id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
139k
cpes
sequencelengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
CVE-2016-3032
IBM Cognos Analytics 11.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 114516.
[ "cpe:2.3:a:ibm:cognos_analytics:11.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:cognos_analytics:11.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:cognos_analytics:11.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:cognos_analytics:11.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:cognos_analytics:11.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:cognos_analytics:11.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:cognos_analytics:11.0.6:*:*:*:*:*:*:*" ]
null
null
5.4
3.5
CVE-2023-3149
SourceCodester Online Discussion Forum Site manage_user.php sql injection
A vulnerability was found in SourceCodester Online Discussion Forum Site 1.0. It has been classified as critical. Affected is an unknown function of the file admin\user\manage_user.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-231018 is the identifier assigned to this vulnerability.
[ "cpe:2.3:a:online_discussion_forum_site_project:online_discussion_forum_site:1.0:*:*:*:*:*:*:*" ]
null
6.3
6.3
6.5
CVE-2022-0487
A use-after-free vulnerability was found in rtsx_usb_ms_drv_remove in drivers/memstick/host/rtsx_usb_ms.c in memstick in the Linux kernel. In this flaw, a local attacker with a user privilege may impact system Confidentiality. This flaw affects kernel versions prior to 5.14 rc1.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:-:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*" ]
null
5.5
null
2.1
GHSA-6c88-fwg8-4qhh
Vulnerability in the Oracle Solaris product of Oracle Systems (component: Common Desktop Environment). Supported versions that are affected are 10 and 11. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Solaris executes to compromise Oracle Solaris. While the vulnerability is in Oracle Solaris, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle Solaris. CVSS 3.0 Base Score 7.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H).
[]
null
7.8
null
null
ICSA-23-192-01
Rockwell Automation Enhanced HIM
The API the application uses is not protected sufficiently and uses incorrect Cross-Origin Resource Sharing (CORS) settings and, as a result, is vulnerable to a Cross Site Request Forgery (CSRF) attack. To exploit this vulnerability, a malicious user would have to convince a user to click on an untrusted link through a social engineering attack or successfully perform a Cross Site Scripting Attack (XSS). Exploitation of a CSRF could potentially lead to sensitive information disclosure and full remote access to the affected products.
[]
null
9.6
null
null
RHSA-2021:1299
Red Hat Security Advisory: java-1.8.0-openjdk security update
OpenJDK: Incomplete enforcement of JAR signing disabled algorithms (Libraries, 8249906)
[ "cpe:/a:redhat:rhel_eus:8.2::appstream" ]
null
5.3
null
null
GHSA-889m-9374-3cr2
The package manager in Sitecore CRM 8.1 Rev 151207 allows remote authenticated administrators to execute arbitrary ASP code by creating a ZIP archive in which a .asp file has a ..\ in its pathname, visiting sitecore/shell/applications/install/dialogs/Upload%20Package/UploadPackage2.aspx to upload this archive and extract its contents, and visiting a URI under sitecore/ to execute the .asp file.
[]
null
null
6.7
null
PYSEC-2023-291
null
PyDrive2 is a wrapper library of google-api-python-client that simplifies many common Google Drive API V2 tasks. Unsafe YAML deserilization will result in arbitrary code execution. A maliciously crafted YAML file can cause arbitrary code execution if PyDrive2 is run in the same directory as it, or if it is loaded in via `LoadSettingsFile`. This is a deserilization attack that will affect any user who initializes GoogleAuth from this package while a malicious yaml file is present in the same directory. This vulnerability does not require the file to be directly loaded through the code, only present. This issue has been addressed in commit `c57355dc` which is included in release version `1.16.2`. Users are advised to upgrade. There are no known workarounds for this vulnerability.
[]
null
7.8
null
null
GHSA-g2mc-fqqc-hxg3
Pimcore Path Traversal Vulnerability in AdminBundle/Controller/Reports/CustomReportController.php
ImpactThe impact of this path traversal and arbitrary extension is limited (creation of arbitrary files and appending data to existing files) but when combined with the SQL Injection, the exported data `RESTRICTED DIFFUSION 9 / 9` can be controlled and a webshell can be uploaded. Attackers can use that to execute arbitrary PHP code on the server with the permissions of the webserver.PatchesUpdate to version 10.5.18 or apply this patch manually https://github.com/pimcore/pimcore/commit/7f788fa44bc18bc1c9182c25e26b770a1d30b62f.patchWorkaroundsApply patch https://github.com/pimcore/pimcore/commit/7f788fa44bc18bc1c9182c25e26b770a1d30b62f.patch manually.Referenceshttps://github.com/pimcore/pimcore/pull/14498
[]
null
6.5
null
null
RHSA-2021:4531
Red Hat Security Advisory: OpenJDK 17.0.1 security update for Windows Builds
OpenJDK: Excessive memory allocation in RTFParser (Swing, 8265167) OpenJDK: Excessive memory allocation in RTFReader (Swing, 8265580) OpenJDK: Excessive memory allocation in HashMap and HashSet (Utility, 8266097) OpenJDK: Certificates with end dates too far in the future can corrupt keystore (Keytool, 8266137) OpenJDK: Incorrect principal selection when using Kerberos Constrained Delegation (Libraries, 8266689) OpenJDK: Unexpected exception raised during TLS handshake (JSSE, 8267729) OpenJDK: Excessive memory allocation in BMPImageReader (ImageIO, 8267735) OpenJDK: Non-constant comparison during TLS handshakes (JSSE, 8269618)
[ "cpe:/a:redhat:openjdk:17::windows" ]
null
3.7
null
null
GHSA-vpjc-3v2r-p99w
A Cross-Site Request Forgery (CSRF) in Academy LMS before v5.10 allows an attacker to arbitrarily create a page.
