id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
189k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
patch_commit_url
stringlengths
36
232
CVE-2024-20115
In ccu, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09036695; Issue ID: MSV-1713.
[ "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:*" ]
null
6.7
null
null
null
GHSA-87m3-6qj3-p3xh
Liferay Portal denial of service (memory consumption)
The Document and Media widget In Liferay Portal 7.2.0 through 7.3.6, and older unsupported versions, and Liferay DXP 7.3 before service pack 3, 7.2 before fix pack 13, and older unsupported versions, does not limit resource consumption when generating a preview image, which allows remote authenticated users to cause a denial of service (memory consumption) via crafted PNG images.
[]
7.1
6.5
null
null
null
CVE-2018-11711
A remote attacker can bypass the System Manager Mode on the Canon MF210 and MF220 web interface without knowing the PIN for /login.html via vectors involving /portal_top.html to get full access to the device. NOTE: the vendor reportedly responded that this issue occurs when a customer keeps the default settings without using the countermeasures and best practices shown in the documentation
[ "cpe:2.3:o:canon:mf210_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:canon:mf210:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:mf220_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:canon:mf220:-:*:*:*:*:*:*:*" ]
null
null
9.8
10
null
CVE-2021-39235
Access mode of block tokens are not enforced
In Apache Ozone before 1.2.0, Ozone Datanode doesn't check the access mode parameter of the block token. Authenticated users with valid READ block token can do any write operation on the same block.
[ "cpe:2.3:a:apache:ozone:*:*:*:*:*:*:*:*" ]
null
6.5
null
4
null
CVE-2022-0714
Heap-based Buffer Overflow in vim/vim
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.4436.
[ "cpe:2.3:a:vim:vim:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*" ]
null
null
8.4
null
null
CVE-2023-39052
An information leak in Earthgarden_waiting 13.6.1 allows attackers to obtain the channel access token and send crafted messages.
[ "cpe:2.3:a:earthgarden_waiting_project:earthgarden_waiting:13.6.1:*:*:*:*:line:*:*" ]
null
6.5
null
null
null
CVE-2016-2180
The TS_OBJ_print_bio function in crypto/ts/ts_lib.c in the X.509 Public Key Infrastructure Time-Stamp Protocol (TSP) implementation in OpenSSL through 1.0.2h allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted time-stamp file that is mishandled by the "openssl ts" command.
[ "cpe:2.3:a:openssl:openssl:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.1a:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.1b:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.1c:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.1d:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.1e:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.1f:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.1g:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.1h:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.1i:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.1j:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.1k:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.1l:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.1m:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.1n:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.1o:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.1p:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.1q:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.1r:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.1s:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.1t:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.2a:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.2b:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.2c:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.2d:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.2e:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.2f:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.2g:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.2h:*:*:*:*:*:*:*", "cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*", "cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*" ]
null
null
7.5
5
null
GHSA-87wq-w6qm-2mhm
Specter IDS version 4.5 and 5.0 allows a remote attacker to cause a denial of service (CPU exhaustion) via a port scan, which causes the server to consume CPU while preparing alerts.
[]
null
null
null
null
null
GHSA-46rp-652m-9xgq
Buffer overflow in the ft_var_readpackedpoints function in truetype/ttgxvar.c in FreeType 2.4.3 and earlier allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted TrueType GX font.
[]
null
null
null
null
null
CVE-2021-23239
The sudoedit personality of Sudo before 1.9.5 may allow a local unprivileged user to perform arbitrary directory-existence tests by winning a sudo_edit.c race condition in replacing a user-controlled directory by a symlink to an arbitrary path.
[ "cpe:2.3:a:sudo_project:sudo:*:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*" ]
null
2.5
null
1.9
null
CVE-2003-0821
Microsoft Excel 97, 2000, and 2002 allows remote attackers to execute arbitrary code via a spreadsheet with a malicious XLM (Excel 4) macro that bypasses the macro security model.
