id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
189k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
patch_commit_url
stringlengths
36
232
GHSA-ch9r-7w7v-gg4p
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Drupal Tooltip allows Cross-Site Scripting (XSS).This issue affects Tooltip: from 0.0.0 before 1.1.2.
[]
null
4.8
null
null
null
CVE-2023-25607
An improper neutralization of special elements used in an OS Command ('OS Command Injection') vulnerability [CWE-78 ] in FortiManager 7.2.0 through 7.2.2, 7.0.0 through 7.0.7, 6.4.0 through 6.4.11, 6.2 all versions, 6.0 all versions, FortiAnalyzer 7.2.0 through 7.2.2, 7.0.0 through 7.0.7, 6.4.0 through 6.4.11, 6.2 all versions, 6.0 all versions and FortiADC  7.1.0, 7.0.0 through 7.0.3, 6.2 all versions, 6.1 all versions, 6.0 all versions management interface may allow an authenticated attacker with at least READ permissions on system settings to execute arbitrary commands on the underlying shell due to an unsafe usage of the wordexp function.
[ "cpe:2.3:a:fortinet:fortiadc:*:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiadc:7.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortianalyzer:*:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortianalyzer:7.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortianalyzer:7.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortimanager:7.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortimanager:7.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortimanager:7.2.2:*:*:*:*:*:*:*" ]
null
7.4
null
null
null
GHSA-5jjj-4rqq-qph2
The Insert or Embed Articulate Content into WordPress plugin through 4.3000000023 lacks validation of URLs when adding iframes, allowing attackers to inject an iFrame in the page and thus load arbitrary content from any page.
[]
null
5.4
null
null
null
GHSA-fr2m-xv6j-fvqg
Multiple buffer overflows in the AIM PicEditor 9.5.1.8 ActiveX control in YGPPicEdit.dll in AOL You've Got Pictures (YGP) Picture Editor allow remote attackers to cause a denial of service (browser crash) via a long string in the (1) DisplayName, (2) FinalSavePath, (3) ForceSaveTo, (4) HiddenControls, (5) InitialEditorScreen, (6) Locale, (7) Proxy, and (8) UserAgent property values.
[]
null
null
null
null
null
CVE-2019-1003072
Jenkins WildFly Deployer Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.
[ "cpe:2.3:a:jenkins:wildfly_deployer:*:*:*:*:*:jenkins:*:*" ]
null
8.8
null
4
null
GHSA-7xfq-638r-5cw2
The gdk-pixbuf configuration in Mozilla Firefox before 43.0 on Linux GNOME platforms incorrectly enables the JasPer decoder, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted JPEG 2000 image.
[]
null
null
null
null
null
CVE-2019-4143
The IBM Cloud Private Key Management Service (IBM Cloud Private 3.1.1 and 3.1.2) could allow a local user to obtain sensitive from the KMS plugin container log. IBM X-Force ID: 158348.
[ "cpe:2.3:a:ibm:cloud_private:3.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:cloud_private:3.1.2:*:*:*:*:*:*:*" ]
null
null
5.5
null
null
CVE-2013-3326
Adobe Flash Player before 10.3.183.86 and 11.x before 11.7.700.202 on Windows and Mac OS X, before 10.3.183.86 and 11.x before 11.2.202.285 on Linux, before 11.1.111.54 on Android 2.x and 3.x, and before 11.1.115.58 on Android 4.x; Adobe AIR before 3.7.0.1860; and Adobe AIR SDK & Compiler before 3.7.0.1860 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-2728, CVE-2013-3324, CVE-2013-3325, CVE-2013-3327, CVE-2013-3328, CVE-2013-3329, CVE-2013-3330, CVE-2013-3331, CVE-2013-3332, CVE-2013-3333, CVE-2013-3334, and CVE-2013-3335.
[ "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:adobe_air_sdk:*:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_eus:6.4:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_eus:5.9:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_eus:6.4:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:-:*:*:*", "cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:*" ]
null
null
null
10
null
GHSA-cgf9-m6wc-gqrr
Symantec pcAnywhere through 12.5.3, Altiris IT Management Suite pcAnywhere Solution 7.0 (aka 12.5.x) and 7.1 (aka 12.6.x), Altiris Client Management Suite pcAnywhere Solution 7.0 (aka 12.5.x) and 7.1 (aka 12.6.x), and Altiris Deployment Solution Remote pcAnywhere Solution 7.1 (aka 12.5.x and 12.6.x) allow remote attackers to cause a denial of service (application crash or hang) via (1) malformed data from a client, (2) malformed data from a server, or (3) an invalid response.
[]
null
null
null
null
null
GHSA-rg5g-5cq4-g4m7
VMware vRealize Automation (vRA) prior to 7.4.0 contains a vulnerability in the handling of session IDs. Exploitation of this issue may lead to the hijacking of a valid vRA user's session.
[]
null
null
9.8
null
null
CVE-2000-0756
Microsoft Outlook 2000 does not properly process long or malformed fields in vCard (.vcf) files, which allows attackers to cause a denial of service.
[ "cpe:2.3:a:microsoft:outlook:98:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:outlook:2000:*:*:*:*:*:*:*" ]
null
null
null
5
null
CVE-2020-7303
DLP ePO extension - Cross-site scripting
Cross Site scripting vulnerability in McAfee Data Loss Prevention (DLP) ePO extension prior to 11.5.3 allows authenticated remote user to trigger scripts to run in a user's browser via adding a new label.
[ "cpe:2.3:a:mcafee:data_loss_prevention:*:*:*:*:*:*:*:*" ]
null
4.1
null
null
null
GHSA-92gg-745w-464g
Ingenico Telium 2 POS terminals have an insecure TRACE protocol. This is fixed in Telium 2 SDK v9.32.03 patch N.
[]
null
6.8
null
null
null
CVE-2017-17544
A privilege escalation vulnerability in Fortinet FortiOS 6.0.0 to 6.0.6, 5.6.0 to 5.6.10, 5.4 and below allows admin users to elevate their profile to super_admin via restoring modified configurations.
[ "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*" ]
null
7.2
null
9
null
GHSA-7rrf-6v6j-5cxh
JetAudio 7.5.3 COWON Media Center allows remote attackers to cause a denial of service (memory consumption and application crash) via a long string at the end of a .wav file.
[]
null
null
null
null
null
GHSA-46j6-7ch6-hjj7
A vulnerability was found in code-projects Simple Online Hotel Reservation System 1.0. It has been classified as critical. This affects an unknown part of the file /admin/confirm_reserve.php. The manipulation of the argument transaction_id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
[]
5.5
7.3
null
null
null
GHSA-3qfx-4gmg-xcwx
An elevation of privilege vulnerability exists in the way that the Windows Kernel handles objects in memory, aka "Windows Kernel Elevation of Privilege Vulnerability." This affects Windows Server 2012 R2, Windows RT 8.1, Windows Server 2016, Windows 8.1, Windows 10, Windows 10 Servers.
