id
stringlengths
12
47
title
stringlengths
0
256
βŒ€
description
stringlengths
3
189k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
βŒ€
cvss_v3_1
float64
0
10
βŒ€
cvss_v3_0
float64
0
10
βŒ€
cvss_v2_0
float64
0
10
βŒ€
patch_commit_url
stringlengths
36
232
βŒ€
CVE-2023-1733
A denial of service condition exists in the Prometheus server bundled with GitLab affecting all versions from 11.10 to 15.8.5, 15.9 to 15.9.4 and 15.10 to 15.10.1.
[ "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:15.10.0:*:*:*:community:*:*:*", "cpe:2.3:a:gitlab:gitlab:15.10.0:*:*:*:enterprise:*:*:*" ]
null
5.8
null
null
null
CVE-2004-0401
Unknown vulnerability in libtasn1 0.1.x before 0.1.2, and 0.2.x before 0.2.7, related to the DER parsing functions.
[ "cpe:2.3:a:free_software_foundation_inc.:libtasn1:0.1:*:*:*:*:*:*:*", "cpe:2.3:a:free_software_foundation_inc.:libtasn1:0.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:free_software_foundation_inc.:libtasn1:0.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:free_software_foundation_inc.:libtasn1:0.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:free_software_foundation_inc.:libtasn1:0.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:free_software_foundation_inc.:libtasn1:0.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:free_software_foundation_inc.:libtasn1:0.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:free_software_foundation_inc.:libtasn1:0.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:free_software_foundation_inc.:libtasn1:0.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:free_software_foundation_inc.:libtasn1:0.2.6:*:*:*:*:*:*:*" ]
null
null
null
10
null
GHSA-273x-mxvr-9vx2
IBM Cognos Analytics Mobile Server 11.1.7, 11.2.4, and 12.0.0 is vulnerable to Denial of Service due to due to weak or absence of rate limiting. By making unlimited http requests, it is possible for a single user to exhaust server resources over a period of time making service unavailable for other legitimate users. IBM X-Force ID: 230510.
[]
null
6.5
null
null
null
CVE-2025-30031
A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected application is vulnerable to SQL injection through the internally used 'UpdateUsers' method. This could allow an authenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with "NT AUTHORITY\NetworkService" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on. (ZDI-CAN-25922)
[]
8.7
8.8
null
null
null
GHSA-673h-vxq8-f3wr
Voice Builder Prior to commit c145d4604df67e6fc625992412eef0bf9a85e26b and f6660e6d8f0d1d931359d591dbdec580fef36d36 is affected by: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection'). The impact is: Remote code execution with the same privileges as the servers. The component is: Two web servers in the projects expose three vulnerable endpoints that can be accessed remotely. The endpoints are defined at: - /tts: https://github.com/google/voice-builder/blob/3a449a3e8d5100ff323161c89b897f6d5ccdb6f9/merlin_model_server/api.js#L34 - /alignment: https://github.com/google/voice-builder/blob/3a449a3e8d5100ff323161c89b897f6d5ccdb6f9/festival_model_server/api.js#L28 - /tts: https://github.com/google/voice-builder/blob/3a449a3e8d5100ff323161c89b897f6d5ccdb6f9/festival_model_server/api.js#L65. The attack vector is: Attacker sends a GET request to the vulnerable endpoint with a specially formatted query parameter. The fixed version is: After commit f6660e6d8f0d1d931359d591dbdec580fef36d36.
[]
null
null
9.8
null
null
CVE-2024-56726
octeontx2-pf: handle otx2_mbox_get_rsp errors in cn10k.c
In the Linux kernel, the following vulnerability has been resolved: octeontx2-pf: handle otx2_mbox_get_rsp errors in cn10k.c Add error pointer check after calling otx2_mbox_get_rsp().
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
null
5.5
null
null
null
GHSA-39qg-c7hm-9wwf
protocols/jabber/auth.c in libpurple in Pidgin 2.6.0, and possibly other versions, does not follow the "require TLS/SSL" preference when connecting to older Jabber servers that do not follow the XMPP specification, which causes libpurple to connect to the server without the expected encryption and allows remote attackers to sniff sessions.
[]
null
null
null
null
null
CVE-2023-52197
WordPress Ads Invalid Click Protection Plugin <= 1.0 is vulnerable to Cross Site Scripting (XSS)
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Impactpixel Ads Invalid Click Protection allows Stored XSS.This issue affects Ads Invalid Click Protection: from n/a through 1.0.
[ "cpe:2.3:a:impactpixel:ads_invalid_click_protection:*:*:*:*:*:wordpress:*:*" ]
null
5.9
null
null
null
CVE-2025-30703
Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.0-8.0.41, 8.4.0-8.4.4 and 9.0.0-9.2.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 2.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N).
[]
null
2.7
null
null
null
GHSA-7v4x-r9g8-7qx7
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in CreativeMindsSolutions CM Header and Footer allows Stored XSS. This issue affects CM Header and Footer: from n/a through 1.2.4.
[]
null
6.5
null
null
null
GHSA-mfph-vgxc-xpx2
A command injection vulerability found in quick game engine allows arbitrary remote code in quick app. Allows remote attacke0rs to gain arbitrary code execution in quick game engine
[]
null
9.8
null
null
null
CVE-2022-46498
Hospital Management System 1.0 was discovered to contain a SQL injection vulnerability via the doc_number parameter at his_admin_view_single_employee.php.
[ "cpe:2.3:a:codeastro:hospital_management_system:1.0:*:*:*:*:*:*:*" ]
null
2.7
null
null
null
CVE-2020-14856
Vulnerability in the Oracle Trade Management product of Oracle E-Business Suite (component: User Interface). Supported versions that are affected are 12.1.1 - 12.1.3 and 12.2.3 - 12.2.10. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Trade Management. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Trade Management, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Trade Management accessible data as well as unauthorized update, insert or delete access to some of Oracle Trade Management accessible data. CVSS 3.1 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N).
