aio_3-22itl6_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_aio_3-22itl6:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_aio_3-22imb05_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_aio_3-22imb05:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_aio_3-22iil5_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_aio_3-22iil5:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_aio_3_27iap7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_aio_3_27iap7:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_aio_3_24iap7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_aio_3_24iap7:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_aio_3_22iap7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_aio_3_22iap7:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_aio_3_21itl7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_aio_3_21itl7:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_5-14iob6_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_5-14iob6:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideacentre_5-14imb05_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideacentre_5-14imb05:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v30a-22iml_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v30a-22iml:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v30a-22itl_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v30a-22itl:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v30a-24iml_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v30a-24iml:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v30a-24itl_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v30a-24itl:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v50a-22imb_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v50a-22imb:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v50a-24imb_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v50a-24imb:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v50s-07imb_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v50s-07imb:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v50t-13imb_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v50t-13imb:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v50t-13imh_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v50t-13imh:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v50t-13iob_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v50t-13iob:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v55t_gen_2_13acn_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v55t_gen_2_13acn:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:yoga_aio_7_27arh7_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:yoga_aio_7_27arh7:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:yoga_aio_7-27arh6_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:yoga_aio_7-27arh6:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkedge_se30_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkedge_se30:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkstation_p920_workstation_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkstation_p920_workstation:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkstation_p720_workstation_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkstation_p720_workstation:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkstation_p520c_workstation_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkstation_p520c_workstation:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkstation_p520_workstation_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkstation_p520_workstation:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkstation_p360_workstation_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkstation_p360_workstation:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkstation_p360_workstation_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkstation_p360_ultra_workstation_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkstation_p360_ultra_workstation:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkstation_p360_tiny_workstation_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkstation_p360_tiny_workstation:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkstation_p358_workstation_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkstation_p358_workstation:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkstation_p350_workstation_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkstation_p350_workstation:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkstation_p350_tiny_workstation_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkstation_p350_tiny_workstation:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkstation_p348_workstation_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkstation_p348_workstation:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkstation_p340_workstation_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkstation_p340_workstation:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkstation_p340_tiny_workstation_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkstation_p340_tiny_workstation:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkstation_p330_workstation_2nd_gen_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkstation_p330_workstation_2nd_gen:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkstation_p330_workstation_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkstation_p330_workstation:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkstation_p320_workstation_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkstation_p320_workstation:-:*:*:*:*:*:*:*" ]
null
6.7
null
null
RHSA-2010:0680
Red Hat Security Advisory: seamonkey security update
Mozilla Dangling pointer vulnerability in nsTreeSelection (MFSA 2010-54) Mozilla Frameset integer overflow vulnerability (MFSA 2010-50) Mozilla Dangling pointer vulnerability using DOM plugin array (MFSA 2010-51) Mozilla UTF-7 XSS by overriding document charset using <object> type attribute (MFSA 2010-61) Mozilla Dangling pointer vulnerability in nsTreeContentView (MFSA 2010-56) Mozilla XUL tree removal crash and remote code execution (MFSA 2010-55) Mozilla Miscellaneous memory safety hazards
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
CVE-2024-4857
FS Product Inquiry <= 1.1.1 - Unauthenticated Stored XSS
The FS Product Inquiry WordPress plugin through 1.1.1 does not sanitise and escape some form submissions, which could allow unauthenticated users to perform Stored Cross-Site Scripting attacks
[]
null
6.1
null
null
GHSA-96pm-r6g4-pggc
Adobe Bridge version 11.1.2 (and earlier) and version 12.0 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious TIF file.
[]
null
null
null
null
GHSA-hj86-pqmv-q7pr
Sandstorm before build 0.203 allows remote attackers to read any specified file under /etc or /run via the sandbox backup function. The root cause is that the findFilesToZip function doesn't filter Line Feed (\n) characters in a directory name.
[]
null
null
6.5
null
CVE-2024-34657
Stack-based out-of-bounds write in Samsung Notes prior to version 4.4.21.62 allows remote attackers to execute arbitrary code.
[ "cpe:2.3:a:samsung:notes:4.4.21.62:*:*:*:*:*:*:*", "cpe:2.3:a:samsung:notes:*:*:*:*:*:*:*:*" ]
null
8.6
null
null
CVE-2022-33726
Unprotected dynamic receiver in Samsung Galaxy Friends prior to SMR Aug-2022 Release 1 allows attacker to launch activity.