[]
null
null
7.8
null
null
CVE-2015-2580
Unspecified vulnerability in Oracle Sun Solaris 10 and 11.2 allows local users to affect availability via vectors related to NFSv4.
[ "cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*", "cpe:2.3:o:oracle:solaris:11.2:*:*:*:*:*:*:*" ]
null
null
null
1.9
null
CVE-2021-21094
Adobe Bridge PDF File Parsing Out-Of-Bounds Write vulnerability could lead to arbitrary code execution
Adobe Bridge versions 10.1.1 (and earlier) and 11.0.1 (and earlier) are affected by an Out-of-bounds write vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[ "cpe:2.3:a:adobe:bridge:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
null
7.8
null
null
RHSA-2016:2915
Red Hat Security Advisory: atomic-openshift security and bug fix update
3: Pulling of any image is possible with it manifest
[ "cpe:/a:redhat:openshift:3.1::el7", "cpe:/a:redhat:openshift:3.2::el7", "cpe:/a:redhat:openshift:3.3::el7" ]
null
null
3.1
null
null
GHSA-mvv5-p63w-gv97
Remote attackers can use the iPrint web-browser ActiveX plugin in Novell iPrint Client before 5.42 for Windows XP/Vista/Win7 to execute code by overflowing the "name" parameter.
[]
null
null
8.8
null
null
GHSA-vxvm-35wp-ppw8
A denial-of-service issue was discovered in MediaWiki 1.37.x before 1.37.2. Rendering of w/index.php?title=Special%3AWhatLinksHere&target=Property%3AP31&namespace=1&invert=1 can take more than thirty seconds. There is a DDoS risk.
[]
null
7.5
null
null
null
CVE-2022-3752
Rockwell Automation GuardLogix and ControlLogix controllers Vulnerable to Denial-Of-Service Attack
An unauthorized user could use a specially crafted sequence of Ethernet/IP messages, combined with heavy traffic loading to cause a denial-of-service condition in Rockwell Automation Logix controllers resulting in a major non-recoverable fault. If the target device becomes unavailable, a user would have to clear the fault and redownload the user project file to bring the device back online and continue normal operation.
[ "cpe:2.3:o:rockwellautomation:compactlogix_5480_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:rockwellautomation:compactlogix_5480:-:*:*:*:*:*:*:*", "cpe:2.3:o:rockwellautomation:compactlogix_5580_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:rockwellautomation:compactlogix_5580:-:*:*:*:*:*:*:*", "cpe:2.3:o:rockwellautomation:guardlogix_5580_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:rockwellautomation:guardlogix_5580:-:*:*:*:*:*:*:*", "cpe:2.3:o:rockwellautomation:compact_guardlogix_5380_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:rockwellautomation:compact_guardlogix_5380:-:*:*:*:*:*:*:*", "cpe:2.3:o:rockwellautomation:compactlogix_5380_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:rockwellautomation:compactlogix_5380:-:*:*:*:*:*:*:*" ]
null
8.6
null
null
null
CVE-2022-41195
Due to lack of proper memory management, when a victim opens a manipulated EAAmiga Interchange File Format (.iff, 2d.x3d) file received from untrusted sources in SAP 3D Visual Enterprise Viewer - version 9, it is possible that a Remote Code Execution can be triggered when payload forces a stack-based overflow or a re-use of dangling pointer which refers to overwritten space in memory.
[ "cpe:2.3:a:sap:3d_visual_enterprise_viewer:*:*:*:*:*:*:*:*" ]
null
7.8
null
null
null
CVE-2008-3218
Multiple cross-site scripting (XSS) vulnerabilities in Drupal 6.x before 6.3 allow remote attackers to inject arbitrary web script or HTML via vectors related to (1) free tagging taxonomy terms, which are not properly handled on node preview pages, and (2) unspecified OpenID values.
[ "cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:8:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
CVE-2022-23019
On BIG-IP version 16.1.x before 16.1.2, 15.1.x before 15.1.4.1, 14.1.x before 14.1.4.4, and all versions of 13.1.x and 12.1.x, when a message routing type virtual server is configured with both Diameter Session and Router Profiles, undisclosed traffic can cause an increase in memory resource utilization. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
[ "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*" ]
null
7.5
null
7.1
null
CVE-2008-5304
Cross-site scripting (XSS) vulnerability in TWiki before 4.2.4 allows remote attackers to inject arbitrary web script or HTML via the %URLPARAM{}% variable.
[ "cpe:2.3:a:twiki:twiki:*:*:*:*:*:*:*:*", "cpe:2.3:a:twiki:twiki:4.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:twiki:twiki:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:twiki:twiki:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:twiki:twiki:4.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:twiki:twiki:4.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:twiki:twiki:4.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:twiki:twiki:4.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:twiki:twiki:4.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:twiki:twiki:4.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:twiki:twiki:4.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:twiki:twiki:4.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:twiki:twiki:4.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:twiki:twiki:2000-12-01:*:*:*:*:*:*:*", "cpe:2.3:a:twiki:twiki:2001-09-01:*:*:*:*:*:*:*", "cpe:2.3:a:twiki:twiki:2001-12-01:*:*:*:*:*:*:*", "cpe:2.3:a:twiki:twiki:2003-02-01:*:*:*:*:*:*:*", "cpe:2.3:a:twiki:twiki:2004-09-01:*:*:*:*:*:*:*", "cpe:2.3:a:twiki:twiki:2004-09-02:*:*:*:*:*:*:*", "cpe:2.3:a:twiki:twiki:2004-09-03:*:*:*:*:*:*:*", "cpe:2.3:a:twiki:twiki:2004-09-04:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
CVE-2020-1692
Moodle before version 3.7.2 is vulnerable to information exposure of service tokens for users enrolled in the same course.
[ "cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*" ]
null
8.1
null
null
null
RHSA-2020:2369
Red Hat Security Advisory: Red Hat OpenShift Service Mesh openshift-istio-kiali-rhel7-operator-container security update
openshift-service-mesh/kiali-rhel7-operator: /etc/passwd is given incorrect privileges
[ "cpe:/a:redhat:service_mesh:1.1::el7" ]
null
7
null
null
null
CVE-2019-1187
XmlLite Runtime Denial of Service Vulnerability
A denial of service vulnerability exists when the XmlLite runtime (XmlLite.dll) improperly parses XML input. An attacker who successfully exploited this vulnerability could cause a denial of service against an XML application. A remote unauthenticated attacker could exploit this vulnerability by issuing specially crafted requests to an XML application. The update addresses the vulnerability by correcting how the XmlLite runtime parses XML input.
