id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
189k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
patch_commit_url
stringlengths
38
232
CVE-2025-25086
WordPress Secret Meta plugin <= 1.2.1 - CSRF to Reflected Cross Site Scripting (XSS) vulnerability
Cross-Site Request Forgery (CSRF) vulnerability in WPDeveloper Secret Meta allows Reflected XSS.This issue affects Secret Meta: from n/a through 1.2.1.
[]
null
7.1
null
null
null
GHSA-j65r-8hrg-qc6x
An attacker can make the Node.js HTTP/2 server completely unavailable by sending a small amount of HTTP/2 frames packets with a few HTTP/2 frames inside. It is possible to leave some data in nghttp2 memory after reset when headers with HTTP/2 CONTINUATION frame are sent to the server and then a TCP connection is abruptly closed by the client triggering the Http2Session destructor while header frames are still being processed (and stored in memory) causing a race condition.
[]
null
null
8.2
null
null
CVE-2006-1874
Unspecified vulnerability in Oracle Database Server 8.1.7.4, 9.0.1.5, and 9.2.0.6 has unknown impact and attack vectors in the Oracle Spatial component, aka Vuln# DB09. NOTE: Oracle has not disputed reliable claims that this issue is SQL injection in MDSYS.PRVT_IDX using the (1) EXECUTE_INSERT, (2) EXECUTE_DELETE, (3) EXECUTE_UPDATE, (4) EXECUTE UPDATE, and (5) CRT_DUMMY functions.
[ "cpe:2.3:a:oracle:database_server:8.1.7.4:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:database_server:9.0.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:database_server:9.2.0.6:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2004-0213
Utility Manager in Windows 2000 launches winhlp32.exe while Utility Manager is running with raised privileges, which allows local users to gain system privileges via a "Shatter" style attack that sends a Windows message to cause Utility Manager to launch winhlp32 by directly accessing the context sensitive help and bypassing the GUI, then sending another message to winhlp32 in order to open a user-selected file, a different vulnerability than CVE-2003-0908.
[ "cpe:2.3:o:microsoft:windows_2000:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2000:-:sp3:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2000:-:sp4:*:*:*:*:*:*" ]
null
7.8
null
7.2
null
GHSA-pjwc-7xmf-rc5q
Cross-site scripting (XSS) vulnerability in index.php in Maian Cart 1.1 allows remote attackers to inject arbitrary web script or HTML via the keywords parameter in a search command. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
[]
null
null
null
null
null
GHSA-53xg-38vg-33gj
SQUARE ENIX Co., Ltd. Kaku-San-Sei Million Arthur before 2.25 for Android stores "product credentials" on the SD card, which allows attackers to gain privileges via a crafted application.
[]
null
null
null
null
null
GHSA-p6jv-pfj3-5933
Services_Twitter 0.6.3 does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
[]
null
null
null
null
null
CVE-2019-13476
In CentOS-WebPanel.com (aka CWP) CentOS Web Panel 0.9.8.837, XSS in the domain parameter allows a low-privilege user to achieve root access via the email list page.
[ "cpe:2.3:a:control-webpanel:webpanel:0.9.8.837:*:*:*:*:*:*:*" ]
null
null
5.4
3.5
null
CVE-2006-5211
Trend Micro OfficeScan 6.0 in Client/Server/Messaging (CSM) Suite for SMB 2.0 before 6.0.0.1385, and OfficeScan Corporate Edition (OSCE) 6.5 before 6.5.0.1418, 7.0 before 7.0.0.1257, and 7.3 before 7.3.0.1053 allow remote attackers to remove OfficeScan clients via a certain HTTP request that invokes the OfficeScan CGI program.
[ "cpe:2.3:a:trend_micro:officescan_corporate_edition:6.5:*:*:*:*:*:*:*", "cpe:2.3:a:trend_micro:officescan_corporate_edition:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:trend_micro:officescan_corporate_edition:7.3:*:*:*:*:*:*:*" ]
null
null
null
6.4
null
CVE-2017-0481
An elevation of privilege vulnerability in NFC could enable a proximate attacker to execute arbitrary code within the context of a privileged process. This issue is rated as High because it could be used to gain local access to elevated capabilities, which are not normally accessible to a third-party application. Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1. Android ID: A-33434992.
[ "cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.2:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.3:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.3.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.4:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.4.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.4.2:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.4.3:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.4.4:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:5.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:5.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:5.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:5.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:7.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*" ]
null
null
7.8
9.3
null
CVE-2016-6656
An issue was discovered in Pivotal Greenplum before 4.3.10.0. Creation of external tables using GPHDFS protocol has a vulnerability whereby arbitrary commands can be injected into the system. In order to exploit this vulnerability the user must have superuser 'gpadmin' access to the system or have been granted GPHDFS protocol permissions in order to create a GPHDFS external table.
[ "cpe:2.3:a:pivotal_software:greenplum:*:*:*:*:*:*:*:*" ]
null
null
7.2
6.5
null
GHSA-89j4-j5mp-mxwm
A CWE-1021: Improper Restriction of Rendered UI Layers or Frames vulnerability exists that could cause an adversary to trick the interface user/admin into interacting with the application in an unintended way when the product does not implement restrictions on the ability to render within frames on external addresses. Affected Products: Conext™ ComBox (All Versions)
[]
null
6.5
null
null
null
GHSA-6p47-2pgh-wj76
Improper Authentication vulnerability in Danfoss AKSM8xxA Series.This issue affects Danfoss AK-SM 8xxA Series prior to version 4.2
[]
null
8.2
null
null
null
CVE-1999-0803
The fwluser script in AIX eNetwork Firewall allows local users to write to arbitrary files via a symlink attack.
[ "cpe:2.3:a:ibm:aix_enetwork_firewall:3.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:aix_enetwork_firewall:3.3:*:*:*:*:*:*:*" ]
null
null
null
2.1
null
CVE-2021-20505
The PowerVM Logical Partition Mobility(LPM) (PowerVM Hypervisor FW920, FW930, FW940, and FW950) encryption key exchange protocol can be compromised. If an attacker has the ability to capture encrypted LPM network traffic and is able to gain service access to the FSP they can use this information to perform a series of PowerVM service procedures to decrypt the captured migration traffic IBM X-Force ID: 198232
[ "cpe:2.3:o:ibm:powervm_hypervisor:fw920:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:powervm_hypervisor:fw930:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:powervm_hypervisor:fw940:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:powervm_hypervisor:fw950:*:*:*:*:*:*:*" ]
null
null
4.4
null
null
CVE-2022-4765
Portfolio for Elementor, Image Gallery & Post Grid | PowerFolio < 2.3.1 - Contributor+ Stored XSS via Shortcode
The Portfolio for Elementor WordPress plugin before 2.3.1 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins.
[ "cpe:2.3:a:pwrplugins:portfolio_for_elementor:*:*:*:*:*:wordpress:*:*" ]
null
5.4
null
null
null
CVE-2018-1000808
Python Cryptographic Authority pyopenssl version Before 17.5.0 contains a CWE - 401 : Failure to Release Memory Before Removing Last Reference vulnerability in PKCS #12 Store that can result in Denial of service if memory runs low or is exhausted. This attack appear to be exploitable via Depends upon calling application, however it could be as simple as initiating a TLS connection. Anything that would cause the calling application to reload certificates from a PKCS #12 store.. This vulnerability appears to have been fixed in 17.5.0.
