id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
189k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
patch_commit_url
stringlengths
36
232
CVE-2016-1834
Heap-based buffer overflow in the xmlStrncat function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted XML document.
[ "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:*:*:*:*:*:*:*:*", "cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*" ]
null
null
7.8
9.3
null
RHSA-2012:1263
Red Hat Security Advisory: postgresql and postgresql84 security update
module): XXE by applying XSL stylesheet to the document postgresql: File disclosure through XXE in xmlparse by DTD validation
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
null
CVE-2020-14786
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: PS). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
[ "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*", "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*", "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:snapcenter_server:-:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*" ]
null
4.9
null
null
null
GHSA-mxhc-qwjr-6vh5
The nsGfxScrollFrameInner::IsLTR function in Mozilla Firefox before 24.0, Firefox ESR 17.x before 17.0.9, Thunderbird before 24.0, Thunderbird ESR 17.x before 17.0.9, and SeaMonkey before 2.21 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via vectors related to improperly establishing parent-child relationships of range-request nodes.
[]
null
null
null
null
null
GHSA-r6r2-gvcm-979j
A flaw was found in grub2 in versions prior to 2.06. The rmmod implementation allows the unloading of a module used as a dependency without checking if any other dependent module is still loaded leading to a use-after-free scenario. This could allow arbitrary code to be executed or a bypass of Secure Boot protections. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
[]
null
8.2
null
null
null
GHSA-xhq3-455r-xv44
Moodle SQL injection via user preferences
In Moodle 2.x and 3.x, SQL injection can occur via user preferences.
[]
null
null
9.8
null
null
GHSA-5vhw-xq26-5fww
WTCMS 1.0 is vulnerable to Incorrect Access Control in \Common\Controller\HomebaseController.class.php.
[]
null
9.8
null
null
null
GHSA-39qw-pvp7-hp57
Integer signedness error in Apple QuickTime before 7.7.2 on Windows allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted QTVR movie file.
[]
null
null
null
null
null
GHSA-fqpc-qqwj-f2wv
Some Honor products are affected by file writing vulnerability, successful exploitation could cause code execution
[]
null
6.3
null
null
null
CVE-2020-35190
The official plone Docker images before version of 4.3.18-alpine (Alpine specific) contain a blank password for a root user. System using the plone docker container deployed by affected versions of the docker image may allow a remote attacker to achieve root access with a blank password.
[ "cpe:2.3:a:plone:plone:*:*:*:*:*:*:*:*" ]
null
9.8
null
10
null
GHSA-xj2f-r9jm-5w6p
An information disclosure vulnerability exists when Microsoft SharePoint Server improperly discloses its folder structure when rendering specific web pages, aka "Microsoft SharePoint Information Disclosure Vulnerability." This affects Microsoft SharePoint.
[]
null
null
4.3
null
null
CVE-2022-23685
A vulnerability in the ClearPass Policy Manager web-based management interface exists which exposes some endpoints to a lack of Cross-Site Request Forgery (CSRF) protection. This could allow a remote unauthenticated attacker to execute arbitrary input against these endpoints if the attacker can convince an authenticated user of the interface to interact with a specially crafted URL in Aruba ClearPass Policy Manager version(s): 6.10.x: 6.10.6 and below; 6.9.x: 6.9.11 and below. Aruba has released upgrades for Aruba ClearPass Policy Manager that address this security vulnerability.
[ "cpe:2.3:a:arubanetworks:clearpass_policy_manager:*:*:*:*:*:*:*:*" ]
null
8.8
null
null
null
CVE-2008-5598
Directory traversal vulnerability in index.php in PHPmyGallery 1.51 gold allows remote attackers to list arbitrary directories via a .. (dot dot) in the group parameter.
[ "cpe:2.3:a:phpmygallery:phpmygallery:1.51:gold:*:*:*:*:*:*" ]
null
null
null
5
null
GHSA-hf79-3hfm-mgmr
The radio frequency communication protocol being used by Meross MSH30Q 4.5.23 is vulnerable to replay attacks, allowing attackers to record and replay previously captured communication to execute unauthorized commands or actions (e.g., thermostat's temperature).
[]
null
8.8
null
null
null
GHSA-rwf6-mxf8-5hcf
Multiple directory traversal vulnerabilities in PowerScripts PowerNews 2.5.6 allow remote attackers to read and include arbitrary files via a .. (dot dot) in the (1) subpage parameter in (a) categories.inc.php, (b) news.inc.php, (c) other.inc.php, (d) permissions.inc.php, (e) templates.inc.php, and (f) users.inc.php in pnadmin/; and (2) the page parameter to (g) pnadmin/index.php. NOTE: vector 2 is only exploitable by administrators.
[]
null
null
null
null
null
CVE-2018-8488
An elevation of privilege vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server, aka "Microsoft SharePoint Elevation of Privilege Vulnerability." This affects Microsoft SharePoint. This CVE ID is unique from CVE-2018-8480, CVE-2018-8498, CVE-2018-8518.
