id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
189k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
patch_commit_url
stringlengths
36
232
CVE-2005-1707
The fn_show_postinst function in Gentoo webapp-config before 1.10-r14 allows local users to overwrite arbitrary files via a symlink attack on the postinst.txt temporary file.
[ "cpe:2.3:a:gentoo:linux_webapp-config:1.10:r14:*:*:*:*:*:*" ]
null
null
null
4.6
null
CVE-2010-4363
Multiple SQL injection vulnerabilities in contact.php in MRCGIGUY (MCG) FreeTicket 1.0.0, when magic_quotes_gpc is disabled, allow remote attackers to execute arbitrary SQL commands via the (1) id and (2) email parameters in a showtickets action.
[ "cpe:2.3:a:mrcgiguy:freeticket:1.0.0:*:*:*:*:*:*:*" ]
null
null
null
6.8
null
cisco-sa-nd-tlsvld-TbAQLp3N
Cisco Nexus Dashboard SSL Certificate Validation Vulnerability
A vulnerability in the SSL/TLS implementation of Cisco Nexus Dashboard could allow an unauthenticated, remote attacker to alter communications with associated controllers or view sensitive information. This vulnerability exists because SSL server certificates are not validated when Cisco Nexus Dashboard is establishing a connection to Cisco Application Policy Infrastructure Controller (APIC), Cisco Cloud APIC, or Cisco Nexus Dashboard Fabric Controller, formerly Data Center Network Manager (DCNM) controllers. An attacker could exploit this vulnerability by using man-in-the-middle techniques to intercept the traffic between the affected device and the controllers, and then using a crafted certificate to impersonate the controllers. A successful exploit could allow the attacker to alter communications between devices or view sensitive information, including Administrator credentials for these controllers. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
[]
null
7.4
null
null
null
CVE-2014-0892
IBM Notes and Domino 8.5.x before 8.5.3 FP6 IF3 and 9.x before 9.0.1 FP1 on 32-bit Linux platforms use incorrect gcc options, which makes it easier for remote attackers to execute arbitrary code by leveraging the absence of the NX protection mechanism and placing crafted x86 code on the stack, aka SPR KLYH9GGS9W.
[ "cpe:2.3:a:ibm:lotus_domino:8.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_domino:8.5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_domino:8.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_domino:8.5.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_domino:8.5.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_domino:8.5.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_domino:8.5.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_domino:8.5.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_domino:8.5.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_domino:8.5.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_domino:8.5.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_domino:8.5.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_domino:8.5.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_domino:8.5.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_domino:8.5.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_domino:8.5.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_domino:8.5.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_domino:8.5.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_domino:8.5.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_domino:8.5.3.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_domino:9.0.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_domino:9.0.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_notes:8.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_notes:8.5.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_notes:8.5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_notes:8.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_notes:8.5.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_notes:8.5.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_notes:8.5.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_notes:8.5.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_notes:8.5.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_notes:8.5.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_notes:8.5.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_notes:8.5.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_notes:8.5.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_notes:8.5.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_notes:8.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_notes:8.5.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_notes:8.5.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_notes:8.5.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_notes:8.5.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_notes:8.5.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_notes:8.5.3.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_notes:9.0.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_notes:9.0.1.0:*:*:*:*:*:*:*" ]
null
null
null
5
null
GHSA-6v7j-g6x9-qr7q
Cross-site scripting (XSS) vulnerability in Google Chrome before 43.0.2357.65 allows user-assisted remote attackers to inject arbitrary web script or HTML via crafted data that is improperly handled by the Bookmarks feature.
[]
null
null
null
null
null
GHSA-wq5p-2cwp-p8wr
Endress+Hauser Ecograph T (Neutral/Private Label) (RSG35, ORSG35) and Memograph M (Neutral/Private Label) (RSG45, ORSG45) with Firmware version V2.0.0 and above is prone to exposure of sensitive information to an unauthorized actor. The firmware release has a dynamic token for each request submitted to the server, which makes repeating requests and analysis complex enough. Nevertheless, it's possible and during the analysis it was discovered that it also has an issue with the access-control matrix on the server-side. It was found that a user with low rights can get information from endpoints that should not be available to this user.
[]
null
null
null
null
null
GHSA-h9hg-759g-265v
Clash for Windows v0.19.8 was discovered to allow arbitrary code execution via a crafted payload injected into the Proxies name column.
[]
null
9.8
null
null
null
GHSA-992x-5j6f-hjqq
Yes24ViewerX ActiveX Control 1.0.327.50126 and earlier versions contains a vulnerability that could allow remote attackers to download and execute arbitrary files by setting the arguments to the ActiveX method. This can be leveraged for code execution.
[]
null
8.8
null
null
null
GHSA-6827-ch9x-qwxf
Authenticated (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in NOTICE BOARD plugin <= 1.1 at WordPress.
[]
null
5.4
null
null
null
CVE-2022-49213
ath10k: Fix error handling in ath10k_setup_msa_resources
In the Linux kernel, the following vulnerability has been resolved: ath10k: Fix error handling in ath10k_setup_msa_resources The device_node pointer is returned by of_parse_phandle() with refcount incremented. We should use of_node_put() on it when done. This function only calls of_node_put() in the regular path. And it will cause refcount leak in error path.
[]
null
5.5
null
null
null
CVE-2024-40674
In validateSsid of WifiConfigurationUtil.java, there is a possible way to overflow a system configuration file due to a logic error in the code. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.
[]
null
5.3
null
null
null
GHSA-hx7r-89vp-x3gj
In Audiocodes Mediapack MP-11x through 6.60A.369.002, a crafted POST request request may result in an unauthenticated remote user's ability to execute unauthorized code.
[]
null
9.8
null
null
null
GHSA-6f6m-g7v2-775j
In the Linux kernel, the following vulnerability has been resolved:pinctrl: nuvoton: npcm8xx: Add NULL check in npcm8xx_gpio_fwdevm_kasprintf() calls can return null pointers on failure. But the return values were not checked in npcm8xx_gpio_fw(). Add NULL check in npcm8xx_gpio_fw(), to handle kernel NULL pointer dereference error.
