id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
189k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
patch_commit_url
stringlengths
36
232
GHSA-38mp-p2g2-47gf
In sortSimPhoneAccountsForEmergency of CreateConnectionProcessor.java, there is a possible prevention of access to emergency calling due to an unhandled exception. In rare instances, this could lead to local denial of service with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12Android ID: A-208267659
[]
null
null
null
null
null
CVE-2023-1909
PHPGurukul BP Monitoring Management System User Profile Update profile.php sql injection
A vulnerability, which was classified as critical, was found in PHPGurukul BP Monitoring Management System 1.0. Affected is an unknown function of the file profile.php of the component User Profile Update Handler. The manipulation of the argument name/mobno leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-225318 is the identifier assigned to this vulnerability.
[ "cpe:2.3:a:phpgurukul:bp_monitoring_management_system:1.0:*:*:*:*:*:*:*" ]
null
4.7
4.7
5.8
null
GHSA-422c-v5pr-46mh
GroupWise 5.5 and 6 running in live remote or smart caching mode allows remote attackers to read arbitrary users' mailboxes by extracting usernames and passwords from sniffed network traffic, as addressed by the "Padlock" fix.
[]
null
null
null
null
null
CVE-2020-24706
An issue was discovered in certain WSO2 products. The Try It tool allows Reflected XSS. This affects API Manager through 3.1.0, API Manager Analytics 2.5.0, IS as Key Manager through 5.10.0, Identity Server through 5.10.0, Identity Server Analytics through 5.6.0, and IoT Server 3.1.0.
[ "cpe:2.3:a:wso2:api_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:wso2:api_manager_analytics:2.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:wso2:identity_server:*:*:*:*:*:*:*:*", "cpe:2.3:a:wso2:identity_server_analytics:*:*:*:*:*:*:*:*", "cpe:2.3:a:wso2:identity_server_as_key_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:wso2:iot_server:3.1.0:*:*:*:*:*:*:*" ]
null
6.1
null
null
null
GHSA-2qmv-gpqm-6x56
Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.0-8.0.42, 8.4.0-8.4.5 and 9.0.0-9.3.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
[]
null
4.9
null
null
null
GHSA-qj32-xx7f-66p6
Unspecified vulnerability in Oracle 10 and 11 Express allows local users to affect availability via unknown vectors related to the Kernel.
[]
null
null
null
null
null
CVE-2007-4363
Multiple cross-site scripting (XSS) vulnerabilities in the nodereference module in Drupal Content Construction Kit (CCK) before 4.7.x-1.6, and 5.x before 5.x-1.6 ,allow remote attackers to inject arbitrary web script or HTML via nodereference fields, when using (1) the plain formatter or (2) the autocomplete text field widget without Views.module.
[ "cpe:2.3:a:drupal:content_construction_kit:4.7:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:content_construction_kit:5.2:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
CVE-2017-14719
Before version 4.8.2, WordPress was vulnerable to a directory traversal attack during unzip operations in the ZipArchive and PclZip components.
[ "cpe:2.3:a:wordpress:wordpress:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.1:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.2:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.3:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.4:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.5:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.6:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.7:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.7.2:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.7.3:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.7.4:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.7.5:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.7.6:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.7.7:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.7.8:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.7.9:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.7.10:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.7.11:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.7.12:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.7.13:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.7.14:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.7.15:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.7.16:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.7.17:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.7.18:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.7.19:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.7.20:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.7.21:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.7.22:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.8:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.8.2:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.8.3:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.8.4:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.8.5:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.8.6:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.8.7:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.8.8:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.8.9:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.8.10:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.8.11:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.8.12:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.8.13:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.8.14:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.8.15:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.8.16:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.8.17:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.8.18:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.8.19:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.8.20:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.8.21:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.8.22:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.9:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.9.1:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.9.2:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.9.3:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.9.4:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.9.5:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.9.6:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.9.7:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.9.8:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.9.9:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.9.10:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.9.11:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.9.12:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.9.13:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.9.14:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.9.15:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.9.16:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.9.17:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.9.18:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.9.19:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.9.20:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:4.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:4.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:4.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:4.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:4.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:4.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:4.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:4.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:4.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:4.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:4.0.13:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:4.0.14:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:4.0.15:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:4.0.16:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:4.0.17:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:4.0.18:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:4.0.19:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:4.1:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:4.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:4.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:4.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:4.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:4.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:4.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:4.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:4.1.8:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:4.1.9:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:4.1.10:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:4.1.11:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:4.1.12:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:4.1.13:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:4.1.14:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:4.1.15:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:4.1.16:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:4.1.17:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:4.1.18:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:4.1.19:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:4.2:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:4.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:4.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:4.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:4.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:4.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:4.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:4.2.7:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:4.2.8:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:4.2.9:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:4.2.10:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:4.2.11:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:4.2.12:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:4.2.13:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:4.2.14:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:4.2.15:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:4.2.16:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:4.3:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:4.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:4.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:4.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:4.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:4.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:4.3.6:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:4.3.7:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:4.3.8:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:4.3.9:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:4.3.10:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:4.3.11:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:4.3.12:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:4.4:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:4.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:4.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:4.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:4.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:4.4.5:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:4.4.6:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:4.4.7:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:4.4.8:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:4.4.9:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:4.4.10:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:4.4.11:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:4.5:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:4.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:4.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:4.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:4.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:4.5.5:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:4.5.6:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:4.5.7:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:4.5.8:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:4.5.9:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:4.5.10:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:4.6:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:4.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:4.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:4.6.3:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:4.6.4:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:4.6.5:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:4.6.6:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:4.6.7:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:4.7:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:4.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:4.7.2:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:4.7.3:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:4.7.4:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:4.7.5:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:4.8:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:4.8.1:*:*:*:*:*:*:*" ]
null
null
7.5
5
null
RHSA-2024:6464
Red Hat Security Advisory: glib2 security update
glib2: Signal subscription vulnerabilities
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
3.8
null
null
null
CVE-2024-30433
WordPress MultiVendorX Marketplace plugin <= 4.1.3 - Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in MultiVendorX WC Marketplace allows Stored XSS.This issue affects WC Marketplace: from n/a through 4.1.3.
