id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
189k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
patch_commit_url
stringlengths
36
232
GHSA-cxh8-xrqx-hh54
In multiple files, there is a possible way to access traces in the dev mode due to a permissions bypass. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-262243665
[]
null
5.5
null
null
null
CVE-2022-30361
OvalEdge 5.2.8.0 and earlier is affected by a Sensitive Data Exposure vulnerability via a GET request to /user/getUserType. No authentication is required. The information disclosed is associated with the registered user ID, status, email address, role(s), user type, license type, and personal details such as first name, last name, gender, and user preferences.
[ "cpe:2.3:a:ovaledge:ovaledge:*:*:*:*:*:*:*:*" ]
null
4.3
null
null
null
CVE-2024-0561
Ultimate Posts Widget < 2.3.1 - Admin+ Stored XSS
The Ultimate Posts Widget WordPress plugin before 2.3.1 does not validate and escape some of its Widget options before outputting them back in attributes, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
[ "cpe:2.3:a:themecheck:ultimate_posts_widget:-:*:*:*:*:wordpress:*:*" ]
null
5.4
null
null
null
CVE-2003-1123
Sun Java Runtime Environment (JRE) and SDK 1.4.0_01 and earlier allows untrusted applets to access certain information within trusted applets, which allows attackers to bypass the restrictions of the Java security model.
[ "cpe:2.3:a:sun:jdk:1.2.2:*:solaris:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.2.2_10:*:linux:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.2.2_10:*:solaris:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.2.2_10:*:windows:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.2.2_11:*:linux:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.2.2_11:*:solaris:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.2.2_11:*:windows:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.2.2_12:*:windows:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.3:*:solaris:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.3.0_02:*:linux:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.3.0_02:*:solaris:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.3.0_02:*:windows:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.3.0_05:*:linux:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.3.0_05:*:solaris:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.3.0_05:*:windows:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.3.1_01:*:linux:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.3.1_01:*:solaris:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.3.1_01a:*:windows:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.3.1_03:*:linux:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.3.1_03:*:solaris:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.3.1_03:*:windows:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.3.1_04:*:windows:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.4:*:linux:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.4:*:solaris:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.4:*:windows:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.4.0_01:*:windows:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.2.2:*:solaris:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.2.2:*:windows:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.2.2:update10:linux:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.2.2:update10:solaris:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.2.2:update10:windows:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.2.2_003:*:linux:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.2.2_011:*:linux:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.2.2_011:*:solaris:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.2.2_011:*:windows:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.2.2_012:*:solaris:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.3.0:*:linux:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.3.0:*:solaris:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.3.0:*:windows:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.3.0:update2:linux:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.3.0:update2:solaris:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.3.0:update2:windows:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.3.0:update4:windows:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.3.0:update5:linux:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.3.0:update5:solaris:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.3.0:update5:windows:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.3.1:*:linux:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.3.1:update1:linux:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.3.1:update1:solaris:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.3.1:update1:windows:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.3.1:update4:solaris:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.3.1:update4:windows:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.3.1_03:*:linux:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.3.1_03:*:solaris:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.3.1_03:*:windows:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4:*:linux:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4:*:solaris:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4:*:windows:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.0_01:*:solaris:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.0_01:*:windows:*:*:*:*:*" ]
null
null
null
7.5
null
GHSA-256w-3jc2-hh38
Advantech WebAccess HMI Designer, Versions 2.1.9.31 and prior. Processing specially crafted project files lacking proper validation of user supplied data may cause a stack-based buffer overflow, which may allow remote code execution, disclosure/modification of information, or cause the application to crash.
[]
null
null
null
null
null
CVE-2019-11665
Data exposure in Micro Focus Service Manager product versions 9.30, 9.31, 9.32, 9.33, 9.34, 9.35, 9.40, 9.41, 9.50, 9.51, 9.52, 9.60, 9.61, 9.62. The vulnerability could be exploited to allow sensitive data exposure.
[ "cpe:2.3:a:microfocus:service_manager:*:*:*:*:*:*:*:*" ]
null
7.5
null
5
null
CVE-2017-1444
IBM Emptoris Sourcing 9.5 - 10.1.3 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 128110.
[ "cpe:2.3:a:ibm:emptoris_sourcing:9.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:emptoris_sourcing:9.5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:emptoris_sourcing:9.5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:emptoris_sourcing:9.5.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:emptoris_sourcing:9.5.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:emptoris_sourcing:9.5.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:emptoris_sourcing:9.5.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:emptoris_sourcing:10.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:emptoris_sourcing:10.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:emptoris_sourcing:10.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:emptoris_sourcing:10.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:emptoris_sourcing:10.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:emptoris_sourcing:10.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:emptoris_sourcing:10.1.3:*:*:*:*:*:*:*" ]
null
null
5.4
3.5
null
CVE-2019-12122
An issue was discovered in ONAP Portal through Dublin. By executing a call to ONAPPORTAL/portalApi/loggedinUser, an attacker who possesses a user's cookie may retrieve that user's password from the database. All Portal setups are affected.
[ "cpe:2.3:a:onap:open_network_automation_platform:*:*:*:*:*:*:*:*" ]
null
6.5
null
4
null
CVE-2024-7809
SourceCodester Online Graduate Tracer System nbproject exposure of information through directory listing
A vulnerability was found in SourceCodester Online Graduate Tracer System 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /tracking/nbproject/. The manipulation leads to exposure of information through directory listing. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
[ "cpe:2.3:a:online_graduate_tracer_system_project:online_graduate_tracer_system:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:tamparongj_03:online_graduate_tracer_system:1.0:*:*:*:*:*:*:*" ]
6.9
5.3
5.3
5
null
CVE-2020-14681
Vulnerability in the Oracle E-Business Intelligence product of Oracle E-Business Suite (component: DBI Setups). Supported versions that are affected are 12.1.1-12.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle E-Business Intelligence. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle E-Business Intelligence, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle E-Business Intelligence accessible data as well as unauthorized update, insert or delete access to some of Oracle E-Business Intelligence accessible data. CVSS 3.1 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N).
[ "cpe:2.3:a:oracle:e-business_intelligence:*:*:*:*:*:*:*:*" ]
null
8.2
null
null
null
CVE-2021-27270
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 10.1.0.37527. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of JPEG2000 images. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated structure. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-12230.