[ "cpe:2.3:a:oracle:trade_management:*:*:*:*:*:*:*:*" ]
null
8.2
null
null
null
GHSA-9fr5-v73g-93j2
SQL injection vulnerability in block_forum_topic_new.php in ViArt Shop Free 2.5.5, and possibly other distributions including Light, Standard, and Enterprise, might allow remote attackers to execute arbitrary SQL commands via unknown vectors, probably involving the forum_id parameter.
[]
null
null
null
null
null
GHSA-cq9c-6m4q-fv48
MP4NameFirstMatches in mp4util.cpp in MP4v2 2.0.0 mishandles substrings of atom names, leading to use of an inappropriate data type for associated atoms. The resulting type confusion can cause out-of-bounds memory access.
[]
null
null
9.8
null
null
CVE-2018-12699
finish_stab in stabs.c in GNU Binutils 2.30 allows attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact, as demonstrated by an out-of-bounds write of 8 bytes. This can occur during execution of objdump.
[ "cpe:2.3:a:gnu:binutils:2.30:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04.4:*:*:*:*:*:*:*" ]
null
null
9.8
7.5
null
GHSA-wv8p-qvw7-q865
The Page Builder Gutenberg Blocks WordPress plugin before 3.1.7 does not validate and escape some of its block options before outputting them back in a page/post where the block is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks
[]
null
5.4
null
null
null
CVE-2007-5327
Stack-based buffer overflow in the RPC interface for the Message Engine (mediasvr.exe) in CA BrightStor ARCServe BackUp v9.01 through R11.5, and Enterprise Backup r10.5, allows remote attackers to execute arbitrary code via a long argument in the 0x10d opnum.
[ "cpe:2.3:a:broadcom:brightstor_arcserve_backup:9.01:*:*:*:*:*:*:*", "cpe:2.3:a:broadcom:brightstor_arcserve_backup:10.5:*:*:*:*:*:*:*", "cpe:2.3:a:broadcom:brightstor_arcserve_backup:11:*:*:*:*:*:*:*", "cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:*:*:*:*:*:*", "cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.5:*:*:*:*:*:*:*", "cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.5:*:*:*:*:*:*:*" ]
null
null
null
10
null
CVE-2021-38203
btrfs in the Linux kernel before 5.13.4 allows attackers to cause a denial of service (deadlock) via processes that trigger allocation of new system chunks during times when there is a shortage of free space in the system space_info.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:netapp:hci_bootstrap_os:-:*:*:*:*:*:*:*", "cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*", "cpe:2.3:h:netapp:hci_storage_node:-:*:*:*:*:*:*:*" ]
null
5.5
null
2.1
null
CVE-2023-26350
ZDI-CAN-19510: Adobe Dimension USD File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability
Adobe Dimension versions 3.4.7 (and earlier) is affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[ "cpe:2.3:a:adobe:dimension:*:*:*:*:*:*:*:*" ]
null
5.5
null
null
null
CVE-2010-3407
Stack-based buffer overflow in the MailCheck821Address function in nnotes.dll in the nrouter.exe service in the server in IBM Lotus Domino 8.0.x before 8.0.2 FP5 and 8.5.x before 8.5.1 FP2 allows remote attackers to execute arbitrary code via a long e-mail address in an ORGANIZER:mailto header in an iCalendar calendar-invitation e-mail message, aka SPR NRBY7ZPJ9V.
[ "cpe:2.3:a:ibm:lotus_domino:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_domino:8.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_domino:8.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_domino:8.0.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_domino:8.0.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_domino:8.0.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_domino:8.0.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_domino:8.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_domino:8.5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_domino:8.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_domino:8.5.1.1:*:*:*:*:*:*:*" ]
null
null
null
9.3
null
GHSA-942g-54w2-gqpf
The Infiniti Roadside Assistance (aka com.ccas.rsa.common.infiniti) application 1.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[]
null
null
null
null
null
GHSA-8rhq-v947-5f3j
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Michel - xiligroup dev xili-language allows Reflected XSS. This issue affects xili-language: from n/a through 2.21.2.
[]
null
7.1
null
null
null
GHSA-7px2-3c2p-q4v4
flatnest Prototype Pollution vulnerability
All versions of the package flatnest are vulnerable to Prototype Pollution via the `nest()` function in `flatnest/nest.js` file.
[]
null
7.3
null
null
null
CVE-2018-6537
A buffer overflow vulnerability in the control protocol of Flexense SyncBreeze Enterprise v10.4.18 allows remote attackers to execute arbitrary code by sending a crafted packet to TCP port 9121.
[ "cpe:2.3:a:flexense:syncbreeze:10.4.18:*:*:*:enterprise:*:*:*" ]
null
null
9.8
7.5
null
GHSA-rjj7-hjcm-jmqm
PHP Scripts Mall Entrepreneur Job Portal Script 3.0.1 allows remote attackers to cause a denial of service (outage of profile editing) via crafted JavaScript code in the KeySkills field.
[]
null
null
6.5
null
null
RHSA-2012:0037
Red Hat Security Advisory: mod_cluster-native security update
mod_cluster: malicious worker nodes can register on any vhost
[ "cpe:/a:redhat:jboss_enterprise_application_platform:5::el4", "cpe:/a:redhat:jboss_enterprise_application_platform:5::el5", "cpe:/a:redhat:jboss_enterprise_application_platform:5::el6" ]
null
null
null
null
null
CVE-2023-47144
IBM Tivoli Application Dependency Discovery Manager cross-site scripting
IBM Tivoli Application Dependency Discovery Manager 7.3.0.0 through 7.3.0.10 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 270271.
[ "cpe:2.3:a:ibm:tivoli_application_dependency_discovery_manager:*:*:*:*:*:*:*:*" ]
null
6.1
null
null
null
CVE-2015-1093
FontParser in Apple iOS before 8.3 and Apple OS X before 10.10.3 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted font file.