[]
null
4.8
null
null
GHSA-2736-7x8v-6v3p
Mail in Apple Mac OS X before 10.6.3 does not properly enforce the key usage extension during processing of a keychain that specifies multiple certificates for an e-mail recipient, which might make it easier for remote attackers to obtain sensitive information via a brute-force attack on a weakly encrypted e-mail message.
[]
null
null
null
null
CVE-2016-7663
An issue was discovered in certain Apple products. iOS before 10.2 is affected. macOS before 10.12.2 is affected. watchOS before 3.1.3 is affected. The issue involves the "CoreFoundation" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted string.
[ "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*" ]
null
null
9.8
7.5
GHSA-pwvf-mh7j-22qr
PHP remote file inclusion vulnerability in templates/header.php in ME Download System 1.3 allows remote attackers to execute arbitrary PHP code via a URL in the Vb8878b936c2bd8ae0cab parameter.
[]
null
null
null
null
GHSA-92h8-xrqx-3w9v
GlowWorm FW before 1.5.3b4 allows remote attackers to cause a denial of service (kernel panic) via certain DNS responses that trigger infinite recursion in TrueDNS packet parsing, as originally observed with certain login.yahoo.com responses.
[]
null
null
null
null
GHSA-j74g-h82x-vgj7
FrontAccounting 2.4.3 suffers from a CSRF flaw, which leads to adding a user account via admin/users.php (aka the "add user" feature of the User Permissions page).
[]
null
null
8.8
null
GHSA-47q6-hqqr-mcr3
A vulnerability was found in ImageMagick. This security flaw cause a remote code execution vulnerability in OpenBlob with --enable-pipes configured.
[]
null
null
null
null
CVE-2024-0929
Tenda AC10U fromNatStaticSetting stack-based overflow
A vulnerability was found in Tenda AC10U 15.03.06.49_multi_TDE01. It has been rated as critical. Affected by this issue is the function fromNatStaticSetting. The manipulation of the argument page leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-252134 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
[ "cpe:2.3:o:tendacn:ac10u_firmware:15.03.06.49_multi_tde01:*:*:*:*:*:*:*", "cpe:2.3:h:tendacn:ac10u:1.0:*:*:*:*:*:*:*" ]
null
4.7
4.7
5.8
CVE-2018-5080
In K7 AntiVirus 15.1.0306, the driver file (K7FWHlpr.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x830020FC.
[ "cpe:2.3:a:k7computing:antivirus:15.1.0306:*:*:*:*:*:*:*" ]
null
null
7.8
6.1
CVE-2015-5011
IBM WebSphere Message Broker 8 before 8.0.0.6 and Integration Bus 9 before 9.0.0.4 do not check authorization for MQSISTARTMSGFLOW and MQSISTOPMSGFLOW commands, which allows local users to bypass intended access restrictions, and start or stop a service, by issuing a command.
[ "cpe:2.3:a:ibm:websphere_message_broker:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_message_broker:8.0.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_message_broker:8.0.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_message_broker:8.0.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_message_broker:8.0.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_message_broker:8.0.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:integration_bus:9.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:integration_bus:9.0.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:integration_bus:9.0.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:integration_bus:9.0.0.3:*:*:*:*:*:*:*" ]
null
null
null
3.2
CVE-2019-11080
Sitecore Experience Platform (XP) prior to 9.1.1 is vulnerable to remote code execution via deserialization, aka TFS # 293863. An authenticated user with necessary permissions is able to remotely execute OS commands by sending a crafted serialized object.
[ "cpe:2.3:a:sitecore:experience_platform:*:*:*:*:*:*:*:*" ]
null
null
8.8
9
CVE-2023-6799
WP Reset <= 2.0 - Sensitive Information Exposure due to Insufficient Randomness
The WP Reset – Most Advanced WordPress Reset Tool plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.0 via the use of insufficiently random snapshot names. This makes it possible for unauthenticated attackers to extract sensitive data including site backups by brute-forcing the snapshot filenames. Please note that the vendor does not plan to do any further hardening on this functionality.
[]
null
5.9
null
null
CVE-2007-0837
PHP remote file inclusion vulnerability in examples/inc/top.inc.php in AgerMenu 0.03 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the rootdir parameter.
[ "cpe:2.3:a:agermenu:agermenu:0.03:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-q2fp-fcx5-hff3
The rad_decode function in FreeRADIUS before 1.1.8 allows remote attackers to cause a denial of service (radiusd crash) via zero-length Tunnel-Password attributes, as demonstrated by a certain module in VulnDisco Pack Professional 7.6 through 8.11. NOTE: this is a regression error related to CVE-2003-0967.
[]
null
null
null
null
GHSA-cpxq-5q25-5cpx
in.uucpd UUCP server in Debian GNU/Linux 2.2, and possibly other operating systems, does not properly terminate long strings, which allows remote attackers to cause a denial of service, possibly due to a buffer overflow.
[]
null
null
null
null
CVE-2019-15151
AdPlug 2.3.1 has a double free in the Cu6mPlayer class in u6m.h.
