id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
189k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
patch_commit_url
stringlengths
38
232
GHSA-73fc-22xj-hx85
Multiple SQL injection vulnerabilities in the administrative backend in ZeusCart 4 allow remote administrators to execute arbitrary SQL commands via the id parameter in a (1) disporders detail or (2) subadminmgt edit action or (3) cid parameter in an editcurrency action to admin/.
[]
null
null
null
null
null
CVE-2019-1929
Cisco Webex Network Recording Player and Cisco Webex Player Arbitrary Code Execution Vulnerabilities
Multiple vulnerabilities in Cisco Webex Network Recording Player for Microsoft Windows and Cisco Webex Player for Microsoft Windows could allow an attacker to execute arbitrary code on an affected system. The vulnerabilities exist because the affected software improperly validates Advanced Recording Format (ARF) and Webex Recording Format (WRF) files. An attacker could exploit these vulnerabilities by sending a user a malicious ARF or WRF file through a link or email attachment and persuading the user to open the file with the affected software on the local system. A successful exploit could allow the attacker to execute arbitrary code on the affected system with the privileges of the targeted user.
[ "cpe:2.3:a:cisco:webex_business_suite:*:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:webex_meetings_online:*:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:webex_meetings_server:2.8:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:webex_meetings_server:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:webex_meetings_server:3.0mr2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:webex_meetings_server:4.0:*:*:*:*:*:*:*" ]
null
null
7.8
null
null
GHSA-7x94-jx75-3gh6
Stored cross site scripting in Craft CMS
A post-authentication stored cross-site scripting vulnerability exists in Craft CMS versions <= 4.4.11. HTML, including script tags can be injected into field names which, when the field is added to a category or section, will trigger when users visit the Categories or Entries pages respectively. This issue was patched in version 4.4.12.
[]
null
5.4
null
null
null
CVE-2016-3114
Kallithea before 0.3.2 allows remote authenticated users to edit or delete open pull requests or delete comments by leveraging read access.
[ "cpe:2.3:a:kallithea:kallithea:0.3.1:*:*:*:*:*:*:*" ]
null
null
6.5
4
null
RHSA-2022:5903
Red Hat Security Advisory: Red Hat Process Automation Manager 7.13.0 security update
mysql-connector-java: unauthorized access to critical wildfly-elytron: possible timing attack in ScramServer wildfly-core: Invalid Sensitivity Classification of Vault Expression wildfly: incorrect JBOSS_LOCAL_USER challenge location may lead to giving access to all the local users protobuf-java: potential DoS in the parsing procedure for binary data ant: excessive memory allocation when reading a specially crafted TAR archive netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way jsoup: Crafted input may cause the jsoup HTML and XML parser to get stuck netty: control chars in header names may lead to HTTP request smuggling spring-expression: Denial of service via specially crafted SpEL expression com.google.code.gson-gson: Deserialization of Untrusted Data in com.google.code.gson-gson
[ "cpe:/a:redhat:jboss_enterprise_bpms_platform:7.13" ]
null
7.5
null
null
null
GHSA-388g-jwpg-x6j4
Cross-Site Scripting in swagger-ui
Versions of `swagger-ui` prior to 3.0.13 are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize YAML files imported from URLs or copied-pasted. This may allow attackers to execute arbitrary JavaScript.RecommendationUpgrade to version 3.0.13 or later.
[]
null
6.5
null
null
null
CVE-2008-6769
Unrestricted file upload vulnerability in upload.php in YourPlace 1.0.2 and earlier allows remote authenticated users to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file.
[ "cpe:2.3:a:peterselie:yourplace:*:*:*:*:*:*:*:*", "cpe:2.3:a:peterselie:yourplace:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:peterselie:yourplace:1.0.1:*:*:*:*:*:*:*" ]
null
null
null
6
null
CVE-2016-9642
JavaScriptCore in WebKit allows attackers to cause a denial of service (out-of-bounds heap read) via a crafted Javascript file.
[ "cpe:2.3:a:webkit:webkit:-:*:*:*:*:*:*:*" ]
null
null
5.5
4.3
null
CVE-2018-12201
Buffer overflow vulnerability in Platform Sample / Silicon Reference firmware for 8th Generation Intel(R) Core Processor, 7th Generation Intel(R) Core Processor, Intel(R) Pentium(R) Silver J5005 Processor, Intel(R) Pentium(R) Silver N5000 Processor, Intel(R) Celeron(R) J4105 Processor, Intel(R) Celeron(R) J4005 Processor, Intel Celeron(R) N4100 Processor and Intel(R) Celeron N4000 Processor may allow privileged user to potentially execute arbitrary code via local access.
[ "cpe:2.3:o:intel:platform_sample_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron:j4005:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron:j4105:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron:n4000:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron:n4100:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:8100:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:8100h:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:8100t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:8109u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:8130u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:8145u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:8300:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:8300t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:8350k:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:8200y:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:8250u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:8259u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:8265u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:8269u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:8300h:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:8305g:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:8350u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:8400:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:8400b:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:8400h:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:8400t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:8500:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:8500b:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:8500t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:8600:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:8600k:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:8600t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:8086k:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:8500y:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:8550u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:8559u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:8565u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:8650u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:8700:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:8700b:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:8700k:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:8700t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:8705g:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:8706g:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:8709g:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:8750h:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:8809g:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:8850h:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_silver:j5005:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_silver:n5000:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:7020u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:7100:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:7100e:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:7100h:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:7100t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:7100u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:7101e:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:7101te:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:7102e:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:7130u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:7167u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:7300:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:7300t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:7320:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:7350k:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:7200u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:7260u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:7267u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:7287u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:7300hq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:7300u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:7360u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:7400:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:7400t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:7440eq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:7440hq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:7442eq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:7500:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:7500t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:7600:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:7600k:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:7600t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:7640x:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:7500u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:7560u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:7567u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:7600u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:7660u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:7700:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:7700hq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:7700k:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:7700t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:7740x:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:7800x:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:7820eq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:7820hk:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:7820hq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:7820x:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:7920hq:*:*:*:*:*:*:*", "cpe:2.3:o:intel:silicon_reference_firmware:-:*:*:*:*:*:*:*" ]
null
null
6.7
7.2
null
GHSA-4mm7-92pv-gvpp
Dell EMC RecoverPoint versions prior to 5.1.2 and RecoverPoint for VMs versions prior to 5.1.1.3, contain a command injection vulnerability. An unauthenticated remote attacker may potentially exploit this vulnerability to execute arbitrary commands on the affected system with root privilege.