[ "cpe:2.3:a:microsoft:word:97:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:word:97:*:*:ja:*:*:*:*", "cpe:2.3:a:microsoft:word:97:*:*:ko:*:*:*:*", "cpe:2.3:a:microsoft:word:97:*:*:zh:*:*:*:*", "cpe:2.3:a:microsoft:word:97:sr1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:word:97:sr2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:word:98:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:word:98:*:*:ja:*:*:*:*", "cpe:2.3:a:microsoft:word:98:*:*:ko:*:*:*:*", "cpe:2.3:a:microsoft:word:98:*:*:zh:*:*:*:*", "cpe:2.3:a:microsoft:word:98:sr1:*:ja:*:*:*:*", "cpe:2.3:a:microsoft:word:98:sr2:*:ja:*:*:*:*", "cpe:2.3:a:microsoft:word:2000:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:word:2000:*:*:ja:*:*:*:*", "cpe:2.3:a:microsoft:word:2000:*:*:ko:*:*:*:*", "cpe:2.3:a:microsoft:word:2000:*:*:zh:*:*:*:*", "cpe:2.3:a:microsoft:word:2000:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:word:2000:sp3:*:*:*:*:*:*", "cpe:2.3:a:microsoft:word:2000:sr1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:word:2000:sr1a:*:*:*:*:*:*", "cpe:2.3:a:microsoft:word:2002:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:word:2002:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:word:2002:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:works:2001:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:works:2002:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:works:2003:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:works:2004:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2023-45043
QTS, QuTS hero
A buffer copy without checking size of input vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated administrators to execute code via a network. We have already fixed the vulnerability in the following versions: QTS 5.1.4.2596 build 20231128 and later QuTS hero h5.1.4.2596 build 20231128 and later
[ "cpe:2.3:o:qnap:qts:5.1.0.2348:build_20230325:*:*:*:*:*:*", "cpe:2.3:o:qnap:qts:5.1.0.2399:build_20230515:*:*:*:*:*:*", "cpe:2.3:o:qnap:qts:5.1.0.2418:build_20230603:*:*:*:*:*:*", "cpe:2.3:o:qnap:qts:5.1.0.2444:build_20230629:*:*:*:*:*:*", "cpe:2.3:o:qnap:qts:5.1.0.2466:build_20230721:*:*:*:*:*:*", "cpe:2.3:o:qnap:qts:5.1.1.2491:build_20230815:*:*:*:*:*:*", "cpe:2.3:o:qnap:qts:5.1.2.2533:build_20230926:*:*:*:*:*:*", "cpe:2.3:o:qnap:qts:5.1.3.2578:build_20231110:*:*:*:*:*:*", "cpe:2.3:o:qnap:quts_hero:h5.1.0.2409:build_20230525:*:*:*:*:*:*", "cpe:2.3:o:qnap:quts_hero:h5.1.0.2424:build_20230609:*:*:*:*:*:*", "cpe:2.3:o:qnap:quts_hero:h5.1.0.2453:build_20230708:*:*:*:*:*:*", "cpe:2.3:o:qnap:quts_hero:h5.1.0.2466:build_20230721:*:*:*:*:*:*", "cpe:2.3:o:qnap:quts_hero:h5.1.1.2488:build_20230812:*:*:*:*:*:*", "cpe:2.3:o:qnap:quts_hero:h5.1.2.2534:build_20230927:*:*:*:*:*:*", "cpe:2.3:o:qnap:quts_hero:h5.1.3.2578:build_20231110:*:*:*:*:*:*" ]
null
3.8
null
null
null
GHSA-mq7h-487v-4gp9
Unspecified vulnerability in the Server component in Oracle MySQL 5.5.28 and earlier allows remote authenticated users with Server Privileges to affect availability via unknown vectors.
[]
null
null
null
null
null
GHSA-4p7j-g7mm-h6h2
Unquoted service path vulnerability in McAfee Endpoint Product Removal (EPR) Tool prior to 21.2 allows local administrators to execute arbitrary code, with higher-level privileges, via execution from a compromised folder. The tool did not enforce and protect the execution path. Local admin privileges are required to place the files in the required location.
[]
null
6.7
null
null
null
GHSA-h7vq-5qgw-jwwq
CSV Injection Vulnerability
ImpactIn some circumstances, it was possible to export data in CSV format that could trigger a payload in old versions of Excel.If you are accepting user input from untrusted sources and will be exporting that data in CSV format from element index pages and there is a chance users will open that on old versions of Excel, then you should update.PatchesThis has been patched in Craft 3.7.14.Referenceshttps://github.com/craftcms/cms/blob/develop/CHANGELOG.md#3714---2021-09-28https://twitter.com/craftcmsupdates/status/1442928690145366018For more informationIf you have any questions or comments about this advisory, email us at support@craftcms.comCredits: BAE Systems AI Vulnerability Research Team – Azrul Ikhwan Zulkifli
[]
null
8.8
null
null
null
CVE-2018-1023
A remote code execution vulnerability exists in the way that Microsoft browsers access objects in memory, aka "Microsoft Browser Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore.
[ "cpe:2.3:a:microsoft:chakracore:-:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*" ]
null
null
7.5
7.6
null
CVE-2024-3987
WP Mobile Menu – The Mobile-Friendly Responsive Menu <= 2.8.4.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via Image Alt
The WP Mobile Menu – The Mobile-Friendly Responsive Menu plugin for WordPress is vulnerable to Stored Cross-Site Scripting via image alt text in all versions up to, and including, 2.8.4.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[ "cpe:2.3:a:freshlightlab:wp_mobile_menu:*:*:*:*:*:wordpress:*:*" ]
null
5.4
null
null
null
GHSA-hq75-xg7r-rx6c
Better Call routing bug can lead to Cache Deception
SummaryUsing a CDN that caches (`/**/*.png`, `/**/*.json`, `/**/*.css`, etc...) requests, a cache deception can emerge. This could lead to unauthorized access to user sessions and personal data when cached responses are served to other users.DetailsThe vulnerability occurs in the request processing logic where path sanitization is insufficient. The library splits the path using `config.basePath` but doesn't properly validate the remaining path components. This allows specially crafted requests that appear to be static assets (like `/api/auth/get-session/api/auth/image.png` assuming `config.basePath`=`/api/auth`) to bypass typical CDN cache exclusion rules while actually returning sensitive data.The problematic code [here](https://github.com/Bekacru/better-call/blob/8b6f13e24fad7f4666a582601517bb3232d4f4af/src/router.ts#L124):Since this library is largely coupled with `better-auth`, it becomes more clear why this can be dangerous with an example request:ImpactThis is a cache deception vulnerability affecting `better-call` users with CDN caching enabled. which can expose sensitive data.
[]
4.9
null
null
null
null
CVE-2019-19258
GitLab Enterprise Edition (EE) 10.8 and later through 12.5 has Incorrect Access Control.
[ "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*" ]
null
5.3
null
5
null
GHSA-j525-6j4r-q79q
Multiple cross-site request forgery (CSRF) vulnerabilities in TKS Banking Solutions ePortfolio 1.0 Java allow remote attackers to perform unspecified restricted actions in the context of certain accounts by bypassing the client-side protection scheme.
