id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
189k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
patch_commit_url
stringlengths
38
232
GHSA-5rqf-f3pf-3555
Michael Still gtalkbot before 1.2 places username and password arguments on the command line, which allows local users to obtain sensitive information by listing the process.
[]
null
null
null
null
null
CVE-2008-5784
V3 Chat - Profiles/Dating Script 3.0.2 allows remote attackers to bypass authentication and gain administrative access by setting the admin cookie to 1.
[ "cpe:2.3:a:v3chat:v3_chat_profiles_dating_script:3.0.2:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
null
GHSA-29jh-ww6h-mpqh
CodiMD 1.3.1, when Safari is used, allows XSS via an IFRAME element with allow-top-navigation in the sandbox attribute, in conjunction with a data: URL.
[]
null
6.1
null
null
null
RHSA-2020:2108
Red Hat Security Advisory: Red Hat Single Sign-On 7.3.8 security update on RHEL 8
keycloak: security issue on reset credential flow keycloak: problem with privacy after user logout keycloak: improper verification of certificate with host mismatch could result in information disclosure
[ "cpe:/a:redhat:red_hat_single_sign_on:7::el8" ]
null
5.3
null
null
null
GHSA-493f-vcwv-8c8r
In SUPERAntiSpyware Professional Trial 6.0.1254, the driver file (SASKUTIL.SYS) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x9C402080.
[]
null
null
7.8
null
null
GHSA-4vhr-6jhx-vf2q
Gimp before 2.8.22 allows context-dependent attackers to cause a denial of service (crash) via an ICO file with an InfoHeader containing a Height of zero, a similar issue to CVE-2007-2237.
[]
null
null
null
null
null
CVE-2021-38666
Remote Desktop Client Remote Code Execution Vulnerability
Remote Desktop Client Remote Code Execution Vulnerability
[ "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2300:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2300:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2300:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2300:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1916:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1916:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1809:10.0.18363.1916:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1348:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1348:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1348:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.350:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1809:10.0.19041.1348:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2004:10.0.19041.1348:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_20h2:10.0.19042.1348:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_20h2:10.0.19042.1348:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_server_20h2:10.0.19041.1348:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11_21h2:10.0.22000.318:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_11_21h2:10.0.22000.318:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19119:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19119:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.4770:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.4770:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.4770:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:6.1.7601.25769:sp1:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_7:6.1.7601.25769:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20174:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20174:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_rt_8.1:6.3.9600.20174:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21282:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21282:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_server_2008_r2:6.1.7601.25769:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23517:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012_r2:6.3.9600.20174:*:*:*:*:*:x64:*" ]
null
8.8
null
null
null
GHSA-4pp7-562r-m34f
Invalid memory read in the PoDoFo::PdfVariant::DelayedLoad() function in PdfVariant.h in PoDoFo 0.9.6-rc1 allows remote attackers to have denial-of-service impact via a crafted file.
[]
null
null
5.5
null
null
GHSA-4pfh-pqfv-vhrc
Unspecified vulnerability in HP Intelligent Management Center (iMC) and HP IMC Service Operation Management Software Module allows remote attackers to bypass authentication via unknown vectors, aka ZDI-CAN-1644.
[]
null
null
null
null
null
CVE-2025-1859
PHPGurukul News Portal login.php sql injection
A vulnerability, which was classified as critical, has been found in PHPGurukul News Portal 4.1. This issue affects some unknown processing of the file /login.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
[]
6.9
7.3
7.3
7.5
null
GHSA-3g3p-3q57-722m
Azure Arc-enabled Kubernetes Extension Cluster-Scope Elevation of Privilege Vulnerability
[]
null
6.2
null
null
null
GHSA-34q4-48x9-q5fv
An issue was discovered on SendQuick Entera and Avera devices before 2HF16. Multiple Command Injection vulnerabilities allow attackers to execute arbitrary system commands.
[]
null
null
9.8
null
null
RHSA-2020:1054
Red Hat Security Advisory: mailman security and bug fix update
mailman: Cross-site scripting vulnerability allows malicious listowners to inject scripts into listinfo pages mailman: Mishandled URLs in Utils.py:GetPathPieces() allows attackers to display arbitrary text on trusted sites
[ "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
4.3
null
null
GHSA-fp8m-xw3f-6h7x
Bolt Cross-site Scripting (XSS) via an image's alt or title field
Bolt before 3.6.10 has XSS via an image's alt or title field.
[]
null
null
6.1
null
null
CVE-2024-34595
Improper access control in clickAdapterItem of SystemUI prior to SMR Jul-2024 Release 1 allows local attackers to launch privileged activities.