[ "cpe:2.3:a:pyopenssl_project:pyopenssl:*:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "cpe:2.3:a:redhat:gluster_storage:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:openstack:13:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*" ]
null
null
5.9
4.3
null
CVE-2013-2929
The Linux kernel before 3.12.2 does not properly use the get_dumpable function, which allows local users to bypass intended ptrace restrictions or obtain sensitive information from IA64 scratch registers via a crafted application, related to kernel/ptrace.c and arch/ia64/include/asm/processor.h.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0:rc4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0:rc5:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0:rc6:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0:rc7:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.8:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.9:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.10:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.11:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.12:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.13:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.14:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.15:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.16:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.17:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.18:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.19:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.20:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.21:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.22:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.23:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.24:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.25:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.26:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.27:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.28:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.29:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.30:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.31:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.32:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.33:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.34:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.35:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.36:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.37:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.38:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.39:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.40:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.41:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.42:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.43:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.44:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.45:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.46:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.47:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.48:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.49:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.50:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.51:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.52:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.53:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.54:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.55:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.56:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.57:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.58:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.59:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.60:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.61:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.62:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.63:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.64:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.65:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.66:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.67:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.68:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.1:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.1:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.1:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.1:rc4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.1.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.1.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.1.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.1.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.1.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.1.8:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.1.9:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.1.10:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2:rc4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2:rc5:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2:rc6:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2:rc7:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.8:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.9:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.10:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.11:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.12:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.13:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.14:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.15:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.16:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.17:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.18:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.19:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.20:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.21:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.22:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.23:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.24:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.25:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.26:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.27:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.28:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.29:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.30:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.3:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.3:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.3:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.3:rc4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.3:rc5:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.3:rc6:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.3:rc7:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.3.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.3.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.3.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.3.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.3.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.3.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.3.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.3.8:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4:rc4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4:rc5:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4:rc6:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4:rc7:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.8:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.9:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.10:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.11:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.12:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.13:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.14:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.15:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.16:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.17:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.18:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.19:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.20:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.21:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.22:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.23:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.24:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.25:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.26:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.27:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.28:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.29:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.30:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.31:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.32:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.5.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.5.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.5.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.5.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.5.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.5.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.5.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.6.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.6.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.6.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.6.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.6.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.6.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.6.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.6.8:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.6.9:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.6.10:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.6.11:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.7.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.7.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.7.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.7.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.7.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.7.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.7.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.7.8:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.7.9:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.7.10:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.8.0:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.8.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.8.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.8.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.8.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.8.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.8.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.8.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.8.8:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.8.9:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.8.10:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.8.11:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.8.12:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.8.13:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.9:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.9:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.9:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.9:rc4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.9:rc5:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.9:rc6:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.9:rc7:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.9.0:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.9.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.9.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.9.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.9.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.9.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.9.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.9.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.9.8:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.9.9:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.9.10:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.9.11:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.10.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.10.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.10.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.10.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.10.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.10.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.10.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.10.8:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.10.9:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.10.10:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.10.11:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.10.12:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.10.13:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.10.14:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.10.15:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.10.16:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.10.17:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.10.18:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.11:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.11.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.11.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.11.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.11.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.11.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.11.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.11.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.12:*:*:*:*:*:*:*" ]
null
null
null
3.3
null
GHSA-rjr6-c78c-px55
A server side injection vulnerability exists which could allow an authenticated administrative user to achieve Remote Code Execution in ClearPass. Resolution: Fixed in 6.7.13, 6.8.4, 6.9.0 and higher.
[]
null
null
null
null
null
CVE-2025-1211
Versions of the package hackney before 1.21.0 are vulnerable to Server-side Request Forgery (SSRF) due to improper parsing of URLs by URI built-in module and hackey. Given the URL http://[email protected]/, the URI function will parse and see the host as 127.0.0.1 (which is correct), and hackney will refer the host as 127.2.2.2/. This vulnerability can be exploited when users rely on the URL function for host checking.
[]
6.3
6.5
null
null
null
GHSA-23gg-m473-8fr9
A bug in the code allows an attacker to sign a forged zbx_session cookie, which then allows them to sign in with admin permissions.
[]
null
8.8
null
null
null
GHSA-3hmv-gr4c-qpjc
Russcom PHPImages allows remote attackers to upload files of arbitrary types by uploading a file with a .gif extension. NOTE: due to lack of specific information about attack vectors do not depend on the existence of another vulnerability, it is not clear whether this is a vulnerability.
[]
null
null
null
null
null
CVE-2012-1118
The access_has_bug_level function in core/access_api.php in MantisBT before 1.2.9 does not properly restrict access when the private_bug_view_threshold is set to an array, which allows remote attackers to bypass intended restrictions and perform certain operations on private bug reports.
[ "cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:0.18.0:*:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:0.19.0:*:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:0.19.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:0.19.0a1:*:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:0.19.0a2:*:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:0.19.1:*:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:0.19.2:*:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:0.19.3:*:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:0.19.4:*:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:0.19.5:*:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc4:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc5:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.0.0a1:*:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.0.0a2:*:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.0.0a3:*:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.1.8:*:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.2.0a1:*:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.2.0a2:*:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.2.7:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
GHSA-vwrh-j67m-m9gp
Handle leak in Microsoft Windows 2000 telnet service allows attackers to cause a denial of service by starting a large number of sessions and terminating them.
[]
null
null
null
null
null
GHSA-4gp7-wgqw-q868
SQL injection vulnerability in the is_god function in includes/nukesentinel.php in NukeSentinel 2.5.11 allows remote attackers to execute arbitrary SQL commands via base64-encoded data in an admin cookie, a different vector than CVE-2007-5125.
[]
null
null
null
null
null
CVE-2025-21289
Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability
Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability
[]
null
7.5
null
null
null
CVE-2024-21878
Command Injection through Unsafe File Name Evaluation in internal script in Enphase IQ Gateway v4.x to and including 8.x
Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability in Enphase IQ Gateway (formerly known as Envoy) allows OS Command Injection. This vulnerability is present in an internal script.This issue affects Envoy: from 4.x up to and including 8.x and is currently unpatched.
[ "cpe:2.3:h:enphase:envoy:*:*:*:*:*:*:*:*", "cpe:2.3:o:enphase:iq_gateway_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:enphase:iq_gateway:-:*:*:*:*:*:*:*" ]
9.2
null
null
null
null
GHSA-8jxj-w5fr-rjvp
Falcon web server 2.0.0.1020 and earlier allows remote attackers to bypass authentication and read restricted files via an extra / (slash) in the requested URL.
[]
null
null
null
null
null
CVE-2018-10730
All Phoenix Contact managed FL SWITCH 3xxx, 4xxx, 48xx products running firmware version 1.0 to 1.33 are prone to OS command injection.