[ "cpe:2.3:a:adplug_project:adplug:2.3.1:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
CVE-2021-23923
An issue was discovered in Devolutions Server before 2020.3. There is Broken Authentication with Windows domain users.
[ "cpe:2.3:a:devolutions:devolutions_server:*:*:*:*:*:*:*:*" ]
null
8.1
null
4.9
CVE-2009-2790
SQL injection vulnerability in cat_products.php in SoftBiz Dating Script allows remote attackers to execute arbitrary SQL commands via the cid parameter. NOTE: this might overlap CVE-2006-3271.4.
[ "cpe:2.3:a:softbiz:dating_script:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-2g4v-qc3v-672p
Buffer overflow in ByteCatcher FTP client 1.04b allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long FTP server banner.
[]
null
null
null
null
ICSA-18-046-03
Schneider Electric IGSS Mobile
IGSS Mobile app lacks certificate pinning during the TLS/SSL connection establishing process. This issue could allow an attacker to execute a man-in-the-middle attack. CVE-2017-9968 has been assigned to this vulnerability. A CVSS v3 base score of 6.4 has been calculated; the CVSS vector string is (AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N). IGSS Mobile app passwords are stored in clear-text in the configuration file. CVE-2017-9969 has been assigned to this vulnerability. A CVSS v3 base score of 6.0 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N).
[]
null
null
6
null
CVE-2022-36572
Sinsiu Sinsiu Enterprise Website System v1.1.1.0 was discovered to contain a remote code execution (RCE) vulnerability via the component /upload/admin.php?/deal/.
[ "cpe:2.3:a:sinsiu:enterprise_website_system:1.1.1.0:*:*:*:*:*:*:*" ]
null
9.8
null
null
CVE-2024-2113
The Ninja Forms Contact Form – The Drag and Drop Form Builder for WordPress plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.8.0. This is due to missing or incorrect nonce validation on the nf_download_all_subs AJAX action. This makes it possible for unauthenticated attackers to trigger an export of a form's submission to a publicly accessible location via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
[]
null
4.3
null
null
GHSA-r5h8-fch6-xr5v
The YaDisk Files WordPress plugin through 1.2.5 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
[]
null
6.8
null
null
CVE-2015-10097
grinnellplans-php read.php interface_disp_page sql injection
A vulnerability was found in grinnellplans-php up to 3.0. It has been declared as critical. Affected by this vulnerability is the function interface_disp_page/interface_disp_page of the file read.php. The manipulation leads to sql injection. The attack can be launched remotely. The identifier of the patch is 57e4409e19203a94495140ff1b5a697734d17cfb. It is recommended to apply a patch to fix this issue. The identifier VDB-223801 was assigned to this vulnerability.
[ "cpe:2.3:a:grinnellplans:grinnellplans:*:*:*:*:*:*:*:*" ]
null
6.3
6.3
6.5
CVE-2019-25067
Podman/Varlink API Privilege Escalation
A vulnerability, which was classified as critical, was found in Podman and Varlink 1.5.1. This affects an unknown part of the component API. The manipulation leads to Remote Privilege Escalation. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-143949 was assigned to this vulnerability.
[ "cpe:2.3:a:podman_project:podman:1.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:varlink:varlink:1.5.1:*:*:*:*:*:*:*" ]
null
6.3
6.3
6
GHSA-96jv-c7m6-q43g
Cross-site request forgery vulnerability in Jenkins OpenID Plugin
A cross-site request forgery (CSRF) vulnerability in Jenkins OpenID Plugin 2.4 and earlier allows attackers to trick users into logging in to the attacker's account.
[]
null
8.8
null
null
GHSA-j77g-rccp-fpvv
A vulnerability in the web-based management interface of Cisco Small Business RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers could allow an authenticated, remote attacker to execute arbitrary code or cause the web-based management process on the device to restart unexpectedly, resulting in a denial of service (DoS) condition. The attacker must have valid administrator credentials. This vulnerability is due to insufficient validation of user-supplied input to the web-based management interface. An attacker could exploit this vulnerability by sending crafted HTTP input to an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system or cause the web-based management process to restart, resulting in a DoS condition.
[]
null
7.2
null
null
GHSA-xqvf-v5jg-pxc2
MongoDB Ops Manager Diagnostics Archive may not redact sensitive PEM key file password app settings. Archives do not include the PEM files themselves. This issue affects MongoDB Ops Manager v5.0 prior to 5.0.21 and MongoDB Ops Manager v6.0 prior to 6.0.12
[]
null
3.1
null
null
CVE-2024-22019
A vulnerability in Node.js HTTP servers allows an attacker to send a specially crafted HTTP request with chunked encoding, leading to resource exhaustion and denial of service (DoS). The server reads an unbounded number of bytes from a single connection, exploiting the lack of limitations on chunk extension bytes. The issue can cause CPU and network bandwidth exhaustion, bypassing standard safeguards like timeouts and body size limits.
