id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
189k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
patch_commit_url
stringlengths
38
232
CVE-2020-28217
A CWE-311: Missing Encryption of Sensitive Data vulnerability exists in Easergy T300 (firmware 2.7 and older), that would allow an attacker to read network traffic over HTTP protocol.
[ "cpe:2.3:o:schneider-electric:easergy_t300_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:easergy_t300:-:*:*:*:*:*:*:*" ]
null
7.5
null
5
null
CVE-2018-8857
Philips Brilliance CT software (Brilliance 64 version 2.6.2 and prior, Brilliance iCT versions 4.1.6 and prior, Brillance iCT SP versions 3.2.4 and prior, and Brilliance CT Big Bore 2.3.5 and prior) contains fixed credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data. An attacker could compromise these credentials and gain access to the system.
[ "cpe:2.3:o:philips:brilliance_firmware_64:*:*:*:*:*:*:*:*", "cpe:2.3:h:philips:brilliance_64:-:*:*:*:*:*:*:*", "cpe:2.3:o:philips:brilliance_ict_sp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:philips:brilliance_ict_sp:-:*:*:*:*:*:*:*", "cpe:2.3:o:philips:brilliance_ict_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:philips:brilliance_ict:-:*:*:*:*:*:*:*", "cpe:2.3:o:philips:_brilliance_ct_big_bore_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:philips:_brilliance_ct_big_bore:-:*:*:*:*:*:*:*" ]
null
null
7.8
7.2
null
CVE-2022-36484
TOTOLINK N350RT V9.3.5u.6139_B20201216 was discovered to contain a stack overflow via the function setDiagnosisCfg.
[ "cpe:2.3:o:totolink:n350rt_firmware:9.3.5u.6139_b20201216:*:*:*:*:*:*:*", "cpe:2.3:h:totolink:n350rt:-:*:*:*:*:*:*:*" ]
null
7.8
null
null
null
CVE-2023-48651
Concrete CMS 9 before 9.2.3 is vulnerable to Cross Site Request Forgery (CSRF) at /ccm/system/dialogs/file/delete/1/submit.
[ "cpe:2.3:a:concretecms:concrete_cms:*:*:*:*:*:*:*:*" ]
null
4.3
null
null
null
GHSA-8q3j-r463-5xh7
Use-after-free vulnerability in Google Chrome before 13.0.782.107 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the frame loader.
[]
null
null
null
null
null
CVE-2024-0475
code-projects Dormitory Management System modifyuser.php sql injection
A vulnerability, which was classified as critical, has been found in code-projects Dormitory Management System 1.0. Affected by this issue is some unknown functionality of the file modifyuser.php. The manipulation of the argument user_id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-250580.
[ "cpe:2.3:a:code-projects:dormitory_management_system:1.0:*:*:*:*:*:*:*" ]
null
6.3
6.3
6.5
null
CVE-2019-13273
In Xymon through 4.3.28, a buffer overflow vulnerability exists in the csvinfo CGI script. The overflow may be exploited by sending a crafted GET request that triggers an sprintf of the srcdb parameter.
[ "cpe:2.3:a:xymon:xymon:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" ]
null
null
9.8
7.5
null
GHSA-x64f-vf7p-w4x8
Missing Authorization vulnerability in Apollo13Themes Apollo13 Framework Extensions allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Apollo13 Framework Extensions: from n/a through 1.8.10.
[]
null
5.4
null
null
null
CVE-2013-2559
SQL injection vulnerability in Symphony CMS before 2.3.2 allows remote authenticated users to execute arbitrary SQL commands via the sort parameter to system/authors/. NOTE: this can be leveraged using CSRF to allow remote unauthenticated attackers to execute arbitrary SQL commands.
[ "cpe:2.3:a:getsymphony:symphony:*:*:*:*:*:*:*:*", "cpe:2.3:a:getsymphony:symphony:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:getsymphony:symphony:2.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:getsymphony:symphony:2.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:getsymphony:symphony:2.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:getsymphony:symphony:2.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:getsymphony:symphony:2.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:getsymphony:symphony:2.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:getsymphony:symphony:2.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:getsymphony:symphony:2.3:*:*:*:*:*:*:*" ]
null
null
null
6.5
null
CVE-2004-0097
Multiple vulnerabilities in PWLib before 1.6.0 allow remote attackers to cause a denial of service and possibly execute arbitrary code, as demonstrated by the NISCC/OUSPG PROTOS test suite for the H.225 protocol.
[ "cpe:2.3:a:openh323_project:pwlib:*:*:*:*:*:*:*:*" ]
null
null
null
10
null
CVE-2017-9127
The quicktime_user_atoms_read_atom function in useratoms.c in libquicktime 1.2.4 allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) via a crafted mp4 file.
[ "cpe:2.3:a:libquicktime:libquicktime:1.2.4:*:*:*:*:*:*:*" ]
null
null
6.5
4.3
null
CVE-2020-24848
FruityWifi through 2.4 has an unsafe Sudo configuration [(ALL : ALL) NOPASSWD: ALL]. This allows an attacker to perform a system-level (root) local privilege escalation, allowing an attacker to gain complete persistent access to the local system.