[]
null
6.5
null
null
null
CVE-2008-3165
Directory traversal vulnerability in rss.php in fuzzylime (cms) 3.01a and earlier, when magic_quotes_gpc is disabled, allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the p parameter, as demonstrated using content.php, a different vector than CVE-2007-4805.
[ "cpe:2.3:a:fuzzylime:fuzzylime_cms:*:a:*:*:*:*:*:*" ]
null
null
null
6.8
null
RHSA-2009:1140
Red Hat Security Advisory: ruby security update
fetchmail/mutt/evolution/...: APOP password disclosure vulnerability ruby: Incorrect checks for validity of X.509 certificates ruby: DoS vulnerability in BigDecimal
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
null
RHSA-2004:048
Red Hat Security Advisory: : Updated PWLib packages fix protocol security issues
security flaw
[ "cpe:/o:redhat:linux:9" ]
null
null
null
null
null
CVE-2010-2731
Unspecified vulnerability in Microsoft Internet Information Services (IIS) 5.1 on Windows XP SP3, when directory-based Basic Authentication is enabled, allows remote attackers to bypass intended access restrictions and execute ASP files via a crafted request, aka "Directory Authentication Bypass Vulnerability."
[ "cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*" ]
null
null
null
6.8
null
CVE-2005-0425
Unknown vulnerability in IBM Websphere Application Server 5.0, 5.1, and 6.0 when running on Windows, allows remote attackers to obtain the source code for Java Server Pages (.jsp) via a crafted URL that causes the page to be processed by the file serving servlet instead of the JSP engine.
[ "cpe:2.3:a:ibm:websphere_application_server:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:5.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:6.0:*:*:*:*:*:*:*" ]
null
null
null
5
null
GHSA-366v-v593-vgfm
Multiple unspecified vulnerabilities in Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, might allow attackers to execute arbitrary code via unknown vectors.
[]
null
null
null
null
null
CVE-2023-27079
Command Injection vulnerability found in Tenda G103 v.1.0.05 allows an attacker to obtain sensitive information via a crafted package
[ "cpe:2.3:o:tenda:g103_firmware:1.0.05:*:*:*:*:*:*:*", "cpe:2.3:h:tenda:g103:-:*:*:*:*:*:*:*" ]
null
7.5
null
null
null
CVE-2024-21645
pyLoad Log Injection
pyLoad is the free and open-source Download Manager written in pure Python. A log injection vulnerability was identified in `pyload` allowing any unauthenticated actor to inject arbitrary messages into the logs gathered by `pyload`. Forged or otherwise, corrupted log files can be used to cover an attacker’s tracks or even to implicate another party in the commission of a malicious act. This vulnerability has been patched in version 0.5.0b3.dev77.
[ "cpe:2.3:a:pyload:pyload:*:*:*:*:*:*:*:*", "cpe:2.3:a:pyload:pyload:0.5.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:pyload:pyload:0.5.0:beta2:*:*:*:*:*:*" ]
null
5.3
null
null
null
GHSA-7w47-ph55-4fr4
SAP ASE 16.0 SP02 PL03 and prior versions allow attackers who own SourceDB and TargetDB databases to elevate privileges to sa (system administrator) via dbcc import_sproc SQL injection.
[]
null
null
9.8
null
null
CVE-2006-0282
Unspecified vulnerability in Oracle Database Server 8.1.7.4, 9.0.1.5, 9.0.1.5 FIPS, 9.2.0.7, and 10.1.0.5, Application Server 1.0.2.2, 9.0.4.2, and 10.1.2.0.2, and Collaboration Suite Release 2, version 9.0.4.2 (Oracle9i) has unspecified impact and attack vectors, as identified by Oracle Vuln# DBC01 in the Protocol Support component.