[ "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" ]
null
null
null
6.8
null
GHSA-756q-cg5p-5457
The Remote Application Server in Parallels RAS before 19.2.23975 does not segment virtualized applications from the server, which allows a remote attacker to achieve remote code execution via standard kiosk breakout techniques.
[]
null
10
null
null
null
CVE-2022-25456
Tenda AC6 v15.03.05.09_multi was discovered to contain a stack overflow via the security_5g parameter in the WifiBasicSet function.
[ "cpe:2.3:o:tenda:ac6_firmware:15.03.05.09:*:*:*:*:*:*:*", "cpe:2.3:h:tenda:ac6:-:*:*:*:*:*:*:*" ]
null
9.8
null
10
null
CVE-2017-14624
ImageMagick 7.0.7-0 Q16 has a NULL Pointer Dereference vulnerability in the function PostscriptDelegateMessage in coders/ps.c.
[ "cpe:2.3:a:imagemagick:imagemagick:7.0.7-0:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*" ]
null
null
9.8
7.5
null
CVE-2003-1378
Microsoft Outlook Express 6.0 and Outlook 2000, with the security zone set to Internet Zone, allows remote attackers to execute arbitrary programs via an HTML email with the CODEBASE parameter set to the program, a vulnerability similar to CAN-2002-0077.
[ "cpe:2.3:a:microsoft:outlook:2000:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:outlook:2000:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:outlook:2000:sr1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:outlook_express:6.0:*:*:*:*:*:*:*" ]
null
null
null
8.8
null
GHSA-mr66-9pqw-7r8h
GNUBOARD5 5.3.1.9 has XSS that allows remote attackers to inject arbitrary web script or HTML via the "mobile board title contents" parameter, aka the adm/board_form_update.php bo_mobile_subject parameter.
[]
null
null
6.1
null
null
GHSA-2c88-v3f4-r6jr
An out-of-bounds read was addressed with improved input validation. This issue is fixed in macOS Catalina 10.15.6. A local user may be able to cause unexpected system termination or read kernel memory.
[]
null
null
null
null
null
CVE-2011-1769
SystemTap 1.4 and earlier, when unprivileged (aka stapusr) mode is enabled, allows local users to cause a denial of service (divide-by-zero error and OOPS) via a crafted ELF program with DWARF expressions that are not properly handled by a stap script that performs context variable access.
[ "cpe:2.3:a:systemtap:systemtap:*:*:*:*:*:*:*:*", "cpe:2.3:a:systemtap:systemtap:0.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:systemtap:systemtap:0.3:*:*:*:*:*:*:*", "cpe:2.3:a:systemtap:systemtap:0.4:*:*:*:*:*:*:*", "cpe:2.3:a:systemtap:systemtap:0.5:*:*:*:*:*:*:*", "cpe:2.3:a:systemtap:systemtap:0.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:systemtap:systemtap:0.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:systemtap:systemtap:0.5.5:*:*:*:*:*:*:*", "cpe:2.3:a:systemtap:systemtap:0.5.7:*:*:*:*:*:*:*", "cpe:2.3:a:systemtap:systemtap:0.5.8:*:*:*:*:*:*:*", "cpe:2.3:a:systemtap:systemtap:0.5.9:*:*:*:*:*:*:*", "cpe:2.3:a:systemtap:systemtap:0.5.10:*:*:*:*:*:*:*", "cpe:2.3:a:systemtap:systemtap:0.5.12:*:*:*:*:*:*:*", "cpe:2.3:a:systemtap:systemtap:0.5.13:*:*:*:*:*:*:*", "cpe:2.3:a:systemtap:systemtap:0.5.14:*:*:*:*:*:*:*", "cpe:2.3:a:systemtap:systemtap:0.6:*:*:*:*:*:*:*", "cpe:2.3:a:systemtap:systemtap:0.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:systemtap:systemtap:0.7:*:*:*:*:*:*:*", "cpe:2.3:a:systemtap:systemtap:0.7.2:*:*:*:*:*:*:*", "cpe:2.3:a:systemtap:systemtap:0.8:*:*:*:*:*:*:*", "cpe:2.3:a:systemtap:systemtap:0.9:*:*:*:*:*:*:*", "cpe:2.3:a:systemtap:systemtap:0.9.5:*:*:*:*:*:*:*", "cpe:2.3:a:systemtap:systemtap:0.9.7:*:*:*:*:*:*:*", "cpe:2.3:a:systemtap:systemtap:0.9.8:*:*:*:*:*:*:*", "cpe:2.3:a:systemtap:systemtap:0.9.9:*:*:*:*:*:*:*", "cpe:2.3:a:systemtap:systemtap:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:systemtap:systemtap:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:systemtap:systemtap:1.2:*:*:*:*:*:*:*", "cpe:2.3:a:systemtap:systemtap:1.3:*:*:*:*:*:*:*" ]
null
null
null
1.2
null
CVE-2017-10614
Junos OS: A remote unauthenticated attacker can consume large amounts of CPU and/or memory through telnetd
A vulnerability in telnetd service on Junos OS allows a remote attacker to cause a limited memory and/or CPU consumption denial of service attack. This issue was found during internal product security testing. Affected releases are Juniper Networks Junos OS 12.1X46 prior to 12.1X46-D45; 12.3X48 prior to 12.3X48-D30; 14.1 prior to 14.1R4-S9, 14.1R8; 14.2 prior to 14.2R6; 15.1 prior to 15.1F5, 15.1R3; 15.1X49 prior to 15.1X49-D40; 15.1X53 prior to 15.1X53-D232, 15.1X53-D47.