[ "cpe:2.3:a:fruitywifi_project:fruitywifi:*:*:*:*:*:*:*:*" ]
null
7.8
null
7.2
null
GHSA-8x8h-hcq8-jwwx
Netmaker has Hardcoded DNS Secret Key
ImpactHardcoded DNS key usage has been found in Netmaker allowing unauth users to interact with DNS API endpoints.PatchesIssue is patched in 0.17.1, and fixed in 0.18.6+.If Users are using 0.17.1, they should run "docker pull gravitl/netmaker:v0.17.1" and "docker-compose up -d". This will switch them to the patched usersIf users are using v0.18.0-0.18.5, they should upgrade to v0.18.6 or later.WorkaroundsIf using 0.17.1, can just pull the latest docker image of backend and restart server.ReferencesCredit to Project Discovery, and in particular https://github.com/rootxharsh , https://github.com/iamnoooob, and https://github.com/projectdiscovery
[]
null
7.5
null
null
null
GHSA-74m8-698c-prjf
An incorrect privilege assignment vulnerability in the Palo Alto Networks GlobalProtect™ App on macOS devices enables a locally authenticated non administrative user to disable the app.The GlobalProtect app on Windows, Linux, iOS, Android, Chrome OS and GlobalProtect UWP app are not affected.
[]
5.2
3.3
null
null
null
cisco-sa-iosxe-ctbypass-7QHAfHkK
Cisco IOS XE Software Consent Token Bypass Vulnerability
A vulnerability in the persistent Telnet/Secure Shell (SSH) CLI of Cisco IOS XE Software could allow an authenticated, local attacker to gain shell access on an affected device and execute commands on the underlying operating system (OS) with root privileges. The vulnerability is due to insufficient enforcement of the consent token in authorizing shell access. An attacker could exploit this vulnerability by authenticating to the persistent Telnet/SSH CLI on an affected device and requesting shell access. A successful exploit could allow the attacker to gain shell access on the affected device and execute commands on the underlying OS with root privileges. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
[]
null
null
6.7
null
null
RHSA-2020:2058
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.2.8 on RHEL 6 security update
jackson-mapper-asl: XML external entity similar to CVE-2016-3720 cxf: OpenId Connect token service does not properly validate the clientId cxf: reflected XSS in the services listing page Wildfly: EJBContext principal is not popped back after invoking another EJB using a different Security Domain SmallRye: SecuritySupport class is incorrectly public and contains a static method to access the current threads context class loader Soteria: security identity corruption across concurrent threads undertow: AJP File Read/Inclusion Vulnerability undertow: servletPath is normalized incorrectly leading to dangerous application mapping which could result in security bypass cryptacular: excessive memory allocation during a decode operation undertow: Memory exhaustion issue in HttpReadListener via "Expect: 100-continue" header undertow: invalid HTTP request with large chunk size
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el6" ]
null
6.5
8.1
null
null
GHSA-m4gg-hpqm-qpq6
PHP remote file inclusion vulnerability in custom_vars.php in GlossWord 1.8.1 allows remote attackers to execute arbitrary PHP code via a URL in the sys[path_addon] parameter.
[]
null
null
null
null
null
CVE-2024-9457
WP Builder <= 3.0.7 - Authenticated (Author+) Stored Cross-Site Scripting via SVG File Upload
The WP Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 3.0.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file.
[ "cpe:2.3:a:cssjockey:wp_builder:*:*:*:*:*:wordpress:*:*" ]
null
6.4
null
null
null
GHSA-6c3j-c64m-qhgq
XSS in jQuery as used in Drupal, Backdrop CMS, and other products
jQuery from 1.1.4 until 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles `jQuery.extend(true, {}, ...)` because of `Object.prototype` pollution. If an unsanitized source object contained an enumerable `__proto__` property, it could extend the native `Object.prototype`.
[]
null
6.1
null
null
null
GHSA-gf8x-jrh5-9rhr
Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability
[]
null
8.8
null
null
null
CVE-2005-1949
The eping_validaddr function in functions.php for the ePing plugin for e107 portal allows remote attackers to execute arbitrary commands via shell metacharacters after a valid argument to the eping_host parameter.
[ "cpe:2.3:a:e107:e107:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2025-6554
Type confusion in V8 in Google Chrome prior to 138.0.7204.96 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: High)
[]
null
8.1
null
null
null
CVE-2017-0332
An elevation of privilege vulnerability in the NVIDIA crypto driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel 3.10. Android ID: A-33812508. References: N-CVE-2017-0332.
[ "cpe:2.3:o:linux:linux_kernel:3.10:*:*:*:*:*:*:*" ]
null
null
7
7.6
null
GHSA-rwh9-8xx8-4wfm
Cross-site Scripting in OpenCRX
In OpenCRX, versions v4.0.0 through v5.1.0 are vulnerable to reflected Cross-site Scripting (XSS), due to unsanitized parameters in the password reset functionality. This allows execution of external javascript files on any user of the openCRX instance.
[]
null
6.1
null
null
null
CVE-2025-49077
WordPress Dynamic Pricing and Discount Rules plugin <= 2.2.9 - Cross Site Request Forgery (CSRF) vulnerability
Cross-Site Request Forgery (CSRF) vulnerability in ThemeHigh Dynamic Pricing and Discount Rules allows Cross Site Request Forgery.This issue affects Dynamic Pricing and Discount Rules: from n/a through 2.2.9.
[]
null
4.3
null
null
null
CVE-2006-3363
PHP remote file inclusion vulnerability in index.php in the Glossaire module 1.7 for Xoops allows remote attackers to execute arbitrary PHP code via a URL in the pa parameter.