[ "cpe:2.3:o:samsung:android:14.0:-:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:-:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-apr-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-apr-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-apr-2024-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-aug-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-aug-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-dec-2021-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-dec-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-dec-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-feb-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-feb-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-feb-2024-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-jan-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-jan-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-jan-2024-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-jul-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-jul-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-jun-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-jun-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-jun-2024-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-mar-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-mar-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-mar-2024-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-may-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-may-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-may-2024-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-nov-2021-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-nov-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-nov-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-oct-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-oct-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-sep-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-sep-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:-:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-apr-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-apr-2024-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-aug-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-dec-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-dec-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-feb-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-feb-2024-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-jan-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-jan-2024-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-jul-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-jun-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-jun-2024-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-mar-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-mar-2024-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-may-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-may-2024-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-nov-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-nov-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-oct-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-oct-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-sep-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-apr-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-apr-2024-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-aug-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-dec-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-dec-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-feb-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-jan-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-jan-2024-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-jul-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-jun-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-jun-2024-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-mar-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-mar-2024-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-may-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-may-2024-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-nov-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-nov-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-oct-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-oct-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-sep-2023-r1:*:*:*:*:*:*" ]
null
7.8
null
null
null
GHSA-6hfc-grwp-2p9c
GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka "ShellShock." NOTE: the original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix.
[]
null
9.8
null
null
null
CVE-2022-49773
drm/amd/display: Fix optc2_configure warning on dcn314
In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Fix optc2_configure warning on dcn314 [Why] dcn314 uses optc2_configure_crc() that wraps optc1_configure_crc() + set additional registers not applicable to dcn314. It's not critical but when used leads to warning like: WARNING: drivers/gpu/drm/amd/amdgpu/../display/dc/dc_helper.c Call Trace: <TASK> generic_reg_set_ex+0x6d/0xe0 [amdgpu] optc2_configure_crc+0x60/0x80 [amdgpu] dc_stream_configure_crc+0x129/0x150 [amdgpu] amdgpu_dm_crtc_configure_crc_source+0x5d/0xe0 [amdgpu] [How] Use optc1_configure_crc() directly
[]
null
null
null
null
null
GHSA-j7w7-v5fm-7hg5
hpnst.exe in the GoAhead-Webs webserver for HP Instant TopTools before 5.55 allows remote attackers to cause a denial of service (CPU consumption) via a request to hpnst.exe that calls itself, which causes an infinite loop.
[]
null
null
null
null
null
GHSA-33jv-3p35-h2qx
Vulnerabilities in the KDE kvt terminal program allow local users to gain root privileges.
[]
null
null
null
null
null
CVE-2014-2219
Cross-site scripting (XSS) vulnerability in whizzywig/wb.php in CMSimple Classic 3.54 and earlier, possibly as downloaded before February 26, 2014, allows remote attackers to inject arbitrary web script or HTML via the d parameter.
[ "cpe:2.3:a:cmsimple:cmsimple_classic:*:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
GHSA-cm4m-9c34-c8p6
libedit searches for the .editrc file in the current directory instead of the user's home directory, which may allow local users to execute arbitrary commands by installing a modified .editrc in another directory.
[]
null
null
null
null
null
CVE-2009-3004
Avant Browser 11.7 Builds 35 and 36 allows remote attackers to spoof the address bar, via window.open with a relative URI, to show an arbitrary URL on the web site visited by the victim, as demonstrated by a visit to an attacker-controlled web page, which triggers a spoofed login form for the site containing that page. NOTE: a related attack was reported in which an arbitrary file: URL is shown.
[ "cpe:2.3:a:avant_force:avant_browser:11.7:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
CVE-2020-28645
Deleting users with certain names caused system files to be deleted. Risk is higher for systems which allow users to register themselves and have the data directory in the web root. This affects ownCloud/core versions < 10.6.
[ "cpe:2.3:a:owncloud:owncloud:*:*:*:*:*:*:*:*" ]
null
9.1
null
5
null
GHSA-74jr-9xc3-xccr
Bypass of two factor authentication in RestAPI in Checkmk < 2.3.0p16 and < 2.2.0p34 allows authenticated users to bypass two factor authentication
[]
9.2
8.8
null
null
null
CVE-2017-15913
The Installer in Whale allows DLL hijacking.
[ "cpe:2.3:a:navercorp:whale:-:*:*:*:*:*:*:*" ]
null
null
7.8
6.8
null
CVE-2001-0900
Directory traversal vulnerability in modules.php in Gallery before 1.2.3 allows remote attackers to read arbitrary files via a .. (dot dot) in the include parameter.
[ "cpe:2.3:a:francisco_burzi:gallery:*:*:*:*:*:*:*:*" ]
null
null
null
5
null
CVE-2023-24686
An issue in the CSV Import function of ChurchCRM v4.5.3 and below allows attackers to execute arbitrary code via importing a crafted CSV file.
[ "cpe:2.3:a:churchcrm:churchcrm:*:*:*:*:*:*:*:*" ]
null
4.8
null
null
null
GHSA-wxc3-qvmx-9v52
A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0590, CVE-2019-0591, CVE-2019-0593, CVE-2019-0605, CVE-2019-0607, CVE-2019-0640, CVE-2019-0642, CVE-2019-0644, CVE-2019-0651, CVE-2019-0652, CVE-2019-0655.
[]
null
null
7.5
null
null
GHSA-vw48-r872-84c3
An elevation of privilege exists in Windows Audio Service, aka 'Windows Audio Service Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-1087, CVE-2019-1088.
[]
null
null
null
null
null
GHSA-pm7g-mpjq-33gr
Memory safety bugs present in Firefox 129. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 130.