[ "cpe:2.3:o:juniper:junos:12.1x46:*:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.1x46:d10:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.1x46:d15:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.1x46:d20:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.1x46:d25:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.1x46:d30:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.1x46:d35:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.1x46:d40:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3x48:d10:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3x48:d15:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3x48:d25:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:14.1:*:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:14.1:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:14.1:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:14.1:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:14.1:r4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:14.1:r8:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:14.2:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:14.2:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:14.2:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:14.2:r4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:14.2:r5:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:f1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:f2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:f2-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:f2-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:f2-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:f2-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:f3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:f4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d10:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d20:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d30:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d35:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d20:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d21:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d210:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d25:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d30:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d32:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d33:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d34:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d60:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d61:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d62:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d63:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d70:*:*:*:*:*:*" ]
null
null
5.3
null
null
CVE-2023-47674
Missing authentication for critical function vulnerability in First Corporation's DVRs allows a remote unauthenticated attacker to rewrite or obtain the configuration information of the affected device. Note that updates are provided only for Late model of CFR-4EABC, CFR-4EAB, CFR-8EAB, CFR-16EAB, MD-404AB, and MD-808AB. As for the other products, apply the workaround.
[ "cpe:2.3:o:c-first:cfr-1004ea_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:c-first:cfr-1004ea:-:*:*:*:*:*:*:*", "cpe:2.3:o:c-first:cfr-1008ea_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:c-first:cfr-1008ea:-:*:*:*:*:*:*:*", "cpe:2.3:o:c-first:cfr-1016ea_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:c-first:cfr-1016ea:-:*:*:*:*:*:*:*", "cpe:2.3:o:c-first:cfr-16eaa_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:c-first:cfr-16eaa:-:*:*:*:*:*:*:*", "cpe:2.3:o:c-first:cfr-16eab_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:c-first:cfr-16eab:-:*:*:*:*:*:*:*", "cpe:2.3:o:c-first:cfr-16eha_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:c-first:cfr-16eha:-:*:*:*:*:*:*:*", "cpe:2.3:o:c-first:cfr-16ehd_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:c-first:cfr-16ehd:-:*:*:*:*:*:*:*", "cpe:2.3:o:c-first:cfr-4eaa_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:c-first:cfr-4eaa:-:*:*:*:*:*:*:*", "cpe:2.3:o:c-first:cfr-4eaam_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:c-first:cfr-4eaam:-:*:*:*:*:*:*:*", "cpe:2.3:o:c-first:cfr-4eab_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:c-first:cfr-4eab:-:*:*:*:*:*:*:*", "cpe:2.3:o:c-first:cfr-4eabc_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:c-first:cfr-4eabc:-:*:*:*:*:*:*:*", "cpe:2.3:o:c-first:cfr-4eha_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:c-first:cfr-4eha:-:*:*:*:*:*:*:*", "cpe:2.3:o:c-first:cfr-4ehd_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:c-first:cfr-4ehd:-:*:*:*:*:*:*:*", "cpe:2.3:o:c-first:cfr-8eaa_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:c-first:cfr-8eaa:-:*:*:*:*:*:*:*", "cpe:2.3:o:c-first:cfr-8eab_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:c-first:cfr-8eab:-:*:*:*:*:*:*:*", "cpe:2.3:o:c-first:cfr-8eha_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:c-first:cfr-8eha:-:*:*:*:*:*:*:*", "cpe:2.3:o:c-first:cfr-8ehd_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:c-first:cfr-8ehd:-:*:*:*:*:*:*:*", "cpe:2.3:o:c-first:cfr-904e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:c-first:cfr-904e:-:*:*:*:*:*:*:*", "cpe:2.3:o:c-first:cfr-908e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:c-first:cfr-908e:-:*:*:*:*:*:*:*", "cpe:2.3:o:c-first:cfr-916e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:c-first:cfr-916e:-:*:*:*:*:*:*:*", "cpe:2.3:o:c-first:md-404aa_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:c-first:md-404aa:-:*:*:*:*:*:*:*", "cpe:2.3:o:c-first:md-404ab_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:c-first:md-404ab:-:*:*:*:*:*:*:*", "cpe:2.3:o:c-first:md-404ha_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:c-first:md-404ha:-:*:*:*:*:*:*:*", "cpe:2.3:o:c-first:md-404hd_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:c-first:md-404hd:-:*:*:*:*:*:*:*", "cpe:2.3:o:c-first:md-808aa_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:c-first:md-808aa:-:*:*:*:*:*:*:*", "cpe:2.3:o:c-first:md-808ab_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:c-first:md-808ab:-:*:*:*:*:*:*:*", "cpe:2.3:o:c-first:md-808ha_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:c-first:md-808ha:-:*:*:*:*:*:*:*", "cpe:2.3:o:c-first:md-808hd_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:c-first:md-808hd:-:*:*:*:*:*:*:*" ]
null
9.8
null
null
null
CVE-2024-3748
SP Project & Document Manager <= 4.71 - Data Update via IDOR
The SP Project & Document Manager WordPress plugin through 4.71 is missing validation in its upload function, allowing a user to manipulate the `user_id` to make it appear that a file was uploaded by another user
[ "cpe:2.3:a:smartypantsplugins:sp_project_\\&_document_manager:*:*:*:*:*:*:*:*" ]
null
6.5
null
null
null
CVE-2014-4767
IBM WebSphere Application Server (WAS) Liberty Profile 8.5.x before 8.5.5.3 does not properly use the Liberty Repository for feature installation, which allows remote authenticated users to execute arbitrary code via unspecified vectors.
[ "cpe:2.3:a:ibm:websphere_application_server:8.5.0.0:-:liberty_profile:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:8.5.0.1:-:liberty_profile:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:8.5.0.2:-:liberty_profile:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:8.5.5.0:-:liberty_profile:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:8.5.5.1:-:liberty_profile:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:8.5.5.2:-:liberty_profile:*:*:*:*:*" ]
null
null
null
6.5
null
CVE-2025-21941
drm/amd/display: Fix null check for pipe_ctx->plane_state in resource_build_scaling_params
In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Fix null check for pipe_ctx->plane_state in resource_build_scaling_params Null pointer dereference issue could occur when pipe_ctx->plane_state is null. The fix adds a check to ensure 'pipe_ctx->plane_state' is not null before accessing. This prevents a null pointer dereference. Found by code review. (cherry picked from commit 63e6a77ccf239337baa9b1e7787cde9fa0462092)
[]
null
5.5
null
null
null
CVE-2021-33216
An issue was discovered in CommScope Ruckus IoT Controller 1.7.1.0 and earlier. An Undocumented Backdoor exists, allowing shell access via a developer account.