[ "cpe:2.3:a:xoops:xoops_glossaire_module:1.7:*:*:*:*:*:*:*" ]
null
null
null
5.1
null
CVE-2024-23690
EOL Netgear FVS336v3 Telnet Configuration Backup Command Injection
The end-of-life Netgear FVS336Gv2 and FVS336Gv3 are affected by a command injection vulnerability in the Telnet interface. An authenticated and remote attacker can execute arbitrary OS commands as root over Telnet by sending crafted "util backup_configuration" commands.
[]
null
7.2
null
null
null
GHSA-q4qr-976g-hx68
Microsoft Excel Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-34518.
[]
null
7.8
null
null
null
CVE-2023-46021
SQL Injection vulnerability in cancel.php in Code-Projects Blood Bank 1.0 allows attackers to run arbitrary commands via the 'reqid' parameter.
[ "cpe:2.3:a:code-projects:blood_bank:1.0:*:*:*:*:*:*:*" ]
null
5.5
null
null
null
CVE-2005-1945
Cross-site scripting (XSS) vulnerability in the convert_highlite_words function in Invision Blog before 1.1.2 Final allows remote attackers to inject arbitrary web script or HTML via double hex encoded highlight data.
[ "cpe:2.3:a:invision_power_services:invision_community_blog:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:invision_power_services:invision_community_blog:1.1:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
CVE-2008-6008
hyBook Guestbook Script stores sensitive information under the web root with insufficient access control, which allows remote attackers to download a database containing a password via a direct request for hyBook.mdb.
[ "cpe:2.3:a:herongyang:hybook:_nil_:*:*:*:*:*:*:*" ]
null
null
null
5
null
GHSA-jjpg-fxf6-vwcx
Dell Inventory Collector, versions prior to 12.3.0.6 contains a Path Traversal vulnerability. A local authenticated malicious user could potentially exploit this vulnerability, leading to arbitrary code execution on the system.
[]
null
6.7
null
null
null
CVE-2023-21905
Vulnerability in the Oracle Banking Virtual Account Management product of Oracle Financial Services Applications (component: Routing Hub). Supported versions that are affected are 14.5, 14.6 and 14.7. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle Banking Virtual Account Management. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Banking Virtual Account Management accessible data as well as unauthorized access to critical data or complete access to all Oracle Banking Virtual Account Management accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N).
[ "cpe:2.3:a:oracle:banking_virtual_account_management:14.5:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:banking_virtual_account_management:14.6:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:banking_virtual_account_management:14.7:*:*:*:*:*:*:*" ]
null
6.1
null
null
null
RHSA-2017:0457
Red Hat Security Advisory: Red Hat JBoss Web Server security and enhancement update
tomcat: timing attack in Realm implementation tomcat: unsafe chown of catalina.log in tomcat init script allows privilege escalation tomcat: Usage of vulnerable FileUpload package can result in denial of service tomcat: security manager bypass via IntrospectHelper utility function tomcat: tomcat writable config files allow privilege escalation tomcat: system property disclosure tomcat: security manager bypass via JSP Servlet config parameters tomcat: unrestricted access to global resources tomcat: HTTP Request smuggling vulnerability due to permitting invalid character in HTTP requests tomcat: Remote code execution vulnerability in JmxRemoteLifecycleListener tomcat: information disclosure due to incorrect Processor sharing
[ "cpe:/a:redhat:jboss_enterprise_web_server:3.1" ]
null
null
7.5
null
null
GHSA-f765-cqm7-pp4c
In TigerVNC 1.7.1 (CConnection.cxx CConnection::CConnection), an unauthenticated client can cause a small memory leak in the server.
[]
null
null
7.5
null
null
GHSA-6hc9-74fh-6p7m
yimioa before v2024.07.04 was discovered to contain a SQL injection vulnerability via the component /mapper/xml/AddressDao.xml.
[]
null
6.1
null
null
null
CVE-2022-44236
Beijing Zed-3 Technologies Co.,Ltd VoIP simpliclty ASG 8.5.0.17807 (20181130-16:12) has a Weak password vulnerability.
[ "cpe:2.3:a:zed-3:voip_simplicity_asg:8.5.0.17807:*:*:*:*:*:*:*" ]
null
9.8
null
null
null
GHSA-r8pj-4xw7-x923
Insufficient policy enforcement in ADB in Google Chrome on ChromeOS prior to 114.0.5735.90 allowed a local attacker to bypass device policy restrictions via physical access to the device. (Chromium security severity: High)
[]
null
6.8
null
null
null
GHSA-35mj-225p-fxvg
Tenda AC23 V16.03.07.45_cn was discovered to contain a stack overflow via the schedStartTime parameter in the setSchedWifi function.
[]
null
9.8
null
null
null
GHSA-848f-pfm5-j5r2
IBM MessageSight 1.x before 1.1.0.0-IBM-IMA-IT01015 allows remote attackers to cause a denial of service (daemon restart) via crafted MQ Telemetry Transport (MQTT) authentication data.