[]
null
5.5
null
null
null
CVE-2023-36201
An issue in JerryscriptProject jerryscript v.3.0.0 allows an attacker to obtain sensitive information via a crafted script to the arrays.
[ "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*" ]
null
7.5
null
null
null
GHSA-vrgf-94vf-3xxm
A memory corruption vulnerability exists when Windows Media Foundation improperly handles objects in memory, aka 'Media Foundation Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-1379, CVE-2020-1477, CVE-2020-1492, CVE-2020-1525, CVE-2020-1554.
[]
null
7.8
null
null
null
GHSA-9258-4rxh-qw5j
The Java implementations of AMF3 deserializers in WebORB for Java by Midnight Coders, version 5.1.1.0, derive class instances from java.io.Externalizable rather than the AMF3 specification's recommendation of flash.utils.IExternalizable. A remote attacker with the ability to spoof or control an RMI server connection may be able to send serialized Java objects that execute arbitrary code when deserialized.
[]
null
null
9.8
null
null
GHSA-frc4-4hp9-9xxf
A CWE-284: Improper Access Control vulnerability exists in all versions of the Modicon M580, Modicon M340, Modicon Quantum, and Modicon Premium which could cause denial of service or potential code execution by overwriting configuration settings of the controller over Modbus.
[]
null
null
null
null
null
CVE-2024-20377
A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface. This vulnerability is due to the web-based management interface not properly validating user-supplied input. An attacker could exploit this vulnerability by by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
[ "cpe:2.3:a:cisco:firepower_management_center:7.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:firepower_management_center:7.0.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:firepower_management_center:7.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:firepower_management_center:7.0.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:firepower_management_center:7.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:firepower_management_center:7.0.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:firepower_management_center:7.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:firepower_management_center:7.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:firepower_management_center:7.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:firepower_management_center:7.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:firepower_management_center:7.0.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:firepower_management_center:7.0.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:firepower_management_center:7.0.6.3:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:firepower_management_center:7.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:firepower_management_center:7.1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:firepower_management_center:7.1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:firepower_management_center:7.1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:firepower_management_center:7.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:firepower_management_center:7.2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:firepower_management_center:7.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:firepower_management_center:7.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:firepower_management_center:7.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:firepower_management_center:7.2.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:firepower_management_center:7.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:firepower_management_center:7.2.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:firepower_management_center:7.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:firepower_management_center:7.2.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:firepower_management_center:7.2.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:firepower_management_center:7.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:firepower_management_center:7.2.7:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:firepower_management_center:7.2.8:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:firepower_management_center:7.2.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:firepower_management_center:7.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:firepower_management_center:7.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:firepower_management_center:7.3.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:firepower_management_center:7.3.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:firepower_management_center:7.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:firepower_management_center:7.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:firepower_management_center:7.4.1.1:*:*:*:*:*:*:*" ]
null
5.4
null
null
null
GHSA-354f-2r9x-7fwx
Format string vulnerability in Ekiga 2.0.3, and probably other versions, allows remote attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2007-1006.
[]
null
null
null
null
null
CVE-2025-35009
Microhard Bullet-LTE and IPn4Gii AT+MNNETSP Argument Injection
Products that incorporate the Microhard BulletLTE-NA2 and IPn4Gii-NA2 are vulnerable to a post-authentication command injection issue in the AT+MNNETSP command that can lead to privilege escalation. This is an instance of CWE-88, "Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')," and is estimated as a CVSS 7.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N). This issue has not been generally fixed at the time of this CVE record's first publishing.
[]
null
7.1
null
null
null
GHSA-fp3r-f4p3-9f7j
PDF-XChange Editor JB2 File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of JB2 files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-24261.
[]
null
null
3.3
null
null
GHSA-pgv5-rjwj-wrcc
Adobe Dimension versions 3.4.7 (and earlier) is affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[]
null
7.8
null
null
null
GHSA-5vw7-cmrg-f226
The WPvivid Backup for MainWP plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'id' parameter in all versions up to, and including, 0.9.32 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
[]
null
6.1
null
null
null
CVE-2025-27539
A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected application is vulnerable to SQL injection through the internally used 'VerifyUser' method. This could allow an unauthenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with "NT AUTHORITY\NetworkService" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on. (ZDI-CAN-25914)
[]
9.3
9.8
null
null
null
GHSA-w76q-396p-2mrw
A vulnerability was found in Yifang CMS up to 2.0.2 and classified as problematic. Affected by this issue is some unknown functionality of the component Article Management Module. The manipulation of the argument Default Value leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
[]
4.8
2.4
null
null
null
CVE-2018-12078
The mintToken function of a smart contract implementation for PolyAI (AI), a tradable Ethereum ERC20 token, has no period constraint, which allows the owner to increase the total supply of the digital assets arbitrarily so as to make profits, aka the "tradeTrap" issue.
[ "cpe:2.3:a:polyai_project:polyai:-:*:*:*:*:*:*:*" ]
null
null
7.5
5
null
GHSA-9p67-ppmf-hcm8
SQL injection vulnerability in A4Desk PHP Event Calendar allows remote attackers to execute arbitrary SQL commands via the eventid parameter to admin/index.php.
[]
null
null
null
null
null
RHSA-2002:150
Red Hat Security Advisory: apache security update for Stronghold
security flaw
[ "cpe:/a:redhat:rhel_stronghold:4" ]
null
null
null
null
null
GHSA-pmfm-mw3h-m9vc
Cross-site scripting (XSS) vulnerability in the events page in the System iNtrusion Analysis and Reporting Environment (SNARE) for Linux agent before 1.7.0 allows remote attackers to inject arbitrary web script or HTML via a logged shell command.
[]
null
null
null
null
null
CVE-2024-7262
Arbitrary Code Execution in WPS Office
Improper path validation in promecefpluginhost.exe in Kingsoft WPS Office version ranging from 12.2.0.13110 to 12.2.0.16412 (exclusive) on Windows allows an attacker to load an arbitrary Windows library. The vulnerability was found weaponized as a single-click exploit in the form of a deceptive spreadsheet document
[ "cpe:2.3:a:kingsoft:wps_office:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
9.3
null
null
null
null
GHSA-3747-gjc9-vvg6
phpThumb is vulnerable to Server-Side Request Forgery (SSRF)
The default configuration of phpThumb before 1.7.12 has a false value for the disable_debug option, which allows remote attackers to conduct Server-Side Request Forgery (SSRF) attacks via the src parameter.