[]
null
null
9.8
null
null
GHSA-xxqr-hj46-74ww
SourceCodester Online Clothing Store 1.0 is affected by a SQL Injection via the txtUserName parameter to login.php.
[]
null
null
null
null
null
GHSA-8v52-952p-r693
A vulnerability has been reported in Cups Easy (Purchase & Inventory), version 1.0, whereby user-controlled inputs are not sufficiently encoded, resulting in a Cross-Site Scripting (XSS) vulnerability via /cupseasylive/grnmodify.php, in the grndate parameter. Exploitation of this vulnerability could allow a remote attacker to send a specially crafted URL to an authenticated user and steal their session cookie credentials.
[]
null
7.1
null
null
null
GHSA-2cmj-f6v6-vpxh
An elevation of privilege vulnerability in the MediaTek thermal driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: N/A. Android ID: A-33939045. References: M-ALPS03149189.
[]
null
null
7
null
null
CVE-2018-13621
The mintToken function of a smart contract implementation for SoundTribeToken, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value.
[ "cpe:2.3:a:soundtribetoken_project:soundtribetoken:-:*:*:*:*:*:*:*" ]
null
null
7.5
5
null
CVE-2025-54074
Cherry Studio is Vulnerable to OS Command Injection during Connection with a Malicious MCP Server
Cherry Studio is a desktop client that supports for multiple LLM providers. From versions 1.2.5 to 1.5.1, Cherry Studio is vulnerable to OS Command Injection during a connection with a malicious MCP server in HTTP Streamable mode. Attackers can setup a malicious MCP server with compatible OAuth authorization server endpoints and trick victims into connecting it, leading to OS command injection in vulnerable clients. This issue has been patched in version 1.5.2.
[]
7.7
null
null
null
null
CVE-2006-5111
The libksba library 0.9.12 and possibly other versions, as used by gpgsm in the newpg package on SUSE LINUX, allows attackers to cause a denial of service (application crash) via a malformed X.509 certificate in a signature.
[ "cpe:2.3:a:libksba_library:libksba_library:0.9.12:*:*:*:*:*:*:*" ]
null
null
null
5
null
CVE-2008-5706
The cTrigger::DoIt function in src/ctrigger.cpp in the trigger mechanism in the daemon in Verlihub 0.9.8d-RC2 and earlier allows local users to overwrite arbitrary files via a symlink attack on the /tmp/trigger.tmp temporary file.
[ "cpe:2.3:a:verlihub-project:verlihub:0.9.8d:rc2:*:*:*:*:*:*" ]
null
null
null
6.9
null
CVE-2019-13236
In system/workplace/ in Alkacon OpenCms 10.5.4 and 10.5.5, there are multiple Reflected and Stored XSS issues in the management interface.
[ "cpe:2.3:a:alkacon:opencms:10.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:alkacon:opencms:10.5.5:*:*:*:*:*:*:*" ]
null
null
6.1
4.3
null
GHSA-r67h-m869-3m3q
Incorrect Access Control in Emerson Smart Wireless Gateway 1420 4.6.59 allows remote attackers to obtain sensitive device information from the administrator console without authentication.
[]
null
7.5
null
null
null
ICSA-17-250-01
SpiderControl SCADA Web Server
Authenticated, non-administrative local users are able to alter service executables with escalated privileges which could allow an attacker to execute arbitrary code under the context of the current system services.CVE-2017-12728 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been assigned; the CVSS vector string is (AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L).
[]
null
null
5.3
null
null
GHSA-jfpr-w2hm-9rpw
Cross-site scripting (XSS) vulnerability in phpPgAdmin 3.5 to 4.1.1, and possibly 4.1.2, allows remote attackers to inject arbitrary web script or HTML via certain input available in PHP_SELF in (1) redirect.php, possibly related to (2) login.php, different vectors than CVE-2007-2865.
[]
null
null
null
null
null
CVE-2015-0218
Cross-site request forgery (CSRF) vulnerability in auth/shibboleth/logout.php in Moodle through 2.5.9, 2.6.x before 2.6.7, 2.7.x before 2.7.4, and 2.8.x before 2.8.2 allows remote attackers to hijack the authentication of arbitrary users for requests that trigger a logout.
[ "cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.5.5:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.5.6:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.5.7:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.5.8:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.6.3:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.6.4:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.6.5:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.6.6:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.7.2:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.7.3:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.8.0:*:*:*:*:*:*:*" ]
null
null
null
6.8
null
CVE-2020-36397
A stored cross site scripting (XSS) vulnerability in the /admin/contact/contact component of LavaLite 5.8.0 allows authenticated attackers to execute arbitrary web scripts or HTML via a crafted payload entered into the "New" parameter.
[ "cpe:2.3:a:lavalite:lavalite:5.8.0:*:*:*:*:*:*:*" ]
null
5.4
null
3.5
null
CVE-2025-3196
Open Asset Import Library Assimp Malformed File MD2Loader.cpp InternReadFile stack-based overflow
A vulnerability, which was classified as critical, was found in Open Asset Import Library Assimp 5.4.3. Affected is the function Assimp::MD2Importer::InternReadFile in the library code/AssetLib/MD2/MD2Loader.cpp of the component Malformed File Handler. The manipulation of the argument Name leads to stack-based buffer overflow. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. It is recommended to upgrade the affected component.
[]
4.8
5.3
5.3
4.3
https://github.com/assimp/assimp/milestone/11
CVE-2024-56553
binder: fix memleak of proc->delivered_freeze
In the Linux kernel, the following vulnerability has been resolved: binder: fix memleak of proc->delivered_freeze If a freeze notification is cleared with BC_CLEAR_FREEZE_NOTIFICATION before calling binder_freeze_notification_done(), then it is detached from its reference (e.g. ref->freeze) but the work remains queued in proc->delivered_freeze. This leads to a memory leak when the process exits as any pending entries in proc->delivered_freeze are not freed: unreferenced object 0xffff38e8cfa36180 (size 64): comm "binder-util", pid 655, jiffies 4294936641 hex dump (first 32 bytes): b8 e9 9e c8 e8 38 ff ff b8 e9 9e c8 e8 38 ff ff .....8.......8.. 0b 00 00 00 00 00 00 00 3c 1f 4b 00 00 00 00 00 ........<.K..... backtrace (crc 95983b32): [<000000000d0582cf>] kmemleak_alloc+0x34/0x40 [<000000009c99a513>] __kmalloc_cache_noprof+0x208/0x280 [<00000000313b1704>] binder_thread_write+0xdec/0x439c [<000000000cbd33bb>] binder_ioctl+0x1b68/0x22cc [<000000002bbedeeb>] __arm64_sys_ioctl+0x124/0x190 [<00000000b439adee>] invoke_syscall+0x6c/0x254 [<00000000173558fc>] el0_svc_common.constprop.0+0xac/0x230 [<0000000084f72311>] do_el0_svc+0x40/0x58 [<000000008b872457>] el0_svc+0x38/0x78 [<00000000ee778653>] el0t_64_sync_handler+0x120/0x12c [<00000000a8ec61bf>] el0t_64_sync+0x190/0x194 This patch fixes the leak by ensuring that any pending entries in proc->delivered_freeze are freed during binder_deferred_release().