[]
null
null
null
null
null
RHSA-2019:3433
Red Hat Security Advisory: go-toolset:rhel8 security, bug fix, and enhancement update
golang: malformed hosts in URLs leads to authorization bypass
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
null
7.5
null
null
CVE-2023-46815
An issue was discovered in SugarCRM 12 before 12.0.4 and 13 before 13.0.2. An Unrestricted File Upload vulnerability has been identified in the Notes module. By using a crafted request, custom PHP code can be injected via the Notes module because of missing input validation. An attacker with regular user privileges can exploit this.
[ "cpe:2.3:a:sugarcrm:sugarcrm:*:*:*:*:*:*:*:*", "cpe:2.3:a:sugarcrm:sugarcrm:*:*:*:*:enterprise:*:*:*", "cpe:2.3:a:sugarcrm:sugarcrm:*:*:*:*:sell:*:*:*", "cpe:2.3:a:sugarcrm:sugarcrm:*:*:*:*:serve:*:*:*", "cpe:2.3:a:sugarcrm:sugarcrm:13.0.0:*:*:*:enterprise:*:*:*", "cpe:2.3:a:sugarcrm:sugarcrm:13.0.0:*:*:*:sell:*:*:*", "cpe:2.3:a:sugarcrm:sugarcrm:13.0.0:*:*:*:serve:*:*:*", "cpe:2.3:a:sugarcrm:sugarcrm:13.0.1:*:*:*:enterprise:*:*:*", "cpe:2.3:a:sugarcrm:sugarcrm:13.0.1:*:*:*:sell:*:*:*", "cpe:2.3:a:sugarcrm:sugarcrm:13.0.1:*:*:*:serve:*:*:*" ]
null
8.8
null
null
null
CVE-2023-29575
Bento4 v1.6.0-639 was discovered to contain an out-of-memory bug in the mp42aac component.
[ "cpe:2.3:a:axiosys:bento4:1.6.0-639:*:*:*:*:*:*:*" ]
null
5.5
null
null
null
RHSA-2020:2562
Red Hat Security Advisory: EAP Continuous Delivery Technical Preview Release 13 security update
undertow: Client can use bogus uri in Digest authentication undertow: HTTP header injection using CRLF with UTF-8 Encoding (incomplete fix of CVE-2016-4993) jackson-databind: incomplete fix for CVE-2017-7525 permits unsafe serialization via c3p0 libraries guava: Unbounded memory allocation in AtomicDoubleArray and CompoundOrdering classes allow remote attackers to cause a denial of service wildfly-core: Path traversal can allow the extraction of .war archives to write arbitrary files (Zip Slip)
[ "cpe:/a:redhat:jboss_enterprise_application_platform_cd:13" ]
null
null
7.6
null
null
GHSA-8wmr-chfq-6mfm
HEVC Video Extensions Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-24089, CVE-2021-24110, CVE-2021-27047, CVE-2021-27048, CVE-2021-27049, CVE-2021-27050, CVE-2021-27051, CVE-2021-27061, CVE-2021-27062.
[]
null
7.8
null
null
null
GHSA-29j9-xmmx-g9r4
Buffer Overflow vulnerability found in XPDF v.4.04 allows an attacker to cause a Denial of Service via GString::resize located in goo/GString.cc
[]
null
null
null
null
null
CVE-2021-3433
BT: Invalid channel map in CONNECT_IND results to Deadlock
Invalid channel map in CONNECT_IND results to Deadlock. Zephyr versions >= v2.5.0 Improper Check or Handling of Exceptional Conditions (CWE-703). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-3c2f-w4v6-qxrp
[ "cpe:2.3:o:zephyrproject:zephyr:*:*:*:*:*:*:*:*" ]
null
4
null
null
null
CVE-2023-20797
In camera middleware, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07629582; Issue ID: ALPS07629582.
[ "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*" ]
null
6.7
null
null
null
CVE-2017-20188
Zimbra zm-ajax XFormItem.js XFormItem.prototype.setError cross site scripting
A vulnerability has been found in Zimbra zm-ajax up to 8.8.1 and classified as problematic. Affected by this vulnerability is the function XFormItem.prototype.setError of the file WebRoot/js/ajax/dwt/xforms/XFormItem.js. The manipulation of the argument message leads to cross site scripting. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. Upgrading to version 8.8.2 is able to address this issue. The identifier of the patch is 8d039d6efe80780adc40c6f670c06d21de272105. It is recommended to upgrade the affected component. The identifier VDB-249421 was assigned to this vulnerability.
[ "cpe:2.3:a:zimbra:zm-ajax:*:*:*:*:*:*:*:*" ]
null
2.6
2.6
2.1
https://github.com/Zimbra/zm-ajax/commit/8d039d6efe80780adc40c6f670c06d21de272105
GHSA-v5g5-j6gp-xj36
A vulnerability in the TCL scripting subsystem of Cisco NX-OS System Software could allow an authenticated, local attacker to escape the interactive TCL shell and gain unauthorized access to the underlying operating system of the device. The vulnerability exists due to insufficient input validation of user-supplied files passed to the interactive TCL shell of the affected device. An attacker could exploit this vulnerability to escape the scripting sandbox and execute arbitrary commands on the underlying operating system with the privileges of the authenticated user. To exploit this vulnerability, an attacker must have local access and be authenticated to the targeted device with administrative or tclsh execution privileges. This vulnerability affects the following products running Cisco NX-OS System Software: Multilayer Director Switches, Nexus 2000 Series Fabric Extenders, Nexus 3000 Series Switches, Nexus 3500 Platform Switches, Nexus 5000 Series Switches, Nexus 5500 Platform Switches, Nexus 5600 Platform Switches, Nexus 6000 Series Switches, Nexus 7000 Series Switches, Nexus 7700 Series Switches, Nexus 9000 Series Switches in standalone NX-OS mode, Nexus 9500 R-Series Line Cards and Fabric Modules, Unified Computing System Manager. Cisco Bug IDs: CSCve93750, CSCve93762, CSCve93763, CSCvg04127.
