id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
189k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
patch_commit_url
stringlengths
38
232
CVE-2000-0231
Linux kreatecd trusts a user-supplied path that is used to find the cdrecord program, allowing local users to gain root privileges.
[ "cpe:2.3:o:halloween:halloween_linux:4.0:*:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux:6.1:*:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux:6.2:*:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux:6.3:*:*:*:*:*:*:*" ]
null
null
null
7.2
null
GHSA-4f7c-7x79-wr4p
Successful exploitation of the vulnerability could allow an unauthenticated attacker to conduct brute force guessing and account takeover as the session cookies are predictable, potentially allowing the attackers to gain root, admin or user access and reset passwords.
[]
null
5
null
null
null
GHSA-8c79-f43g-55mx
Tenda M3 V1.0.0.12(4856) was discovered to contain a Command Execution vulnerability via the function TendaTelnet.
[]
null
9.8
null
null
null
CVE-2024-1758
The SuperFaktura WooCommerce plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 1.40.3 via the wc_sf_url_check function. This makes it possible for authenticated attackers, with subscriber-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.
[]
null
5.4
null
null
null
CVE-2011-5167
Heap-based buffer overflow in the SetDevNames method of the Tidestone Formula One ActiveX control (TTF16.ocx) 6.3.5 Build 1 in Oracle Hyperion Strategic Finance 12.x and possibly earlier allows remote attackers to execute arbitrary code via a long string to the DriverName parameter.
[ "cpe:2.3:a:oracle:hyperion_strategic_finance:*:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:hyperion_strategic_finance:11.1.2.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:tidestone:formula_one_activex_control:6.3.5.1:*:*:*:*:*:*:*" ]
null
null
null
9.3
null
CVE-2023-22960
Lexmark products through 2023-01-10 have Improper Control of Interaction Frequency.
[ "cpe:2.3:o:lexmark:b2236_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:b2236:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:b2338_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:b2338:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:b2442_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:b2442:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:b2546_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:b2546:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:b2650_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:b2650:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:b2865_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:b2865:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:b3340_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:b3340:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:b3442_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:b3442:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:c2240_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:c2240:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:c2325_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:c2325:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:c2326_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:c2326:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:c2425_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:c2425:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:c2535_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:c2535:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:c3224_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:c3224:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:c3326_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:c3326:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:c3426_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:c3426:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:c4150_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:c4150:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:c6160_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:c6160:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:c9235_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:c9235:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:cs331_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cs331:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:cs421_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cs421:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:cs431_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cs431:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:cs439_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cs439:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:cs521_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cs521:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:cs622_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cs622:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:cs720_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cs720:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:cs725_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cs725:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:cs727_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cs727:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:cs728_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cs728:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:cs820_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cs820:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:cs827_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cs827:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:cs921_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cs921:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:cs923_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cs923:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:cs927_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cs927:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:cx331_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cx331:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:cx421_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cx421:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:cx431_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cx431:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:cx522_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cx522:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:cx622_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cx622:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:cx625_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cx625:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:cx725_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cx725:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:cx727_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cx727:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:cx820_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cx820:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:cx825_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cx825:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:cx860_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cx860:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:cx920_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cx920:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:cx921_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cx921:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:cx922_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cx922:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:cx923_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cx923:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:cx924_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cx924:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:cx944_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cx944:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:m1242_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:m1242:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:m1246_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:m1246:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:m1342_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:m1342:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:m3250_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:m3250:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:m5255_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:m5255:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:m5270_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:m5270:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:mb2236_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mb2236:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:mb2338_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mb2338:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:mb2442_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mb2442:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:mb2546_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mb2546:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:mb2650_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mb2650:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:mb2770_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mb2770:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:mb3442_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mb3442:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:mc2325_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mc2325:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:mc2425_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mc2425:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:mc2535_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mc2535:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:mc2640_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mc2640:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:mc3224_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mc3224:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:mc3326_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mc3326:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:mc3426_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mc3426:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:ms321_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms321:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:ms331_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms331:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:ms421_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms421:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:ms431_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms431:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:ms521_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms521:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:ms621_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms621:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:ms622_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms622:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:ms725_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms725:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:ms821_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms821:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:ms822_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms822:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:ms823_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms823:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:ms825_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms825:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:ms826_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms826:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:mx321_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx321:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:mx331_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx331:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:mx421_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx421:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:mx431_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx431:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:mx432_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx432:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:mx521_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx521:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:mx522_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx522:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:mx622_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx622:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:mx721_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx721:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:mx722_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx722:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:mx822_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx822:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:mx826_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx826:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:mx931_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx931:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:xc2235_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xc2235:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:xc2326_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xc2326:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:xc4140_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xc4140:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:xc4143_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xc4143:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:xc4150_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xc4150:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:xc4153_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xc4153:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:xc4240_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xc4240:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:xc4342_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xc4342:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:xc4352_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xc4352:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:xc6152_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xc6152:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:xc6153_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xc6153:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:xc8155_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xc8155:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:xc8160_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xc8160:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:xc8163_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xc8163:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:xc9225_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xc9225:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:xc9235_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xc9235:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:xc9245_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xc9245:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:xc9255_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xc9255:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:xc9265_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xc9265:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:xc9335_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xc9335:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:xc9445_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xc9445:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:xc9455_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xc9455:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:xc9465_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xc9465:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:xm1242_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xm1242:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:xm1246_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xm1246:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:xm1342_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xm1342:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:xm3142_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xm3142:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:xm3250_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xm3250:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:xm5365_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xm5365:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:xm7355_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xm7355:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:xm7370_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xm7370:-:*:*:*:*:*:*:*" ]
null
7.5
null
null
null
GHSA-gj5q-rq38-2gcg
The NSAPI plugins for TGA and the Java Servlet proxy in HP-UX VVOS 10.24 and 11.04 allows an attacker to cause a denial of service (high CPU utilization).