[]
null
3.3
null
null
null
CVE-2023-49225
A cross-site-scripting vulnerability exists in Ruckus Access Point products (ZoneDirector, SmartZone, and AP Solo). If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who is logging in the product. As for the affected products/models/versions, see the information provided by the vendor listed under [References] section or the list under [Product Status] section.
[ "cpe:2.3:o:ruckuswireless:r750_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ruckuswireless:r750:-:*:*:*:*:*:*:*", "cpe:2.3:o:ruckuswireless:r650_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ruckuswireless:r650:-:*:*:*:*:*:*:*", "cpe:2.3:o:ruckuswireless:r730_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ruckuswireless:r730:-:*:*:*:*:*:*:*", "cpe:2.3:o:ruckuswireless:t750_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ruckuswireless:t750:-:*:*:*:*:*:*:*", "cpe:2.3:o:ruckuswireless:r510_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ruckuswireless:r510:-:*:*:*:*:*:*:*", "cpe:2.3:o:ruckuswireless:e510_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ruckuswireless:e510:-:*:*:*:*:*:*:*", "cpe:2.3:o:ruckuswireless:c110_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ruckuswireless:c110:-:*:*:*:*:*:*:*", "cpe:2.3:o:ruckuswireless:r320_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ruckuswireless:r320:-:*:*:*:*:*:*:*", "cpe:2.3:o:ruckuswireless:h510_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ruckuswireless:h510:-:*:*:*:*:*:*:*", "cpe:2.3:o:ruckuswireless:h320_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ruckuswireless:h320:-:*:*:*:*:*:*:*", "cpe:2.3:o:ruckuswireless:t305_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ruckuswireless:t305:-:*:*:*:*:*:*:*", "cpe:2.3:o:ruckuswireless:m510_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ruckuswireless:m510:-:*:*:*:*:*:*:*", "cpe:2.3:o:ruckuswireless:r720_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ruckuswireless:r720:-:*:*:*:*:*:*:*", "cpe:2.3:o:ruckuswireless:r710_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ruckuswireless:r710:-:*:*:*:*:*:*:*", "cpe:2.3:o:ruckuswireless:t710_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ruckuswireless:t710:-:*:*:*:*:*:*:*", "cpe:2.3:o:ruckuswireless:t610_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ruckuswireless:t610:-:*:*:*:*:*:*:*", "cpe:2.3:o:ruckuswireless:r610_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ruckuswireless:r610:-:*:*:*:*:*:*:*", "cpe:2.3:o:ruckuswireless:t310d_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ruckuswireless:t310d:-:*:*:*:*:*:*:*", "cpe:2.3:o:ruckuswireless:t310s_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ruckuswireless:t310s:-:*:*:*:*:*:*:*", "cpe:2.3:o:ruckuswireless:t310n_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ruckuswireless:t310n:-:*:*:*:*:*:*:*", "cpe:2.3:o:ruckuswireless:t310c_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ruckuswireless:t310c:-:*:*:*:*:*:*:*", "cpe:2.3:o:ruckuswireless:t710s_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ruckuswireless:t710s:-:*:*:*:*:*:*:*", "cpe:2.3:o:ruckuswireless:t610s_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ruckuswireless:t610s:-:*:*:*:*:*:*:*", "cpe:2.3:o:ruckuswireless:r550_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ruckuswireless:r550:-:*:*:*:*:*:*:*", "cpe:2.3:o:ruckuswireless:r850_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ruckuswireless:r850:-:*:*:*:*:*:*:*", "cpe:2.3:o:ruckuswireless:t750se_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ruckuswireless:t750se:-:*:*:*:*:*:*:*", "cpe:2.3:o:ruckuswireless:r310_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ruckuswireless:r310:*:*:*:*:*:*:*:*", "cpe:2.3:o:ruckuswireless:r760_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ruckuswireless:r760:*:*:*:*:*:*:*:*", "cpe:2.3:o:ruckuswireless:r560_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ruckuswireless:r560:*:*:*:*:*:*:*:*", "cpe:2.3:o:ruckuswireless:h550_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ruckuswireless:h550:*:*:*:*:*:*:*:*", "cpe:2.3:o:ruckuswireless:h350_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ruckuswireless:h350:*:*:*:*:*:*:*:*", "cpe:2.3:o:ruckuswireless:t350c_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ruckuswireless:t350c:*:*:*:*:*:*:*:*", "cpe:2.3:o:ruckuswireless:t350d_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ruckuswireless:t350d:*:*:*:*:*:*:*:*", "cpe:2.3:o:ruckuswireless:t350se_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ruckuswireless:t350se:*:*:*:*:*:*:*:*", "cpe:2.3:o:ruckuswireless:r350_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ruckuswireless:r350:*:*:*:*:*:*:*:*", "cpe:2.3:o:ruckuswireless:smartzone_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ruckuswireless:smartzone:-:*:*:*:*:*:*:*", "cpe:2.3:o:ruckuswireless:zonedirector_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ruckuswireless:zonedirector:-:*:*:*:*:*:*:*" ]
null
6.1
null
null
null
CVE-2023-26103
Versions of the package deno before 1.31.0 are vulnerable to Regular Expression Denial of Service (ReDoS) due to the upgradeWebSocket function, which contains regexes in the form of /s*,s*/, used for splitting the Connection/Upgrade header. A specially crafted Connection/Upgrade header can be used to significantly slow down a web socket server.
[ "cpe:2.3:a:deno:deno:*:*:*:*:*:*:*:*" ]
null
5.3
null
null
null
CVE-2018-8071
Mautic before v2.13.0 has stored XSS via a theme config file.