[]
null
null
null
null
null
CVE-2004-0593
Sygate Enforcer 3.5MR1 and earlier passes broadcast traffic before authentication, which could allow remote attackers to bypass filtering rules.
[ "cpe:2.3:a:sygate_technologies:enforcer:*:*:*:*:*:*:*:*", "cpe:2.3:a:sygate_technologies:secure_enterprise:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:sygate_technologies:secure_enterprise:3.5:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
GHSA-3vwg-x7c5-rg6m
Tenda AC6 15.03.05.16_multi is vulnerable to Buffer Overflow in the sub_452A4 function.
[]
null
6.5
null
null
null
CVE-2020-19553
Cross Site Scripting (XSS) vlnerability exists in WUZHI CMS up to and including 4.1.0 in the config function in coreframe/app/attachment/libs/class/ckditor.class.php.
[ "cpe:2.3:a:wuzhicms:wuzhicms:*:*:*:*:*:*:*:*" ]
null
5.4
null
3.5
null
CVE-2025-7948
jshERP updatePwd password recovery
A vulnerability classified as problematic was found in jshERP up to 3.5. Affected by this vulnerability is an unknown functionality of the file /jshERP-boot/user/updatePwd. The manipulation leads to weak password recovery. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
[]
5.3
4.3
4.3
4
null
CVE-2024-37164
CVAT SSRF via custom cloud storage endpoints
Computer Vision Annotation Tool (CVAT) is an interactive video and image annotation tool for computer vision. CVAT allows users to supply custom endpoint URLs for cloud storages based on Amazon S3 and Azure Blob Storage. Starting in version 2.1.0 and prior to version 2.14.3, an attacker with a CVAT account can exploit this feature by specifying URLs whose host part is an intranet IP address or an internal domain name. By doing this, the attacker may be able to probe the network that the CVAT backend runs in for HTTP(S) servers. In addition, if there is a web server on this network that is sufficiently API-compatible with an Amazon S3 or Azure Blob Storage endpoint, and either allows anonymous access, or allows authentication with credentials that are known by the attacker, then the attacker may be able to create a cloud storage linked to this server. They may then be able to list files on the server; extract files from the server, if these files are of a type that CVAT supports reading from cloud storage (media data (such as images/videos/archives), importable annotations or datasets, task/project backups); and/or overwrite files on this server with exported annotations/datasets/backups. The exact capabilities of the attacker will depend on how the internal server is configured. Users should upgrade to CVAT 2.14.3 to receive a patch. In this release, the existing SSRF mitigation measures are applied to requests to cloud providers, with access to intranet IP addresses prohibited by default. Some workarounds are also available. One may use network security solutions such as virtual networks or firewalls to prohibit network access from the CVAT backend to unrelated servers on your internal network and/or require authentication for access to internal servers.
[ "cpe:2.3:a:cvat-ai:cvat:*:*:*:*:*:*:*:*" ]
null
7.1
null
null
null
GHSA-5hjq-7cm9-qxpp
win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 does not properly link driver objects, which allows local users to gain privileges via a crafted application that triggers linked-list corruption, aka "Win32k Cursor Linking Vulnerability."
[]
null
null
null
null
null
CVE-2012-0798
The self-enrolment functionality in Moodle 2.1.x before 2.1.4 and 2.2.x before 2.2.1 allows remote authenticated users to obtain the manager role by leveraging the teacher role.
[ "cpe:2.3:a:moodle:moodle:2.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.2.0:*:*:*:*:*:*:*" ]
null
null
null
5.5
null
CVE-2023-0999
SourceCodester Sales Tracker Management System cross-site request forgery
A vulnerability classified as problematic was found in SourceCodester Sales Tracker Management System 1.0. This vulnerability affects unknown code of the file admin/?page=user/list. The manipulation leads to cross-site request forgery. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-221734 is the identifier assigned to this vulnerability.
[ "cpe:2.3:a:sales_tracker_management_system_project:sales_tracker_management_system:1.0:*:*:*:*:*:*:*" ]
null
4.3
4.3
5
null
GHSA-3gcv-3vj4-42c9
Heap-based buffer overflow in the TIFF image converter in the graphics filters in Microsoft Office XP SP3, Office Converter Pack, and Works 9 allows remote attackers to execute arbitrary code via a crafted TIFF image in an Office document, aka "TIFF Image Converter Heap Overflow Vulnerability."
[]
null
null
null
null
null
CVE-2018-3890
An exploitable code execution vulnerability exists in the firmware update functionality of Yi Home Camera 27US 1.8.7.0D. A specially crafted file can cause a logic flaw and command injection, resulting in code execution. An attacker can insert an SD card to trigger this vulnerability.
[ "cpe:2.3:o:yitechnology:yi_home_camera_firmware:1.8.7.0d:*:*:*:*:*:*:*", "cpe:2.3:h:yitechnology:yi_home_camera:-:*:*:*:*:*:*:*" ]
null
null
7.6
null
null
GHSA-h2pc-5xwr-hqv8
Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.3, macOS Mojave 10.14.5, tvOS 12.3, Safari 12.1.1, iTunes for Windows 12.9.5, iCloud for Windows 7.12. Processing maliciously crafted web content may lead to arbitrary code execution.
[]
null
null
null
null
null
CVE-2022-46177
Discourse password reset link can lead to in account takeover if user changes to a new email
Discourse is an option source discussion platform. Prior to version 2.8.14 on the `stable` branch and version 3.0.0.beta16 on the `beta` and `tests-passed` branches, when a user requests for a password reset link email, then changes their primary email, the old reset email is still valid. When the old reset email is used to reset the password, the Discourse account's primary email would be re-linked to the old email. If the old email address is compromised or has transferred ownership, this leads to an account takeover. This is however mitigated by the SiteSetting `email_token_valid_hours` which is currently 48 hours. Users should upgrade to versions 2.8.14 or 3.0.0.beta15 to receive a patch. As a workaround, lower `email_token_valid_hours ` as needed.