[ "cpe:2.3:a:foxitsoftware:foxit_reader:*:*:*:*:*:*:*:*", "cpe:2.3:a:foxitsoftware:phantompdf:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
null
7.8
null
null
GHSA-258v-h45j-3rwq
Multiple directory traversal vulnerabilities in index.php in vTiger CRM 4.2 and earlier allow remote attackers to read or include arbitrary files, an ultimately execute arbitrary PHP code, via .. (dot dot) and null byte ("%00") sequences in the (1) module parameter and (2) action parameter in the Leads module, as also demonstrated by injecting PHP code into log messages and accessing the log file.
[]
null
null
null
null
null
CVE-2021-0687
In ellipsize of Layout.java, there is a possible ANR due to improper input validation. This could lead to local denial of service with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-188913943
[ "cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*" ]
null
5
null
1.9
null
CVE-2019-5463
An authorization issue was discovered in the GitLab CE/EE CI badge images endpoint which could result in disclosure of the build status. This vulnerability was addressed in 12.1.2, 12.0.4, and 11.11.6.
[ "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*" ]
null
5.3
null
5
null
CVE-2025-32508
WordPress Course Booking System plugin <= 6.0.7 - Reflected Cross Site Scripting (XSS) Vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ComMotion Course Booking System allows Reflected XSS. This issue affects Course Booking System: from n/a through 6.0.7.
[]
null
7.1
null
null
null
CVE-2019-9082
ThinkPHP before 3.2.4, as used in Open Source BMS v1.1.1 and other products, allows Remote Command Execution via public//?s=index/\think\app/invokefunction&function=call_user_func_array&vars[0]=system&vars[1][]= followed by the command.
[ "cpe:2.3:a:thinkphp:thinkphp:*:*:*:*:*:*:*:*", "cpe:2.3:a:opensourcebms:open_source_background_management_system:1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:zzzcms:zzzphp:1.6.1:*:*:*:*:*:*:*" ]
null
8.8
null
9.3
null
GHSA-wrrp-333j-ff37
Use after free vulnerability in set_nft_pid and signal_handler function of NFC driver prior to SMR Oct-2022 Release 1 allows attackers to perform malicious actions.
[]
null
5.3
null
null
null
CVE-2013-2289
Cross-site scripting (XSS) vulnerability in admin/templates/default.php in Batavi 1.2.2 allows remote attackers to inject arbitrary web script or HTML via the QUERY_STRING to admin/index.php.
[ "cpe:2.3:a:batavi:batavi:1.2.2:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
CVE-2021-4322
Use after free in DevTools in Google Chrome prior to 91.0.4472.77 allowed an attacker who convinced a user to install a malicious extension to execute arbitrary code via a crafted Chrome Extension. (Chromium security severity: Medium)
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" ]
null
8.8
null
null
null
CVE-2022-42744
CandidATS version 3.0.0 allows an external attacker to perform CRUD operations on the application databases. This is possible because the application does not correctly validate the entriesPerPage parameter against SQLi attacks.
[ "cpe:2.3:a:auieo:candidats:3.0.0:-:*:*:*:*:*:*" ]
null
9.8
null
null
null
CVE-2020-35965
decode_frame in libavcodec/exr.c in FFmpeg 4.3.1 has an out-of-bounds write because of errors in calculations of when to perform memset zero operations.
[ "cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*" ]
null
7.5
null
5
null
CVE-2006-5934
SQL injection vulnerability in admin/default.asp in Estate Agent Manager 1.3 and earlier allows remote attackers to execute arbitrary SQL commands via the UserName field.
[ "cpe:2.3:a:iexpress:estate_agent_manager:1.3:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2022-3088
UC-8100A-ME-T System Image: Versions v1.0 to v1.6, UC-2100 System Image: Versions v1.0 to v1.12, UC-2100-W System Image: Versions v1.0 to v 1.12,&nbsp;UC-3100 System Image: Versions v1.0 to v1.6,&nbsp;UC-5100 System Image: Versions v1.0 to v1.4, UC-8100 System Image: Versions v3.0 to v3.5, UC-8100-ME-T System Image: Versions v3.0 and v3.1, UC-8200 System Image: v1.0 to v1.5, AIG-300 System Image: v1.0 to v1.4, UC-8410A with Debian 9 System Image: Versions v4.0.2 and v4.1.2, UC-8580 with Debian 9 System Image: Versions v2.0 and v2.1, UC-8540 with Debian 9 System Image: Versions v2.0 and v2.1, and DA-662C-16-LX (GLB) System Image: Versions v1.0.2 to v1.1.2 of Moxa's ARM-based computers have an execution with unnecessary privileges vulnerability, which could allow an attacker with user-level privileges to gain root privileges.
[ "cpe:2.3:o:moxa:uc-2101-lx_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:uc-2101-lx:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:uc-2102-lx_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:uc-2102-lx:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:uc-2104-lx_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:uc-2104-lx:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:uc-2111-lx_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:uc-2111-lx:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:uc-2112-lx_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:uc-2112-lx:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:uc-2102-t-lx_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:uc-2102-t-lx:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:uc-2114-t-lx_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:uc-2114-t-lx:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:uc-2116-t-lx_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:uc-2116-t-lx:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:uc-3101-t-us-lx_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:uc-3101-t-us-lx:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:uc-3101-t-eu-lx_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:uc-3101-t-eu-lx:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:uc-3111-t-us-lx_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:uc-3111-t-us-lx:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:uc-3111-t-eu-lx_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:uc-3111-t-eu-lx:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:uc-3121-t-us-lx_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:uc-3121-t-us-lx:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:uc-3121-t-eu-lx_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:uc-3121-t-eu-lx:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:uc-3101-t-ap-lx_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:uc-3101-t-ap-lx:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:uc-3111-t-ap-lx_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:uc-3111-t-ap-lx:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:uc-3121-t-ap-lx_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:uc-3121-t-ap-lx:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:uc-3111-t-eu-lx-nw_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:uc-3111-t-eu-lx-nw:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:uc-3111-t-ap-lx-nw_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:uc-3111-t-ap-lx-nw:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:uc-3111-t-us-lx-nw_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:uc-3111-t-us-lx-nw:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:uc-5101-lx_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:uc-5101-lx:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:uc-5101-t-lx_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:uc-5101-t-lx:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:uc-5102-lx_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:uc-5102-lx:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:uc-5102-t-lx_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:uc-5102-t-lx:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:uc-5111-lx_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:uc-5111-lx:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:uc-5111-t-lx_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:uc-5111-t-lx:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:uc-5112-lx_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:uc-5112-lx:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:uc-5112-t-lx_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:uc-5112-t-lx:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:uc-8131-lx_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:uc-8131-lx:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:uc-8132-lx_