id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
189k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
patch_commit_url
stringlengths
36
232
CVE-2003-0037
Buffer overflows in noffle news server 1.0.1 and earlier allow remote attackers to cause a denial of service (segmentation fault) and possibly execute arbitrary code.
[ "cpe:2.3:a:noffle:noffle:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
GHSA-3mgj-ppp2-8gvj
In the Linux kernel, the following vulnerability has been resolved:wifi: ath6kl: remove WARN on bad firmware inputIf the firmware gives bad input, that's nothing to do with the driver's stack at this point etc., so the WARN_ON() doesn't add any value. Additionally, this is one of the top syzbot reports now. Just print a message, and as an added bonus, print the sizes too.
[]
null
null
null
null
null
GHSA-mjqg-8q9p-p7qh
Vulnerability in LAT/Telnet Gateway (lattelnet) on Ultrix 4.1 and 4.2 allows attackers to gain root privileges.
[]
null
null
null
null
null
GHSA-f546-v666-559x
Craft CMS Cross-site Scripting vulnerability
Craft CMS 4.2.0.1 is affected by Cross Site Scripting (XSS) in the file src/web/assets/cp/src/js/BaseElementSelectInput.js and in specific on the line `label: elementInfo.label`.
[]
null
5.4
null
null
null
CVE-2011-3058
Google Chrome before 18.0.1025.142 does not properly handle the EUC-JP encoding system, which might allow remote attackers to conduct cross-site scripting (XSS) attacks via unspecified vectors.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
GHSA-gj96-2265-wv5x
A CWE-248: Uncaught Exception vulnerability exists in Modicon M580, Modicon BMENOC 0311, and Modicon BMENOC 0321, which could cause a Denial of Service attack on the PLC when sending specific data on the REST API of the controller/communication module.
[]
null
null
null
null
null
cisco-sa-20181003-prime-id
Cisco Prime Infrastructure Information Disclosure Vulnerability
A vulnerability in the server backup function of Cisco Prime Infrastructure could allow an authenticated, remote attacker to view sensitive information. The vulnerability is due to the transmission of sensitive information as part of a GET request. An attacker could exploit this vulnerability by sending a GET request to a vulnerable device. A successful exploit could allow the attacker to view sensitive information. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-prime-id ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-prime-id"]
[]
null
null
4.3
null
null
CVE-2016-9179
lynx: It was found that Lynx doesn't parse the authority component of the URL correctly when the host name part ends with '?', and could instead be tricked into connecting to a different host.
[ "cpe:2.3:a:lynx:lynx:*:*:*:*:*:*:*:*" ]
null
null
7.5
5
null
GHSA-gr59-j2cc-29g3
In the Linux kernel, the following vulnerability has been resolved:Revert "wifi: mac80211: fix memory leak in ieee80211_if_add()"This reverts commit 13e5afd3d773c6fc6ca2b89027befaaaa1ea7293.ieee80211_if_free() is already called from free_netdev(ndev) because ndev->priv_destructor == ieee80211_if_freesyzbot reported:general protection fault, probably for non-canonical address 0xdffffc0000000004: 0000 [#1] PREEMPT SMP KASAN KASAN: null-ptr-deref in range [0x0000000000000020-0x0000000000000027] CPU: 0 PID: 10041 Comm: syz-executor.0 Not tainted 6.2.0-rc2-syzkaller-00388-g55b98837e37d #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 RIP: 0010:pcpu_get_page_chunk mm/percpu.c:262 [inline] RIP: 0010:pcpu_chunk_addr_search mm/percpu.c:1619 [inline] RIP: 0010:free_percpu mm/percpu.c:2271 [inline] RIP: 0010:free_percpu+0x186/0x10f0 mm/percpu.c:2254 Code: 80 3c 02 00 0f 85 f5 0e 00 00 48 8b 3b 48 01 ef e8 cf b3 0b 00 48 ba 00 00 00 00 00 fc ff df 48 8d 78 20 48 89 f9 48 c1 e9 03 <80> 3c 11 00 0f 85 3b 0e 00 00 48 8b 58 20 48 b8 00 00 00 00 00 fc RSP: 0018:ffffc90004ba7068 EFLAGS: 00010002 RAX: 0000000000000000 RBX: ffff88823ffe2b80 RCX: 0000000000000004 RDX: dffffc0000000000 RSI: ffffffff81c1f4e7 RDI: 0000000000000020 RBP: ffffe8fffe8fc220 R08: 0000000000000005 R09: 0000000000000000 R10: 0000000000000000 R11: 1ffffffff2179ab2 R12: ffff8880b983d000 R13: 0000000000000003 R14: 0000607f450fc220 R15: ffff88823ffe2988 FS: 00007fcb349de700(0000) GS:ffff8880b9800000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000001b32220000 CR3: 000000004914f000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: <TASK> netdev_run_todo+0x6bf/0x1100 net/core/dev.c:10352 ieee80211_register_hw+0x2663/0x4040 net/mac80211/main.c:1411 mac80211_hwsim_new_radio+0x2537/0x4d80 drivers/net/wireless/mac80211_hwsim.c:4583 hwsim_new_radio_nl+0xa09/0x10f0 drivers/net/wireless/mac80211_hwsim.c:5176 genl_family_rcv_msg_doit.isra.0+0x1e6/0x2d0 net/netlink/genetlink.c:968 genl_family_rcv_msg net/netlink/genetlink.c:1048 [inline] genl_rcv_msg+0x4ff/0x7e0 net/netlink/genetlink.c:1065 netlink_rcv_skb+0x165/0x440 net/netlink/af_netlink.c:2564 genl_rcv+0x28/0x40 net/netlink/genetlink.c:1076 netlink_unicast_kernel net/netlink/af_netlink.c:1330 [inline] netlink_unicast+0x547/0x7f0 net/netlink/af_netlink.c:1356 netlink_sendmsg+0x91b/0xe10 net/netlink/af_netlink.c:1932 sock_sendmsg_nosec net/socket.c:714 [inline] sock_sendmsg+0xd3/0x120 net/socket.c:734 ____sys_sendmsg+0x712/0x8c0 net/socket.c:2476 ___sys_sendmsg+0x110/0x1b0 net/socket.c:2530 __sys_sendmsg+0xf7/0x1c0 net/socket.c:2559 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x39/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x63/0xcd
[]
null
5.5
null
null
null
CVE-2021-25390
Intent redirection vulnerability in PhotoTable prior to SMR MAY-2021 Release 1 allows attackers to execute privileged action.
[ "cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*" ]
null
4
null
null
null
CVE-2018-1000223
soundtouch version up to and including 2.0.0 contains a Buffer Overflow vulnerability in SoundStretch/WavFile.cpp:WavInFile::readHeaderBlock() that can result in arbitrary code execution. This attack appear to be exploitable via victim must open maliocius file in soundstretch utility.
