id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
189k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
patch_commit_url
stringlengths
36
232
CVE-2024-37086
VMware ESXi contains an out-of-bounds read vulnerability. A malicious actor with local administrative privileges on a virtual machine with an existing snapshot may trigger an out-of-bounds read leading to a denial-of-service condition of the host.
[]
null
6.8
null
null
null
GHSA-876g-49r6-33qj
Liferay Portal allows improper access through the expandoTableLocalService
Liferay Portal 7.4.0 through 7.4.3.132, and Liferay DXP 2025.Q2.0, 2025.Q1.0 through 2025.Q1.14, 2024.Q4.0 through 2024.Q4.7, 2024.Q3.0 through 2024.Q3.13, 2024.Q2.0 through 2024.Q2.13, 2024.Q1.1 through 2024.Q1.18 and 7.4 GA through update 92 has a security vulnerability that allowing for improper access through the expandoTableLocalService.
[]
4.6
null
null
null
null
GHSA-8mfm-9h94-j57q
NFX Series devices using Juniper Networks Junos OS are susceptible to a local command execution vulnerability thereby allowing an attacker to elevate their privileges via the Junos Device Management Daemon (JDMD) process. This issue affects Juniper Networks Junos OS on NFX Series 17.2 version 17.2R1 and later versions prior to 18.3R3-S4; 18.4 versions prior to 18.4R2-S5, 18.4R3-S5; 19.1 versions prior to 19.1R1-S3; 19.2 version 19.1R2 and later versions prior to 19.2R3; 19.3 versions prior to 19.3R3; 19.4 versions prior to 19.4R2-S2. 19.4 versions 19.4R3 and above. This issue does not affect Juniper Networks Junos OS versions prior to 17.2R1. This issue does not affect the JDMD as used by Junos Node Slicing such as External Servers use in conjunction with Junos Node Slicing and In-Chassis Junos Node Slicing on MX480, MX960, MX2008, MX2010, MX2020.
[]
null
7.8
null
null
null
GHSA-cgj5-r57f-xw42
An issue was discovered in BMC Control-M 9.0.21.300. When Control-M Server has a database connection, it runs DBUStatus.exe frequently, which then calls dbu_connection_details.vbs with the username, password, database hostname, and port written in cleartext, which can be seen in event and process logs in two separate locations.
[]
null
9.8
null
null
null
GHSA-3x3x-gvp4-q59h
SAP NetWeaver AS ABAP (Banking Services), versions - 710, 711, 740, 750, 751, 752, 75A, 75B, 75C, 75D, 75E, does not perform necessary authorization checks for an authenticated user due to Missing Authorization Check, allowing wrong and unexpected change of individual conditions by a malicious user leading to wrong prices.
[]
null
6.5
null
null
null
GHSA-vcrv-vj6h-fr9c
cPanel before 82.0.15 allows self XSS in the SSL Key Delete interface (SEC-526).
[]
null
null
null
null
null
CVE-2018-9841
The export function in libavfilter/vf_signature.c in FFmpeg through 3.4.2 allows remote attackers to cause a denial of service (out-of-array access) or possibly have unspecified other impact via a long filename.
[ "cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*" ]
null
null
8.8
6.8
null
GHSA-9j82-x46x-536g
A buffer overflow flaw was found in the Linux kernel Broadcom Full MAC Wi-Fi driver. This issue occurs when a user connects to a malicious USB device. This can allow a local user to crash the system or escalate their privileges.
[]
null
6.6
null
null
null
CVE-2020-1333
An elevation of privilege vulnerability exists when Group Policy Services Policy Processing improperly handle reparse points, aka 'Group Policy Services Policy Processing Elevation of Privilege Vulnerability'.
[ "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*" ]
null
6.7
null
3.7
null
CVE-2023-39237
ASUS RT-AC86U - Command injection vulnerability - 5
ASUS RT-AC86U Traffic Analyzer - Apps analysis function has insufficient filtering of special character. A remote attacker with regular user privilege can exploit this vulnerability to perform command injection attack to execute arbitrary commands, disrupt system or terminate services.