[ "cpe:2.3:a:microsoft:sharepoint_enterprise_server:2013:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sharepoint_enterprise_server:2016:*:*:*:*:*:*:*" ]
null
null
5.4
3.5
null
CVE-2023-52897
btrfs: qgroup: do not warn on record without old_roots populated
In the Linux kernel, the following vulnerability has been resolved: btrfs: qgroup: do not warn on record without old_roots populated [BUG] There are some reports from the mailing list that since v6.1 kernel, the WARN_ON() inside btrfs_qgroup_account_extent() gets triggered during rescan: WARNING: CPU: 3 PID: 6424 at fs/btrfs/qgroup.c:2756 btrfs_qgroup_account_extents+0x1ae/0x260 [btrfs] CPU: 3 PID: 6424 Comm: snapperd Tainted: P OE 6.1.2-1-default #1 openSUSE Tumbleweed 05c7a1b1b61d5627475528f71f50444637b5aad7 RIP: 0010:btrfs_qgroup_account_extents+0x1ae/0x260 [btrfs] Call Trace: <TASK> btrfs_commit_transaction+0x30c/0xb40 [btrfs c39c9c546c241c593f03bd6d5f39ea1b676250f6] ? start_transaction+0xc3/0x5b0 [btrfs c39c9c546c241c593f03bd6d5f39ea1b676250f6] btrfs_qgroup_rescan+0x42/0xc0 [btrfs c39c9c546c241c593f03bd6d5f39ea1b676250f6] btrfs_ioctl+0x1ab9/0x25c0 [btrfs c39c9c546c241c593f03bd6d5f39ea1b676250f6] ? __rseq_handle_notify_resume+0xa9/0x4a0 ? mntput_no_expire+0x4a/0x240 ? __seccomp_filter+0x319/0x4d0 __x64_sys_ioctl+0x90/0xd0 do_syscall_64+0x5b/0x80 ? syscall_exit_to_user_mode+0x17/0x40 ? do_syscall_64+0x67/0x80 entry_SYSCALL_64_after_hwframe+0x63/0xcd RIP: 0033:0x7fd9b790d9bf </TASK> [CAUSE] Since commit e15e9f43c7ca ("btrfs: introduce BTRFS_QGROUP_RUNTIME_FLAG_NO_ACCOUNTING to skip qgroup accounting"), if our qgroup is already in inconsistent state, we will no longer do the time-consuming backref walk. This can leave some qgroup records without a valid old_roots ulist. Normally this is fine, as btrfs_qgroup_account_extents() would also skip those records if we have NO_ACCOUNTING flag set. But there is a small window, if we have NO_ACCOUNTING flag set, and inserted some qgroup_record without a old_roots ulist, but then the user triggered a qgroup rescan. During btrfs_qgroup_rescan(), we firstly clear NO_ACCOUNTING flag, then commit current transaction. And since we have a qgroup_record with old_roots = NULL, we trigger the WARN_ON() during btrfs_qgroup_account_extents(). [FIX] Unfortunately due to the introduction of NO_ACCOUNTING flag, the assumption that every qgroup_record would have its old_roots populated is no longer correct. Fix the false alerts and drop the WARN_ON().
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.2:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.2:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.2:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.2:rc4:*:*:*:*:*:*" ]
null
4.7
null
null
null
GHSA-5hvv-8hjx-72f5
In the Linux kernel, the following vulnerability has been resolved:nfc: nci: fix possible NULL pointer dereference in send_acknowledge()Handle memory allocation failure from nci_skb_alloc() (calling alloc_skb()) to avoid possible NULL pointer dereference.
[]
null
5.5
null
null
null
GHSA-h86g-796f-hhfq
Typo3 XSS Vulnerabilities
Cross-site Scripting (XSS) in TYPO3 before 4.3.12, 4.4.x before 4.4.9, and 4.5.x before 4.5.4 allows remote attackers to inject arbitrary web script or HTML via the tcemain flash message.
[]
null
5.4
null
null
null
CVE-2006-4777
Heap-based buffer overflow in the DirectAnimation Path Control (DirectAnimation.PathControl) COM object (daxctle.ocx) for Internet Explorer 6.0 SP1, on Chinese and possibly other Windows distributions, allows remote attackers to execute arbitrary code via unknown manipulations in arguments to the KeyFrame method, possibly related to an integer overflow, as demonstrated by daxctle2, and a different vulnerability than CVE-2006-4446.
[ "cpe:2.3:a:microsoft:ie:6.0:sp1:*:*:*:*:*:*" ]
null
null
null
7.6
null
GHSA-x7cr-m698-6v6p
Canteen Management System v1.0 was discovered to contain an arbitrary file upload vulnerability via /youthappam/php_action/editProductImage.php. This vulnerability allows attackers to execute arbitrary code via a crafted PHP file.
[]
null
7.2
null
null
null
CVE-2018-20884
cPanel before 74.0.0 allows stored XSS in the WHM File Restoration interface (SEC-367).
[ "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*" ]
null
null
5.4
3.5
null
CVE-2025-22719
WordPress VikAppointments Services Booking Calendar plugin <= 1.2.16 - CSRF to Stored XSS vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in E4J s.r.l. VikAppointments Services Booking Calendar allows Stored XSS. This issue affects VikAppointments Services Booking Calendar: from n/a through 1.2.16.
[]
null
7.1
null
null
null
CVE-2018-7886
An issue was discovered in CloudMe 1.11.0. An unauthenticated local attacker that can connect to the "CloudMe Sync" client application listening on 127.0.0.1 port 8888 can send a malicious payload causing a buffer overflow condition. This will result in code execution, as demonstrated by a TCP reverse shell, or a crash. NOTE: this vulnerability exists because of an incomplete fix for CVE-2018-6892.
[ "cpe:2.3:a:cloudme:sync:1.11.0:*:*:*:*:*:*:*" ]
null
null
7.8
4.6
null
CVE-2010-2705
Unspecified vulnerability on the HP ProCurve 1800-24G switch with software PB.03.02 and earlier, and the ProCurve 1800-8G switch with software PA.03.02 and earlier, when SNMP is enabled, allows remote attackers to obtain sensitive information via unknown vectors.
[ "cpe:2.3:o:hp:procurve_switch_software:*:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:pb.02.01:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:pb.02.02:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:pb.02.03:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:pb.02.04:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:pb.02.05:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:pb.02.06:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:pb.02.07:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:pb.02.08:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:pb.02.09:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:pb.03.00:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:pb.03.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch_1800-24g:*:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:pa.02.01:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:pa.02.02:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:pa.02.03:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:pa.02.04:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:pa.02.05:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:pa.02.06:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:pa.02.07:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:pa.02.08:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:pa.02.09:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:pa.03.00:*:*:*:*:*:*:*", "cpe:2.3:o:hp:procurve_switch_software:pa.03.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:procurve_switch_1800-8g:*:*:*:*:*:*:*:*" ]
null
null
null
6.1
null
CVE-2013-3107
VMware vCenter Server 5.1 before Update 1, when anonymous LDAP binding for Active Directory is enabled, allows remote attackers to bypass authentication by providing a valid username in conjunction with an empty password.
[ "cpe:2.3:a:vmware:vcenter_server_appliance:5.0:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
cisco-sa-duo-replay-knuNKd
Cisco Duo Authentication for macOS and Duo Authentication for Windows Logon Offline Credentials Replay Vulnerability
A vulnerability in the offline access mode of Cisco Duo Two-Factor Authentication for macOS and Duo Authentication for Windows Logon and RDP could allow an unauthenticated, physical attacker to replay valid user session credentials and gain unauthorized access to an affected macOS or Windows device. This vulnerability exists because session credentials do not properly expire. An attacker could exploit this vulnerability by replaying previously used multifactor authentication (MFA) codes to bypass MFA protection. A successful exploit could allow the attacker to gain unauthorized access to the affected device. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
[]
null
6.3
null
null
null
CVE-2020-10042
A vulnerability has been identified in SICAM MMU (All versions < V2.05), SICAM SGU (All versions), SICAM T (All versions < V2.18). A buffer overflow in various positions of the web application might enable an attacker with access to the web application to execute arbitrary code over the network.