[]
null
null
null
null
null
CVE-2023-21157
In encode of wlandata.cpp, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-263783137References: N/A
[ "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*" ]
null
6.7
null
null
null
CVE-2022-21763
In telecom service, there is a possible information disclosure due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07044717; Issue ID: ALPS07044708.
[ "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6795:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*" ]
null
5.5
null
2.1
null
CVE-2025-2349
IROAD Dash Cam FX2 Password Hash passwd weak password hash
A vulnerability was found in IROAD Dash Cam FX2 up to 20250308. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /etc/passwd of the component Password Hash Handler. The manipulation leads to password hash with insufficient computational effort. Access to the local network is required for this attack. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used.
[]
2.3
3.1
3.1
1.8
null
CVE-2024-22590
The TLS engine in Kwik commit 745fd4e2 does not track the current state of the connection. This vulnerability can allow Client Hello messages to be overwritten at any time, including after a connection has been established.
[ "cpe:2.3:a:ptrd:kwik:*:*:*:*:*:*:*:*" ]
null
9.1
null
null
null
CVE-2007-4631
The DataLoader::doStart function in dataloader.cpp in QGit 1.5.6 and other versions up to 2pre1 allows local users to overwrite arbitrary files and execute arbitrary code via a symlink attack on temporary files with predictable filenames.
[ "cpe:2.3:a:qgit:qgit:1.5.6_2pre1:*:*:*:*:*:*:*" ]
null
null
null
6.9
null
GHSA-735v-r5c6-6249
A vulnerability classified as problematic has been found in TP-Link TL-SG108E 1.0.0 Build 20201208 Rel. 40304. Affected is an unknown function of the file /usr_account_set.cgi of the component HTTP GET Request Handler. The manipulation of the argument username/password leads to use of get request method with sensitive query strings. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 1.0.0 Build 20250124 Rel. 54920(Beta) is able to address this issue. It is recommended to upgrade the affected component. The vendor was contacted early. They reacted very professional and provided a pre-fix version for their customers.
[]
6.3
3.7
null
null
null
CVE-2019-7170
A stored-self XSS exists in Croogo through v3.0.5, allowing an attacker to execute HTML or JavaScript code in a vulnerable Title field to /admin/taxonomy/vocabularies.
[ "cpe:2.3:a:croogo:croogo:*:*:*:*:*:*:*:*" ]
null
null
4.8
3.5
null
CVE-2023-28356
A vulnerability has been identified where a maliciously crafted message containing a specific chain of characters can cause the chat to enter a hot loop on one of the processes, consuming ~120% CPU and rendering the service unresponsive.
[ "cpe:2.3:a:rocket.chat:rocket.chat:*:*:*:*:*:*:*:*" ]
null
7.5
null
null
null
CVE-2019-3994
ELOG 3.1.4-57bea22 and below is affected by a denial of service vulnerability due to a use after free. A remote unauthenticated attacker can crash the ELOG server by sending multiple HTTP POST requests which causes the ELOG function retrieve_url() to use a freed variable.
[ "cpe:2.3:a:elog_project:elog:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*" ]
null
7.5
null
5
null
CVE-2014-8147
The resolveImplicitLevels function in common/ubidi.c in the Unicode Bidirectional Algorithm implementation in ICU4C in International Components for Unicode (ICU) before 55.1 uses an integer data type that is inconsistent with a header file, which allows remote attackers to cause a denial of service (incorrect malloc followed by invalid free) or possibly execute arbitrary code via crafted text.
[ "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", "cpe:2.3:a:icu-project:international_components_for_unicode:*:*:*:*:*:c\\/c\\+\\+:*:*" ]
null
null
null
7.5
null
CVE-2002-1820
register.php in Ultimate PHP Board (UPB) 1.0 and 1.0b uses an administrative account Admin with a capital "A," but allows a remote attacker to impersonate the administrator by registering an account name of admin with a lower case "a."
[ "cpe:2.3:a:ultimate_php_board_project:ultimate_php_board:1.0:-:*:*:*:*:*:*", "cpe:2.3:a:ultimate_php_board_project:ultimate_php_board:1.0:beta:*:*:*:*:*:*" ]
null
9.8
null
7.5
null
CVE-2018-5447
An Improper Input Validation issue was discovered in Nari PCS-9611 relay. An improper input validation vulnerability has been identified that affects a service within the software that may allow a remote attacker to arbitrarily read/access system resources and affect the availability of the system.
[ "cpe:2.3:o:nrec:pcs-9611_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:nrec:pcs-9611:-:*:*:*:*:*:*:*" ]
null
null
9.8
10
null
GHSA-g2c5-92x6-44rw
In dumpExtractors of IMediaExtractor.cp, there is a possible disclosure of recently accessed media files due to a permissions bypass. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android-7.0 Android-7.1.1 Android-7.1.2 Android-8.0 Android-8.1. Android ID: A-114770654.
[]
null
null
5.5
null
null
CVE-2023-2704
The BP Social Connect plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 1.5. This is due to insufficient verification on the user being supplied during a Facebook login through the plugin. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the email.
[ "cpe:2.3:a:vibethemes:bp_social_connect:*:*:*:*:*:wordpress:*:*" ]
null
9.8
null
null
null
GHSA-cgr8-m7vv-pjv9
Hesabim.asp in ASPSitem 2.0 and earlier allows remote attackers to read private messages of other users via a modified id parameter.
[]
null
null
null
null
null
CVE-2017-17881
In ImageMagick 7.0.7-12 Q16, a memory leak vulnerability was found in the function ReadMATImage in coders/mat.c, which allows attackers to cause a denial of service via a crafted MAT image file.