[ "cpe:2.3:h:asus:rt-ac86u:-:*:*:*:*:*:*:*", "cpe:2.3:o:asus:rt-ac86u_firmware:3.0.0.4_386_51529:*:*:*:*:*:*:*" ]
null
8.8
null
null
null
RHSA-2010:0921
Red Hat Security Advisory: Red Hat Enterprise MRG Messaging and Grid security update
plugin: enable QUEUE_ALL_USERS_TRUSTED for Submit/Hold/Release/Remove ops
[ "cpe:/a:redhat:enterprise_mrg:1::el5" ]
null
null
null
null
null
GHSA-gx69-6cp4-hxrj
RubyGems Link Following vulnerability
RubyGems version Ruby 2.2 series: 2.2.9 and earlier, Ruby 2.3 series: 2.3.6 and earlier, Ruby 2.4 series: 2.4.3 and earlier, Ruby 2.5 series: 2.5.0 and earlier, prior to trunk revision 62422 contains a Directory Traversal vulnerability in `install_location` function of `package.rb` that can result in path traversal when writing to a symlinked basedir outside of the root. This vulnerability appears to have been fixed in 2.7.6.
[]
null
null
7.5
null
null
GHSA-fprf-5vp8-756m
An issue was discovered in FIS GT.M through V7.0-000 (related to the YottaDB code base). Using crafted input, attackers can cause an integer underflow of the size of calls to memset in op_fnj3 in sr_port/op_fnj3.c in order to cause a segmentation fault and crash the application.
[]
null
7.5
null
null
null
GHSA-c48j-w2fx-98qq
A vulnerability has been identified in Parasolid V34.1 (All versions < V34.1.258), Parasolid V35.0 (All versions < V35.0.254), Teamcenter Visualization V14.1 (All versions), Teamcenter Visualization V14.2 (All versions < V14.2.0.6), Teamcenter Visualization V14.3 (All versions). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted X_T files. This could allow an attacker to execute code in the context of the current process.
[]
7.3
7.8
null
null
null
CVE-2021-4150
A use-after-free flaw was found in the add_partition in block/partitions/core.c in the Linux kernel. A local attacker with user privileges could cause a denial of service on the system. The issue results from the lack of code cleanup when device_add call fails when adding a partition to the disk.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:5.15:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:5.15:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:5.15:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:5.15:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:5.15:rc4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:5.15:rc5:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:5.15:rc6:*:*:*:*:*:*" ]
null
5.5
null
4.9
null
CVE-2011-4217
Investintech.com SlimPDF Reader does not properly restrict read operations during block data moves, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF document.
[ "cpe:2.3:a:investintech:slimpdf_reader:-:*:*:*:*:*:*:*" ]
null
null
null
9.3
null
GHSA-6wh2-f463-c2vf
The decode_init function in libavcodec/utvideodec.c in FFmpeg 2.8 through 3.4.2 allows remote attackers to cause a denial of service (Out of array read) via an AVI file with crafted dimensions within chroma subsampling data.
[]
null
null
6.5
null
null
CVE-2021-21267
Regular Expression Denial-of-Service in npm schema-inspector
Schema-Inspector is an open-source tool to sanitize and validate JS objects (npm package schema-inspector). In before version 2.0.0, email address validation is vulnerable to a denial-of-service attack where some input (for example `a@0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.`) will freeze the program or web browser page executing the code. This affects any current schema-inspector users using any version to validate email addresses. Users who do not do email validation, and instead do other types of validation (like string min or max length, etc), are not affected. Users should upgrade to version 2.0.0, which uses a regex expression that isn't vulnerable to ReDoS.
[ "cpe:2.3:a:schema-inspector_project:schema-inspector:*:*:*:*:*:node.js:*:*", "cpe:2.3:a:netapp:e-series_performance_analyzer:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*" ]
null
7.5
null
null
null
CVE-2022-3156
Rockwell Automation Studio 5000 Logix Emulate Vulnerable to a Remote Code Execution Vulnerability
A remote code execution vulnerability exists in Rockwell Automation Studio 5000 Logix Emulate software.  Users are granted elevated permissions on certain product services when the software is installed. Due to this misconfiguration, a malicious user could potentially achieve remote code execution on the targeted software.
[ "cpe:2.3:a:rockwellautomation:studio_5000_logix_emulate:*:*:*:*:*:*:*:*" ]
null
7.8
null
null
null
GHSA-r3f5-fp49-56xc
A vulnerability in the web-based management interface of Cisco Prime Infrastructure Software could allow an unauthenticated, remote attacker to conduct a reflected cross-site scripting (XSS) attack against a user of the interface on an affected device. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by persuading a user of the web-based management interface on an affected device to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or to access sensitive, browser-based information.