[ "cpe:2.3:o:siemens:sicam_mmu_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:sicam_mmu:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:sicam_sgu_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:sicam_sgu:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:sicam_t_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:sicam_t:-:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
null
GHSA-xwv4-chgp-x89p
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Hyumika OSM – OpenStreetMap allows Stored XSS.This issue affects OSM – OpenStreetMap: from n/a through 6.1.2.
[]
null
6.5
null
null
null
GHSA-89ww-rmr4-f6rq
Unspecified vulnerability in JustSystems Ichitaro and Ichitaro Government 2006 through 2010 allows user-assisted remote attackers to execute arbitrary code via a crafted font file.
[]
null
null
null
null
null
GHSA-m47h-qxcc-5fhx
A vulnerability was found in DedeCMS up to 5.7.106. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file uploads/dede/article_allowurl_edit.php. The manipulation of the argument allurls leads to code injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-230083.
[]
null
null
6.3
null
null
GHSA-xc9p-r5qj-8xm9
Improper quoting of columns when calling methods "getByUuid" & "exists" on UUID Model
ImpactThe quoting is not done properly in UUID DAO model, so there's the theoretical possibility to inject custom SQL if the developer is using this methods with input data and not doing proper input validation in advance and so relies on the auto-quoting being done by the DAO class.PatchesUpdate to version 10.5.19 or apply this patch manually https://github.com/pimcore/pimcore/commit/08e7ba56ae983c3c67ec563b6989b16ef8f35275.patchWorkaroundsApply https://github.com/pimcore/pimcore/commit/08e7ba56ae983c3c67ec563b6989b16ef8f35275.patch manually.References#14633
[]
null
7.9
null
null
null
CVE-2021-35630
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Options). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all MySQL Server accessible data. CVSS 3.1 Base Score 4.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N).
[ "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*" ]
null
4.9
null
null
null
GHSA-3643-vfjq-qr3j
The aupair service (aupair.exe) in Cisco CallManager (CCM) 3.2 and earlier, 3.3 before 3.3(5), 4.0 before 4.0(2a)SR2b, and 4.1 4.1 before 4.1(3)SR1 allows remote attackers to execute arbitrary code or corrupt memory via crafted packets that trigger a memory allocation failure and lead to a buffer overflow.
[]
null
null
null
null
null
GHSA-89r9-fpqc-3hvj
Unspecified vulnerability in the web server in eMule X-Ray before 1.4 allows remote attackers to trigger memory corruption via unknown attack vectors.
[]
null
null
null
null
null
GHSA-66wv-fj93-cr23
SQL injection vulnerability in the Calendar Base (cal) extension before 1.2.1 for TYPO3 allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
[]
null
null
null
null
null
GHSA-9xq5-rrj3-9998
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
[]
null
null
null
null
null
CVE-2021-44230
PortSwigger Burp Suite Enterprise Edition before 2021.11 on Windows has weak file permissions for the embedded H2 database, which might lead to privilege escalation. This issue can be exploited by an adversary who has already compromised a valid Windows account on the server via separate means. In this scenario, the compromised account may have inherited read access to sensitive configuration, database, and log files.
[ "cpe:2.3:a:portswigger:burp_suite:*:*:*:*:enterprise:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
6.5
null
4
null
CVE-2010-2086
Apache MyFaces 1.1.7 and 1.2.8, as used in IBM WebSphere Application Server and other applications, does not properly handle an unencrypted view state, which allows remote attackers to conduct cross-site scripting (XSS) attacks or execute arbitrary Expression Language (EL) statements via vectors that involve modifying the serialized view object.
[ "cpe:2.3:a:apache:myfaces:1.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:apache:myfaces:1.2.8:*:*:*:*:*:*:*" ]
null
null
null
4
null
CVE-2013-0608
Adobe Reader and Acrobat 9.x before 9.5.3, 10.x before 10.1.5, and 11.x before 11.0.1 allow attackers to execute arbitrary code via unspecified vectors, related to a "logic error," a different vulnerability than CVE-2013-0607, CVE-2013-0611, CVE-2013-0614, and CVE-2013-0618.
[ "cpe:2.3:a:adobe:acrobat:9.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.0:-:pro:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.1:-:pro:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.1.1:-:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.1.3:-:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.2:-:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.3:-:pro:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.3.1:-:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.3.2:-:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.3.4:-:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.4:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.4.1:-:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.4.2:-:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.4.3:-:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.4.4:-:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.4.5:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.4.5:-:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.4.6:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.4.6:-:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.4.7:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.5:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:9.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:9.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:9.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:9.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:9.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:9.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:9.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:9.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:9.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:9.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:9.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:9.4:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:9.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:9.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:9.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:9.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:9.4.5:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:9.4.6:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:9.4.7:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:9.5:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:9.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:9.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.0:-:pro:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.0.1:-:pro:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:10.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:10.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:10.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:10.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:10.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:10.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:10.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:10.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:10.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:11.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:11.0:*:*:*:*:*:*:*" ]
null
null
null
10
null
CVE-2020-2611
Vulnerability in the Enterprise Manager Base Platform product of Oracle Enterprise Manager (component: Enterprise Config Management). Supported versions that are affected are 12.1.0.5, 13.2.0.0 and 13.3.0.0. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Enterprise Manager Base Platform. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Enterprise Manager Base Platform accessible data as well as unauthorized update, insert or delete access to some of Enterprise Manager Base Platform accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Enterprise Manager Base Platform. CVSS 3.0 Base Score 6.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:L).
[ "cpe:2.3:a:oracle:enterprise_manager_base_platform:12.1.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:enterprise_manager_base_platform:13.2.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:enterprise_manager_base_platform:13.3.0.0:*:*:*:*:*:*:*" ]
null
null
6
null
null
GHSA-x8pg-3h57-8v33
Unspecified vulnerability in HP Capture and Route Software (HPCR) 1.3 before Patch 7, 1.3 FP1 before Patch 1, and 1.4 before Patch 1 allows remote authenticated users to obtain sensitive information via unknown vectors.
[]
null
null
null
null
null
CVE-2023-5192
Excessive Data Query Operations in a Large Data Table in pimcore/demo
Excessive Data Query Operations in a Large Data Table in GitHub repository pimcore/demo prior to 10.3.0.