[ "cpe:2.3:a:surina:soundtouch:*:*:*:*:*:*:*:*" ]
null
null
8.8
6.8
null
GHSA-xxmg-3gv9-85h2
A possible use-after-free and double-free in c-ares lib version 1.16.0 if ares_destroy() is called prior to ares_getaddrinfo() completing. This flaw possibly allows an attacker to crash the service that uses c-ares lib. The highest threat from this vulnerability is to this service availability.
[]
null
3.3
null
null
null
CVE-2015-8335
Huawei VCN500 with software before V100R002C00SPC201 logs passwords in cleartext, which allows remote authenticated users to obtain sensitive information by triggering log generation and then reading the log.
[ "cpe:2.3:a:huawei:vcn500:v100r002c00spc200:*:*:*:*:*:*:*", "cpe:2.3:a:huawei:vcn500:v100r002c00spc200b010:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:vcn500:-:*:*:*:*:*:*:*" ]
null
null
6.5
4
null
GHSA-w772-rr97-rmmm
Microsoft Internet Explorer 5.01 through 7 allows remote attackers to execute arbitrary code via a crafted website using Javascript that creates, modifies, deletes, and accesses document objects using the tags property, which triggers heap corruption, related to uninitialized or deleted objects, a different issue than CVE-2007-3902 and CVE-2007-3903, and a variant of "Uninitialized Memory Corruption Vulnerability."
[]
null
null
null
null
null
CVE-2020-10727
A flaw was found in ActiveMQ Artemis management API from version 2.7.0 up until 2.12.0, where a user inadvertently stores passwords in plaintext in the Artemis shadow file (etc/artemis-users.properties file) when executing the `resetUsers` operation. A local attacker can use this flaw to read the contents of the Artemis shadow file.
[ "cpe:2.3:a:apache:activemq_artemis:*:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*" ]
null
5.5
null
2.1
null
CVE-2022-24673
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Canon imageCLASS MF644Cdw 10.02 printers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the implementation of the SLP protocol. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-15845.
[ "cpe:2.3:o:canon:d1620_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:canon:d1620:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:d1650_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:canon:d1650:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:d1520_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:canon:d1520:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:d1550_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:canon:d1550:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:mf1127c_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:canon:mf1127c:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:mf1238_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:canon:mf1238:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:mf1238_ii_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:canon:mf1238_ii:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:mf1643i_ii_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:canon:mf1643i_ii:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:mf1643if_ii_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:canon:mf1643if_ii:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:mf414dw_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:canon:mf414dw:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:mf416dw_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:canon:mf416dw:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:mf419dw_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:canon:mf419dw:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:mf515dw_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:canon:mf515dw:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:mf424dw_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:canon:mf424dw:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:mf426dw_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:canon:mf426dw:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:mf429dw_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:canon:mf429dw:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:mf525dw_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:canon:mf525dw:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:mf445dw_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:canon:mf445dw:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:mf448dw_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:canon:mf448dw:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:mf449dw_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:canon:mf449dw:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:mf543dw_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:canon:mf543dw:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:mf451dw_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:canon:mf451dw:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:mf452dw_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:canon:mf452dw:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:mf453dw_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:canon:mf453dw:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:mf455dw_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:canon:mf455dw:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:mf6160dw_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:canon:mf6160dw:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:mf6180dw_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:canon:mf6180dw:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:mf624cdw_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:canon:mf624cdw:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:mf628cdw_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:canon:mf628cdw:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:mf632cdw_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:canon:mf632cdw:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:mf634cdw_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:canon:mf634cdw:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:mf641cw_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:canon:mf641cw:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:mf642cdw_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:canon:mf642cdw:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:mf644cdw_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:canon:mf644cdw:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:mf726cdw_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:canon:mf726cdw:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:mf729cdw_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:canon:mf729cdw:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:mf731cdw_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:canon:mf731cdw:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:mf733cdw_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:canon:mf733cdw:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:mf735cdw_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:canon:mf735cdw:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:mf741cdw_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:canon:mf741cdw:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:mf743cdw_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:canon:mf743cdw:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:mf745cdw_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:canon:mf745cdw:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:mf746cdw_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:canon:mf746cdw:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:mf810cdn_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:canon:mf810cdn:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:mf820cdn_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:canon:mf820cdn:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:mf8280cw_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:canon:mf8280cw:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:mf8580cdw_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:canon:mf8580cdw:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:lbp1127c_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:canon:lbp1127c:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:lbp1238_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:canon:lbp1238:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:lbp1238_ii_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:canon:lbp1238_ii:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:lbp214dw_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:canon:lbp214dw:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:lbp215dw_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:canon:lbp215dw:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:lbp226dw_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:canon:lbp226dw:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:lbp227dw_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:canon:lbp227dw:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:lbp228dw_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:canon:lbp228dw:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:lbp236dw_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:canon:lbp236dw:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:lbp237dw_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:canon:lbp237dw:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:lbp251dw_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:canon:lbp251dw:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:lbp253dw_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:canon:lbp253dw:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:lbp612cdw_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:canon:lbp612cdw:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:lbp622cdw_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:canon:lbp622cdw:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:lbp623cdw_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:canon:lbp623cdw:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:lbp654cdw_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:canon:lbp654cdw:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:lbp664cdw_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:canon:lbp664cdw:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:ir1435i_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:canon:ir1435i:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:1435if_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:canon:1435if:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:1435p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:canon:1435p:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:1435i\\+_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:canon:1435i\\+:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:1435if\\+_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:canon:1435if\\+:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:1435p\\+_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:canon:1435p\\+:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:ir1643i_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:canon:ir1643i:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:ir1643if_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:canon:ir1643if:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:wg7240_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:canon:wg7240:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:wg7250_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:canon:wg7250:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:wg7250f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:canon:wg7250f:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:wg7250z_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:canon:wg7250z:-:*:*:*:*:*:*:*" ]
null
null
8.8
null
null
CVE-2008-4062
Multiple unspecified vulnerabilities in Mozilla Firefox before 2.0.0.17 and 3.x before 3.0.2, Thunderbird before 2.0.0.17, and SeaMonkey before 1.1.12 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to the JavaScript engine and (1) misinterpretation of the characteristics of Namespace and QName in jsxml.c, (2) misuse of signed integers in the nsEscapeCount function in nsEscape.cpp, and (3) interaction of JavaScript garbage collection with certain use of an NPObject in the nsNPObjWrapper::GetNewOrUsed function in nsJSNPRuntime.cpp.
[ "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*" ]
null
null
null
10
null
GHSA-xvxq-p298-r7fw
The CRM Plugin before 4.2.4 for Redmine allows XSS via crafted vCard data.
[]
null
6.1
null
null
null
CVE-2018-17861
A cross-site scripting (XSS) vulnerability in SAP J2EE Engine/7.01/Portal/EPP allows remote attackers to inject arbitrary web script via the wsdlLib parameter to /ctcprotocol/Protocol. NOTE: This vulnerability only affects products that are no longer supported by the maintainer
[ "cpe:2.3:a:sap:j2ee_engine:7.01:*:*:*:*:*:*:*" ]
null
6.1
null
4.3
null
GHSA-27p4-mjh7-m9j7
Improper boundary check in Quram Agif library prior to SMR Apr-2022 Release 1 allows attackers to cause denial of service via crafted image file.