[ "cpe:2.3:a:node.js:node.js:*:*:*:*:*:*:*:*" ]
null
null
7.5
null
CVE-2025-0720
Microword eScan Antivirus Folder Watch List rtscanner removeExtraSlashes stack-based overflow
A vulnerability was found in Microword eScan Antivirus 7.0.32 on Linux. It has been rated as problematic. Affected by this issue is the function removeExtraSlashes of the file /opt/MicroWorld/sbin/rtscanner of the component Folder Watch List Handler. The manipulation leads to stack-based buffer overflow. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
[]
4.8
3.3
3.3
1.7
GHSA-26rg-mq58-rxvm
An issue was discovered in Xen through 4.14.x. A bounds check common to most operation time functions specific to FIFO event channels depends on the CPU observing consistent state. While the producer side uses appropriately ordered writes, the consumer side isn't protected against re-ordered reads, and may hence end up de-referencing a NULL pointer. Malicious or buggy guest kernels can mount a Denial of Service (DoS) attack affecting the entire system. Only Arm systems may be vulnerable. Whether a system is vulnerable depends on the specific CPU. x86 systems are not vulnerable.
[]
null
null
null
null
CVE-2020-10021
Out-of-bounds write in USB Mass Storage with unaligned sizes
Out-of-bounds Write in the USB Mass Storage memoryWrite handler with unaligned Sizes See NCC-ZEP-024, NCC-ZEP-025, NCC-ZEP-026 This issue affects: zephyrproject-rtos zephyr version 1.14.1 and later versions. version 2.1.0 and later versions.
[ "cpe:2.3:o:zephyrproject:zephyr:*:*:*:*:*:*:*:*" ]
null
8.1
null
null
CVE-2024-1935
The Giveaways and Contests by RafflePress – Get More Website Traffic, Email Subscribers, and Social Followers plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘parent_url’ parameter in all versions up to, and including, 1.12.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
7.2
null
null
CVE-2019-16548
A cross-site request forgery vulnerability in Jenkins Google Compute Engine Plugin 4.1.1 and earlier in ComputeEngineCloud#doProvision could be used to provision new agents.
[ "cpe:2.3:a:jenkins:google_compute_engine:*:*:*:*:*:jenkins:*:*" ]
null
8.8
null
6.8
CVE-2019-18796
The BASS Audio Library 2.4.14 under Windows is prone to a BASS_StreamCreateFile Denial of Service vulnerability (infinite loop) via a crafted .mp3 file. This weakness could allow attackers to consume excessive CPU and the application becomes unresponsive.
[ "cpe:2.3:a:un4seen:bass:*:*:*:*:*:windows:*:*" ]
null
6.5
null
7.1
GHSA-qvxh-3pw2-32v5
An improper control of interaction frequency vulnerability in Zyxel GS1200 series switches could allow a local attacker to guess the password by using a timing side-channel attack.
[]
null
6.2
null
null
GHSA-4vgw-chff-95wv
Unspecified vulnerability in Oracle MySQL 5.6.26 and earlier allows remote authenticated users to affect availability via unknown vectors.
[]
null
null
null
null
CVE-2024-0652
PHPGurukul Company Visitor Management System search-visitor.php cross site scripting
A vulnerability was found in PHPGurukul Company Visitor Management System 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file search-visitor.php. The manipulation leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-251378 is the identifier assigned to this vulnerability.
[ "cpe:2.3:a:phpgurukul:company_visitor_management_system:1.0:*:*:*:*:*:*:*" ]
null
3.5
3.5
4
CVE-2017-3379
Vulnerability in the Oracle Advanced Outbound Telephony component of Oracle E-Business Suite (subcomponent: User Interface). Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5 and 12.2.6. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Advanced Outbound Telephony. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Advanced Outbound Telephony, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Advanced Outbound Telephony accessible data as well as unauthorized update, insert or delete access to some of Oracle Advanced Outbound Telephony accessible data. CVSS v3.0 Base Score 8.2 (Confidentiality and Integrity impacts).
[ "cpe:2.3:a:oracle:advanced_outbound_telephony:12.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:advanced_outbound_telephony:12.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:advanced_outbound_telephony:12.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:advanced_outbound_telephony:12.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:advanced_outbound_telephony:12.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:advanced_outbound_telephony:12.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:advanced_outbound_telephony:12.2.6:*:*:*:*:*:*:*" ]
null
null
8.2
5.8
RHSA-2021:0094
Red Hat Security Advisory: dotnet5.0 security and bugfix update
dotnet: ASP.NET Core Callbacks outside of locks cause Krestel deadlock when using HTTP2
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.5
null
null
GHSA-6x4q-jqqf-cmgc
Intesync Solismed 3.3sp has XSS.
[]
null
6.1
null
null
GHSA-rx9m-2wvh-rvjf
Format string vulnerability in Logger.cc for Spey 0.3.3 allows attackers to cause a denial of service (crash) and possibly execute arbitrary code via format string specifiers in a syslog call.
[]
null
null
null
null
CVE-2018-15886
Monstra CMS 3.0.4 does not properly restrict modified Snippet content, as demonstrated by the admin/index.php?id=snippets&action=edit_snippet&filename=google-analytics URI, which allows attackers to execute arbitrary PHP code by placing this code after a <?php substring.
[ "cpe:2.3:a:monstra:monstra:3.0.4:*:*:*:*:*:*:*" ]
null
null
7.2
6.5
GHSA-fmc6-pg58-457g
The load_pnm function in frompnm.c in libsixel.a in libsixel 1.8.2 has infinite recursion.
[]
null
null
5.5
null
CVE-2014-5175
The License Measurement servlet in SAP Solution Manager 7.1 allows remote attackers to bypass authentication via unspecified vectors, related to a verb tampering attack and SAP_JTECHS.