[ "cpe:2.3:a:pimcore:pimcore:*:*:*:*:*:*:*:*", "cpe:2.3:a:pimcore:core:*:*:*:*:*:*:*:*" ]
null
null
6.1
null
null
CVE-2014-6734
The Wine Making (aka com.gcspublishing.winemakingtalk) application 3.7.15 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[ "cpe:2.3:a:gcspublishing:wine_making:3.7.15:*:*:*:*:android:*:*" ]
null
null
null
5.4
null
GHSA-f392-jc49-593j
Trend Micro's Virus Scan API (VSAPI) and Advanced Threat Scan Engine (ATSE) - are vulnerable to a memory exhaustion vulnerability that may lead to denial-of-service or system freeze if exploited by an attacker using a specially crafted file.
[]
null
null
null
null
null
CVE-2007-6121
Wireshark (formerly Ethereal) 0.8.16 to 0.99.6 allows remote attackers to cause a denial of service (crash) via a malformed RPC Portmap packet.
[ "cpe:2.3:a:ethereal_group:ethereal:0.8.16:*:*:*:*:*:*:*", "cpe:2.3:a:ethereal_group:ethereal:0.8.17:*:*:*:*:*:*:*", "cpe:2.3:a:ethereal_group:ethereal:0.8.17a:*:*:*:*:*:*:*", "cpe:2.3:a:ethereal_group:ethereal:0.8.18:*:*:*:*:*:*:*", "cpe:2.3:a:ethereal_group:ethereal:0.8.19:*:*:*:*:*:*:*", "cpe:2.3:a:ethereal_group:ethereal:0.8.20:*:*:*:*:*:*:*", "cpe:2.3:a:ethereal_group:ethereal:0.9:*:*:*:*:*:*:*", "cpe:2.3:a:ethereal_group:ethereal:0.9.0:*:*:*:*:*:*:*", "cpe:2.3:a:ethereal_group:ethereal:0.9.1:*:*:*:*:*:*:*", "cpe:2.3:a:ethereal_group:ethereal:0.9.2:*:*:*:*:*:*:*", "cpe:2.3:a:ethereal_group:ethereal:0.9.3:*:*:*:*:*:*:*", "cpe:2.3:a:ethereal_group:ethereal:0.9.4:*:*:*:*:*:*:*", "cpe:2.3:a:ethereal_group:ethereal:0.9.5:*:*:*:*:*:*:*", "cpe:2.3:a:ethereal_group:ethereal:0.9.6:*:*:*:*:*:*:*", "cpe:2.3:a:ethereal_group:ethereal:0.9.7:*:*:*:*:*:*:*", "cpe:2.3:a:ethereal_group:ethereal:0.9.8:*:*:*:*:*:*:*", "cpe:2.3:a:ethereal_group:ethereal:0.9.9:*:*:*:*:*:*:*", "cpe:2.3:a:ethereal_group:ethereal:0.9.10:*:*:*:*:*:*:*", "cpe:2.3:a:ethereal_group:ethereal:0.9.11:*:*:*:*:*:*:*", "cpe:2.3:a:ethereal_group:ethereal:0.9.12:*:*:*:*:*:*:*", "cpe:2.3:a:ethereal_group:ethereal:0.9.13:*:*:*:*:*:*:*", "cpe:2.3:a:ethereal_group:ethereal:0.9.14:*:*:*:*:*:*:*", "cpe:2.3:a:ethereal_group:ethereal:0.9.15:*:*:*:*:*:*:*", "cpe:2.3:a:ethereal_group:ethereal:0.9.16:*:*:*:*:*:*:*", "cpe:2.3:a:ethereal_group:ethereal:0.10:*:*:*:*:*:*:*", "cpe:2.3:a:ethereal_group:ethereal:0.10.0:*:*:*:*:*:*:*", "cpe:2.3:a:ethereal_group:ethereal:0.10.0a:*:*:*:*:*:*:*", "cpe:2.3:a:ethereal_group:ethereal:0.10.1:*:*:*:*:*:*:*", "cpe:2.3:a:ethereal_group:ethereal:0.10.2:*:*:*:*:*:*:*", "cpe:2.3:a:ethereal_group:ethereal:0.10.3:*:*:*:*:*:*:*", "cpe:2.3:a:ethereal_group:ethereal:0.10.4:*:*:*:*:*:*:*", "cpe:2.3:a:ethereal_group:ethereal:0.10.5:*:*:*:*:*:*:*", "cpe:2.3:a:ethereal_group:ethereal:0.10.6:*:*:*:*:*:*:*", "cpe:2.3:a:ethereal_group:ethereal:0.10.7:*:*:*:*:*:*:*", "cpe:2.3:a:ethereal_group:ethereal:0.10.8:*:*:*:*:*:*:*", "cpe:2.3:a:ethereal_group:ethereal:0.10.9:*:*:*:*:*:*:*", "cpe:2.3:a:ethereal_group:ethereal:0.10.10:*:*:*:*:*:*:*", "cpe:2.3:a:ethereal_group:ethereal:0.10.11:*:*:*:*:*:*:*", "cpe:2.3:a:ethereal_group:ethereal:0.10.12:*:*:*:*:*:*:*", "cpe:2.3:a:ethereal_group:ethereal:0.10.13:*:*:*:*:*:*:*", "cpe:2.3:a:ethereal_group:ethereal:0.10.14:*:*:*:*:*:*:*", "cpe:2.3:a:ethereal_group:ethereal:0.99.0:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:0.8.16:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:0.9.8:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:0.9.10:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:0.99:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:0.99.0:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:0.99.1:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:0.99.2:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:0.99.3:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:0.99.4:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:0.99.5:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:0.99.6:*:*:*:*:*:*:*" ]
null
null
null
5
null
GHSA-55vh-3864-h8c8
A vulnerability was found in China Mobile P22g-CIac, ZXWT-MIG-P4G4V, ZXWT-MIG-P8G8V, GT3200-4G4P and GT3200-8G8P up to 20250305. It has been rated as critical. This issue affects some unknown processing of the component CLI su Command Handler. The manipulation leads to use of default credentials. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
[]
8.6
7.2
null
null
null
GHSA-3w7x-89vw-qj79
** DISPUTED ** SQL injection vulnerability in search.php in X-Cart Gold and Pro 4.0.18, and X-Cart 4.1.0 beta 1, allows remote attackers to execute arbitrary SQL commands via the "Search for pattern" field, when the settings specify only "Search in Detailed description" and "Search also in ISBN." NOTE: the vendor disputed this issue in a comment on the original researcher's blog, saying "the bug does not impose any security threat and remote attackers can't add, modify, or delete information in the back-end database by sending specially-crafted SQL statements to the search.php script using various search parameters." As of 20060605, the original blog entry is unavailable, although ISS also reports the same dispute. CVE has not been able to investigate this issue further, although the researcher sometimes makes inaccurate claims.