[ "cpe:2.3:o:phoenixcontact:fl_switch_3005_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_3005:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_3005t_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_3005t:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_3004t-fx_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_3004t-fx:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_3004t-fx_st_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_3004t-fx_st:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_3008_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_3008:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_3008t_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_3008t:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_3006t-2fx_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_3006t-2fx:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_3006t-2fx_st_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_3006t-2fx_st:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_3012e-2sfx_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_3012e-2sfx:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_3016e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_3016e:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_3016_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_3016:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_3016t_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_3016t:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_3006t-2fx_sm_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_3006t-2fx_sm:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_4008t-2sfp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_4008t-2sfp:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_4008t-2gt-4fx_sm_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_4008t-2gt-4fx_sm:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_4008t-2gt-3fx_sm_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_4008t-2gt-3fx_sm:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_4808e-16fx_lc-4gc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_4808e-16fx_lc-4gc:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_4808e-16fx_sm-4gc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_4808e-16fx_sm-4gc:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_4808e-16fx_sm_st-4gc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_4808e-16fx_sm_st-4gc:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_4808e-16fx_st-4gc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_4808e-16fx_st-4gc:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_4808e-16fx-4gc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_4808e-16fx-4gc:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_4808e-16fx_sm_lc-4gc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_4808e-16fx_sm_lc-4gc:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_4012t_2gt_2fx_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_4012t_2gt_2fx:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_4012t-2gt-2fx_st_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_4012t-2gt-2fx_st:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_4824e-4gc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_4824e-4gc:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_4800e-24fx-4gc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_4800e-24fx-4gc:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_4800e-24fx_sm-4gc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_4800e-24fx_sm-4gc:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_3012e-2fx_sm_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_3012e-2fx_sm:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_4000t-8poe-2sfp-r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_4000t-8poe-2sfp-r:-:*:*:*:*:*:*:*" ]
null
null
9.1
9
null
GHSA-7fgx-h8gw-6q4h
Adobe InDesign versions 17.2.1 (and earlier) and 16.4.1 (and earlier) are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[]
null
7.8
null
null
null
CVE-2014-8611
The __sflush function in fflush.c in stdio in libc in FreeBSD 10.1 and the kernel in Apple iOS before 9 mishandles failures of the write system call, which allows context-dependent attackers to execute arbitrary code or cause a denial of service (heap-based buffer overflow) via a crafted application.
[ "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:10.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*" ]
null
null
null
6.9
null
CVE-2024-47666
scsi: pm80xx: Set phy->enable_completion only when we wait for it
In the Linux kernel, the following vulnerability has been resolved: scsi: pm80xx: Set phy->enable_completion only when we wait for it pm8001_phy_control() populates the enable_completion pointer with a stack address, sends a PHY_LINK_RESET / PHY_HARD_RESET, waits 300 ms, and returns. The problem arises when a phy control response comes late. After 300 ms the pm8001_phy_control() function returns and the passed enable_completion stack address is no longer valid. Late phy control response invokes complete() on a dangling enable_completion pointer which leads to a kernel crash.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
null
5.5
null
null
null
CVE-2016-7405
The qstr method in the PDO driver in the ADOdb Library for PHP before 5.x before 5.20.7 might allow remote attackers to conduct SQL injection attacks via vectors related to incorrect quoting.
[ "cpe:2.3:a:adodb_project:adodb:5.00:beta:*:*:*:*:*:*", "cpe:2.3:a:adodb_project:adodb:5.01:beta:*:*:*:*:*:*", "cpe:2.3:a:adodb_project:adodb:5.02:*:*:*:*:*:*:*", "cpe:2.3:a:adodb_project:adodb:5.02:a:*:*:*:*:*:*", "cpe:2.3:a:adodb_project:adodb:5.03:*:*:*:*:*:*:*", "cpe:2.3:a:adodb_project:adodb:5.04:*:*:*:*:*:*:*", "cpe:2.3:a:adodb_project:adodb:5.04:a:*:*:*:*:*:*", "cpe:2.3:a:adodb_project:adodb:5.05:*:*:*:*:*:*:*", "cpe:2.3:a:adodb_project:adodb:5.06:*:*:*:*:*:*:*", "cpe:2.3:a:adodb_project:adodb:5.06:a:*:*:*:*:*:*", "cpe:2.3:a:adodb_project:adodb:5.07:*:*:*:*:*:*:*", "cpe:2.3:a:adodb_project:adodb:5.08:*:*:*:*:*:*:*", "cpe:2.3:a:adodb_project:adodb:5.08:a:*:*:*:*:*:*", "cpe:2.3:a:adodb_project:adodb:5.09:*:*:*:*:*:*:*", "cpe:2.3:a:adodb_project:adodb:5.09:a:*:*:*:*:*:*", "cpe:2.3:a:adodb_project:adodb:5.10:*:*:*:*:*:*:*", "cpe:2.3:a:adodb_project:adodb:5.11:*:*:*:*:*:*:*", "cpe:2.3:a:adodb_project:adodb:5.12:*:*:*:*:*:*:*", "cpe:2.3:a:adodb_project:adodb:5.13:*:*:*:*:*:*:*", "cpe:2.3:a:adodb_project:adodb:5.14:*:*:*:*:*:*:*", "cpe:2.3:a:adodb_project:adodb:5.15:*:*:*:*:*:*:*", "cpe:2.3:a:adodb_project:adodb:5.16:*:*:*:*:*:*:*", "cpe:2.3:a:adodb_project:adodb:5.16:a:*:*:*:*:*:*", "cpe:2.3:a:adodb_project:adodb:5.17:*:*:*:*:*:*:*", "cpe:2.3:a:adodb_project:adodb:5.18:*:*:*:*:*:*:*", "cpe:2.3:a:adodb_project:adodb:5.18:a:*:*:*:*:*:*", "cpe:2.3:a:adodb_project:adodb:5.19:*:*:*:*:*:*:*", "cpe:2.3:a:adodb_project:adodb:5.20.0:*:*:*:*:*:*:*", "cpe:2.3:a:adodb_project:adodb:5.20.1:*:*:*:*:*:*:*", "cpe:2.3:a:adodb_project:adodb:5.20.2:*:*:*:*:*:*:*", "cpe:2.3:a:adodb_project:adodb:5.20.3:*:*:*:*:*:*:*", "cpe:2.3:a:adodb_project:adodb:5.20.4:*:*:*:*:*:*:*", "cpe:2.3:a:adodb_project:adodb:5.20.5:*:*:*:*:*:*:*", "cpe:2.3:a:adodb_project:adodb:5.20.6:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:-:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:25:*:*:*:*:*:*:*" ]
null
null
9.8
7.5
null
GHSA-c9g8-fgq6-h2wg
A vulnerability in Cisco Integrated Management Controller (IMC) Supervisor, Cisco UCS Director, and Cisco UCS Director Express for Big Data could allow an unauthenticated, remote attacker to log in to the CLI of an affected system by using the SCP User account (scpuser), which has default user credentials. The vulnerability is due to the presence of a documented default account with an undocumented default password and incorrect permission settings for that account. Changing the default password for this account is not enforced during the installation of the product. An attacker could exploit this vulnerability by using the account to log in to an affected system. A successful exploit could allow the attacker to execute arbitrary commands with the privileges of the scpuser account. This includes full read and write access to the system's database.