[]
null
9.8
null
null
null
GHSA-qg47-5px9-32g7
Ansible Remote Code Execution
The `safe_eval` function in Ansible before 1.5.4 does not properly restrict the code subset, which allows remote attackers to execute arbitrary code via crafted instructions.
[]
9.3
9.8
null
null
null
cisco-sa-iosxr-dos-WwDdghs2
Cisco IOS XR Software Enf Broker Denial of Service Vulnerability
Multiple vulnerabilities in the ingress packet processing function of Cisco IOS XR Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. For more information about these vulnerabilities, see the Details ["#details"] section of this advisory. Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.
[]
null
8.6
null
null
null
GHSA-2968-fmvc-r6gw
Signal Handler Race Condition vulnerability in Mitsubishi Electric India GC-ENET-COM whose first 2 digits of 11-digit serial number of unit are "16" allows a remote unauthenticated attacker to cause a denial-of-service (DoS) condition in Ethernet communication by sending a large number of specially crafted packets to any UDP port when GC-ENET-COM is configured as a Modbus TCP Server. The communication resumes only when the power of the main unit is turned off and on or when the GC-ENET-COM is hot-swapped from the main unit.
[]
null
5.9
null
null
null
RHSA-2017:0257
Red Hat Security Advisory: ovirt-engine-extension-aaa-jdbc security update
rhev-m-4: Fails to validate existing expired passwords when changing a password
[ "cpe:/a:redhat:rhev_manager:4" ]
null
null
6.8
null
null
GHSA-8rwc-3f3j-73wm
TRENDnet TEW755AP 1.13B01 was discovered to contain a stack overflow via the wps_sta_enrollee_pin parameter in the set_sta_enrollee_pin_5g function.
[]
null
9.8
null
null
null
GHSA-xpr3-6xfc-3rg9
Unspecified vulnerability in Oracle Application Server 9.0.4.3, 10.1.2.0.0, and 10.1.2.0.2; and Collaboration Suite 9.0.4.2 and 10.1.2; has unknown impact and attack vectors related to Containers for J2EE, aka OC4J08.
[]
null
null
null
null
null
CVE-2023-42112
PDF-XChange Editor EMF File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability
PDF-XChange Editor EMF File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of EMF files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-22146.
[ "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:10.1.0.380:*:*:*:*:*:*:*" ]
null
null
3.3
null
null
GHSA-2v5j-pf93-x5xr
webadmin.exe in Novell Nsure Audit 1.0.1 allows remote attackers to cause a denial of service via malformed ASN.1 packets in corrupt client certificates to an SSL server, as demonstrated using an exploit for the OpenSSL ASN.1 parsing vulnerability.
[]
null
null
null
null
null
GHSA-23rq-jcxh-rmv6
AOL 9.0 Security Edition revision 4184.2340, and probably other versions, uses insecure permissions (Everyone/Full Control) for the "America Online 9.0" directory, which allows local users to gain privileges by replacing critical files.
[]
null
null
null
null
null
GHSA-pprj-563h-jxf6
An issue in MAXON CINEMA 4D R2024.2.0 allows a local attacker to execute arbitrary code via a crafted c4d_base.xdl64 file.
[]
null
7
null
null
null
GHSA-wc24-5j7x-rp2x
In KDE Ark before 20.08.1, a crafted TAR archive with symlinks can install files outside the extraction directory, as demonstrated by a write operation to a user's home directory.
[]
null
3.3
null
null
null
GHSA-66j5-j7xg-7grf
Multiple cross-site scripting (XSS) vulnerabilities in the SemanticForms extension for MediaWiki allow remote attackers to inject arbitrary web script or HTML via the (1) wpSummary parameter to Special:FormEdit, the (2) "Template label (optional)" field in a form, or a (3) Field name in a template.
[]
null
null
null
null
null
GHSA-9q4f-7gx3-crx3
IOMobileFrameBuffer in Apple iOS before 9.3.4 allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app.
[]
null
null
7.8
null
null
GHSA-4r7v-8p9v-gphx
The Business Directory Plugin – Easy Listing Directories for WordPress WordPress plugin before 5.11.1 suffered from Cross-Site Request Forgery issues, allowing an attacker to make a logged in administrator add, edit or delete form fields, which could also lead to Stored Cross-Site Scripting issues.
[]
null
null
null
null
null
GHSA-hh7c-p9rw-88vq
Use-after-free vulnerability in the XML parser in Google Chrome before 18.0.1025.168 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.
[]
null
null
null
null
null
CVE-2018-0585
Cross-site scripting vulnerability in Ultimate Member plugin prior to version 2.0.4 for WordPress allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
[ "cpe:2.3:a:ultimatemember:ultimate_member:*:*:*:*:*:wordpress:*:*" ]
null
null
5.4
3.5
null
GHSA-9h74-fvjc-4388
Opera 6.0.3, when using Squid 2.4 for HTTPS proxying, does not properly handle when accepting a non-global certificate authority (CA) certificate from a site and establishing a subsequent HTTPS connection, which allows remote attackers to cause a denial of service (crash).