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:uc-8132-lx:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:uc-8162-lx_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:uc-8162-lx:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:uc-8112-lx_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:uc-8112-lx:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:uc-8112-me-t-lx1_firmware:3.0:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:uc-8112-me-t-lx1_firmware:3.1:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:uc-8112-me-t-lx1:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:uc-8112-me-t-lx_firmware:3.0:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:uc-8112-me-t-lx_firmware:3.1:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:uc-8112-me-t-lx:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:uc-8112a-me-t-lx_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:uc-8112a-me-t-lx:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:uc-8220-t-lx-s_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:uc-8220-t-lx-s:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:uc-8220-t-lx_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:uc-8220-t-lx:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:uc-8220-t-lx-us-s_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:uc-8220-t-lx-us-s:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:uc-8220-t-lx-eu-s_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:uc-8220-t-lx-eu-s:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:uc-8220-t-lx-ap-s_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:uc-8220-t-lx-ap-s:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:aig-301-t-us-azu-lx_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:aig-301-t-us-azu-lx:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:aig-301-t-eu-azu-lx_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:aig-301-t-eu-azu-lx:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:aig-301-t-ap-azu-lx_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:aig-301-t-ap-azu-lx:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:aig-301-t-cn-azu-lx_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:aig-301-t-cn-azu-lx:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:aig-301-t-azu-lx_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:aig-301-t-azu-lx:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:aig-301-azu-lx_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:aig-301-azu-lx:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:aig-301-us-azu-lx_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:aig-301-us-azu-lx:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:aig-301-eu-azu-lx_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:aig-301-eu-azu-lx:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:aig-301-ap-azu-lx_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:aig-301-ap-azu-lx:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:aig-301-cn-azu-lx_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:aig-301-cn-azu-lx:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:uc-8410a-lx_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:uc-8410a-lx:-:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:uc-8410a-t-lx_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:uc-8410a-t-lx:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:uc-8410a-nw-lx_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:uc-8410a-nw-lx:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:uc-8410a-nw-t-lx_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:uc-8410a-nw-t-lx:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:uc-8580-lx_firmware:2.0:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:uc-8580-lx_firmware:2.1:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:uc-8580-lx:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:uc-8580-t-lx_firmware:2.0:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:uc-8580-t-lx_firmware:2.1:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:uc-8580-t-lx:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:uc-8580-t-ct-lx_firmware:2.0:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:uc-8580-t-ct-lx_firmware:2.1:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:uc-8580-t-ct-lx:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:uc-8580-q-lx_firmware:2.0:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:uc-8580-q-lx_firmware:2.1:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:uc-8580-q-lx:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:uc-8580-t-q-lx_firmware:2.0:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:uc-8580-t-q-lx_firmware:2.1:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:uc-8580-t-q-lx:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:uc-8580-t-ct-q-lx_firmware:2.0:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:uc-8580-t-ct-q-lx_firmware:2.1:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:uc-8580-t-ct-q-lx:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:uc-8540-lx_firmware:2.0:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:uc-8540-lx_firmware:2.1:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:uc-8540-lx:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:uc-8540-t-lx_firmware:2.0:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:uc-8540-t-lx_firmware:2.1:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:uc-8540-t-lx:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:uc-8540-t-ct-lx_firmware:2.0:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:uc-8540-t-ct-lx_firmware:2.1:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:uc-8540-t-ct-lx:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:da-662c-16-lx_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:da-662c-16-lx:-:*:*:*:*:*:*:*" ]
null
7.8
null
null
null
CVE-2001-0285
Buffer overflow in A1 HTTP server 1.0a allows remote attackers to cause a denial of service and possibly execute arbitrary commands via a long HTTP request.
[ "cpe:2.3:a:a1webserver:http_server:1.0:*:*:*:*:*:*:*" ]
null
null
null
10
null
CVE-2018-21017
GPAC 0.7.1 has a memory leak in dinf_Read in isomedia/box_code_base.c.
[ "cpe:2.3:a:gpac:gpac:0.7.1:*:*:*:*:*:*:*" ]
null
6.5
null
4.3
null
CVE-2011-2503
The insert_module function in runtime/staprun/staprun_funcs.c in the systemtap runtime tool (staprun) in SystemTap before 1.6 does not properly validate a module when loading it, which allows local users to gain privileges via a race condition between the signature validation and the module initialization.
[ "cpe:2.3:a:systemtap:systemtap:*:*:*:*:*:*:*:*", "cpe:2.3:a:systemtap:systemtap:0.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:systemtap:systemtap:0.3:*:*:*:*:*:*:*", "cpe:2.3:a:systemtap:systemtap:0.4:*:*:*:*:*:*:*", "cpe:2.3:a:systemtap:systemtap:0.5:*:*:*:*:*:*:*", "cpe:2.3:a:systemtap:systemtap:0.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:systemtap:systemtap:0.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:systemtap:systemtap:0.5.5:*:*:*:*:*:*:*", "cpe:2.3:a:systemtap:systemtap:0.5.7:*:*:*:*:*:*:*", "cpe:2.3:a:systemtap:systemtap:0.5.8:*:*:*:*:*:*:*", "cpe:2.3:a:systemtap:systemtap:0.5.9:*:*:*:*:*:*:*", "cpe:2.3:a:systemtap:systemtap:0.5.10:*:*:*:*:*:*:*", "cpe:2.3:a:systemtap:systemtap:0.5.12:*:*:*:*:*:*:*", "cpe:2.3:a:systemtap:systemtap:0.5.13:*:*:*:*:*:*:*", "cpe:2.3:a:systemtap:systemtap:0.5.14:*:*:*:*:*:*:*", "cpe:2.3:a:systemtap:systemtap:0.6:*:*:*:*:*:*:*", "cpe:2.3:a:systemtap:systemtap:0.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:systemtap:systemtap:0.7:*:*:*:*:*:*:*", "cpe:2.3:a:systemtap:systemtap:0.7.2:*:*:*:*:*:*:*", "cpe:2.3:a:systemtap:systemtap:0.8:*:*:*:*:*:*:*", "cpe:2.3:a:systemtap:systemtap:0.9:*:*:*:*:*:*:*", "cpe:2.3:a:systemtap:systemtap:0.9.5:*:*:*:*:*:*:*", "cpe:2.3:a:systemtap:systemtap:0.9.7:*:*:*:*:*:*:*", "cpe:2.3:a:systemtap:systemtap:0.9.8:*:*:*:*:*:*:*", "cpe:2.3:a:systemtap:systemtap:0.9.9:*:*:*:*:*:*:*", "cpe:2.3:a:systemtap:systemtap:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:systemtap:systemtap:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:systemtap:systemtap:1.2:*:*:*:*:*:*:*", "cpe:2.3:a:systemtap:systemtap:1.3:*:*:*:*:*:*:*", "cpe:2.3:a:systemtap:systemtap:1.4:*:*:*:*:*:*:*" ]
null
null
null
3.7
null
CVE-2006-2630
Stack-based buffer overflow in Symantec Antivirus 10.1 and Client Security 3.1 allows remote attackers to execute arbitrary code via unknown attack vectors.