[]
null
5.5
null
null
null
GHSA-5fhg-238q-4c3r
A Path Traversal vulnerability in web component of Ivanti Avalanche before 6.4.3 allows a remote authenticated attacker to delete arbitrary files, thereby leading to Denial-of-Service.
[]
null
null
7.1
null
null
CVE-2005-2453
Cross-site scripting (XSS) vulnerability in NetworkActiv Web Server 1.0, 2.0.0.6, 3.0.1.1, and 3.5.13, and possibly other versions, allows remote attackers to inject arbitrary web script or HTML via the query string.
[ "cpe:2.3:a:networkactiv:networkactiv_web_server:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:networkactiv:networkactiv_web_server:2.0.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:networkactiv:networkactiv_web_server:3.0.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:networkactiv:networkactiv_web_server:3.5.13:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
CVE-2023-29815
mccms v2.6.3 is vulnerable to Cross Site Request Forgery (CSRF).
[ "cpe:2.3:a:chshcms:mccms:2.6.3:*:*:*:*:*:*:*" ]
null
8.8
null
null
null
GHSA-969v-mwp3-4mr3
Magento 2 Community Edition RCE Vulnerability
A remote code execution vulnerability exists in Magento Open Source prior to 1.9.4.2, and Magento Commerce prior to 1.14.4.2, Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2. An authenticated user with admin privileges to create sitemaps can execute arbitrary PHP code by creating a malicious sitemap file.
[]
null
null
7.2
null
null
GHSA-2cqh-cfpq-83ph
In the Linux kernel, the following vulnerability has been resolved:ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failedWe got follow bug_on when run fsstress with injecting IO fault: [130747.323114] kernel BUG at fs/ext4/extents_status.c:762! [130747.323117] Internal error: Oops - BUG: 0 [#1] SMP ...... [130747.334329] Call trace: [130747.334553] ext4_es_cache_extent+0x150/0x168 [ext4] [130747.334975] ext4_cache_extents+0x64/0xe8 [ext4] [130747.335368] ext4_find_extent+0x300/0x330 [ext4] [130747.335759] ext4_ext_map_blocks+0x74/0x1178 [ext4] [130747.336179] ext4_map_blocks+0x2f4/0x5f0 [ext4] [130747.336567] ext4_mpage_readpages+0x4a8/0x7a8 [ext4] [130747.336995] ext4_readpage+0x54/0x100 [ext4] [130747.337359] generic_file_buffered_read+0x410/0xae8 [130747.337767] generic_file_read_iter+0x114/0x190 [130747.338152] ext4_file_read_iter+0x5c/0x140 [ext4] [130747.338556] __vfs_read+0x11c/0x188 [130747.338851] vfs_read+0x94/0x150 [130747.339110] ksys_read+0x74/0xf0This patch's modification is according to Jan Kara's suggestion in: https://patchwork.ozlabs.org/project/linux-ext4/patch/[email protected]/ "I see. Now I understand your patch. Honestly, seeing how fragile is trying to fix extent tree after split has failed in the middle, I would probably go even further and make sure we fix the tree properly in case of ENOSPC and EDQUOT (those are easily user triggerable). Anything else indicates a HW problem or fs corruption so I'd rather leave the extent tree as is and don't try to fix it (which also means we will not create overlapping extents)."
[]
null
5.5
null
null
null
CVE-2018-8929
Improper restriction of communication channel to intended endpoints vulnerability in HTTP daemon in Synology SSL VPN Client before 1.2.4-0224 allows remote attackers to conduct man-in-the-middle attacks via a crafted payload.
[ "cpe:2.3:a:synology:ssl_vpn_client:*:*:*:*:*:*:*:*" ]
null
null
7.3
null
null
GHSA-87hv-wrhm-fv9f
Adobe Prelude versions 9.0 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to arbitrary code execution.
[]
null
null
null
null
null
CVE-2018-11557
YIBAN Easy class education platform 2.0 has XSS via the articlelist.php k parameter.
[ "cpe:2.3:a:yiban:easy_class_education_platform:2.0:*:*:*:*:*:*:*" ]
null
null
6.1
4.3
null
CVE-2014-7642
The Pegasus Airlines (aka com.wPegasusAirlines) application 0.84.13503.96707 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[ "cpe:2.3:a:pegasus_airlines_project:pegasus_airlines:0.84.13503.96707:*:*:*:*:android:*:*" ]
null
null
null
5.4
null
CVE-2019-20703
Certain NETGEAR devices are affected by command injection by an authenticated user. This affects D3600 before 1.0.0.76, D6000 before 1.0.0.76, and XR500 before 2.3.2.32.
[ "cpe:2.3:o:netgear:xr500_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:xr500:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:d3600_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:d3600:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:d6000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:d6000:-:*:*:*:*:*:*:*" ]
null
null
6.3
null
null
CVE-2019-0746
An information disclosure vulnerability exists when the scripting engine does not properly handle objects in memory in Microsoft Edge, aka 'Scripting Engine Information Disclosure Vulnerability'.
[ "cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:chakracore:-:*:*:*:*:*:*:*" ]
null
null
6.5
4.3
null
CVE-2023-36941
A cross-site scripting (XSS) vulnerability in PHPGurukul Online Fire Reporting System Using PHP and MySQL 1.2 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the team name, leader, and member fields.
[ "cpe:2.3:a:phpgurukul:online_fire_reporting_system:1.2:*:*:*:*:*:*:*" ]
null
6.1
null
null
null
CVE-2013-2313
Session fixation vulnerability in LOCKON EC-CUBE 2.11.0 through 2.12.3enP2 allows remote attackers to hijack web sessions via unspecified vectors.
[ "cpe:2.3:a:lockon:ec-cube:2.11.0:*:*:*:*:*:*:*", "cpe:2.3:a:lockon:ec-cube:2.11.1:*:*:*:*:*:*:*", "cpe:2.3:a:lockon:ec-cube:2.11.2:*:*:*:*:*:*:*", "cpe:2.3:a:lockon:ec-cube:2.11.3:*:*:*:*:*:*:*", "cpe:2.3:a:lockon:ec-cube:2.11.4:*:*:*:*:*:*:*", "cpe:2.3:a:lockon:ec-cube:2.11.5:*:*:*:*:*:*:*", "cpe:2.3:a:lockon:ec-cube:2.12.0:*:*:*:*:*:*:*", "cpe:2.3:a:lockon:ec-cube:2.12.1:*:*:*:*:*:*:*", "cpe:2.3:a:lockon:ec-cube:2.12.2:*:*:*:*:*:*:*", "cpe:2.3:a:lockon:ec-cube:2.12.3:*:*:*:*:*:*:*", "cpe:2.3:a:lockon:ec-cube:2.12.3en:*:*:*:*:*:*:*", "cpe:2.3:a:lockon:ec-cube:2.12.3enp1:*:*:*:*:*:*:*", "cpe:2.3:a:lockon:ec-cube:2.12.3enp2:*:*:*:*:*:*:*" ]
null
null
null
4
null
CVE-2020-0629
An elevation of privilege vulnerability exists in the way that the Windows Search Indexer handles objects in memory, aka 'Windows Search Indexer Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0613, CVE-2020-0614, CVE-2020-0623, CVE-2020-0625, CVE-2020-0626, CVE-2020-0627, CVE-2020-0628, CVE-2020-0630, CVE-2020-0631, CVE-2020-0632, CVE-2020-0633.