[]
null
9.8
null
null
null
GHSA-7hh6-7v6v-4v2c
HEVC Video Extensions Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-24089, CVE-2021-26902, CVE-2021-27047, CVE-2021-27048, CVE-2021-27049, CVE-2021-27050, CVE-2021-27051, CVE-2021-27061, CVE-2021-27062.
[]
null
7.8
null
null
null
GHSA-29g2-g2r5-p4x5
SchedMD Slurm before 17.11.13 and 18.x before 18.08.5 mishandles 32-bit systems.
[]
null
null
9.8
null
null
GHSA-6mjw-gpqr-2788
An issue has been discovered in GitLab CE/EE affecting all versions starting from 15.11 prior to 16.9.7, starting from 16.10 prior to 16.10.5, and starting from 16.11 prior to 16.11.2. The pins endpoint is susceptible to DoS through a crafted request.
[]
null
6.5
null
null
null
GHSA-94gx-rm2c-cw59
A Improper Certificate Validation vulnerability in susestudio-common of SUSE Studio onsite allows remote attackers to MITM connections to the repositories, which allows the modification of packages received over these connections. This issue affects: SUSE Studio onsite susestudio-common version 1.3.17-56.6.3 and prior versions.
[]
null
null
null
null
null
CVE-2024-45149
Adobe Commerce | Improper Access Control (CWE-284)
Adobe Commerce versions 2.4.7-p2, 2.4.6-p7, 2.4.5-p9, 2.4.4-p10 and earlier are affected by an Improper Access Control vulnerability that could result in a Security feature bypass. A high-privileged attacker could leverage this vulnerability to bypass security measures and have a low impact on confidentiality. Exploitation of this issue does not require user interaction.
[ "cpe:2.3:a:adobe:commerce:2.4.4:-:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.4:p1:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.4:p10:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.4:p2:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.4:p3:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.4:p4:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.4:p5:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.4:p6:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.4:p7:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.4:p8:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.4:p9:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.5:-:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.5:p1:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.5:p2:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.5:p3:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.5:p4:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.5:p5:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.5:p6:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.5:p7:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.5:p8:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.5:p9:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.6:-:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.6:p1:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.6:p2:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.6:p3:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.6:p4:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.6:p5:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.6:p6:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.6:p7:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.7:-:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.7:b1:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.7:b2:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.7:p1:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.7:p2:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce_b2b:1.3.3:-:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p10:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce_b2b:1.3.4:-:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p9:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce_b2b:1.3.5:-:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p7:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce_b2b:1.4.2:-:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p1:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p2:*:*:*:*:*:*", "cpe:2.3:a:adobe:magento:2.4.4:-:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.4:p1:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.4:p10:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.4:p2:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.4:p3:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.4:p4:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.4:p5:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.4:p6:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.4:p7:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.4:p8:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.4:p9:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.5:-:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.5:p1:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.5:p2:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.5:p3:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.5:p4:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.5:p5:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.5:p6:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.5:p7:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.5:p8:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.5:p9:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.6:-:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.6:p1:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.6:p2:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.6:p3:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.6:p4:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.6:p5:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.6:p6:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.6:p7:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.7:-:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.7:b1:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.7:p1:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.7:p2:*:*:open_source:*:*:*" ]
null
2.7
null
null
null
CVE-2013-7077
Cross-site scripting (XSS) vulnerability in the Backend User Administration Module in TYPO3 6.0.x before 6.0.12 and 6.1.x before 6.1.7 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
[ "cpe:2.3:a:typo3:typo3:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:6.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:6.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:6.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:6.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:6.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:6.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:6.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:6.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:6.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:6.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:6.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:6.1:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:6.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:6.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:6.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:6.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:6.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:6.1.6:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
CVE-2007-4405
ircu 2.10.12.02 through 2.10.12.04 allows remote attackers to cause a denial of service (memory and bandwidth consumption) by creating a large number of unused channels (zannels).
[ "cpe:2.3:a:universal_ircd:ircu:2.10.12.02:*:*:*:*:*:*:*", "cpe:2.3:a:universal_ircd:ircu:2.10.12.03:*:*:*:*:*:*:*", "cpe:2.3:a:universal_ircd:ircu:2.10.12.04:*:*:*:*:*:*:*" ]
null
null
null
7.8
null
GHSA-fvc9-hg4x-m85q
A CWE-248: Uncaught Exception vulnerability exists in all versions of the Modicon M580, Modicon M340, Modicon Quantum, and Modicon Premium which could cause a possible Denial of Service when writing out of bounds variables to the controller over Modbus.
[]
null
null
null
null
null
CVE-2020-1104
A spoofing vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server, aka 'Microsoft SharePoint Spoofing Vulnerability'. This CVE ID is unique from CVE-2020-1105, CVE-2020-1107.
[ "cpe:2.3:a:microsoft:sharepoint_enterprise_server:2016:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sharepoint_foundation:2013:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sharepoint_server:2019:*:*:*:*:*:*:*" ]
null
5.4
null
3.5
null
GHSA-7mmj-92xq-hjg8
TCPServer.cpp in SimpleNetwork through 29bc615 has an off-by-one error that causes a buffer overflow when trying to add '\0' to the end of long msg data. It can be exploited via crafted TCP packets.
[]
null
7.5
null
null
null
GHSA-5v2v-rv23-5w86
Adobe Framemaker versions 2019.0.4 and below have a heap overflow vulnerability. Successful exploitation could lead to arbitrary code execution.
[]
null
null
null
null
null
CVE-2014-2373
The web server on the AXN-NET Ethernet module accessory 3.04 for the Accuenergy Acuvim II allows remote attackers to bypass authentication and modify settings via a direct request to an unspecified URL.
[ "cpe:2.3:o:accuenergy:axm-net:3.04:*:*:*:*:*:*:*", "cpe:2.3:h:accuenergy:acuvim_ii:-:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
GHSA-x37h-gw64-9x26
Unquoted Windows search path vulnerability in Toshiba Bluetooth Stack for Windows before 9.10.32(T) and Service Station before 2.2.14 allows local users to gain privileges via a Trojan horse application with a name composed of an initial substring of a path that contains a space character.