[]
null
null
null
null
null
GHSA-v42f-cq7v-587q
Triangle MicroWorks SCADA Data Gateway before 3.00.0635 allows remote attackers to cause a denial of service (excessive data processing) via a crafted DNP3 packet.
[]
null
null
null
null
null
CVE-2024-40091
Vilo 5 Mesh WiFi System <= 5.16.1.33 lacks authentication in the Boa webserver, which allows remote, unauthenticated attackers to retrieve logs with sensitive system.
[ "cpe:2.3:o:viloliving:vilo_5_mesh_wifi_system_firmware:*:*:*:*:*:*:*:*" ]
null
5.3
null
null
null
GHSA-cgwp-53w9-wx8r
iCab 2.9.8 does not clearly associate a Javascript dialog box with the web page that generated it, which allows remote attackers to spoof a dialog box from a trusted site and facilitates phishing attacks, aka the "Dialog Origin Spoofing Vulnerability."
[]
null
null
null
null
null
GHSA-2wh9-mjfj-9cc7
CRLF injection vulnerability in Xerver HTTP Server 4.31 and 4.32 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via certain byte sequences at the end of a URL. NOTE: some of these details are obtained from third party information.
[]
null
null
null
null
null
GHSA-x6mq-g622-2wh9
Beijing Netcon NS-ASG Application Security Gateway v6.3 is vulnerable to SQL Injection via TunnelId that allows access to sensitive information.
[]
null
7.5
null
null
null
GHSA-8gqq-pm8m-h5f6
A vulnerability classified as problematic has been found in givanz Vvveb up to 1.0.5. This affects an unknown part of the file /vadmin123/index.php?module=editor/editor of the component Drag-and-Drop Editor. The manipulation of the argument url leads to information disclosure. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.0.6 is able to address this issue. The identifier of the patch is f684f3e374d04db715730fc4796e102f5ebcacb2. It is recommended to upgrade the affected component.
[]
2
2.7
null
null
null
CVE-2022-24119
Certain General Electric Renewable Energy products have a hidden feature for unauthenticated remote access to the device configuration shell. This affects iNET and iNET II before 8.3.0.
[ "cpe:2.3:o:ge:inet_900_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ge:inet_900:-:*:*:*:*:*:*:*", "cpe:2.3:o:ge:inet_ii_900_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ge:inet_ii_900:-:*:*:*:*:*:*:*", "cpe:2.3:o:ge:sd1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ge:sd1:-:*:*:*:*:*:*:*", "cpe:2.3:o:ge:sd2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ge:sd2:-:*:*:*:*:*:*:*", "cpe:2.3:o:ge:sd4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ge:sd4:-:*:*:*:*:*:*:*", "cpe:2.3:o:ge:sd9_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ge:sd9:-:*:*:*:*:*:*:*", "cpe:2.3:o:ge:td220max_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ge:td220max:-:*:*:*:*:*:*:*", "cpe:2.3:o:ge:td220x_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ge:td220x:-:*:*:*:*:*:*:*" ]
null
9.8
null
null
null
CVE-2019-4032
IBM Financial Transaction Manager for Digital Payments for Multi-Platform 3.1.0 is vulnerable to SQL injection. A remote attacker could send specially-crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-ForceID: 155998.
[ "cpe:2.3:a:ibm:financial_transaction_manager:*:*:*:*:*:ach_services:*:*" ]
null
null
6.3
null
null
CVE-2025-0721
needyamin image_gallery view.php cross site scripting
A vulnerability classified as problematic has been found in needyamin image_gallery 1.0. This affects the function image_gallery of the file /view.php. The manipulation of the argument Username leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
[]
5.3
4.3
4.3
5
null
GHSA-f7q4-w36g-9gxm
A vulnerability was found in code-projects Student Record System 1.0. It has been classified as critical. Affected is an unknown function of the file /pincode-verification.php. The manipulation of the argument pincode leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
[]
6.9
7.3
null
null
null
GHSA-5vr6-7fw6-5646
The SMTP for Amazon SES – YaySMTP plugin for WordPress is vulnerable to Stored Cross-Site Scripting in versions up to, and including, 1.7.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
7.2
null
null
null
CVE-2022-0283
An issue has been discovered affecting GitLab versions prior to 13.5. An open redirect vulnerability was fixed in GitLab integration with Jira that a could cause the web application to redirect the request to the attacker specified URL.
[ "cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*", "cpe:2.3:a:gitlab:gitlab:14.7:*:*:*:*:*:*:*" ]
null
4.7
null
null
null
GHSA-2jq2-rfq2-wr2p
An issue was discovered on LG mobile devices with Android OS 10 software. There was no write protection for the MTK protect2 partition. The LG ID is LVE-SMP-200028 (January 2021).
[]
null
null
null
null
null
CVE-2018-6480
A type confusion issue was discovered in CCN-lite 2, leading to a memory access violation and a failure of the nonce feature (which, for example, helped with loop prevention). ccnl_fwd_handleInterest assumes that the union member s is of type ccnl_pktdetail_ndntlv_s. However, if the type is in fact struct ccnl_pktdetail_ccntlv_s or struct ccnl_pktdetail_iottlv_s, the memory at that point is either uninitialised or points to data that is not a nonce, which renders the code using the local variable nonce pointless. A later nonce check is insufficient.