[ "cpe:2.3:a:discourse:discourse:*:*:*:*:stable:*:*:*", "cpe:2.3:a:discourse:discourse:1.1.0:beta1:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.1.0:beta2:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.1.0:beta3:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.1.0:beta4:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.1.0:beta5:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.1.0:beta6:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.1.0:beta6b:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.1.0:beta7:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.1.0:beta8:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.2.0:beta1:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.2.0:beta2:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.2.0:beta3:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.2.0:beta4:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.2.0:beta5:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.2.0:beta6:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.2.0:beta7:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.2.0:beta8:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.2.0:beta9:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.3.0:beta1:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.3.0:beta10:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.3.0:beta11:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.3.0:beta2:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.3.0:beta3:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.3.0:beta4:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.3.0:beta5:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.3.0:beta6:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.3.0:beta7:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.3.0:beta8:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.3.0:beta9:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.4.0:beta1:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.4.0:beta10:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.4.0:beta11:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.4.0:beta12:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.4.0:beta2:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.4.0:beta3:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.4.0:beta4:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.4.0:beta5:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.4.0:beta6:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.4.0:beta7:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.4.0:beta8:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.4.0:beta9:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.5.0:beta1:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.5.0:beta10:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.5.0:beta11:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.5.0:beta12:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.5.0:beta13:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.5.0:beta13b:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.5.0:beta14:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.5.0:beta2:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.5.0:beta3:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.5.0:beta4:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.5.0:beta5:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.5.0:beta6:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.5.0:beta7:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.5.0:beta8:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.5.0:beta9:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.6.0:beta1:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.6.0:beta10:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.6.0:beta11:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.6.0:beta12:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.6.0:beta2:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.6.0:beta3:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.6.0:beta4:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.6.0:beta5:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.6.0:beta6:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.6.0:beta7:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.6.0:beta8:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.6.0:beta9:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.7.0:beta1:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.7.0:beta10:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.7.0:beta11:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.7.0:beta2:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.7.0:beta3:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.7.0:beta4:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.7.0:beta5:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.7.0:beta6:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.7.0:beta7:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.7.0:beta8:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.7.0:beta9:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.8.0:beta1:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.8.0:beta10:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.8.0:beta11:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.8.0:beta12:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.8.0:beta13:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.8.0:beta2:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.8.0:beta3:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.8.0:beta4:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.8.0:beta5:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.8.0:beta6:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.8.0:beta7:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.8.0:beta8:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.8.0:beta9:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.9.0:beta1:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.9.0:beta10:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.9.0:beta11:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.9.0:beta12:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.9.0:beta13:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.9.0:beta14:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.9.0:beta15:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.9.0:beta16:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.9.0:beta17:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.9.0:beta2:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.9.0:beta3:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.9.0:beta4:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.9.0:beta5:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.9.0:beta6:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.9.0:beta7:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.9.0:beta8:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.9.0:beta9:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.0.0:beta1:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.0.0:beta10:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.0.0:beta2:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.0.0:beta3:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.0.0:beta4:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.0.0:beta5:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.0.0:beta6:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.0.0:beta7:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.0.0:beta8:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.0.0:beta9:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.1.0:beta1:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.1.0:beta2:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.1.0:beta3:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.1.0:beta4:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.1.0:beta5:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.1.0:beta6:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.2.0:beta1:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.2.0:beta10:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.2.0:beta2:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.2.0:beta3:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.2.0:beta4:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.2.0:beta5:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.2.0:beta6:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.2.0:beta7:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.2.0:beta8:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.2.0:beta9:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.3.0:beta1:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.3.0:beta10:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.3.0:beta11:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.3.0:beta2:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.3.0:beta3:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.3.0:beta4:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.3.0:beta5:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.3.0:beta6:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.3.0:beta7:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.3.0:beta8:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.3.0:beta9:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.4.0:beta1:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.4.0:beta10:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.4.0:beta11:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.4.0:beta2:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.4.0:beta3:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.4.0:beta4:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.4.0:beta5:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.4.0:beta6:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.4.0:beta7:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.4.0:beta8:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.4.0:beta9:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.5.0:beta1:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.5.0:beta2:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.5.0:beta3:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.5.0:beta4:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.5.0:beta5:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.5.0:beta6:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.5.0:beta7:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.6.0:beta1:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.6.0:beta2:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.6.0:beta3:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.6.0:beta4:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.6.0:beta5:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.6.0:beta6:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.7.0:beta1:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.7.0:beta2:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.7.0:beta3:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.7.0:beta4:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.7.0:beta5:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.7.0:beta6:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.7.0:beta7:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.7.0:beta8:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.7.0:beta9:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.8.0:beta1:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.8.0:beta10:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.8.0:beta11:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.8.0:beta2:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.8.0:beta3:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.8.0:beta4:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.8.0:beta5:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.8.0:beta6:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.8.0:beta7:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.8.0:beta8:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.8.0:beta9:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.9.0:beta1:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.9.0:beta10:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.9.0:beta11:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.9.0:beta12:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.9.0:beta13:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.9.0:beta14:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.9.0:beta2:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.9.0:beta3:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.9.0:beta4:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.9.0:beta5:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.9.0:beta6:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.9.0:beta7:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.9.0:beta8:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.9.0:beta9:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:3.0.0:beta15:*:*:beta:*:*:*" ]
null
5.7
null
null
null
CVE-2023-31095
WordPress Integration for Contact Form 7 HubSpot Plugin <= 1.2.8 is vulnerable to Open Redirection
URL Redirection to Untrusted Site ('Open Redirect') vulnerability in CRM Perks Integration for HubSpot and Contact Form 7, WPForms, Elementor, Ninja Forms.This issue affects Integration for HubSpot and Contact Form 7, WPForms, Elementor, Ninja Forms: from n/a through 1.2.8.