[]
null
9.8
null
null
null
CVE-2021-29487
Authentication bypass in Octobercms
octobercms in a CMS platform based on the Laravel PHP Framework. In affected versions of the october/system package an attacker can exploit this vulnerability to bypass authentication and takeover of and user account on an October CMS server. The vulnerability is exploitable by unauthenticated users via a specially crafted request. This only affects frontend users and the attacker must obtain a Laravel secret key for cookie encryption and signing in order to exploit this vulnerability. The issue has been patched in Build 472 and v1.1.5.
[ "cpe:2.3:a:octobercms:october:*:*:*:*:*:*:*:*" ]
null
7.4
null
null
null
CVE-2023-38870
A SQL injection vulnerability exists in gugoan Economizzer commit 3730880 (April 2023) and v.0.9-beta1. The cash book has a feature to list accomplishments by category, and the 'category_id' parameter is vulnerable to SQL Injection.
[ "cpe:2.3:a:economizzer:economizzer:0.9:beta1:*:*:*:wordpress:*:*", "cpe:2.3:a:economizzer:economizzer:april_2023:*:*:*:*:wordpress:*:*" ]
null
9.8
null
null
null
CVE-2020-11988
Apache XmlGraphics Commons 2.4 and earlier is vulnerable to server-side request forgery, caused by improper input validation by the XMPParser. By using a specially-crafted argument, an attacker could exploit this vulnerability to cause the underlying server to make arbitrary GET requests. Users should upgrade to 2.6 or later.
[ "cpe:2.3:a:apache:xmlgraphics_commons:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*" ]
null
8.2
null
6.4
null
GHSA-3mfq-73xr-2v9w
repository/repository_ajax.php in Moodle 2.2.x before 2.2.5 and 2.3.x before 2.3.2 allows remote authenticated users to bypass intended upload-size restrictions via a -1 value in the maxbytes field.
[]
null
null
null
null
null
GHSA-wff2-3734-8hcr
A vulnerability, which was classified as problematic, was found in Wavelog up to 1.8.0. Affected is the function index of the file /qso of the component Live QSO. The manipulation of the argument manual leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.8.1 is able to address this issue. The patch is identified as b31002cec6b71ab5f738881806bb546430ec692e. It is recommended to upgrade the affected component.
[]
6.9
4.3
null
null
null
GHSA-vqr9-vjpx-74p5
Unspecified vulnerability in JustSystems Ichitaro 13, 2004 through 2008, Lite2, and Ichitaro viewer 5.1.5.0 and earlier allows remote attackers to execute arbitrary code via a crafted file, as exploited in the wild by Trojan.Tarodrop.H in March 2009.
[]
null
null
null
null
null
CVE-2010-2761
The multipart_init function in (1) CGI.pm before 3.50 and (2) Simple.pm in CGI::Simple 1.112 and earlier uses a hardcoded value of the MIME boundary string in multipart/x-mixed-replace content, which allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via crafted input that contains this value, a different vulnerability than CVE-2010-3172.
[ "cpe:2.3:a:andy_armstrong:cgi.pm:*:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:1.4:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:1.42:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:1.43:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:1.44:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:1.45:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:1.50:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:1.51:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:1.52:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:1.53:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:1.54:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:1.55:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:1.56:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:1.57:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.01:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.13:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.14:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.15:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.16:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.17:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.18:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.19:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.20:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.21:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.22:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.23:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.24:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.25:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.26:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.27:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.28:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.29:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.30:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.31:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.32:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.33:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.34:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.35:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.36:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.37:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.38:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.39:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.40:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.41:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.42:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.43:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.44:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.45:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.46:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.47:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.48:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.49:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.50:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.51:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.52:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.53:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.54:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.55:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.56:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.57:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.58:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.59:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.60:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.61:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.62:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.63:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.64:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.65:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.66:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.67:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.68:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.69:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.70:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.71:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.72:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.73:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.74:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.75:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.76:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.77:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.78:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.79:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.80:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.81:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.82:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.83:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.84:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.85:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.86:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.87:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.88:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.89:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.90:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.91:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.92:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.93:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.94:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.95:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.96:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.97:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.98:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.99:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.751:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.752:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:3.00:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:3.01:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:3.02:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:3.03:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:3.04:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:3.05:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:3.06:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:3.07:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:3.08:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:3.09:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:3.10:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:3.11:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:3.12:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:3.13:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:3.14:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:3.15:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:3.16:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:3.17:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:3.18:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:3.19:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:3.20:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:3.21:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:3.22:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:3.23:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:3.24:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:3.25:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:3.26:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:3.27:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:3.28:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:3.29:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:3.30:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:3.31:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:3.32:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:3.33:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:3.34:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:3.35:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:3.36:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:3.37:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:3.38:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:3.39:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:3.40:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:3.41:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:3.42:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:3.43:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:3.44:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:3.45:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:3.46:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:3.47:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:3.48:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi-simple:*:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi-simple:0.078:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi-simple:0.079:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi-simple:0.080:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi-simple:0.081:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi-simple:0.082:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi-simple:0.83:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi-simple:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi-simple:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi-simple:1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi-simple:1.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi-simple:1.103:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi-simple:1.104:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi-simple:1.105:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi-simple:1.106:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi-simple:1.107:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi-simple:1.108:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi-simple:1.109:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi-simple:1.110:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi-simple:1.111:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
CVE-2025-43576
Acrobat Reader | Use After Free (CWE-416)
Acrobat Reader versions 24.001.30235, 20.005.30763, 25.001.20521 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[]
null
7.8
null
null
null
CVE-2022-23279
Windows ALPC Elevation of Privilege Vulnerability
Windows ALPC Elevation of Privilege Vulnerability
[ "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*" ]
null
7
null
null
null
CVE-2000-0360
Buffer overflow in INN 2.2.1 and earlier allows remote attackers to cause a denial of service via a maliciously formatted article.
[ "cpe:2.3:a:isc:inn:1.4sec:*:*:*:*:*:*:*", "cpe:2.3:a:isc:inn:1.4sec2:*:*:*:*:*:*:*", "cpe:2.3:a:isc:inn:1.4unoff3:*:*:*:*:*:*:*", "cpe:2.3:a:isc:inn:1.4unoff4:*:*:*:*:*:*:*", "cpe:2.3:a:isc:inn:1.5:*:*:*:*:*:*:*", "cpe:2.3:a:isc:inn:1.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:isc:inn:1.7:*:*:*:*:*:*:*", "cpe:2.3:a:isc:inn:1.7.2:*:*:*:*:*:*:*", "cpe:2.3:a:isc:inn:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:isc:inn:2.1:*:*:*:*:*:*:*", "cpe:2.3:a:isc:inn:2.2:*:*:*:*:*:*:*", "cpe:2.3:a:isc:inn:2.2.1:*:*:*:*:*:*:*" ]
null
null
null
5
null
CVE-2006-3370
Blueboy 1.0.3 stores bb_news_config.inc under the web document root with insufficient access control, which allows remote attackers to obtain sensitive information, including the database configuration.
[ "cpe:2.3:a:bb-news:blueboy:1.0.3:*:*:*:*:*:*:*" ]
null
null
null
5
null
GHSA-fhfq-m7m3-8884
An issue in EasyIO CPT Graphics v0.8 allows attackers to discover valid users in the application.
[]
null
5.3
null
null
null
CVE-2025-6836
code-projects Library System profile.php sql injection
A vulnerability classified as critical has been found in code-projects Library System 1.0. Affected is an unknown function of the file /profile.php. The manipulation of the argument phone leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.