[]
null
null
4.2
null
null
CVE-2013-4308
Cross-site scripting (XSS) vulnerability in pages/TalkpageHistoryView.php in the LiquidThreads (LQT) extension 2.x and possibly 3.x for MediaWiki 1.19.x before 1.19.8, 1.20.x before 1.20.7, and 1.21.x before 1.21.2 allows remote attackers to inject arbitrary web script or HTML via a thread subject.
[ "cpe:2.3:a:liquidthreads_project:liquidthreads:2.0:alpha:*:*:*:*:*:*", "cpe:2.3:a:liquidthreads_project:liquidthreads:2.1:alpha:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.19:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.19:beta_1:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.19:beta_2:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.19.0:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.19.1:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.19.2:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.19.3:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.19.4:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.19.5:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.19.6:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.19.7:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.20:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.20.1:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.20.2:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.20.3:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.20.4:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.20.5:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.20.6:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.21:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.21.1:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
GHSA-2ww6-2gwx-v942
In the Linux kernel, the following vulnerability has been resolved:net/mlx5: Fix variable not being completed when function returnsWhen cmd_alloc_index(), fails cmd_work_handler() needs to complete ent->slotted before returning early. Otherwise the task which issued the command may hang:mlx5_core 0000:01:00.0: cmd_work_handler:877:(pid 3880418): failed to allocate command entry INFO: task kworker/13:2:4055883 blocked for more than 120 seconds. Not tainted 4.19.90-25.44.v2101.ky10.aarch64 #1 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. kworker/13:2 D 0 4055883 2 0x00000228 Workqueue: events mlx5e_tx_dim_work [mlx5_core] Call trace: __switch_to+0xe8/0x150 __schedule+0x2a8/0x9b8 schedule+0x2c/0x88 schedule_timeout+0x204/0x478 wait_for_common+0x154/0x250 wait_for_completion+0x28/0x38 cmd_exec+0x7a0/0xa00 [mlx5_core] mlx5_cmd_exec+0x54/0x80 [mlx5_core] mlx5_core_modify_cq+0x6c/0x80 [mlx5_core] mlx5_core_modify_cq_moderation+0xa0/0xb8 [mlx5_core] mlx5e_tx_dim_work+0x54/0x68 [mlx5_core] process_one_work+0x1b0/0x448 worker_thread+0x54/0x468 kthread+0x134/0x138 ret_from_fork+0x10/0x18
[]
null
null
null
null
null
GHSA-p8xr-3fgh-5q5f
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Gopi Ramasamy iframe popup plugin <= 3.3 versions.
[]
null
5.9
null
null
null
CVE-2017-11777
Microsoft SharePoint Enterprise Server 2013 SP1 and Microsoft SharePoint Enterprise Server 2016 allow an attacker to exploit a cross-site scripting (XSS) vulnerability by sending a specially crafted request to an affected SharePoint server, due to how SharePoint Server sanitizes web requests, aka "Microsoft Office SharePoint XSS Vulnerability". This CVE ID is unique from CVE-2017-11775 and CVE-2017-11820.
[ "cpe:2.3:a:microsoft:sharepoint_enterprise_server:2013:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sharepoint_enterprise_server:2016:*:*:*:*:*:*:*" ]
null
null
5.4
3.5
null
CVE-2005-4591
Heap-based buffer overflow in bogofilter 0.96.2, 0.95.2, 0.94.14, 0.94.12, and other versions from 0.93.5 to 0.96.2, when using Unicode databases, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via "invalid input sequences" that lead to heap corruption when bogofilter or bogolexer converts character sets.
[ "cpe:2.3:o:bogofilter:email_filter:0.93.5:*:*:*:*:*:*:*", "cpe:2.3:o:bogofilter:email_filter:0.94.12:*:*:*:*:*:*:*", "cpe:2.3:o:bogofilter:email_filter:0.94.14:*:*:*:*:*:*:*", "cpe:2.3:o:bogofilter:email_filter:0.95.2:*:*:*:*:*:*:*", "cpe:2.3:o:bogofilter:email_filter:0.96.2:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
GHSA-5rwj-59p7-5wj5
Cross-Site Request Forgery (CSRF) vulnerability in Optimole Super Page Cache for Cloudflare allows Stored XSS.This issue affects Super Page Cache for Cloudflare: from n/a through 4.7.5.
[]
null
7.1
null
null
null
GHSA-qcxf-3r2g-vpvx
A cross-site scripting (XSS) vulnerability in the Create Ticket page of Small CRM v3.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Subject parameter.
[]
null
5.4
null
null
null
GHSA-4gph-hxgg-mh6j
WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.