[ "cpe:2.3:a:ccn-lite:ccn-lite:2.0.0:*:*:*:*:*:*:*" ]
null
null
8.8
6.8
null
CVE-2012-2882
FFmpeg, as used in Google Chrome before 22.0.1229.79, does not properly handle OGG containers, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors, related to a "wild pointer" issue.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.2:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.3:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.4:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.6:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.7:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.8:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.9:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.10:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.11:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.12:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.14:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.16:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.17:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.18:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.20:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.21:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.22:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.23:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.24:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.25:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.26:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.27:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.28:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.29:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.31:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.32:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.33:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.35:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.36:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.37:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.39:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.48:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.49:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.50:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.51:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.52:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.53:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.54:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.55:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.56:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.57:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.58:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.59:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.60:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.62:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.63:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.64:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.65:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.67:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.76:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*" ]
null
null
null
6.8
null
CVE-2024-8199
Reviews Feed – Add Testimonials and Customer Reviews From Google Reviews, Yelp, TripAdvisor, and More <= 1.1.2 - Missing Authorization to Authenticated (Subscriber+) Limited Settings Update
The Reviews Feed – Add Testimonials and Customer Reviews From Google Reviews, Yelp, TripAdvisor, and More plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'update_api_key' function in all versions up to, and including, 1.1.2. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update API Key options.
[ "cpe:2.3:a:smashballoon:reviews_feed:*:*:*:*:*:wordpress:*:*" ]
null
4.3
null
null
null
GHSA-8q2w-cpwj-4cqq
Apple iOS before 8.1.1 allows physically proximate attackers to bypass the lock-screen protection mechanism, and view or transmit a Photo Library photo, via the FaceTime "Leave a Message" feature.
[]
null
null
null
null
null
GHSA-v2h3-gjcc-2xpg
The Asus ZenFone Max 4 Android device with a build fingerprint of asus/WW_Phone/ASUS_X00HD_4:7.1.1/NMF26F/14.2016.1712.367-20171225:user/release-keys contains a pre-installed app with a package name of com.asus.loguploaderproxy app (versionCode=1570000020, versionName=7.0.0.4_170901) that allows other pre-installed apps to perform command execution via an accessible app component. This capability can be accessed by any pre-installed app on the device which can obtain signatureOrSystem permissions that are required by other other pre-installed apps that exported their capabilities to other pre-installed app.
[]
null
null
null
null
null
CVE-2023-52861
drm: bridge: it66121: Fix invalid connector dereference
In the Linux kernel, the following vulnerability has been resolved: drm: bridge: it66121: Fix invalid connector dereference Fix the NULL pointer dereference when no monitor is connected, and the sound card is opened from userspace. Instead return an empty buffer (of zeroes) as the EDID information to the sound framework if there is no connector attached.
[ "cpe:2.3:a:linux:linux_kernel:-:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*" ]
null
6.2
null
null
null
CVE-2025-46823
OpenMRS has Vulnerability in FHIR2 Module Privileges
openmrs-module-fhir2 provides the FHIR REST API and related services for OpenMRS, an open medical records system. In versions of the FHIR2 module prior to 2.5.0, privileges were not always correctly checked, which means that unauthorized users may have been able to add or edit data they were not supposed to be able to. All implementers should update to FHIR2 2.5.0 or newer as soon as is feasible to receive a patch.
[]
8
null
null
null
null
CVE-2022-36483
TOTOLINK N350RT V9.3.5u.6139_B20201216 was discovered to contain a stack overflow via the pppoeUser parameter.
[ "cpe:2.3:o:totolink:n350rt_firmware:9.3.5u.6139_b20201216:*:*:*:*:*:*:*", "cpe:2.3:h:totolink:n350rt:-:*:*:*:*:*:*:*" ]
null
7.8
null
null
null
RHSA-2025:8984
Red Hat Security Advisory: grafana-pcp security update
net/http: Request smuggling due to acceptance of invalid chunked data in net/http
[ "cpe:/a:redhat:rhel_e4s:9.0::appstream" ]
null
5.4
null
null
null
GHSA-3pvr-6w33-f6vc
Multiple unspecified vulnerabilities in the Web management interface in Avaya SIP Enablement Services (SES) 3.x and 4.0, as used with Avaya Communication Manager 3.1.x, allow remote attackers to obtain (1) application server configuration, (2) database server configuration including encrypted passwords, (3) a system utility that decrypts "subscriber table passwords," (4) a system utility that decrypts database passwords, and (5) a system utility that encrypts "subscriber table passwords."
[]
null
null
null
null
null
GHSA-8xph-wx7m-xv5h
Eval injection vulnerability in library/setup/rpc.php in Gravity Getting Things Done (GTD) 0.4.5 and earlier allows remote attackers to execute arbitrary PHP code via the objectname parameter.
[]
null
null
null
null
null
GHSA-wcc4-h459-j83c
The ReadEPTImage function in coders/ept.c in ImageMagick before 6.9.9-0 and 7.x before 7.0.6-1 allows remote attackers to cause a denial of service (memory consumption) via a crafted file.