[]
6.9
7.3
7.3
7.5
null
CVE-2023-47077
Adobe InDesign CC 2023 Memory Corruption Vulnerability VI.
Adobe InDesign versions 19.0 (and earlier) and 17.4.2 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[ "cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:indesign:19.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
5.5
null
null
null
GHSA-hrqc-2rrc-vr54
Vulnerability in the Oracle Financial Services Analytical Applications Infrastructure product of Oracle Financial Services Applications (component: Infrastructure). Supported versions that are affected are 8.0.6-8.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Financial Services Analytical Applications Infrastructure. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Financial Services Analytical Applications Infrastructure accessible data. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).
[]
null
null
null
null
null
CVE-2007-3627
Multiple SQL injection vulnerabilities in PHP Lite Calendar Express 2.2 allow remote attackers to execute arbitrary SQL commands via the cid parameter to (1) login.php, (2) auth.php, and (3) subscribe.php. NOTE: the month.php, year.php, week.php, and day.php vectors are already covered by CVE-2005-4009. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
[ "cpe:2.3:a:php_lite:calendar_express:2.2:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
GHSA-2vpr-vq4j-xqcm
SQL injection vulnerability in admin/news.php in PHP Forge 3.0 beta 2 allows remote attackers to execute arbitrary SQL commands via the id parameter in the news module to admin.php.
[]
null
null
null
null
null
GHSA-3vpg-mwgf-4jvj
A flaw was found in nbdkit due to to improperly caching plaintext state across the STARTTLS encryption boundary. A MitM attacker could use this flaw to inject a plaintext NBD_OPT_STRUCTURED_REPLY before proxying everything else a client sends to the server, potentially leading the client to terminate the NBD session. The highest threat from this vulnerability is to system availability.
[]
null
3.1
null
null
null
GHSA-g6wq-rr9q-jmfw
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in onOffice GmbH onOffice for WP-Websites allows SQL Injection. This issue affects onOffice for WP-Websites: from n/a through 5.7.
[]
null
7.6
null
null
null
CVE-2020-6148
A heap overflow vulnerability exists in Pixar OpenUSD 20.05 when the software parses compressed sections in binary USD files. An instance exists in USDC file format FIELDSETS section decompression heap overflow.
[ "cpe:2.3:a:pixar:openusd:20.05:*:*:*:*:*:*:*" ]
null
null
8.8
null
null
GHSA-gm9v-q76h-x92w
PHP remote file inclusion vulnerability in admin/lib_action_step.php in Hot Open Tickets (HOT) 11012004_ver2f, when register_globals is enabled, allows remote attackers to include arbitrary files via the GLOBALS[CLASS_PATH] parameter. NOTE: this issue might be resultant from a global overwrite vulnerability.
[]
null
null
null
null
null
GHSA-j5q5-3xrg-g36w
Missing Authorization vulnerability in 8Degree Themes Coming Soon Landing Page and Maintenance Mode WordPress Plugin allows Retrieve Embedded Sensitive Data.This issue affects Coming Soon Landing Page and Maintenance Mode WordPress Plugin: from n/a through 2.2.0.
[]
null
5.3
null
null
null
GHSA-cvvq-777c-65v4
libyara/re.c in the regexp module in YARA 3.5.0 allows remote attackers to cause a denial of service (stack consumption) via a crafted rule that is mishandled in the _yr_re_emit function.
[]
null
null
7.5
null
null
cisco-sa-asaftd-snmp-dos-7TcnzxTU
Cisco Adaptive Security Appliance and Firepower Threat Defense Software SNMP Denial of Service Vulnerability
A vulnerability in the Simple Network Management Protocol (SNMP) feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, remote attacker to cause an unexpected reload of the device. This vulnerability is due to insufficient input validation of SNMP packets. An attacker could exploit this vulnerability by sending a crafted SNMP request to an affected device using IPv4 or IPv6. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition. This vulnerability affects all versions of SNMP (versions 1, 2c, and 3) and requires a valid SNMP community string or valid SNMPv3 user credentials. For more information, see the Details ["#details"] section of this advisory. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is part of the October 2024 release of the Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: October 2024 Semiannual Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication ["https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75300"].
[]
null
7.7
null
null
null
GHSA-hmhg-vrf4-c942
CSP MySQL User Manager 2.3.1 allows SQL injection, and resultant Authentication Bypass, via a crafted username during a login attempt.
[]
null
null
9.8
null
null
CVE-2024-53672
Authenticated Remote Command Injection in HPE Aruba Networking ClearPass Policy Manager Web-Based Management Interface
A vulnerability in the ClearPass Policy Manager web-based management interface allows remote authenticated users to run arbitrary commands on the underlying host. Successful exploit could allow an attacker to execute arbitrary commands as a lower privileged user on the underlying operating system.
[]
null
4.7
null
null
null
CVE-2020-2207
Jenkins VncViewer Plugin 1.7 and earlier does not escape a parameter value in the checkVncServ form validation endpoint, resulting in a reflected cross-site scripting (XSS) vulnerability.
[ "cpe:2.3:a:jenkins:vncviewer:*:*:*:*:*:jenkins:*:*" ]
null
6.1
null
4.3
null
CVE-2017-11716
MetInfo through 5.3.17 allows stored XSS via HTML Edit Mode.
[ "cpe:2.3:a:metinfo_project:metinfo:*:*:*:*:*:*:*:*" ]
null
null
6.1
4.3
null
CVE-2022-40220
An OS command injection vulnerability exists in the httpd txt/restore.cgi functionality of Siretta QUARTZ-GOLD G5.0.1.5-210720-141020. A specially-crafted network request can lead to arbitrary command execution. An attacker can send an HTTP request to trigger this vulnerability.
[ "cpe:2.3:o:siretta:quartz-gold_firmware:g5.0.1.5-210720-141020:*:*:*:*:*:*:*", "cpe:2.3:h:siretta:quartz-gold:-:*:*:*:*:*:*:*" ]
null
null
7.2
null
null
CVE-2007-0144
Cross-site scripting (XSS) vulnerability in search.asp in Digitizing Quote And Ordering System 1.0 allows remote authenticated attackers to inject arbitrary web script or HTML via the ordernum parameter.
[ "cpe:2.3:a:digitizing_quote_and_ordering_system:digitizing_quote_and_ordering_system:1.0:*:*:*:*:*:*:*" ]
null
null
null
6.8
null
GHSA-qjvg-gx5p-355w
Dell Avamar, versions prior to 19.12 with patch 338905, excluding version 19.10SP1 with patch 338904, contains a Trusting HTTP Permission Methods on the Server-Side vulnerability in Security. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Information exposure.
[]
null
8.3
null
null
null
CVE-2023-49224
Precor touchscreen console P62, P80, and P82 contains a default SSH public key in the authorized_keys file. A remote attacker could use this key to gain root privileges.