[ "cpe:2.3:a:crmperks:database_for_contact_form_7\\,_wpforms\\,_elementor_forms:*:*:*:*:*:*:*:*" ]
null
4.7
null
null
null
GHSA-gx7h-6fr6-j29h
MariaDB Server 10.4 through 10.5.*, 10.6 through 10.6.*, 10.7 through 10.11.*, and 11.0 through 11.0.* can sometimes crash with an empty backtrace log. This may be related to make_aggr_tables_info and optimize_stage2.
[]
null
4.9
null
null
null
GHSA-mv5m-hv8v-8wh5
Windows Kernel Information Disclosure Vulnerability
[]
null
5.5
null
null
null
GHSA-6crm-v898-7xx4
In power management service, there is a missing permission check. This could lead to set up power management service with no additional execution privileges needed.
[]
null
7.8
null
null
null
RHSA-2024:6687
Red Hat Security Advisory: OpenShift Container Platform 4.16.13 bug fix and security update
openshift/builder: Path traversal allows command injection in privileged BuildContainer using docker build strategy jose-go: improper handling of highly compressed data openshift-controller-manager: Elevated Build Pods Can Lead to Node Compromise in OpenShift
[ "cpe:/a:redhat:openshift:4.16::el9" ]
null
9.9
null
null
null
CVE-2015-2058
c2s/c2s.c in Jabber Open Source Server 2.3.2 and earlier truncates data without ensuring it remains valid UTF-8, which allows remote authenticated users to read system memory or possibly have other unspecified impact via a crafted JID.
[ "cpe:2.3:a:jabberd2:jabberd2:*:*:*:*:*:*:*:*" ]
null
null
null
6.5
null
CVE-2025-43573
Acrobat Reader | Use After Free (CWE-416)
Acrobat Reader versions 24.001.30235, 20.005.30763, 25.001.20521 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[]
null
7.8
null
null
null
GHSA-v8j7-gw8h-m2j4
A MongoDB server under specific conditions running on Linux with TLS and CRL revocation status checking enabled, fails to check the revocation status of the intermediate certificates in the peer's certificate chain. In cases of MONGODB-X509, which is not enabled by default, this may lead to improper authentication. This issue may also affect intra-cluster authentication. This issue affects MongoDB Server v5.0 versions prior to 5.0.31, MongoDB Server v6.0 versions prior to 6.0.20, MongoDB Server v7.0 versions prior to 7.0.16 and MongoDB Server v8.0 versions prior to 8.0.4. Required Configuration : MongoDB Server must be running on Linux Operating Systems and CRL revocation status checking must be enabled
[]
null
8.1
null
null
null
CVE-2016-5131
Use-after-free vulnerability in libxml2 through 2.9.4, as used in Google Chrome before 52.0.2743.82, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the XPointer range-to function.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" ]
null
null
8.8
6.8
null
CVE-2020-2212
Jenkins GitHub Coverage Reporter Plugin 1.8 and earlier stores secrets unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system or read permissions on the system configuration.
[ "cpe:2.3:a:jenkins:github_coverage_reporter:*:*:*:*:*:jenkins:*:*" ]
null
4.3
null
4
null
CVE-2019-14787
The Tribulant Newsletters plugin before 4.6.19 for WordPress allows XSS via the wp-admin/admin-ajax.php?action=newsletters_load_new_editor contentarea parameter.
[ "cpe:2.3:a:tribulant:newsletters:*:*:*:*:*:wordpress:*:*" ]
null
5.4
null
3.5
null
CVE-2016-5748
External Entity Processing (XXE) vulnerability in the "risk score" application of NetIQ Access Manager 4.1 before 4.1.2 Hot Fix 1 and 4.2 before 4.2.2 could be used to disclose the content of local files to logged-in users.
[ "cpe:2.3:a:netiq:access_manager:4.1:*:*:*:*:*:*:*", "cpe:2.3:a:netiq:access_manager:4.1:sp1:*:*:*:*:*:*", "cpe:2.3:a:netiq:access_manager:4.1:sp2:*:*:*:*:*:*", "cpe:2.3:a:netiq:access_manager:4.2:*:*:*:*:*:*:*", "cpe:2.3:a:netiq:access_manager:4.2:sp1:*:*:*:*:*:*" ]
null
null
5.5
2.1
null
GHSA-9j92-f5cx-hxq6
Kaspersky AntiVirus Engine 6.0.1.411 for Windows and 5.5-10 for Linux allows remote attackers to cause a denial of service (CPU consumption) via a crafted UPX compressed file with a negative offset, which triggers an infinite loop during decompression.
[]
null
null
null
null
null
CVE-2008-4160
Unspecified vulnerability in the UFS module in Sun Solaris 8 through 10 and OpenSolaris allows local users to cause a denial of service (NULL pointer dereference and kernel panic) via unknown vectors related to the Solaris Access Control List (ACL) implementation.
[ "cpe:2.3:o:sun:opensolaris:snv_01:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_02:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_03:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_04:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_05:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_06:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_07:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_08:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_09:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_10:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_11:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_12:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_13:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_14:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_15:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_16:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_17:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_18:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_19:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_20:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_21:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_23:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_24:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_25:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_26:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_27:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_28:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_29:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_30:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_31:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_32:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_33:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_34:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_35:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_36:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_37:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_38:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_39:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_41:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_42:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_43:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_44:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_45:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_46:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_47:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_48:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_49:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_50:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_51:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_52:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_53:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_54:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_55:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_56:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_57:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_58:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_59:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_60:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_61:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_62:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_63:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_64:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_65:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_66:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_67:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_68:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_69:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_70:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_71:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_72:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_73:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_74:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_75:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_76:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_77:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_78:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_79:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_81:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_82:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_83:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_84:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_85:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_86:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_87:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:solaris:8:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:solaris:9:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:solaris:10:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_01:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_02:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_03:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_04:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_05:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_06:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_07:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_08:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_09:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_10:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_11:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_12:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_13:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_14:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_15:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_16:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_17:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_18:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_19:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_20:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_21:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_22:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_23:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_24:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_25:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_26:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_27:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_28:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_29:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_30:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_31:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_32:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_33:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_34:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_35:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_36:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_37:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_38:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_39:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_40:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_41:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_42:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_43:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_44:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_45:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_46:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_47:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_48:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_49:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_50:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_51:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_52:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_53:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_54:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_55:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_56:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_57:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_58:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_59:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_60:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_61:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_62:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_63:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_64:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_65:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_66:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_67:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_68:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_69:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_70:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_71:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_72:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_73:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_74:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_75:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_76:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_77:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_78:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_79:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_80:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_81:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_82:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_83:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_84:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_85:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_86:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_87:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:solaris:8:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:solaris:9:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:solaris:10:*:sparc:*:*:*:*:*" ]
null
null
null
4.7
null
GHSA-488w-xmwq-qcpr
JFinalOA before v2025.01.01 was discovered to contain a SQL injection vulnerability via the component validRoleKey?sysRole.key.