[ "cpe:2.3:a:mautic:mautic:*:*:*:*:*:*:*:*" ]
null
null
6.1
4.3
null
CVE-2024-2920
The WP-Members Membership Plugin plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 3.4.9.3 due to the plugin uploading user supplied files to a publicly accessible directory in wp-content without any restrictions. This makes it possible for unauthenticated attackers to view files uploaded by other users which may contain sensitive information.
[]
null
5.3
null
null
null
GHSA-jhf7-373h-xx92
An attacker who is able to send and receive messages to an authoritative DNS server and who has knowledge of a valid TSIG key name may be able to circumvent TSIG authentication of AXFR requests via a carefully constructed request packet. A server that relies solely on TSIG keys for protection with no other ACL protection could be manipulated into: providing an AXFR of a zone to an unauthorized recipient or accepting bogus NOTIFY packets. Affects BIND 9.4.0->9.8.8, 9.9.0->9.9.10-P1, 9.10.0->9.10.5-P1, 9.11.0->9.11.1-P1, 9.9.3-S1->9.9.10-S2, 9.10.5-S1->9.10.5-S2.
[]
null
null
3.7
null
null
CVE-2017-18786
Certain NETGEAR devices are affected by command injection. This affects D6200 before 1.1.00.24, JNR1010v2 before 1.1.0.44, JR6150 before 1.0.1.12, JWNR2010v5 before 1.1.0.44, PR2000 before 1.0.0.20, R6050 before 1.0.1.12, WNR1000v4 before 1.1.0.44, WNR2020 before 1.1.0.44, and WNR2050 before 1.1.0.44.
[ "cpe:2.3:o:netgear:d6200_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:d6200:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:jnr1010_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:jnr1010:v2:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:jr6150_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:jr6150:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:jwnr2010_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:jwnr2010:v5:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:pr2000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:pr2000:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r6050_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r6050:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:wnr1000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:wnr1000:v4:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:wnr2020_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:wnr2020:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:wnr2050_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:wnr2050:-:*:*:*:*:*:*:*" ]
null
null
8.4
null
null
GHSA-2qrr-c2gh-pr35
Wikimedia information leak vulnerability
Wikimedia MediaWiki 1.23.0 through 1.32.1 has an information leak. Privileged API responses that include whether a recent change has been patrolled may be cached publicly. Fixed in 1.32.2, 1.31.2, 1.30.2 and 1.27.6.
[]
null
null
7.5
null
null
CVE-2025-46483
WordPress Peadig’s Google +1 Button <= 0.1.2 - Cross Site Scripting (XSS) Vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Alex Moss Peadig’s Google +1 Button allows DOM-Based XSS. This issue affects Peadig’s Google +1 Button: from n/a through 0.1.2.
[]
null
6.5
null
null
null
CVE-2000-0220
ZoneAlarm sends sensitive system and network information in cleartext to the Zone Labs server if a user requests more information about an event.
[ "cpe:2.3:a:zonelabs:zonealarm:2.0.26:*:*:*:*:*:*:*" ]
null
null
null
5
null
GHSA-vrv8-xgm7-2cmc
SQL injection vulnerability in LOCKON CO.,LTD. EC-CUBE 2.3.0 and earlier, 1.4.7 and earlier, and 1.5.0-beta2 and earlier; and Community Edition 1.3.5 and earlier allows remote attackers to execute arbitrary SQL commands via the parameter.
[]
null
null
null
null
null
CVE-2024-25691
BUG-000165286 - Reflected XSS in Portal for ArcGIS
There is a reflected XSS vulnerability in Esri Portal for ArcGIS versions 11.1 and below which may allow a remote, unauthenticated attacker to create a crafted link which when clicked could potentially execute arbitrary JavaScript code in the victim’s browser.
[ "cpe:2.3:a:esri:portal_for_arcgis:-:*:*:*:*:*:*:*", "cpe:2.3:a:esri:portal_for_arcgis:10.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:esri:portal_for_arcgis:10.9.1:*:*:*:*:*:*:*", "cpe:2.3:a:esri:portal_for_arcgis:11.1:*:*:*:*:*:*:*" ]
null
6.1
null
null
null
GHSA-2cm8-4wcq-46qg
A vulnerability was determined in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 up to 20250801. This vulnerability affects the function setDMZ of the file /goform/setDMZ. The manipulation of the argument DMZIPAddress leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
[]
7.4
8.8
null
null
null
CVE-2011-0797
Unspecified vulnerability in the Applications Install component in Oracle E-Business Suite 11.5.10.2, 12.0.6, 12.1.1, 12.1.2, and 12.1.3 allows remote authenticated users to affect confidentiality via unknown vectors.
[ "cpe:2.3:a:oracle:e-business_suite:11.5.10.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:e-business_suite:12.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:e-business_suite:12.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:e-business_suite:12.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:e-business_suite:12.1.3:*:*:*:*:*:*:*" ]
null
null
null
2.1
null
GHSA-m75w-4gmq-mj6j
A vulnerability classified as critical was found in Guangzhou Huayi Intelligent Technology Jeewms up to 20241229. This vulnerability affects unknown code of the file /wmOmNoticeHController.do. The manipulation leads to path traversal: '../filedir'. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 20250101 is able to address this issue. It is recommended to upgrade the affected component.
[]
6.9
5.3
null
null
null
GHSA-5fm6-5hv6-6fjv
Code-projects Hotel Managment System 1.0 allows SQL Injection via the 'pid' parameter in Hotel/admin/print.php?pid=2.
[]
null
8.8
null
null
null
CVE-2016-10452
In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Automobile and Snapdragon Mobile SD 410/12, SD 425, SD 430, SD 450, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 808, SD 810, SD 820, SD 820A, and SD 835, memory protection assertion happens after invoking TA termination out of order.
[ "cpe:2.3:o:qualcomm:sd_410_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_410:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_412_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_412:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_425_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_425:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_430_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_430:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_450_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_450:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_615_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_615:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_616_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_616:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_415_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_415:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_617_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_617:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_625_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_625:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_650_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_650:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_652_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_652:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_808_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_808:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_810_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_810:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_820_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_820:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_835_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_835:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_820a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_820a:-:*:*:*:*:*:*:*" ]
null
null
9.8
10
null
GHSA-q34j-q58v-2jmm
A vulnerability has been identified in SICAM PAS/PQS (All versions < V7.0). Affected software does not properly secure a folder containing library files. This could allow an attacker to place a custom malicious DLL in this folder which is then run with SYSTEM rights when a service is started that requires this DLL. At the time of assigning the CVE, the affected firmware version of the component has already been superseded by succeeding mainline versions.