[ "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:itanium:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*" ]
null
7.8
null
4.6
null
GHSA-x78j-jjmg-frp2
Adobe Flash Player before 18.0.0.333 and 19.x through 21.x before 21.0.0.182 on Windows and OS X and before 11.2.202.577 on Linux, Adobe AIR before 21.0.0.176, Adobe AIR SDK before 21.0.0.176, and Adobe AIR SDK & Compiler before 21.0.0.176 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0960, CVE-2016-0961, CVE-2016-0986, CVE-2016-0989, CVE-2016-0992, CVE-2016-1002, and CVE-2016-1005.
[]
null
null
9.8
null
null
CVE-2023-36371
An issue in the GDKfree component of MonetDB Server v11.45.17 and v11.46.0 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
[ "cpe:2.3:a:monetdb:monetdb:11.45.17:*:*:*:*:*:*:*", "cpe:2.3:a:monetdb:monetdb:11.46.0:*:*:*:*:*:*:*" ]
null
7.5
null
null
null
CVE-2024-24742
Cross-Site Scripting (XSS) vulnerability in SAP CRM (WebClient UI)
SAP CRM WebClient UI - version S4FND 102, S4FND 103, S4FND 104, S4FND 105, S4FND 106, WEBCUIF 701, WEBCUIF 731, WEBCUIF 746, WEBCUIF 747, WEBCUIF 748, WEBCUIF 800, WEBCUIF 801, does not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability. An attacker with low privileges can cause limited impact to integrity of the application data after successful exploitation. There is no impact on confidentiality and availability.
[ "cpe:2.3:a:sap:crm_-_webclient_ui:s4fnd_102:*:*:*:*:*:*:*", "cpe:2.3:a:sap:crm_-_webclient_ui:s4fnd_103:*:*:*:*:*:*:*", "cpe:2.3:a:sap:crm_-_webclient_ui:s4fnd_104:*:*:*:*:*:*:*", "cpe:2.3:a:sap:crm_-_webclient_ui:s4fnd_105:*:*:*:*:*:*:*", "cpe:2.3:a:sap:crm_-_webclient_ui:s4fnd_106:*:*:*:*:*:*:*", "cpe:2.3:a:sap:crm_-_webclient_ui:webcuif_701:*:*:*:*:*:*:*", "cpe:2.3:a:sap:crm_-_webclient_ui:webcuif_731:*:*:*:*:*:*:*", "cpe:2.3:a:sap:crm_-_webclient_ui:webcuif_746:*:*:*:*:*:*:*", "cpe:2.3:a:sap:crm_-_webclient_ui:webcuif_747:*:*:*:*:*:*:*", "cpe:2.3:a:sap:crm_-_webclient_ui:webcuif_748:*:*:*:*:*:*:*", "cpe:2.3:a:sap:crm_-_webclient_ui:webcuif_800:*:*:*:*:*:*:*", "cpe:2.3:a:sap:crm_-_webclient_ui:webcuif_801:*:*:*:*:*:*:*" ]
null
4.1
null
null
null
CVE-2018-6183
BitDefender Total Security 2018 allows local users to gain privileges or cause a denial of service by impersonating all the pipes through a use of an "insecurely created named pipe". Ensures full access to Everyone users group.
[ "cpe:2.3:a:bitdefender:total_security:2018:*:*:*:*:*:*:*" ]
null
null
7.8
4.6
null
CVE-2021-27062
HEVC Video Extensions Remote Code Execution Vulnerability
HEVC Video Extensions Remote Code Execution Vulnerability
[ "cpe:2.3:a:microsoft:high_efficiency_video_coding:-:*:*:*:*:*:*:*" ]
null
7.8
null
null
null
CVE-2019-16288
On Tenda N301 wireless routers, a long string in the wifiSSID parameter of a goform/setWifi POST request causes the device to crash.
[ "cpe:2.3:o:tenda:n301_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tenda:n301:-:*:*:*:*:*:*:*" ]
null
7.5
null
7.8
null
GHSA-c9h9-h5gf-885r
Magento Open Source allows Uncontrolled Resource Consumption
Adobe Commerce versions 2.4.6-p3, 2.4.5-p5, 2.4.4-p6 and earlier are affected by an Uncontrolled Resource Consumption vulnerability that could lead to an application denial-of-service. A high-privileged attacker could leverage this vulnerability to exhaust system resources, causing the application to slow down or crash. Exploitation of this issue does not require user interaction.
[]
6.9
4.9
null
null
null
CVE-2024-44920
A cross-site scripting (XSS) vulnerability in the component admin_collect_news.php of SeaCMS v12.9 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the siteurl parameter.
[ "cpe:2.3:a:seacms:seacms:12.9:*:*:*:*:*:*:*" ]
null
6.1
null
null
null
CVE-2023-20813
In wlan service, there is a possible out of bounds read due to improper input validation. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07453549; Issue ID: ALPS07453549.
[ "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*" ]
null
4.4
null
null
null
GHSA-j38v-hx9g-qhgq
Directory traversal vulnerability in website.php in openEngine 1.8 Beta 2 and earlier allows remote attackers to list arbitrary directories and read arbitrary files via a .. (dot dot) in the template parameter.
[]
null
null
null
null
null
GHSA-q3q5-qvh5-cmw5
liufee CMS File Upload vulnerability
File Upload vulnerability in liufee CMS v.2.0.7.1 allows a remote attacker to execute arbitrary code via the image suffix function.
[]
null
9.8
null
null
null
CVE-2024-45505
Apache HertzBeat: Exists Native Deser RCE and file writing vulnerabilities
Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability in Apache HertzBeat (incubating). This vulnerability can only be exploited by authorized attackers. This issue affects Apache HertzBeat (incubating): before 1.6.1. Users are recommended to upgrade to version 1.6.1, which fixes the issue.
[ "cpe:2.3:a:apache:hertzbeat:-:*:*:*:*:*:*:*" ]
null
8.8
null
null
null
GHSA-x238-v9f9-93g8
Dell PowerProtect Data Manager Reporting, version(s) 19.16, 19.17, 19.18, contain(s) an Improper Neutralization of Special Elements Used in a Template Engine vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to information disclosure.