[]
null
null
null
null
null
GHSA-853f-4jw7-wv7r
The School Management System for Wordpress plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'title' parameter in all versions up to, and including, 93.0.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
[]
null
5.3
null
null
null
CVE-2018-5696
The iJoomla com_adagency plugin 6.0.9 for Joomla! allows SQL injection via the `advertiser_status` and `status_select` parameters to index.php.
[ "cpe:2.3:a:ijoomla:ad_agency:6.0.9:*:*:*:*:joomla\\!:*:*" ]
null
null
9.8
7.5
null
GHSA-6j8f-mqp2-w454
The WebVPN CIFS implementation in Cisco Adaptive Security Appliance (ASA) Software 9.0(.4.1) and earlier allows remote CIFS servers to cause a denial of service (device reload) via a long share list, aka Bug ID CSCuj83344.
[]
null
null
null
null
null
CVE-2019-16392
SPIP before 3.1.11 and 3.2 before 3.2.5 allows prive/formulaires/login.php XSS via error messages.
[ "cpe:2.3:a:spip:spip:*:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*" ]
null
6.1
null
4.3
null
CVE-2014-5395
Multiple cross-site request forgery (CSRF) vulnerabilities in Huawei HiLink E3276 and E3236 TCPU before V200R002B470D13SP00C00 and WebUI before V100R007B100D03SP01C03, E5180s-22 before 21.270.21.00.00, and E586Bs-2 before 21.322.10.00.889 allow remote attackers to hijack the authentication of users for requests that (1) modify configurations, (2) send SMS messages, or have other unspecified impact via unknown vectors.
[ "cpe:2.3:o:huawei:e5180s-22_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:e3276_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:e3236_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:e586bs-2_firmware:*:*:*:*:*:*:*:*" ]
null
null
null
6.8
null
GHSA-8hwj-j49v-pfwp
libarchive before 3.2.0 does not limit the number of recursive decompressions, which allows remote attackers to cause a denial of service (memory consumption and application crash) via a crafted gzip file.
[]
null
null
5.5
null
null
CVE-2018-10475
This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader 9.0.0.29935. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of U3D Light Node structures. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated structure. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the current process. Was ZDI-CAN-5394.
[ "cpe:2.3:a:foxitsoftware:foxit_reader:*:*:*:*:*:*:*:*", "cpe:2.3:a:foxitsoftware:phantompdf:*:*:*:*:*:*:*:*" ]
null
6.5
null
4.3
null
CVE-2021-42724
Adobe Bridge Memory Corruption could lead to Arbitrary code execution
Adobe Bridge version 11.1.1 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.
[ "cpe:2.3:a:adobe:bridge:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
7.8
null
null
null
GHSA-qh6w-j8cx-jf53
Liblouis 3.21.0 has an out-of-bounds write in compileRule in compileTranslationTable.c, as demonstrated by lou_trace.
[]
null
5.5
null
null
null
GHSA-jgv9-qp9j-c2cr
RioRey RIOS 4.6.6 and 4.7.0 uses an undocumented, hard-coded username (dbadmin) and password (sq!us3r) for an SSH tunnel, which allows remote attackers to gain privileges via port 8022.
[]
null
null
null
null
null
GHSA-7f2f-qxhv-x7jp
Multiple PHP remote file inclusion vulnerabilities in Rezervi Generic 0.9 allow remote attackers to execute arbitrary PHP code via a URL in the root parameter to (1) datumVonDatumBis.inc.php, (2) footer.inc.php, (3) header.inc.php, and (4) stylesheets.php in templates/; and (5) wochenuebersicht.inc.php, (6) monatsuebersicht.inc.php, (7) jahresuebersicht.inc.php, and (8) tagesuebersicht.inc.php in belegungsplan/.
[]
null
null
null
null
null
GHSA-cjp9-8vv4-jm56
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in PluginOps Landing Page Builder plugin <= 1.5.1.2 versions.
[]
null
5.9
null
null
null
GHSA-wgjr-h635-jgcv
Tenda AC18 V15.03.05.19 is vulnerable to Buffer Overflow via function formWifiWpsStart.
[]
null
9.8
null
null
null
CVE-2025-27160
Acrobat Reader | Use After Free (CWE-416)
Acrobat Reader versions 24.001.30225, 20.005.30748, 25.001.20428 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[]
null
7.8
null
null
null
GHSA-2xxr-prx9-m533
A security vulnerability has been identified in Bludit, allowing authenticated attackers to execute arbitrary code through the Image API. This vulnerability arises from improper handling of file uploads, enabling malicious actors to upload and execute PHP files.
[]
null
null
null
null
null
GHSA-43xh-q266-jr4x
ReadCode() in decompress.c in the HDF HDF5 through 1.10.3 library allows attackers to cause a denial of service (invalid write access) via a crafted HDF5 file. This issue was triggered while converting a GIF file to an HDF file.
[]
null
null
6.5
null
null
CVE-2007-3605
Stack-based buffer overflow in the kweditcontrol.kwedit.1 ActiveX control in FrontEnd\SapGui\kwedit.dll in the EnjoySAP SAP GUI allows remote attackers to execute arbitrary code via a long argument to the PrepareToPostHTML function.
[ "cpe:2.3:a:sap:enjoysap:*:*:*:*:*:*:*:*" ]
null
null
null
7.6
null
GHSA-wjv4-g95p-rg69
A vulnerability has been identified in RUGGEDCOM ROS for RSL910 devices (All versions < ROS V5.0.1), RUGGEDCOM ROS for all other devices (All versions < ROS V4.3.4), SCALANCE XB-200/XC-200/XP-200/XR300-WG (All versions between V3.0 (including) and V3.0.2 (excluding)), SCALANCE XR-500/XM-400 (All versions between V6.1 (including) and V6.1.1 (excluding)). After initial configuration, the Ruggedcom Discovery Protocol (RCDP) is still able to writeto the device under certain conditions, potentially allowing users located in the adjacentnetwork of the targeted device to perform unauthorized administrative actions.
