id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
189k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
patch_commit_url
stringlengths
36
232
GHSA-2f28-f6j6-pc52
Use-after-free vulnerability in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application, aka "Win32k Use After Free Vulnerability."
[]
null
null
null
null
null
CVE-2025-52915
K7RKScan.sys 23.0.0.10, part of the K7 Security Anti-Malware suite, allows an admin-privileged user to send crafted IOCTL requests to terminate processes that are protected through a third-party implementation. This is caused by insufficient caller validation in the driver's IOCTL handler, enabling unauthorized processes to perform those actions in kernel space. Successful exploitation can lead to denial of service by disrupting critical third-party services or applications.
[]
null
7.2
null
null
null
CVE-2022-43622
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DIR-1935 1.03 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of Login requests to the web management portal. When parsing the HNAP_AUTH header, the process does not properly validate the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-16139.
[ "cpe:2.3:o:dlink:dir-1935_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dir-1935_firmware:1.03:b1:*:*:*:*:*:*", "cpe:2.3:o:dlink:dir-1935_firmware:1.03:b2:*:*:*:*:*:*", "cpe:2.3:h:dlink:dir-1935:-:*:*:*:*:*:*:*" ]
null
null
8.8
null
null
GHSA-m3mf-v96r-7q6w
Vulnerability in the Solaris Cluster component of Oracle Sun Systems Products Suite (subcomponent: HA for MySQL). Supported versions that are affected are 3.3 and 4.3. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Solaris Cluster executes to compromise Solaris Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Solaris Cluster accessible data as well as unauthorized access to critical data or complete access to all Solaris Cluster accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Solaris Cluster. CVSS 3.0 Base Score 7.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L).
[]
null
null
7.3
null
null
RHSA-2015:2559
Red Hat Security Advisory: Red Hat JBoss BRMS 6.2.0 update
batik: XML External Entity (XXE) injection in SVG parsing jsoup: XSS vulnerability related to incomplete tags at EOF apache-commons-collections: InvokerTransformer code execution during deserialisation
[ "cpe:/a:redhat:jboss_brms:6.2" ]
null
null
null
null
null
GHSA-v9xf-2767-3v8v
Adobe Reader and Acrobat 10.x before 10.1.16 and 11.x before 11.0.13, Acrobat and Acrobat Reader DC Classic before 2015.006.30094, and Acrobat and Acrobat Reader DC Continuous before 2015.009.20069 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted use of the value attribute, a different vulnerability than CVE-2015-6685, CVE-2015-6686, CVE-2015-6693, CVE-2015-6694, and CVE-2015-7622.
[]
null
null
null
null
null
GHSA-fvf5-xp83-vrqp
ICEcoder vulnerable to Path Traversal
ICEcoder v8.1 allows attackers to execute a directory traversal.
[]
null
7.5
null
null
null
GHSA-8p2x-j374-7m2g
The web management service on Cisco Content Service series 11000 switches (CSS) before WebNS 4.01B29s or WebNS 4.10B17s allows a remote attacker to gain additional privileges by directly requesting the web management URL instead of navigating through the interface.
[]
null
null
null
null
null
CVE-2007-1331
Multiple cross-site scripting (XSS) vulnerabilities in TKS Banking Solutions ePortfolio 1.0 Java allow remote attackers to inject arbitrary web script or HTML via unspecified vectors that bypass the client-side protection scheme, one of which may be the q parameter to the search program. NOTE: some of these details are obtained from third party information.
[ "cpe:2.3:a:tks_banking_solutions:eportfolio:1.0:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
CVE-2017-6777
A vulnerability in the ConfD server of the Cisco Elastic Services Controller (ESC) could allow an authenticated, remote attacker to acquire sensitive system information. The vulnerability is due to insufficient protection of sensitive files on the system. An attacker could exploit this vulnerability by logging into the ConfD server and executing certain commands. An exploit could allow an unprivileged user to view configuration parameters that can be maliciously used. Cisco Bug IDs: CSCvd76409. Known Affected Releases: 2.3, 2.3(2).
[ "cpe:2.3:a:cisco:elastic_services_controller:2.3:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:elastic_services_controller:2.3\\(2\\):*:*:*:*:*:*:*" ]
null
null
4.9
4
null
GHSA-pjj6-9mq4-p5qc
Incorrect default permissions in some Intel Arc RGB Controller software before version 1.06 may allow an authenticated user to potentially enable escalation of privilege via local access.
[]
null
6.7
null
null
null
CVE-2022-44235
Beijing Zed-3 Technologies Co.,Ltd VoIP simpliclty ASG 8.5.0.17807 (20181130-16:12) is vulnerable to Cross Site Scripting (XSS).
[ "cpe:2.3:a:zed-3:voip_simplicity_asg:8.5.0.17807:*:*:*:*:*:*:*" ]
null
6.1
null
null
null
GHSA-pr9v-gfw5-55x8
An issue was discovered in sela through 20200412. A NULL pointer dereference exists in the function rice::RiceDecoder::process() located in rice_decoder.c. It allows an attacker to cause Denial of Service.
[]
null
null
null
null
null
RHSA-2019:3735
Red Hat Security Advisory: php:7.2 security update
php: underflow in env_path_info in fpm_main.c
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
null
8.1
null
null
CVE-2025-31731
WordPress Author Bio Shortcode Plugin <= 2.5.3 - Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Philip John Author Bio Shortcode allows Stored XSS. This issue affects Author Bio Shortcode: from n/a through 2.5.3.