[]
null
null
null
null
null
GHSA-c264-8834-ppj2
CSRF vulnerability in Jenkins Swarm Plugin
Swarm Plugin adds API endpoints to add or remove agent labels. In Swarm Plugin 3.20 and earlier these only require a global Swarm secret to use, and no regular permission check is performed. This allows users with Agent/Create permission to add or remove labels of any agent.Additionally, these API endpoints do not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability.Swarm Plugin 3.21 requires POST requests and Agent/Configure permission for the affected agent to these endpoints. It no longer uses the global Swarm secret for these API endpoints.
[]
null
5.4
null
null
null
CVE-2015-6581
Double free vulnerability in the opj_j2k_copy_default_tcp_and_create_tcd function in j2k.c in OpenJPEG before r3002, as used in PDFium in Google Chrome before 45.0.2454.85, allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) by triggering a memory-allocation failure.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
GHSA-5cf3-7cgv-9rv9
Multiple cross-site scripting (XSS) vulnerabilities in the commentary in Evo-Dev evoBlog allow remote attackers to inject arbitrary web script or HTML via (1) the name parameter and (2) other unspecified parameters.
[]
null
null
null
null
null
CVE-2018-16389
e107_admin/banlist.php in e107 2.1.8 allows SQL injection via the old_ip parameter.
[ "cpe:2.3:a:e107:e107:2.1.8:*:*:*:*:*:*:*" ]
null
null
6.5
5.5
null
cisco-sa-sb-rv32x-cmdinject-cKQsZpxL
Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers Command Injection Vulnerabilities
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers could allow an authenticated, remote attacker to inject and execute arbitrary commands on the underlying operating system of an affected device. These vulnerabilities are due to insufficient validation of user-supplied input. An attacker could exploit these vulnerabilities by sending malicious input to an affected device. A successful exploit could allow the attacker to execute arbitrary commands as the root user on the underlying Linux operating system of the affected device. To exploit these vulnerabilities, an attacker would need to have valid Administrator credentials on the affected device. Cisco has not released software updates to address these vulnerabilities. There are no workarounds that address these vulnerabilities.
[]
null
6.5
null
null
null
GHSA-4gc8-mmm3-6xff
Uncontrolled Search Path Element vulnerability in ICONICS GENESIS64 all versions, Mitsubishi Electric GENESIS64 all versions and Mitsubishi Electric MC Works64 all versions allows a local authenticated attacker to execute a malicious code by storing a specially crafted DLL in a specific folder. This could lead to disclose, tamper with, destroy, or delete information in the affected products, or cause a denial of service (DoS) condition on the products.
[]
null
7.8
null
null
null
CVE-2016-7016
Adobe Reader and Acrobat before 11.0.18, Acrobat and Acrobat Reader DC Classic before 15.006.30243, and Acrobat and Acrobat Reader DC Continuous before 15.020.20039 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-6940, CVE-2016-6941, CVE-2016-6942, CVE-2016-6943, CVE-2016-6947, CVE-2016-6948, CVE-2016-6950, CVE-2016-6951, CVE-2016-6954, CVE-2016-6955, CVE-2016-6956, CVE-2016-6959, CVE-2016-6960, CVE-2016-6966, CVE-2016-6970, CVE-2016-6972, CVE-2016-6973, CVE-2016-6974, CVE-2016-6975, CVE-2016-6976, CVE-2016-6977, CVE-2016-6978, CVE-2016-6995, CVE-2016-6996, CVE-2016-6997, CVE-2016-6998, CVE-2016-7000, CVE-2016-7001, CVE-2016-7002, CVE-2016-7003, CVE-2016-7004, CVE-2016-7005, CVE-2016-7006, CVE-2016-7007, CVE-2016-7008, CVE-2016-7009, CVE-2016-7010, CVE-2016-7011, CVE-2016-7012, CVE-2016-7013, CVE-2016-7014, CVE-2016-7015, CVE-2016-7017, CVE-2016-7018, and CVE-2016-7019.
[ "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:reader:*:*:*:*:*:*:*:*" ]
null
null
9.8
10
null
CVE-2005-2210
Stack-based buffer overflow in Internet Download Manager 4.05 allows remote attackers to execute arbitrary code via a long URL.
[ "cpe:2.3:a:tonec_inc.:internet_download_manager:4.05:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2023-37378
Nullsoft Scriptable Install System (NSIS) before 3.09 mishandles access control for an uninstaller directory.
[ "cpe:2.3:a:nullsoft:nullsoft_scriptable_install_system:*:*:*:*:*:*:*:*" ]
null
5.3
null
null
null
GHSA-mwfh-4q4p-rw3p
In Core Utilities, there is a possible way to craft a malformed Uri object due to improper input validation. This could lead to local escalation of privilege, preventing processes from validating URIs correctly, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-171966843
[]
null
3.3
null
null
null
CVE-2014-125050
ScottTZhang voter-js main.js sql injection
A vulnerability was found in ScottTZhang voter-js and classified as critical. Affected by this issue is some unknown functionality of the file main.js. The manipulation leads to sql injection. The patch is identified as 6317c67a56061aeeaeed3cf9ec665fd9983d8044. It is recommended to apply a patch to fix this issue. VDB-217562 is the identifier assigned to this vulnerability.
[ "cpe:2.3:a:voter-js_project:voter-js:*:*:*:*:*:*:*:*" ]
null
5.5
5.5
5.2
https://github.com/ScottTZhang/voter-js/commit/6317c67a56061aeeaeed3cf9ec665fd9983d8044
CVE-2024-13359
Product Input Fields for WooCommerce <= 1.12.0 - Unauthenticated Limited File Upload
The Product Input Fields for WooCommerce plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file type validation in the add_product_input_fields_to_order_item_meta() function in all versions up to, and including, 1.12.0. This may make it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible. Please note that by default the plugin is only vulnerable to a double extension file upload attack, unless an administrators leaves the accepted file extensions field blank which can make .php file uploads possible. Please note 1.12.2 was mistakenly marked as patched while 1.12.1 was marked as vulnerable for a short period of time, this is not the case and 1.12.1 is fully patched.
[]
null
8.1
null
null
null
GHSA-g23c-4prh-q9fg
Helpy version 2.8.0 allows an unauthenticated remote attacker to exploit an XSS stored in the application. This is possible because the application does not correctly validate the attachments sent by customers in the ticket.