[]
null
null
8.8
null
null
GHSA-675w-hmxx-cvf3
x509_constraints_parse_mailbox in lib/libcrypto/x509/x509_constraints.c in LibreSSL through 3.4.0 has a stack-based buffer over-read. When the input exceeds DOMAIN_PART_MAX_LEN, the buffer lacks '\0' termination.
[]
null
null
null
null
null
GHSA-x5c3-r34h-xf45
Emmanuel MyDomoAtHome (MDAH) REST API REST API Domoticz ISS Gateway 0.2.40 is affected by an information disclosure vulnerability due to improper access control enforcement. An unauthenticated remote attacker can exploit this, via a specially crafted request to gain access to sensitive information.
[]
null
null
null
null
null
GHSA-f49c-fpvw-q6c9
A vulnerability, which was classified as critical, was found in FreeFloat FTP Server 1.0. Affected is an unknown function of the component PROMPT Command Handler. The manipulation leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
[]
6.9
7.3
null
null
null
GHSA-26c6-8j4f-jwqh
A use-after-free vulnerability was found in drm_lease_held in drivers/gpu/drm/drm_lease.c in the Linux kernel due to a race problem. This flaw allows a local user privilege attacker to cause a denial of service (DoS) or a kernel information leak.
[]
null
6.3
null
null
null
GHSA-gxxg-46w4-8xx4
The web framework in Cisco Prime Collaboration Assurance before 10.5.1.53684-1 allows remote authenticated users to bypass intended login-session read restrictions, and impersonate administrators of arbitrary tenant domains, by discovering a session identifier and constructing a crafted URL, aka Bug IDs CSCus88343 and CSCus88334.
[]
null
null
null
null
null
GHSA-3p5c-rjfv-r2rv
The Media Library Assistant plugin before 2.82 for Wordpress suffers from multiple XSS vulnerabilities in all Settings/Media Library Assistant tabs, which allow remote authenticated users to execute arbitrary JavaScript.
[]
null
6.1
null
null
null
GHSA-cq7w-x535-g68q
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in DecaLog.This issue affects DecaLog: from n/a through 3.9.0.
[]
null
7.6
null
null
null
CVE-2016-1794
The AppleGraphicsControlClient::checkArguments method in AppleGraphicsControl in Apple OS X before 10.11.5 allows attackers to execute arbitrary code in a privileged context or cause a denial of service (NULL pointer dereference) via a crafted app.
[ "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*" ]
null
null
7.8
9.3
null
GHSA-68vw-f384-v6m6
It was discovered that cf-release v231 and lower, Pivotal Cloud Foundry Elastic Runtime 1.5.x versions prior to 1.5.17 and Pivotal Cloud Foundry Elastic Runtime 1.6.x versions prior to 1.6.18 do not properly enforce disk quotas in certain cases. An attacker could use an improper disk quota value to bypass enforcement and consume all the disk on DEAs/CELLs causing a potential denial of service for other applications.
[]
null
7.5
null
null
null
CVE-2024-40742
A cross-site scripting (XSS) vulnerability in netbox v4.0.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the circuit ID parameter at /circuits/circuits/add.
[ "cpe:2.3:a:netbox:netbox:*:*:*:*:*:*:*:*", "cpe:2.3:a:netbox:netbox:4.0.3:*:*:*:*:*:*:*" ]
null
6.1
null
null
null
CVE-2015-7926
eWON devices with firmware before 10.1s0 omit RBAC for I/O server information and status requests, which allows remote attackers to obtain sensitive information via an unspecified URL.
[ "cpe:2.3:o:ewon:ewon_firmware:*:*:*:*:*:*:*:*" ]
null
null
9.9
5
null
CVE-2022-36994
An issue was discovered in Veritas NetBackup 8.1.x through 8.1.2, 8.2, 8.3.x through 8.3.0.2, 9.x through 9.0.0.1, and 9.1.x through 9.1.0.1 (and related NetBackup products). An attacker with authenticated access to a NetBackup Client could arbitrarily read files from a NetBackup Primary server.