[]
null
6.5
null
null
null
GHSA-86hf-jfr6-r7p7
The affected On-Premise cnMaestro allows an unauthenticated attacker to access the cnMaestro server and execute arbitrary code in the privileges of the web server. This lack of validation could allow an attacker to append arbitrary data to the logger command.
[]
null
9.8
null
null
null
RHSA-2014:1905
Red Hat Security Advisory: Red Hat OpenShift Enterprise 1.2 - Final Retirement Notice
This is the final notification for the retirement of Red Hat OpenShift Enterprise 1.2.
[]
null
null
null
null
null
GHSA-6888-x99r-6c49
Microsoft Internet Explorer 6 through 11 allows remote attackers to gain privileges via a crafted web site, aka "Internet Explorer Elevation of Privilege Vulnerability," a different vulnerability than CVE-2015-1704.
[]
null
null
null
null
null
CVE-2015-2106
Unspecified vulnerability in HP Integrated Lights-Out (iLO) firmware 2 before 2.27, 3 before 1.82, and 4 before 2.10 allows remote attackers to bypass intended access restrictions or cause a denial of service via unknown vectors.
[ "cpe:2.3:o:hp:integrated_lights-out_2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:hp:integrated_lights-out_3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:hp:integrated_lights-out_4_firmware:*:*:*:*:*:*:*:*" ]
null
null
null
6.4
null
RHSA-2020:3842
Red Hat Security Advisory: OpenShift Container Platform 4.5.13 openshift-enterprise-console-container security update
SSL/TLS: Birthday attack against 64-bit block ciphers (SWEET32)
[ "cpe:/a:redhat:openshift:4.5::el7" ]
null
null
7.5
null
null
GHSA-qm6g-qrgf-9jh7
Cross-Site Request Forgery (CSRF) vulnerability leading to Stored Cross-Site Scripting (XSS) in CallRail, Inc. CallRail Phone Call Tracking plugin <= 0.4.9 at WordPress.
[]
null
6.1
null
null
null
RHSA-2022:0237
Red Hat Security Advisory: Red Hat OpenStack Platform 16.2 (etcd) security update
golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet golang: crypto/tls: certificate of wrong type is causing TLS client to panic golang: net/http: limit growth of header canonicalization cache
[ "cpe:/a:redhat:openstack:16.2::el8" ]
null
7.5
null
null
null
CVE-2024-27067
xen/evtchn: avoid WARN() when unbinding an event channel
In the Linux kernel, the following vulnerability has been resolved: xen/evtchn: avoid WARN() when unbinding an event channel When unbinding a user event channel, the related handler might be called a last time in case the kernel was built with CONFIG_DEBUG_SHIRQ. This might cause a WARN() in the handler. Avoid that by adding an "unbinding" flag to struct user_event which will short circuit the handler.
[]
null
null
null
null
null
CVE-2023-22409
Junos OS: SRX Series, MX Series with SPC3: When an inconsistent NAT configuration exists and a specific CLI command is issued the SPC will reboot
An Unchecked Input for Loop Condition vulnerability in a NAT library of Juniper Networks Junos OS allows a local authenticated attacker with low privileges to cause a Denial of Service (DoS). When an inconsistent "deterministic NAT" configuration is present on an SRX, or MX with SPC3 and then a specific CLI command is issued the SPC will crash and restart. Repeated execution of this command will lead to a sustained DoS. Such a configuration is characterized by the total number of port blocks being greater than the total number of hosts. An example for such configuration is: [ services nat source pool TEST-POOL address x.x.x.0/32 to x.x.x.15/32 ] [ services nat source pool TEST-POOL port deterministic block-size 1008 ] [ services nat source pool TEST-POOL port deterministic host address y.y.y.0/24] [ services nat source pool TEST-POOL port deterministic include-boundary-addresses] where according to the following calculation: 65536-1024=64512 (number of usable ports per IP address, implicit) 64512/1008=64 (number of port blocks per Nat IP) x.x.x.0/32 to x.x.x.15/32 = 16 (NAT IP addresses available in NAT pool) total port blocks in NAT Pool = 64 blocks per IP * 16 IPs = 1024 Port blocks host address y.y.y.0/24 = 256 hosts (with include-boundary-addresses) If the port block size is configured to be 4032, then the total port blocks are (64512/4032) * 16 = 256 which is equivalent to the total host addresses of 256, and the issue will not be seen. This issue affects Juniper Networks Junos OS on SRX Series, and MX Series with SPC3: All versions prior to 19.4R3-S10; 20.1 version 20.1R1 and later versions; 20.2 versions prior to 20.2R3-S6; 20.3 versions prior to 20.3R3-S6; 20.4 versions prior to 20.4R3-S5; 21.1 versions prior to 21.1R3-S4; 21.2 versions prior to 21.2R3-S3; 21.3 versions prior to 21.3R3-S3; 21.4 versions prior to 21.4R3-S1; 22.1 versions prior to 22.1R2-S2, 22.1R3; 22.2 versions prior to 22.2R2.