[]
null
2.3
null
null
null
GHSA-6qcm-9vg4-jxv8
kpac/script.cpp in KDE kio before 5.32 and kdelibs before 4.14.30 calls the PAC FindProxyForURL function with a full https URL (potentially including Basic Authentication credentials, a query string, or PATH_INFO), which allows remote attackers to obtain sensitive information via a crafted PAC file.
[]
null
null
5.5
null
null
GHSA-r97q-xhcv-9xx9
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: PS). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
[]
null
4.9
null
null
null
GHSA-2277-2f9f-59cc
Ingenico Telium 2 POS terminals have a buffer overflow via SOCKET_TASK in the NTPT3 protocol. This is fixed in Telium 2 SDK v9.32.03 patch N.
[]
null
6.8
null
null
null
CVE-2005-1048
SQL injection vulnerability in modules.php in PostNuke 0.760 RC3 allows remote attackers to execute arbitrary SQL statements via the sid parameter. NOTE: the vendor reports that they could not reproduce the issues for 760 RC3, or for .750.
[ "cpe:2.3:a:postnuke_software_foundation:postnuke:0.760_rc3:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2017-10249
Vulnerability in the PeopleSoft Enterprise PeopleTools component of Oracle PeopleSoft Products (subcomponent: Integration Broker). Supported versions that are affected are 8.54 and 8.55. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in PeopleSoft Enterprise PeopleTools, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise PeopleTools accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).
[ "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.54:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.55:*:*:*:*:*:*:*" ]
null
null
6.1
5.8
null
GHSA-884x-p7qm-gq3f
TinyXML2 through 10.0.0 has a reachable assertion for UINT_MAX/digit, that may lead to application exit, in tinyxml2.cpp XMLUtil::GetCharacterRef.
[]
null
6.5
null
null
null
GHSA-h4gh-3gv9-c4vm
An issue was discovered in PowerDNS Authoritative through 4.3.0 when --enable-experimental-gss-tsig is used. A remote, unauthenticated attacker might be able to cause a double-free, leading to a crash or possibly arbitrary code execution. by sending crafted queries with a GSS-TSIG signature.
[]
null
null
null
null
null
ICSA-25-014-03
Schneider Electric EcoStruxure
Schneider Electric is aware of a vulnerability in its EcoStruxure™ Power Monitoring Expert (PME) and EcoStruxure™ Power Operation (EPO) products. EcoStruxure™ Power Monitoring Expert (PME) is an on-premises software used to help power. critical and energy-intensive facilities maximize uptime and operational efficiency. EcoStruxure™ Power Operation (EPO) and EcoStruxure™ Power SCADA Operation (PSO) are on-premises software offers that provides a single platform to monitor and control medium and lower power systems. Failure to apply the remediations provided below could result in execution of malicious web code, or unintended software operation.
[]
null
5.4
null
null
null
GHSA-r4p9-pq2w-247v
Cross-site scripting (XSS) vulnerability in a-blog 1.51 and earlier allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
[]
null
null
null
null
null
CVE-2021-31259
The gf_isom_cenc_get_default_info_internal function in GPAC 1.0.1 allows attackers to cause a denial of service (NULL pointer dereference) via a crafted file in the MP4Box command.
[ "cpe:2.3:a:gpac:gpac:1.0.1:*:*:*:*:*:*:*" ]
null
5.5
null
4.3
null
GHSA-8whq-qmmg-8jxf
TmComm.sys 1.5.0.1052 in the Trend Micro Anti-Rootkit Common Module (RCM), with the VsapiNI.sys 3.320.0.1003 scan engine, as used in Trend Micro PC-cillin Internet Security 2007, Antivirus 2007, Anti-Spyware for SMB 3.2 SP1, Anti-Spyware for Consumer 3.5, Anti-Spyware for Enterprise 3.0 SP2, Client / Server / Messaging Security for SMB 3.5, Damage Cleanup Services 3.2, and possibly other products, assigns Everyone write permission for the \\.\TmComm DOS device interface, which allows local users to access privileged IOCTLs and execute arbitrary code or overwrite arbitrary memory in the kernel context.
[]
null
null
null
null
null
CVE-2014-2386
Multiple off-by-one errors in Icinga, possibly 1.10.2 and earlier, allow remote attackers to cause a denial of service (crash) via unspecified vectors to the (1) display_nav_table, (2) print_export_link, (3) page_num_selector, or (4) page_limit_selector function in cgi/cgiutils.c or (5) status_page_num_selector function in cgi/status.c, which triggers a stack-based buffer overflow.
[ "cpe:2.3:a:icinga:icinga:*:*:*:*:*:*:*:*", "cpe:2.3:a:icinga:icinga:1.10.0:*:*:*:*:*:*:*", "cpe:2.3:a:icinga:icinga:1.10.1:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*" ]
null
null
null
5
null
GHSA-r2hq-xr24-chr5
A stored cross-site scripting (XSS) vulnerability in the Admin panel in Enhancesoft osTicket v1.17.2 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Role Name parameter.
[]
null
4.8
null
null
null
GHSA-923r-gp72-rmm4
Memory corruption is possible when an attempt is made from userspace or console to write some haptics effects pattern to the haptics debugfs file.
[]
null
6.7
null
null
null
GHSA-289x-93wc-65xg
D-Link DCS-825L firmware version 1.08.01 and possibly prior versions contain an insecure implementation in the mydlink-watch-dog.sh script. The script monitors and respawns the `dcp` and `signalc` binaries without validating their integrity, origin, or permissions. An attacker with filesystem access (e.g., via UART or firmware modification) may replace these binaries to achieve persistent arbitrary code execution with root privileges. The issue stems from improper handling of executable trust and absence of integrity checks in the watchdog logic.
[]
null
7.3
null
null
null
GHSA-7mj3-xm28-cffc
The ASUS DSL-N17U modem with firmware 1.1.0.2 allows attackers to access the admin interface by changing the admin password without authentication via a POST request to Advanced_System_Content.asp with the uiViewTools_username=admin&uiViewTools_Password= and uiViewTools_PasswordConfirm= substrings.
[]
null
null
null
null
null
CVE-2025-7903
yangzongzhuan RuoYi Image Source ui layer
A vulnerability classified as problematic was found in yangzongzhuan RuoYi up to 4.8.1. Affected by this vulnerability is an unknown functionality of the component Image Source Handler. The manipulation leads to improper restriction of rendered ui layers. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
[]
5.3
4.3
4.3
4
null
CVE-2022-4473
Widget Shortcode <= 0.3.5 - Contributor+ Stored XSS
The Widget Shortcode WordPress plugin through 0.3.5 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins.
[ "cpe:2.3:a:widget_shortcode_project:widget_shortcode:*:*:*:*:*:wordpress:*:*" ]
null
5.4
null
null
null
CVE-2020-16593
A Null Pointer Dereference vulnerability exists in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.35, in scan_unit_for_symbols, as demonstrated in addr2line, that can cause a denial of service via a crafted file.