[]
null
null
null
null
null
RHSA-2023:1742
Red Hat Security Advisory: nodejs:14 security, bug fix, and enhancement update
glob-parent: Regular Expression Denial of Service nodejs: Improper handling of URI Subject Alternative Names nodejs: Certificate Verification Bypass via String Injection nodejs: Incorrect handling of certificate subject and issuer fields minimist: prototype pollution node-fetch: exposure of sensitive information to an unauthorized actor nodejs-minimatch: ReDoS via the braceExpand function c-ares: buffer overflow in config_sortlist() due to missing string length check nodejs: Prototype pollution via console.table properties express: "qs" prototype poisoning causes the hang of the node process http-cache-semantics: Regular Expression Denial of Service (ReDoS) vulnerability nodejs: HTTP Request Smuggling due to incorrect parsing of header fields decode-uri-component: improper input validation resulting in DoS nodejs: DNS rebinding in inspect via invalid octal IP address Node.js: Permissions policies can be bypassed via process.mainModule Node.js: insecure loading of ICU data through ICU_DATA environment variable
[ "cpe:/a:redhat:rhel_eus:8.6::appstream" ]
null
4.2
null
null
null
CVE-2013-3578
SQL injection vulnerability in the Help Desk application in Wave EMBASSY Remote Administration Server (ERAS) allows remote authenticated users to execute arbitrary SQL commands via the ct100$4MainController$TextBoxSearchValue parameter (aka the search field), leading to execution of operating-system commands.
[ "cpe:2.3:a:wave:embassy_remote_administration_server:-:*:*:*:*:*:*:*", "cpe:2.3:a:wave:embassy_remote_administration_server_help_desk:-:*:*:*:*:*:*:*" ]
null
null
null
9
null
GHSA-w974-55hm-qp53
Windows Hyper-V Remote Code Execution Vulnerability
[]
null
8.8
null
null
null
CVE-2012-6699
The decode_search function in dhcp.c in dhcpcd 3.x allows remote DHCP servers to cause a denial of service (out-of-bounds read) via a crafted response.
[ "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:dhcpcd_project:dhcpcd:3.1.9:*:*:*:*:*:*:*", "cpe:2.3:a:dhcpcd_project:dhcpcd:3.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:dhcpcd_project:dhcpcd:3.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:dhcpcd_project:dhcpcd:3.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:dhcpcd_project:dhcpcd:3.2.3:*:*:*:*:*:*:*" ]
null
null
7.5
5
null
GHSA-53mj-mc38-q894
Remote Memory Exposure in openwhisk
Versions of `openwhisk` before 3.3.1 are vulnerable to remote memory exposure.When a number is passed to `api_key`, affected versions of `openwhisk` allocate an uninitialized buffer and send that over network in Authorization header (base64-encoded).Proof of concept:RecommendationUpdate to version 3.3.1 or later.
[]
null
null
null
null
null
CVE-2024-40774
A downgrade issue was addressed with additional code-signing restrictions. This issue is fixed in macOS Ventura 13.6.8, macOS Monterey 12.7.6, iOS 17.6 and iPadOS 17.6, watchOS 10.6, tvOS 17.6, macOS Sonoma 14.6. An app may be able to bypass Privacy preferences.
[ "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*" ]
null
5.9
null
null
null
CVE-2015-3047
Adobe Reader and Acrobat 10.x before 10.1.14 and 11.x before 11.0.11 on Windows and OS X allow attackers to cause a denial of service (NULL pointer dereference) via unspecified vectors.
[ "cpe:2.3:a:adobe:acrobat_reader:10.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:10.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:10.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:10.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:10.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:10.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:10.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:10.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:10.1.8:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:10.1.9:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:10.1.10:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:10.1.11:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:10.1.12:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:10.1.13:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:11.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:11.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:11.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:11.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:11.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:11.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:11.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:11.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:11.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:11.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:11.0.10:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.1.8:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.1.9:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.1.10:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.1.11:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.1.12:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.1.13:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:11.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:11.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:11.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:11.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:11.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:11.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:11.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:11.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:11.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:11.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:11.0.10:*:*:*:*:*:*:*" ]
null
null
null
5
null
GHSA-8phr-8wxp-777p
Cscape (All Versions prior to 9.90 SP5) lacks proper validation of user-supplied data when parsing project files. This could lead to an out-of-bounds write. An attacker could leverage this vulnerability to execute code in the context of the current process.
[]
null
7.8
null
null
null
CVE-2022-27103
element-plus 2.0.5 is vulnerable to Cross Site Scripting (XSS) via el-table-column.
[ "cpe:2.3:a:element-plus:element-plus:2.0.5:*:*:*:*:*:*:*" ]
null
6.1
null
4.3
null
RHSA-2013:0791
Red Hat Security Advisory: qemu-kvm-rhev security and bug fix update
Updated qemu-kvm-rhev packages that fix one security issue and two bugs are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section.
[ "cpe:/a:redhat:enterprise_linux:6::hypervisor" ]
null
null
null
null
null
GHSA-7v9h-wgq9-9cf6
In forceReplaceShortcutInner of ShortcutPackage.java, there is a possible way to register unlimited packages due to a missing bounds check. This could lead to local denial of service which results in a boot loop with no additional execution privileges needed. User interaction is not needed for exploitation.
[]
null
5.5
null
null
null
CVE-1999-0495
A remote attacker can gain access to a file system using .. (dot dot) when accessing SMB shares.
[]
null
null
null
10
null
GHSA-35j4-3hfm-6mj2
There is Stored Cross-Site Scripting (XSS) in dzzoffice 2.02.1 SC UTF8 in uploadfile to index.php, with the XSS payload in an SVG document.