[ "cpe:2.3:a:imagemagick:imagemagick:7.0.7-12:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*" ]
null
null
6.5
4.3
null
GHSA-2w84-rx82-9hcw
In libxaac there is a possible out of bounds read due to a missing bounds check. This could lead to information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-112553431
[]
null
null
null
null
null
GHSA-pgq2-52j2-j4xx
In the Linux kernel, the following vulnerability has been resolved:netdevsim: use cond_resched() in nsim_dev_trap_report_work()I am still seeing many syzbot reports hinting that syzbot might fool nsim_dev_trap_report_work() with hundreds of ports [1]Lets use cond_resched(), and system_unbound_wq instead of implicit system_wq.[1] INFO: task syz-executor:20633 blocked for more than 143 seconds. Not tainted 6.12.0-rc2-syzkaller-00205-g1d227fcc7222 #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:syz-executor state:D stack:25856 pid:20633 tgid:20633 ppid:1 flags:0x00004006 ... NMI backtrace for cpu 1 CPU: 1 UID: 0 PID: 16760 Comm: kworker/1:0 Not tainted 6.12.0-rc2-syzkaller-00205-g1d227fcc7222 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 Workqueue: events nsim_dev_trap_report_work RIP: 0010:__sanitizer_cov_trace_pc+0x0/0x70 kernel/kcov.c:210 Code: 89 fb e8 23 00 00 00 48 8b 3d 04 fb 9c 0c 48 89 de 5b e9 c3 c7 5d 00 0f 1f 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 <f3> 0f 1e fa 48 8b 04 24 65 48 8b 0c 25 c0 d7 03 00 65 8b 15 60 f0 RSP: 0018:ffffc90000a187e8 EFLAGS: 00000246 RAX: 0000000000000100 RBX: ffffc90000a188e0 RCX: ffff888027d3bc00 RDX: ffff888027d3bc00 RSI: 0000000000000000 RDI: 0000000000000000 RBP: ffff88804a2e6000 R08: ffffffff8a4bc495 R09: ffffffff89da3577 R10: 0000000000000004 R11: ffffffff8a4bc2b0 R12: dffffc0000000000 R13: ffff88806573b503 R14: dffffc0000000000 R15: ffff8880663cca00 FS: 0000000000000000(0000) GS:ffff8880b8700000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fc90a747f98 CR3: 000000000e734000 CR4: 00000000003526f0 DR0: 0000000000000000 DR1: 000000000000002b DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400 Call Trace: <NMI> </NMI> <TASK> __local_bh_enable_ip+0x1bb/0x200 kernel/softirq.c:382 spin_unlock_bh include/linux/spinlock.h:396 [inline] nsim_dev_trap_report drivers/net/netdevsim/dev.c:820 [inline] nsim_dev_trap_report_work+0x75d/0xaa0 drivers/net/netdevsim/dev.c:850 process_one_work kernel/workqueue.c:3229 [inline] process_scheduled_works+0xa63/0x1850 kernel/workqueue.c:3310 worker_thread+0x870/0xd30 kernel/workqueue.c:3391 kthread+0x2f0/0x390 kernel/kthread.c:389 ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 </TASK>
[]
null
7.8
null
null
null
GHSA-f989-3fp9-q3r2
Magento Open Source allows Incorrect Authorization
Adobe Commerce versions 2.4.6 (and earlier), 2.4.5-p2 (and earlier) and 2.4.4-p3 (and earlier) are affected by an Incorrect Authorization vulnerability that could result in a security feature bypass. A privileged attacker could leverage this vulnerability to modify a minor functionality of another user's data. Exploitation of this issue does not require user interaction.
[]
6.9
4.3
null
null
null
GHSA-2g9g-vv6r-x6cj
Missing Authorization vulnerability in fifu.App Featured Image from URL allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Featured Image from URL: from n/a through 4.8.1.
[]
null
5.3
null
null
null
GHSA-v254-7f59-gpqj
A Regular Expression Denial of Service vulnerability in GitLab CE/EE affecting all versions from 1.0.2 prior to 14.10.5, 15.0 prior to 15.0.4, and 15.1 prior to 15.1.1 allows an attacker to make a GitLab instance inaccessible via specially crafted web server response headers
[]
null
5.3
null
null
null
CVE-2011-0911
Cross-site scripting (XSS) vulnerability in the Users module in Zikula before 1.2.5 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. NOTE: it is possible that this overlaps CVE-2011-0535.
[ "cpe:2.3:a:zikula:zikula_application_framework:*:*:*:*:*:*:*:*", "cpe:2.3:a:zikula:zikula_application_framework:1.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:zikula:zikula_application_framework:1.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:zikula:zikula_application_framework:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:zikula:zikula_application_framework:1.2.3:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
GHSA-6qmj-48p6-crf2
IBM Tivoli Netcool/OMNIbus_GUI and IBM Jazz for Service Management 1.1.3.10 is vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.
[]
null
null
null
null
null
GHSA-qcjw-3m37-53c6
A Local File Inclusion vulnerability in a Trend Micro Apex Central widget in versions below 8.0.6955 could allow an attacker to include arbitrary files to execute as PHP code and lead to remote code execution on affected installations.
[]
null
7.5
null
null
null
GHSA-mhmv-7727-5cc5
Improper handling of insufficient permission in Telephony prior to SMR Aug-2024 Release 1 allows local attackers to configure default Message application.
[]
null
4
null
null
null
GHSA-x37v-98f9-mj32
phpMyAdmin SQL injection in Designer feature
An issue was discovered in phpMyAdmin before 4.9.0.1. A vulnerability was reported where a specially crafted database name can be used to trigger an SQL injection attack through the designer feature.
[]
null
null
9.8
null
null
GHSA-5pc7-7874-mmf8
Progress Sitefinity 9.1 has XSS via the Content Management Template Configuration (aka Templateconfiguration), as demonstrated by the src attribute of an IMG element. This is fixed in 10.1.