[ "cpe:2.3:a:gnu:binutils:2.35:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:solidfire_\\&_hci_management_node:-:*:*:*:*:*:*:*" ]
null
5.5
null
4.3
null
CVE-2007-5663
Adobe Reader and Acrobat 8.1.1 and earlier allows remote attackers to execute arbitrary code via a crafted PDF file that calls an insecure JavaScript method in the EScript.api plug-in. NOTE: this issue might be subsumed by CVE-2008-0655.
[ "cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*" ]
null
null
null
9.3
null
GHSA-h6fx-jmr6-xg2g
** UNSUPPORTED WHEN ASSIGNED ** In ARCHIBUS Web Central 21.3.3.815 (a version from 2014), XSS occurs in /archibus/dwr/call/plaincall/workflow.runWorkflowRule.dwr because the data received as input from clients is re-included within the HTTP response returned by the application without adequate validation. In this way, if HTML code or client-side executable code (e.g., Javascript) is entered as input, the expected execution flow could be altered. This is fixed in all recent versions, such as version 26. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
[]
null
6.1
null
null
null
CVE-2023-50920
An issue was discovered on GL.iNet devices before version 4.5.0. They assign the same session ID after each user reboot, allowing attackers to share session identifiers between different sessions and bypass authentication or access control measures. Attackers can impersonate legitimate users or perform unauthorized actions. This affects A1300 4.4.6, AX1800 4.4.6, AXT1800 4.4.6, MT3000 4.4.6, MT2500 4.4.6, MT6000 4.5.0, MT1300 4.3.7, MT300N-V2 4.3.7, AR750S 4.3.7, AR750 4.3.7, AR300M 4.3.7, and B1300 4.3.7.
[ "cpe:2.3:h:gl.inet:a1300:-:*:*:*:*:*:*:*", "cpe:2.3:h:gl.inet:ax1800:-:*:*:*:*:*:*:*", "cpe:2.3:h:gl.inet:axt1800:-:*:*:*:*:*:*:*", "cpe:2.3:h:gl.inet:mt3000:-:*:*:*:*:*:*:*", "cpe:2.3:h:gl.inet:mt2500:-:*:*:*:*:*:*:*", "cpe:2.3:h:gl.inet:mt6000:-:*:*:*:*:*:*:*", "cpe:2.3:h:gl.inet:mt1300:-:*:*:*:*:*:*:*", "cpe:2.3:h:gl.inet:mt300n_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:gl.inet:ar750s:-:*:*:*:*:*:*:*", "cpe:2.3:h:gl.inet:ar750:-:*:*:*:*:*:*:*", "cpe:2.3:h:gl.inet:ar300m:-:*:*:*:*:*:*:*", "cpe:2.3:h:gl.inet:b1300:-:*:*:*:*:*:*:*", "cpe:2.3:o:gl-inet:gl-ax1800_firmware:4.3.7:*:*:*:*:*:*:*", "cpe:2.3:o:gl-inet:gl-ax1800_firmware:4.4.6:*:*:*:*:*:*:*", "cpe:2.3:h:gl-inet:gl-ax1800:-:*:*:*:*:*:*:*", "cpe:2.3:o:gl-inet:gl-axt1800_firmware:4.3.7:*:*:*:*:*:*:*", "cpe:2.3:o:gl-inet:gl-axt1800_firmware:4.4.6:*:*:*:*:*:*:*", "cpe:2.3:h:gl-inet:gl-axt1800:-:*:*:*:*:*:*:*", "cpe:2.3:o:gl-inet:gl-mt3000_firmware:4.3.7:*:*:*:*:*:*:*", "cpe:2.3:o:gl-inet:gl-mt3000_firmware:4.4.6:*:*:*:*:*:*:*", "cpe:2.3:h:gl-inet:gl-mt3000:-:*:*:*:*:*:*:*", "cpe:2.3:o:gl-inet:gl-mt2500_firmware:4.3.7:*:*:*:*:*:*:*", "cpe:2.3:o:gl-inet:gl-mt2500_firmware:4.4.6:*:*:*:*:*:*:*", "cpe:2.3:h:gl-inet:gl-mt2500:-:*:*:*:*:*:*:*", "cpe:2.3:o:gl-inet:gl-mt6000_firmware:4.3.7:*:*:*:*:*:*:*", "cpe:2.3:o:gl-inet:gl-mt6000_firmware:4.4.6:*:*:*:*:*:*:*", "cpe:2.3:h:gl-inet:gl-mt6000:-:*:*:*:*:*:*:*", "cpe:2.3:o:gl-inet:gl-mt1300_firmware:4.3.7:*:*:*:*:*:*:*", "cpe:2.3:o:gl-inet:gl-mt1300_firmware:4.4.6:*:*:*:*:*:*:*", "cpe:2.3:h:gl-inet:gl-mt1300:-:*:*:*:*:*:*:*", "cpe:2.3:o:gl-inet:gl-mt300n-v2_firmware:4.3.7:*:*:*:*:*:*:*", "cpe:2.3:o:gl-inet:gl-mt300n-v2_firmware:4.4.6:*:*:*:*:*:*:*", "cpe:2.3:h:gl-inet:gl-mt300n-v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:gl-inet:gl-ar750s_firmware:4.3.7:*:*:*:*:*:*:*", "cpe:2.3:o:gl-inet:gl-ar750s_firmware:4.4.6:*:*:*:*:*:*:*", "cpe:2.3:h:gl-inet:gl-ar750s:-:*:*:*:*:*:*:*", "cpe:2.3:o:gl-inet:gl-ar750_firmware:4.3.7:*:*:*:*:*:*:*", "cpe:2.3:o:gl-inet:gl-ar750_firmware:4.4.6:*:*:*:*:*:*:*", "cpe:2.3:h:gl-inet:gl-ar750:-:*:*:*:*:*:*:*", "cpe:2.3:o:gl-inet:gl-ar300m_firmware:4.3.7:*:*:*:*:*:*:*", "cpe:2.3:o:gl-inet:gl-ar300m_firmware:4.4.6:*:*:*:*:*:*:*", "cpe:2.3:h:gl-inet:gl-ar300m:-:*:*:*:*:*:*:*", "cpe:2.3:o:gl-inet:gl-b1300_firmware:4.3.7:*:*:*:*:*:*:*", "cpe:2.3:o:gl-inet:gl-b1300_firmware:4.4.6:*:*:*:*:*:*:*", "cpe:2.3:h:gl-inet:gl-b1300:-:*:*:*:*:*:*:*", "cpe:2.3:o:gl-inet:gl-a1300_firmware:4.3.7:*:*:*:*:*:*:*", "cpe:2.3:o:gl-inet:gl-a1300_firmware:4.4.6:*:*:*:*:*:*:*", "cpe:2.3:h:gl-inet:gl-a1300:-:*:*:*:*:*:*:*" ]
null
5.5
null
null
null
CVE-2017-6910
The HTTP and WebSocket engine components in the server in Kaazing Gateway before 4.5.3 hotfix-1, Gateway - JMS Edition before 4.0.5 hotfix-15, 4.0.6 before hotfix-4, 4.0.7, 4.0.9 before hotfix-19, 4.4.x before 4.4.2 hotfix-1, 4.5.x before 4.5.3 hotfix-1, and Gateway Community and Enterprise Editions before 5.6.0 allow remote attackers to bypass intended access restrictions and obtain sensitive information via vectors related to HTTP request handling.