[]
null
null
6.5
null
null
GHSA-jppr-7mm9-5hrp
Potential memory corruption in Kernel Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 potentially enables an unprivileged user to cause a denial of service via local access.
[]
null
null
6
null
null
CVE-2021-44449
A vulnerability has been identified in JT Utilities (All versions < V12.8.1.1), JTTK (All versions < V10.8.1.1). JTTK library in affected products contains an out of bounds write past the end of an allocated structure while parsing specially crafted JT files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-14830)
[ "cpe:2.3:a:siemens:jt_open_toolkit:*:*:*:*:*:*:*:*", "cpe:2.3:a:siemens:jt_utilities:*:*:*:*:*:*:*:*" ]
null
7.8
null
6.8
null
GHSA-68hh-p8m2-hpx3
A vulnerability in the networking component of Cisco access point (AP) software could allow an unauthenticated, remote attacker to cause a temporary disruption of service.This vulnerability is due to overuse of AP resources. An attacker could exploit this vulnerability by connecting to an AP on an affected device as a wireless client and sending a high rate of traffic over an extended period of time. A successful exploit could allow the attacker to cause the Datagram TLS (DTLS) session to tear down and reset, causing a denial of service (DoS) condition.
[]
null
5.8
null
null
null
GHSA-pr6p-f7m2-3558
Kofax Power PDF PDF File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Kofax Power PDF. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of PDF files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-20451.
[]
null
null
7.8
null
null
GHSA-v6jw-rhgx-9wvr
Adobe Acrobat and Reader versions 2020.006.20034 and earlier, 2017.011.30158 and earlier, 2017.011.30158 and earlier, 2015.006.30510 and earlier, and 2015.006.30510 and earlier have a use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution .
[]
null
null
null
null
null
CVE-2023-22914
A path traversal vulnerability in the “account_print.cgi” CGI program of Zyxel USG FLEX series firmware versions 4.50 through 5.35, and VPN series firmware versions 4.30 through 5.35, which could allow a remote authenticated attacker with administrator privileges to execute unauthorized OS commands in the “tmp” directory by uploading a crafted file if the hotspot function were enabled.
[ "cpe:2.3:o:zyxel:usg_flex_100_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:usg_flex_100:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:usg_flex_100w_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:usg_flex_100w:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:usg_flex_200_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:usg_flex_200:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:usg_flex_50_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:usg_flex_50:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:usg_flex_50w_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:usg_flex_50w:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:usg_flex_500_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:usg_flex_500:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:usg_flex_700_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:usg_flex_700:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:vpn100_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:vpn100:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:vpn1000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:vpn1000:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:vpn300_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:vpn300:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:vpn50_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:vpn50:-:*:*:*:*:*:*:*" ]
null
7.2
null
null
null
GHSA-6c7r-2hhv-77xc
Acrobat Reader DC version 22.001.2011x (and earlier), 20.005.3033x (and earlier) and 17.012.3022x (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[]
null
7.8
null
null
null
GHSA-w6xf-p38w-6xgp
Double free vulnerability in the authentication and authentication token alteration code in PAM-MySQL 0.6.x before 0.6.2 and 0.7.x before 0.7pre3 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via crafted passwords, which lead to a double free of a pointer that was created by the pam_get_item function. NOTE: this issue only occurs in certain configurations in which there are multiple PAM modules, PAM-MySQL is not evaluated first, and there are no requisite modules before PAM-MySQL.
[]
null
null
null
null
null
GHSA-x4mf-ppgr-9fg2
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in wpjobportal WP Job Portal allows Blind SQL Injection. This issue affects WP Job Portal: from n/a through 2.3.2.
[]
null
9.3
null
null
null
CVE-2015-4543
EMC RSA Archer GRC 5.x before 5.5.3 uses cleartext for stored passwords in unspecified circumstances, which allows remote authenticated users to obtain sensitive information by reading database fields.
[ "cpe:2.3:a:emc:rsa_archer_grc:5.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:emc:rsa_archer_grc:5.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:emc:rsa_archer_grc:5.5.2:*:*:*:*:*:*:*" ]
null
null
null
4
null
CVE-2025-2287
Local Code Execution Vulnerability in Arena®
A local code execution vulnerability exists in the Rockwell Automation Arena®  due to an uninitialized pointer. The flaw is result of improper validation of user-supplied data. If exploited a threat actor can disclose information and execute arbitrary code on the system. To exploit the vulnerability a legitimate user must open a malicious DOE file.