[ "cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1803:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1803:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_server_1803:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_1903:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:itanium:*", "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_server_2008_r2:*:*:*:*:*:*:itanium:*", "cpe:2.3:o:microsoft:windows_server_2008_r2:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012_r2:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:standard:*:itanium:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:standard:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*" ]
null
5.5
null
null
null
CVE-2015-1652
Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-1666.
[ "cpe:2.3:a:microsoft:internet_explorer:6:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*" ]
null
null
null
9.3
null
CVE-2023-2839
Divide By Zero in gpac/gpac
Divide By Zero in GitHub repository gpac/gpac prior to 2.2.2.
[ "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*" ]
null
null
6.8
null
null
GHSA-q5qw-7fqr-83mr
Out-of-bounds read in Windows Media allows an authorized attacker to elevate privileges locally.
[]
null
7.8
null
null
null
CVE-2006-6542
SQL injection vulnerability in news.php in Fantastic News 2.1.4 and earlier allows remote attackers to execute arbitrary SQL commands via the id parameter.
[ "cpe:2.3:a:fantastic_news:fantastic_news:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
GHSA-x96q-w32v-vmr6
A Stack Overflow vulnerability exists in Binaryen 103 via the printf_common function.
[]
null
5.5
null
null
null
CVE-2014-5988
The Azkend Gold (aka com.the10tons.azkend.gold) application 1.2.6 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[ "cpe:2.3:a:getjar:azkend_gold:1.2.6:*:*:*:*:android:*:*" ]
null
null
null
5.4
null
GHSA-qmwh-rh2g-3682
Magento 2 Community Edition Cross-site Scripting Vulnerability
A stored cross-site scripting vulnerability exists in the admin panel of Magento Open Source prior to 1.9.4.2, and Magento Commerce prior to 1.14.4.2, Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2. This could be exploited by an authenticated user with privileges to newsletter templates.
[]
null
null
4.8
null
null
GHSA-868g-c3hc-28w2
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0045.
[]
null
7.8
null
null
null
GHSA-pqgj-wx7f-6f72
A vulnerability has been found in SourceCodester Engineers Online Portal 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file my_classmates.php. The manipulation of the argument teacher_class_student_id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-240907.
[]
null
null
6.3
null
null
cisco-sa-webex-meetings-UtbwOR4Q
Cisco Webex Training Unauthorized Meeting Join Vulnerability
A vulnerability in Cisco Webex Training could allow an authenticated, remote attacker to join a password-protected meeting without providing the meeting password. The vulnerability is due to improper validation of input to API requests that are a part of meeting join flow. An attacker could exploit this vulnerability by sending an API request to the application, which would return a URL that includes a meeting join page that is prepopulated with the meeting username and password. A successful exploit could allow the attacker to join the password-protected meeting. The attacker would be visible in the attendee list of the meeting. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
[]
null
5.3
null
null
null
CVE-2025-6177
ChromeOS MiniOS Root Code Execution Bypass While Dev Mode Blocked
Privilege Escalation in MiniOS in Google ChromeOS (16063.45.2 and potentially others) on enrolled devices allows a local attacker to gain root code execution via exploiting a debug shell (VT3 console) accessible through specific key combinations during developer mode entry and MiniOS access, even when developer mode is blocked by device policy or Firmware Write Protect (FWMP).
[]
null
7.4
null
null
null
GHSA-hv79-5q2x-qf8j
A vulnerability in the web-based management interface of Cisco Data Center Network Manager (DCNM) could allow an unauthenticated, remote attacker to bypass authentication and execute arbitrary actions with administrative privileges on an affected device. The vulnerability is due to improper session management on affected DCNM software. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected device. A successful exploit could allow the attacker to gain administrative access on the affected device.
[]
null
null
null
null
null
CVE-2009-4391
Cross-site scripting (XSS) vulnerability in the File list (dr_blob) extension 2.1.1 for TYPO3 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
[ "cpe:2.3:a:daniel_regelein:dr_blob:2.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
GHSA-g6j9-m726-789h
In Boa, there is a possible escalation of privilege due to a stack buffer overflow. This could lead to remote escalation of privilege from a proximal attacker with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: A20210008; Issue ID: OSBNB00123241.
[]
null
9.8
null
null
null
GHSA-qpvm-hm98-hw68
Clam AntiVirus (ClamAV) 0.88.6 allows remote attackers to cause a denial of service (stack overflow and application crash) by wrapping many layers of multipart/mixed content around a document, a different vulnerability than CVE-2006-5874 and CVE-2006-6406.
[]
null
null
null
null
null
CVE-2017-16835
The "Photo,Video Locker-Calculator" application 12.0 for Android has android:allowBackup="true" in AndroidManifest.xml, which allows attackers to obtain sensitive cleartext information via an "adb backup '-f smart.calculator.gallerylock'" command.
[ "cpe:2.3:a:photo\\,video_locker-calculator_project:photo\\,video_locker-calculator:12.0:*:*:*:*:android:*:*" ]
null
null
7.5
5
null
GHSA-x2rq-mrc8-r79h
Netgear Nighthawk AC1900 Smart WiFi Dual Band Gigabit Router R7000-V1.0.11.134_10.2.119 is vulnerable to Buffer Overflow via the wl binary in firmware. There is a stack overflow vulnerability caused by strncat
[]
null
9.8
null
null
null
GHSA-j2h9-4h2f-9pqx
An issue has been discovered in Bento4 1.5.1-624. AP4_AvccAtom::Create in Core/Ap4AvccAtom.cpp has a heap-based buffer over-read.
[]
null
null
8.8
null
null
CVE-2007-2665
PHP remote file inclusion vulnerability in block.php in PhpFirstPost 0.1 allows remote attackers to execute arbitrary PHP code via a URL in the Include parameter.
[ "cpe:2.3:a:php_firstpost:php_firstpost:0.1:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2021-43880
Windows Mobile Device Management Elevation of Privilege Vulnerability
Windows Mobile Device Management Elevation of Privilege Vulnerability
[ "cpe:2.3:o:microsoft:windows_11_21h2:10.0.22000.376:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_11_21h2:10.0.22000.376:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*" ]
null
5.5
null
null
null
RHSA-2016:1585
Red Hat Security Advisory: qemu-kvm security update
Qemu: virtio: unbounded memory allocation on host via guest leading to DoS
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
3.4
null
null
CVE-1999-0480
Local attackers can conduct a denial of service in Midnight Commander 4.x with a symlink attack.
[ "cpe:2.3:a:midnight_commander:midnight_commander:4:*:*:*:*:*:*:*" ]
null
null
null
2.1
null
CVE-2025-32706
Windows Common Log File System Driver Elevation of Privilege Vulnerability
Improper input validation in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally.