[ "cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:-:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r1-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r1-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r1-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r2-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r2-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r2-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r2-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r2-s5:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r2-s6:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r2-s7:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r3-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r3-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r3-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r3-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r3-s5:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r3-s6:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r3-s7:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r3-s8:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r3-s9:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.1:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.1:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.1:r1-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.1:r1-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.1:r1-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.1:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.1:r2-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.1:r2-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.1:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.1:r3-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.1:r3-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.1:r3-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.1:r3-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.2:-:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.2:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.2:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.2:r1-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.2:r1-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.2:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.2:r2-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.2:r2-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.2:r2-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.2:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.2:r3-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.2:r3-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.2:r3-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.2:r3-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.2:r3-s5:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.3:-:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.3:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.3:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.3:r1-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.3:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.3:r2-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.3:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.3:r3-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.3:r3-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.3:r3-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.3:r3-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.3:r3-s5:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.4:-:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.4:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.4:r2-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.4:r2-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.4:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.4:r3-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.4:r3-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.4:r3-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.4:r3-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.1:-:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.1:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.1:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.1:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.1:r2-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.1:r2-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.1:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.1:r3-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.1:r3-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.1:r3-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.2:r2-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.2:r2-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.2:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.2:r3-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.2:r3-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.3:-:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.3:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.3:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.3:r1-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.3:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.3:r2-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.3:r2-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.3:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.3:r3-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.3:r3-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.4:-:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.4:r1-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.4:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.4:r2-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.4:r2-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.4:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:22.1:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:22.1:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:22.1:r1-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:22.1:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:22.1:r2-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:22.2:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:22.2:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:22.2:r1-s2:*:*:*:*:*:*", "cpe:2.3:h:juniper:mx10:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:mx10000:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:mx10003:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:mx10008:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:mx10016:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:mx104:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:mx150:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:mx2008:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:mx2010:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:mx2020:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:mx204:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:mx240:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:mx40:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:mx480:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:mx5:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:mx80:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:mx960:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx100:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx110:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx1400:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx1500:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx210:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx220:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx240:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx240h2:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx240m:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx300:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx320:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx340:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx3400:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx345:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx3600:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx380:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx4000:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx4100:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx4200:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx4600:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx5000:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx5400:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx550:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx550_hm:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx550m:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx5600:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx5800:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx650:-:*:*:*:*:*:*:*" ]
null
5.5
null
null
null
RHSA-2022:7469
Red Hat Security Advisory: container-tools:4.0 security and bug fix update
cri-o: memory exhaustion on the node when access to the kube api golang: crash in a golang.org/x/crypto/ssh server runc: incorrect handling of inheritable capabilities
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
5.6
null
null
null
GHSA-4x92-r8v7-j2m9
A vulnerability classified as problematic was found in Watchdog Anti-Virus 1.4.214.0. Affected by this vulnerability is an unknown functionality in the library wsdk-driver.sys of the component IoControlCode Handler. The manipulation leads to denial of service. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-223291.
[]
null
5.5
null
null
null
CVE-2024-2840
The Enhanced Media Library plugin for WordPress is vulnerable to Stored Cross-Site Scripting via media upload functionality in all versions up to, and including, 2.8.9 due to the plugin allowing 'dfxp' files to be uploaded. This makes it possible for authenticated attackers, with author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
5.4
null
null
null
GHSA-qwxp-946x-p86v
An issue was discovered in Xen through 4.11.x on AMD x86 platforms, possibly allowing guest OS users to gain host OS privileges because TLB flushes do not always occur after IOMMU mapping changes.
[]
null
null
7.8
null
null
GHSA-2ggh-34r5-2jc7
The opj_dwt_decode_1* functions in dwt.c in OpenJPEG, as used in PDFium in Google Chrome before 47.0.2526.73, allow remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via crafted JPEG 2000 data that is mishandled during a discrete wavelet transform.
[]
null
null
null
null
null
CVE-2022-21272
Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: Portal). Supported versions that are affected are 8.57, 8.58 and 8.59. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in PeopleSoft Enterprise PeopleTools, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise PeopleTools accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).
[ "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.57:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.58:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.59:*:*:*:*:*:*:*" ]
null
6.1
null
null
null
CVE-2024-54024
An improper neutralization of special elements used in an OS command ('OS Command Injection') vulnerability [CWE-78] in Fortinet FortiIsolator before version 2.4.6 allows a privileged attacker with super-admin profile and CLI access to execute unauthorized code via specifically crafted HTTP requests.
[]
null
7
null
null
null
CVE-2019-17660
A cross-site scripting (XSS) vulnerability in admin/translate/translateheader_view.php in LimeSurvey 3.19.1 and earlier allows remote attackers to inject arbitrary web script or HTML via the tolang parameter, as demonstrated by the index.php/admin/translate/sa/index/surveyid/336819/lang/ PATH_INFO.
[ "cpe:2.3:a:limesurvey:limesurvey:*:*:*:*:*:*:*:*" ]
null
6.1
null
4.3
null
GHSA-m74c-c3qx-pxjq
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Joni Halabi Block Controller allows Reflected XSS.This issue affects Block Controller: from n/a through 1.4.2.
[]
null
7.1
null
null
null
CVE-2023-46151
WordPress Product Category Tree Plugin <= 2.5 is vulnerable to Cross Site Request Forgery (CSRF)
Cross-Site Request Forgery (CSRF) vulnerability in AWESOME TOGI Product Category Tree plugin <= 2.5 versions.
[ "cpe:2.3:a:awesometogi:product_category_tree:*:*:*:*:*:wordpress:*:*" ]
null
4.3
null
null
null
GHSA-f7vv-q49x-rvww
The E2EE password entropy generated by Rocket.Chat Mobile prior to version 4.5.1 is insufficient, allowing attackers to crack it if they have the appropriate time and resources.
[]
null
null
6.7
null
null
CVE-2018-3566
In Qualcomm Android for MSM, Firefox OS for MSM, and QRD Android with all Android releases from CAF using the Linux kernel before security patch level 2018-04-05, a buffer overwrite may occur in ProcSetReqInternal() due to missing length check.