[]
null
7.8
null
null
null
GHSA-jrhg-3r49-wwxc
Unspecified vulnerability in the PeopleSoft Enterprise PeopleTools component in Oracle PeopleSoft and JDEdwards Suite 8.49.27 and 8.50.10 allows remote authenticated users to affect integrity via unknown vectors.
[]
null
null
null
null
null
GHSA-9mhj-jg27-p3cc
In ppmp_unprotect_mfcfw_buf of drm_fw.c, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-233645166References: N/A
[]
null
7.8
null
null
null
GHSA-669x-j2pw-grf8
NoMachine for Windows prior to version 6.15.1 and 7.5.2 suffer from local privilege escalation due to the lack of safe DLL loading. This vulnerability allows local non-privileged users to perform DLL Hijacking via any writable directory listed under the system path and ultimately execute code as NT AUTHORITY\SYSTEM.
[]
null
7.3
null
null
null
CVE-2025-7870
Portabilis i-Diario justificativas-de-falta Endpoint cross site scripting
A vulnerability, which was classified as problematic, was found in Portabilis i-Diario 1.5.0. This affects an unknown part of the component justificativas-de-falta Endpoint. The manipulation of the argument Anexo leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
[]
5.1
3.5
3.5
4
null
CVE-2019-10980
A type confusion vulnerability may be exploited when LAquis SCADA 4.3.1.71 processes a specially crafted project file. This may allow an attacker to execute remote code. The attacker must have local access to the system. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).
[ "cpe:2.3:a:laquisscada:scada:4.3.1.71:*:*:*:*:*:*:*" ]
null
7.8
null
6.8
null
CVE-2021-40323
Cobbler before 3.3.0 allows log poisoning, and resultant Remote Code Execution, via an XMLRPC method that logs to the logfile for template injection.
[ "cpe:2.3:a:cobbler_project:cobbler:*:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
null
GHSA-87wp-jjcx-7hh6
Fujitsu ServerView Suite iRMC before 9.62F allows XSS. An authenticated attacker can store an XSS payload in the PSCU_FILE_INIT field of a Save Configuration XML document. The payload is triggered in the HTTP error response pages.
[]
null
null
null
null
null
RHSA-2004:242
Red Hat Security Advisory: squid security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
null
GHSA-36vr-cpp3-vrwf
A vulnerability was found in Analytics Stats Counter Statistics Plugin 1.2.2.5 and classified as critical. This issue affects some unknown processing. The manipulation leads to code injection. The attack may be initiated remotely.
[]
null
9.8
null
null
null
CVE-2020-0300
In NFC, there is a possible out of bounds read due to uninitialized data. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-148736216
[ "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*" ]
null
7.5
null
5
null
GHSA-3hfv-3383-4hvp
A use-after-free in the mac80211 stack when parsing a multi-BSSID element in the Linux kernel 5.2 through 5.19.14 could be used by attackers (able to inject WLAN frames) to crash the kernel and potentially execute code.
[]
null
8.8
null
null
null
CVE-2014-3652
JBoss KeyCloak: Open redirect vulnerability via failure to validate the redirect URL.
[ "cpe:2.3:a:redhat:keycloak:1.0.1:*:*:*:*:*:*:*" ]
null
6.1
null
5.8
null
GHSA-77mr-3x8w-8f7f
Trimble SketchUp Viewer SKP File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Trimble SketchUp Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of SKP files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-19575.
[]
null
null
7.8
null
null
CVE-2024-42778
An Unrestricted file upload vulnerability was found in "/music/ajax.php?action=save_playlist" in Kashipara Music Management System v1.0. This allows attackers to execute arbitrary code via uploading a crafted PHP file.
[ "cpe:2.3:a:lopalopa:music_management_system:1.0:*:*:*:*:*:*:*" ]
null
8.8
null
null
null
GHSA-45gf-xj43-rfvr
Windows Lock Screen Security Feature Bypass Vulnerability
[]
null
6.8
null
null
null
GHSA-7p59-xqgx-w7p8
Stack-based buffer overflow in McPvDrv.sys 4.6.111.0 in McAfee File Lock 5.x in McAfee Total Protection allows attackers to cause a denial of service (system crash) via a long vault GUID in an ioctl call.
[]
null
null
7.5
null
null
CVE-2018-13791
The HTTP API in ABBYY FlexiCapture before 12 Release 1 Update 7 allows an attacker to conduct Access Control attacks via the /FlexiCapture12/Login/Server/SevaUserProfile FlexiCaptureTmsSts2 parameter.
[ "cpe:2.3:a:abbyy:flexicapture:12.0.1.263:*:*:*:*:*:*:*", "cpe:2.3:a:abbyy:flexicapture:12.0.1.267:*:*:*:*:*:*:*", "cpe:2.3:a:abbyy:flexicapture:12.0.1.282:*:*:*:*:*:*:*", "cpe:2.3:a:abbyy:flexicapture:12.0.1.292:*:*:*:*:*:*:*", "cpe:2.3:a:abbyy:flexicapture:12.0.1.367:*:*:*:*:*:*:*", "cpe:2.3:a:abbyy:flexicapture:12.0.1.428:*:*:*:*:*:*:*", "cpe:2.3:a:abbyy:flexicapture:12.0.1.475:*:*:*:*:*:*:*" ]
null
null
9.8
7.5
null
GHSA-j6xm-4vmx-cxfm
REINER timeCard 6.05.07 installs a Microsoft SQL Server with an sa password that is hardcoded in the TCServer.jar file.
[]
null
null
null
null
null
CVE-2025-0194
Insertion of Sensitive Information into Externally-Accessible File or Directory in GitLab
An issue was discovered in GitLab CE/EE affecting all versions starting from 17.4 prior to 17.5.5, starting from 17.6 prior to 17.6.3, and starting from 17.7 prior to 17.7.1. Under certain conditions, access tokens may have been logged when API requests were made in a specific manner.