[]
null
null
5.4
null
null
RHSA-2010:0544
Red Hat Security Advisory: thunderbird security update
Mozilla crashes with evidence of memory corruption Mozilla remote code execution with use-after-free in nsTreeSelection Mozilla Dangling pointer vulnerability in nsTreeContentView Mozilla Dangling pointer vulnerability in nsPluginArray Content-Disposition: attachment ignored if Content-Type: multipart also present Mozilla Freed object reuse across plugin instances Mozilla Integer Overflow in XSLT Node Sorting Mozilla Crashes with evidence of memory corruption Mozilla miscellaneous memory safety hazards Mozilla Plugin parameter EnsureCachedAttrParamArrays remote code execution vulnerability Mozilla nsTreeSelection dangling pointer remote code execution vulnerability Mozilla Cross-origin data leakage from script filename in error messages
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
null
GHSA-rgw4-gxj6-8ffh
The Memory Usage, Memory Limit, PHP and Server Memory Health Check and Fix Plugin WordPress plugin before 2.46 does not have proper authorisation and CSRF in an AJAX action, allowing any authenticated users, such as subscriber to call it and install and activate arbitrary plugins from wordpress.org
[]
null
6.5
null
null
null
CVE-2016-6352
The OneLine32 function in io-ico.c in gdk-pixbuf before 2.35.3 allows remote attackers to cause a denial of service (out-of-bounds write and crash) via crafted dimensions in an ICO file.
[ "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "cpe:2.3:a:gnome:gdk-pixbuf:*:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*" ]
null
null
7.5
5
null
CVE-2021-34202
There are multiple out-of-bounds vulnerabilities in some processes of D-Link AC2600(DIR-2640) 1.01B04. Ordinary permissions can be elevated to administrator permissions, resulting in local arbitrary code execution. An attacker can combine other vulnerabilities to further achieve the purpose of remote code execution.
[ "cpe:2.3:o:dlink:dir-2640-us_firmware:1.01b04:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:dir-2640-us:-:*:*:*:*:*:*:*" ]
null
7.8
null
7.2
null
CVE-2025-46906
Adobe Experience Manager | Cross-site Scripting (Stored XSS) (CWE-79)
Adobe Experience Manager versions 6.5.22 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
[]
null
5.4
null
null
null
GHSA-259w-8hf6-59c2
OCI image importer memory exhaustion in github.com/containerd/containerd
ImpactWhen importing an OCI image, there was no limit on the number of bytes read for certain files. A maliciously crafted image with a large file where a limit was not applied could cause a denial of service.PatchesThis bug has been fixed in containerd 1.6.18 and 1.5.18. Users should update to these versions to resolve the issue.WorkaroundsEnsure that only trusted images are used and that only trusted users have permissions to import images.CreditsThe containerd project would like to thank [David Korczynski](https://github.com/DavidKorczynski) and [Adam Korczynski](https://github.com/AdamKorcz) of ADA Logics for responsibly disclosing this issue in accordance with the [containerd security policy](https://github.com/containerd/project/blob/main/SECURITY.md) during a security fuzzing audit sponsored by CNCF.For more informationIf you have any questions or comments about this advisory:Open an issue in [containerd](https://github.com/containerd/containerd/issues/new/choose)Email us at [[email protected]](mailto:[email protected])To report a security issue in containerd:[Report a new vulnerability](https://github.com/containerd/containerd/security/advisories/new)Email us at [[email protected]](mailto:[email protected])
[]
null
5.5
null
null
null
GHSA-hf42-4hj4-cx44
Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS - Web Services). Supported versions that are affected are 12.1.3.0 and 12.2.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle WebLogic Server accessible data. CVSS 3.0 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
[]
null
null
7.5
null
null
GHSA-cw3c-gjjq-m9c4
Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.3.5 and 8.3.7 allows remote attackers to affect confidentiality, integrity, and availability, related to Outside In Image Export SDK, a different vulnerability than CVE-2012-0555, CVE-2012-0556, and CVE-2012-0557.
[]
null
null
null
null
null
CVE-2025-30724
Vulnerability in the Oracle BI Publisher product of Oracle Analytics (component: XML Services). Supported versions that are affected are 7.6.0.0.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle BI Publisher. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle BI Publisher accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
[]
null
7.5
null
null
null
CVE-2024-7570
Improper certificate validation in Ivanti ITSM on-prem and Neurons for ITSM Versions 2023.4 and earlier allows a remote attacker in a MITM position to craft a token that would allow access to ITSM as any user.
[ "cpe:2.3:a:ivanti:neurons_for_itsm:*:*:*:*:*:*:*:*", "cpe:2.3:a:ivanti:neurons_for_itsm:2023.2:*:*:*:*:*:*:*", "cpe:2.3:a:ivanti:neurons_for_itsm:2023.3:*:*:*:*:*:*:*", "cpe:2.3:a:ivanti:neurons_for_itsm:2023.4:*:*:*:*:*:*:*" ]
null
8.3
null
null
null
CVE-2024-11301
Improper Enforcement of Unique Constraint in lunary-ai/lunary
In lunary-ai/lunary before version 1.6.3, the application allows the creation of evaluators without enforcing a unique constraint on the combination of projectId and slug. This allows an attacker to overwrite existing data by submitting a POST request with the same slug as an existing evaluator. The lack of database constraints or application-layer validation to prevent duplicates exposes the application to data integrity issues. This vulnerability can result in corrupted data and potentially malicious actions, impairing the system's functionality.
[]
null
null
6.5
null
null
GHSA-hwrw-j4pc-89pr
Knowage Suite 7.3 is vulnerable to Stored Client-Side Template Injection in '/knowage/restful-services/signup/update' via the 'name' parameter.