[ "cpe:2.3:o:precor:p62:*:*:*:*:*:*:*:*", "cpe:2.3:o:precor:p80:*:*:*:*:*:*:*:*", "cpe:2.3:o:precor:p82:*:*:*:*:*:*:*:*" ]
null
8
null
null
null
GHSA-p9r7-7v2q-9hqx
A vulnerability was found in TOTOLINK X15 1.0.0-B20230714.1105. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /boafrm/formMultiAPVLAN of the component HTTP POST Request Handler. The manipulation of the argument submit-url leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
[]
7.4
8.8
null
null
null
GHSA-c63m-82w2-w8f6
Remote Desktop Licensing Diagnoser Information Disclosure Vulnerability.
[]
null
5.5
null
null
null
GHSA-w53q-mr8f-936x
Exphox WebRadar is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.
[]
null
null
6.1
null
null
GHSA-mf6m-m52m-43jc
Password recovery vulnerability in SICK SIM1004 Partnumber 1098148 with firmware version < 2.0.0 allows an unprivileged remote attacker to gain access to the userlevel defined as RecoverableUserLevel by invocating the password recovery mechanism method. This leads to a increase in their privileges on the system and thereby affecting the confidentiality integrity and availability of the system. An attacker can expect repeatable success by exploiting the vulnerability. The recommended solution is to update the firmware to a version >= 2.0.0 as soon as possible.
[]
null
9.8
null
null
null
CVE-2025-20208
A vulnerability in the web-based management interface of Cisco TelePresence Management Suite (TMS) could allow a low-privileged, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. This vulnerability is due to insufficient input validation by the web-based management interface. An attacker could exploit this vulnerability by inserting malicious data in a specific data field in the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
[]
null
4.6
null
null
null
CVE-2023-34975
QTS, QuTS hero, QuTScloud
An OS command injection vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated administrators to execute commands via a network. QuTScloud c5.1.x is not affected. We have already fixed the vulnerability in the following versions: QuTS hero h4.5.4.2626 build 20231225 and later QTS 4.5.4.2627 build 20231225 and later
[ "cpe:2.3:a:qnap:video_station:*:*:*:*:*:*:*:*" ]
null
6.6
null
null
null
RHSA-2022:0633
Red Hat Security Advisory: sysstat security update
sysstat: memory corruption due to an integer overflow in remap_struct in sa_common.c
[ "cpe:/a:redhat:rhel_eus:8.2::appstream" ]
null
5.5
null
null
null
GHSA-v6gx-jhvf-5gpp
WinGate is being used.
[]
null
null
null
null
null
CVE-2002-0149
Buffer overflow in ASP Server-Side Include Function in IIS 4.0, 5.0 and 5.1 allows remote attackers to cause a denial of service and possibly execute arbitrary code via long file names.
[ "cpe:2.3:a:microsoft:internet_information_server:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_information_services:5.0:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2010-3900
Midori before 0.2.5, when WebKitGTK+ before 1.1.14 or LibSoup before 2.29.91 is used, does not verify X.509 certificates, which allows man-in-the-middle attackers to spoof arbitrary https web sites via a crafted server certificate, a related issue to CVE-2010-3312.
[ "cpe:2.3:a:christian_dywan:midori:*:*:*:*:*:*:*:*", "cpe:2.3:a:christian_dywan:midori:0.1.10:*:*:*:*:*:*:*", "cpe:2.3:a:christian_dywan:midori:0.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:christian_dywan:midori:0.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:christian_dywan:midori:0.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:christian_dywan:midori:0.2.3:*:*:*:*:*:*:*" ]
null
null
null
5.8
null
CVE-2023-33211
WordPress WP-Piwik Plugin <= 1.0.27 is vulnerable to Cross Site Scripting (XSS)
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in André Bräkling WP-Matomo Integration (WP-Piwik) plugin <= 1.0.27 versions.
[ "cpe:2.3:a:wp-matomo_integration_project:wp-matomo_integration:*:*:*:*:*:wordpress:*:*" ]
null
5.9
null
null
null
CVE-2012-2928
The Gliffy plugin before 3.7.1 for Atlassian JIRA, and before 4.2 for Atlassian Confluence, does not properly restrict the capabilities of third-party XML parsers, which allows remote attackers to read arbitrary files or cause a denial of service (resource consumption) via unspecified vectors.
[ "cpe:2.3:a:gliffy:gliffy:*:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:jira:*:*:*:*:*:*:*:*", "cpe:2.3:a:gliffy:gliffy:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:gliffy:gliffy:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:gliffy:gliffy:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:gliffy:gliffy:2.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:gliffy:gliffy:2.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:gliffy:gliffy:2.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:gliffy:gliffy:2.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:gliffy:gliffy:2.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:gliffy:gliffy:2.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:gliffy:gliffy:2.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:gliffy:gliffy:3.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:gliffy:gliffy:3.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:gliffy:gliffy:3.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:gliffy:gliffy:3.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:gliffy:gliffy:3.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:gliffy:gliffy:3.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:gliffy:gliffy:3.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:gliffy:gliffy:3.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:gliffy:gliffy:3.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:gliffy:gliffy:3.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:gliffy:gliffy:3.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:gliffy:gliffy:3.5:*:*:*:*:*:*:*", "cpe:2.3:a:gliffy:gliffy:3.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:gliffy:gliffy:3.6:*:*:*:*:*:*:*", "cpe:2.3:a:gliffy:gliffy:3.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:confluence_server:4.1.9:*:*:*:*:*:*:*" ]
null
null
null
6.4
null
CVE-2023-36520
WordPress Editorial Calendar Plugin <= 3.7.12 is vulnerable to Insecure Direct Object References (IDOR)
Authorization Bypass Through User-Controlled Key vulnerability in MarketingFire Editorial Calendar.This issue affects Editorial Calendar: from n/a through 3.7.12.
[ "cpe:2.3:a:zackgrossbart:editorial_calendar:*:*:*:*:*:wordpress:*:*" ]
null
5.4
null
null
null
GHSA-37vj-5xqx-3r34
Certain NETGEAR devices are affected by stored XSS. This affects D3600 before 1.0.0.75, D6000 before 1.0.0.75, D7800 before 1.0.1.44, DM200 before 1.0.0.58, R7500v2 before 1.0.3.40, R7800 before 1.0.2.60, R8900 before 1.0.4.12, R9000 before 1.0.4.12, RBK20 before 2.3.0.22, RBR20 before 2.3.0.22, RBS20 before 2.3.0.22, RBK50 before 2.3.0.22, RBR50 before 2.3.0.22, RBS50 before 2.3.0.22, RBS40 before 2.3.0.22, WN3000RPv2 before 1.0.0.68, WN3000RPv3 before 1.0.2.70, WN3100RPv2 before 1.0.0.60, WNDR4300v2 before 1.0.0.58, WNDR4500v3 before 1.0.0.58, and WNR2000v5 before 1.0.0.68.
[]
null
null
null
null
null
CVE-2021-34890
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Bentley View 10.15.0.75. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of JT files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-14843.
[ "cpe:2.3:a:bentley:bentley_view:*:*:*:*:*:*:*:*", "cpe:2.3:a:bentley:microstation:*:*:*:*:*:*:*:*" ]
null
null
3.3
null
null
GHSA-w8mw-25qv-x5vf
In wlan driver, there is a possible out of bounds write due to improper input validation. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07944987; Issue ID: ALPS07944987.