[ "cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*" ]
null
6.5
null
null
null
GHSA-9qcw-x77v-9qjh
Incorrect Calculation of Buffer Size (CWE-131) in the Controller 6000 and Controller 7000 OSDP message handling, allows an attacker with physical access to Controller wiring to instigate a reboot leading to a denial of service.This issue affects: Controller 6000 and Controller 7000 9.10 prior to vCR9.10.240816a (distributed in 9.10.1530 (MR2)), 9.00 prior to vCR9.00.240816a (distributed in 9.00.2168 (MR4)), 8.90 prior to vCR8.90.240816a (distributed in 8.90.2155 (MR5)), 8.80 prior to vCR8.80.240816b (distributed in 8.80.1938 (MR6)), all versions of 8.70 and prior.
[]
null
4.6
null
null
null
CVE-2007-0645
Format string vulnerability in iPhoto 6.0.5 allows remote user-assisted attackers to cause a denial of service (crash) via format string specifiers in a filename, which is not properly handled when calling certain Apple AppKit functions.
[ "cpe:2.3:a:apple:iphoto:6.0.5:*:*:*:*:*:*:*" ]
null
null
null
6.8
null
CVE-2021-43037
An issue was discovered in Kaseya Unitrends Backup Appliance before 10.5.5. The Unitrends Windows agent was vulnerable to DLL injection and binary planting due to insecure default permissions. This allowed privilege escalation from an unprivileged user to SYSTEM.
[ "cpe:2.3:a:kaseya:unitrends_backup:*:*:*:*:*:*:*:*" ]
null
7.8
null
6.9
null
GHSA-xjxq-r4rh-23g9
Stack-based buffer overflow in Mini-stream Shadow Stream Recorder 3.0.1.7 allows remote attackers to execute arbitrary code via a long URI in a playlist (.m3u) file.
[]
null
null
null
null
null
GHSA-fhgc-2x58-cm2p
The parse function in MSA vot.Ar 3.1 does not check whether a candidate receives more than one vote, which allows physically proximate attackers to cast multiple votes for a candidate via a crafted RFID ballot tag.
[]
null
null
4.6
null
null
GHSA-8w2v-jh6q-6h3g
TYPSoft FTP Server 1.11 allows remote attackers to cause a denial of service (CPU consumption) by sending an ABOR (abort) command without an active file transfer.
[]
null
null
null
null
null
CVE-2024-33059
Use After Free in Computer Vision
Memory corruption while processing frame command IOCTL calls.
[ "cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:fastconnect_6900:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:fastconnect_7800:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcm8550_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcm8550:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcs8550_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcs8550:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sg8275p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sg8275p:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm8550p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm8550p:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_8_gen_2_mobile_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_8_gen_2_mobile:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_8_gen_3_mobile_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_8_gen_3_mobile:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_8\\+_gen_2_mobile_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_8\\+_gen_2_mobile:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9390_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9390:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9395_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9395:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wsa8840_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wsa8840:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wsa8845_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wsa8845:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wsa8845h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wsa8845h:-:*:*:*:*:*:*:*" ]
null
6.7
null
null
null
GHSA-gcqw-jc7p-cm29
Cross-site request forgery (CSRF) vulnerability in the Welcart plugin before 1.2.2 for WordPress allows remote attackers to hijack the authentication of arbitrary users for requests that complete a purchase.
[]
null
null
null
null
null
GHSA-85rg-2jgh-frvj
Multiple buffer overflows in an ActiveX control (boisweb.dll) in Macrovision FLEXnet Connect 6.0 and Update Service 3.x to 5.x allow remote attackers to execute arbitrary code via the (1) the second parameter to the DownloadAndExecute method and (2) third parameter to the AddFileEx method, a different vulnerability than CVE-2007-0328.
[]
null
null
null
null
null
GHSA-p34f-6xg6-mcrp
If a site had been granted the permission to open popup windows, it could cause Select elements to appear on top of another site to perform a spoofing attack. This vulnerability affects Firefox < 130 and Firefox ESR < 128.2.
[]
null
6.1
null
null
null
CVE-2020-3370
Cisco Content Security Management Appliance Filter Bypass Vulnerability
A vulnerability in URL filtering of Cisco Content Security Management Appliance (SMA) could allow an unauthenticated, remote attacker to bypass URL filtering on an affected device. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending a crafted, malicious HTTP request to an affected device. A successful exploit could allow the attacker to redirect users to malicious sites.
[ "cpe:2.3:a:cisco:email_security_appliance:*:*:*:*:*:*:*:*" ]
null
null
4
null
null
CVE-2009-10002
dpup fittr-flickr EXIF Preview easy-exif.js cross site scripting
A vulnerability, which was classified as problematic, has been found in dpup fittr-flickr. This issue affects some unknown processing of the file fittr-flickr/features/easy-exif.js of the component EXIF Preview Handler. The manipulation leads to cross site scripting. The attack may be initiated remotely. The identifier of the patch is 08875dd8a2e5d0d16568bb0d67cb4328062fccde. It is recommended to apply a patch to fix this issue. The identifier VDB-218297 was assigned to this vulnerability.
[ "cpe:2.3:a:fittr_flickr_project:fittr_flickr:*:*:*:*:*:chrome:*:*" ]
null
3.5
3.5
4
https://github.com/dpup/fittr-flickr/commit/08875dd8a2e5d0d16568bb0d67cb4328062fccde
GHSA-8xpw-m3x3-rq75
SonicWall SMA1000 series firmware 12.4.0, 12.4.1-02965 and earlier versions incorrectly restricts access to a resource using HTTP connections from an unauthorized actor leading to Improper Access Control vulnerability.
[]
null
9.8
null
null
null
RHSA-2022:5717
Red Hat Security Advisory: grafana security update
grafana: OAuth account takeover
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.1
null
null
null
GHSA-g9rr-59hx-4m93
Unspecified vulnerability in HP Rapid Deployment Pack (RDP) and Insight Control Server Deployment allows remote attackers to obtain sensitive information, modify data, or cause a denial of service via unknown vectors.
[]
null
null
null
null
null
CVE-2024-49611
WordPress Product Website Showcase plugin <= 1.0 - Arbitrary File Upload vulnerability
Unrestricted Upload of File with Dangerous Type vulnerability in Paxman Product Website Showcase allows Upload a Web Shell to a Web Server.This issue affects Product Website Showcase: from n/a through 1.0.