[ "cpe:2.3:a:oracle:application_server:1.0.2.2:r1:*:*:*:*:*:*", "cpe:2.3:a:oracle:application_server:9.0.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:application_server:10.1.2.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:application_server:10.1.2.0.2:r2:*:*:*:*:*:*", "cpe:2.3:a:oracle:collaboration_suite:9.0.4.2:r2:*:*:*:*:*:*", "cpe:2.3:a:oracle:database_server:8.1.7.4:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:database_server:9.0.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:database_server:9.0.1.5:*:fips:*:*:*:*:*", "cpe:2.3:a:oracle:database_server:9.2.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:database_server:10.1.0.5:*:*:*:*:*:*:*" ]
null
null
null
10
null
CVE-2019-2186
In GetMBheader of combined_decode.cpp, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-7.1.1 Android-7.1.2 Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-136175447
[ "cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*" ]
null
8.8
null
9.3
null
GHSA-4hg5-3p5m-xg4p
Unspecified vulnerability in the Oracle Spatial component in Oracle Database 9.0.1.5 FIPS+, 9.2.0.8, 9.2.0.8DV, and 10.1.0.5 has unknown impact and remote attack vectors, aka DB06.
[]
null
null
null
null
null
GHSA-9qhf-jjcc-w776
The affected application lacks proper validation of user-supplied data when parsing font files (e.g., FNT). This could lead to an out-of-bounds read. An attacker could leverage this vulnerability to potentially execute arbitrary code in the context of the current process.
[]
null
7.8
null
null
null
GHSA-f6fm-8rjv-g8ww
In venc, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08810810 / ALPS08805789; Issue ID: MSV-1502.
[]
null
9.8
null
null
null
GHSA-8h8h-m4q6-r9hq
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in WP Lab WP-Lister Lite for eBay allows Reflected XSS.This issue affects WP-Lister Lite for eBay: from n/a through 3.6.3.
[]
null
7.1
null
null
null
GHSA-rh9r-xpf4-gh2j
The zone determination function in Microsoft Internet Explorer 5.5 and 6.0 allows remote attackers to run scripts in the Local Computer zone by embedding the script in a cookie, aka the "Cookie-based Script Execution" vulnerability.
[]
null
null
null
null
null
CVE-2008-5665
SQL injection vulnerability in index.php in the xhresim module in XOOPS allows remote attackers to execute arbitrary SQL commands via the no parameter.
[ "cpe:2.3:a:xoops:xoops:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2013-4148
Integer signedness error in the virtio_net_load function in hw/net/virtio-net.c in QEMU 1.x before 1.7.2 allows remote attackers to execute arbitrary code via a crafted savevm image, which triggers a buffer overflow.
[ "cpe:2.3:a:qemu:qemu:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:1.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:1.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:1.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:1.0:rc4:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:1.1:rc1:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:1.1:rc2:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:1.1:rc3:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:1.1:rc4:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:1.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:1.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:1.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:1.5.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:1.5.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:1.5.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:1.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:1.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:1.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:1.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:1.6.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:1.6.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:1.6.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:1.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:1.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:1.7.1:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2022-29213
Incomplete validation in signal ops leads to crashes in TensorFlow
TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the `tf.compat.v1.signal.rfft2d` and `tf.compat.v1.signal.rfft3d` lack input validation and under certain condition can result in crashes (due to `CHECK`-failures). Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 contain a patch for this issue.
[ "cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*", "cpe:2.3:a:google:tensorflow:2.7.0:rc0:*:*:*:*:*:*", "cpe:2.3:a:google:tensorflow:2.7.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:google:tensorflow:2.8.0:-:*:*:*:*:*:*", "cpe:2.3:a:google:tensorflow:2.8.0:rc0:*:*:*:*:*:*", "cpe:2.3:a:google:tensorflow:2.8.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:google:tensorflow:2.9.0:rc0:*:*:*:*:*:*", "cpe:2.3:a:google:tensorflow:2.9.0:rc1:*:*:*:*:*:*" ]
null
5.5
null
null
null
GHSA-mw7m-hgvv-grm6
In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Automobile and Snapdragon Mobile SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 450, SD 615/16/SD 415, SD 625, SD 820, SD 820A, SD 835, SD 845, SD 850, SDM630, SDM636, SDM660, and Snapdragon_High_Med_2016, input is not properly validated in a QTEE API function.
[]
null
null
9.8
null
null
GHSA-ccjv-cx2v-q4rv
Unrestricted file upload vulnerability in IBM SPSS Analytical Decision Management 6.1 before IF1, 6.2 before IF1, and 7.0 before FP1 IF6 allows remote authenticated users to execute arbitrary code by uploading and accessing a JSP file.
[]
null
null
null
null
null
CVE-2008-0573
IPSecDrv.sys 10.4.0.12 in SafeNET HighAssurance Remote and SoftRemote allows local users to gain privileges via a crafted IPSECDRV_IOCTL IOCTL request.
[ "cpe:2.3:a:safenet:ipsecdrv.sys:10.4.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:safenet:safenet_highassurance_remote:1.4.12:*:*:*:*:*:*:*", "cpe:2.3:a:safenet:softremote_vpn_client:1.4.12:*:*:*:*:*:*:*" ]
null
null
null
7.2
null
GHSA-r297-g992-2jwc
Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in WP Messiah Ai Image Alt Text Generator for WP. This issue affects Ai Image Alt Text Generator for WP: from n/a through 1.0.8.