[]
null
7.8
null
null
null
GHSA-q2hw-c235-rp9r
A downgrade issue was addressed with additional code-signing restrictions. This issue is fixed in macOS Sonoma 14.5. A local attacker may gain access to Keychain items.
[]
null
7.7
null
null
null
CVE-2020-9287
An Unsafe Search Path vulnerability in FortiClient EMS online installer 6.2.1 and below may allow a local attacker with control over the directory in which FortiClientEMSOnlineInstaller.exe resides to execute arbitrary code on the system via uploading malicious Filter Library DLL files in that directory.
[ "cpe:2.3:a:fortinet:forticlient_emergency_management_server:*:*:*:*:*:*:*:*" ]
null
7.8
null
6.9
null
CVE-2005-0206
The patch for integer overflow vulnerabilities in Xpdf 2.0 and 3.0 (CVE-2004-0888) is incomplete for 64-bit architectures on certain Linux distributions such as Red Hat, which could leave Xpdf users exposed to the original vulnerabilities.
[ "cpe:2.3:a:ascii:ptex:3.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:cstex:cstetex:2.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:easy_software_products:cups:1.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:easy_software_products:cups:1.0.4_8:*:*:*:*:*:*:*", "cpe:2.3:a:easy_software_products:cups:1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:easy_software_products:cups:1.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:easy_software_products:cups:1.1.4_2:*:*:*:*:*:*:*", "cpe:2.3:a:easy_software_products:cups:1.1.4_3:*:*:*:*:*:*:*", "cpe:2.3:a:easy_software_products:cups:1.1.4_5:*:*:*:*:*:*:*", "cpe:2.3:a:easy_software_products:cups:1.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:easy_software_products:cups:1.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:easy_software_products:cups:1.1.10:*:*:*:*:*:*:*", "cpe:2.3:a:easy_software_products:cups:1.1.12:*:*:*:*:*:*:*", "cpe:2.3:a:easy_software_products:cups:1.1.13:*:*:*:*:*:*:*", "cpe:2.3:a:easy_software_products:cups:1.1.14:*:*:*:*:*:*:*", "cpe:2.3:a:easy_software_products:cups:1.1.15:*:*:*:*:*:*:*", "cpe:2.3:a:easy_software_products:cups:1.1.16:*:*:*:*:*:*:*", "cpe:2.3:a:easy_software_products:cups:1.1.17:*:*:*:*:*:*:*", "cpe:2.3:a:easy_software_products:cups:1.1.18:*:*:*:*:*:*:*", "cpe:2.3:a:easy_software_products:cups:1.1.19:*:*:*:*:*:*:*", "cpe:2.3:a:easy_software_products:cups:1.1.19_rc5:*:*:*:*:*:*:*", "cpe:2.3:a:easy_software_products:cups:1.1.20:*:*:*:*:*:*:*", "cpe:2.3:a:gnome:gpdf:0.110:*:*:*:*:*:*:*", "cpe:2.3:a:gnome:gpdf:0.112:*:*:*:*:*:*:*", "cpe:2.3:a:gnome:gpdf:0.131:*:*:*:*:*:*:*", "cpe:2.3:a:kde:koffice:1.3:*:*:*:*:*:*:*", "cpe:2.3:a:kde:koffice:1.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:kde:koffice:1.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:kde:koffice:1.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:kde:koffice:1.3_beta1:*:*:*:*:*:*:*", "cpe:2.3:a:kde:koffice:1.3_beta2:*:*:*:*:*:*:*", "cpe:2.3:a:kde:koffice:1.3_beta3:*:*:*:*:*:*:*", "cpe:2.3:a:kde:kpdf:3.2:*:*:*:*:*:*:*", "cpe:2.3:a:pdftohtml:pdftohtml:0.32a:*:*:*:*:*:*:*", "cpe:2.3:a:pdftohtml:pdftohtml:0.32b:*:*:*:*:*:*:*", "cpe:2.3:a:pdftohtml:pdftohtml:0.33:*:*:*:*:*:*:*", "cpe:2.3:a:pdftohtml:pdftohtml:0.33a:*:*:*:*:*:*:*", "cpe:2.3:a:pdftohtml:pdftohtml:0.34:*:*:*:*:*:*:*", "cpe:2.3:a:pdftohtml:pdftohtml:0.35:*:*:*:*:*:*:*", "cpe:2.3:a:pdftohtml:pdftohtml:0.36:*:*:*:*:*:*:*", "cpe:2.3:a:sgi:propack:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:tetex:tetex:1.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:tetex:tetex:1.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:tetex:tetex:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:tetex:tetex:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:tetex:tetex:2.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:xpdf:xpdf:0.90:*:*:*:*:*:*:*", "cpe:2.3:a:xpdf:xpdf:0.91:*:*:*:*:*:*:*", "cpe:2.3:a:xpdf:xpdf:0.92:*:*:*:*:*:*:*", "cpe:2.3:a:xpdf:xpdf:0.93:*:*:*:*:*:*:*", "cpe:2.3:a:xpdf:xpdf:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:xpdf:xpdf:1.0a:*:*:*:*:*:*:*", "cpe:2.3:a:xpdf:xpdf:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:xpdf:xpdf:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:xpdf:xpdf:2.1:*:*:*:*:*:*:*", "cpe:2.3:a:xpdf:xpdf:2.3:*:*:*:*:*:*:*", "cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:advanced_linux_environment:3.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*", "cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*", "cpe:2.3:o:kde:kde:3.2:*:*:*:*:*:*:*", "cpe:2.3:o:kde:kde:3.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:kde:kde:3.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:kde:kde:3.2.3:*:*:*:*:*:*:*", "cpe:2.3:o:kde:kde:3.3:*:*:*:*:*:*:*", "cpe:2.3:o:kde:kde:3.3.1:*:*:*:*:*:*:*", "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*", "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:x86_64:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_servers:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:fedora_core:core_1.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:linux:9.0:*:i386:*:*:*:*:*", "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*", "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium_processor:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux:1.0:*:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux:2.0:*:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux:3.0:*:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux:4.0:*:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux:4.2:*:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux:4.3:*:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux:4.4:*:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux:4.4.1:*:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux:5.1:*:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux:5.2:*:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux:5.3:*:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux:6.1:*:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux:6.1:alpha:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux:6.2:*:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux:6.3:*:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux:6.3:*:ppc:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux:6.3:alpha:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux:6.4:*:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux:6.4:*:i386:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux:6.4:*:ppc:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux:6.4:alpha:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux:7.0:*:i386:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux:7.0:*:ppc:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux:7.0:*:sparc:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux:7.0:alpha:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux:7.1:*:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux:7.1:*:spa:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux:7.1:*:sparc:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux:7.1:*:x86:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux:7.1:alpha:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux:7.2:*:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux:7.2:*:i386:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux:7.3:*:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux:7.3:*:i386:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux:7.3:*:ppc:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux:7.3:*:sparc:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux:8.0:*:i386:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux:9.1:*:x86_64:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux:9.2:*:x86_64:*:*:*:*:*", "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*", "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2006-1827
Integer signedness error in format_jpeg.c in Asterisk 1.2.6 and earlier allows remote attackers to execute arbitrary code via a length value that passes a length check as a negative number, but triggers a buffer overflow when it is used as an unsigned length.