[ "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*" ]
null
3.3
null
null
GHSA-2vxg-v3f5-p55m
Certain NETGEAR devices are affected by stored XSS. This affects RBR20 before 2.3.5.26, RBS20 before 2.3.5.26, RBK20 before 2.3.5.26, RBR40 before 2.3.5.30, RBS40 before 2.3.5.30, RBK40 before 2.3.5.30, RBR50 before 2.3.5.30, RBS50 before 2.3.5.30, and RBK50 before 2.3.5.30.
[]
null
null
null
null
CVE-2017-18479
In cPanel before 62.0.4, WHM SSL certificate generation uses an unreserved e-mail address (SEC-209).
[ "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*" ]
null
null
6.5
4
GHSA-vjg5-gcmw-v53j
The oarsh script in OAR before 2.5.7 allows remote authenticated users of a cluster to obtain sensitive information and possibly gain privileges via vectors related to OpenSSH options.
[]
null
null
8.8
null
GHSA-958c-wvqf-f46f
named-xfer in AIX 4.1.5 and 4.2.1 allows members of the system group to overwrite system files to gain root access via the -f parameter and a malformed zone file.
[]
null
null
null
null
CVE-2010-2247
makepasswd 1.10 default settings generate insecure passwords
[ "cpe:2.3:a:makepasswd_project:makepasswd:1.10:*:*:*:*:*:*:*" ]
null
7.5
null
5
CVE-2024-39314
toy-blog administrative token leaked through the command line parameter
toy-blog is a headless content management system implementation. Starting in version 0.4.3 and prior to version 0.5.0, the administrative password was leaked through the command line parameter. The problem was patched in version 0.5.0. As a workaround, pass `--read-bearer-token-from-stdin` to the launch arguments and feed the token from the standard input in version 0.4.14 or later. Earlier versions do not have this workaround.
[]
null
4.7
null
null
GHSA-r6hh-5g3q-wwgc
Stored Cross-site Scripting in grav
Grav prior to 1.7.31 is vulnerable to stored cross-site scripting.
[]
null
null
7.1
null
GHSA-r8rh-cw28-gx6w
daemonControl in includes/functions.php in ZoneMinder before 1.32.3 allows command injection via shell metacharacters.
[]
null
null
9.8
null
PYSEC-2019-254
null
In Tautulli 2.1.9, CSRF in the /shutdown URI allows an attacker to shut down the remote media server. (Also, anonymous access can be achieved in applications that do not have a user login area).
[]
null
6.5
null
null
GHSA-gx3m-2wcq-p82x
SolarView Compact SV-CPT-MC310 prior to Ver.6.5 allows an authenticated attacker to upload arbitrary files via unspecified vectors. If the file is PHP script, an attacker may execute arbitrary code.
[]
null
null
null
null
GHSA-43w6-q9mv-9cwf
Directory traversal vulnerability in the contains_dot_dot function in src/names.c in GNU tar allows user-assisted remote attackers to overwrite arbitrary files via certain //.. (slash slash dot dot) sequences in directory symlinks in a TAR archive.
[]
null
null
null
null
RHSA-2007:1059
Red Hat Security Advisory: pcre security update
pcre miscalculation of memory requirements for malformed Posix character class pcre miscalculation of memory requirements for repeated subpattern containing a named recursion or subroutine reference pcre integer overflow pcre miscalculation of memory requirements if options are changed during pattern compilation
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
CVE-2022-24515
Azure Site Recovery Elevation of Privilege Vulnerability
Azure Site Recovery Elevation of Privilege Vulnerability
[ "cpe:2.3:a:microsoft:azure_site_recovery:*:*:*:*:*:*:*:*" ]
null
6.5
null
null
GHSA-5cj8-fmg6-wrfp
bfd/vms-alpha.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file in the _bfd_vms_get_value and _bfd_vms_slurp_etir functions during "objdump -D" execution.
[]
null
null
7.8
null
GHSA-9mmp-5j7c-w2r4
Heap-based buffer overflow in KMPlayer 3.0.0.1441, and possibly other versions, allows remote attackers to execute arbitrary code via a playlist (.KPL) file with a long Title field.
[]
null
null
null
null
CVE-2008-2508
Cross-site scripting (XSS) vulnerability in news.php in Tr Script News 2.1 allows remote attackers to inject arbitrary web script or HTML via the "nb" parameter in voir mode.