[ "cpe:2.3:a:commscope:ruckus_iot_controller:*:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
null
CVE-2021-22057
VMware Workspace ONE Access 21.08, 20.10.0.1, and 20.10 contain an authentication bypass vulnerability. A malicious actor, who has successfully provided first-factor authentication, may be able to obtain second-factor authentication provided by VMware Verify.
[ "cpe:2.3:a:vmware:workspace_one_access:20.10:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:workspace_one_access:20.10.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:workspace_one_access:21.08:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:workspace_one_access:21.08.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*" ]
null
8.8
null
6.5
null
GHSA-r7qx-6g8x-6jwf
SQL injection vulnerability in bttlxeForum 2.0 beta 3 and earlier allows remote attackers to bypass authentication via the (1) username and (2) password fields, and possibly other fields.
[]
null
null
null
null
null
GHSA-934w-c939-88hv
An elevation of privilege vulnerability in Qualcomm closed source components. Product: Android. Versions: Android kernel. Android ID: A-28823724.
[]
null
null
9.8
null
null
RHSA-2022:0155
Red Hat Security Advisory: Red Hat Single Sign-On 7.5.1 security update
keycloak-server-spi-private: ECP SAML binding bypasses authentication flows Keycloak: Incorrect authorization allows unpriviledged users to create other users resteasy: Error message exposes endpoint class information xml-security: XPath Transform abuse allows for information disclosure
[ "cpe:/a:redhat:red_hat_single_sign_on:7" ]
null
7.5
null
null
null
GHSA-qfrp-89jw-777c
Cisco Adaptive Security Appliance (ASA) software 7.2 and 8.2 before 8.2(5.58), 8.3 and 8.4 before 8.4(7.29), 8.5 through 8.7 before 8.7(1.17), 9.0 before 9.0(4.37), 9.1 before 9.1(6.4), 9.2 before 9.2(4), 9.3 before 9.3(3.1), and 9.4 before 9.4(1.1) allows remote attackers to cause a denial of service (device reload) via a crafted DNS response, aka Bug ID CSCut03495.
[]
null
null
null
null
null
GHSA-9r9v-644h-2p8g
SAP Commerce (Backoffice) uses the deprecated X-FRAME-OPTIONS header to protect against clickjacking. While this protection remains effective now, it may not be the case in the future as browsers might discontinue support for this header in favor of the frame-ancestors CSP directive. Hence, clickjacking could become possible then, and lead to exposure and modification of sensitive information.
[]
null
6.8
null
null
null
GHSA-4225-968q-h9xp
Argument injection vulnerability in IBM Lotus Notes 8.0.x before 8.0.2 FP6 and 8.5.x before 8.5.1 FP5 allows remote attackers to execute arbitrary code via a cai:// URL containing a --launcher.library option that specifies a UNC share pathname for a DLL file, aka SPR PRAD82YJW2.
[]
null
null
null
null
null
CVE-2006-4986
Grayscale BandSite CMS allows remote attackers to obtain sensitive information via a direct request for (1) certain files in the includes/content directory, (2) includes/shows_preview.php, and (3) adminpanel/configform.php; and files in adminpanel/includes/ including (4) mailinglist/disphtmltbl.php, (5) mailinglist/dispxls.php, (6) mailinglist/sendshows.php, (7) previews/preview_bio.php, (8) previews/preview_genmerch.php, (9) previews/preview_fliers.php, (10) previews/preview_gbook.php, (11) previews/preview_interviews.php, (12) previews/preview_links.php, (13) previews/preview_lyrics.php, (14) previews/preview_membio.php, (15) previews/preview_merchphotos.php, (16) previews/preview_mp3s.php, (17) previews/preview_news.php, (18) previews/preview_photos.php, (19) previews/preview_releases.php, (20) previews/preview_relmerch.php, (21) previews/preview_relphotos.php, (22) previews/preview_reviews.php, (23) previews/preview_shows.php, (24) previews/preview_wearmerch.php, (25) change_forms/change_bio.php, (26) change_forms/change_fliers.php, (27) change_forms/change_gbook.php, (28) change_forms/change_gen_merch.php, (29) change_forms/change_interview.php, (30) change_forms/change_links.php, (31) change_forms/change_lyrics.php, (32) change_forms/change_members.php, (33) change_forms/change_merch.php, (34) change_forms/change_merch_pic.php, (35) change_forms/change_mp3s.php, (36) change_forms/change_news.php, (37) change_forms/change_photos.php, (38) change_forms/change_rel_merch.php, (39) change_forms/change_rel_pic.php, (40) change_forms/change_releases.php, (41) change_forms/change_reviews.php, (42) change_forms/change_shows.php, and (43) change_forms/change_wear_merch.php, which reveals the path in various error messages.
[ "cpe:2.3:a:grayscale:bandsite_cms:1.1:*:*:*:*:*:*:*" ]
null
null
null
5
null
GHSA-cr76-6p9f-9963
An issue in Horizon Business Services Inc. Caterease 16.0.1.1663 through 24.0.1.2405 and possibly later versions, allows a local attacker to perform an Authentication Bypass attack due to improperly implemented security checks for standard authentication mechanisms
[]
null
7.8
null
null
null
RHSA-2015:1409
Red Hat Security Advisory: sudo security, bug fix, and enhancement update
sudo: unsafe handling of TZ environment variable
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
null
CVE-2022-28658
Apport argument parsing mishandles filename splitting on older kernels resulting in argument spoofing
[ "cpe:2.3:a:apport_project:apport:*:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:esm:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:21.10:*:*:*:-:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:22.04:*:*:*:lts:*:*:*" ]
null
5.5
null
null
null
GHSA-pc83-5vfx-xhg2
Cross-site scripting (XSS) vulnerability in Spidean PostWrap allows remote attackers to inject arbitrary HTML and web script via the page parameter.