[ "cpe:2.3:a:paxman:product_website_showcase:*:*:*:*:*:*:*:*", "cpe:2.3:a:paxman:product_website_showcase:*:*:*:*:*:wordpress:*:*" ]
null
10
null
null
null
CVE-2024-2581
Tenda AC10 SetStaticRouteCfg fromSetRouteStatic stack-based overflow
A vulnerability was found in Tenda AC10 16.03.10.13 and classified as critical. This issue affects the function fromSetRouteStatic of the file /goform/SetStaticRouteCfg. The manipulation of the argument list leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-257081 was assigned to this vulnerability.
[ "cpe:2.3:o:tenda:ac10_firmware:16.03.10.13:*:*:*:*:*:*:*" ]
null
8.8
8.8
9
null
GHSA-x552-5vh8-qccx
In lunary-ai/lunary before version 1.4.26, the checklists.post() endpoint allows users to create or modify checklists without validating whether the user has proper permissions. This missing access control permits unauthorized users to create checklists, bypassing intended permission checks. Additionally, the endpoint does not validate the uniqueness of the slug field when creating a new checklist, allowing an attacker to spoof existing checklists by reusing the slug of an already-existing checklist. This can lead to significant data integrity issues, as legitimate checklists can be replaced with malicious or altered data.
[]
null
null
7.1
null
null
GHSA-3mqv-8gxg-pfm4
TwitterServer Cross-site Scripting via /histograms endpoint
server/handler/HistogramQueryHandler.scala in Twitter TwitterServer (aka twitter-server) before 20.12.0, in some configurations, allows XSS via the /histograms endpoint.
[]
null
6.1
null
null
null
GHSA-75x6-83gf-w42q
Cross-site scripting (XSS) vulnerability in the SemanticTitle extension before 1.1.0 for MediaWiki allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
[]
null
null
null
null
null
CVE-2006-0788
Kyocera 3830 (aka FS-3830N) printers have a back door that allows remote attackers to read and alter configuration settings via strings that begin with "!R!SIOP0", as demonstrated using (1) a connection to to TCP port 9100 or (2) the UNIX lp command.
[ "cpe:2.3:h:kyocera:fs-3830n:*:*:*:*:*:*:*:*" ]
null
null
null
5
null
CVE-2021-41616
Apache ddlutils 1.0 readobject vulnerability
Apache DB DdlUtils 1.0 included a BinaryObjectsHelper that was intended for use when migrating database data with a SQL data type of BINARY, VARBINARY, LONGVARBINARY, or BLOB between databases using the ddlutils features. The BinaryObjectsHelper class was insecure and used ObjectInputStream.readObject without validating that the input data was safe to deserialize. Please note that DdlUtils is no longer being actively developed. To address the insecurity of the BinaryObjectHelper class, the following changes to DdlUtils have been made: (1) BinaryObjectsHelper.java has been deleted from the DdlUtils source repository and the DdlUtils feature of propagating data of SQL binary types is therefore no longer present in DdlUtils; (2) The ddlutils-1.0 release has been removed from the Apache Release Distribution Infrastructure; (3) The DdlUtils web site has been updated to indicate that DdlUtils is now available only as source code, not as a packaged release.
[ "cpe:2.3:a:apache:ddlutils:1.0:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
null
GHSA-8pmc-2r7m-mjxq
Buffer overflow in the SaveBarCode function in the Taltech Tal Bar Code ActiveX control allows remote attackers to execute arbitrary code via unspecified vectors.
[]
null
null
null
null
null
CVE-2012-1742
Unspecified vulnerability in Oracle Siebel CRM 8.1.1 and 8.2.2 allows remote attackers to affect availability via unknown vectors related to UI Framework, a different vulnerability than CVE-2012-1760.
[ "cpe:2.3:a:oracle:siebel_crm:8.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:siebel_crm:8.2.2:*:*:*:*:*:*:*" ]
null
null
null
5
null
CVE-2002-1227
PAM 0.76 treats a disabled password as if it were an empty (null) password, which allows local and remote attackers to gain privileges as disabled users.
[ "cpe:2.3:a:pam:pam:0.76:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2014-4244
Unspecified vulnerability in Oracle Java SE 5.0u65, 6u75, 7u60, and 8u5, and JRockit R27.8.2 and JRockit R28.3.2, allows remote attackers to affect confidentiality and integrity via unknown vectors related to Security.
[ "cpe:2.3:a:oracle:jdk:1.5.0:update65:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update75:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update60:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.8.0:update5:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:update65:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update75:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update60:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.8.0:update5:*:*:*:*:*:*", "cpe:2.3:a:oracle:jrockit:r27.8.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:jrockit:r28.3.2:*:*:*:*:*:*:*" ]
null
null
null
4
null
CVE-2024-47817
Unvalidated paragraph widget values can be used for Cross-site Scripting in lara-zeus
Lara-zeus Dynamic Dashboard simple way to manage widgets for your website landing page, and filament dashboard and Lara-zeus artemis is a collection of themes for the lara-zeus ecosystem. If values passed to a paragraph widget are not valid and contain a specific set of characters, applications are vulnerable to XSS attack against a user who opens a page on which a paragraph widget is rendered. Users are advised to upgrade to the appropriate fix versions detailed in the advisory metadata. There are no known workarounds for this vulnerability.
[ "cpe:2.3:a:lara_zeus:dynamic_dashboard:*:*:*:*:*:*:*:*" ]
5.3
null
null
null
null
GHSA-w7gq-r88x-g96q
In all Qualcomm products with Android releases from CAF using the Linux kernel, in wma_unified_link_radio_stats_event_handler(), the number of radio channels coming from firmware is not properly validated, potentially leading to an integer overflow vulnerability followed by a buffer overflow.
[]
null
null
7.8
null
null
CVE-2025-30635
WordPress IDonatePro <= 2.1.9 - Local File Inclusion Vulnerability
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeAtelier IDonatePro allows PHP Local File Inclusion. This issue affects IDonatePro: from n/a through 2.1.9.
[]
null
8.1
null
null
null
GHSA-m295-r33q-79rg
An authentication bypass vulnerability exists in the web component of the Motorola MR2600. An attacker can exploit this vulnerability to access protected URLs and retrieve sensitive information.
[]
null
9.6
null
null
null
GHSA-3p23-jfm6-493m
This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16191.
[]
null
7.8
null
null
null
CVE-2017-18111
The OAuthHelper in Atlassian Application Links before version 5.0.10, from version 5.1.0 before version 5.1.3, and from version 5.2.0 before version 5.2.6 used an XML document builder that was vulnerable to XXE when consuming a client OAuth request. This allowed malicious oauth application linked applications to probe internal network resources by requesting internal locations, read the contents of files and also cause an out of memory exception affecting availability via an XML External Entity vulnerability.