[ "cpe:2.3:a:symantec:client_security:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:symantec:client_security:3.0.2.2010:*:*:*:*:*:*:*", "cpe:2.3:a:symantec:client_security:3.0.2.2020:*:*:*:*:*:*:*", "cpe:2.3:a:symantec:client_security:3.1:*:*:*:*:*:*:*", "cpe:2.3:a:symantec:client_security:3.1.394:*:*:*:*:*:*:*", "cpe:2.3:a:symantec:client_security:3.1.400:*:*:*:*:*:*:*", "cpe:2.3:a:symantec:norton_antivirus:10.0:*:corporate:*:*:*:*:*", "cpe:2.3:a:symantec:norton_antivirus:10.0.2.2010:*:corporate:*:*:*:*:*", "cpe:2.3:a:symantec:norton_antivirus:10.0.2.2020:*:corporate:*:*:*:*:*", "cpe:2.3:a:symantec:norton_antivirus:10.0.2.2021:*:corporate:*:*:*:*:*", "cpe:2.3:a:symantec:norton_antivirus:10.1:*:corporate:*:*:*:*:*", "cpe:2.3:a:symantec:norton_antivirus:10.1.400:*:corporate:*:*:*:*:*" ]
null
null
null
10
null
CVE-2022-47505
SolarWinds Platform Local Privilege Escalation Vulnerability
The SolarWinds Platform was susceptible to the Local Privilege Escalation Vulnerability. This vulnerability allows a local adversary with a valid system user account to escalate local privileges.
[ "cpe:2.3:a:solarwinds:orion_platform:*:*:*:*:*:*:*:*" ]
null
7.8
null
null
null
GHSA-f4wr-5m6q-mpvf
LanItems.ycp in save_y2logs in yast2-network before 2.24.4 in SUSE YaST writes cleartext Wi-Fi credentials to the y2log log file, which allows context-dependent attackers to obtain sensitive information by reading the (1) WIRELESS_WPA_PASSWORD or (2) WIRELESS_CLIENT_KEY_PASSWORD field.
[]
null
null
null
null
null
CVE-2007-4118
PHP remote file inclusion vulnerability in includes/functions.inc.php in phpVoter 0.6 allows remote attackers to execute arbitrary PHP code via a URL in the sitepath parameter.
[ "cpe:2.3:a:jx_development:phpvoter:0.6:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
RHSA-2018:0015
Red Hat Security Advisory: linux-firmware security update
An update for linux-firmware is now available for Red Hat Enterprise Linux 7.3 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
[ "cpe:/o:redhat:rhel_eus:7.3::computenode", "cpe:/o:redhat:rhel_eus:7.3::server" ]
null
null
null
null
null
CVE-2019-13177
verification.py in django-rest-registration (aka Django REST Registration library) before 0.5.0 relies on a static string for signatures (i.e., the Django Signing API is misused), which allows remote attackers to spoof the verification process. This occurs because incorrect code refactoring led to calling a security-critical function with an incorrect argument.
[ "cpe:2.3:a:django-rest-registration_project:django-rest-registration:*:*:*:*:*:django:*:*" ]
null
null
9.8
7.5
null
RHSA-2013:0248
Red Hat Security Advisory: JBoss Enterprise Application Platform 4.3.0 CP10 security update
JBoss: allows empty password to authenticate against LDAP
[ "cpe:/a:redhat:jboss_enterprise_application_platform:4.3.0:update10" ]
null
null
null
null
null
GHSA-rmr2-x2hh-x22h
In hasInputInfo of Layer.cpp, there is a possible bypass of user interaction requirements due to a tapjacking/overlay attack. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-194480991
[]
null
7.8
null
null
null
RHSA-2025:0850
Red Hat Security Advisory: python-jinja2 security update
jinja2: Jinja has a sandbox breakout through indirect reference to format method
[ "cpe:/a:redhat:rhel_eus:9.4::appstream" ]
null
6.3
null
null
null
CVE-2007-1639
Unrestricted file upload vulnerability in PHProjekt 5.2.0, when magic_quotes_gpc is disabled, allows remote authenticated users to upload and execute arbitrary PHP code via a file with an executable extension, which is then accessed by the (1) calendar or (2) file management module, or possibly unspecified other files.
[ "cpe:2.3:a:phpprojekt:phpprojekt:5.2.0:*:*:*:*:*:*:*" ]
null
null
null
4.6
null
CVE-2014-1234
The paratrooper-newrelic gem 1.0.1 for Ruby allows local users to obtain the X-Api-Key value by listing the curl process.
[ "cpe:2.3:a:paratrooper-newrelic_project:paratrooper-newrelic:1.0.1:-:-:*:-:ruby:*:*" ]
null
null
null
2.1
null
CVE-2022-37934
A potential security vulnerability has been identified in HPE OfficeConnect 1820, and 1850 switch series. The vulnerability could be remotely exploited to allow remote directory traversal in HPE OfficeConnect 1820 switch series version PT.02.17 and below, HPE OfficeConnect 1850 switch series version PC.01.23 and below, and HPE OfficeConnect 1850 (10G aggregator) switch version PO.01.22 and below.