[]
null
null
null
null
null
GHSA-mxvg-x4fj-7g3v
A Buffer out-of-bound read vulnerability in Exif.cpp::ReadInt32 in FreeImage 3.18.0 allows attackers to cause a denial-of-service.
[]
null
6.5
null
null
null
CVE-2007-5040
Ghost Security Suite alpha 1.200 does not properly validate certain parameters to System Service Descriptor Table (SSDT) function handlers, which allows local users to cause a denial of service (crash) and possibly gain privileges via the (1) NtCreateKey, (2) NtCreateThread, (3) NtDeleteValueKey, (4) NtQueryValueKey, (5) NtSetSystemInformation, and (6) NtSetValueKey kernel SSDT hooks.
[ "cpe:2.3:a:ghostsecurity:ghost_security_suite:alpha_1.200:*:*:*:*:*:*:*" ]
null
null
null
2.1
null
CVE-2020-13133
Tufin SecureChange prior to R19.3 HF3 and R20-1 HF1 are vulnerable to stored XSS. The successful exploitation requires admin privileges (for storing the XSS payload itself), and can exploit (be triggered by) unauthenticated users. All TOS versions with SecureChange deployments prior to R19.3 HF3 and R20-1 HF1 are affected. Vulnerabilities were fixed in R19.3 HF3 and R20-1 HF1
[ "cpe:2.3:a:tufin:securechange:*:*:*:*:*:*:*:*", "cpe:2.3:a:tufin:securechange:r19-3:-:*:*:*:*:*:*", "cpe:2.3:a:tufin:securechange:r20-1:-:*:*:*:*:*:*" ]
null
6.1
null
4.3
null
GHSA-xq28-w75v-29rr
A remote code execution vulnerability exists in Microsoft SharePoint when the software fails to check the source markup of an application package, aka 'Microsoft SharePoint Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1023, CVE-2020-1024.
[]
null
null
null
null
null
CVE-2022-43650
This vulnerability allows remote attackers to disclose sensitive information on affected installations of RARLAB WinRAR 6.11.0.0. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of ZIP files. Crafted data in a ZIP file can trigger a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-19232.
[ "cpe:2.3:a:rarlab:winrar:6.11:*:*:*:*:*:*:*" ]
null
null
2.5
null
null
CVE-2021-1167
Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers Management Interface Remote Command Execution and Denial of Service Vulnerabilities
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an authenticated, remote attacker to execute arbitrary code or cause an affected device to restart unexpectedly. The vulnerabilities are due to improper validation of user-supplied input in the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system or cause the device to reload, resulting in a denial of service (DoS) condition. To exploit these vulnerabilities, an attacker would need to have valid administrator credentials on the affected device. Cisco has not released software updates that address these vulnerabilities.
[ "cpe:2.3:o:cisco:rv110w_firmware:1.2.1.7:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv110w_firmware:1.2.2.8:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv110w_firmware:1.3.1.7:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:rv110w:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv130_vpn_router_firmware:1.2.2.8:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv130_vpn_router_firmware:1.3.1.7:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:rv130_vpn_router:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv130w_firmware:1.2.2.8:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv130w_firmware:1.3.1.7:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:rv130w:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv215w_wireless-n_vpn_router_firmware:1.2.2.8:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv215w_wireless-n_vpn_router_firmware:1.3.1.7:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:rv215w_wireless-n_vpn_router:-:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_extension_platform:1.0.3.55:*:*:*:*:*:*:*" ]
null
7.2
null
null
null
GHSA-g3hr-qm5c-vgfh
Badminton Center Management System v1.0 is vulnerable to SQL Injection via /bcms/admin/courts/manage_court.php?id=.
[]
null
9.8
null
null
null
CVE-2018-3279
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Roles). Supported versions that are affected are 8.0.12 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
[ "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vmware_vsphere:*:*", "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
4.9
null
4
null
GHSA-rwmc-xpj5-264g
A vulnerability exists in Schneider Electric's Pelco Sarix Professional in all firmware versions prior to 3.29.67 which could allow a remote attacker to delete arbitrary system file due to lack of validation of the /login/bin/set_param to the file name with the value of 'system.delete.sd_file'
[]
null
9.1
null
null
null
GHSA-9jg4-fxwc-3f69
Cross-Site Request Forgery (CSRF) vulnerability in Kelvin Ng Shortcode in Comment allows Stored XSS.This issue affects Shortcode in Comment: from n/a through 1.1.1.
[]
null
7.1
null
null
null
GHSA-j2x2-7857-rm23
Couchbase Server 4.x and 5.x before 6.0.0 has Insecure Permissions for the projector and indexer REST endpoints (they allow unauthenticated access).
[]
null
null
null
null
null
GHSA-3x6p-632c-9725
The SlotMachine (aka com.popoinnovation.SlotMachine) application 1.03 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[]
null
null
null
null
null
GHSA-r79p-j9j2-jx69
FastStone Image Viewer <= 7.5 is affected by a user mode write access violation at 0x00402d8a, triggered when a user opens or views a malformed CUR file that is mishandled by FSViewer.exe. Attackers could exploit this issue for a Denial of Service (DoS) or possibly to achieve code execution.
[]
null
null
null
null
null
CVE-2016-8948
IBM Emptoris Sourcing 9.5.x through 10.1.x is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 118835.
[ "cpe:2.3:a:ibm:emptoris_sourcing:9.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:emptoris_sourcing:9.5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:emptoris_sourcing:9.5.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:emptoris_sourcing:9.5.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:emptoris_sourcing:9.5.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:emptoris_sourcing:10.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:emptoris_sourcing:10.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:emptoris_sourcing:10.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:emptoris_sourcing:10.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:emptoris_sourcing:10.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:emptoris_sourcing:10.1.1:*:*:*:*:*:*:*" ]
null
null
5.4
3.5
null
GHSA-m9vr-hpjw-8h7q
SQL injection vulnerability in Invensys Wonderware Information Server (WIS) 4.0 SP1SP1, 4.5- Portal, and 5.0- Portal allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
[]
null
null
null
null
null
GHSA-rf3p-79w2-25vp
lserver in SAP DB 7.3 and earlier uses the current working directory to find and execute the lserversrv program, which allows local users to gain privileges with a malicious lserversrv that is called from a directory that has a symlink to the lserver program.