[]
null
6.1
null
null
null
CVE-2025-40600
Use of Externally-Controlled Format String vulnerability in the SonicOS SSL VPN interface allows a remote unauthenticated attacker to cause service disruption.
[]
null
9.8
null
null
null
CVE-2018-10936
A weakness was found in postgresql-jdbc before version 42.2.5. It was possible to provide an SSL Factory and not check the host name if a host name verifier was not provided to the driver. This could lead to a condition where a man-in-the-middle attacker could masquerade as a trusted server by providing a certificate for the wrong host, as long as it was signed by a trusted CA.
[ "cpe:2.3:a:postgresql:postgresql_jdbc_driver:*:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*" ]
null
null
8.1
null
null
CVE-2021-37997
Use after free in Sign-In in Google Chrome prior to 95.0.4638.69 allowed a remote attacker who convinced a user to sign into Chrome to potentially exploit heap corruption via a crafted HTML page.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*" ]
null
8.8
null
6.8
null
CVE-2015-1761
Microsoft SQL Server 2008 SP3 and SP4, 2008 R2 SP2 and SP3, 2012 SP1 and SP2, and 2014 uses an incorrect class during casts of unspecified pointers, which allows remote authenticated users to gain privileges by leveraging certain write access, aka "SQL Server Elevation of Privilege Vulnerability."
[ "cpe:2.3:a:microsoft:sql_server:2008:r2_sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sql_server:2008:r2_sp3:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sql_server:2008:sp3:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sql_server:2008:sp4:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sql_server:2012:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sql_server:2012:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sql_server:2014:*:*:*:*:*:*:*" ]
null
null
null
6.5
null
CVE-2024-32320
Tenda AC500 V2.0.1.9(1307) firmware has a stack overflow vulnerability via the timeZone parameter in the formSetTimeZone function.
[ "cpe:2.3:h:tenda:ac500:-:*:*:*:*:*:*:*" ]
null
5.9
null
null
null
CVE-2020-3114
Cisco Data Center Network Manager Cross-Site Request Forgery Vulnerability
A vulnerability in the web-based management interface of Cisco Data Center Network Manager (DCNM) could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack on an affected system. The vulnerability is due to insufficient CSRF protections for the web-based management interface on an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to follow a malicious link while having an active session on an affected device. A successful exploit could allow the attacker to perform arbitrary actions with the privilege level of the targeted user.
[ "cpe:2.3:a:cisco:data_center_network_manager:*:*:*:*:*:*:*:*" ]
null
null
8.8
null
null
GHSA-g6mr-mvf4-4wvj
A user authorized to perform database queries may trigger denial of service by issuing specially crafted queries with compound indexes affecting QueryPlanner. This issue affects: MongoDB Inc. MongoDB Server v3.6 versions prior to 3.6.9, v4.0 versions prior to 4.0.3.
[]
null
6.5
null
null
null
RHSA-2015:1089
Red Hat Security Advisory: qemu-kvm-rhev security update
qemu: pcnet: multi-tmd buffer overflow in the tx path
[ "cpe:/a:redhat:openstack:5::el6" ]
null
null
null
null
null
GHSA-vqqm-c9gx-773q
Froxlor contains Business Logic Errors
Business Logic Errors in GitHub repository froxlor/froxlor prior to 2.0.10.
[]
null
4.9
null
null
null
GHSA-mf63-58j7-3j76
Mattermost fails to properly validate markdown, allowing an attacker to crash the server via a specially crafted markdown input.
[]
null
4.3
null
null
null
GHSA-9v35-rf4g-xvc2
Multiple privilege escalation vulnerabilities in Avast Antivirus prior to 20.4 allow a local user to gain elevated privileges by calling unnecessarily powerful internal methods of the main antivirus service which could lead to the (1) arbitrary file delete, (2) write and (3) reset security.
[]
null
7.8
null
null
null
GHSA-83xj-2vf9-49hq
In FreeBSD before 11.2-STABLE(r341486) and 11.2-RELEASE-p6, insufficient bounds checking in one of the device models provided by bhyve can permit a guest operating system to overwrite memory in the bhyve host possibly permitting arbitrary code execution. A guest OS using a firmware image can cause the bhyve process to crash, or possibly execute arbitrary code on the host as root.
[]
null
null
10
null
null
GHSA-6pm3-53cv-rpmg
The Documentor WordPress plugin through 1.5.3 fails to sanitize and escape user input before it is being interpolated in an SQL statement and then executed, leading to an SQL Injection exploitable by unauthenticated users.