[ "cpe:2.3:o:hp:officeconnect_1820_24g_poe\\+_\\(185w\\)_switch_j9983a_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:officeconnect_1820_24g_poe\\+_\\(185w\\)_switch_j9983a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:officeconnect_1820_48g_poe\\+_\\(370w\\)_switch_j9984a_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:officeconnect_1820_48g_poe\\+_\\(370w\\)_switch_j9984a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:officeconnect_1820_8g_poe\\+_\\(65w\\)_switch_j9982a_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:officeconnect_1820_8g_poe\\+_\\(65w\\)_switch_j9982a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:officeconnect_1820_8g_switch_j9979a_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:officeconnect_1820_8g_switch_j9979a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hpe:officeconnect_1850_24g_2xgt_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hpe:officeconnect_1850_24g_2xgt:-:*:*:*:*:*:*:*", "cpe:2.3:o:hpe:officeconnect_1850_24g_2xgt_poe\\+_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hpe:officeconnect_1850_24g_2xgt_poe\\+:-:*:*:*:*:*:*:*", "cpe:2.3:o:hpe:officeconnect_1850_2xgt\\/spf\\+_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hpe:officeconnect_1850_2xgt\\/spf\\+:-:*:*:*:*:*:*:*", "cpe:2.3:o:hpe:officeconnect_1850_48g_4xgt_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hpe:officeconnect_1850_48g_4xgt:-:*:*:*:*:*:*:*", "cpe:2.3:o:hpe:officeconnect_1850_48g_4xgt_poe\\+_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hpe:officeconnect_1850_48g_4xgt_poe\\+:-:*:*:*:*:*:*:*", "cpe:2.3:o:hpe:officeconnect_1850_6xgt_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hpe:officeconnect_1850_6xgt:-:*:*:*:*:*:*:*" ]
null
6.8
null
null
null
RHSA-2013:0194
Red Hat Security Advisory: JBoss Enterprise Application Platform 5.2.0 update
JBoss: twiddle.sh accepts credentials as command line arguments, exposing them to other local users via a process listing jbossws: Prone to character encoding pattern attack (XML Encryption flaw) jbossws: Prone to Bleichenbacher attack against to be distributed symmetric key Framework: Information (internal server information, classpath, local working directories, session IDs) disclosure CSRF on jmx-console allows invocation of operations on mbeans Console: XSS in invoke operation JBoss invoker servlets do not require authentication JGroups diagnostics service enabled by default with no authentication when a JGroups channel is started apache-cxf: Apache CXF does not verify that elements were signed / encrypted by a particular Supporting Token JBoss: CallerIdentityLoginModule retaining password from previous call if a null password is provided JBoss: SecurityAssociation.getCredential() will return the previous credential if no security context is provided Web: Bypass of security constraints JBoss: AuthorizationInterceptor allows JMX operation to proceed despite authorization failure
[ "cpe:/a:redhat:jboss_enterprise_application_platform:5.2" ]
null
null
null
null
null
CVE-2007-2887
Cross-site scripting (XSS) vulnerability in index.php in Web Icerik Yonetim Sistemi (WIYS) 1.0 allows remote attackers to inject arbitrary web script or HTML via the No parameter in the Sayfa page.
[ "cpe:2.3:a:forsnet:web_icerik_yonetim_sistemi:1.0:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
CVE-2023-34991
A improper neutralization of special elements used in an sql command ('sql injection') in Fortinet FortiWLM version 8.6.0 through 8.6.5 and 8.5.0 through 8.5.4 and 8.4.0 through 8.4.2 and 8.3.0 through 8.3.2 and 8.2.2 allows attacker to execute unauthorized code or commands via a crafted http request.
[ "cpe:2.3:a:fortinet:fortiwlm:*:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiwlm:8.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiwlm:8.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiwlm:8.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiwlm:8.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiwlm:8.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiwlm:8.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiwlm:8.4.2:*:*:*:*:*:*:*" ]
null
9.3
null
null
null
cisco-sa-20190501-asa-vpn-dos
Cisco Adaptive Security Appliance Software VPN Denial of Service Vulnerability
A vulnerability in the remote access VPN session manager of Cisco Adaptive Security Appliance (ASA) Software could allow a unauthenticated, remote attacker to cause a denial of service (DoS) condition on the remote access VPN services. The vulnerability is due to an issue with the remote access VPN session manager. An attacker could exploit this vulnerability by requesting an excessive number of remote access VPN sessions. An exploit could allow the attacker to cause a DoS condition. Cisco has released software updates that address this vulnerability. There are workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-asa-vpn-dos ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-asa-vpn-dos"]
[]
null
null
5.3
null
null
CVE-2019-10300
A cross-site request forgery vulnerability in Jenkins GitLab Plugin 1.5.11 and earlier in the GitLabConnectionConfig#doTestConnection form validation method allowed attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
[ "cpe:2.3:a:jenkins:gitlab:*:*:*:*:*:jenkins:*:*" ]
null
null
8
3.5
null
GHSA-cvg6-43vm-jvwh
A elevation of privilege vulnerability in the Android media framework (libstagefright). Product: Android. Versions: 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2. Android ID: A-37504237.
[]
null
null
7.8
null
null
GHSA-2gxq-fc5q-r9gc
SQL injection vulnerability in admin.php in PastelCMS 0.8.0, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary SQL commands via the user (Username) parameter.
[]
null
null
null
null
null
RHSA-2011:0506
Red Hat Security Advisory: rdesktop security update
rdesktop remote file access
[ "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
null
GHSA-qwww-r8v3-26cg
IBM WebSphere Application Server 8.5 and 9.0 is vulnerable to an XML external entity injection (XXE) attack when processing XML data. A privileged user could exploit this vulnerability to expose sensitive information or consume memory resources.
[]
null
5.5
null
null
null
CVE-2015-5354
Open redirect vulnerability in Novius OS 5.0.1 (Elche) allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the redirect parameter to admin/nos/login.
[ "cpe:2.3:a:novius-os:novius_os:5.0.1:*:*:*:*:*:*:*" ]
null
null
null
5.8
null
GHSA-m5vp-q3wf-8f6c
In MP3 encoder, there is a possible out of bounds read due to a missing bounds check. This could lead to local denial of service with System execution privileges needed.
[]
null
4.4
null
null
null
GHSA-6mh8-4qwq-prc5
The fragment preview functionality in Liferay Portal 7.4.3.61 through 7.4.3.132, and Liferay DXP 2024.Q4.1 through 2024.Q4.5, 2024.Q3.1 through 2024.Q3.13, 2024.Q2.0 through 2024.Q2.13, 2024.Q1.1 through 2024.Q1.13 and 7.4 update 61 through update 92 was found to be vulnerable to postMessage-based XSS because it allows a remote non-authenticated attacker to inject JavaScript into the fragment portlet URL.