[ "cpe:2.3:a:veritas:flex_appliance:1.2:*:*:*:*:*:*:*", "cpe:2.3:a:veritas:flex_appliance:1.3:*:*:*:*:*:*:*", "cpe:2.3:a:veritas:flex_appliance:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:veritas:flex_appliance:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:veritas:flex_appliance:2.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:veritas:flex_appliance:2.1:*:*:*:*:*:*:*", "cpe:2.3:a:veritas:flex_scale:1.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:veritas:flex_scale:2.1:*:*:*:*:*:*:*", "cpe:2.3:a:veritas:netbackup:8.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:veritas:netbackup:8.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:veritas:netbackup:8.2:*:*:*:*:*:*:*", "cpe:2.3:a:veritas:netbackup:8.3:*:*:*:*:*:*:*", "cpe:2.3:a:veritas:netbackup:8.3.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:veritas:netbackup:8.3.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:veritas:netbackup:9.0:*:*:*:*:*:*:*", "cpe:2.3:a:veritas:netbackup:9.0.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:veritas:netbackup:9.1:*:*:*:*:*:*:*", "cpe:2.3:a:veritas:netbackup:9.1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:veritas:netbackup_appliance:3.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:veritas:netbackup_appliance:3.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:veritas:netbackup_appliance:3.2:*:*:*:*:*:*:*", "cpe:2.3:a:veritas:netbackup_appliance:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:veritas:netbackup_appliance:4.1:*:*:*:*:*:*:*", "cpe:2.3:h:veritas:netbackup_appliance:3.2:maintenance_release1:*:*:*:*:*:*", "cpe:2.3:h:veritas:netbackup_appliance:3.2:maintenance_release2:*:*:*:*:*:*", "cpe:2.3:h:veritas:netbackup_appliance:3.2:maintenance_release3:*:*:*:*:*:*", "cpe:2.3:h:veritas:netbackup_appliance:3.3.0.1:maintenance_release1:*:*:*:*:*:*", "cpe:2.3:h:veritas:netbackup_appliance:3.3.0.1:maintenance_release2:*:*:*:*:*:*", "cpe:2.3:h:veritas:netbackup_appliance:3.3.0.2:maintenance_release1:*:*:*:*:*:*", "cpe:2.3:h:veritas:netbackup_appliance:3.3.0.2:maintenance_release2:*:*:*:*:*:*", "cpe:2.3:h:veritas:netbackup_appliance:4.0.0.1:maintenance_release1:*:*:*:*:*:*", "cpe:2.3:h:veritas:netbackup_appliance:4.0.0.1:maintenance_release2:*:*:*:*:*:*", "cpe:2.3:h:veritas:netbackup_appliance:4.0.0.1:maintenance_release3:*:*:*:*:*:*", "cpe:2.3:h:veritas:netbackup_appliance:4.1.0.1:maintenance_release1:*:*:*:*:*:*", "cpe:2.3:h:veritas:netbackup_appliance:4.1.0.1:maintenance_release2:*:*:*:*:*:*" ]
null
6.3
null
null
null
GHSA-jj5v-2f8v-5cg8
app/View/SharingGroups/view.ctp in MISP before 2.4.146 allows stored XSS in the sharing groups view.
[]
null
null
null
null
null
GHSA-6q42-8x5p-5c72
In the Linux kernel, the following vulnerability has been resolved:wifi: ath12k: Pass ab pointer directly to ath12k_dp_tx_get_encap_type()In ath12k_dp_tx_get_encap_type(), the arvif parameter is only used to retrieve the ab pointer. In vdev delete sequence the arvif->ar could become NULL and that would trigger kernel panic. Since the caller ath12k_dp_tx() already has a valid ab pointer, pass it directly to avoid panic and unnecessary dereferencing.PC points to "ath12k_dp_tx+0x228/0x988 [ath12k]" LR points to "ath12k_dp_tx+0xc8/0x988 [ath12k]". The Backtrace obtained is as follows: ath12k_dp_tx+0x228/0x988 [ath12k] ath12k_mac_tx_check_max_limit+0x608/0x920 [ath12k] ieee80211_process_measurement_req+0x320/0x348 [mac80211] ieee80211_tx_dequeue+0x9ac/0x1518 [mac80211] ieee80211_tx_dequeue+0xb14/0x1518 [mac80211] ieee80211_tx_prepare_skb+0x224/0x254 [mac80211] ieee80211_xmit+0xec/0x100 [mac80211] __ieee80211_subif_start_xmit+0xc50/0xf40 [mac80211] ieee80211_subif_start_xmit+0x2e8/0x308 [mac80211] netdev_start_xmit+0x150/0x18c dev_hard_start_xmit+0x74/0xc0Tested-on: QCN9274 hw2.0 PCI WLAN.WBE.1.3.1-00173-QCAHKSWPL_SILICONZ-1
[]
null
null
null
null
null
CVE-2006-1215
Cross-site scripting (XSS) vulnerability in misc.php in Woltlab Burning Board (wBB) 2.3.4 allows remote attackers to inject arbitrary web script or HTML via the percent parameter. NOTE: this issue has been disputed in a followup post, although the original disclosure might be related to reflected XSS.
[ "cpe:2.3:a:woltlab:burning_board:2.3.4:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
GHSA-xw27-hxmj-gm8p
In the Linux kernel, the following vulnerability has been resolved:pstore/platform: Add check for kstrdupAdd check for the return value of kstrdup() and return the error if it fails in order to avoid NULL pointer dereference.
[]
null
5.5
null
null
null
GHSA-jhq5-xcpf-vrwm
A vulnerability in the Cisco SD-WAN Solution could allow an unauthenticated, remote attacker to bypass certificate validation on an affected device. The vulnerability is due to improper certificate validation. An attacker could exploit this vulnerability by supplying a system image signed with a crafted certificate to an affected device, bypassing the certificate validation. An exploit could allow an attacker to deploy a crafted system image.
[]
null
9.8
null
null
null
RHSA-2024:5906
Red Hat Security Advisory: squid security update
squid: Out-of-bounds write error may lead to Denial of Service
[ "cpe:/a:redhat:rhel_eus:9.2::appstream" ]
null
6.3
null
null
null
GHSA-8279-2hh7-mpv3
SAP UI5, versions - 1.38.49, 1.52.49, 1.60.34, 1.71.31, 1.78.18, 1.84.5, 1.85.4, 1.86.1, allows an unauthenticated attacker to redirect users to a malicious site due to Reverse Tabnabbing vulnerabilities.
[]
null
null
null
null
null
GHSA-wx53-7r2h-f7w6
Cross Site Scripting vulnerability in ACG-faka v1.1.7 allows a remote attacker to execute arbitrary code via the encode parameter in Index.php.
[]
null
6.1
null
null
null
CVE-2023-20026
A vulnerability in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, RV082, RV320 and RV325 Routers could allow an authenticated, remote attacker to execute arbitrary commands on an affected device. This vulnerability is due to improper validation of user input within incoming HTTP packets. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web-based management interface. A successful exploit could allow the attacker to gain root-level privileges and access unauthorized data. To exploit this vulnerability, an attacker would need to have valid administrative credentials on the affected device.