[]
8.5
null
null
null
null
GHSA-4jjw-9p2j-2v46
A null pointer dereference in Palo Alto Networks PAN-OS software on PA-800 Series, PA-3200 Series, PA-5200 Series, and PA-7000 Series hardware platforms when Decryption policy is enabled allows an unauthenticated attacker to crash PAN-OS by sending specific traffic through the data plane, resulting in a denial of service (DoS) condition. Repeated attempts to trigger this condition will result in PAN-OS entering maintenance mode.Palo Alto Networks VM-Series, Cloud NGFW, and Prisma Access are not affected.This issue only affects PA-800 Series, PA-3200 Series, PA-5200 Series, and PA-7000 Series running these specific versions of PAN-OS:10.2.7-h1210.2.8-h1010.2.9-h910.2.9-h1110.2.10-h210.2.10-h310.2.1110.2.11-h110.2.11-h210.2.11-h311.1.2-h911.1.2-h1211.1.3-h211.1.3-h411.1.3-h611.2.211.2.2-h1
[]
8.7
null
null
null
null
GHSA-h53q-wm32-jhmq
Microsoft Excel Remote Code Execution Vulnerability
[]
null
7.8
null
null
null
GHSA-j428-8h66-82p9
Out out bounds Write vulnerabilities in svc1td_vld_elh of libsthmbc.so prior to SMR Feb-2024 Release 1 allows local attackers to trigger buffer overflow.
[]
null
6.6
null
null
null
GHSA-v5wh-r46x-75cp
Memory corruption while processing TPC target power table in FTM TPC.
[]
null
8.4
null
null
null
CVE-2020-36333
themegrill-demo-importer before 1.6.2 does not require authentication for wiping the database, because of a reset_wizard_actions hook.
[ "cpe:2.3:a:themegrill:themegrill_demo_importer:*:*:*:*:*:wordpress:*:*" ]
null
9.1
null
6.4
null
CVE-2022-33927
Dell Wyse Management Suite 3.6.1 and below contains a Session Fixation vulnerability. A unauthenticated attacker could exploit this by taking advantage of a user with multiple active sessions in order to hijack a user's session.
[ "cpe:2.3:a:dell:wyse_management_suite:*:*:*:*:*:*:*:*" ]
null
5.4
null
null
null
CVE-2024-28233
XSS in JupyterHub via Self-XSS leveraged by Cookie Tossing
JupyterHub is an open source multi-user server for Jupyter notebooks. By tricking a user into visiting a malicious subdomain, the attacker can achieve an XSS directly affecting the former's session. More precisely, in the context of JupyterHub, this XSS could achieve full access to JupyterHub API and user's single-user server. The affected configurations are single-origin JupyterHub deployments and JupyterHub deployments with user-controlled applications running on subdomains or peer subdomains of either the Hub or a single-user server. This vulnerability is fixed in 4.1.0.
[ "cpe:2.3:a:jupyterhub:jupyterhub:*:*:*:*:*:*:*:*" ]
null
8.1
null
null
null
CVE-2011-4597
The SIP over UDP implementation in Asterisk Open Source 1.4.x before 1.4.43, 1.6.x before 1.6.2.21, and 1.8.x before 1.8.7.2 uses different port numbers for responses to invalid requests depending on whether a SIP username exists, which allows remote attackers to enumerate usernames via a series of requests.
[ "cpe:2.3:a:digium:asterisk:1.8.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.0:beta4:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.0:beta5:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.0:rc4:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.0:rc5:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.1:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.2:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.3:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.3:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.3:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.3:rc3:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.4:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.4:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.4:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.4:rc3:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.5:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.5:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.6.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.6.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.6.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.7.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.7.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.6.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.6.2.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.6.2.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.6.2.0:rc4:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.6.2.0:rc5:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.6.2.0:rc6:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.6.2.0:rc7:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.6.2.0:rc8:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.6.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.6.2.1:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.6.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.6.2.3:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.6.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.6.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.6.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.6.2.6:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.6.2.6:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.6.2.15:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.6.2.16:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.6.2.16:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.6.2.16.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.6.2.16.2:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.6.2.17:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.6.2.17:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.6.2.17:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.6.2.17:rc3:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.6.2.17.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.6.2.17.2:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.6.2.17.3:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.6.2.18:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.6.2.18:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.6.2.19:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.6.2.19:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.6.2.20:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.6.2.21:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.0:beta4:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.5:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.6:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.7:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.8:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.9:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.10:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.10.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.11:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.12:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.12.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.13:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.14:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.15:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.16:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.16.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.16.2:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.17:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.18:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.19:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.19:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.19:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.19:rc3:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.19:rc4:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.19.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.19.2:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.20:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.20:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.20:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.20:rc3:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.20.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.21:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.21:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.21:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.21.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.21.2:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.22:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.22:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.22:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.22:rc3:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.22:rc4:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.22:rc5:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.22.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.22.2:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.23:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.23:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.23:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.23:rc3:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.23:rc4:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.23.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.23.2:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.24:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.24:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.24.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.25:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.25:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.25.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.26:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.26:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.26:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.26:rc3:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.26:rc4:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.26:rc5:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.26:rc6:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.26.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.26.2:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.26.3:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.27:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.27:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.27:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.27:rc3:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.27:rc4:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.27:rc5:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.27.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.28:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.28:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.29:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.29:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.29.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.30:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.30:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.30:rc3:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.31:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.31:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.31:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.32:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.32:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.33:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.33:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.33:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.33.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.34:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.34:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.34:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.35:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.35:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.36:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.36:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.37:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.37:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.38:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.38:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.39:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.39:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.39.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.39.2:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.40:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.40:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.40:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.40:rc3:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.40.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.40.2:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.41:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.41:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.41.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.41.2:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.42:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.42:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.42:rc2:*:*:*:*:*:*" ]
null
null
null
5
null
GHSA-4w53-cpmg-rg5c
Cross-site scripting vulnerability in agora.cgi for Agora 3.0a through 4.0g, when debug mode is enabled, allows remote attackers to execute Javascript on other clients via the cart_id parameter.