[]
null
null
null
null
null
CVE-2023-35024
IBM Cloud Pak for Business Automation cross-site scripting
IBM Cloud Pak for Business Automation 18.0.0, 18.0.1, 18.0.2, 19.0.1, 19.0.2, 19.0.3, 20.0.1, 20.0.2, 20.0.3, 21.0.1, 21.0.2, 21.0.3, 22.0.1, and 22.0.2 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 258349.
[ "cpe:2.3:a:ibm:cloud_pak_for_business_automation:18.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:cloud_pak_for_business_automation:18.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:cloud_pak_for_business_automation:18.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:cloud_pak_for_business_automation:19.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:cloud_pak_for_business_automation:19.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:cloud_pak_for_business_automation:19.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:cloud_pak_for_business_automation:20.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:cloud_pak_for_business_automation:20.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:cloud_pak_for_business_automation:20.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.1:-:*:*:*:*:*:*", "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.2:-:*:*:*:*:*:*", "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:-:*:*:*:*:*:*", "cpe:2.3:a:ibm:cloud_pak_for_business_automation:22.0.1:-:*:*:*:*:*:*", "cpe:2.3:a:ibm:cloud_pak_for_business_automation:22.0.2:-:*:*:*:*:*:*" ]
null
4.6
null
null
null
RHBA-2007:0861
Red Hat Bug Fix Advisory: dlm-kernel bug fix update
security flaw
[ "cpe:/a:redhat:rhel_cluster:4" ]
null
null
null
null
null
RHSA-2023:0469
Red Hat Security Advisory: Red Hat Integration Camel Extensions For Quarkus 2.13.2
jettison: parser crash by stackoverflow jettison: memory exhaustion via user-supplied XML or JSON data xstream: Xstream to serialise XML data was vulnerable to Denial of Service attacks woodstox-core: woodstox to serialise XML data was vulnerable to Denial of Service attacks xstream: Xstream to serialise XML data was vulnerable to Denial of Service attacks xstream: Xstream to serialise XML data was vulnerable to Denial of Service attacks xstream: Xstream to serialise XML data was vulnerable to Denial of Service attacks xstream: Xstream to serialise XML data was vulnerable to Denial of Service attacks jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS jackson-databind: use of deeply nested arrays apache-commons-text: variable interpolation RCE
[ "cpe:/a:redhat:camel_quarkus:2.13" ]
null
9.8
null
null
null
cisco-sa-20180926-shell-access
Cisco IOS XE Software Shell Access Authentication Bypass Vulnerability
A vulnerability in the shell access request mechanism of Cisco IOS XE Software could allow an authenticated, local attacker to bypass authentication and gain unrestricted access to the root shell of an affected device. The vulnerability exists because the affected software has insufficient authentication mechanisms for certain commands. An attacker could exploit this vulnerability by requesting access to the root shell of an affected device, after the shell access feature has been enabled. A successful exploit could allow the attacker to bypass authentication and gain unrestricted access to the root shell of the affected device. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180926-shell-access ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180926-shell-access"]
[]
null
null
6.7
null
null
GHSA-5429-63wr-8cgm
Wangmarket v4.10 to v5.0 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /agency/AgencyUserController.java.
[]
null
6.8
null
null
null
CVE-2011-4719
Multiple unspecified vulnerabilities in Google Chrome before 16.0.912.63 on the Acer AC700, Samsung Series 5, and Cr-48 Chromebook platforms have unknown impact and attack vectors.
[ "cpe:2.3:o:google:chrome_os:*:*:*:*:*:*:*:*", "cpe:2.3:h:acer:ac700_chromebook:*:*:*:*:*:*:*:*", "cpe:2.3:h:google:cr-48_chromebook:*:*:*:*:*:*:*:*", "cpe:2.3:h:samsung:series_5_chromebook:*:*:*:*:*:*:*:*" ]
null
null
null
10
null
GHSA-vwj2-v47j-h734
The Remove Schema plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.5. This is due to missing or incorrect nonce validation on the validate() function. This makes it possible for unauthenticated attackers to modify the plugins settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
[]
null
4.3
null
null
null
CVE-2001-0566
Cisco Catalyst 2900XL switch allows a remote attacker to create a denial of service via an empty UDP packet sent to port 161 (SNMP) when SNMP is disabled.
[ "cpe:2.3:h:cisco:catalyst_2900:xl:*:*:*:*:*:*:*" ]
null
null
null
5
null
CVE-2023-21361
In Bluetooth, there is a possibility of code-execution due to a use after free. This could lead to paired device escalation of privilege in the privileged Bluetooth process with no additional execution privileges needed. User interaction is not needed for exploitation.
[ "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*" ]
null
8.8
null
null
null
GHSA-jhpg-hx7g-8xfw
In audio, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS08241940; Issue ID: ALPS08241940.
[]
null
7.8
null
null
null
CVE-2007-0902
Unspecified vulnerability in the "Show debugging information" feature in MoinMoin 1.5.7 allows remote attackers to obtain sensitive information. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
[ "cpe:2.3:a:moinmoin:moinmoin:1.5.7:*:*:*:*:*:*:*" ]
null
null
null
5
null
GHSA-33c7-f9jv-pmxj
Improper input validation vulnerability in XPLATFORM's execBrowser method can cause execute arbitrary commands. IF the second parameter value of the execBrowser function is ‘default’, the first parameter value could be passed to the ShellExecuteW API. The passed parameter is an arbitrary code to be executed. Remote attackers can use this vulnerability to execute arbitrary remote code.
[]
null
8.8
null
null
null
GHSA-p3j3-7q7c-3g53
In the Linux kernel, the following vulnerability has been resolved:cfg80211: call cfg80211_stop_ap when switch from P2P_GO typeIf the userspace tools switch from NL80211_IFTYPE_P2P_GO to NL80211_IFTYPE_ADHOC via send_msg(NL80211_CMD_SET_INTERFACE), it does not call the cleanup cfg80211_stop_ap(), this leads to the initialization of in-use data. For example, this path re-init the sdata->assigned_chanctx_list while it is still an element of assigned_vifs list, and makes that linked list corrupt.