[ "cpe:2.3:a:sap:solution_manager:7.1:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2011-4624
Cross-site scripting (XSS) vulnerability in facebook.php in the GRAND FlAGallery plugin (flash-album-gallery) before 1.57 for WordPress allows remote attackers to inject arbitrary web script or HTML via the i parameter.
[ "cpe:2.3:a:codeasily:grand_flagallery:*:*:*:*:*:wordpress:*:*" ]
null
null
null
4.3
GHSA-q433-xg7f-phjh
Unspecified vulnerability in the Enterprise Manager Base Platform component in Oracle Enterprise Manager Grid Control EM Base Platform 10.2.0.5 and 11.1.0.1; EM DB Control 11.1.0.7, 11.2.0.2, and 11.2.0.3; and EM Plugin for DB 12.1.0.2 and 12.1.0.3 allows remote attackers to affect integrity via unknown vectors related to DB Performance Advisories/UIs.
[]
null
null
null
null
GHSA-xcv5-2xw2-v43x
Panda Antivirus Platinum before 6.23.00 allows a remore attacker to cause a denial of service (crash) when a user selects an action for a malformed UPX packed executable file.
[]
null
null
null
null
RHSA-2011:0950
Red Hat Security Advisory: jboss-seam2 security update
JBoss Seam EL interpolation in exception handling
[ "cpe:/a:redhat:jboss_enterprise_application_platform:4.3.0::el4", "cpe:/a:redhat:jboss_enterprise_application_platform:4.3.0::el5" ]
null
null
null
null
CVE-2005-0686
Integer overflow in mlterm 2.5.0 through 2.9.1, with gdk-pixbuf support enabled, allows remote attackers to execute arbitrary code via a large image file that is used as a background.
[ "cpe:2.3:a:mlterm:mlterm:2.5:*:*:*:*:*:*:*", "cpe:2.3:a:mlterm:mlterm:2.6:*:*:*:*:*:*:*", "cpe:2.3:a:mlterm:mlterm:2.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:mlterm:mlterm:2.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:mlterm:mlterm:2.6.3:*:*:*:*:*:*:*", "cpe:2.3:a:mlterm:mlterm:2.7:*:*:*:*:*:*:*", "cpe:2.3:a:mlterm:mlterm:2.8:*:*:*:*:*:*:*", "cpe:2.3:a:mlterm:mlterm:2.9:*:*:*:*:*:*:*", "cpe:2.3:a:mlterm:mlterm:2.9.1:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2019-12815
An arbitrary file copy vulnerability in mod_copy in ProFTPD up to 1.3.5b allows for remote code execution and information disclosure without authentication, a related issue to CVE-2015-3306.
[ "cpe:2.3:a:proftpd:proftpd:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_cp_1543-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_cp_1543-1:-:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
GHSA-879j-7rrf-6xvm
This vulnerability is caused when SharePoint Server does not properly sanitize a specially crafted request to an affected SharePoint server.An authenticated attacker could exploit this vulnerability by sending a specially crafted request to an affected SharePoint server, aka 'Microsoft SharePoint Reflective XSS Vulnerability'.
[]
null
8.7
null
null
CVE-2022-45836
WordPress Download Manager Plugin <= 3.2.59 is vulnerable to Cross Site Scripting (XSS)
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in W3 Eden, Inc. Download Manager plugin <= 3.2.59 versions.
[ "cpe:2.3:a:wpdownloadmanager:download_manager:*:*:*:*:*:wordpress:*:*" ]
null
7.1
null
null
CVE-2016-6403
The Data in Motion (DMo) application in Cisco IOS 15.6(1)T and IOS XE, when the IOx feature set is enabled, allows remote attackers to cause a denial of service via a crafted packet, aka Bug IDs CSCuy82904, CSCuy82909, and CSCuy82912.
[ "cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*" ]
null
null
5.9
4.3
GHSA-cwg6-2p35-rmg5
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Pdfcrowd Save as PDF plugin by Pdfcrowd allows Stored XSS.This issue affects Save as PDF plugin by Pdfcrowd: from n/a through 3.2.1 .
[]
null
5.9
null
null
GHSA-8m29-g8hw-c32w
HCL BigFix Compliance is affected by a missing secure flag on a cookie. If a secure flag is not set, cookies may be stolen by an attacker using XSS, resulting in unauthorized access or session cookies could be transferred over an unencrypted channel.
[]
null
3.8
null
null
CVE-2020-29304
A cross-site scripting (XSS) vulnerability exists in the SabaiApps WordPress Directories Pro plugin version 1.3.45 and previous, allows attackers who have convinced a site administrator to import a specially crafted CSV file to inject arbitrary web script or HTML as the victim is proceeding through the file import workflow.
[ "cpe:2.3:a:directoriespro:directories_pro:*:*:*:*:*:wordpress:*:*" ]
null
6.1
null
4.3
CVE-2006-1808
Cross-site scripting (XSS) vulnerability in index.php in Lifetype 1.0.3 allows remote attackers to inject arbitrary web script or HTML via the show parameter in a Template operation.
[ "cpe:2.3:a:lifetype:lifetype:1.0.3:*:*:*:*:*:*:*" ]
null
null
null
2.6
GHSA-mpj5-8r3q-68mq
lv reads a .lv file from the current working directory, which allows local users to execute arbitrary commands as other lv users by placing malicious .lv files into other directories.
[]
null
null
null
null
CVE-2023-2152
SourceCodester Student Study Center Desk Management System index.php file inclusion
A vulnerability has been found in SourceCodester Student Study Center Desk Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file index.php. The manipulation of the argument page leads to file inclusion. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-226273 was assigned to this vulnerability.