[]
null
9.8
null
null
null
GHSA-hf3p-65hx-734m
Adobe Experience Manager versions 6.5.22 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
[]
null
5.4
null
null
null
CVE-2025-46689
Ververica Platform 2.14.0 contain an Reflected XSS vulnerability via a namespaces/default/formats URI.
[]
null
5.4
null
null
null
GHSA-9cqr-9w8p-9hxm
Improper Access Control vulnerability in Apache Traffic Server.This issue affects Apache Traffic Server: from 9.2.0 through 9.2.8, from 10.0.0 through 10.0.3.Users are recommended to upgrade to version 9.2.9 or 10.0.4, which fixes the issue.
[]
null
6.3
null
null
null
CVE-2024-1860
The Disable Json API, Login Lockdown, XMLRPC, Pingback, Stop User Enumeration Anti Hacker Scan plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the antihacker_add_whitelist() function in all versions up to, and including, 4.51. This makes it possible for unauthenticated attackers to add their IP Address to the whitelist circumventing protection
[ "cpe:2.3:a:sminozzi:disable_json_api_login_lockdown_xml_rpc_pingback_stop_user_enumeration_anit_hacker_scan:*:*:*:*:*:*:*:*" ]
null
6.5
null
null
null
GHSA-j9wq-qf2q-26rp
Dell iDRAC Service Module, versions 5.2.0.0 and prior, contain an Incorrect Default Permissions vulnerability. It may allow a local unprivileged user to escalate privileges and execute arbitrary code on the affected system. Dell recommends customers upgrade at the earliest opportunity.
[]
null
7
null
null
null
CVE-2001-0400
nph-maillist.pl allows remote attackers to execute arbitrary commands via shell metacharacters ("`") in the email address.
[ "cpe:2.3:a:matt_tourtillott:nph-maillist:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:matt_tourtillott:nph-maillist:3.5:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
GHSA-jccv-rx29-7277
The underConstruction WordPress plugin before 1.20 does not have CSRF check in place when deactivating the construction mode, which could allow attackers to make a logged in admin perform such action via a CSRF attack
[]
null
4.3
null
null
null
CVE-2017-16253
An exploitable buffer overflow vulnerability exists in the PubNub message handler Insteon Hub 2245-222 - Firmware version 1012 for the cc channel of Insteon Hub running firmware version 1012. Specially crafted commands sent through the PubNub service can cause a stack-based buffer overflow overwriting arbitrary data. An attacker can send an authenticated HTTP request At 0x9d014dd8 the value for the id key is copied using strcpy to the buffer at $sp+0x290. This buffer is 32 bytes large, sending anything longer will cause a buffer overflow.
[ "cpe:2.3:o:insteon:hub_firmware:1012:*:*:*:*:*:*:*", "cpe:2.3:h:insteon:hub:2245-222:-:*:*:*:*:*:*" ]
null
null
8.5
null
null
CVE-2011-2155
Login.aspx in the SmarterTools SmarterStats 6.0 web server generates a ctl00$MPH$txtPassword password form field without disabling the autocomplete feature, which makes it easier for remote attackers to bypass authentication by leveraging an unattended workstation.
[ "cpe:2.3:a:smartertools:smarterstats:6.0:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
GHSA-8c32-34gf-q623
Cross-site scripting (XSS) vulnerability in the print_textinputs_var function in editor/dialog/fck_spellerpages/spellerpages/server-scripts/spellchecker.php in FCKeditor 2.6.7 and earlier allows remote attackers to inject arbitrary web script or HTML via textinputs array parameters.
[]
null
null
null
null
null
RHSA-2024:6500
Red Hat Security Advisory: Red Hat build of Keycloak 22.0.12 Images Update
keycloak: potential bypass of brute force protection keycloak: Leak of configured LDAP bind credentials through the Keycloak admin console wildfly-elytron: org.keycloak/keycloak-services: session fixation in elytron saml adapters
[ "cpe:/a:redhat:build_keycloak:22::el9" ]
null
7.1
null
null
null
GHSA-r9rp-xj5x-xhgh
An issue was discovered in rust-ffmpeg 0.3.0 (after comit 5ac0527) A null pointer dereference vulnerability in the input() constructor function allows an attacker to cause a denial of service. The vulnerability is triggered when the avio_alloc_context() call fails and returns NULL, which is then stored and later dereferenced by the Io struct's Drop implementation.