[]
null
9.8
null
null
null
CVE-2020-2048
PAN-OS: System proxy passwords may be logged in clear text while viewing system state
An information exposure through log file vulnerability exists where the password for the configured system proxy server for a PAN-OS appliance may be displayed in cleartext when using the CLI in Palo Alto Networks PAN-OS software. This issue impacts: PAN-OS 8.1 versions earlier than PAN-OS 8.1.17; PAN-OS 9.0 versions earlier than PAN-OS 9.0.11; PAN-OS 9.1 versions earlier than PAN-OS 9.1.2.
[ "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*" ]
null
3.3
null
null
null
GHSA-jcrg-2j89-2gj6
DIAEnergie Version 1.7.5 and prior is vulnerable to a reflected cross-site scripting attack through error pages that are returned by “.NET Request.QueryString”.
[]
null
null
null
null
null
CVE-2022-26762
A memory corruption issue was addressed with improved memory handling. This issue is fixed in macOS Monterey 12.4, iOS 15.5 and iPadOS 15.5. A malicious application may be able to execute arbitrary code with system privileges.
[ "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*" ]
null
7.8
null
null
null
CVE-2024-57966
libarchiveplugin.cpp in KDE ark before 24.12.0 can extract to an absolute path from an archive.
[]
null
5
null
null
null
CVE-2021-28411
An issue was discovered in getRememberedSerializedIdentity function in CookieRememberMeManager class in lerry903 RuoYi version 3.4.0, allows remote attackers to escalate privileges.
[ "cpe:2.3:a:ruoyi:ruoyi:3.4.0:*:*:*:*:*:*:*" ]
null
9.8
null
null
null
GHSA-j6v9-29xf-j8q4
A vulnerability in the locally significant certificate (LSC) provisioning feature of Cisco Catalyst 9800 Series Wireless Controllers that are running Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a memory leak that could lead to a denial of service (DoS) condition. The vulnerability is due to incorrect processing of certain public key infrastructure (PKI) packets. An attacker could exploit this vulnerability by sending crafted Secure Sockets Layer (SSL) packets to an affected device. A successful exploit could cause an affected device to continuously consume memory, which could result in a memory allocation failure that leads to a crash and causes a DoS condition.
[]
null
8.6
null
null
null
CVE-2015-9370
Invoices Add-on for iThemes Exchange before 1.4.0 for WordPress has XSS via add_query_arg() and remove_query_arg().
[ "cpe:2.3:a:ithemes:invoices:*:*:*:*:*:wordpress:*:*" ]
null
null
6.1
4.3
null
GHSA-c8mx-c96m-rh89
IBM QRadar 7.3.0 to 7.3.3 Patch 2 could allow a local user to gain escalated privileges due to weak file permissions. IBM X-ForceID: 175846.
[]
null
7.8
null
null
null
CVE-2010-1180
Safari on Apple iPhone OS 3.1.3 for iPod touch allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long exception string in a throw statement, possibly a related issue to CVE-2009-1514.
[ "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.1.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.1.3:-:ipodtouch:*:*:*:*:*" ]
null
null
null
9.3
null
CVE-2017-11430
Multiple SAML libraries may allow authentication bypass via incorrect XML canonicalization and DOM traversal
OmniAuth OmnitAuth-SAML 1.9.0 and earlier may incorrectly utilize the results of XML DOM traversal and canonicalization APIs in such a way that an attacker may be able to manipulate the SAML data without invalidating the cryptographic signature, allowing the attack to potentially bypass authentication to SAML service providers.
[ "cpe:2.3:a:omniauth:omniauth_saml:*:*:*:*:*:*:*:*" ]
null
null
7.7
null
null
GHSA-82r4-fhr7-r9f8
Attacker might be able to execute malicious Perl code in the Template toolkit, by having the admin installing an unverified 3th party package
[]
null
8.8
null
null
null
GHSA-78x6-2j48-rwjh
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Rimon Habib BP Member Type Manager allows Reflected XSS.This issue affects BP Member Type Manager: from n/a through 1.01.
[]
null
7.1
null
null
null
GHSA-pf5c-8gw5-qm72
Multiple unspecified vulnerabilities in Nokia Series 40 3rd edition devices allow remote attackers to execute arbitrary code via unknown vectors, probably related to MIDP privilege escalation and persistent MIDlets, aka "ISSUES 3-10." NOTE: as of 20080807, the only disclosure is a vague pre-advisory with no actionable information. However, because it is from a company led by a well-known researcher, it is being assigned a CVE identifier for tracking purposes.
[]
null
null
null
null
null
CVE-2025-46541
WordPress WP-reCAPTCHA-bp <= 4.1 - Cross Site Scripting (XSS) Vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in elrata_ WP-reCAPTCHA-bp allows Stored XSS. This issue affects WP-reCAPTCHA-bp: from n/a through 4.1.
[]
null
5.9
null
null
null
RHSA-2020:5238
Red Hat Security Advisory: thunderbird security update
Mozilla: Variable time processing of cross-origin images during drawImage calls Mozilla: Parsing mismatches could confuse and bypass security sanitizer for chrome privileged code Mozilla: Fullscreen could be enabled without displaying the security UI Mozilla: XSS through paste (manual and clipboard API) Mozilla: Requests intercepted through ServiceWorkers lacked MIME type restrictions Mozilla: Use-after-free in WebRequestService Mozilla: Potential use-after-free in uses of nsTArray Mozilla: DoH did not filter IPv4 mapped IP Addresses Mozilla: Software keyboards may have remembered typed passwords Mozilla: Memory safety bugs fixed in Firefox 83 and Firefox ESR 78.5
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
8.8
6.1
null
null
GHSA-38m8-5gfc-663g
Enhavo Cross-site Scripting vulnerability
A cross-site scripting (XSS) vulnerability in the New/Edit Article module of Enhavo CMS v0.13.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Create Tag text field.