[]
2
null
null
null
null
RHSA-2014:0312
Red Hat Security Advisory: php security update
array index error in dtoa implementation of many products
[ "cpe:/o:redhat:rhel_eus:5.9", "cpe:/o:redhat:rhel_mission_critical:5.3", "cpe:/o:redhat:rhel_mission_critical:5.6" ]
null
null
null
null
null
RHSA-2019:1947
Red Hat Security Advisory: vim security update
vim/neovim: ': source!' command allows arbitrary command execution via modelines
[ "cpe:/o:redhat:rhel_eus:7.4::computenode", "cpe:/o:redhat:rhel_eus:7.4::server" ]
null
5.3
null
null
null
CVE-2025-3589
SourceCodester Music Class Enrollment System manage_class.php sql injection
A vulnerability, which was classified as critical, was found in SourceCodester Music Class Enrollment System 1.0. Affected is an unknown function of the file /manage_class.php. The manipulation of the argument ID leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
[]
5.3
6.3
6.3
6.5
null
GHSA-8v8f-xp2h-22pm
A vulnerability has been identified in SIMATIC MV540 H (All versions < V3.3.4), SIMATIC MV540 S (All versions < V3.3.4), SIMATIC MV550 H (All versions < V3.3.4), SIMATIC MV550 S (All versions < V3.3.4), SIMATIC MV560 U (All versions < V3.3.4), SIMATIC MV560 X (All versions < V3.3.4). Affected devices cannot properly process specially crafted IP packets sent to the devices. This could allow an unauthenticated remote attacker to cause a denial of service condition. The affected devices must be restarted manually.
[]
null
7.5
null
null
null
CVE-2025-45487
Linksys E5600 v1.1.0.26 was discovered to contain a command injection vulnerability in the runtime.InternetConnection function.
[]
null
6.5
null
null
null
CVE-2019-25141
The Easy WP SMTP plugin for WordPress is vulnerable to authorization bypass in versions up to, and including, 1.3.9. This is due to missing capability checks on the admin_init() function, in addition to insufficient input validation. This makes it possible for unauthenticated attackers to modify the plugins settings and arbitrary options on the site that can be used to inject new administrative user accounts.
[ "cpe:2.3:a:wp-ecommerce:easy_wp_smtp:*:*:*:*:*:wordpress:*:*" ]
null
9.8
null
null
null
CVE-2024-23660
The Binance Trust Wallet app for iOS in commit 3cd6e8f647fbba8b5d8844fcd144365a086b629f, git tag 0.0.4 misuses the trezor-crypto library and consequently generates mnemonic words for which the device time is the only entropy source, leading to economic losses, as exploited in the wild in July 2023. An attacker can systematically generate mnemonics for each timestamp within an applicable timeframe, and link them to specific wallet addresses in order to steal funds from those wallets.
[ "cpe:2.3:a:binance:trust_wallet:0.0.4:*:*:*:*:iphone_os:*:*" ]
null
7.5
null
null
null
CVE-2007-6304
The federated engine in MySQL 5.0.x before 5.0.51a, 5.1.x before 5.1.23, and 6.0.x before 6.0.4, when performing a certain SHOW TABLE STATUS query, allows remote MySQL servers to cause a denial of service (federated handler crash and daemon crash) via a response that lacks the minimum required number of columns.
[ "cpe:2.3:a:mysql:mysql:5.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.0.5.0.21:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.0.20:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.0.22.1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.0.24:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.0:alpha:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.3:beta:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.13:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.14:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.18:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.19:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.21:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.22:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.27:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.33:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.37:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.0.41:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:6.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:6.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:6.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:6.0.3:*:*:*:*:*:*:*" ]
null
null
null
5
null
CVE-2023-28429
Pimcore has Cross-site Scripting vulnerability in DataObject tooltip field
Pimcore is an open source data and experience management platform. Versions prior to 10.5.19 have an unsecured tooltip field in DataObject class definition. This vulnerability has the potential to steal a user's cookie and gain unauthorized access to that user's account through the stolen cookie or redirect users to other malicious sites. Users should upgrade to version 10.5.19 or, as a workaround, apply the patch manually.
[ "cpe:2.3:a:pimcore:pimcore:*:*:*:*:*:*:*:*" ]
null
6.1
null
null
null
GHSA-w89v-55cw-2pm8
cPanel before 64.0.21 allows demo accounts to execute code via Encoding API calls (SEC-242).
[]
null
null
6.3
null
null
CVE-2008-1700
The Web TransferCtrl Class 8,2,1,4 (iManFile.cab), as used in WorkSite Web 8.2 before SP1 P2, allows remote attackers to cause a denial of service (memory consumption) via a large number of SendNrlLink directives, which opens a separate window for each directive.
[ "cpe:2.3:a:interwoven:worksite_web:*:*:*:*:*:*:*:*" ]
null
null
null
7.1
null
RHSA-2019:1700
Red Hat Security Advisory: python27-python security update
python: Undocumented local_file protocol allows remote attackers to bypass protection mechanisms python: regression of CVE-2019-9636 due to functional fix to allow port numbers in netloc
[ "cpe:/a:redhat:rhel_software_collections:3::el6", "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
null
9.8
null
null
CVE-2019-8811
Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 13.2 and iPadOS 13.2, tvOS 13.2, watchOS 6.1, Safari 13.0.3, iTunes for Windows 12.10.2, iCloud for Windows 11.0, iCloud for Windows 7.15. Processing maliciously crafted web content may lead to arbitrary code execution.
[ "cpe:2.3:a:apple:icloud:*:*:*:*:*:windows:*:*", "cpe:2.3:a:apple:itunes:*:*:*:*:*:windows:*:*", "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*" ]
null
8.8
null
6.8
null
GHSA-wm6m-893q-83gj
Rejected reason: CVE ID was once reserved, but never used.
[]
null
null
null
null
null
CVE-2013-1969
Multiple use-after-free vulnerabilities in libxml2 2.9.0 and possibly other versions might allow context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to the (1) htmlParseChunk and (2) xmldecl_done functions, as demonstrated by a buffer overflow in the xmlBufGetInputBase function.
[ "cpe:2.3:a:xmlsoft:libxml2:2.9.0:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2021-28160
Wireless-N WiFi Repeater REV 1.0 (28.08.06.1) suffers from a reflected XSS vulnerability due to unsanitized SSID value when the latter is displayed in the /repeater.html page ("Repeater Wizard" homepage section).