[ "cpe:2.3:a:kaazing:kaazing_gateway:*:*:*:*:*:*:*:*", "cpe:2.3:a:kaazing:kaazing_gateway:4.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:kaazing:kaazing_gateway:4.5.3:hotfix1:*:*:*:*:*:*", "cpe:2.3:a:kaazing:kaazing_gateway:*:hotfix1:*:*:jms:*:*:*", "cpe:2.3:a:kaazing:kaazing_gateway:*:*:*:*:jms:*:*:*", "cpe:2.3:a:kaazing:kaazing_gateway:4.0.5:*:*:*:jms:*:*:*", "cpe:2.3:a:kaazing:kaazing_gateway:4.0.6:*:*:*:jms:*:*:*", "cpe:2.3:a:kaazing:kaazing_gateway:4.0.6:hotfix2:*:*:jms:*:*:*", "cpe:2.3:a:kaazing:kaazing_gateway:4.0.7:*:*:*:jms:*:*:*", "cpe:2.3:a:kaazing:kaazing_gateway:4.4.2:hotfix1:*:*:jms:*:*:*", "cpe:2.3:a:kaazing:kaazing_gateway:4.5.3:hotfix1:*:*:jms:*:*:*", "cpe:2.3:a:tenefit:kaazing_websocket_gateway:*:*:*:*:community:*:*:*", "cpe:2.3:a:tenefit:kaazing_websocket_gateway:*:*:*:*:enterprise:*:*:*" ]
null
null
7.5
5
null
CVE-2018-19025
In JUUKO K-808, an attacker could specially craft a packet that encodes an arbitrary command, which could be executed on the K-808 (Firmware versions prior to numbers ending ...9A, ...9B, ...9C, etc.).
[ "cpe:2.3:o:juuko:k-808_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:juuko:k-808:-:*:*:*:*:*:*:*" ]
null
9.8
null
10
null
CVE-2014-2708
Multiple SQL injection vulnerabilities in graph_xport.php in Cacti 0.8.7g, 0.8.8b, and earlier allow remote attackers to execute arbitrary SQL commands via the (1) graph_start, (2) graph_end, (3) graph_height, (4) graph_width, (5) graph_nolegend, (6) print_source, (7) local_graph_id, or (8) rra_id parameter.
[ "cpe:2.3:a:cacti:cacti:0.8.8b:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2023-4814
A Privilege escalation vulnerability exists in Trellix Windows DLP endpoint for windows which can be abused to delete any file/folder for which the user does not have permission to.
[ "cpe:2.3:a:trellix:data_loss_prevention:11.10.100.17:*:*:*:*:*:*:*" ]
null
7.1
null
null
null
GHSA-p786-96f8-68ff
xscreensaver before 5.14 crashes during activation and leaves the screen unlocked when in Blank Only Mode and when DPMS is disabled, which allows local attackers to access resources without authentication.
[]
null
7.8
null
null
null
CVE-2025-22326
WordPress 5centsCDN – WordPress CDN Plugin plugin <= 24.8.16 - Reflected Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in 5centsCDN 5centsCDN allows Reflected XSS.This issue affects 5centsCDN: from n/a through 24.8.16.
[]
null
7.1
null
null
null
CVE-2025-9311
itsourcecode Apartment Management System addfair.php sql injection
A vulnerability was identified in itsourcecode Apartment Management System 1.0. Affected by this issue is some unknown functionality of the file /fair/addfair.php. The manipulation of the argument ID leads to sql injection. Remote exploitation of the attack is possible. The exploit is publicly available and might be used.
[]
6.9
7.3
7.3
7.5
null
GHSA-jc98-q59f-rmj3
Buffer overflow in dlogin 1.0a could allow local users to gain privileges via unknown attack vectors.
[]
null
null
null
null
null
GHSA-9qv7-h3f8-5wpx
Insecure Win32 memory objects in Endpoint Windows Agents in RSA NetWitness Platform before 12.2 allow local and admin Windows user accounts to modify the endpoint agent service configuration: to either disable it completely or run user-supplied code or commands, thereby bypassing tamper-protection features via ACL modification.
[]
null
6.7
null
null
null
GHSA-wjgq-vwg2-v722
The GoogleAuthUtil.getToken method in the Google Play services SDK before 2015 sets parameters in OAuth token requests upon finding a corresponding _opt_ parameter in the Bundle extras argument, which allows attackers to bypass an intended consent dialog and retrieve tokens for arbitrary OAuth scopes including the SID and LSID scopes, and consequently obtain access to a Google account, via a crafted application, as demonstrated by setting the has_permission=1 parameter value upon finding _opt_has_permission in that argument.
[]
null
null
null
null
null
GHSA-xm5w-7vqw-w9rq
Kofax Power PDF JPG File Parsing Use-After-Free Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Kofax Power PDF. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of JPG files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-20460.
[]
null
null
3.3
null
null
CVE-2017-11233
Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable memory corruption vulnerability in the image conversion engine when processing Enhanced Metafile Format (EMF) data related to block transfer of pixels. Successful exploitation could lead to arbitrary code execution.
[ "cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:reader:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*" ]
null
null
6.5
4.3
null
GHSA-prq9-w4j8-gg56
: Insufficient Session Expiration vulnerability in Progress Sitefinity allows : Session Fixation.This issue affects Sitefinity: from 4.0 through 14.4.8142, from 15.0.8200 through 15.0.8229, from 15.1.8300 through 15.1.8327, from 15.2.8400 through 15.2.8421.
[]
null
6.8
null
null
null
CVE-2022-22810
A CWE-307: Improper Restriction of Excessive Authentication Attempts vulnerability exists that could allow an attacker to manipulate the admin after numerous attempts at guessing credentials. Affected Product: spaceLYnk (V2.6.2 and prior), Wiser for KNX (formerly homeLYnk) (V2.6.2 and prior), fellerLYnk (V2.6.2 and prior)
[ "cpe:2.3:o:schneider-electric:spacelynk_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:spacelynk:-:*:*:*:*:*:*:*", "cpe:2.3:o:schneider-electric:wiser_for_knx_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:wiser_for_knx:-:*:*:*:*:*:*:*", "cpe:2.3:o:schneider-electric:fellerlynk_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:fellerlynk:-:*:*:*:*:*:*:*" ]
null
9.8
null
5
null
CVE-2013-1715
Multiple untrusted search path vulnerabilities in the (1) full installer and (2) stub installer in Mozilla Firefox before 23.0 on Windows allow local users to gain privileges via a Trojan horse DLL in the default downloads directory. NOTE: this issue exists because of an incomplete fix for CVE-2012-4206.