[ "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:0.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:0.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:0.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:0.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:0.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:0.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:0.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:0.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:0.1.8:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:0.1.9:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:0.1.9.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:0.1.10:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:0.1.11:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:0.1.12:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:0.2:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:0.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:0.3:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:0.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:0.4:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:0.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:0.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:0.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:0.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:0.7.2:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.0_rc1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.0_rc2:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.2.0_beta1:*:*:*:*:*:*:*" ]
null
null
null
6.4
null
GHSA-6hm7-pc42-3xrj
The SIP implementation on the Cisco PGW 2200 Softswitch with software 9.7(3)S before 9.7(3)S9 and 9.7(3)P before 9.7(3)P9 allows remote attackers to cause a denial of service (device crash) via a malformed Contact header, aka Bug ID CSCsj98521.
[]
null
null
null
null
null
GHSA-7qq5-6v62-r8cg
Unspecified vulnerability in the Oracle FLEXCUBE Universal Banking component in Oracle Financial Services Applications 11.3.0, 11.4.0, and 12.0.1 allows remote authenticated users to affect confidentiality via vectors related to INFRA.
[]
null
null
4.3
null
null
GHSA-hrfh-hw79-vvhm
An issue was discovered in Open-Xchange OX AppSuite before 7.8.0-rev27. The "defer" servlet offers to redirect a client to a specified URL. Since some checks were missing, arbitrary URLs could be provided as redirection target. Users can be tricked to follow a link to a trustworthy domain but end up at an unexpected service later on. This vulnerability can be used to prepare and enhance phishing attacks.
[]
null
null
7.4
null
null
GHSA-27r4-rp49-685c
The Autoptimize WordPress plugin before 2.7.8 does not check for malicious files such as .html in the archive uploaded via the 'Import Settings' feature. As a result, it is possible for a high privilege user to upload a malicious file containing JavaScript code inside an archive which will execute when a victim visits index.html inside the plugin directory.
[]
null
null
null
null
null
GHSA-m45m-xf2m-pmfw
The message_options function in includes/ucp/ucp_pm_options.php in phpBB before 3.0.13 does not properly validate the form key, which allows remote attackers to conduct CSRF attacks and change the full folder setting via unspecified vectors.
[]
null
null
null
null
null
GHSA-c5pq-hr9c-hw8v
Password Vulnerability in NCR Terminal Handler v.1.5.1 allows a remote attacker to execute arbitrary code via a crafted script to the UserService SOAP API function.
[]
null
null
null
null
null
GHSA-f828-3wmc-hg2m
Cross-site scripting (XSS) vulnerability in TeeKai Forum 1.2 allows remote attackers to inject arbitrary web script or HTML via the valid_username_online cookie.
[]
null
null
null
null
null
GHSA-gwfv-2hfv-wqmr
The (1) otrl_base64_otr_decode function in src/b64.c; (2) otrl_proto_data_read_flags and (3) otrl_proto_accept_data functions in src/proto.c; and (4) decode function in toolkit/parse.c in libotr before 3.2.1 allocates a zero-length buffer when decoding a base64 string, which allows remote attackers to cause a denial of service (application crash) via a message with the value "?OTR:===.", which triggers a heap-based buffer overflow.
[]
null
null
null
null
null
CVE-2012-0659
Integer overflow in QuickTime in Apple Mac OS X before 10.7.4 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted MPEG file.
[ "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.0.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.0.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.1.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.1.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.1.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.2.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.2.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.2.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.2.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.2.6:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.2.7:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.2.8:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.3.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.3.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.3.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.3.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.3.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.3.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.3.6:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.3.7:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.3.8:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.3.9:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.4.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.4.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.4.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.4.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.4.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.4.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.4.6:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.4.7:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.4.8:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.4.9:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.4.10:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.4.11:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.5.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.5.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.5.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.5.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.5.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.5.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.5.6:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.5.7:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.5.8:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.6.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.6.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.6.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.6.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.6.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.6.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.6.6:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.6.7:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.6.8:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.7.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.7.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.7.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.0.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.0.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.1.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.1.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.1.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.2.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.2.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.2.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.2.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.2.6:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.2.7:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.2.8:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.3.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.3.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.3.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.3.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.3.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.3.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.3.6:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.3.7:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.3.8:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.3.9:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.4.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.4.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.4.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.4.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.4.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.4.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.4.6:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.4.7:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.4.8:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.4.9:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.4.10:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.4.11:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.5.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.5.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.5.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.5.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.5.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.5.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.5.6:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.5.7:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.5.8:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.6.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.6.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.6.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.6.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.6.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.6.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.6.6:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.6.7:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.6.8:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.7.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.7.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.7.2:*:*:*:*:*:*:*" ]
null
null
null
6.8
null
CVE-2005-3869
Cross-site scripting (XSS) vulnerability in index.php in Google API Search 1.3.1 and earlier allows remote attackers to inject arbitrary web script or HTML via hex-encoded values in the REQ parameter.
[ "cpe:2.3:a:google:api_search:*:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
RHSA-2024:6235
Red Hat Security Advisory: Red Hat Trusted Profile Analyzer 1.1.2
nodejs-async: Regular expression denial of service while parsing function in autoinject
[ "cpe:/a:redhat:trusted_profile_analyzer:1.1::el9" ]
null
5.3
null
null
null
GHSA-jhp8-52c5-gjpr
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Rob Scott Eazy Under Construction allows Reflected XSS. This issue affects Eazy Under Construction: from n/a through 1.0.
[]
null
7.1
null
null
null
CVE-2023-0934
Cross-site Scripting (XSS) - Stored in answerdev/answer
Cross-site Scripting (XSS) - Stored in GitHub repository answerdev/answer prior to 1.0.5.
[ "cpe:2.3:a:answer:answer:*:*:*:*:*:*:*:*" ]
null
null
6.3
null
null
GHSA-74mh-xx7q-wqfq
Improper authentication vulnerability in Cybozu Garoon 4.0.0 to 4.10.3 allows remote attackers to obtain data in Application Menu.