[ "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*" ]
null
null
7.8
6.8
null
CVE-2020-27769
In ImageMagick versions before 7.0.9-0, there are outside the range of representable values of type 'float' at MagickCore/quantize.c.
[ "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*" ]
null
3.3
null
4.3
null
CVE-2023-1687
SourceCodester Simple Task Allocation System cross site scripting
A vulnerability classified as problematic has been found in SourceCodester Simple Task Allocation System 1.0. Affected is an unknown function of the file LoginRegistration.php?a=register_user. The manipulation of the argument Fullname leads to cross site scripting. It is possible to launch the attack remotely. The identifier of this vulnerability is VDB-224244.
[ "cpe:2.3:a:task_allocation_system_project:task_allocation_system:1.0:*:*:*:*:*:*:*" ]
null
3.5
3.5
4
null
CVE-2006-4161
Directory traversal vulnerability in the avatar_gallery action in profile.php in XennoBB 2.1.0 and earlier allows remote attackers to read arbitrary files via a .. (dot dot) in the category parameter.
[ "cpe:2.3:a:xennobb:xennobb:*:*:*:*:*:*:*:*", "cpe:2.3:a:xennobb:xennobb:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:xennobb:xennobb:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:xennobb:xennobb:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:xennobb:xennobb:1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:xennobb:xennobb:1.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:xennobb:xennobb:1.0.5:*:*:*:*:*:*:*" ]
null
null
null
5
null
CVE-2022-28317
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley MicroStation CONNECT 10.16.02.34. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of IFC files. The issue results from the lack of proper initialization of memory prior to accessing it. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-16369.
[ "cpe:2.3:a:bentley:microstation:*:*:*:*:*:*:*:*", "cpe:2.3:a:bentley:view:*:*:*:*:*:*:*:*" ]
null
null
7.8
null
null
GHSA-3v4v-w999-cvf5
SquirrelMail 1.2.5 and earlier allows authenticated SquirrelMail users to execute arbitrary commands by modifying the THEME variable in a cookie.
[]
null
null
null
null
null
GHSA-7g9x-xhfc-88x2
Cross-site scripting (XSS) vulnerability in include/ajax/blogInfo.php in LiveStreet 0.2 allows remote attackers to inject arbitrary web script or HTML via the URI, as demonstrated by a SCRIPT element in an arbitrary parameter such as the asd parameter.
[]
null
null
null
null
null
CVE-2017-9716
In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, the qbt1000 driver implements an alternative channel for usermode applications to talk to QSEE applications.
[ "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*" ]
null
null
7.8
7.2
null
RHSA-2018:1647
Red Hat Security Advisory: java-1.7.0-openjdk security update
hw: cpu: speculative store bypass
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
5.6
null
null
GHSA-gwq4-xh4c-9x95
E-WEBInformationCo. FS-EZViewer(Web) exposes sensitive information in the service. A remote attacker can obtain the database configuration file path through the webpage source code without login. Accessing this path allows attacker to obtain the database credential with the highest privilege and database host IP address. With this information, attackers can connect to the database and perform actions such as adding, modifying, or deleting database contents.
[]
null
9.8
null
null
null
GHSA-2v86-4x6m-fpw5
Unspecified vulnerability in Oracle Solaris 11 allows local users to affect availability via unknown vectors related to Kernel/VM.
[]
null
null
null
null
null
CVE-2021-26628
MaxBoard XSS and File Upload Vulnerability
Insufficient script validation of the admin page enables XSS, which causes unauthorized users to steal admin privileges. When uploading file in a specific menu, the verification of the files is insufficient. It allows remote attackers to upload arbitrary files disguising them as image files.
[ "cpe:2.3:a:maxb:maxboard:*:*:*:*:*:*:*:*", "cpe:2.3:a:linux:linux_kernel:-:*:*:*:*:*:*:*" ]
null
8.1
null
null
null
CVE-2025-5220
FreeFloat FTP Server GET Command buffer overflow
A vulnerability was found in FreeFloat FTP Server 1.0.0 and classified as critical. Affected by this issue is some unknown functionality of the component GET Command Handler. The manipulation leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
[]
6.9
7.3
7.3
7.5
null
CVE-2025-6841
code-projects Product Inventory System edit_product.php sql injection
A vulnerability has been found in code-projects Product Inventory System 1.0 and classified as critical. This vulnerability affects unknown code of the file /admin/edit_product.php. The manipulation of the argument ID leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
[]
5.1
4.7
4.7
5.8
null
CVE-2021-47649
udmabuf: validate ubuf->pagecount
In the Linux kernel, the following vulnerability has been resolved: udmabuf: validate ubuf->pagecount Syzbot has reported GPF in sg_alloc_append_table_from_pages(). The problem was in ubuf->pages == ZERO_PTR. ubuf->pagecount is calculated from arguments passed from user-space. If user creates udmabuf with list.size == 0 then ubuf->pagecount will be also equal to zero; it causes kmalloc_array() to return ZERO_PTR. Fix it by validating ubuf->pagecount before passing it to kmalloc_array().