[ "cpe:2.3:o:cisco:rv016_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:rv016:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv042_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:rv042:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv042g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:rv042g:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv082_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:rv082:-:*:*:*:*:*:*:*" ]
null
6.5
null
null
null
GHSA-mr55-c2c7-jch7
rkt through version 1.30.0 does not isolate processes in containers that are run with `rkt enter`. Processes run with `rkt enter` are not limited by cgroups during stage 2 (the actual environment in which the applications run). Compromised containers could exploit this flaw to access host resources.
[]
null
7.7
null
null
null
GHSA-47jc-2cqh-wc8g
Netgear Nighthawk R6700 version 1.0.4.120 does not utilize secure communication methods to the SOAP interface. By default, all communication to/from the device's SOAP Interface (port 5000) is sent via HTTP, which causes potentially sensitive information (such as usernames and passwords) to be transmitted in cleartext
[]
null
null
null
null
null
RHSA-2024:4351
Red Hat Security Advisory: virt:rhel and virt-devel:rhel security and bug fix update
libvirt: stack use-after-free in virNetClientIOEventLoop()
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
6.2
null
null
null
GHSA-6gpq-3wvx-gvq3
Samsung Galaxy S3/S4 exposes an unprotected component allowing an unprivileged app to send arbitrary SMS texts to arbitrary destinations without permission.
[]
null
null
null
null
null
CVE-2015-2427
Microsoft Internet Explorer 9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."
[ "cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*" ]
null
null
null
9.3
null
GHSA-g9wh-q9v4-pqc7
Certain HP DeskJet 3630 All-in-One Printers models F5S43A - F5S57A, K4T93A - K4T99C, K4U00B - K4U03B, and V3F21A - V3F22A (firmware version SWP1FN1912BR or higher) have a Cross-Site Request Forgery (CSRF) vulnerability that could lead to a denial of service (DOS) or device misconfiguration.
[]
null
null
null
null
null
CVE-2014-3152
Integer underflow in the LCodeGen::PrepareKeyedOperand function in arm/lithium-codegen-arm.cc in Google V8 before 3.25.28.16, as used in Google Chrome before 35.0.1916.114, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger a negative key value.
[ "cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.25.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.25.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.25.2:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.25.3:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.25.4:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.25.5:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.25.6:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.25.7:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.25.8:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.25.9:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.25.10:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.25.11:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.25.12:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.25.13:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.25.14:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.25.15:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.25.16:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.25.17:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.25.18:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.25.19:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.25.20:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.25.21:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.25.22:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.25.23:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.25.24:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.25.25:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.25.26:*:*:*:*:*:*:*", "cpe:2.3:a:google:v8:3.25.27:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.2:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.3:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.4:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.5:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.6:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.7:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.8:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.9:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.10:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.11:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.13:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.14:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.15:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.17:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.18:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.19:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.20:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.21:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.22:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.23:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.27:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.31:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.32:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.33:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.34:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.35:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.36:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.37:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.38:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.39:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.40:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.41:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.42:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.43:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.44:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.45:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.46:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.47:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.48:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.49:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.51:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.52:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.54:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.56:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.57:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.59:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.61:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.68:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.69:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.71:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.72:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.74:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.77:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.80:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.82:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.84:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.85:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.86:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.88:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.90:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.92:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.93:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.95:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.96:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.98:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.99:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.101:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.103:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.104:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.105:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.106:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.107:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.108:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.109:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.110:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.111:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.112:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
GHSA-xx4p-cqfx-r6v6
In initiateTdlsTeardownInternal of sta_iface.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure in the wifi server with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-262235951
[]
null
4.4
null
null
null
GHSA-36jv-w59f-85w3
The WP Maps WordPress plugin before 4.7.2 does not sanitise and escape some of its Map settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
[]
null
3.5
null
null
null
GHSA-289m-2pf5-x59p
An issue was discovered in the Linux kernel before 4.18.6. An information leak in cdrom_ioctl_drive_status in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940.
[]
null
null
6.1
null
null
GHSA-pc32-x737-74cv
Cross-site Scripting in Pimcore
Pimcore 10.3.3 and prior is vulnerable to stored cross-site scripting. A patch is available on the 10.x branch and will likely be part of version 10.4.0.
[]
null
5.4
null
null
null
GHSA-qwgj-vm3m-pxqp
Raml-Module-Builder 26.4.0 allows SQL Injection in PostgresClient.update.
[]
null
null
null
null
null
GHSA-7rcp-2v2f-26xw
Improper Limitation of a Pathname leads to a Path Traversal vulnerability in the module King-Avis for Prestashop, allowing a user knowing the download token to read arbitrary local files.This issue affects King-Avis: before 17.3.15.
[]
null
4.9
null
null
null
GHSA-8564-m639-jh8r
The JIT created incorrect code for arguments in certain cases. This led to potential use-after-free crashes during garbage collection. This vulnerability affects Firefox < 125 and Firefox ESR < 115.10.
[]
null
7.8
null
null
null
CVE-2023-24203
Cross Site Scripting vulnerability in SourceCodester Simple Customer Relationship Management System v1.0 allows attacker to execute arbitary code via the company or query parameter(s).
[]
null
5.4
null
null
null
CVE-2022-44363
Tenda i21 V1.0.0.14(4656) is vulnerable to Buffer Overflow via /goform/setSnmpInfo.