[]
null
7.8
null
null
null
GHSA-7rc8-rqg8-27m3
In the Linux kernel, the following vulnerability has been resolved:bpf: Fix too early release of tcx_entryPedro Pinto and later independently also Hyunwoo Kim and Wongi Lee reported an issue that the tcx_entry can be released too early leading to a use after free (UAF) when an active old-style ingress or clsact qdisc with a shared tc block is later replaced by another ingress or clsact instance.Essentially, the sequence to trigger the UAF (one example) can be as follows:A network namespace is createdAn ingress qdisc is created. This allocates a tcx_entry, and &tcx_entry->miniq is stored in the qdisc's miniqp->p_miniq. At the same time, a tcf block with index 1 is created.chain0 is attached to the tcf block. chain0 must be connected to the block linked to the ingress qdisc to later reach the function tcf_chain0_head_change_cb_del() which triggers the UAF.Create and graft a clsact qdisc. This causes the ingress qdisc created in step 1 to be removed, thus freeing the previously linked tcx_entry:rtnetlink_rcv_msg() => tc_modify_qdisc() => qdisc_create() => clsact_init() [a] => qdisc_graft() => qdisc_destroy() => __qdisc_destroy() => ingress_destroy() [b] => tcx_entry_free() => kfree_rcu() // tcx_entry freedFinally, the network namespace is closed. This registers the cleanup_net worker, and during the process of releasing the remaining clsact qdisc, it accesses the tcx_entry that was already freed in step 4, causing the UAF to occur:cleanup_net() => ops_exit_list() => default_device_exit_batch() => unregister_netdevice_many() => unregister_netdevice_many_notify() => dev_shutdown() => qdisc_put() => clsact_destroy() [c] => tcf_block_put_ext() => tcf_chain0_head_change_cb_del() => tcf_chain_head_change_item() => clsact_chain_head_change() => mini_qdisc_pair_swap() // UAFThere are also other variants, the gist is to add an ingress (or clsact) qdisc with a specific shared block, then to replace that qdisc, waiting for the tcx_entry kfree_rcu() to be executed and subsequently accessing the current active qdisc's miniq one way or another.The correct fix is to turn the miniq_active boolean into a counter. What can be observed, at step 2 above, the counter transitions from 0->1, at step [a] from 1->2 (in order for the miniq object to remain active during the replacement), then in [b] from 2->1 and finally [c] 1->0 with the eventual release. The reference counter in general ranges from [0,2] and it does not need to be atomic since all access to the counter is protected by the rtnl mutex. With this in place, there is no longer a UAF happening and the tcx_entry is freed at the correct time.
[]
null
5.5
null
null
null
GHSA-c4rx-vvj6-9gv8
All versions of the afffected TOYOPUC-PC10 Series,TOYOPUC-Plus Series,TOYOPUC-PC3J/PC2J Series, TOYOPUC-Nano Series products may not be able to properly process an ICMP flood, which may allow an attacker to deny Ethernet communications between affected devices.
[]
null
null
null
null
null
RHSA-2002:259
Red Hat Security Advisory: sendmail security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw" ]
null
null
null
null
null
GHSA-j66v-7j6v-hmmc
PHP remote file inclusion vulnerability in estateagent.php in the EstateAgent component (com_estateagent) for Mambo, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter.
[]
null
null
null
null
null
GHSA-4cfw-gc9p-jwf4
Rejected reason: Not used
[]
null
null
null
null
null
CVE-2006-3672
KDE Konqueror 3.5.1 and earlier allows remote attackers to cause a denial of service (application crash) by calling the replaceChild method on a DOM object, which triggers a null dereference, as demonstrated by calling document.replaceChild with a 0 (zero) argument.
[ "cpe:2.3:a:kde:konqueror:*:*:*:*:*:*:*:*", "cpe:2.3:a:kde:konqueror:2.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:kde:konqueror:2.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:kde:konqueror:2.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:kde:konqueror:2.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:kde:konqueror:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:kde:konqueror:3.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:kde:konqueror:3.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:kde:konqueror:3.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:kde:konqueror:3.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:kde:konqueror:3.0.5b:*:*:*:*:*:*:*", "cpe:2.3:a:kde:konqueror:3.1:*:*:*:*:*:*:*", "cpe:2.3:a:kde:konqueror:3.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:kde:konqueror:3.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:kde:konqueror:3.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:kde:konqueror:3.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:kde:konqueror:3.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:kde:konqueror:3.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:kde:konqueror:3.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:kde:konqueror:3.2.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:kde:konqueror:3.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:kde:konqueror:3.3:*:*:*:*:*:*:*", "cpe:2.3:a:kde:konqueror:3.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:kde:konqueror:3.3.2:*:*:*:*:*:*:*" ]
null
null
null
2.6
null
PYSEC-2017-41
null
The XML-RPC server in supervisor before 3.0.1, 3.1.x before 3.1.4, 3.2.x before 3.2.4, and 3.3.x before 3.3.3 allows remote authenticated users to execute arbitrary commands via a crafted XML-RPC request, related to nested supervisord namespace lookups.
[]
null
null
null
null
null
GHSA-44w6-h8x6-p8h9
It was found that subscription-manager's DBus interface before 1.19.4 let unprivileged user access the com.redhat.RHSM1.Facts.GetFacts and com.redhat.RHSM1.Config.Set methods. An unprivileged local attacker could use these methods to gain access to private information, or launch a privilege escalation attack.
[]
null
null
7.8
null
null
CVE-2024-25438
A cross-site scripting (XSS) vulnerability in the Submission module of Pkp Ojs v3.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Input subject field under the Add Discussion function.