[ "cpe:2.3:a:student_study_center_desk_management_system_project:student_study_center_desk_management_system:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:oretnom23:student_study_center_desk_management_system:1.0:*:*:*:*:*:*:*" ]
null
5.3
5.3
5
CVE-2024-48028
WordPress IP Loc8 plugin <= 1.1 - PHP Object Injection vulnerability
Deserialization of Untrusted Data vulnerability in Boyan Raichev IP Loc8 allows Object Injection.This issue affects IP Loc8: from n/a through 1.1.
[ "cpe:2.3:a:boyan_raichev:ip_loc8:*:*:*:*:*:*:*:*" ]
null
9.8
null
null
GHSA-2c4w-qc68-vvg4
Unspecified vulnerability in HP Service Manager 7.11, 9.21, 9.30, and 9.31 and Service Center 6.2.8 allows remote attackers to obtain privileged access via unknown vectors.
[]
null
null
null
null
RHSA-2016:1610
Red Hat Security Advisory: php54-php security update
PHP: sets environmental variable based on user supplied Proxy request header
[ "cpe:/a:redhat:rhel_software_collections:2::el6", "cpe:/a:redhat:rhel_software_collections:2::el7" ]
null
null
5
null
CVE-2022-30161
Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability
Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability
[ "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:-:r2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:azure:*:*:*" ]
null
8.8
null
null
CVE-2020-36535
MINMAX newsDia.php sql injection
A vulnerability classified as critical has been found in MINMAX. This affects an unknown part of the file /newsDia.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely.
[ "cpe:2.3:a:minmax:minmax:-:*:*:*:*:*:*:*" ]
null
6.3
null
null
CVE-2017-3401
Vulnerability in the Oracle Advanced Outbound Telephony component of Oracle E-Business Suite (subcomponent: User Interface). Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5 and 12.2.6. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Advanced Outbound Telephony. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Advanced Outbound Telephony, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Advanced Outbound Telephony accessible data as well as unauthorized update, insert or delete access to some of Oracle Advanced Outbound Telephony accessible data. CVSS v3.0 Base Score 8.2 (Confidentiality and Integrity impacts).
[ "cpe:2.3:a:oracle:advanced_outbound_telephony:12.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:advanced_outbound_telephony:12.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:advanced_outbound_telephony:12.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:advanced_outbound_telephony:12.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:advanced_outbound_telephony:12.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:advanced_outbound_telephony:12.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:advanced_outbound_telephony:12.2.6:*:*:*:*:*:*:*" ]
null
null
8.2
5.8
GHSA-xhh8-8jq9-8vf6
In the Linux kernel, the following vulnerability has been resolved:fs/jfs: Add validity check for db_maxag and db_agprefBoth db_maxag and db_agpref are used as the index of the db_agfree array, but there is currently no validity check for db_maxag and db_agpref, which can lead to errors.The following is related bug reported by Syzbot:UBSAN: array-index-out-of-bounds in fs/jfs/jfs_dmap.c:639:20 index 7936 is out of range for type 'atomic_t[128]'Add checking that the values of db_maxag and db_agpref are valid indexes for the db_agfree array.
[]
null
null
null
null
GHSA-5p53-r9cc-7fmj
This vulnerability allows remote attackers to execute arbitrary code on affected installations of SolarWinds Orion Job Scheduler 2020.2.1 HF 2. Authentication is required to exploit this vulnerability. The specific flaw exists within the JobRouterService WCF service. The issue is due to the WCF service configuration, which allows a critical resource to be accessed by unprivileged users. An attacker can leverage this vulnerability to execute code in the context of an administrator. Was ZDI-CAN-12007.
[]
null
null
null
null
CVE-2020-3407
Cisco IOS XE Software RESTCONF and NETCONF-YANG Access Control List Denial of Service Vulnerability
A vulnerability in the RESTCONF and NETCONF-YANG access control list (ACL) function of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause the device to reload. The vulnerability is due to incorrect processing of the ACL that is tied to the RESTCONF or NETCONF-YANG feature. An attacker could exploit this vulnerability by accessing the device using RESTCONF or NETCONF-YANG. A successful exploit could allow an attacker to cause the device to reload, resulting in a denial of service (DoS) condition.