[]
null
null
null
null
null
GHSA-h355-hm5h-cm8h
Agnai File Disclosure Vulnerability: JSON via Path Traversal
CWE-35: Path Traversalhttps://cwe.mitre.org/data/definitions/35.htmlCVSSv3.1 4.3 - MediumCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:NSummaryA vulnerability has been discovered in **Agnai** that permits attackers to read arbitrary JSON files at attacker-chosen locations on the server. This issue can lead to unauthorized access to sensitive information and exposure of confidential configuration files. **This only affects installations with `JSON_STORAGE` enabled which is intended to local/self-hosting only.**Details & PoCThis is a path traversal vulnerability. An attacker can exploit this vulnerability by sending a specially crafted request:In this example, the attacker retrieves the `package.json` file content from the server by manipulating the file path.The request is processed by the `loadMessages` handler in `agnai/srv/api/json/index.ts` and a file is read and returned to the client. The read filename is constructed using string interpolation, with no guard or check for path traversal: https://github.com/agnaistic/agnai/blob/2b878b7ca66471c5dd080197ad9ca2f7f0022655/srv/api/json/index.ts#L77ConstraintsEnvironment constraints: JSON Storage enabled (non standard)ImpactThis vulnerability is classified as a path traversal vulnerability. Specifically, any JSON file on the server which the webserver process has read privileges for, can be disclosed to the attacker.Credit@ropwareJB@noe233
[]
2.3
4.3
null
null
null
CVE-2021-40042
There is a release of invalid pointer vulnerability in some Huawei products, successful exploit may cause the process and service abnormal. Affected product versions include: CloudEngine 12800 V200R019C10SPC800, V200R019C10SPC900; CloudEngine 5800 V200R019C10SPC800, V200R020C00SPC600; CloudEngine 6800 versions V200R019C10SPC800, V200R019C10SPC900, V200R020C00SPC600, V300R020C00SPC200; CloudEngine 7800 V200R019C10SPC800.
[ "cpe:2.3:o:huawei:cloudengine_12800_firmware:v200r019c10spc800:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:cloudengine_12800_firmware:v200r019c10spc900:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:cloudengine_12800:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:cloudengine_5800_firmware:v200r019c10spc800:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:cloudengine_5800_firmware:v200r020c00spc600:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:cloudengine_5800:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:cloudengine_6800_firmware:v200r019c10spc800:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:cloudengine_6800_firmware:v200r019c10spc900:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:cloudengine_6800_firmware:v200r020c00spc600:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:cloudengine_6800_firmware:v300r020c00spc200:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:cloudengine_6800:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:cloudengine_7800_firmware:v200r019c10spc800:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:cloudengine_7800:-:*:*:*:*:*:*:*" ]
null
6.5
null
4
null
CVE-2020-7654
All versions of snyk-broker before 4.73.1 are vulnerable to Information Exposure. It logs private keys if logging level is set to DEBUG.
[ "cpe:2.3:a:synk:broker:*:*:*:*:*:*:*:*" ]
null
7.5
null
4.3
null
GHSA-8xqw-f37j-96v8
Protection mechanism failure in the Intel(R) Ethernet 500 Series Controller drivers for VMware before version 1.10.0.13 may allow an authenticated user to potentially enable escalation of privilege via local access.
[]
null
7.8
null
null
null
GHSA-rcm5-8ghg-jhvv
Cross-site request forgery (CSRF) vulnerability in LOGITEC LAN-W300N/PR5B allows remote attackers to hijack the authentication of administrators via a specially crafted URL. As a result, unintended operations to the device such as changes of the device settings may be conducted.
[]
null
null
null
null
null
GHSA-6mhg-8xpv-r877
The ZwOpenSection function in Integrity Protection Driver (IPD) 1.4 and earlier allows local users to cause a denial of service (crash) via an invalid pointer in the "oa" argument.
[]
null
null
null
null
null
GHSA-hmcj-3g4j-7m53
XSS exists in SAMSUNG X7400GX SyncThru Web Service V6.A6.25 V11.01.05.25_08-21-2015 in "/sws/leftmenu.sws" in multiple parameters: ruiFw_id, ruiFw_pid, ruiFw_title.
[]
null
null
6.1
null
null
CVE-2006-3373
Unspecified vulnerability in the client/bin/logfetch script in Hobbit 4.2-beta allows local users to read arbitrary files, related to logfetch running as setuid root.
[ "cpe:2.3:a:hobbit_monitor:hobbit_monitor:4.2_beta:*:*:*:*:*:*:*" ]
null
null
null
2.1
null
GHSA-58pq-phhq-59vj
Trend Micro VPN Proxy One Pro, version 5.8.1012 and below is vulnerable to an arbitrary file overwrite or create attack but is limited to local Denial of Service (DoS) and under specific conditions can lead to elevation of privileges.
[]
null
5.3
null
null
null
GHSA-m32w-3ggq-xj4p
Buffer overflow in the drmgr command in IBM AIX 5.2 and 5.3 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a long path name.
[]
null
null
null
null
null
CVE-2022-20181
Product: AndroidVersions: Android kernelAndroid ID: A-210936609References: N/A
[ "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*" ]
null
7.5
null
7.8
null
CVE-2017-7218
The Management Web Interface in Palo Alto Networks PAN-OS before 7.1.9 allows remote authenticated users to gain privileges via unspecified request parameters.
[ "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*" ]
null
null
7.8
4.6
null
CVE-2009-2454
Cross-site scripting (XSS) vulnerability in Citrix Web Interface 4.6, 5.0, and 5.0.1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
[ "cpe:2.3:a:citrix:web_interface:4.6:*:*:*:*:*:*:*", "cpe:2.3:a:citrix:web_interface:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:citrix:web_interface:5.0.1:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
CVE-2021-1874
A logic issue was addressed with improved state management. This issue is fixed in iOS 14.5 and iPadOS 14.5. An application may be able to execute arbitrary code with kernel privileges.