[]
null
null
null
null
null
CVE-2021-44481
An issue was discovered in YottaDB through r1.32 and V7.0-000. A lack of parameter validation in calls to memcpy in check_and_set_timeout in sr_unix/ztimeoutroutines.c allows attackers to attempt to read from a NULL pointer.
[ "cpe:2.3:a:fisglobal:gt.m:*:*:*:*:*:*:*:*", "cpe:2.3:a:yottadb:yottadb:*:*:*:*:*:*:*:*" ]
null
7.5
null
5
null
CVE-2012-0695
Multiple unspecified vulnerabilities in Google Chrome before 17.0.963.27 on the Acer AC700, Samsung Series 5, and Cr-48 Chromebook platforms have unknown impact and attack vectors.
[ "cpe:2.3:o:google:chrome_os:*:*:*:*:*:*:*:*", "cpe:2.3:h:acer:ac700_chromebook:*:*:*:*:*:*:*:*", "cpe:2.3:h:google:cr-48_chromebook:*:*:*:*:*:*:*:*", "cpe:2.3:h:samsung:series_5_chromebook:*:*:*:*:*:*:*:*" ]
null
null
null
10
null
RHSA-2022:1492
Red Hat Security Advisory: OpenJDK 8u332 Windows builds release and security update
OpenJDK: Unbounded memory allocation when compiling crafted XPath expressions (JAXP, 8270504) OpenJDK: Improper object-to-string conversion in AnnotationInvocationHandler (Libraries, 8277672) OpenJDK: Missing check for negative ObjectIdentifier (Libraries, 8275151) OpenJDK: Defective secure validation in Apache Santuario (Libraries, 8278008) OpenJDK: URI parsing inconsistencies (JNDI, 8278972)
[ "cpe:/a:redhat:openjdk:1.8::windows" ]
null
5.3
null
null
null
GHSA-jj2f-7gqw-hpxj
Format string vulnerability in authcfg.cgi in Accoria Web Server (aka Rock Web Server) 1.4.7 allows remote attackers to have an unspecified impact via format string specifiers in the path (aka Password File) parameter.
[]
null
null
null
null
null
GHSA-cx3c-h5q9-78vc
A NULL pointer dereference in setnmap() at cmds.c of GNU Inetutils v2.2.16-cf091 can lead to a segmentation fault or application crash.
[]
null
null
null
null
null
CVE-2022-25758
Regular Expression Denial of Service (ReDoS)
All versions of package scss-tokenizer are vulnerable to Regular Expression Denial of Service (ReDoS) via the loadAnnotation() function, due to the usage of insecure regex.
[ "cpe:2.3:a:scss-tokenizer_project:scss-tokenizer:*:*:*:*:*:node.js:*:*" ]
null
5.3
null
null
null
RHSA-2011:0300
Red Hat Security Advisory: Red Hat Network Satellite Server security update
Spacewalk: Session fixation flaw Spacewalk: Prone to brute force password guessing attacks
[ "cpe:/a:redhat:network_satellite:5.4::el5" ]
null
null
null
null
null
GHSA-jrrc-8w3m-x99x
The management console on the Symantec Web Gateway (SWG) appliance before 5.2.2 allows remote authenticated users to execute arbitrary OS commands by injecting command strings into unspecified PHP scripts.
[]
null
null
null
null
null
CVE-2025-7083
Belkin F9K1122 webs mp os command injection
A vulnerability was found in Belkin F9K1122 1.00.33. It has been classified as critical. This affects the function mp of the file /goform/mp of the component webs. The manipulation of the argument command leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
[]
5.3
6.3
6.3
6.5
null
CVE-2018-5038
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have a Heap Overflow vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
[ "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
null
8.8
6.8
null
GHSA-xq8g-h7mf-47qr
sample.sh in maildirsync 1.1 allows local users to append data to arbitrary files via a symlink attack on a /tmp/maildirsync-*.#####.log temporary file.
[]
null
null
null
null
null
CVE-2024-10230
Type Confusion in V8 in Google Chrome prior to 130.0.6723.69 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" ]
null
8.8
null
null
null
GHSA-wh99-p93p-g825
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DDL). Supported versions that are affected are 8.0.36 and prior and 8.3.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
[]
null
4.9
null
null
null
CVE-2024-36042
Silverpeas before 6.3.5 allows authentication bypass by omitting the Password field to AuthenticationServlet, often providing an unauthenticated user with superadmin access.
[ "cpe:2.3:a:silverpeas:silverpeas:0:*:*:*:*:*:*:*" ]
null
9.8
null
null
null
CVE-2023-30018
Judging Management System v1.0 is vulnerable to SQL Injection. via /php-jms/review_se_result.php?mainevent_id=.
[ "cpe:2.3:a:judging_management_system_project:judging_management_system:1.0:*:*:*:*:*:*:*" ]
null
9.8
null
null
null
CVE-2002-0572
FreeBSD 4.5 and earlier, and possibly other BSD-based operating systems, allows local users to write to or read from restricted files by closing the file descriptors 0 (standard input), 1 (standard output), or 2 (standard error), which may then be reused by a called setuid process that intended to perform I/O on normal files.