[ "cpe:2.3:o:tenda:i21_firmware:1.0.0.14\\(4656\\):*:*:*:*:*:*:*", "cpe:2.3:h:tenda:i21:-:*:*:*:*:*:*:*" ]
null
9.8
null
null
null
CVE-2018-16391
Several buffer overflows when handling responses from a Muscle Card in muscle_list_files in libopensc/card-muscle.c in OpenSC before 0.19.0-rc1 could be used by attackers able to supply crafted smartcards to cause a denial of service (application crash) or possibly have unspecified other impact.
[ "cpe:2.3:a:opensc_project:opensc:*:*:*:*:*:*:*:*" ]
null
null
6.8
4.6
null
CVE-2025-38487
soc: aspeed: lpc-snoop: Don't disable channels that aren't enabled
In the Linux kernel, the following vulnerability has been resolved: soc: aspeed: lpc-snoop: Don't disable channels that aren't enabled Mitigate e.g. the following: # echo 1e789080.lpc-snoop > /sys/bus/platform/drivers/aspeed-lpc-snoop/unbind ... [ 120.363594] Unable to handle kernel NULL pointer dereference at virtual address 00000004 when write [ 120.373866] [00000004] *pgd=00000000 [ 120.377910] Internal error: Oops: 805 [#1] SMP ARM [ 120.383306] CPU: 1 UID: 0 PID: 315 Comm: sh Not tainted 6.15.0-rc1-00009-g926217bc7d7d-dirty #20 NONE ... [ 120.679543] Call trace: [ 120.679559] misc_deregister from aspeed_lpc_snoop_remove+0x84/0xac [ 120.692462] aspeed_lpc_snoop_remove from platform_remove+0x28/0x38 [ 120.700996] platform_remove from device_release_driver_internal+0x188/0x200 ...
[]
null
null
null
null
null
CVE-2024-4150
Simple Basic Contact Form <= 20221201 - Reflected Cross-Site Scripting
The Simple Basic Contact Form plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘scf_email’ parameter in versions up to, and including, 20221201 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
[]
null
6.1
null
null
null
GHSA-g78q-fxv7-624v
Use after free in WebApp Installs in Google Chrome prior to 102.0.5005.61 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension and specific user interaction.
[]
null
8.8
null
null
null
CVE-2022-39977
Online Pet Shop We App v1.0 was discovered to contain an arbitrary file upload vulnerability via the Editing function in the User module. This vulnerability allows attackers to execute arbitrary code via a crafted PHP file uploaded through the picture upload point.
[ "cpe:2.3:a:online_pet_shop_we_app_project:online_pet_shop_we_app:1.0:*:*:*:*:*:*:*" ]
null
7.2
null
null
null
RHSA-2022:6066
Red Hat Security Advisory: Red Hat OpenStack Platform 16.1 (etcd) security update
prometheus/client_golang: Denial of service using InstrumentHandlerCounter golang: compress/gzip: stack exhaustion in Reader.Read
[ "cpe:/a:redhat:openstack:16.1::el8" ]
null
7.5
null
null
null
GHSA-fh95-g988-p9j3
An issue in Cesanta mjs 2.20.0 allows a remote attacker to cause a denial of service via the mjs_getretvalpos function in the msj.c file.
[]
null
7.5
null
null
null
CVE-2010-3327
The implementation of HTML content creation in Microsoft Internet Explorer 6 through 8 does not remove the Anchor element during pasting and editing, which might allow remote attackers to obtain sensitive deleted information by visiting a web page, aka "Anchor Element Information Disclosure Vulnerability."
[ "cpe:2.3:a:microsoft:internet_explorer:6:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2003_server:*:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2003_server:*:sp2:itanium:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:*:itanium:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:*:x32:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:*:x64:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x32:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:itanium:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:r2:itanium:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:r2:x64:*:*:*:*:*" ]
null
null
null
4.3
null
CVE-2019-8836
A memory corruption issue was addressed with improved memory handling. This issue is fixed in watchOS 6.1.2, iOS 13.3.1 and iPadOS 13.3.1, tvOS 13.3.1. An application may be able to execute arbitrary code with kernel privileges.
[ "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*" ]
null
7.8
null
9.3
null
GHSA-q4wv-hp9c-9wxv
Juniper Junos OS before 12.1X46-D45, 12.1X47 before 12.1X47-D30, 12.3 before 12.3R11, 12.3X48 before 12.3X48-D25, 13.2 before 13.2R8, 13.3 before 13.3R7, 14.1 before 14.1R6, 14.2 before 14.2R4, 15.1 before 15.1R1 or 15.1F2, and 15.1X49 before 15.1X49-D15 allow local users to gain privileges via crafted combinations of CLI commands and arguments, a different vulnerability than CVE-2015-3003, CVE-2014-3816, and CVE-2014-0615.
[]
null
null
7.8
null
null
CVE-2019-19091
ABB eSOMS: HTTP response information leakage
For ABB eSOMS versions 4.0 to 6.0.3, HTTPS responses contain comments with sensitive information about the application. An attacker might use this detail information to specifically craft the attack.
[ "cpe:2.3:a:hitachienergy:esoms:*:*:*:*:*:*:*:*" ]
null
4.3
null
null
null
GHSA-c99p-9562-x762
IBM Security Guardium Insights 2.0.1 stores user credentials in plain in clear text which can be read by a local user. IBM X-Force ID: 184747.
[]
null
null
null
null
null
GHSA-gpf9-x4m4-m3gr
Stack-based buffer overflow in Adobe Flash Player before 11.7.700.269 and 11.8.x through 12.0.x before 12.0.0.70 on Windows and Mac OS X and before 11.2.202.341 on Linux, Adobe AIR before 4.0.0.1628 on Android, Adobe AIR SDK before 4.0.0.1628, and Adobe AIR SDK & Compiler before 4.0.0.1628 allows attackers to execute arbitrary code via unspecified vectors.