[]
null
null
null
null
null
CVE-2019-19675
In Ivanti Workspace Control before 10.3.180.0. a locally authenticated user with low privileges can bypass Managed Application Security by leveraging an unspecified attack vector in Workspace Preferences, when it is enabled. As a result, the attacker can start applications that should be blocked.
[ "cpe:2.3:a:ivanti:workspace_control:*:*:*:*:*:*:*:*" ]
null
7.8
null
4.4
null
GHSA-jcxg-58m7-98qw
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in WP Royal Themes News Magazine X allows PHP Local File Inclusion. This issue affects News Magazine X: from n/a through 1.2.37.
[]
null
7.5
null
null
null
GHSA-m3fh-qqv6-hgxx
Mattermost versions 9.9.x <= 9.9.1, 9.5.x <= 9.5.7, 9.10.x <= 9.10.0, 9.8.x <= 9.8.2 fail to restrict the input in POST /api/v4/users which allows a user to manipulate the creation date in POST /api/v4/users tricking the admin into believing their account is much older.
[]
null
5.3
null
null
null
CVE-2022-44729
Apache XML Graphics Batik: Information disclosure vulnerability
Server-Side Request Forgery (SSRF) vulnerability in Apache Software Foundation Apache XML Graphics Batik.This issue affects Apache XML Graphics Batik: 1.16. On version 1.16, a malicious SVG could trigger loading external resources by default, causing resource consumption or in some cases even information disclosure. Users are recommended to upgrade to version 1.17 or later.
[ "cpe:2.3:a:apache:xml_graphics_batik:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*" ]
null
7.1
null
null
null
CVE-2012-3974
Untrusted search path vulnerability in the installer in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, and Thunderbird ESR 10.x before 10.0.7 on Windows allows local users to gain privileges via a Trojan horse executable file in a root directory.
[ "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0:preview_release:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5:beta1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5:beta2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.13:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.14:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.15:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.16:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.17:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.18:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.19:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.20:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.13:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.14:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.15:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.16:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.17:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.5.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.5.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.5.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.5.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.5.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.5.10:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.5.11:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.5.12:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.5.13:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.5.14:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.5.15:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.6.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.6.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.6.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.6.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.6.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.6.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.6.10:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.6.11:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.6.12:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.6.13:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.6.14:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.6.15:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.6.16:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.6.17:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.6.18:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.6.19:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.6.20:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.6.21:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.6.22:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.6.23:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.6.24:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.6.25:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:4.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:4.0:beta10:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:4.0:beta11:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:4.0:beta12:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:4.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:4.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:4.0:beta4:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:4.0:beta5:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:4.0:beta6:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:4.0:beta7:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:4.0:beta8:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:4.0:beta9:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:6.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:6.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:7.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:8.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:9.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:9.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:10.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:10.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:10.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:11.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:12.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:12.0:beta6:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:13.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:10.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:10.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:10.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:10.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.0.5:beta:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5:beta2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5.0.13:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5.0.14:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.7.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.13:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.14:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.15:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.16:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.17:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.18:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.19:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.20:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.21:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.22:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.23:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:3.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:3.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:3.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:3.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:3.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:3.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:3.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:3.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:3.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:3.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:3.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:3.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:3.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:3.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:3.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:3.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:3.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:3.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:3.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:3.1.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:3.1.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:3.1.10:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:3.1.11:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:3.1.12:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:3.1.13:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:3.1.14:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:3.1.15:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:3.1.16:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:3.1.17:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:3.1.18:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:3.1.19:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:6.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:6.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:7.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:9.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:9.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:10.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:10.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:10.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:10.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:10.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:11.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:12.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:13.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird_esr:10.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird_esr:10.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird_esr:10.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird_esr:10.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird_esr:10.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird_esr:10.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird_esr:10.0.6:*:*:*:*:*:*:*" ]
null
null
null
6.9
null
CVE-2022-46534
Tenda F1203 V2.0.1.6 was discovered to contain a buffer overflow via the speed_dir parameter at /goform/SetSpeedWan.
[ "cpe:2.3:o:tenda:f1203_firmware:2.0.1.6:*:*:*:*:*:*:*", "cpe:2.3:h:tenda:f1203:-:*:*:*:*:*:*:*" ]
null
7.5
null
null
null
GHSA-r6h8-3hr3-v266
Fastream FUR HTTP server 1.0b allows remote attackers to cause a denial of service via a long GET request.
[]
null
null
null
null
null
GHSA-q7cp-j38g-p4xp
A vulnerability was found in fanzila WebFinance 0.5. It has been classified as critical. Affected is an unknown function of the file htdocs/admin/save_roles.php. The manipulation of the argument id leads to sql injection. The name of the patch is 6cfeb2f6b35c1b3a7320add07cd0493e4f752af3. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-220056.
[]
null
9.8
null
null
null