[]
null
4.3
null
null
null
CVE-2025-38419
remoteproc: core: Cleanup acquired resources when rproc_handle_resources() fails in rproc_attach()
In the Linux kernel, the following vulnerability has been resolved: remoteproc: core: Cleanup acquired resources when rproc_handle_resources() fails in rproc_attach() When rproc->state = RPROC_DETACHED and rproc_attach() is used to attach to the remote processor, if rproc_handle_resources() returns a failure, the resources allocated by imx_rproc_prepare() should be released, otherwise the following memory leak will occur. Since almost the same thing is done in imx_rproc_prepare() and rproc_resource_cleanup(), Function rproc_resource_cleanup() is able to deal with empty lists so it is better to fix the "goto" statements in rproc_attach(). replace the "unprepare_device" goto statement with "clean_up_resources" and get rid of the "unprepare_device" label. unreferenced object 0xffff0000861c5d00 (size 128): comm "kworker/u12:3", pid 59, jiffies 4294893509 (age 149.220s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 02 88 00 00 00 00 00 00 10 00 00 00 00 00 ............ backtrace: [<00000000f949fe18>] slab_post_alloc_hook+0x98/0x37c [<00000000adbfb3e7>] __kmem_cache_alloc_node+0x138/0x2e0 [<00000000521c0345>] kmalloc_trace+0x40/0x158 [<000000004e330a49>] rproc_mem_entry_init+0x60/0xf8 [<000000002815755e>] imx_rproc_prepare+0xe0/0x180 [<0000000003f61b4e>] rproc_boot+0x2ec/0x528 [<00000000e7e994ac>] rproc_add+0x124/0x17c [<0000000048594076>] imx_rproc_probe+0x4ec/0x5d4 [<00000000efc298a1>] platform_probe+0x68/0xd8 [<00000000110be6fe>] really_probe+0x110/0x27c [<00000000e245c0ae>] __driver_probe_device+0x78/0x12c [<00000000f61f6f5e>] driver_probe_device+0x3c/0x118 [<00000000a7874938>] __device_attach_driver+0xb8/0xf8 [<0000000065319e69>] bus_for_each_drv+0x84/0xe4 [<00000000db3eb243>] __device_attach+0xfc/0x18c [<0000000072e4e1a4>] device_initial_probe+0x14/0x20
[]
null
null
null
null
null
GHSA-64j2-vfrj-6r28
Western Digital Dashboard before 3.2.2.9 allows DLL Hijacking that leads to compromise of the SYSTEM account.
[]
null
null
null
null
null
CVE-2022-49671
RDMA/cm: Fix memory leak in ib_cm_insert_listen
In the Linux kernel, the following vulnerability has been resolved: RDMA/cm: Fix memory leak in ib_cm_insert_listen cm_alloc_id_priv() allocates resource for the cm_id_priv. When cm_init_listen() fails it doesn't free it, leading to memory leak. Add the missing error unwind.
[]
null
5.5
null
null
null
GHSA-5g4q-5r23-wrrp
Missing Authorization vulnerability in Webcodin WCP Contact Form allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WCP Contact Form: from n/a through 3.1.0.
[]
null
7.5
null
null
null
GHSA-6vgm-3w54-5w82
WordPress 2.0.1 and earlier allows remote attackers to obtain sensitive information via a direct request to (1) default-filters.php, (2) template-loader.php, (3) rss-functions.php, (4) locale.php, (5) wp-db.php, and (6) kses.php in the wp-includes/ directory; and (7) edit-form-advanced.php, (8) admin-functions.php, (9) edit-link-form.php, (10) edit-page-form.php, (11) admin-footer.php, and (12) menu.php in the wp-admin directory; and possibly (13) list directory contents of the wp-includes directory. NOTE: the vars.php, edit-form.php, wp-settings.php, and edit-form-comment.php vectors are already covered by CVE-2005-4463. The menu-header.php vector is already covered by CVE-2005-2110. Other vectors might be covered by CVE-2005-1688. NOTE: if the typical installation of WordPress does not list any site-specific files to wp-includes, then vector [13] is not an exposure.
[]
null
null
null
null
null
CVE-2020-10746
A flaw was found in Infinispan (org.infinispan:infinispan-server-runtime) version 10, where it permits local access to controls via both REST and HotRod APIs. This flaw allows a user authenticated to the local machine to perform all operations on the caches, including the creation, update, deletion, and shutdown of the entire server.
[ "cpe:2.3:a:infinispan:infinispan-server-runtime:10.0.0:-:*:*:*:*:*:*" ]
null
6.1
null
5.6
null
GHSA-jp89-5qr2-95pm
Cross-site scripting (XSS) vulnerability in posts.php in 427BB 2.2 and 2.2.1 allows remote attackers to inject arbitrary Javascript via a new message with a url bbcode tag containing a javascript URI.
[]
null
null
null
null
null
CVE-2021-40401
A use-after-free vulnerability exists in the RS-274X aperture definition tokenization functionality of Gerbv 2.7.0 and dev (commit b5f1eacd) and Gerbv forked 2.7.1. A specially-crafted gerber file can lead to code execution. An attacker can provide a malicious file to trigger this vulnerability.
[ "cpe:2.3:a:gerbv_project:gerbv:2.7.0:-:*:*:*:*:*:*", "cpe:2.3:a:gerbv_project:gerbv:2.7.1:forked_dev:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*" ]
null
null
10
null
null
GHSA-xrqq-qf24-xjgx
A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Sonoma 14.6, macOS Monterey 12.7.6, macOS Ventura 13.6.8. An app may be able to modify protected parts of the file system.