[ "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:19.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:19.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:19.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:20.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:20.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:21.0:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*" ]
null
null
null
6.9
null
GHSA-jv33-9pvf-mxwh
The Better WordPress Google XML Sitemaps WordPress plugin through 1.4.1 does not sanitise and escape its logs when outputting them in the admin dashboard, which could allow unauthenticated users to perform Stored Cross-Site Scripting attacks against admins
[]
null
6.1
null
null
null
CVE-2019-4741
IBM Content Navigator 3.0CD is vulnerable to Server Side Request Forgery (SSRF). This may allow an unauthenticated attacker to send unauthorized requests from the system, potentially leading to network enumeration or facilitating other attacks. IBM X-Force ID: 172815.
[ "cpe:2.3:a:ibm:content_navigator:3.0.0:*:*:*:continuous_delivery:*:*:*", "cpe:2.3:o:ibm:aix:-:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
null
5.3
null
null
CVE-2021-20265
A flaw was found in the way memory resources were freed in the unix_stream_recvmsg function in the Linux kernel when a signal was pending. This flaw allows an unprivileged local user to crash the system by exhausting available memory. The highest threat from this vulnerability is to system availability.
[ "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:tekelec_platform_distribution:*:*:*:*:*:*:*:*" ]
null
5.5
null
4.9
null
GHSA-w893-jhmx-r3gr
A cross-site scripting (XSS) vulnerability in the component /management/term of School Fees Management System v1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the tname parameter.
[]
null
5.4
null
null
null
GHSA-mxrc-xx6x-q2cc
On affected platforms running Arista EOS with mirroring to multiple destinations configured, an internal system error may trigger a kernel panic and cause system reload.
[]
null
5.9
null
null
null
CVE-2023-25001
A maliciously crafted SKP file in Autodesk Navisworks 2023 and 2022 be used to trigger use-after-free vulnerability. Exploitation of this vulnerability may lead to code execution.
[ "cpe:2.3:a:autodesk:navisworks:2022:*:*:*:*:*:*:*", "cpe:2.3:a:autodesk:navisworks:2023:*:*:*:*:*:*:*" ]
null
7.8
null
null
null
GHSA-7rgf-jq37-62rj
XSS & SQLi in HugeIT slideshow v1.0.4
[]
null
null
7.2
null
null
GHSA-jv79-99w2-fh63
SQL injection vulnerability in the JShop (com_jshop) component for Joomla! allows remote attackers to execute arbitrary SQL commands via the pid parameter in a product action to index.php.
[]
null
null
null
null
null
CVE-2025-47287
Tornado vulnerable to excessive logging caused by malformed multipart form data
Tornado is a Python web framework and asynchronous networking library. When Tornado's ``multipart/form-data`` parser encounters certain errors, it logs a warning but continues trying to parse the remainder of the data. This allows remote attackers to generate an extremely high volume of logs, constituting a DoS attack. This DoS is compounded by the fact that the logging subsystem is synchronous. All versions of Tornado prior to 6.5.0 are affected. The vulnerable parser is enabled by default. Upgrade to Tornado version 6.50 to receive a patch. As a workaround, risk can be mitigated by blocking `Content-Type: multipart/form-data` in a proxy.
[]
null
7.5
null
null
null
GHSA-4p5j-63r4-89jw
joyplus-cms 1.6.0 has admin_ajax.php?action=savexml&tab=vodplay CSRF.
[]
null
8.8
null
null
null
GHSA-827g-rqf3-jrp6
LuaExpat before 1.2.0 does not properly detect recursion during entity expansion, which allows remote attackers to cause a denial of service (memory and CPU consumption) via a crafted XML document containing a large number of nested entity references, a similar issue to CVE-2003-1564.
[]
null
null
null
null
null
GHSA-9vxm-4m9h-fv2h
The ImageRecycle pdf & image compression plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the optimizeAllOn function in all versions up to, and including, 3.1.13. This makes it possible for authenticated attackers, with subscriber-level access and above, to modify image optimization settings.
[]
null
4.3
null
null
null
GHSA-q745-cfqh-hcrw
phpThumb is vulnerable to Command Injection through its gif_outputAsJpeg function
gif_outputAsJpeg in phpThumb through 1.7.23 allows phpthumb.gif.php OS Command Injection via a crafted parameter value. This is fixed in 1.7.23-202506081709.
[]
null
4.9
null
null
null
CVE-2022-41424
Bento4 v1.6.0-639 was discovered to contain a memory leak via the AP4_SttsAtom::Create function in mp42hls.
[ "cpe:2.3:a:axiosys:bento4:1.6.0-639:*:*:*:*:*:*:*" ]
null
6.5
null
null
null
GHSA-7j8f-prmh-229c
A memory corruption issue was addressed with improved validation. This issue is fixed in iOS 14.4.1 and iPadOS 14.4.1, Safari 14.0.3 (v. 14610.4.3.1.7 and 15610.4.3.1.7), watchOS 7.3.2, macOS Big Sur 11.2.3. Processing maliciously crafted web content may lead to arbitrary code execution.
[]
null
8.8
null
null
null
CVE-2009-4179
Stack-based buffer overflow in ovalarm.exe in HP OpenView Network Node Manager (OV NNM) 7.01, 7.51, and 7.53 allows remote attackers to execute arbitrary code via a long HTTP Accept-Language header in an OVABverbose action.
[ "cpe:2.3:a:hp:openview_network_node_manager:7.0.1:*:hp_ux:*:*:*:*:*", "cpe:2.3:a:hp:openview_network_node_manager:7.0.1:*:linux:*:*:*:*:*", "cpe:2.3:a:hp:openview_network_node_manager:7.0.1:*:solaris:*:*:*:*:*", "cpe:2.3:a:hp:openview_network_node_manager:7.0.1:*:windows:*:*:*:*:*", "cpe:2.3:a:hp:openview_network_node_manager:7.51:-:hp-ux:*:*:*:*:*", "cpe:2.3:a:hp:openview_network_node_manager:7.51:-:linux:*:*:*:*:*", "cpe:2.3:a:hp:openview_network_node_manager:7.51:-:solaris:*:*:*:*:*", "cpe:2.3:a:hp:openview_network_node_manager:7.51:-:windows:*:*:*:*:*", "cpe:2.3:a:hp:openview_network_node_manager:7.53:-:hp-ux:*:*:*:*:*", "cpe:2.3:a:hp:openview_network_node_manager:7.53:-:linux:*:*:*:*:*", "cpe:2.3:a:hp:openview_network_node_manager:7.53:-:solaris:*:*:*:*:*", "cpe:2.3:a:hp:openview_network_node_manager:7.53:-:windows:*:*:*:*:*" ]
null
null
null
10
null