[]
null
7.5
null
null
null
GHSA-m7cp-cc3g-rq5q
Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 13.2 and iPadOS 13.2, tvOS 13.2, Safari 13.0.3, iTunes for Windows 12.10.2, iCloud for Windows 11.0, iCloud for Windows 7.15. Processing maliciously crafted web content may lead to arbitrary code execution.
[]
null
null
null
null
null
GHSA-r2hv-pfm6-9m75
Vulnerability in the JD Edwards EnterpriseOne Tools product of Oracle JD Edwards (component: Web Runtime SEC). Supported versions that are affected are 9.2.0.0-9.2.9.2. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise JD Edwards EnterpriseOne Tools. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all JD Edwards EnterpriseOne Tools accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).
[]
null
6.5
null
null
null
GHSA-ccm2-xh6r-r5h7
D-Link DCS-825L firmware v1.08.01 contains a vulnerability in the watchdog script `mydlink-watch-dog.sh`, which blindly respawns binaries such as `dcp` and `signalc` without verifying integrity, authenticity, or permissions. An attacker with local filesystem access (via physical access, firmware modification, or debug interfaces) can replace these binaries with malicious payloads. The script executes these binaries as root in an infinite loop, leading to persistent privilege escalation and arbitrary code execution. This issue is mitigated in v1.09.02, but the product is officially End-of-Life and unsupported.
[]
null
7.8
null
null
null
GHSA-8pcm-jj8v-3g5h
A vulnerability has been identified in Tecnomatix Plant Simulation (All versions < V2201.0006). The affected application contains an out of bounds write past the end of an allocated buffer while parsing a specially crafted SPP file. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-19789)
[]
null
7.8
null
null
null
CVE-2024-7680
itsourcecode Tailoring Management System incedit.php sql injection
A vulnerability was found in itsourcecode Tailoring Management System 1.0. It has been classified as critical. This affects an unknown part of the file /incedit.php?id=4. The manipulation of the argument id/inccat/desc/date/amount leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
[ "cpe:2.3:a:itsourcecode:tailoring_management_system:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:angeljudesuarez:tailoring_management_system:1.0:*:*:*:*:*:*:*" ]
5.3
6.3
6.3
6.5
null
GHSA-h8fh-8c4j-6m47
The Memberlite Shortcodes plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugins's 'row' shortcode in all versions up to, and including, 1.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
6.4
null
null
null
RHSA-2024:9690
Red Hat Security Advisory: tigervnc security update
xorg-x11-server: tigervnc: heap-based buffer overflow privilege escalation vulnerability
[ "cpe:/a:redhat:rhel_eus:8.8::appstream" ]
null
7.8
null
null
null
CVE-2002-1913
phptonuke.php in myPHPNuke 1.8.8 allows remote attackers to read arbitrary files via a full pathname in the filnavn variable.
[ "cpe:2.3:a:myphpnuke:myphpnuke:1.8.8:*:*:*:*:*:*:*" ]
null
null
null
5
null
ICSA-19-094-03
Rockwell Automation Stratix 5400/5410/5700/8000/8300 and ArmorStratix 5700
Sending a specially crafted open shortest path first version 3 (OSPFv3) packet could allow an unauthenticated, adjacent attacker to cause an affected device to reload, resulting in a denial-of-service condition.CVE-2018-0466 has been assigned to this vulnerability. A CVSS v3 base score of 7.4 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H). Sending a malformed HTTP packet in the web framework of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a buffer overflow condition on an affected device, resulting in a denial-of-service condition.CVE-2018-0470 has been assigned to this vulnerability. A CVSS v3 base score of 8.6 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H). Sending a custom precision time protocol (PTP) packet to or through an affected device could allow an unauthenticated remote attacker to cause a denial-of-service condition of PTP, which may result in time synchronization issues across the network.CVE-2018-0473 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). Sending a malicious IPv6 packet to or through the affected device could allow an unauthenticated, remote attacker to cause the device to reload, resulting in a denial-of-service condition.CVE-2018-0467 has been assigned to this vulnerability. A CVSS v3 base score of 8.6 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H). Sending a high rate of Cisco discovery protocol packets to an affected device could allow an unauthenticated, adjacent attacker to exhaust memory on an affected device, resulting in a denial-of-service condition.CVE-2018-15373 has been assigned to this vulnerability. A CVSS v3 base score of 7.4 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H).