[ "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" ]
null
8.8
null
9.3
null
CVE-2018-6972
VMware ESXi (6.7 before ESXi670-201806401-BG, 6.5 before ESXi650-201806401-BG, 6.0 before ESXi600-201806401-BG and 5.5 before ESXi550-201806401-BG), Workstation (14.x before 14.1.2), and Fusion (10.x before 10.1.2) contain a denial-of-service vulnerability due to NULL pointer dereference issue in RPC handler. Successful exploitation of this issue may allow attackers with normal user privileges to crash their VMs.
[ "cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:5.5:-:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:5.5:1:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:5.5:2:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:5.5:3a:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:5.5:3b:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:5.5:550-20170901001s:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:5.5:550-20170904001:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:-:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:1:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:1a:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:1b:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:2:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:3:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:3a:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201504401:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201505401:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201507101:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201507102:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201507401:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201507402:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201507403:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201507404:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201507405:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201507406:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201507407:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201509101:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201509102:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201509201:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201509202:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201509203:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201509204:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201509205:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201509206:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201509207:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201509208:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201509209:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201509210:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201510401:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201511401:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201601101:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201601102:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201601401:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201601402:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201601403:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201601404:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201601405:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201602401:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201603101:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201603102:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201603201:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201603202:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201603203:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201603204:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201603205:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201603206:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201603207:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201603208:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201605401:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201608101:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201608401:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201608402:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201608403:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201608404:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201608405:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201610410:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201611401:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201611402:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201611403:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201702101:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201702102:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201702201:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201702202:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201702203:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201702204:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201702205:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201702206:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201702207:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201702208:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201702209:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201702210:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201702211:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201702212:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201703401:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201706101:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201706102:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201706103:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:-:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:2:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201701001:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201703001:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201703002:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201704001:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201707101:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201707102:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201707103:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201707201:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201707202:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201707203:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201707204:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201707205:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201707206:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201707207:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201707208:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201707209:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201707210:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201707211:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201707212:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201707213:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201707214:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201707215:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201707216:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201707217:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201707218:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201707219:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201707220:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201707221:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201710001:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201712001:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201803001:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201806001:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:-:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201806001:*:*:*:*:*:*" ]
null
6.5
null
4
null
GHSA-rm6v-g2jg-m432
Adobe Flash Player before 10.3.183.86 and 11.x before 11.7.700.202 on Windows and Mac OS X, before 10.3.183.86 and 11.x before 11.2.202.285 on Linux, before 11.1.111.54 on Android 2.x and 3.x, and before 11.1.115.58 on Android 4.x; Adobe AIR before 3.7.0.1860; and Adobe AIR SDK & Compiler before 3.7.0.1860 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-2728, CVE-2013-3324, CVE-2013-3325, CVE-2013-3326, CVE-2013-3327, CVE-2013-3328, CVE-2013-3329, CVE-2013-3330, CVE-2013-3331, CVE-2013-3333, CVE-2013-3334, and CVE-2013-3335.
[]
null
null
null
null
null
GHSA-qc2r-75r5-j2hv
Chrome OS before 53.0.2785.144 allows remote attackers to execute arbitrary commands at boot.
[]
null
null
9.8
null
null
CVE-2024-13552
SupportCandy – Helpdesk & Customer Support Ticket System <= 3.3.0 - Insecure Direct Object Reference
The SupportCandy – Helpdesk & Customer Support Ticket System plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 3.3.0 via file upload due to missing validation on a user controlled key. This makes it possible for authenticated attackers to download attachments for support tickets that don't belong to them. If an admin enables tickets for guests, this can be exploited by unauthenticated attackers.
[]
null
4.3
null
null
null
CVE-2021-26881
Microsoft Windows Media Foundation Remote Code Execution Vulnerability
Microsoft Windows Media Foundation Remote Code Execution Vulnerability
[ "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1803:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1803:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_1909:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2004:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_server_20h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008_r2:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012_r2:*:*:*:*:*:*:x64:*" ]
null
7.5
null
null
null
GHSA-qwxw-cr32-mppw
The generic_file_splice_write function in fs/splice.c in the Linux kernel before 2.6.19 does not properly strip setuid and setgid bits when there is a write to a file, which allows local users to gain the privileges of a different group, and obtain sensitive information or possibly have unspecified other impact, by splicing into an inode in order to create an executable file in a setgid directory, a different vulnerability than CVE-2008-4210.
[]
null
null
null
null
null
CVE-2022-24957
DHC Vision eQMS through 5.4.8.322 has Persistent XSS due to insufficient encoding of untrusted input/output. To exploit the vulnerability, the attacker has to create or edit a new information object and use the XSS payload as the name. Any user that opens the object's version or history tab will be attacked.
[ "cpe:2.3:a:dhc-vision:eqms:*:*:*:*:*:*:*:*" ]
null
5.4
null
3.5
null
CVE-2024-34381
WordPress PropertyHive plugin <= 2.0.10 - Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in PropertyHive allows Stored XSS.This issue affects PropertyHive: from n/a through 2.0.10.
[ "cpe:2.3:a:propertyhive:propertyhive:*:*:*:*:*:*:*:*" ]
null
6.5
null
null
null
CVE-2017-16574
This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader 8.3.1.21155. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of Image filters. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the current process. Was ZDI-CAN-5079.
[ "cpe:2.3:a:foxitsoftware:foxit_reader:8.3.1.21155:*:*:*:*:*:*:*" ]
null
null
6.5
4.3
null
GHSA-rq7c-3qxq-cq5m
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.2.20. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).