[]
null
4.4
null
null
null
GHSA-2hg8-4q64-3p6w
Multiple cross-site scripting (XSS) vulnerabilities in the (1) tasks and (2) search views in Horde Kronolith H4 before 3.0.17 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.
[]
null
null
null
null
null
GHSA-rgg5-92ch-9hcx
The Admire Extra plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'space' shortcode in all versions up to, and including, 1.6 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
6.4
null
null
null
GHSA-557r-mpfm-f4j6
index.php in PEGames uses the extract function to overwrite critical variables, which allows remote attackers to conduct PHP remote file inclusion attacks via the abs_url parameter, which is later extracted to overwrite a previously uncontrolled value.
[]
null
null
null
null
null
GHSA-35hp-p589-4cwf
A vulnerability has been found in SourceCodester Online Eyewear Shop 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file oews/classes/Users.php of the component POST Request Handler. The manipulation of the argument firstname/middlename/lastname/lastname/contact leads to cross site scripting. The attack can be launched remotely. The identifier VDB-220369 was assigned to this vulnerability.
[]
null
6.1
null
null
null
CVE-2024-4120
Tenda W15E modifyIpMacBind formIPMacBindModify stack-based overflow
A vulnerability was found in Tenda W15E 15.11.0.14. It has been rated as critical. This issue affects the function formIPMacBindModify of the file /goform/modifyIpMacBind. The manipulation of the argument IPMacBindRuleId/IPMacBindRuleIp/IPMacBindRuleMac/IPMacBindRuleRemark leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-261863. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
[ "cpe:2.3:h:tenda:w15e:-:*:*:*:*:*:*:*" ]
null
8.8
8.8
9
null
CVE-2021-36296
Dell VNX2 OE for File versions 8.1.21.266 and earlier, contain an authenticated remote code execution vulnerability. A remote malicious user with privileges may exploit this vulnerability to execute commands on the system.
[ "cpe:2.3:a:dell:emc_unity_operating_environment:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vnx_vg10:-:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vnx_vg50:-:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vnx5200:-:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vnx5400:-:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vnx5600:-:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vnx5800:-:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vnx7600:-:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vnx8000:-:*:*:*:*:*:*:*" ]
null
7.2
null
null
null
GHSA-f5cm-hf7h-g464
Cross-Site Request Forgery (CSRF) vulnerability in SKT Themes Posterity allows Cross Site Request Forgery.This issue affects Posterity: from n/a through 3.3.
[]
null
4.3
null
null
null
GHSA-5w95-m5g4-hrhx
Heap-based buffer overflow in Microsoft Office Excel 2002 SP3, Office 2004 and 2008 for Mac, and Open XML File Format Converter for Mac allows remote attackers to execute arbitrary code via a spreadsheet containing a malformed Binary File Format (aka BIFF) record that triggers memory corruption, aka "Excel Document Parsing Heap Overflow Vulnerability."
[]
null
null
null
null
null
CVE-2015-3129
Use-after-free vulnerability in Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and OS X and before 11.2.202.481 on Linux, Adobe AIR before 18.0.0.180, Adobe AIR SDK before 18.0.0.180, and Adobe AIR SDK & Compiler before 18.0.0.180 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-3118, CVE-2015-3124, CVE-2015-3127, CVE-2015-3128, CVE-2015-3131, CVE-2015-3132, CVE-2015-3136, CVE-2015-3137, CVE-2015-4428, CVE-2015-4430, and CVE-2015-5117.
[ "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:14.0.0.125:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:14.0.0.145:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:14.0.0.176:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:14.0.0.179:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:15.0.0.152:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:15.0.0.167:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:15.0.0.189:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:15.0.0.223:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:15.0.0.239:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:15.0.0.246:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:16.0.0.235:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:16.0.0.257:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:16.0.0.287:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:16.0.0.296:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:17.0.0.134:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:17.0.0.169:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:17.0.0.188:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:17.0.0.190:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:18.0.0.160:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:18.0.0.194:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*" ]
null
null
null
10
null
GHSA-pfx2-4968-v9w2
XnView Classic for Windows Version 2.40 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted .fpx file, related to an "Error Code (0xc000041d) starting at wow64!Wow64NotifyDebugger+0x000000000000001d."
[]
null
null
7.8
null
null
CVE-2020-25850
HGiga MailSherlock - Arbitrary File Download
The function, view the source code, of HGiga MailSherlock does not validate specific characters. Remote attackers can use this flaw to download arbitrary system files.
[ "cpe:2.3:a:hgiga:msr45_isherlock-user:*:*:*:*:*:*:*:*", "cpe:2.3:a:hgiga:ssr45_isherlock-user:*:*:*:*:*:*:*:*" ]
null
8.1
null
null
null
GHSA-376m-3h9j-6rv5
Buffer overflow in swverify in HP-UX 11.0, and possibly other programs, allows local users to gain privileges via a long command line argument.