[ "cpe:2.3:o:freebsd:freebsd:4.4:releng:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:4.5:release:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:4.5:stable:*:*:*:*:*:*", "cpe:2.3:o:openbsd:openbsd:2.0:*:*:*:*:*:*:*", "cpe:2.3:o:openbsd:openbsd:2.1:*:*:*:*:*:*:*", "cpe:2.3:o:openbsd:openbsd:2.2:*:*:*:*:*:*:*", "cpe:2.3:o:openbsd:openbsd:2.3:*:*:*:*:*:*:*", "cpe:2.3:o:sun:solaris:2.5.1:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*", "cpe:2.3:o:sun:solaris:7.0:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:solaris:8.0:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*", "cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*", "cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*", "cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*" ]
null
null
null
7.2
null
CVE-2019-11014
The VStarCam vstc.vscam.client library and vstc.vscam shared object, as used in the Eye4 application (for Android, iOS, and Windows), do not prevent spoofing of the camera server. An attacker can create a fake camera server that listens for the client looking for a camera on the local network. When the camera responds to the client, it responds via the broadcast address, giving all information necessary to impersonate the camera. The attacker then floods the client with responses, causing the original camera to be denied service from the client, and thus causing the client to then communicate exclusively with the attacker's fake camera server. When connecting to the fake camera server, the client sends all details necessary to login to the camera (username and password).
[ "cpe:2.3:a:vstarcam:eye4:-:*:*:*:*:*:*:*" ]
null
null
9.8
10
null
GHSA-864f-7xjm-2jp2
CNCF K3s Kubernetes kubelet configuration exposes credentials
CNCF K3s 1.32 before 1.32.4-rc1+k3s1 has a Kubernetes kubelet configuration change with the unintended consequence that, in some situations, ReadOnlyPort is set to 10255. For example, the default behavior of a K3s online installation might allow unauthenticated access to this port, exposing credentials.
[]
null
6.8
null
null
null
CVE-2019-19219
BMC Control-M/Agent 7.0.00.000 allows Arbitrary File Download.
[ "cpe:2.3:a:bmcsoftware:control-m\\/agent:7.0.00.000:*:*:*:*:*:*:*" ]
null
7.5
null
4.3
null
CVE-2006-0126
rxvt-unicode before 6.3, on certain platforms that use openpty and non-Unix pty devices such as Linux and most BSD platforms, does not maintain the intended permissions of tty devices, which allows local users to gain read and write access to the devices.
[ "cpe:2.3:a:rxvt-unicode:rxvt-unicode:*:*:*:*:*:*:*:*" ]
null
null
null
4.6
null
CVE-2025-8620
GiveWP – Donation Plugin and Fundraising Platform <= 4.6.0 - Unauthenticated Donor Data Exposure
The GiveWP – Donation Plugin and Fundraising Platform plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 4.6.0. This makes it possible for unauthenticated attackers to extract donor names, emails, and donor id.
[]
null
5.3
null
null
null
CVE-2014-3089
The RDS Java Client library in IBM Rational Directory Server (RDS) 5.1.1.x before 5.1.1.2 iFix004 and 5.2.x before 5.2.1 iFix003, and Rational Directory Administrator (RDA) 6.0 before iFix002, includes the cleartext root password, which allows local users to obtain sensitive information by reading a library file.
[ "cpe:2.3:a:ibm:rational_directory_administrator:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_directory_administrator:6.0.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_directory_server:5.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_directory_server:5.1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_directory_server:5.1.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_directory_server:5.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_directory_server:5.2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_directory_server:5.2.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_directory_server:5.2.1:*:*:*:*:*:*:*" ]
null
null
null
4.9
null
RHSA-2022:6702
Red Hat Security Advisory: firefox security update
Mozilla: Out of bounds read when decoding H264 Mozilla: Content-Security-Policy base-uri bypass Mozilla: Incoherent instruction cache when building WASM on ARM64 Mozilla: Bypassing Secure Context restriction for cookies with __Host and __Secure prefix Mozilla: Bypassing FeaturePolicy restrictions on transient pages Mozilla: Data-race when parsing non-UTF-8 URLs in threads Mozilla: Memory safety bugs fixed in Firefox 105 and Firefox ESR 102.3
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8.8
7.5
null
null
GHSA-7ccr-wgh4-75wx
The trace_writeback_dirty_page implementation in include/trace/events/writeback.h in the Linux kernel before 4.4 improperly interacts with mm/migrate.c, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by triggering a certain page move.
[]
null
null
7.8
null
null
CVE-2010-5014
SQL injection vulnerability in standings.php in Elite Gaming Ladders 3.5 allows remote attackers to execute arbitrary SQL commands via the ladder[id] parameter.
[ "cpe:2.3:a:eliteladders:elite_gaming_ladders:3.5:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
GHSA-ghm8-6m3x-wv66
A memory leak in the rpmsg_eptdev_write_iter() function in drivers/rpmsg/rpmsg_char.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering copy_from_iter_full() failures, aka CID-bbe692e349e2.
[]
null
7.5
null
null
null
CVE-2024-4172
idcCMS cross-site request forgery
A vulnerability classified as problematic was found in idcCMS 1.35. Affected by this vulnerability is an unknown functionality of the file /admin/admin_cl.php?mudi=revPwd. The manipulation leads to cross-site request forgery. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-261991.
[ "cpe:2.3:a:idccms_project:idccms:-:*:*:*:*:*:*:*" ]
null
4.3
4.3
5
null
CVE-2023-52120
WordPress NEX-Forms – Ultimate Form Builder Plugin <= 8.5.2 is vulnerable to Cross Site Request Forgery (CSRF)
Cross-Site Request Forgery (CSRF) vulnerability in Basix NEX-Forms – Ultimate Form Builder – Contact forms and much more.This issue affects NEX-Forms – Ultimate Form Builder – Contact forms and much more: from n/a through 8.5.2.
[ "cpe:2.3:a:basixonline:nex-forms:*:*:*:*:*:wordpress:*:*" ]
null
5.4
null
null
null
GHSA-fv74-95jw-rj33
In SWFTools 2013-04-09-1007 on Windows, png2swf allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted file, related to a "Read Access Violation starting at image00000000_00400000+0x000000000001b596."
[]
null
null
8.8
null
null
GHSA-7q4r-r4hp-357v
The Aggregator Advanced Settings plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 1.2.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file.
[]
null
6.4
null
null
null