[]
null
null
null
null
null
GHSA-3g8x-9wgw-w22x
D-Link DSL-3782 v1.01 is vulnerable to Buffer Overflow in /New_GUI/ParentalControl.asp.
[]
null
5.7
null
null
null
GHSA-6938-rwxx-qpcg
Hotels_Server through 2018-11-05 has SQL Injection via the controller/fetchpwd.php username parameter.
[]
null
null
9.8
null
null
GHSA-6wrf-mxfj-pf5p
Docker Swarm encrypted overlay network with a single endpoint is unauthenticated
[Moby](https://mobyproject.org/) is an open source container framework developed by Docker Inc. that is distributed as Docker, Mirantis Container Runtime, and various other downstream projects/products. The Moby daemon component (`dockerd`), which is developed as [moby/moby](https://github.com/moby/moby) is commonly referred to as *Docker*.Swarm Mode, which is compiled in and delivered by default in `dockerd` and is thus present in most major Moby downstreams, is a simple, built-in container orchestrator that is implemented through a combination of [SwarmKit](https://github.com/moby/swarmkit) and supporting network code.The `overlay` network driver is a core feature of Swarm Mode, providing isolated virtual LANs that allow communication between containers and services across the cluster. This driver is an implementation/user of [VXLAN](https://en.wikipedia.org/wiki/Virtual_Extensible_LAN), which encapsulates link-layer (Ethernet) frames in UDP datagrams that tag the frame with a VXLAN Network ID (VNI) that identifies the originating overlay network. In addition, the overlay network driver supports an optional, off-by-default encrypted mode, which is especially useful when VXLAN packets traverses an untrusted network between nodes.Encrypted overlay networks function by encapsulating the VXLAN datagrams through the use of the [IPsec Encapsulating Security Payload](https://en.wikipedia.org/wiki/IPsec#Encapsulating_Security_Payload) protocol in [Transport mode](https://en.wikipedia.org/wiki/IPsec#Transport_mode). By deploying IPSec encapsulation, encrypted overlay networks gain the additional properties of source authentication through cryptographic proof, data integrity through check-summing, and confidentiality through encryption.When setting an endpoint up on an encrypted overlay network, Moby installs three [iptables](https://www.netfilter.org/projects/iptables/index.html) (Linux kernel firewall) rules that enforce both incoming and outgoing IPSec. These rules rely on the `u32` iptables extension provided by the `xt_u32` kernel module to directly filter on a VXLAN packet's VNI field, so that IPSec guarantees can be enforced on encrypted overlay networks without interfering with other overlay networks or other users of VXLAN.The `overlay` driver dynamically and lazily defines the kernel configuration for the VXLAN network on each node as containers are attached and detached. Routes and encryption parameters are only defined for destination nodes that participate in the network. The iptables rules that prevent encrypted overlay networks from accepting unencrypted packets are not created until a peer is available with which to communicate.ImpactEncrypted overlay networks silently accept cleartext VXLAN datagrams that are tagged with the VNI of an encrypted overlay network. As a result, it is possible to inject arbitrary Ethernet frames into the encrypted overlay network by encapsulating them in VXLAN datagrams. The implications of this can be quite dire, and [GHSA-vwm3-crmr-xfxw](https://github.com/moby/moby/security/advisories/GHSA-vwm3-crmr-xfxw) should be referenced for a deeper exploration.PatchesPatches are available in Moby releases 23.0.3, and 20.10.24. As Mirantis Container Runtime's 20.10 releases are numbered differently, users of that platform should update to 20.10.16.WorkaroundsIn multi-node clusters, deploy a global ‘pause’ container for each encrypted overlay network, on every node. For example, use the `registry.k8s.io/pause` image and a `--mode global` service.For a single-node cluster, do not use overlay networks of any sort. Bridge networks provide the same connectivity on a single node and have no multi-node features. The Swarm ingress feature is implemented using an overlay network, but can be disabled by publishing ports in `host` mode instead of `ingress` mode (allowing the use of an external load balancer), and removing the `ingress` network.If encrypted overlay networks are in exclusive use, block UDP port 4789 from traffic that has not been validated by IPSec. For example, `iptables -A INPUT -m udp —-dport 4789 -m policy --dir in --pol none -j DROP`.BackgroundThis issue was discovered while characterizing and mitigating [CVE-2023-28840](https://github.com/moby/moby/security/advisories/GHSA-232p-vwff-86mp) and [CVE-2023-28841](https://github.com/moby/moby/security/advisories/GHSA-33pg-m6jh-5237).Related[CVE-2023-28841: Encrypted overlay network traffic may be unencrypted](https://github.com/moby/moby/security/advisories/GHSA-33pg-m6jh-5237)[CVE-2023-28840: Encrypted overlay network may be unauthenticated](https://github.com/moby/moby/security/advisories/GHSA-232p-vwff-86mp)[GHSA-vwm3-crmr-xfxw: The Swarm VXLAN port may be exposed to attack due to ambiguous documentation](https://github.com/moby/moby/security/advisories/GHSA-vwm3-crmr-xfxw)[GHSA-gvm4-2qqg-m333: Security issues in encrypted overlay networks](https://github.com/moby/libnetwork/security/advisories/GHSA-gvm4-2qqg-m333) (libnetwork)
[]
null
6.8
null
null
null
CVE-2021-39556
An issue was discovered in swftools through 20200710. A NULL pointer dereference exists in the function InfoOutputDev::type3D1() located in InfoOutputDev.cc. It allows an attacker to cause Denial of Service.
[ "cpe:2.3:a:swftools:swftools:*:*:*:*:*:*:*:*" ]
null
5.5
null
4.3
null
CVE-2024-21188
Vulnerability in the Oracle Financial Services Revenue Management and Billing product of Oracle Financial Services Applications (component: Chatbot). Supported versions that are affected are 6.0.0.0.0 and 6.1.0.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Financial Services Revenue Management and Billing. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Financial Services Revenue Management and Billing, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Financial Services Revenue Management and Billing accessible data as well as unauthorized read access to a subset of Oracle Financial Services Revenue Management and Billing accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).
[ "cpe:2.3:a:oracle:financial_services_revenue_management_and_billing:6.0.0.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:financial_services_revenue_management_and_billing:6.1.0.0.0:*:*:*:*:*:*:*" ]
null
6.1
null
null
null
CVE-2014-3193
The SessionService::GetLastSession function in browser/sessions/session_service.cc in Google Chrome before 38.0.2125.101 allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via vectors that leverage "type confusion" for callback processing.
[ "cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.6.z:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2022-4479
Table of Contents Plus < 2212 - Contributor+ Stored XSS
The Table of Contents Plus WordPress plugin before 2212 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins.