[ "cpe:2.3:o:cisco:ios_xe:15.8\\(3\\)m3:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:1100-4g_integrated_services_router:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:1100-4gltegb_integrated_services_router:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:1100-4gltena_integrated_services_router:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:1100-4p_integrated_services_router:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:1100-6g_integrated_services_router:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:1100-8p_integrated_services_router:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:1100-lte_integrated_services_router:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:1100_integrated_services_router:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:1101-4p_integrated_services_router:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:1101_integrated_services_router:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:1109-2p_integrated_services_router:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:1109-4p_integrated_services_router:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:1109_integrated_services_router:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:1111x-8p_integrated_services_router:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:1111x_integrated_services_router:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:111x_integrated_services_router:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:1120_integrated_services_router:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:1160_integrated_services_router:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:4221_integrated_services_router:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:4331_integrated_services_router:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:4431_integrated_services_router:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:4451_integrated_services_router:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:4461_integrated_services_router:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_1000-x:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_1001:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_1001-x:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_1002:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_1002-x:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_1004:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_1006:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_1013:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr1001-hx:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr1001-hx-rf:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr1001-x-rf:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr1001-x-ws:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr1002-hx:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr1002-hx-rf:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr1002-hx-ws:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr1002-x-rf:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr1002-x-ws:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9800-40:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9800-80:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9800-cl:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9800-l:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9800-l-c:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9800-l-f:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_c9200-24p:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_c9200-24t:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_c9200-48p:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_c9200-48t:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_c9200l-24p-4g:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_c9200l-24p-4x:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_c9200l-24pxg-2y:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_c9200l-24pxg-4x:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_c9200l-24t-4g:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_c9200l-24t-4x:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_c9200l-48p-4g:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_c9200l-48p-4x:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_c9200l-48pxg-2y:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_c9200l-48pxg-4x:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_c9200l-48t-4g:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_c9200l-48t-4x:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_c9300-24p:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_c9300-24s:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_c9300-24t:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_c9300-24u:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_c9300-24ux:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_c9300-48p:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_c9300-48s:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_c9300-48t:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_c9300-48u:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_c9300-48un:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_c9300-48uxm:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_c9300l-24p-4g:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_c9300l-24p-4x:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_c9300l-24t-4g:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_c9300l-24t-4x:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_c9300l-48p-4g:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_c9300l-48p-4x:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_c9300l-48t-4g:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_c9300l-48t-4x:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_c9404r:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_c9407r:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_c9410r:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_c9500-12q:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_c9500-16x:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_c9500-24q:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_c9500-24y4c:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_c9500-32c:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_c9500-32qc:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_c9500-40x:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_c9500-48y4c:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:csr_1000v:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ws-c3650-12x48uq:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ws-c3650-12x48ur:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ws-c3650-12x48uz:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ws-c3650-24pd:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ws-c3650-24pdm:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ws-c3650-24ps:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ws-c3650-24td:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ws-c3650-24ts:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ws-c3650-48fd:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ws-c3650-48fq:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ws-c3650-48fqm:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ws-c3650-48fs:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ws-c3650-48pd:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ws-c3650-48pq:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ws-c3650-48ps:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ws-c3650-48td:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ws-c3650-48tq:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ws-c3650-48ts:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ws-c3650-8x24uq:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ws-c3850:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ws-c3850-12s:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ws-c3850-12x48u:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ws-c3850-12xs:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ws-c3850-24p:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ws-c3850-24s:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ws-c3850-24t:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ws-c3850-24u:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ws-c3850-24xs:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ws-c3850-24xu:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ws-c3850-48f:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ws-c3850-48p:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ws-c3850-48t:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ws-c3850-48u:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ws-c3850-48xs:-:*:*:*:*:*:*:*" ]
null
null
8.6
null
CVE-2024-10194
WAVLINK WN530H4/WN530HG4/WN572HG3 Front-End Authentication Page login.cgi Goto_chidx stack-based overflow
A vulnerability was found in WAVLINK WN530H4, WN530HG4 and WN572HG3 up to 20221028. It has been classified as critical. Affected is the function Goto_chidx of the file login.cgi of the component Front-End Authentication Page. The manipulation of the argument wlanUrl leads to stack-based buffer overflow. The attack can only be initiated within the local network. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
[ "cpe:2.3:h:wavlink:wn530h4:-:*:*:*:*:*:*:*", "cpe:2.3:h:wavlink:wn530hg4:-:*:*:*:*:*:*:*", "cpe:2.3:h:wavlink:wn572hg3:-:*:*:*:*:*:*:*", "cpe:2.3:o:wavlink:wn530h4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wavlink:wn530hg4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wavlink:wn572hg3_firmware:*:*:*:*:*:*:*:*" ]
8.7
8.8
8.8
8.3
GHSA-7m6w-6686-g729
The SiteOrigin Widgets Bundle plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's SiteOrigin Blog Widget in all versions up to, and including, 1.61.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
6.4
null
null
CVE-2021-40422
An authentication bypass vulnerability exists in the device password generation functionality of Swift Sensors Gateway SG3-1010. A specially-crafted network request can lead to remote code execution. An attacker can send a sequence of requests to trigger this vulnerability.
[ "cpe:2.3:o:swiftsensors:sg3-1010_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:swiftsensors:sg3-1010:-:*:*:*:*:*:*:*" ]
null
10
null
null
GHSA-456w-h99j-m5vj
Uncontrolled search path for the Intel(R) XTU software for Windows before version 7.14.2.14 may allow an authenticated user to potentially enable escalation of privilege via local access.
[]
5.4
6.7
null
null
GHSA-v5rr-334g-rqm6
Endian Firewall Community (aka EFW) 3.3.2 allows remote authenticated users to execute arbitrary OS commands via shell metacharacters in a backup comment.
[]
null
8.8
null
null
CVE-2005-2030
Ultimate PHP Board (UPB) 1.9.6 GOLD uses weak encryption for passwords in the users.dat file, which allows attackers to easily decrypt the passwords and gain privileges, possibly after exploiting CVE-2005-2005 to obtain users.dat.