[]
null
6.1
null
null
null
GHSA-gphh-hmhf-jgcw
Dell PowerScale OneFS, versions 9.4.0.0 through 9.10.0.1, contains an integer overflow or wraparound vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to denial of service.
[]
null
6.5
null
null
null
GHSA-5w4r-4gwh-5f24
An issue was discovered in Sangoma Asterisk through 18.20.0, 19.x and 20.x through 20.5.0, and 21.x through 21.0.0, and Certified Asterisk through 18.9-cert5. In manager.c, the functions action_getconfig() and action_getconfigJson() do not process the input file path, resulting in a path traversal vulnerability. In versions without the restrictedFile() function, no processing is done on the input path. In versions with the restrictedFile() function, path traversal is not processed.
[]
null
7.8
null
null
null
GHSA-7x7c-2rvc-69fh
An issue was discovered in ChipsetSvcSmm in Insyde InsydeH2O with kernel 5.0 through 5.5. There is insufficient input validation in BIOS Guard updates. An attacker can induce memory corruption in SMM by supplying malformed inputs to the BIOS Guard SMI handler.
[]
null
8.8
null
null
null
GHSA-q75g-mf48-c9pw
Multiple buffer underflows in the XFS implementation in the Linux kernel through 3.12.1 allow local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging the CAP_SYS_ADMIN capability for a (1) XFS_IOC_ATTRLIST_BY_HANDLE or (2) XFS_IOC_ATTRLIST_BY_HANDLE_32 ioctl call with a crafted length value, related to the xfs_attrlist_by_handle function in fs/xfs/xfs_ioctl.c and the xfs_compat_attrlist_by_handle function in fs/xfs/xfs_ioctl32.c.
[]
null
null
null
null
null
CVE-2018-21001
The anycomment plugin before 0.0.33 for WordPress has XSS.
[ "cpe:2.3:a:bologer:anycomment:*:*:*:*:*:wordpress:*:*" ]
null
null
6.1
4.3
null
CVE-2025-20059
PingAM Java Policy Agent path traversal
Relative Path Traversal vulnerability in Ping Identity PingAM Java Policy Agent allows Parameter Injection.This issue affects PingAM Java Policy Agent: through 5.10.3, through 2023.11.1, through 2024.9.
[]
9.2
null
null
null
null
CVE-2016-1635
extensions/renderer/render_frame_observer_natives.cc in Google Chrome before 49.0.2623.75 does not properly consider object lifetimes and re-entrancy issues during OnDocumentElementCreated handling, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via unknown vectors.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" ]
null
null
9.8
10
null
GHSA-hchj-55px-fgw7
IEEE P802.11-REVme D1.1 through D7.0 allows FragAttacks against mesh networks. In mesh networks using Wi-Fi Protected Access (WPA, WPA2, or WPA3) or Wired Equivalent Privacy (WEP), an adversary can exploit this vulnerability to inject arbitrary frames towards devices that support receiving non-SSP A-MSDU frames. NOTE: this issue exists because of an incorrect fix for CVE-2020-24588. P802.11-REVme, as of early 2025, is a planned release of the 802.11 standard.
[]
null
9.1
null
null
null
GHSA-3fv9-wxfp-xvfh
Cross-site scripting (XSS) vulnerability in login.php in PsychoStats 2.2.4 Beta and earlier allows remote attackers to inject arbitrary web script or HTML via the login parameter.
[]
null
null
null
null
null
CVE-2008-2551
The DownloaderActiveX Control (DownloaderActiveX.ocx) in Icona SpA C6 Messenger 1.0.0.1 allows remote attackers to force the download and execution of arbitrary files via a URL in the propDownloadUrl parameter with the propPostDownloadAction parameter set to "run."
[ "cpe:2.3:a:icona:instant_messenger:1.0.0.1:*:*:*:*:*:*:*" ]
null
null
null
9.3
null
CVE-2021-32773
Confused deputy attack in sandbox module resolution
Racket is a general-purpose programming language and an ecosystem for language-oriented programming. In versions prior to 8.2, code evaluated using the Racket sandbox could cause system modules to incorrectly use attacker-created modules instead of their intended dependencies. This could allow system functions to be controlled by the attacker, giving access to facilities intended to be restricted. This problem is fixed in Racket version 8.2. A workaround is available, depending on system settings. For systems that provide arbitrary Racket evaluation, external sandboxing such as containers limit the impact of the problem. For multi-user evaluation systems, such as the `handin-server` system, it is not possible to work around this problem and upgrading is required.
[ "cpe:2.3:a:racket-lang:racket:*:*:*:*:*:*:*:*" ]
null
6.1
null
null
null
CVE-2023-27428
WordPress WP users media plugin <= 4.2.3 - Broken Access Control vulnerability
Missing Authorization vulnerability in Damir Calusic WP users media allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP users media: from n/a through 4.2.3.
[]
null
5.4
null
null
null
CVE-2024-0272
Kashipara Food Management System addmaterialsubmit.php sql injection
A vulnerability was found in Kashipara Food Management System up to 1.0 and classified as critical. This issue affects some unknown processing of the file addmaterialsubmit.php. The manipulation of the argument material_name leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-249827.
[ "cpe:2.3:a:kashipara:food_management_system:*:*:*:*:*:*:*:*" ]
null
6.3
6.3
6.5
null
GHSA-pfwp-hr8g-wvcg
Adobe Animate version 21.0.9 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious GIF file.