[]
null
null
8.6
null
null
RHSA-2017:2390
Red Hat Security Advisory: qemu-kvm-rhev security update
Qemu: qemu-nbd: server breaks with SIGPIPE upon client abort
[ "cpe:/o:redhat:enterprise_linux:7::hypervisor" ]
null
null
5.3
null
null
GHSA-q46h-crrj-ggjm
The WooCommerce Upload Files plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the upload_files() function in all versions up to, and including, 84.3. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
[]
null
9.8
null
null
null
GHSA-9whw-7g7j-hr7q
In all Qualcomm products with Android releases from CAF using the Linux kernel, while processing a vendor sub-command, a buffer over-read can occur.
[]
null
null
5.5
null
null
CVE-2021-27609
SAP Focused RUN versions 200, 300, does not perform necessary authorization checks for an authenticated user, which allows a user to call the oData service and manipulate the activation for the SAP EarlyWatch Alert service data collection and sending to SAP without the intended authorization.
[ "cpe:2.3:a:sap:focused_run:200:*:*:*:*:*:*:*", "cpe:2.3:a:sap:focused_run:300:*:*:*:*:*:*:*" ]
null
null
4.6
null
null
CVE-2022-44256
TOTOLINK LR350 V9.3.5u.6369_B20220309 contains a post-authentication buffer overflow via parameter lang in the setLanguageCfg function.
[ "cpe:2.3:o:totolink:nr1800x_firmware:9.3.5u.6369_b20220309:*:*:*:*:*:*:*", "cpe:2.3:h:totolink:nr1800x:-:*:*:*:*:*:*:*" ]
null
8.8
null
null
null
GHSA-gxcv-w2wp-7xvm
The plural form formula in ngettext family of calls in php-gettext before 1.0.12 allows remote attackers to execute arbitrary code.
[]
null
9.8
null
null
null
CVE-2021-22325
There is an Information Disclosure vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may result in video streams being intercepted during transmission.
[ "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*" ]
null
5.3
null
5
null
GHSA-wr9r-499g-57gv
TRENDnet TEW-651BR 2.04B1, TEW-652BRP 3.04b01, and TEW-652BRU 1.00b12 devices contain a Store Cross-site scripting (XSS) vulnerability via the firewallRule_Name_1.1.1.0.0 parameter on the /firewall_setting.htm page.
[]
null
4.8
null
null
null
CVE-2025-4569
An insecure sensitive key storage issue was found in MyASUS. potentially allowing unauthorized actor to obtain a token that could be used to communicate with certain services. Refer to the 'Security Update for for MyASUS' section on the ASUS Security Advisory for more information.
[]
7.7
null
null
null
null
CVE-2024-7472
Email Injection Vulnerability in lunary-ai/lunary
lunary-ai/lunary v1.2.26 contains an email injection vulnerability in the Send email verification API (/v1/users/send-verification) and Sign up API (/auth/signup). An unauthenticated attacker can inject data into outgoing emails by bypassing the extractFirstName function using a different whitespace character (e.g., \xa0). This vulnerability can be exploited to conduct phishing attacks, damage the application's brand, cause legal and compliance issues, and result in financial impact due to unauthorized email usage.
[ "cpe:2.3:a:lunary-ai:lunary:*:*:*:*:*:*:*:*", "cpe:2.3:a:lunary:lunary:1.2.26:*:*:*:*:*:*:*" ]
null
null
5.3
null
null
GHSA-vjjr-whj3-xg6q
IBM WebSphere Application Server (WAS) 6.1 before 6.1.0.45, 7.0 before 7.0.0.25, 8.0 before 8.0.0.5, and 8.5 before 8.5.0.1, when multi-domain support is configured, does not purge password data from the authentication cache, which has unspecified impact and remote attack vectors.
[]
null
null
null
null
null
GHSA-vjg6-2q25-fqrp
SQL Injection in 74cms 3.2.0 via the x parameter to ajax_officebuilding.php.
[]
null
null
null
null
null
CVE-2007-4662
Buffer overflow in the php_openssl_make_REQ function in PHP before 5.2.4 has unknown impact and attack vectors.
[ "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2023-29200
contao/core-bundle has path traversal vulnerability in the file manager
Contao is an open source content management system. Prior to versions 4.9.40, 4.13.21, and 5.1.4, logged in users can list arbitrary system files in the file manager by manipulating the Ajax request. However, it is not possible to read the contents of these files. Users should update to Contao 4.9.40, 4.13.21 or 5.1.4 to receive a patch. There are no known workarounds.
[ "cpe:2.3:a:contao:contao:*:*:*:*:*:*:*:*" ]
null
4.3
null
null
null
RHSA-2024:3265
Red Hat Security Advisory: grafana security update
grafana: vulnerable to authorization bypass golang-fips/openssl: Memory leaks in code encrypting and decrypting RSA payloads
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.5
null
null
null
GHSA-4j7q-5rcw-6f5j
The vulnerability allows an unauthenticated remote attacker to upload arbitrary files under the context of the application OS user (“root”) via a crafted HTTP request.
[]
null
6.5
null
null
null
GHSA-v2rh-5v88-rgvh
Moodle context freezing
A vulnerability was found in moodle before version 3.6.3. The get_with_capability_join and get_users_by_capability functions were not taking context freezing into account when checking user capabilities
[]
null
null
4.3
null
null
GHSA-gj26-g5qf-jrh7
Cross-site Scripting in librenms
Cross-site Scripting (XSS) - Stored in Packagist librenms/librenms prior to 22.1.0.