[]
null
null
null
null
null
CVE-2000-0472
Buffer overflow in innd 2.2.2 allows remote attackers to execute arbitrary commands via a cancel request containing a long message ID.
[ "cpe:2.3:a:isc:inn:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:isc:inn:2.1:*:*:*:*:*:*:*", "cpe:2.3:a:isc:inn:2.2:*:*:*:*:*:*:*", "cpe:2.3:a:isc:inn:2.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:isc:inn:2.2.2:*:*:*:*:*:*:*" ]
null
null
null
3.6
null
CVE-2022-30685
AEM Reflected XSS Arbitrary code execution
Adobe Experience Manager versions 6.5.13.0 (and earlier) is affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser. Exploitation of this issue requires low-privilege access to AEM.
[ "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:experience_manager:-:*:*:*:cloud_service:*:*:*" ]
null
5.4
null
null
null
GHSA-5hjx-5c2m-4387
Cross-site scripting (XSS) vulnerability in search.php in Entrans before 0.3.3 allows remote attackers to inject arbitrary web script or HTML via the query parameter.
[]
null
null
null
null
null
GHSA-45h9-3hm7-rxv2
Vulnerability in the Oracle Common Applications Calendar component of Oracle E-Business Suite (subcomponent: Applications Calendar). Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6 and 12.2.7. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Common Applications Calendar. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Common Applications Calendar accessible data. CVSS 3.0 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).
[]
null
null
5.3
null
null
GHSA-3q8j-9w3h-v6p5
software/apt-lib.pl in Webmin before 1.997 lacks HTML escaping for a UI command.
[]
null
9.8
null
null
null
GHSA-mppv-79ch-vw6q
Apache Tomcat vulnerable to information leak
A regression in the fix for bug 66512 in Apache Tomcat 11.0.0-M5, 10.1.8, 9.0.74 and 8.5.88 meant that, if a response did not include any HTTP headers no AJP SEND_HEADERS message would be sent for the response which in turn meant that at least one AJP proxy (mod_proxy_ajp) would use the response headers from the previous request leading to an information leak.
[]
null
7.5
null
null
null
GHSA-jqjf-6p78-286m
Multiple cross-site scripting (XSS) vulnerabilities in Graphite before 0.9.11 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.
[]
null
null
null
null
null
CVE-2022-4928
icplayer presenter.js AddonText_Selection_create cross site scripting
A vulnerability was found in icplayer up to 0.819. It has been declared as problematic. Affected by this vulnerability is the function AddonText_Selection_create of the file addons/Text_Selection/src/presenter.js. The manipulation leads to cross site scripting. The attack can be launched remotely. Upgrading to version 0.820 is able to address this issue. The identifier of the patch is 2223628e6db1df73f6d633d2c0422d995990f0a3. It is recommended to upgrade the affected component. The identifier VDB-222289 was assigned to this vulnerability.
[ "cpe:2.3:a:learnetic:icplayer:*:*:*:*:*:*:*:*" ]
null
3.5
3.5
4
https://github.com/icplayer/icplayer/commit/2223628e6db1df73f6d633d2c0422d995990f0a3
GHSA-xmvj-jc33-3vmf
Under certain conditions, SAP Innovation management - version 2.0, allows an attacker to access information which could lead to information gathering for further exploits and attacks.
[]
null
7.5
null
null
null
CVE-2025-30763
WordPress EO4WP <= 1.0.8.4 - Cross Site Scripting (XSS) Vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Olaf Lederer EO4WP allows Stored XSS. This issue affects EO4WP: from n/a through 1.0.8.4.
[]
null
6.5
null
null
null
CVE-2021-22006
The vCenter Server contains a reverse proxy bypass vulnerability due to the way the endpoints handle the URI. A malicious actor with network access to port 443 on vCenter Server may exploit this issue to access restricted endpoints.
[ "cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:6.7:-:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:7.0:-:*:*:*:*:*:*" ]
null
7.5
null
5
null
GHSA-cr7c-5w66-wh22
The Embed Peertube Playlist WordPress plugin before 1.10 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
[]
null
5.4
null
null
null
CVE-2024-25270
An issue in Mirapolis LMS 4.6.XX allows authenticated users to exploit an Insecure Direct Object Reference (IDOR) vulnerability by manipulating the ID parameter and increment STEP parameter, leading to the exposure of sensitive user data.
[ "cpe:2.3:a:mirapolis:lms:*:*:*:*:*:*:*:*" ]
null
4.3
null
null
null
CVE-2019-15706
An improper neutralization of input during web page generation in the SSL VPN portal of FortiProxy version 2.0.0, version 1.2.9 and below and FortiOS version 6.2.1 and below, version 6.0.8 and below, version 5.6.12 may allow a remote authenticated attacker to perform a stored cross site scripting attack (XSS).
[ "cpe:2.3:o:fortinet:fortios:6.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortios:6.2.0:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortios:6.0.8:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortios:6.0.7:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortios:6.0.6:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortios:6.0.5:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortios:6.0.4:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortios:6.0.3:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortios:6.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortios:6.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortios:6.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortios:5.6.12:*:*:*:*:*:*:*" ]
null
4
null
null
null
CVE-2021-45664
NETGEAR R7000 devices before 1.0.11.126 are affected by stored XSS.
[ "cpe:2.3:o:netgear:r7000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r7000:-:*:*:*:*:*:*:*" ]
null
5.6
null
null
null
GHSA-9pr2-6qr7-7436
The Jetpack Scan team identified a Cross-Site Request Forgery vulnerability in the Patreon WordPress plugin before 1.7.0, allowing attackers to make a logged in user overwrite or create arbitrary user metadata on the victim’s account once visited. If exploited, this bug can be used to overwrite the “wp_capabilities” meta, which contains the affected user account’s roles and privileges. Doing this would essentially lock them out of the site, blocking them from accessing paid content.