[]
null
null
null
null
null
RHSA-2025:4496
Red Hat Security Advisory: kpatch-patch-5_14_0-284_104_1, kpatch-patch-5_14_0-284_52_1, kpatch-patch-5_14_0-284_79_1, and kpatch-patch-5_14_0-284_92_1 security update
kernel: nvme-tcp: fix potential memory corruption in nvme_tcp_recv_pdu()
[ "cpe:/o:redhat:rhel_eus:9.2::baseos" ]
null
8
null
null
null
GHSA-v42g-f47f-rwpr
An exploitable SQL injection vulnerability exists in the authenticated part of YouPHPTube 7.6. Specially crafted web requests can cause a SQL injection. An attacker can send a web request with parameters containing SQL injection attacks to trigger this vulnerability, potentially allowing exfiltration of the database, user credentials and in certain configuration, access the underlying operating system.
[]
null
8.8
null
null
null
CVE-2008-1171
Multiple PHP remote file inclusion vulnerabilities in the 123 Flash Chat Module for phpBB allow remote attackers to execute arbitrary PHP code via a URL in the phpbb_root_path parameter to (1) 123flashchat.php and (2) phpbb_login_chat.php. NOTE: CVE disputes this issue because $phpbb_root_path is explicitly set to "./" in both programs
[ "cpe:2.3:a:phpbb:123_flash_chat_module:*:*:*:*:*:*:*:*" ]
null
null
null
6.8
null
GHSA-w93q-rjgc-5vpf
A configuration issue was addressed with additional restrictions. This issue is fixed in macOS Big Sur 11.7, macOS Monterey 12.6. An app may be able to access user-sensitive data.
[]
null
5.5
null
null
null
GHSA-x633-mvxm-f9pp
An issue was discovered on Mofi Network MOFI4500-4GXeLTE 4.1.5-std devices. The poof.cgi script contains undocumented code that provides the ability to remotely reboot the device. An adversary with the private key (but not the root password) can remotely reboot the device.
[]
null
null
null
null
null
GHSA-hm72-qxg7-34pg
miniserv.pl in (1) Webmin before 1.070 and (2) Usermin before 1.000 does not properly handle metacharacters such as line feeds and carriage returns (CRLF) in Base-64 encoded strings during Basic authentication, which allows remote attackers to spoof a session ID and gain root privileges.
[]
null
null
null
null
null
CVE-2016-3818
libc in Android 4.x before 4.4.4 allows remote attackers to cause a denial of service (device hang or reboot) via a crafted file, aka internal bug 28740702.
[ "cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.2:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.3:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.3.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.4:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.4.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.4.2:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.4.3:*:*:*:*:*:*:*" ]
null
null
5.5
7.1
null
GHSA-rrxw-6cxg-833x
Azure RTOS GUIX Studio Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-30175, CVE-2022-30176, CVE-2022-34687, CVE-2022-35773, CVE-2022-35779.
[]
null
7.8
null
null
null
GHSA-3ggj-v8pg-xq6f
Heap-based buffer overflow in SPICE before 0.12.6 allows guest OS users to cause a denial of service (heap-based memory corruption and QEMU-KVM crash) or possibly execute arbitrary code on the host via QXL commands related to the surface_id parameter.
[]
null
null
7.8
null
null
GHSA-mf23-wm84-g9x3
IPv4-in-IPv6 and IPv6-in-IPv6 tunneling (RFC 2473) do not require the validation or verification of the source of a network packet, allowing an attacker to spoof and route arbitrary traffic via an exposed network interface. This is a similar issue to CVE-2020-10136.
[]
null
5.4
null
null
null
GHSA-jjmf-rvpm-r6pc
On BIG-IP version 16.0.x before 16.0.1.1, 15.1.x before 15.1.2.1, and 14.1.x before 14.1.3.1, under some circumstances, Traffic Management Microkernel (TMM) may restart on the BIG-IP system while passing large bursts of traffic. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated.
[]
null
null
null
null
null
GHSA-2mrh-6cph-qr8h
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is 7.1.10. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 2.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N).
[]
null
2.3
null
null
null
CVE-2017-1000507
Canvs Canvas version 3.4.2 contains a Cross Site Scripting (XSS) vulnerability in User's details that can result in denial of service and execution of javascript code.
[ "cpe:2.3:a:cnvs:canvas:3.4.2:*:*:*:*:*:*:*" ]
null
null
5.4
3.5
null
RHSA-2020:4682
Red Hat Security Advisory: grafana security, bug fix, and enhancement update
grafana: XSS vulnerability via a column style on the "Dashboard > Table Panel" screen grafana: arbitrary file read via MySQL data source grafana: stored XSS grafana: XSS annotation popup vulnerability grafana: XSS via column.title or cellLinkTooltip grafana: information disclosure through world-readable /var/lib/grafana/grafana.db grafana: information disclosure through world-readable grafana configuration files grafana: XSS via the OpenTSDB datasource
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
6.1
null
null
null
GHSA-3xvg-x47j-x75w
Ansible Improper Input Validation vulnerability
In ansible it was found that inventory variables are loaded from current working directory when running ad-hoc command which are under attacker's control, allowing to run arbitrary code as a result.
[]
8.5
null
7.8
null
null
GHSA-qffq-rf2r-34hh
A Buffer Overflow vulnerabiltiy exists in TP-LINK WR-886N 20190826 2.3.8 in thee /cloud_config/router_post/login feature, which allows malicious users to execute arbitrary code on the system via a crafted post request.