[]
null
5.4
null
null
null
GHSA-r8j8-g8mg-2j28
Multiple cross-site scripting (XSS) vulnerabilities in HP Network Node Manager i 9.10 allow remote attackers to inject arbitrary web script or HTML via the (1) node parameter to nnm/mibdiscover; (2) nodename parameter to nnm/protected/configurationpoll.jsp, (3) nnm/protected/ping.jsp, (4) nnm/protected/statuspoll.jsp, or (5) nnm/protected/traceroute.jsp; or (6) field parameter to nmm/validate. NOTE: this might be a duplicate of CVE-2011-4155 or CVE-2011-4156.
[]
null
null
null
null
null
CVE-2019-9682
Dahua devices with Build time before December 2019 use strong security login mode by default, but in order to be compatible with the normal login of early devices, some devices retain the weak security login mode that users can control. If the user uses a weak security login method, an attacker can monitor the device network to intercept network packets to attack the device. So it is recommended that the user disable this login method.
[ "cpe:2.3:o:dahuasecurity:sd6al_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:sd6al:-:*:*:*:*:*:*:*", "cpe:2.3:o:dahuasecurity:sd5a_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:sd5a:-:*:*:*:*:*:*:*", "cpe:2.3:o:dahuasecurity:sd1a_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:sd1a:-:*:*:*:*:*:*:*", "cpe:2.3:o:dahuasecurity:ptz1a_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:ptz1a:-:*:*:*:*:*:*:*", "cpe:2.3:o:dahuasecurity:sd50_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:sd50:-:*:*:*:*:*:*:*", "cpe:2.3:o:dahuasecurity:sd52c_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:sd52c:-:*:*:*:*:*:*:*", "cpe:2.3:o:dahuasecurity:ipc-hx5842h_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:ipc-hx5842h:-:*:*:*:*:*:*:*", "cpe:2.3:o:dahuasecurity:ipc-hx7842h_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:ipc-hx7842h:-:*:*:*:*:*:*:*", "cpe:2.3:o:dahuasecurity:ipc-hx2xxx_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:ipc-hx2xxx:-:*:*:*:*:*:*:*", "cpe:2.3:o:dahuasecurity:ipc-hxxx5x4x_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:ipc-hxxx5x4x:-:*:*:*:*:*:*:*", "cpe:2.3:o:dahuasecurity:n42b1p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:n42b1p:-:*:*:*:*:*:*:*", "cpe:2.3:o:dahuasecurity:n42b2p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:n42b2p:-:*:*:*:*:*:*:*", "cpe:2.3:o:dahuasecurity:n42b3p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:n42b3p:-:*:*:*:*:*:*:*", "cpe:2.3:o:dahuasecurity:n52a4p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:n52a4p:-:*:*:*:*:*:*:*", "cpe:2.3:o:dahuasecurity:n54a4p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:n54a4p:-:*:*:*:*:*:*:*", "cpe:2.3:o:dahuasecurity:n52b2p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:n52b2p:-:*:*:*:*:*:*:*", "cpe:2.3:o:dahuasecurity:n52b5p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:n52b5p:-:*:*:*:*:*:*:*", "cpe:2.3:o:dahuasecurity:n52b3p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:n52b3p:-:*:*:*:*:*:*:*", "cpe:2.3:o:dahuasecurity:n54b2p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:n54b2p:-:*:*:*:*:*:*:*", "cpe:2.3:o:dahuasecurity:ipc-hdbw1320e-w_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:ipc-hdbw1320e-w:-:*:*:*:*:*:*:*" ]
null
8.1
null
6.8
null
GHSA-pxwq-5hrx-rxf2
** DISPUTED ** Jelsoft vBulletin 3.5.4 allows remote attackers to register multiple arbitrary users and cause a denial of service (resource consumption) via a large number of requests to register.php. NOTE: the vendor has disputed this vulnerability, stating "If you have the CAPTCHA enabled then the registrations wont even go through. ... if you are talking about the flood being allowed in the first place then surely this is something that should be handled at the server level."
[]
null
null
null
null
null
GHSA-cx83-c67h-h9gr
An issue was discovered in mspack/chmd.c in libmspack before 0.7alpha. There is an off-by-one error in the TOLOWER() macro for CHM decompression.
[]
null
null
8.8
null
null
CVE-2018-18025
In ImageMagick 7.0.8-13 Q16, there is a heap-based buffer over-read in the EncodeImage function of coders/pict.c, which allows attackers to cause a denial of service via a crafted SVG image file.
[ "cpe:2.3:a:imagemagick:imagemagick:7.0.8-13:q16:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" ]
null
null
6.5
4.3
null
GHSA-75r9-8mmv-vmxm
Cross-site scripting (XSS) vulnerability in the Node basket module for Drupal allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors.
[]
null
null
null
null
null
GHSA-869p-rj24-pjcc
IBM License Metric Tool 9 before 9.1.0.2 and Endpoint Manager for Software Use Analysis 9 before 9.1.0.2 do not send an X-Frame-Options HTTP header in response to requests for the login page, which allows remote attackers to conduct clickjacking attacks via vectors involving a FRAME element.
[]
null
null
null
null
null
GHSA-2fvh-4fwg-94q3
Heap-based buffer overflow in SAP Crystal Reports Server 2008 has unknown impact and attack vectors, as demonstrated by a certain module in VulnDisco Pack Professional 8.3 through 8.11. NOTE: as of 20090917, this disclosure has no actionable information. However, because the VulnDisco Pack author is a reliable researcher, the issue is being assigned a CVE identifier for tracking purposes.
[]
null
null
null
null
null