[]
null
null
null
null
null
GHSA-x392-w24h-vmr2
In wlan driver, there is a possible missing permission check. This could lead to local information disclosure.
[]
null
5.5
null
null
null
CVE-2022-27176
Incomplete filtering of special elements vulnerability exists in RevoWorks SCVX using 'File Sanitization Library' 1.043 and prior versions, RevoWorks Browser 2.2.67 and prior versions (when using 'File Sanitization Option'), and RevoWorks Desktop 2.1.84 and prior versions (when using 'File Sanitization Option'), which may allow an attacker to execute a malicious macro by having a user to download, import, and open a specially crafted file in the local environment.
[ "cpe:2.3:a:jscom:revoworks_browser:*:*:*:*:*:*:*:*", "cpe:2.3:a:jscom:revoworks_desktop:*:*:*:*:*:*:*:*", "cpe:2.3:a:jscom:revoworks_scvx:*:*:*:*:*:*:*:*" ]
null
7.8
null
6.8
null
CVE-2018-20662
In Poppler 0.72.0, PDFDoc::setup in PDFDoc.cc allows attackers to cause a denial-of-service (application crash caused by Object.h SIGABRT, because of a wrong return value from PDFDoc::setup) by crafting a PDF file in which an xref data structure is mishandled during extractPDFSubtype processing.
[ "cpe:2.3:a:freedesktop:poppler:0.72.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*" ]
null
6.5
null
4.3
null
ICSA-22-123-01
Yokogawa CENTUM and ProSafe-RS
A local attacker could tamper with files generated by the graphic builder, which may allow arbitrary programs to be executed on a computer that has installed standard operation and monitoring function (HIS).CVE-2022-27188 has been assigned to this vulnerability. A CVSS v3 base score of 6.1 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H). Improper authentication of the communication protocol provided by the Automation Design (AD) server allows an attacker to use the functions provided by the AD server. This may lead to leakage or tampering of data managed by the AD server.CVE-2022-26034 has been assigned to this vulnerability. A CVSS v3 base score of 6.4 has been calculated; the CVSS vector string is (AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L). The AD suite version management function is subjected to malformed packets, which the functions provided by the AD server may stop.CVE-2019-0203 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). The AD suite version management function is subjected to malformed packets, which the functions provided by the AD server may stop.CVE-2018-11782 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H). The AD suite version management function is subjected to malformed packets, which the functions provided by the AD server may stop.CVE-2015-0248 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
[]
null
null
5.3
null
null
GHSA-qrch-6rw3-5j2h
Cisco Unified Customer Voice Portal (CVP) Software before 9.0.1 ES 11 allows remote attackers to read arbitrary files via a Resource Manager (1) HTTP or (2) HTTPS request containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue, aka Bug ID CSCub38366.
[]
null
null
null
null
null
GHSA-v46f-6x32-qw44
In Dreamer CMS before 4.0.1, the backend attachment management office has an Arbitrary File Download vulnerability.
[]
null
7.5
null
null
null
GHSA-7358-vfr4-6m85
A stack buffer overflow flaw was found in the way 389-ds-base 1.3.6.x before 1.3.6.13, 1.3.7.x before 1.3.7.9, 1.4.x before 1.4.0.5 handled certain LDAP search filters. A remote, unauthenticated attacker could potentially use this flaw to make ns-slapd crash via a specially crafted LDAP request, thus resulting in denial of service.
[]
null
null
7.5
null
null
CVE-2012-2336
sapi/cgi/cgi_main.c in PHP before 5.3.13 and 5.4.x before 5.4.3, when configured as a CGI script (aka php-cgi), does not properly handle query strings that lack an = (equals sign) character, which allows remote attackers to cause a denial of service (resource consumption) by placing command-line options in the query string, related to lack of skipping a certain php_getopt for the 'T' case. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-1823.
[ "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:2.0b10:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:3.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:3.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:3.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:3.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:3.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:3.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:3.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:3.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:3.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:3.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:3.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:3.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:3.0.13:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:3.0.14:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:3.0.15:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:3.0.16:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:3.0.17:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:3.0.18:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.0:beta_4_patch1:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.0:beta4:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.3.6:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.3.7:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.3.8:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.3.9:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.3.10:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.3.11:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.4.5:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.4.6:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.4.7:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.4.8:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.4.9:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.0.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.0.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.0.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.0.0:beta4:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.0.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.0.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.0.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.2.7:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.2.8:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.2.9:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.2.10:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.2.11:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.2.12:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.2.13:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.2.14:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.2.15:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.2.16:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.2.17:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.3.6:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.3.7:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.3.8:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.3.9:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.3.10:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.3.11:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.4.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.4.2:*:*:*:*:*:*:*" ]
null
null
null
5
null
CVE-2007-0357
Directory traversal vulnerability in the AVM IGD CTRL Service in Fritz!DSL 02.02.29 allows remote attackers to read arbitrary files via ..%5C (URL-encoded dot dot backslash) sequences in a URI requested from the AR7 webserver.
[ "cpe:2.3:h:fritzdsl:fritzdsl:02.02.29:*:*:*:*:*:*:*" ]
null
null
null
5
null
CVE-2013-0860
The ff_er_frame_end function in libavcodec/error_resilience.c in FFmpeg before 1.0.4 and 1.1.x before 1.1.1 does not properly verify that a frame is fully initialized, which allows remote attackers to trigger a NULL pointer dereference via crafted picture data.
[ "cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.3:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.4.5:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.4.6:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.4.7:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.4.8:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.4.9:pre1:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.5:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.5.4.5:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.5.4.6:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.6:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.6.3:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.7:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.7.2:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.7.3:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.7.4:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.7.5:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.7.6:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.7.7:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.7.8:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.7.9:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.7.11:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.7.12:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.8.0:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.8.2:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.8.5:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.8.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.8.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.8.6:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.8.7:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.8.8:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.8.10:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.8.11:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.9:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.9.1:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.10:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.10.3:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.10.4:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.11:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:1.1:*:*:*:*:*:*:*" ]
null
null
null
4.3
null