[]
null
9.8
null
null
null
GHSA-wvxc-855f-jvrv
Azure Identity Library for .NET Information Disclosure Vulnerability
Azure Identity Library for .NET Information Disclosure Vulnerability
[]
null
5.5
null
null
null
CVE-2025-46726
Langroid Vulnerable to XXE Injection via XMLToolMessage
Langroid is a framework for building large-language-model-powered applications. Prior to version 0.53.4, a LLM application leveraging `XMLToolMessage` class may be exposed to untrusted XML input that could result in DoS and/or exposing local files with sensitive information. Version 0.53.4 fixes the issue.
[]
7.8
null
null
null
null
RHSA-2021:1006
Red Hat Security Advisory: OpenShift Container Platform 4.7.5 security and bug fix update
golang: crypto/elliptic: incorrect operations on the P-224 curve gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation fabric8-kubernetes-client: vulnerable to a path traversal leading to integrity and availability compromise
[ "cpe:/a:redhat:openshift:4.7::el7", "cpe:/a:redhat:openshift:4.7::el8" ]
null
7.4
null
null
null
RHSA-2017:2561
Red Hat Security Advisory: Red Hat Enterprise Virtualization 3.x - 30 Day End Of Life Notice
This is the 30 day notification for the End of Production Phase 2 of Red Hat Enterprise Virtualization 3.x.
[ "cpe:/a:redhat:rhev_manager:3" ]
null
null
null
null
null
CVE-2023-47867
MachineSense FeverWarn Improper Access Control
MachineSense FeverWarn devices are configured as Wi-Fi hosts in a way that attackers within range could connect to the device's web services and compromise the device.
[ "cpe:2.3:o:machinesense:feverwarn_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:machinesense:feverwarn:-:*:*:*:*:*:*:*" ]
null
8.8
null
null
null
GHSA-6gj2-5366-p95v
ChakraCore RCE Vulnerability
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-8266, CVE-2018-8380, CVE-2018-8384.
[]
null
null
7.5
null
null
GHSA-mgjw-ppjc-jj5p
Blue Coat Advanced Secure Gateway (ASG) 6.6 before 6.6.5.4 and Content Analysis System (CAS) 1.3 before 1.3.7.4 are susceptible to an OS command injection vulnerability. An authenticated malicious administrator can execute arbitrary OS commands with elevated system privileges.
[]
null
null
7.2
null
null
CVE-2020-26997
A vulnerability has been identified in Solid Edge SE2020 (All versions < SE2020MP13), Solid Edge SE2020 (All versions < SE2020MP14), Solid Edge SE2021 (All Versions < SE2021MP4). Affected applications lack proper validation of user-supplied data when parsing PAR files. This could lead to pointer dereferences of a value obtained from untrusted source. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-11919)
[ "cpe:2.3:a:siemens:solid_edge_se2020:*:*:*:*:*:*:*:*", "cpe:2.3:a:siemens:solid_edge_se2021:*:*:*:*:*:*:*:*" ]
null
7.8
null
6.8
null
GHSA-g583-4mg8-hq84
In decrypt_1_2 of CryptoPlugin.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-244569759
[]
null
5.5
null
null
null
GHSA-6c3v-h837-jcq5
Stack-based buffer overflow in nipplib.dll in Novell iPrint Client before 5.64 allows remote attackers to execute arbitrary code via a crafted iprint-client-config-info parameter in a printer-url.
[]
null
null
null
null
null
GHSA-vgvw-jj2g-rp9v
Mozilla Firefox before 2.0.0.17 and 3.x before 3.0.2, Thunderbird before 2.0.0.17, and SeaMonkey before 1.1.12 allow remote attackers to create documents that lack script-handling objects, and execute arbitrary code with chrome privileges, via vectors related to (1) the document.loadBindingDocument function and (2) XSLT.
[]
null
null
null
null
null
CVE-2020-12146
Silver Peak Unity OrchestratorTM subject to path traversal.
In Silver Peak Unity Orchestrator versions prior to 8.9.11+, 8.10.11+, or 9.0.1+, an authenticated user can access, modify, and delete restricted files on the Orchestrator server using the/debugFiles REST API.
[ "cpe:2.3:a:silver-peak:unity_orchestrator:*:*:*:*:*:*:*:*" ]
null
6.6
null
null
null
GHSA-m65c-6q88-9x7g
A buffer overflow resulting in a potentially exploitable crash due to memory allocation issues when handling large amounts of incoming data. This vulnerability affects Thunderbird < 45.5, Firefox ESR < 45.5, and Firefox < 50.
[]
null
null
7.5
null
null
GHSA-f2gq-74f6-v2f7
IBM AIX's 7.3 Python implementation could allow a non-privileged local user to exploit a vulnerability to cause a denial of service. IBM X-Force ID: 267965.
[]
null
6.2
null
null
null
GHSA-hhf2-fwjq-ffr3
The E-Mail Security Virtual Appliance (ESVA) (tested on version ESVA_2057) contains an unauthenticated command injection vulnerability in the learn-msg.cgi script. The CGI handler fails to sanitize user-supplied input passed via the id parameter, allowing attackers to inject arbitrary shell commands. Exploitation requires no authentication and results in full command execution on the underlying system.