[ "cpe:2.3:a:pkp:open_journal_systems:*:*:*:*:*:*:*:*" ]
null
6.1
null
null
null
CVE-2017-15573
In Redmine before 3.2.6 and 3.3.x before 3.3.3, XSS exists because markup is mishandled in wiki content.
[ "cpe:2.3:a:redmine:redmine:*:*:*:*:*:*:*:*", "cpe:2.3:a:redmine:redmine:3.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:redmine:redmine:3.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:redmine:redmine:3.3.2:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" ]
null
null
6.1
4.3
null
CVE-2024-50506
WordPress Marketing Automation by AZEXO plugin <= 1.27.80 - Privilege Escalation vulnerability
Incorrect Privilege Assignment vulnerability in Azexo Marketing Automation by AZEXO allows Privilege Escalation.This issue affects Marketing Automation by AZEXO: from n/a through 1.27.80.
[]
null
8.8
null
null
null
CVE-2024-12469
WP BASE Booking of Appointments, Services and Events <= 4.9.1 - Reflected Cross-Site Scripting via status Parameter
The WP BASE Booking of Appointments, Services and Events plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘status’ parameter in all versions up to, and including, 4.9.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
[]
null
6.1
null
null
null
GHSA-8wr8-fqcf-723v
In the Linux kernel, the following vulnerability has been resolved:drm/msm/hdmi: check return value after calling platform_get_resource_byname()It will cause null-ptr-deref if platform_get_resource_byname() returns NULL, we need check the return value.Patchwork: https://patchwork.freedesktop.org/patch/482992/
[]
null
5.5
null
null
null
CVE-2021-39271
OrbiTeam BSCW Classic before 7.4.3 allows authenticated remote code execution (RCE) during archive extraction via attacker-supplied Python code in the class attribute of a .bscw file. This is fixed in 5.0.12, 5.1.10, 5.2.4, 7.3.3, and 7.4.3.
[ "cpe:2.3:a:bscw:bscw_classic:*:*:*:*:*:*:*:*" ]
null
8.8
null
6.5
null
CVE-2011-2259
Unspecified vulnerability in Oracle Solaris 8, 9, 10, and 11 Express allows local users to affect availability, related to UFS.
[ "cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*", "cpe:2.3:o:sun:sunos:5.9:*:*:*:*:*:*:*", "cpe:2.3:o:sun:sunos:5.10:*:*:*:*:*:*:*", "cpe:2.3:o:sun:sunos:5.11:*:express:*:*:*:*:*" ]
null
null
null
4.9
null
GHSA-qrwv-mr9p-g9x6
Cross-Site Request Forgery (CSRF) vulnerability in WP Swings Wallet System for WooCommerce.This issue affects Wallet System for WooCommerce: from n/a through 2.5.9.
[]
null
5.4
null
null
null
CVE-2024-33575
WordPress User Meta plugin <= 3.0 - Sensitive Data Exposure vulnerability
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in User Meta user-meta.This issue affects User Meta: from n/a through 3.0.
[ "cpe:2.3:a:usermeta:user_meta_user_profile_builder_and_user_management:1.0.0:*:*:*:*:wordpress:*:*" ]
null
5.3
null
null
null
GHSA-rgw9-2qv4-ghxq
The ShipStation.com plugin 1.1 and earlier for CS-Cart allows remote attackers to insert arbitrary information into the database (via action=shipnotify) because access to this endpoint is completely unchecked. The attacker must guess an order number.
[]
null
null
null
null
null
CVE-2024-52511
Nextcloud Tables has an Authorization Bypass Through User-Controlled Key in Tables
Nextcloud Tables allows users to to create tables with individual columns. By directly specifying the ID of a table or view, a malicious user could blindly insert new rows into tables they have no access to. It is recommended that the Nextcloud Tables is upgraded to 0.8.0.
[]
null
6.3
null
null
null
GHSA-47mv-437c-47mj
A type confusion vulnerability in Panasonic Control FPWIN Pro versions 7.6.0.3 and all previous versions may allow arbitrary code execution when opening specially crafted project files.
[]
null
7.8
null
null
null
GHSA-fc3h-fgjq-4hqp
news.php in SimpNews 2.47.3 and earlier allows remote attackers to obtain sensitive information via an invalid lang parameter, which reveals the installation path in an error message.
[]
null
null
null
null
null
CVE-2022-35059
OTFCC commit 617837b was discovered to contain a heap buffer overflow via /release-x64/otfccdump+0x6c0414.
[ "cpe:2.3:a:otfcc_project:otfcc:*:*:*:*:*:*:*:*" ]
null
6.5
null
null
null
GHSA-6357-ggmh-cwxm
Unspecified vulnerability in Sun Solaris 10 on SPARC sun4v systems, and OpenSolaris snv_47 through snv_85, allows local users to cause a denial of service (hang of UFS filesystem write) via unknown vectors related to the (1) ufs_getpage and (2) ufs_putapage routines, aka CR 6425723.
[]
null
null
null
null
null
RHSA-2019:2476
Red Hat Security Advisory: kernel security update
kernel: Missing check in fs/inode.c:inode_init_owner() does not clear SGID bit on non-directories for non-members kernel: hw: Spectre SWAPGS gadget vulnerability
[ "cpe:/o:redhat:rhel_aus:6.6::server" ]
null
null
5.9
null
null
RHSA-2024:7004
Red Hat Security Advisory: kernel security update
kernel: gpiolib: cdev: Fix use after free in lineinfo_changed_notify kernel: wifi: mac80211: Avoid address calculations via out of bounds array indexing kernel: ice: Fix improper extts handling
[ "cpe:/a:redhat:rhel_eus:9.2::appstream", "cpe:/a:redhat:rhel_eus:9.2::crb", "cpe:/o:redhat:rhel_eus:9.2::baseos" ]
null
4.4
null
null
null
GHSA-9763-w6jg-gh3f
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in QuanticaLabs CSS3 Compare Pricing Tables for WordPress allows Reflected XSS. This issue affects CSS3 Compare Pricing Tables for WordPress: from n/a through 11.6.