[ "cpe:2.3:a:tr_script_news:tr_script_news:2.1:*:*:*:*:*:*:*" ]
null
null
null
4.3
CVE-2024-4160
Download Manager <= 3.2.90 - Authenticated (Contributor+) Stored Cross-Site Scripting via wpdm-all-packages Shortcode
The Download Manager plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'wpdm-all-packages' shortcode in all versions up to, and including, 3.2.90 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
6.4
null
null
CVE-2024-9565
D-Link DIR-605L formSetPassword buffer overflow
A vulnerability has been found in D-Link DIR-605L 2.13B01 BETA and classified as critical. Affected by this vulnerability is the function formSetPassword of the file /goform/formSetPassword. The manipulation of the argument curTime leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
[ "cpe:2.3:h:d-link:dir-650l:*:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dir-605l_firmware:2.13b01:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:dir-605l:-:*:*:*:*:*:*:*" ]
8.7
8.8
8.8
9
CVE-2019-17224
The web interface of the Compal Broadband CH7465LG modem (version CH7465LG-NCIP-6.12.18.25-2p6-NOSH) is vulnerable to a /%2f/ path traversal attack, which can be exploited in order to test for the existence of a file pathname outside of the web root directory. If a file exists but is not part of the product, there is a 404 error. If a file does not exist, there is a 302 redirect to index.html.
[ "cpe:2.3:o:compal:ch7465lg_firmware:ch7465lg-ncip-6.12.18.25-2p6-nosh:*:*:*:*:*:*:*", "cpe:2.3:h:compal:ch7465lg:-:*:*:*:*:*:*:*" ]
null
5.3
null
5
GHSA-r965-2pwf-qg8w
Multiple SQL injection vulnerabilities in Vik Real Estate (com_vikrealestate) component 1.0 for Joomla! allow remote attackers to execute arbitrary SQL commands via the (1) contract parameter in a results action and (2) imm parameter in a show action to index.php.
[]
null
null
null
null
GHSA-qm6q-x38h-hpp4
The Front End Users plugin for WordPress is vulnerable to SQL Injection via the 'UserSearchField' parameter in all versions up to, and including, 3.2.32 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
[]
null
4.9
null
null
GHSA-wvpx-3jvr-hpw3
Use-after-free vulnerability in Adobe Flash Player before 13.0.0.241 and 14.x before 14.0.0.176 on Windows and OS X and before 11.2.202.400 on Linux, Adobe AIR before 14.0.0.178 on Windows and OS X and before 14.0.0.179 on Android, Adobe AIR SDK before 14.0.0.178, and Adobe AIR SDK & Compiler before 14.0.0.178 allows attackers to execute arbitrary code via unspecified vectors.
[]
null
null
null
null
CVE-2025-24136
This issue was addressed with improved validation of symlinks. This issue is fixed in macOS Ventura 13.7.3, macOS Sequoia 15.3, macOS Sonoma 14.7.3. A malicious app may be able to create symlinks to protected regions of the disk.
[]
null
4.4
null
null
CVE-2024-46209
A stored cross-site scripting (XSS) vulnerability in the component /media/test.html of REDAXO CMS v5.17.1 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the password parameter.
[]
null
5.4
null
null
GHSA-jm3q-4p3v-cv8w
A vulnerability has been identified in SINEC Traffic Analyzer (6GK8822-1BG01-0BA0) (All versions < V2.0). The affected application is missing general HTTP security headers in the web server. This could allow an attacker to make the servers more prone to clickjacking attack.
[]
2.1
4.2
null
null
ICSA-19-148-01
Emerson Ovation OCR400 Controller
A stack-based buffer overflow vulnerability has been identified in the embedded third-party FTP server. The vulnerability involves improper handling of a long file name from the LIST command to the FTP service, which may cause the service to overwrite buffers, leading to remote code execution and escalation of privileges.CVE-2019-10967 has been assigned to this vulnerability. A CVSS v3 base score of 6.3 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:N). A heap-based buffer overflow vulnerability has been identified in the embedded third-party FTP server. The vulnerability involves improper handling of a long command to the FTP service, which may cause memory corruption that halts the controller or leads to remote code execution and escalation of privileges.CVE-2019-10965 has been assigned to this vulnerability. A CVSS v3 base score of 6.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:L).
[]
null
null
6.8
null
RHSA-2022:0529
Red Hat Security Advisory: kernel security update
kernel: use after free in eventpoll.c may lead to escalation of privilege kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL
[ "cpe:/o:redhat:rhel_aus:7.3::server" ]
null
5.5
null
null
GHSA-5w83-w7h6-2jwj
Vulnerability in the Oracle Hospitality Cruise Fleet Management component of Oracle Hospitality Applications (subcomponent: GangwayActivityWebApp). The supported version that is affected is 9.0.2.0. Difficult to exploit vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Hospitality Cruise Fleet Management. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Hospitality Cruise Fleet Management. CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L).
[]
null
null
3.1
null