[]
null
6.1
null
null
null
CVE-2012-2316
Cross-site request forgery (CSRF) vulnerability in servlet/admin/AuthServlet.java in OpenKM 5.1.7 and other versions before 5.1.8-2 allows remote attackers to hijack the authentication of administrators for requests that execute arbitrary code via the script parameter to admin/scripting.jsp.
[ "cpe:2.3:a:openkm:openkm:5.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:openkm:openkm:5.1.8:*:*:*:*:*:*:*" ]
null
null
null
6.8
null
CVE-2020-9820
A logic issue was addressed with improved restrictions. This issue is fixed in iOS 13.5 and iPadOS 13.5. A remote attacker may be able to modify the file system.
[ "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" ]
null
7.5
null
5
null
CVE-2021-38371
The STARTTLS feature in Exim through 4.94.2 allows response injection (buffering) during MTA SMTP sending.
[ "cpe:2.3:a:exim:exim:*:*:*:*:*:*:*:*" ]
null
7.5
null
5
null
CVE-2020-6650
Arbitrary code execution through “Update Manager” Class
UPS companion software v1.05 & Prior is affected by ‘Eval Injection’ vulnerability. The software does not neutralize or incorrectly neutralizes code syntax before using the input in a dynamic evaluation call e.g.”eval” in “Update Manager” class when software attempts to see if there are updates available. This results in arbitrary code execution on the machine where software is installed.
[ "cpe:2.3:a:eaton:ups_companion:*:*:*:*:*:*:*:*" ]
null
8.3
null
null
null
CVE-2021-46033
In ForestBlog, as of 2021-12-28, File upload can bypass verification.
[ "cpe:2.3:a:forestblog_project:forestblog:-:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
null
CVE-2009-2711
XScreenSaver in Sun Solaris 9 and 10, OpenSolaris before snv_120, and X11 6.4.1 for Solaris 8, when the Xorg or Xnewt server is used, allows physically proximate attackers to obtain sensitive information by reading popup windows, which are displayed even when the screen is locked, a different vulnerability than CVE-2009-1276.
[ "cpe:2.3:o:sun:opensolaris:snv_01:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_02:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_03:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_04:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_05:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_06:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_07:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_08:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_09:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_10:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_11:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_12:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_13:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_14:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_15:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_16:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_17:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_18:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_19:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_20:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_21:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_22:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_23:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_24:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_25:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_26:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_27:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_28:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_29:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_30:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_31:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_32:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_33:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_34:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_35:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_36:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_37:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_38:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_39:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_40:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_41:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_42:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_43:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_44:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_45:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_46:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_47:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_48:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_49:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_50:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_51:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_52:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_53:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_54:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_55:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_56:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_57:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_58:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_59:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_60:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_61:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_62:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_63:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_64:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_65:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_66:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_67:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_68:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_69:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_70:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_71:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_72:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_73:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_74:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_75:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_76:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_77:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_78:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_79:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_80:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_81:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_82:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_83:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_84:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_85:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_86:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_87:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_88:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_89:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_90:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_91:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_92:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_93:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_94:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_95:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_96:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_97:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_98:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_99:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_100:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_101:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_102:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_103:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_104:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_105:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_106:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_107:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_108:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_109:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_110:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_111:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_112:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_113:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_114:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_115:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_116:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_117:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_118:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_119:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:solaris:9.0:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:solaris:10:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_01:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_02:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_03:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_04:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_05:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_06:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_07:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_08:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_09:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_10:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_11:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_12:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_13:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_14:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_15:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_16:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_17:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_18:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_19:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_20:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_21:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_22:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_23:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_24:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_25:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_26:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_27:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_28:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_29:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_30:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_31:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_32:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_33:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_34:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_35:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_36:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_37:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_38:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_39:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_40:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_41:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_42:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_43:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_44:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_45:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_46:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_47:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_48:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_49:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_50:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_51:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_52:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_53:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_54:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_55:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_56:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_57:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_58:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_59:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_60:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_61:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_62:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_63:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_64:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_65:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_66:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_67:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_68:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_69:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_70:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_71:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_72:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_73:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_74:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_75:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_76:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_77:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_78:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_79:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_80:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_81:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_100:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_101:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_102:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_103:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_104:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_105:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_106:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_107:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_108:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_109:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_110:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_111:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_112:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_113:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_114:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_115:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_116:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_117:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_118:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_119:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:solaris:8.0:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:solaris:9.0:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:solaris:10:*:sparc:*:*:*:*:*", "cpe:2.3:a:x.org:x11:6.4.1:*:*:*:*:*:*:*" ]
null
null
null
4.9
null
CVE-2021-42527
Adobe Premiere Elements PSD file memory corruption vulnerability could lead to arbitrary code execution
Adobe Premiere Elements 20210809.daily.2242976 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.
[ "cpe:2.3:a:adobe:premiere_elements:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
7.8
null
null
null
GHSA-xxp3-fcv5-mx3m
JerryScript 2.2.0 allows attackers to cause a denial of service (assertion failure) because a property key query for a Proxy object returns unintended data.
[]
null
null
null
null
null
GHSA-v28f-cf4w-7rcj
Jeesite 1.2.7 uses the apache shiro version 1.2.3 affected by CVE-2016-4437. Because of this version of the java deserialization vulnerability, an attacker could exploit the vulnerability to execute arbitrary commands via the rememberMe parameter.
[]
null
9.8
null
null
null
CVE-2005-4435
Cross-site scripting (XSS) vulnerability in index.php AbleDesign D-Man 3.x allows remote attackers to inject arbitrary web script or HTML via the title parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
[ "cpe:2.3:a:abledesign:d-man:3.0:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
CVE-2013-0471
The traditional scheduler in the client in IBM Tivoli Storage Manager (TSM) before 6.2.5.0, 6.3 before 6.3.1.0, and 6.4 before 6.4.0.1, when Prompted mode is enabled, allows remote attackers to cause a denial of service (scheduling outage) via unspecified vectors.