[]
9.3
null
null
null
null
CVE-2023-41074
The issue was addressed with improved checks. This issue is fixed in tvOS 17, Safari 17, watchOS 10, iOS 17 and iPadOS 17, macOS Sonoma 14. Processing web content may lead to arbitrary code execution.
[ "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*" ]
null
8.8
null
null
null
GHSA-2fq7-v233-xx5v
Stack-based buffer overflow in the MPS.StormPlayer.1 ActiveX control in mps.dll 3.9.4.27 in Baofeng Storm allows remote attackers to execute arbitrary code via a long argument to the OnBeforeVideoDownload method, as exploited in the wild in April and May 2009. NOTE: some of these details are obtained from third party information. NOTE: it was later reported that 3.09.04.17 and earlier are also affected.
[]
null
null
null
null
null
CVE-2016-9025
Exponent CMS before 2.6.0 has improper input validation in purchaseOrderController.php.
[ "cpe:2.3:a:exponentcms:exponent_cms:*:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
null
GHSA-php6-q5jp-h3rj
The default configuration of HP Client Automation (HPCA) Enterprise Infrastructure (aka Radia) allows remote attackers to read log files, and consequently cause a denial of service or have unspecified other impact, via web requests.
[]
null
null
null
null
null
GHSA-9mcr-873m-xcxp
Tungstenite allows remote attackers to cause a denial of service
The Tungstenite crate through 0.20.0 for Rust allows remote attackers to cause a denial of service (minutes of CPU consumption) via an excessive length of an HTTP header in a client handshake. The length affects both how many times a parse is attempted (e.g., thousands of times) and the average amount of data for each parse attempt (e.g., millions of bytes).
[]
null
7.5
null
null
null
CVE-2021-25759
In JetBrains Hub before 2020.1.12629, an authenticated user can delete 2FA settings of any other user.
[ "cpe:2.3:a:jetbrains:hub:*:*:*:*:*:*:*:*" ]
null
6.5
null
4
null
CVE-2023-45800
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Hanbiro Hanbiro groupware allows Information Elicitation.This issue affects Hanbiro groupware: from V3.8.79 before V3.8.81.1.
[ "cpe:2.3:a:hanbiro:groupware:*:*:*:*:*:*:*:*" ]
null
7.5
null
null
null
CVE-2025-53473
Server-side request forgery (SSRF) vulnerability exists n multiple versions of Nimesa Backup and Recovery, If this vulnerability is exploited, unintended requests may be sent to internal servers.
[]
6.9
null
7.3
null
null
GHSA-pfq2-wh4j-r5cm
libc in Android 4.x before 4.4.4 allows remote attackers to cause a denial of service (device hang or reboot) via a crafted file, aka internal bug 28740702.
[]
null
null
5.5
null
null
RHSA-2022:5030
Red Hat Security Advisory: Red Hat Fuse Online 7.10.2.P1 security update
google-oauth-client: Token signature not verified eventsource: Exposure of Sensitive Information
[ "cpe:/a:redhat:jboss_fuse:7" ]
null
9.3
null
null
null
GHSA-g7xw-pf29-g7fm
SAP Commerce, versions 1811, 1905, does not perform necessary authorization checks for an anonymous user, due to Missing Authorization Check. This affects confidentiality of secure media.
[]
null
null
null
null
null
GHSA-p87q-j7mq-759c
In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Mobile and Snapdragon Wear IPQ4019, MDM9206, MDM9607, MDM9635M, MDM9640, MDM9645, MSM8909W, SD 210/SD 212/SD 205, SD 400, SD 410/12, SD 615/16/SD 415, SD 800, and SD 810, the function tzbsp_pil_verify_sig() does not strictly check that the pointer to ELF and program headers and hash segment is within secure memory. It only checks that the address is not in non-secure memory. A given address range can overlap with both secure and non-secure regions - hence if such an address is passed in, it would not pass the non-secure range check, and would be considered valid by the function, even though that memory area could be modified by the non-secure side.
[]
null
null
9.8
null
null
GHSA-f49g-9gwg-jc3x
Intel Alert Management System (aka AMS or AMS2), as used in Symantec Antivirus Corporate Edition (SAVCE) 10.x before 10.1 MR10, Symantec System Center (SSC) 10.x, and Symantec Quarantine Server 3.5 and 3.6, allows remote attackers to execute arbitrary commands via crafted messages over TCP, as discovered by Junaid Bohio, a different vulnerability than CVE-2010-0110 and CVE-2010-0111. NOTE: some of these details are obtained from third party information.
[]
null
null
null
null
null
CVE-2022-2354
WP-DBManager < 2.80.8 - Admin+ Remote Command Execution
The WP-DBManager WordPress plugin before 2.80.8 does not prevent administrators from running arbitrary commands on the server in multisite installations, where only super-administrators should.
[ "cpe:2.3:a:wp-dbmanager_project:wp-dbmanager:*:*:*:*:*:wordpress:*:*" ]
null
7.2
null
null
null
CVE-2023-26466
A user with non-Admin access can change a configuration file on the client to modify the Server URL.
[ "cpe:2.3:a:pega:synchronization_engine:*:*:*:*:*:*:*:*" ]
null
null
7.8
null
null