[ "cpe:2.3:a:dublue:table_of_contents_plus:*:*:*:*:*:wordpress:*:*" ]
null
5.4
null
null
null
GHSA-m3w9-frhj-fc8x
TG Soft Vir.IT eXplorer Lite 8.5.42 allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact via a \\.\Viragtlt DeviceIoControl request of 0x82730008, a different vulnerability than CVE-2017-16948.
[]
null
null
7.8
null
null
CVE-2021-33676
A missing authority check in SAP CRM, versions - 700, 701, 702, 712, 713, 714, could be leveraged by an attacker with high privileges to compromise confidentiality, integrity, or availability of the system.
[ "cpe:2.3:a:sap:customer_relationship_management:700:*:*:*:*:*:*:*", "cpe:2.3:a:sap:customer_relationship_management:701:*:*:*:*:*:*:*", "cpe:2.3:a:sap:customer_relationship_management:702:*:*:*:*:*:*:*", "cpe:2.3:a:sap:customer_relationship_management:712:*:*:*:*:*:*:*", "cpe:2.3:a:sap:customer_relationship_management:713:*:*:*:*:*:*:*", "cpe:2.3:a:sap:customer_relationship_management:714:*:*:*:*:*:*:*" ]
null
null
6.8
null
null
CVE-2020-24480
Out-of-bounds write in the Intel(R) XTU before version 6.5.3.25 may allow a privileged user to potentially enable denial of service via local access.
[ "cpe:2.3:a:intel:extreme_tuning_utility:*:*:*:*:*:*:*:*" ]
null
4.4
null
2.1
null
RHSA-2020:4289
Red Hat Security Advisory: kernel-rt security and bug fix update
kernel: net: bluetooth: type confusion while processing AMP packets kernel: net: bluetooth: information leak when processing certain AMP packets kernel: kernel: buffer over write in vgacon_scroll kernel: metadata validator in XFS may cause an inode with a valid, user-creatable extended attribute to be flagged as corrupt kernel: memory corruption in net/packet/af_packet.c leads to elevation of privilege
[ "cpe:/a:redhat:enterprise_linux:8::nfv", "cpe:/a:redhat:enterprise_linux:8::realtime" ]
null
7.8
null
null
null
GHSA-w3m9-q5q6-jr9h
Multiple cross-site request forgery (CSRF) vulnerabilities in the administrative interface in Novell Filr before 2.0 Security Update 2 allow remote attackers to hijack the authentication of administrators, as demonstrated by reconfiguring time settings via a vaconfig/time request.
[]
null
null
7.2
null
null
RHSA-2010:0040
Red Hat Security Advisory: php security update
php: exif_read_data crash on corrupted JPEG files php: openssl extension: Incorrect verification of SSL certificate with NUL in name php: exif extension: Multiple missing sanity checks in EXIF file processing gd: insufficient input validation in _gdGetColors() PHP: resource exhaustion attack via upload requests with lots of files php: htmlspecialchars() insufficient checking of input for multi-byte encodings
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
null
CVE-2020-25145
An issue was discovered in Observium Professional, Enterprise & Community 20.8.10631. It is vulnerable to directory traversal and local file inclusion due to the fact that there is an unrestricted possibility of loading any file with an inc.php extension. Inclusion of other files (even though limited to the mentioned extension) can lead to Remote Code Execution. This can occur via /device/device=345/?tab=ports&view=../ URIs because of device/port.inc.php.
[ "cpe:2.3:a:observium:observium:20.8.10631:*:*:*:community:*:*:*", "cpe:2.3:a:observium:observium:20.8.10631:*:*:*:enterprise:*:*:*", "cpe:2.3:a:observium:observium:20.8.10631:*:*:*:professional:*:*:*" ]
null
8.8
null
6.5
null
CVE-2018-1000603
A exposure of sensitive information vulnerability exists in Jenkins Openstack Cloud Plugin 2.35 and earlier in BootSource.java, InstancesToRun.java, JCloudsCleanupThread.java, JCloudsCloud.java, JCloudsComputer.java, JCloudsPreCreationThread.java, JCloudsRetentionStrategy.java, JCloudsSlave.java, JCloudsSlaveTemplate.java, LauncherFactory.java, OpenstackCredentials.java, OpenStackMachineStep.java, SlaveOptions.java, SlaveOptionsDescriptor.java that allows attackers with Overall/Read access to Jenkins to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins, and to cause Jenkins to submit HTTP requests to attacker-specified URLs.
[ "cpe:2.3:a:jenkins:openstack_cloud:*:*:*:*:*:jenkins:*:*" ]
null
null
8.8
4
null
GHSA-v2q7-x3pw-jc98
A vulnerability has been identified in RUGGEDCOM ROS M2100 (All versions < V5.6.0), RUGGEDCOM ROS RMC8388 devices (All versions < V5.6.0), RUGGEDCOM ROS RS416v2 (All versions < V5.6.0), RUGGEDCOM ROS RS900G (All versions < V5.6.0), RUGGEDCOM ROS RS900G (32M) (All versions < V5.6.0), RUGGEDCOM ROS RSG2100 (32M) V5.X (All versions < V5.6.0), RUGGEDCOM ROS RSG2100P (All versions < V5.6.0), RUGGEDCOM ROS RSG2100P (32M) V5.X (All versions < V5.6.0), RUGGEDCOM ROS RSG2288 V5.X (All versions < V5.6.0), RUGGEDCOM ROS RSG2300 V5.X (All versions < V5.6.0), RUGGEDCOM ROS RSG2300P V5.X (All versions < V5.6.0), RUGGEDCOM ROS RSG2488 V5.X (All versions < V5.6.0), RUGGEDCOM ROS RSG900 V5.X (All versions < V5.6.0), RUGGEDCOM ROS RSG920P V5.X (All versions < V5.6.0), RUGGEDCOM ROS RSL910 (All versions < V5.6.0), RUGGEDCOM ROS RST2228 (All versions < V5.6.0), RUGGEDCOM ROS RST916C (All versions < V5.6.0), RUGGEDCOM ROS RST916P (All versions < V5.6.0). A new variant of the POODLE attack has left a third-party component vulnerable due to the implementation flaws of the CBC encryption mode in TLS 1.0 to 1.2. If an attacker were to exploit this, they could act as a man-in-the-middle and eavesdrop on encrypted communications.
[]
null
5.9
null
null
null
GHSA-gww9-8v2g-9j6c
IrfanView 4.53 allows Data from a Faulting Address to control Code Flow starting at JPEG_LS+0x0000000000003155.