[ "cpe:2.3:a:ibm:tivoli_storage_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:3.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:3.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:4.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:4.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:4.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:4.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:4.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:5.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:5.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:5.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:5.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:5.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:5.1.8:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:5.1.9:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:5.1.10:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:5.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:5.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:5.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:5.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:5.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:5.2.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:5.2.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:5.2.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:5.2.7:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:5.2.8:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:5.2.9:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:5.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:5.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:5.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:5.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:5.3.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:5.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:5.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:5.3.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:5.3.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:5.3.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:5.3.6.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:5.3.6.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:5.3.6.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:5.3.6.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:5.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:5.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:5.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:5.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:5.4.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:5.4.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:5.4.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:5.4.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:5.4.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:5.4.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:5.4.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:5.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:5.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:5.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:6.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:6.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:6.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:6.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:6.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:6.2.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:6.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:6.3.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:6.4.0.0:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
GHSA-384j-hgrr-qp35
An issue was discovered in LINBIT csync2 through 2.0. csync_daemon_session in daemon.c neglects to force a failure of a hello command when the configuration requires use of SSL.
[]
null
null
null
null
null
GHSA-mr4j-7jjv-24m7
Jenkins Extra Columns Plugin allows Cross-Site Scripting (XSS)
Cross-site scripting (XSS) vulnerability in the Extra Columns plugin before 1.17 in Jenkins allows remote attackers to inject arbitrary web script or HTML by leveraging failure to filter tool tips through the configured markup formatter.
[]
null
5.4
null
null
null
GHSA-w62j-xhgm-2ggr
An exploitable arbitrary memory read vulnerability exists in the MQTT packet-parsing functionality of Cesanta Mongoose 6.13. It is a heap-based buffer over-read in mg_mqtt_next_subscribe_topic. A specially crafted MQTT SUBSCRIBE packet can cause an arbitrary out-of-bounds memory read potentially resulting in information disclosure and denial of service. An attacker needs to send a specially crafted MQTT packet over the network to trigger this vulnerability.
[]
null
null
9.1
null
null
CVE-2023-6756
Thecosy IceCMS Captcha login excessive authentication
A vulnerability was found in Thecosy IceCMS 2.0.1. It has been classified as problematic. Affected is an unknown function of the file /login of the component Captcha Handler. The manipulation leads to improper restriction of excessive authentication attempts. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-247884.
[ "cpe:2.3:a:thecosy:icecms:2.0.1:*:*:*:*:*:*:*" ]
null
5.3
5.3
5
null
CVE-2024-13645
TagDiv Composer <= 5.3 - Unauthenticated Arbitrary PHP Object Instantiation
The tagDiv Composer plugin for WordPress is vulnerable to PHP Object Instantiation in all versions up to, and including, 5.3 via module parameter. This makes it possible for unauthenticated attackers to Instantiate a PHP Object. No known POP chain is present in the vulnerable software, which means this vulnerability has no impact unless another plugin or theme containing a POP chain is installed on the site. If a POP chain is present via an additional plugin or theme installed on the target system, it may allow the attacker to perform actions like delete arbitrary files, retrieve sensitive data, or execute code depending on the POP chain present.
[]
null
9.8
null
null
null
CVE-2023-4549
DoLogin Security < 3.7 - Unauthenticated Stored Cross-Site Scripting
The DoLogin Security WordPress plugin before 3.7 does not properly sanitize IP addresses coming from the X-Forwarded-For header, which can be used by attackers to conduct Stored XSS attacks via WordPress' login form.
[ "cpe:2.3:a:wpdo5ea:dologin_security:*:*:*:*:*:wordpress:*:*" ]
null
6.1
null
null
null
CVE-2024-23642
GeoServer Stored Cross-Site Scripting (XSS) vulnerability in Simple SVG Renderer
GeoServer is an open source software server written in Java that allows users to share and edit geospatial data. A stored cross-site scripting (XSS) vulnerability exists in versions prior to 2.23.4 and 2.24.1 that enables an authenticated administrator with workspace-level privileges to store a JavaScript payload in the GeoServer catalog that will execute in the context of another user's browser when viewed in the WMS GetMap SVG Output Format when the Simple SVG renderer is enabled. Access to the WMS SVG Format is available to all users by default although data and service security may limit users' ability to trigger the XSS. Versions 2.23.4 and 2.24.1 contain a fix for this issue.
[ "cpe:2.3:a:geoserver:geoserver:*:*:*:*:*:*:*:*", "cpe:2.3:a:geoserver:geoserver:2.24.0:-:*:*:*:*:*:*" ]
null
4.8
null
null
null
GHSA-h263-cqx8-8926
nwclient.c in ncpfs before 2.2.6 does not drop root privileges before executing utilities using the NetWare client functions, which allows local users to gain privileges.
[]
null
null
null
null
null
GHSA-4382-q932-v2gr
This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Desktop Parallels Desktop version 14.1.3 (45485). An attacker must first obtain the ability to execute low-privileged code on the target guest system in order to exploit this vulnerability. The specific flaw exists within the Parallels Service. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to escalate privileges and execute code in the context of root. Was ZDI-CAN-8685.
[]
null
null
null
null
null
GHSA-xgvp-37rp-x96c
WordPress before 5.3.1 allowed an attacker to create a cross-site scripting attack (XSS) in well crafted links, because of an insufficient protection mechanism in wp_targeted_link_rel in wp-includes/formatting.php.
[]
null
6.1
null
null
null
CVE-2010-3534
Unspecified vulnerability in the Primavera P6 Enterprise Project Portfolio Management component in Oracle Primavera Products Suite 6.21.3.0 and 7.0.1.0 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to the Project Management Module.
[ "cpe:2.3:a:oracle:primavera_product_suite:6.21.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:primavera_product_suite:7.0.1.0:*:*:*:*:*:*:*" ]
null
null
null
4.6
null
CVE-2022-3341
A null pointer dereference issue was discovered in 'FFmpeg' in decode_main_header() function of libavformat/nutdec.c file. The flaw occurs because the function lacks check of the return value of avformat_new_stream() and triggers the null pointer dereference error, causing an application to crash.
[ "cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*" ]
null
5.3
null
null
null
GHSA-794g-pjcw-ggfp
A flaw was found in GLib. GVariant deserialization fails to validate that the input conforms to the expected format, leading to denial of service.
[]
null
5.5
null
null
null
GHSA-xp28-88f3-2f49
The wp-affiliate-platform WordPress plugin before 6.5.2 does not have CSRF check in place when deleting affiliates, which could allow attackers to make a logged in user change delete them via a CSRF attack
[]
null
5.5
null
null
null
GHSA-r63p-7c56-c4v7
Buffer overflow in Berkeley parallel make (pmake) 2.1.33 and earlier allows a local user to gain root privileges via a long check argument of a shell definition.
[]
null
null
null
null
null