[ "cpe:2.3:a:atlassian:application_links:*:*:*:*:*:*:*:*" ]
null
null
8.7
5.5
null
CVE-2022-20542
In parseParamsBlob of types.cpp, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-238083570
[ "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*" ]
null
7.8
null
null
null
GHSA-77hr-fpmg-vvgr
SQL Server Native Client Remote Code Execution Vulnerability
[]
null
8.8
null
null
null
CVE-2008-4810
The _expand_quoted_text function in libs/Smarty_Compiler.class.php in Smarty 2.6.20 before r2797 allows remote attackers to execute arbitrary PHP code via vectors related to templates and (1) a dollar-sign character, aka "php executed in templates;" and (2) a double quoted literal string, aka a "function injection security hole." NOTE: each vector affects slightly different SVN revisions.
[ "cpe:2.3:a:smarty:smarty:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:smarty:smarty:1.0a:*:*:*:*:*:*:*", "cpe:2.3:a:smarty:smarty:1.0b:*:*:*:*:*:*:*", "cpe:2.3:a:smarty:smarty:1.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:smarty:smarty:1.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:smarty:smarty:1.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:smarty:smarty:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:smarty:smarty:1.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:smarty:smarty:1.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:smarty:smarty:1.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:smarty:smarty:1.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:smarty:smarty:1.4.0:b1:*:*:*:*:*:*", "cpe:2.3:a:smarty:smarty:1.4.0:b2:*:*:*:*:*:*", "cpe:2.3:a:smarty:smarty:1.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:smarty:smarty:1.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:smarty:smarty:1.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:smarty:smarty:1.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:smarty:smarty:1.4.5:*:*:*:*:*:*:*", "cpe:2.3:a:smarty:smarty:1.4.6:*:*:*:*:*:*:*", "cpe:2.3:a:smarty:smarty:1.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:smarty:smarty:1.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:smarty:smarty:1.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:smarty:smarty:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:smarty:smarty:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:smarty:smarty:2.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:smarty:smarty:2.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:smarty:smarty:2.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:smarty:smarty:2.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:smarty:smarty:2.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:smarty:smarty:2.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:smarty:smarty:2.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:smarty:smarty:2.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:smarty:smarty:2.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:smarty:smarty:2.5.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:smarty:smarty:2.5.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:smarty:smarty:2.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:smarty:smarty:2.6.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:smarty:smarty:2.6.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:smarty:smarty:2.6.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:smarty:smarty:2.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:smarty:smarty:2.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:smarty:smarty:2.6.3:*:*:*:*:*:*:*", "cpe:2.3:a:smarty:smarty:2.6.4:*:*:*:*:*:*:*", "cpe:2.3:a:smarty:smarty:2.6.5:*:*:*:*:*:*:*", "cpe:2.3:a:smarty:smarty:2.6.6:*:*:*:*:*:*:*", "cpe:2.3:a:smarty:smarty:2.6.7:*:*:*:*:*:*:*", "cpe:2.3:a:smarty:smarty:2.6.9:*:*:*:*:*:*:*", "cpe:2.3:a:smarty:smarty:2.6.10:*:*:*:*:*:*:*", "cpe:2.3:a:smarty:smarty:2.6.11:*:*:*:*:*:*:*", "cpe:2.3:a:smarty:smarty:2.6.12:*:*:*:*:*:*:*", "cpe:2.3:a:smarty:smarty:2.6.13:*:*:*:*:*:*:*", "cpe:2.3:a:smarty:smarty:2.6.14:*:*:*:*:*:*:*", "cpe:2.3:a:smarty:smarty:2.6.15:*:*:*:*:*:*:*", "cpe:2.3:a:smarty:smarty:2.6.16:*:*:*:*:*:*:*", "cpe:2.3:a:smarty:smarty:2.6.17:*:*:*:*:*:*:*", "cpe:2.3:a:smarty:smarty:2.6.18:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2015-5933
Audio in Apple OS X before 10.11.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted audio file, a different vulnerability than CVE-2015-5934.
[ "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*" ]
null
null
null
6.8
null
GHSA-4hrh-9vmp-2jgg
Heap buffer overflow in `StringNGrams`
ImpactAn attacker can cause a heap buffer overflow by passing crafted inputs to `tf.raw_ops.StringNGrams`:This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/1cdd4da14282210cc759e468d9781741ac7d01bf/tensorflow/core/kernels/string_ngrams_op.cc#L171-L185) fails to consider corner cases where input would be split in such a way that the generated tokens should only contain padding elements:If input is such that `num_tokens` is 0, then, for `data_start_index=0` (when left padding is present), the marked line would result in reading `data[-1]`.PatchesWe have patched the issue in GitHub commit [ba424dd8f16f7110eea526a8086f1a155f14f22b](https://github.com/tensorflow/tensorflow/commit/ba424dd8f16f7110eea526a8086f1a155f14f22b).The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.For more informationPlease consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.AttributionThis vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team.
[]
2
2.5
null
null
null
CVE-2020-18652
Buffer Overflow vulnerability in WEBP_Support.cpp in exempi 2.5.0 and earlier allows remote attackers to cause a denial of service via opening of crafted webp file.
[ "cpe:2.3:a:exempi_project:exempi:*:*:*:*:*:*:*:*" ]
null
6.5
null
null
null
CVE-2014-0347
The Settings module in Websense Triton Unified Security Center 7.7.3 before Hotfix 31, Web Filter 7.7.3 before Hotfix 31, Web Security 7.7.3 before Hotfix 31, Web Security Gateway 7.7.3 before Hotfix 31, and Web Security Gateway Anywhere 7.7.3 before Hotfix 31 allows remote authenticated users to read cleartext passwords by replacing type="password" with type="text" in an INPUT element in the (1) Log Database or (2) User Directories component.
[ "cpe:2.3:a:websense:triton_unified_security_center:7.7.3:*:*:*:*:*:*:*", "cpe:2.3:a:websense:triton_web_filter:7.7.3:*:*:*:*:*:*:*", "cpe:2.3:a:websense:triton_web_security:7.7.3:*:*:*:*:*:*:*", "cpe:2.3:a:websense:triton_web_security_gateway:7.7.3:*:*:*:*:*:*:*", "cpe:2.3:a:websense:triton_web_security_gateway_anywhere:7.7.3:*:*:*:*:*:*:*" ]
null
null
null
3.5
null