[]
null
7.8
null
null
null
CVE-2022-48811
ibmvnic: don't release napi in __ibmvnic_open()
In the Linux kernel, the following vulnerability has been resolved: ibmvnic: don't release napi in __ibmvnic_open() If __ibmvnic_open() encounters an error such as when setting link state, it calls release_resources() which frees the napi structures needlessly. Instead, have __ibmvnic_open() only clean up the work it did so far (i.e. disable napi and irqs) and leave the rest to the callers. If caller of __ibmvnic_open() is ibmvnic_open(), it should release the resources immediately. If the caller is do_reset() or do_hard_reset(), they will release the resources on the next reset. This fixes following crash that occurred when running the drmgr command several times to add/remove a vnic interface: [102056] ibmvnic 30000003 env3: Disabling rx_scrq[6] irq [102056] ibmvnic 30000003 env3: Disabling rx_scrq[7] irq [102056] ibmvnic 30000003 env3: Replenished 8 pools Kernel attempted to read user page (10) - exploit attempt? (uid: 0) BUG: Kernel NULL pointer dereference on read at 0x00000010 Faulting instruction address: 0xc000000000a3c840 Oops: Kernel access of bad area, sig: 11 [#1] LE PAGE_SIZE=64K MMU=Radix SMP NR_CPUS=2048 NUMA pSeries ... CPU: 9 PID: 102056 Comm: kworker/9:2 Kdump: loaded Not tainted 5.16.0-rc5-autotest-g6441998e2e37 #1 Workqueue: events_long __ibmvnic_reset [ibmvnic] NIP: c000000000a3c840 LR: c0080000029b5378 CTR: c000000000a3c820 REGS: c0000000548e37e0 TRAP: 0300 Not tainted (5.16.0-rc5-autotest-g6441998e2e37) MSR: 8000000000009033 <SF,EE,ME,IR,DR,RI,LE> CR: 28248484 XER: 00000004 CFAR: c0080000029bdd24 DAR: 0000000000000010 DSISR: 40000000 IRQMASK: 0 GPR00: c0080000029b55d0 c0000000548e3a80 c0000000028f0200 0000000000000000 ... NIP [c000000000a3c840] napi_enable+0x20/0xc0 LR [c0080000029b5378] __ibmvnic_open+0xf0/0x430 [ibmvnic] Call Trace: [c0000000548e3a80] [0000000000000006] 0x6 (unreliable) [c0000000548e3ab0] [c0080000029b55d0] __ibmvnic_open+0x348/0x430 [ibmvnic] [c0000000548e3b40] [c0080000029bcc28] __ibmvnic_reset+0x500/0xdf0 [ibmvnic] [c0000000548e3c60] [c000000000176228] process_one_work+0x288/0x570 [c0000000548e3d00] [c000000000176588] worker_thread+0x78/0x660 [c0000000548e3da0] [c0000000001822f0] kthread+0x1c0/0x1d0 [c0000000548e3e10] [c00000000000cf64] ret_from_kernel_thread+0x5c/0x64 Instruction dump: 7d2948f8 792307e0 4e800020 60000000 3c4c01eb 384239e0 f821ffd1 39430010 38a0fff6 e92d1100 f9210028 39200000 <e9030010> f9010020 60420000 e9210020 ---[ end trace 5f8033b08fd27706 ]---
[]
null
null
null
null
null
GHSA-cgvp-2vg6-v9h6
The Total Upkeep plugin for WordPress is vulnerable to information disclosure in versions up to, and including 1.14.13. This is due to missing authorization on the heartbeat_received() function that triggers on WordPress heartbeat. This makes it possible for authenticated attackers, with subscriber-level permissions and above to retrieve back-up paths that can subsequently be used to download the back-up.
[]
null
4.3
null
null
null
GHSA-qjr4-6mch-8mc9
Unknown vulnerability in the IPv6 capability in IRIX 6.5.19 causes snoop to process packets as the root user, with unknown implications.
[]
null
null
null
null
null
CVE-2021-46790
ntfsck in NTFS-3G through 2021.8.22 has a heap-based buffer overflow involving buffer+512*3-2. NOTE: the upstream position is that ntfsck is deprecated; however, it is shipped by some Linux distributions.
[ "cpe:2.3:a:tuxera:ntfs-3g:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*" ]
null
7.8
null
4.6
null
GHSA-2jqr-8pg4-3xwp
The Telegram application 7.5.0 through 7.8.0 for Android does not properly implement image self-destruction, a different vulnerability than CVE-2019-16248. After approximately two to four uses of the self-destruct feature, there is a misleading UI indication that an image was deleted (on both the sender and recipient sides). The images are still present in the /Storage/Emulated/0/Telegram/Telegram Image/ directory.
[]
null
null
null
null
null
CVE-2017-13072
Cross-site scripting (XSS) vulnerability in App Center in QNAP QTS 4.2.6 build 20171208, QTS 4.3.3 build 20171213, QTS 4.3.4 build 20171223, and their earlier versions could allow remote attackers to inject Javascript code.
[ "cpe:2.3:o:qnap:qts:4.2.6:*:*:*:*:*:*:*", "cpe:2.3:o:qnap:qts:4.3.3:*:*:*:*:*:*:*", "cpe:2.3:o:qnap:qts:4.3.4:*:*:*:*:*:*:*" ]
null
null
6.1
4.3
null
CVE-2016-3077
The VersionMapper.fromKernelVersionString method in oVirt Engine allows remote authenticated users to cause a denial of service (process crash) for all VMs.
[ "cpe:2.3:a:redhat:ovirt-engine:-:*:*:*:*:*:*:*" ]
null
null
6.5
4
null
GHSA-hvg3-gh5m-335x
In log service, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with System execution privileges needed.
[]
null
4.4
null
null
null
GHSA-fjxm-8vv5-3pc6
The "menu sync" function in the WPML plugin before 3.1.9 for WordPress allows remote attackers to delete arbitrary posts, pages, and menus via a crafted request to sitepress-multilingual-cms/menu/menus-sync.php.
[]
null
null
null
null
null
GHSA-qrj6-wx6r-8jmc
The Wp Social Login and Register Social Counter plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.1.0. This is due to missing or incorrect nonce validation on the counter_access_key_setup() function. This makes it possible for unauthenticated attackers to update social login provider settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
[]
null
4.3
null
null
null
GHSA-qgm6-rxj7-629q
HDF5 through 1.14.3 contains a heap buffer overflow in H5HG_read, resulting in the corruption of the instruction pointer and causing denial of service or potential code execution.
[]
null
9.8
null
null
null
CVE-2014-7088
The JDM Lifestyle (aka com.hondatech) application 6.4 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[ "cpe:2.3:a:jdm_lifestyle_project:jdm_lifestyle:6.4:*:*:*:*:android:*:*" ]
null
null
null
5.4
null