[]
null
null
null
null
null
GHSA-rpjr-7xhj-qm95
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Zumbo Comment Approved Notifier Extended allows Stored XSS. This issue affects Comment Approved Notifier Extended: from n/a through 5.2.
[]
null
5.9
null
null
null
CVE-2021-35247
Improper Input Validation Vulnerability in Serv-U
Serv-U web login screen to LDAP authentication was allowing characters that were not sufficiently sanitized. SolarWinds has updated the input mechanism to perform additional validation and sanitization. Please Note: No downstream affect has been detected as the LDAP servers ignored improper characters. To insure proper input validation is completed in all environments. SolarWinds recommends scheduling an update to the latest version of Serv-U.
[ "cpe:2.3:a:solarwinds:serv-u:*:*:*:*:*:*:*:*" ]
null
4.3
null
null
null
GHSA-fhqx-x8f6-2w5w
DjVuLibre 3.5.27 allows attackers to cause a denial-of-service attack (application crash via an out-of-bounds read) by crafting a corrupted JB2 image file that is mishandled in JB2Dict::JB2Codec::get_direct_context in libdjvu/JB2Image.h because of a missing zero-bytes check in libdjvu/GBitmap.h.
[]
null
5.5
null
null
null
CVE-2012-2711
Multiple cross-site scripting (XSS) vulnerabilities in the Taxonomy List module 6.x-1.x before 6.x-1.4 for Drupal allow remote authenticated users with create or edit taxonomy terms permissions to inject arbitrary web script or HTML via vectors related to taxonomy information.
[ "cpe:2.3:a:nancy_wichmann:taxonomy_list:6.x-1.0:*:*:*:*:*:*:*", "cpe:2.3:a:nancy_wichmann:taxonomy_list:6.x-1.0-beta1:*:*:*:*:*:*:*", "cpe:2.3:a:nancy_wichmann:taxonomy_list:6.x-1.1:*:*:*:*:*:*:*", "cpe:2.3:a:nancy_wichmann:taxonomy_list:6.x-1.2:*:*:*:*:*:*:*", "cpe:2.3:a:nancy_wichmann:taxonomy_list:6.x-1.2:dev:*:*:*:*:*:*", "cpe:2.3:a:nancy_wichmann:taxonomy_list:6.x-1.3:*:*:*:*:*:*:*", "cpe:2.3:a:nancy_wichmann:taxonomy_list:6.x-1.x-dev:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:-:*:*:*:*:*:*:*" ]
null
null
null
2.1
null
GHSA-f7w4-79f7-fhp3
An issue was discovered in Kentico 12.0.x before 12.0.15, 11.0.x before 11.0.48, 10.0.x before 10.0.52, and 9.x versions. Due to a failure to validate security headers, it was possible for a specially crafted request to the staging service to bypass the initial authentication and proceed to deserialize user-controlled .NET object input. This deserialization then led to unauthenticated remote code execution on the server where the Kentico instance was hosted.
[]
null
null
9.8
null
null
CVE-2022-26728
This issue was addressed with improved entitlements. This issue is fixed in Security Update 2022-004 Catalina, macOS Monterey 12.4, macOS Big Sur 11.6.6. A malicious application may be able to access restricted files.
[ "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-002:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-003:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-004:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-005:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-006:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-007:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-008:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2022-001:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2022-002:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2022-003:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*" ]
null
5.5
null
4.3
null
RHSA-2024:4118
Red Hat Security Advisory: Red Hat Ceph Storage 5.3 security, bug fix, and enhancement update
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) opentelemetry: DoS vulnerability in otelhttp go-git: Maliciously crafted Git server replies can lead to path traversal and RCE on go-git clients
[ "cpe:/a:redhat:ceph_storage:5.3::el8", "cpe:/a:redhat:ceph_storage:5.3::el9" ]
null
8.1
null
null
null
RHSA-2025:11802
Red Hat Security Advisory: nodejs:22 security update
sqlite: Integer Truncation in SQLite
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
7.7
null
null
null
CVE-2022-47547
GossipSub 1.1, as used for Ethereum 2.0, allows a peer to maintain a positive score (and thus not be pruned from the network) even though it continuously misbehaves by never forwarding topic messages.
[ "cpe:2.3:a:protocol:gossipsub:1.1:*:*:*:*:*:*:*" ]
null
5.3
null
null
null
CVE-2022-31257
A vulnerability has been identified in Mendix Applications using Mendix 7 (All versions < V7.23.31), Mendix Applications using Mendix 8 (All versions < V8.18.18), Mendix Applications using Mendix 9 (All versions < V9.14.0), Mendix Applications using Mendix 9 (V9.12) (All versions < V9.12.2), Mendix Applications using Mendix 9 (V9.6) (All versions < V9.6.12). In case of access to an active user session in an application that is built with an affected version, it’s possible to change that user’s password bypassing password validations within a Mendix application. This could allow to set weak passwords.
[ "cpe:2.3:a:mendix:mendix:*:*:*:*:*:*:*:*" ]
null
7.5
null
5
null
GHSA-gf3j-4gcf-3g2x
In Libav 12.3, there is a heap-based buffer over-read in decode_frame in libavcodec/lcldec.c that allows an attacker to cause denial-of-service via a crafted avi file.
[]
null
null
6.5
null
null
CVE-2016-1771
The Downloads feature in Apple Safari before 9.1 mishandles file expansion, which allows remote attackers to cause a denial of service via a crafted web site.
[ "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*" ]
null
null
6.5
7.1
null