[ "cpe:2.3:o:acexy_wireless-n_wifi_repeater_project:acexy_wireless-n_wifi_repeater_firmware:28.08.06.1:*:*:*:*:*:*:*", "cpe:2.3:h:acexy_wireless-n_wifi_repeater_project:acexy_wireless-n_wifi_repeater:1.0:*:*:*:*:*:*:*" ]
null
6.1
null
4.3
null
CVE-2022-47134
WordPress Gallery Metabox Plugin <= 1.5 is vulnerable to Cross Site Request Forgery (CSRF)
Cross-Site Request Forgery (CSRF) vulnerability in Bill Erickson Gallery Metabox plugin <= 1.5 versions.
[ "cpe:2.3:a:gallery_metabox_project:gallery_metabox:*:*:*:*:*:wordpress:*:*" ]
null
4.3
null
null
null
GHSA-hq92-6qrm-cxxj
The Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 1.6.8.5. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes.
[]
null
7.3
null
null
null
CVE-2023-2382
Netgear SRX5308 Web Management Interface cross site scripting
A vulnerability was found in Netgear SRX5308 up to 4.3.5-3 and classified as problematic. Affected by this issue is some unknown functionality of the file scgi-bin/platform.cgi?page=firewall_logs_email.htm of the component Web Management Interface. The manipulation of the argument sysLogInfo.serverName leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-227660. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
[ "cpe:2.3:o:netgear:srx5308_firmware:4.3.5-3:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:srx5308:-:*:*:*:*:*:*:*" ]
null
2.4
2.4
3.3
null
GHSA-qfrh-wxjj-4q4p
Insufficient data validation in URL formatting in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.
[]
null
null
null
null
null
RHSA-2013:1426
Red Hat Security Advisory: xorg-x11-server security update
xorg-x11-server: use-after-free flaw when handling ImageText requests
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
null
GHSA-hxpf-2249-phjx
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Encryption). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
[]
null
6.5
null
null
null
CVE-2020-29047
The wp-hotel-booking plugin through 1.10.2 for WordPress allows remote attackers to execute arbitrary code because of an unserialize operation on the thimpress_hotel_booking_1 cookie in load in includes/class-wphb-sessions.php.
[ "cpe:2.3:a:thimpress:wp_hotel_booking:*:*:*:*:*:wordpress:*:*" ]
null
9.8
null
7.5
null
GHSA-359x-gm7c-7j8r
An issue was discovered in WeCube platform 3.2.2. A DOM XSS vulnerability has been found on the plugin database execution page.
[]
null
6.1
null
null
null
GHSA-w859-82rj-c26w
Cross-Site Request Forgery (CSRF) vulnerability in saleandro Songkick Concerts and Festivals allows Cross Site Request Forgery. This issue affects Songkick Concerts and Festivals: from n/a through 0.9.7.
[]
null
4.3
null
null
null
GHSA-m77f-rqj8-qpp9
The implementation of an ANSI X9.31 RNG in Fortinet FortiGate allows attackers to gain unauthorized read access to data handled by the device via IPSec/TLS decryption.
[]
null
null
5.9
null
null
CVE-2020-26167
In FUEL CMS 11.4.12 and before, the page preview feature allows an anonymous user to take complete ownership of any account including an administrator one.
[ "cpe:2.3:a:thedaylightstudio:fuel_cms:*:*:*:*:*:*:*:*" ]
null
9.8
null
10
null
CVE-2014-6351
Microsoft Internet Explorer 8 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."
[ "cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*" ]
null
null
null
9.3
null
CVE-2019-10045
The "action" get_sess_id in the web application of Pydio through 8.2.2 discloses the session cookie value in the response body, enabling scripts to get access to its value. This identifier can be reused by an attacker to impersonate a user and perform actions on behalf of him/her (if the session is still active).
[ "cpe:2.3:a:pydio:pydio:*:*:*:*:*:*:*:*" ]
null
null
6.5
6.4
null
CVE-2020-7588
A vulnerability has been identified in Opcenter Execution Discrete (All versions < V3.2), Opcenter Execution Foundation (All versions < V3.2), Opcenter Execution Process (All versions < V3.2), Opcenter Intelligence (All versions < V3.3), Opcenter Quality (All versions < V11.3), Opcenter RD&L (V8.0), SIMATIC IT LMS (All versions < V2.6), SIMATIC IT Production Suite (All versions < V8.0), SIMATIC Notifier Server for Windows (All versions), SIMATIC PCS neo (All versions < V3.0 SP1), SIMATIC STEP 7 (TIA Portal) V15 (All versions < V15.1 Update 5), SIMATIC STEP 7 (TIA Portal) V16 (All versions < V16 Update 2), SIMOCODE ES V15.1 (All versions < V15.1 Update 4), SIMOCODE ES V16 (All versions < V16 Update 1), Soft Starter ES V15.1 (All versions < V15.1 Update 3), Soft Starter ES V16 (All versions < V16 Update 1). Sending a specially crafted packet to the affected service could cause a partial remote denial-of-service, that would cause the service to restart itself.
[ "cpe:2.3:a:siemens:opcenter_execution_discrete:*:*:*:*:*:*:*:*", "cpe:2.3:a:siemens:opcenter_execution_foundation:*:*:*:*:*:*:*:*", "cpe:2.3:a:siemens:opcenter_execution_process:*:*:*:*:*:*:*:*", "cpe:2.3:a:siemens:opcenter_intelligence:*:*:*:*:*:*:*:*", "cpe:2.3:a:siemens:opcenter_quality:*:*:*:*:*:*:*:*", "cpe:2.3:a:siemens:opcenter_rd\\&l:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:siemens:simatic_it_lms:*:*:*:*:*:*:*:*", "cpe:2.3:a:siemens:simatic_it_production_suite:*:*:*:*:*:*:*:*", "cpe:2.3:a:siemens:simatic_notifier_server:*:*:*:*:*:windows:*:*", "cpe:2.3:a:siemens:simatic_pcs_neo:*:*:*:*:*:*:*:*", "cpe:2.3:a:siemens:simatic_step_7:*:*:*:*:*:*:*:*", "cpe:2.3:a:siemens:simatic_step_7:16:-:*:*:*:*:*:*", "cpe:2.3:a:siemens:simatic_step_7:16:update_1:*:*:*:*:*:*", "cpe:2.3:a:siemens:simocode_es:*:*:*:*:*:*:*:*", "cpe:2.3:a:siemens:soft_starter_es:*:*:*:*:*:*:*:*" ]
null
5.3
null
5
null
GHSA-jh4r-88h5-574v
The unity-firefox-extension package could be tricked into destroying the Unity webapps context, causing Firefox to crash. This could be achieved by spinning the event loop inside the webapps initialization callback. Fixed in 3.0.0+14.04.20140416-0ubuntu1.14.04.1 by shipping an empty package, thus disabling the extension entirely.