[]
null
4.4
null
null
null
CVE-2024-4715
Campcodes Complete Web-Based School Management System update_grade.php cross site scripting
A vulnerability, which was classified as problematic, was found in Campcodes Complete Web-Based School Management System 1.0. This affects an unknown part of the file /model/update_grade.php. The manipulation of the argument name leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-263793 was assigned to this vulnerability.
[]
5.3
3.5
3.5
4
null
cisco-sa-asaftd-webvpn-dos-hOnB9pH4
Cisco Adaptive Security Appliance and Firepower Threat Defense Software SSL VPN Memory Management Denial of Service Vulnerability
A vulnerability in the SSL VPN feature for Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause an affected device to reload unexpectedly, resulting in a denial of service (DoS) condition. This vulnerability is due to a logic error in memory management when the device is handling SSL VPN connections. An attacker could exploit this vulnerability by sending crafted SSL/TLS packets to the SSL VPN server of the affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is part of the October 2024 release of the Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: October 2024 Semiannual Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication ["https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75300"].
[]
null
8.6
null
null
null
CVE-2023-43842
Incorrect access control in the account management function of web interface in Aten PE6208 2.3.228 and 2.4.232 allows remote authenticated users to alter user and administrator accounts credentials via HTTP POST request.
[]
null
7.3
null
null
null
CVE-2018-8997
In Windows Master (aka Windows Optimization Master) 7.99.13.604, the driver file (WoptiHWDetect.SYS) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0xf1002004.
[ "cpe:2.3:a:windows_optimization_master_project:windows_optimization_master:7.99.13.604:*:*:*:*:*:*:*" ]
null
null
7.8
6.1
null
GHSA-w9v5-63v9-9qvj
In the Linux kernel, the following vulnerability has been resolved:ksmbd: fix use-after-free in SMB request handlingA race condition exists between SMB request handling in `ksmbd_conn_handler_loop()` and the freeing of `ksmbd_conn` in the workqueue handler `handle_ksmbd_work()`. This leads to a UAF.KASAN: slab-use-after-free Read in handle_ksmbd_workKASAN: slab-use-after-free in rtlock_slowlock_lockedThis race condition arises as follows:`ksmbd_conn_handler_loop()` waits for `conn->r_count` to reach zero: `wait_event(conn->r_count_q, atomic_read(&conn->r_count) == 0);`Meanwhile, `handle_ksmbd_work()` decrements `conn->r_count` using `atomic_dec_return(&conn->r_count)`, and if it reaches zero, calls `ksmbd_conn_free()`, which frees `conn`.However, after `handle_ksmbd_work()` decrements `conn->r_count`, it may still access `conn->r_count_q` in the following line: `waitqueue_active(&conn->r_count_q)` or `wake_up(&conn->r_count_q)` This results in a UAF, as `conn` has already been freed.The discovery of this UAF can be referenced in the following PR for syzkaller's support for SMB requests.
[]
null
7
null
null
null
CVE-2020-7588
A vulnerability has been identified in Opcenter Execution Discrete (All versions < V3.2), Opcenter Execution Foundation (All versions < V3.2), Opcenter Execution Process (All versions < V3.2), Opcenter Intelligence (All versions < V3.3), Opcenter Quality (All versions < V11.3), Opcenter RD&L (V8.0), SIMATIC IT LMS (All versions < V2.6), SIMATIC IT Production Suite (All versions < V8.0), SIMATIC Notifier Server for Windows (All versions), SIMATIC PCS neo (All versions < V3.0 SP1), SIMATIC STEP 7 (TIA Portal) V15 (All versions < V15.1 Update 5), SIMATIC STEP 7 (TIA Portal) V16 (All versions < V16 Update 2), SIMOCODE ES V15.1 (All versions < V15.1 Update 4), SIMOCODE ES V16 (All versions < V16 Update 1), Soft Starter ES V15.1 (All versions < V15.1 Update 3), Soft Starter ES V16 (All versions < V16 Update 1). Sending a specially crafted packet to the affected service could cause a partial remote denial-of-service, that would cause the service to restart itself.
[ "cpe:2.3:a:siemens:opcenter_execution_discrete:*:*:*:*:*:*:*:*", "cpe:2.3:a:siemens:opcenter_execution_foundation:*:*:*:*:*:*:*:*", "cpe:2.3:a:siemens:opcenter_execution_process:*:*:*:*:*:*:*:*", "cpe:2.3:a:siemens:opcenter_intelligence:*:*:*:*:*:*:*:*", "cpe:2.3:a:siemens:opcenter_quality:*:*:*:*:*:*:*:*", "cpe:2.3:a:siemens:opcenter_rd\\&l:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:siemens:simatic_it_lms:*:*:*:*:*:*:*:*", "cpe:2.3:a:siemens:simatic_it_production_suite:*:*:*:*:*:*:*:*", "cpe:2.3:a:siemens:simatic_notifier_server:*:*:*:*:*:windows:*:*", "cpe:2.3:a:siemens:simatic_pcs_neo:*:*:*:*:*:*:*:*", "cpe:2.3:a:siemens:simatic_step_7:*:*:*:*:*:*:*:*", "cpe:2.3:a:siemens:simatic_step_7:16:-:*:*:*:*:*:*", "cpe:2.3:a:siemens:simatic_step_7:16:update_1:*:*:*:*:*:*", "cpe:2.3:a:siemens:simocode_es:*:*:*:*:*:*:*:*", "cpe:2.3:a:siemens:soft_starter_es:*:*:*:*:*:*:*:*" ]
null
5.3
null
5
null
CVE-2007-1396
The import_request_variables function in PHP 4.0.7 through 4.4.6, and 5.x before 5.2.2, when called without a prefix, does not prevent the (1) GET, (2) POST, (3) COOKIE, (4) FILES, (5) SERVER, (6) SESSION, and other superglobals from being overwritten, which allows remote attackers to spoof source IP address and Referer data, and have other unspecified impact. NOTE: it could be argued that this is a design limitation of PHP and that only the misuse of this feature, i.e. implementation bugs in applications, should be included in CVE. However, it has been fixed by the vendor.
[ "cpe:2.3:a:php:php:4.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.3.6:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.3.7:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.3.8:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.3.9:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.3.10:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.3.11:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.4.5:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.4.6:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.2.1:*:*:*:*:*:*:*" ]
null
null
null
6.8
null
CVE-2004-0226
Multiple buffer overflows in Midnight Commander (mc) before 4.6.0 may allow attackers to cause a denial of service or execute arbitrary code.