[]
null
null
null
null
null
GHSA-f68q-r7fp-qq3f
A remote code execution vulnerability in UCB component of Mitel MiVoice Connect before 19.1 SP1 could allow an unauthenticated remote attacker to execute arbitrary scripts due to insufficient validation of URL parameters. A successful exploit could allow an attacker to gain access to sensitive information.
[]
null
null
null
null
null
CVE-2019-7168
A stored-self XSS exists in Croogo through v3.0.5, allowing an attacker to execute HTML or JavaScript code in a vulnerable Blog field to /admin/nodes/nodes/add/blog.
[ "cpe:2.3:a:croogo:croogo:*:*:*:*:*:*:*:*" ]
null
null
4.8
3.5
null
GHSA-94ch-c66r-hw64
Cross-site scripting (XSS) vulnerability in leg/Main.nsf in IBM Lotus Quickplace 7.0 allows remote attackers to inject arbitrary web script or HTML via an h_SearchString sub-parameter in the PreSetFields parameter of an EditDocument action.
[]
null
null
null
null
null
GHSA-4v68-wgfw-m69v
Openswan 2.6.40 allows remote attackers to cause a denial of service (NULL pointer dereference and IKE daemon restart) via IKEv2 packets that lack expected payloads. NOTE: this vulnerability exists because of an incomplete fix for CVE 2013-6466.
[]
null
null
null
null
null
CVE-2024-37052
Deserialization of untrusted data can occur in versions of the MLflow platform running version 1.1.0 or newer, enabling a maliciously uploaded scikit-learn model to run arbitrary code on an end user’s system when interacted with.
[ "cpe:2.3:a:lfprojects:mlflow:1.1.0:*:*:*:*:*:*:*" ]
null
8.8
null
null
null
ICSA-23-157-01
Delta Electronics CNCSoft-B DOPSoft
Delta Electronics' DOPSoft versions prior to v4.0.0.82, a component of CNCSoft-B 1.0.0.4, are vulnerable to stack-based buffer overflow, which could allow an attacker to execute arbitrary code. Delta Electronics' DOPSoft versions prior to v4.0.0.82, a component of CNCSoft-B 1.0.0.4, are vulnerable to heap-based buffer overflow, which could allow an attacker to execute arbitrary code. Delta Electronics' CNCSoft-B version 1.0.0.4 DOPSoft versions 4.0.0.82 and prior are vulnerable to stack-based buffer overflow, which could allow an attacker to execute arbitrary code.
[]
null
null
7.8
null
null
CVE-2012-0116
Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect confidentiality and integrity via unknown vectors.
[ "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.43:sp1:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.46:sp1:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.47:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.48:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.49:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.49:sp1:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.50:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.51:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.52:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.52:sp1:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.53:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.54:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.55:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.56:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.57:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.58:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.59:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.60:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.61:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.5.5:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.5.6:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.5.7:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.5.8:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.5.9:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.5.10:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.5.11:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.5.12:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.5.13:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.5.14:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.5.15:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.5.16:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.5.17:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.5.18:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.5.19:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.5.20:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.5.21:*:*:*:*:*:*:*" ]
null
null
null
4.9
null
CVE-2021-1094
NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape where an out of bounds array access may lead to denial of service or information disclosure.
[ "cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:linux:*:*", "cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:windows:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" ]
null
6.1
null
null
null
GHSA-3p8j-52c6-rwvv
Vulnerability in the Oracle Business Intelligence Enterprise Edition product of Oracle Fusion Middleware (component: Analytics Web General). The supported version that is affected is 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Business Intelligence Enterprise Edition. Successful attacks of this vulnerability can result in takeover of Oracle Business Intelligence Enterprise Edition. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
[]
null
null
null
null
null
GHSA-jh7p-mhhw-4cgq
JAMWiki before 0.5.0 does not properly check permissions during moves of "read-only or admin-only topics," which allows remote attackers to make unauthorized changes to the wiki.
[]
null
null
null
null
null
RHSA-2023:4575
Red Hat Security Advisory: VolSync 0.5.4 security fixes and enhancements
openshift: OCP & FIPS mode
[ "cpe:/a:redhat:acm:2.6::el8" ]
null
6.5
null
null
null
GHSA-4wxp-jxg3-992f
Kilo 0.0.1 has a heap-based buffer overflow because there is an integer overflow in a calculation involving the number of tabs in one row.
[]
null
7.5
null
null
null
GHSA-wf52-pmf8-w9j3
PbootCMS 3.0.4 contains a SQL injection vulnerability through index.php via the search parameter that can reveal sensitive information through adding an admin account.
[]
null
null
null
null
null
CVE-2007-0387
SQL injection vulnerability in models/category.php in the Weblinks component for Joomla! SVN 20070118 (com_weblinks) allows remote attackers to execute arbitrary SQL commands via the catid parameter.
[ "cpe:2.3:a:joomla:joomla:2007-01-18:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
GHSA-h9x2-5rm7-x4gm
Insecure Comparison in secure-compare
Versions of `secure-compare` prior to 3.0.1 are affected by a vulnerability that results in the package always returning true when comparing two strings of the same length, despite differences in the contents of those strings.RecommendationUpgrade to version 3.0.1 or later.
[]
null
null
null
null
null