[]
null
7.1
null
null
null
GHSA-8fq7-9cwr-4376
XOOPS 2.5.0 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by modules/system/xoops_version.php and certain other files.
[]
null
null
null
null
null
CVE-2023-48668
Dell PowerProtect DD, versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 on DDMC contain an OS command injection vulnerability in an admin operation. A local high privileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the managed system application's underlying OS with the privileges of the vulnerable application. Exploitation may lead to a system take over by an attacker on a managed system of DDMC.
[ "cpe:2.3:a:dell:powerprotect_data_domain_management_center:*:*:*:*:*:*:*:*", "cpe:2.3:o:dell:powerprotect_data_domain_management_center:*:*:*:*:lts2022:*:*:*", "cpe:2.3:o:dell:powerprotect_data_domain_management_center:*:*:*:*:lts2023:*:*:*" ]
null
8.2
null
null
null
GHSA-h348-95qg-22q3
Out of bounds memory read and access may lead to unexpected behavior in GNSS XTRA Parser in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in MDM9150, MDM9206, MDM9607, MDM9615, MDM9635M, MDM9640, MDM9650, MDM9655, MSM8909W, MSM8996AU, QCS605, Qualcomm 215, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 625, SD 632, SD 636, SD 650/52, SD 675, SD 712 / SD 710 / SD 670, SD 730, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SD 8CX, SDA660, SDM439, SDM630, SDM660, SDX20, Snapdragon_High_Med_2016, SXR1130
[]
null
null
9.8
null
null
CVE-2020-7751
Prototype Pollution
pathval before version 1.1.1 is vulnerable to prototype pollution.
[ "cpe:2.3:a:chaijis:pathval:*:*:*:*:*:node.js:*:*" ]
null
6
null
null
null
PYSEC-2021-548
null
TensorFlow is an end-to-end open source platform for machine learning. In affected versions the implementation of sparse reduction operations in TensorFlow can trigger accesses outside of bounds of heap allocated data. The [implementation](https://github.com/tensorflow/tensorflow/blob/a1bc56203f21a5a4995311825ffaba7a670d7747/tensorflow/core/kernels/sparse_reduce_op.cc#L217-L228) fails to validate that each reduction group does not overflow and that each corresponding index does not point to outside the bounds of the input tensor. We have patched the issue in GitHub commit 87158f43f05f2720a374f3e6d22a7aaa3a33f750. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
[]
null
null
null
null
null
CVE-2024-25947
Dell iDRAC Service Module version 5.3.0.0 and prior, contain an Out of bound Read Vulnerability. A privileged local attacker could execute arbitrary code potentially resulting in a denial of service event.
[ "cpe:2.3:a:dell:emc_idrac_service_module:*:*:*:*:*:*:*:*" ]
null
4.8
null
null
null
RHSA-2023:6274
Red Hat Security Advisory: OpenShift Container Platform 4.11.53 packages and security update
ovn: service monitor MAC flow is not rate limited
[ "cpe:/a:redhat:openshift:4.11::el8", "cpe:/a:redhat:openshift_ironic:4.11::el8" ]
null
5.3
null
null
null
GHSA-gxhg-qc42-w3x4
The Bulk Me Now! WordPress plugin through 2.0 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.
[]
null
7.1
null
null
null
CVE-2023-36898
Tablet Windows User Interface Application Core Remote Code Execution Vulnerability
Tablet Windows User Interface Application Core Remote Code Execution Vulnerability
[ "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*" ]
null
7.8
null
null
null
CVE-2016-2965
IBM Sametime Meeting Server 8.5.2 and 9.0 is vulnerable to cross-site request forgery, caused by improper validation of user-supplied input. By persuading a user to visit a malicious link, a remote attacker could force the user to log out of Sametime. IBM X-Force ID: 113846.
[ "cpe:2.3:a:ibm:sametime:8.5.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:sametime:8.5.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:sametime:9.0.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:sametime:9.0.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:sametime:9.0.1:*:*:*:*:*:*:*" ]
null
null
6.5
4.3
null
GHSA-pj36-9rxw-2h2x
In ImageMagick before 6.9.9-0 and 7.x before 7.0.6-1, the ReadOneMNGImage function in coders/png.c has an out-of-bounds read with the MNG CLIP chunk.
[]
null
9.8
null
null
null
RHSA-2020:2306
Red Hat Security Advisory: OpenShift Container Platform 4.2.34 ose-openshift-apiserver-container security update
kubernetes: Use of unbounded 'client' label in apiserver_request_total allows for memory exhaustion
[ "cpe:/a:redhat:openshift:4.2::el7" ]
null
4.3
null
null
null
GHSA-cwm9-q742-vjcx
If an attacker could control the contents of an iframe sandboxed with <code>allow-popups</code> but not <code>allow-scripts</code>, they were able to craft a link that, when clicked, would lead to JavaScript execution in violation of the sandbox. This vulnerability affects Firefox < 98, Firefox ESR < 91.7, and Thunderbird < 91.7.
[]
null
9.6
null
null
null
GHSA-wpm6-3cwm-hmf2
A Remote Arbitrary Code Execution vulnerability in HPE Data Protector version prior to 8.17 and 9.09 was found.
[]
null
null
7.5
null
null
CVE-2023-36549
A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiWLM version 8.6.0 through 8.6.5 and 8.5.0 through 8.5.4 allows attacker to execute unauthorized code or commands via specifically crafted http get request parameters.
[ "cpe:2.3:a:fortinet:fortiwlm:*:*:*:*:*:*:*:*" ]
null
8.6
null
null
null