[]
null
6.5
null
null
null
GHSA-2859-f9hx-gvcp
SQL injection vulnerability in matchdetail.php in Powie's PHP MatchMaker 4.05 and earlier allows remote attackers to execute arbitrary SQL commands via the edit parameter.
[]
null
null
null
null
null
CVE-2009-0401
SQL injection vulnerability in browsecats.php in E-Php CMS allows remote attackers to execute arbitrary SQL commands via the cid parameter.
[ "cpe:2.3:a:ephpscripts:e-php_cms:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
RHSA-2010:0963
Red Hat Security Advisory: JBoss Enterprise Application Platform 5.1.0 security update
JBoss Remoting Denial-Of-Service
[ "cpe:/a:redhat:jboss_enterprise_application_platform:5.1" ]
null
null
null
null
null
CVE-2020-11765
An issue was discovered in OpenEXR before 2.4.1. There is an off-by-one error in use of the ImfXdr.h read function by DwaCompressor::Classifier::Classifier, leading to an out-of-bounds read.
[ "cpe:2.3:a:openexr:openexr:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*", "cpe:2.3:a:apple:icloud:*:*:*:*:*:windows:*:*", "cpe:2.3:a:apple:itunes:*:*:*:*:*:windows:*:*", "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.13.6:-:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2018-002:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2018-003:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2019-001:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2019-002:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2019-003:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2019-004:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2019-005:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2019-006:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2019-007:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2020-001:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2020-002:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2020-003:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.13.6:supplemental_update:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:-:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-001:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-002:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-004:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-005:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-006:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-007:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-001:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-002:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-003:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:supplemental_update:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:supplemental_update_2:*:*:*:*:*:*", "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*" ]
null
5.5
null
4.3
null
RHSA-2020:0861
Red Hat Security Advisory: Red Hat JBoss Web Server 3.1 Service Pack 8 security update
tomcat: XSS in SSI printenv tomcat: local privilege escalation tomcat: Session fixation when using FORM authentication tomcat: Apache Tomcat AJP File Read/Inclusion Vulnerability
[ "cpe:/a:redhat:jboss_enterprise_web_server:3.1::el6", "cpe:/a:redhat:jboss_enterprise_web_server:3.1::el7" ]
null
7.6
5
null
null
GHSA-6hv6-fgh2-5mjv
Adobe Experience Manager versions 6.5.23 and earlier are affected by an Improper Restriction of XML External Entity Reference ('XXE') vulnerability that could lead to arbitrary file system read. An attacker could exploit this vulnerability to access sensitive files on the local file system. Exploitation of this issue does not require user interaction.
[]
null
8.6
null
null
null
CVE-2007-2639
Directory traversal vulnerability in TFTPdWin 0.4.2 allows remote attackers to read or modify arbitrary files outside the TFTP root via unspecified vectors.
[ "cpe:2.3:a:prosysinfo:tftp_server_tftpdwin:0.4.2:*:*:*:*:*:*:*" ]
null
null
null
10
null
GHSA-25gc-rgw2-hc8g
Microsoft SharePoint Server Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-38053, CVE-2022-41037, CVE-2022-41038.
[]
null
8.8
null
null
null
GHSA-wwxv-fc92-xrw3
An issue was discovered in the Linux kernel through 5.18.14. xfrm_expand_policies in net/xfrm/xfrm_policy.c can cause a refcount to be dropped twice.
[]
null
5.5
null
null
null
GHSA-q8g5-wf56-w776
Unrestricted file upload vulnerability in Berta CMS allows remote attackers to execute arbitrary code by uploading a crafted image file with an executable extension, then accessing it via a direct request to the file in an unspecified directory.
[]
null
null
9.8
null
null
CVE-2025-42605
Improper Access Control Vulnerability in Meon Bidding Solutions
This vulnerability exists in Meon Bidding Solutions due to improper authorization controls on certain API endpoints for the initiation, modification, or cancellation operations. An authenticated remote attacker could exploit this vulnerability by manipulating parameter in the API request body to gain unauthorized access to other user accounts. Successful exploitation of this vulnerability could allow remote attacker to perform authorized manipulation of data associated with other user accounts.
[]
9.3
null
null
null
null
GHSA-cgrr-3rc7-3h4r
The address parser code in Postfix 1.1.12 and earlier allows remote attackers to cause a denial of service (lock) via (1) a malformed envelope address to a local host that would generate a bounce and contains the ".!" string in the MAIL FROM or Errors-To headers, which causes nqmgr to lock up, or (2) via a valid MAIL FROM with a RCPT TO containing a ".!" string, which causes an instance of the SMTP listener to lock up.
[]
null
null
null
null
null
CVE-2018-12796
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have a Use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
[ "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
null
8.8
9.3
null
CVE-2020-18734
A stack buffer overflow in /ddsi/q_bitset.h of Eclipse IOT Cyclone DDS Project v0.1.0 causes the DDS subscriber server to crash.
[ "cpe:2.3:a:eclipse:cyclone_data_distribution_service:0.1.0:*:*:*:*:*:*:*" ]
null
7.5
null
5
null
GHSA-7r2w-r4fg-r27h
An unrestricted file upload vulnerability in a Trend Micro Apex Central widget below version 8.0.6955 could allow an attacker to upload arbitrary files on affected installations.
[]
null
4.3
null
null
null
CVE-2023-42073
PDF-XChange Editor Doc Object Out-Of-Bounds Read Information Disclosure Vulnerability
PDF-XChange Editor Doc Object Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Doc objects. By performing actions in JavaScript, an attacker can trigger a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-21323.
[ "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:9.5.368.0:*:*:*:*:*:*:*" ]
null
null
3.3
null
null
RHSA-2025:1209
Red Hat Security Advisory: tbb security update
jquery: Untrusted code execution via <option> tag in HTML passed to DOM manipulation methods
[ "cpe:/a:redhat:rhel_eus:9.2::appstream" ]
null
6.1
null
null
null
CVE-2023-6552
Open redirect in TasmoAdmin
Lack of "current" GET parameter validation during the action of changing a language leads to an open redirect vulnerability.
[ "cpe:2.3:a:tasmoadmin:tasmoadmin:*:*:*:*:*:*:*:*" ]
null
6.1
null
null
https://github.com/TasmoAdmin/TasmoAdmin/pull/1039
CVE-2024-30095
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
[ "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*" ]
null
7.8
null
null
null