[ "cpe:2.3:a:ultimate_php_board:ultimate_php_board:1.8:*:*:*:*:*:*:*", "cpe:2.3:a:ultimate_php_board:ultimate_php_board:1.8.2:*:*:*:*:*:*:*", "cpe:2.3:a:ultimate_php_board:ultimate_php_board:1.9:*:*:*:*:*:*:*", "cpe:2.3:a:ultimate_php_board:ultimate_php_board:1.9.6:*:*:*:*:*:*:*" ]
null
null
null
5
RHSA-2021:4000
Red Hat Security Advisory: kpatch-patch security update
kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks kernel: powerpc: KVM guest OS users can cause host OS memory corruption
[ "cpe:/o:redhat:rhel_e4s:7.7::server" ]
null
7.8
null
null
GHSA-vw4g-j3vp-w855
Vulnerability in the Oracle Outside In Technology component of Oracle Fusion Middleware (subcomponent: Outside In Filters). Supported versions that are affected are 8.5.2 and 8.5.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Outside In Technology. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Outside In Technology. Note: Outside In Technology is a suite of software development kits (SDKs). The protocol and CVSS score depend on the software that uses the Outside In Technology code. The CVSS score assumes that the software passes data received over a network directly to Outside In Technology code, but if data is not received over a network the CVSS score may be lower. CVSS v3.0 Base Score 7.5 (Availability impacts).
[]
null
null
7.5
null
CVE-2019-0099
Insufficient access control vulnerability in subsystem in Intel(R) SPS before version SPS_E3_05.00.04.027.0 may allow an unauthenticated user to potentially enable escalation of privilege via physical access.
[ "cpe:2.3:o:intel:server_platform_services_firmware:*:*:*:*:*:*:*:*" ]
null
null
6.8
4.6
CVE-2000-0427
The Aladdin Knowledge Systems eToken device allows attackers with physical access to the device to obtain sensitive information without knowing the PIN of the owner by resetting the PIN in the EEPROM.
[ "cpe:2.3:a:aladdin_knowledge_systems:etoken:3.3.3:*:*:*:*:*:*:*" ]
null
null
null
4.6
GHSA-fwr7-9543-4584
Gitlab Enterprise Edition version 10.1.0 is vulnerable to an insufficiently protected credential issue in the project service integration API endpoint resulting in an information disclosure of plaintext password.
[]
null
null
7.2
null
CVE-2008-1058
The tcp_respond function in netinet/tcp_subr.c in OpenBSD 4.1 and 4.2 allows attackers to cause a denial of service (panic) via crafted TCP packets. NOTE: some of these details are obtained from third party information.
[ "cpe:2.3:o:openbsd:openbsd:4.1:*:*:*:*:*:*:*", "cpe:2.3:o:openbsd:openbsd:4.2:*:*:*:*:*:*:*" ]
null
null
null
7.8
GHSA-65hv-4q6g-x7mh
PHP remote file inclusion vulnerability in language/lang_german/lang_main_album.php in phpBB Plus 1.53, and 1.53a before 20070922, allows remote attackers to execute arbitrary PHP code via a URL in the phpbb_root_path parameter.
[]
null
null
null
null
CVE-2017-13307
A elevation of privilege vulnerability in the Upstream kernel pci sysfs. Product: Android. Versions: Android kernel. Android ID: A-69128924.
[ "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*" ]
null
null
7.3
7.5
GHSA-2m9c-c5w9-q97c
Cross-site scripting (XSS) vulnerability in posts.asp for ASP-DEv XM Forum RC3 allows remote attackers to inject arbitrary web script or HTML via a "javascript:" URL in an IMG tag.
[]
null
null
null
null
CVE-2020-1257
An elevation of privilege vulnerability exists when the Diagnostics Hub Standard Collector Service improperly handles file operations, aka 'Diagnostics Hub Standard Collector Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1278, CVE-2020-1293.
[ "cpe:2.3:a:microsoft:visual_studio:2015:update3:*:*:*:*:*:*", "cpe:2.3:a:microsoft:visual_studio_2017:*:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*" ]
null
7.8
null
4.6
GHSA-w73w-5m7g-f7qc
Authorization bypass in github.com/dgrijalva/jwt-go
jwt-go allows attackers to bypass intended access restrictions in situations with `[]string{}` for `m["aud"]` (which is allowed by the specification). Because the type assertion fails, "" is the value of aud. This is a security problem if the JWT token is presented to a service that lacks its own audience check. There is no patch available and users of jwt-go are advised to migrate to [golang-jwt](https://github.com/golang-jwt/jwt) at version 3.2.1
[]
null
7.5
null
null
GHSA-m7m7-9gfg-6cxv
SiberianCMS - CWE-434: Unrestricted Upload of File with Dangerous Type - A malicious user with administrative privileges may be able to upload a dangerous filetype via an unspecified method
[]
null
7.2
null
null
CVE-2025-22624
FooGallery – Responsive Photo Gallery, Image Viewer, Justified, Masonry and Carousel 2.4.29 - Reflected cross-site scripting (XSS)
FooGallery – Responsive Photo Gallery, Image Viewer, Justified, Masonry and Carousel 2.4.29 was found to be vulnerable. The web application dynamically generates web content without validating the source of the potentially untrusted data in myapp/extensions/albums/admin/class-meta boxes.php.
[]
6.4
null
null
null
GHSA-9vpp-hrxf-x9vx
FAC Guestbook 3.01 stores sensitive information under the web root with insufficient access control, which allows remote attackers to download a database via a direct request for db/gbdb.mdb. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
[]
null
null
null
null
GHSA-rpmv-jvfw-f6xg
An SSRF issue in the PDFMyURL service allows a remote attacker to obtain sensitive information and execute arbitrary code via a POST request in the url parameter
[]
null
9.8
null
null