[ "cpe:2.3:a:midnight_commander:midnight_commander:4.5.40:*:*:*:*:*:*:*", "cpe:2.3:a:midnight_commander:midnight_commander:4.5.41:*:*:*:*:*:*:*", "cpe:2.3:a:midnight_commander:midnight_commander:4.5.42:*:*:*:*:*:*:*", "cpe:2.3:a:midnight_commander:midnight_commander:4.5.43:*:*:*:*:*:*:*", "cpe:2.3:a:midnight_commander:midnight_commander:4.5.44:*:*:*:*:*:*:*", "cpe:2.3:a:midnight_commander:midnight_commander:4.5.45:*:*:*:*:*:*:*", "cpe:2.3:a:midnight_commander:midnight_commander:4.5.46:*:*:*:*:*:*:*", "cpe:2.3:a:midnight_commander:midnight_commander:4.5.47:*:*:*:*:*:*:*", "cpe:2.3:a:midnight_commander:midnight_commander:4.5.48:*:*:*:*:*:*:*", "cpe:2.3:a:midnight_commander:midnight_commander:4.5.49:*:*:*:*:*:*:*", "cpe:2.3:a:midnight_commander:midnight_commander:4.5.50:*:*:*:*:*:*:*", "cpe:2.3:a:midnight_commander:midnight_commander:4.5.51:*:*:*:*:*:*:*", "cpe:2.3:a:midnight_commander:midnight_commander:4.5.52:*:*:*:*:*:*:*", "cpe:2.3:a:midnight_commander:midnight_commander:4.5.55:*:*:*:*:*:*:*", "cpe:2.3:a:midnight_commander:midnight_commander:4.6:*:*:*:*:*:*:*", "cpe:2.3:a:sgi:propack:2.3:*:*:*:*:*:*:*", "cpe:2.3:a:sgi:propack:2.4:*:*:*:*:*:*:*", "cpe:2.3:o:gentoo:linux:0.5:*:*:*:*:*:*:*", "cpe:2.3:o:gentoo:linux:0.7:*:*:*:*:*:*:*", "cpe:2.3:o:gentoo:linux:1.1a:*:*:*:*:*:*:*", "cpe:2.3:o:gentoo:linux:1.2:*:*:*:*:*:*:*", "cpe:2.3:o:gentoo:linux:1.4:*:*:*:*:*:*:*", "cpe:2.3:o:gentoo:linux:1.4:rc1:*:*:*:*:*:*", "cpe:2.3:o:gentoo:linux:1.4:rc2:*:*:*:*:*:*", "cpe:2.3:o:gentoo:linux:1.4:rc3:*:*:*:*:*:*", "cpe:2.3:o:slackware:slackware_linux:*:*:*:*:*:*:*:*", "cpe:2.3:o:slackware:slackware_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:slackware:slackware_linux:9.1:*:*:*:*:*:*:*" ]
null
null
null
10
null
CVE-2003-0280
Multiple buffer overflows in the SMTP Service for ESMTP CMailServer 4.0.2003.03.27 allow remote attackers to execute arbitrary code via long (1) MAIL FROM or (2) RCPT TO commands.
[ "cpe:2.3:a:youngzsoft:cmailserver:4.0.2003.23.27:*:*:*:*:*:*:*" ]
null
null
null
10
null
GHSA-xg6v-vr2f-h5xx
Improper memory initialization in Platform Sample/Silicon Reference firmware Intel(R) Server Board, Intel(R) Server System and Intel(R) Compute Module may allow privileged user to potentially enable an escalation of privilege via local access.
[]
null
null
6.7
null
null
GHSA-xpqx-4wj8-ww45
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in mkkmail Aparat Responsive allows DOM-Based XSS. This issue affects Aparat Responsive: from n/a through 1.3.
[]
null
6.5
null
null
null
GHSA-7ghv-4mjc-99wp
An out-of-bounds Read vulnerability in WLAvalancheService component of Ivanti Avalanche before 6.4.3 allows an authenticated remote attacker to perform denial of service attacks. In certain conditions this could also lead to remote code execution.
[]
null
null
7.5
null
null
CVE-2023-5712
The System Dashboard plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the sd_global_value() function hooked via an AJAX action in all versions up to, and including, 2.8.7. This makes it possible for authenticated attackers, with subscriber-level access and above, to retrieve sensitive global value information.
[ "cpe:2.3:a:bowo:system_dashboard:*:*:*:*:*:wordpress:*:*" ]
null
4.3
null
null
null
GHSA-4w78-w35x-w85p
All versions prior to V2.06.00.00 of ZTE ZXDT22 SF01, an monitoring system of ZTE energy product, are impacted by directory traversal vulnerability that allows remote attackers to read arbitrary files on the system via a full path name after host address.
[]
null
null
7.5
null
null
CVE-2024-37373
Improper input validation in the Central Filestore in Ivanti Avalanche 6.3.1 allows a remote authenticated attacker with admin rights to achieve RCE.
[ "cpe:2.3:a:ivanti:avalanche:*:*:*:*:*:*:*:*", "cpe:2.3:a:ivanti:avalanche:6.3.1:*:*:*:premise:*:*:*", "cpe:2.3:a:ivanti:avalanche:6.3.1.1507:*:*:*:premise:*:*:*", "cpe:2.3:a:ivanti:avalanche:6.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:ivanti:avalanche:6.3.2:*:*:*:*:windows:*:*", "cpe:2.3:a:ivanti:avalanche:6.3.2:*:*:*:premise:*:*:*", "cpe:2.3:a:ivanti:avalanche:6.3.2.3490:*:*:*:*:*:*:*", "cpe:2.3:a:ivanti:avalanche:6.3.2.3490:*:*:*:premise:*:*:*", "cpe:2.3:a:ivanti:avalanche:6.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:ivanti:avalanche:6.3.3:*:*:*:premise:*:*:*", "cpe:2.3:a:ivanti:avalanche:6.3.3.101:*:*:*:*:*:*:*", "cpe:2.3:a:ivanti:avalanche:6.3.3.101:*:*:*:premise:*:*:*", "cpe:2.3:a:ivanti:avalanche:6.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:ivanti:avalanche:6.3.4:*:*:*:premise:*:*:*", "cpe:2.3:a:ivanti:avalanche:6.3.4.153:*:*:*:premise:*:*:*", "cpe:2.3:a:ivanti:avalanche:6.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:ivanti:avalanche:6.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:ivanti:avalanche:6.4.1:*:*:*:premise:*:*:*", "cpe:2.3:a:ivanti:avalanche:6.4.1.207:*:*:*:premise:*:*:*", "cpe:2.3:a:ivanti:avalanche:6.4.1.236:*:*:*:premise:*:*:*", "cpe:2.3:a:ivanti:avalanche:6.4.2:*:*:*:premise:*:*:*" ]
null
null
7.2
null
null
ICSA-18-088-02
Siemens TIM 1531 IRC
A remote attacker with network access to port 80/tcp or port 443/tcp could perform administrative operations on the device without prior authentication. Successful exploitation could allow to cause a denial-of-service, or read and manipulate data as well as configuration settings of the affected device. At the stage of publishing this security advisory no public exploitation is known. Siemens provides mitigations to resolve it.
[]
null
9.8
null
null
null
GHSA-9h9j-m9f5-4f79
The Signal app before 5.34 for iOS allows URI spoofing via RTLO injection. It incorrectly renders RTLO encoded URLs beginning with a non-breaking space, when there is a hash character in the URL. This technique allows a remote unauthenticated attacker to send legitimate looking links, appearing to be any website URL, by abusing the non-http/non-https automatic rendering of URLs. An attacker can spoof, for example, example.com, and masquerade any URL with a malicious destination. An attacker requires a subdomain such as gepj, txt, fdp, or xcod, which would appear backwards as jpeg, txt, pdf, and docx respectively.
[]
null
7.5
null
null
null
GHSA-qvjj-36wg-8jh8
A vulnerability has been found in Campcodes Coffee Shop POS System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /admin/categories/view_category.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-226975.
[]
null
null
6.3
null
null