[]
null
null
7.4
null
null
CVE-2023-1221
Insufficient policy enforcement in Extensions API in Google Chrome prior to 111.0.5563.64 allowed an attacker who convinced a user to install a malicious extension to bypass navigation restrictions via a crafted Chrome Extension. (Chromium security severity: Medium)
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" ]
null
4.3
null
null
null
CVE-2002-0954
The encryption algorithms for enable and passwd commands on Cisco PIX Firewall can be executed quickly due to a limited number of rounds, which make it easier for an attacker to decrypt the passwords using brute force techniques.
[ "cpe:2.3:a:cisco:pix_firewall:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2022-21734
`CHECK`-failures in Tensorflow
Tensorflow is an Open Source Machine Learning Framework. The implementation of `MapStage` is vulnerable a `CHECK`-fail if the key tensor is not a scalar. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
[ "cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*", "cpe:2.3:a:google:tensorflow:2.7.0:*:*:*:*:*:*:*" ]
null
6.5
null
null
null
GHSA-24xf-f6x5-p9rf
Cross-Site Request Forgery (CSRF) vulnerability in OTWthemes Info Boxes Shortcode and Widget allows Cross Site Request Forgery. This issue affects Info Boxes Shortcode and Widget: from n/a through 1.15.
[]
null
4.3
null
null
null
CVE-2023-0747
Cross-site Scripting (XSS) - Stored in btcpayserver/btcpayserver
Cross-site Scripting (XSS) - Stored in GitHub repository btcpayserver/btcpayserver prior to 1.7.6.
[ "cpe:2.3:a:btcpayserver:btcpayserver:*:*:*:*:*:*:*:*" ]
null
5.5
null
null
null
GHSA-v96r-m4pf-rgcw
In apusys, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07177810; Issue ID: ALPS07177810.
[]
null
6.7
null
null
null
GHSA-4h69-9cg9-wqmw
Exposure of Sensitive Information in putDsaSimImsi in TelephonyUI prior to SMR Jul-2022 Release 1 allows local attacker to access imsi via log.
[]
null
2.3
null
null
null
RHSA-2024:4412
Red Hat Security Advisory: kernel-rt security and bug fix update
kernel: smb: client: fix potential OOBs in smb2_parse_contexts() kernel: netfilter: use-after-free in nft_trans_gc_catchall_sync leads to privilege escalation kernel: netfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations
[ "cpe:/a:redhat:rhel_e4s:9.0::nfv", "cpe:/a:redhat:rhel_e4s:9.0::realtime" ]
null
6.1
null
null
null
GHSA-fj7x-qvgj-4pm7
Unspecified vulnerability in Easy Login in the Sender module in HP Remote Graphics Software (RGS) 4.0.0 through 5.2.4 allows remote attackers to execute arbitrary code via unknown vectors.
[]
null
null
null
null
null
CVE-2001-0348
Microsoft Windows 2000 telnet service allows attackers to cause a denial of service (crash) via a long logon command that contains a backspace.
[ "cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*" ]
null
null
null
5
null
GHSA-pmhg-5fq2-cxqq
Windows Remote Desktop Licensing Service Denial of Service Vulnerability
[]
null
6.5
null
null
null
CVE-2007-4034
Stack-based buffer overflow in the YDPCTL.YDPControl.1 (aka Yahoo! Installer Plugin for Widgets) ActiveX control before 2007.7.13.3 (20070620) in YDPCTL.dll in Yahoo! Widgets before 4.0.5 allows remote attackers to execute arbitrary code via a long argument to the GetComponentVersion method. NOTE: some of these details are obtained from third party information.
[ "cpe:2.3:a:yahoo:widgets:*:*:*:*:*:*:*:*" ]
null
null
null
9.3
null
GHSA-h2q5-7v73-r3cx
A heap corruption of type CWE-120 exists in quassel version 0.12.4 in quasselcore in void DataStreamPeer::processMessage(const QByteArray &msg) datastreampeer.cpp line 62 that allows an attacker to execute code remotely.
[]
null
null
9.8
null
null
ICSMA-17-318-01
Philips IntelliSpace Cardiovascular System and Xcelera System Vulnerability
Credentials are stored in cleartext in system files that may allow an attacker with elevated privileges to gain unauthorized access to data to include patient health information, system resources, and misuse of connected assets. CVE-2017-14111 has been assigned to this vulnerability. A CVSS v3 base score of 7.2 has been assigned; the CVSS vector string is (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H).
[]
null
null
7.2
null
null
CVE-2011-1716
Multiple cross-site scripting (XSS) vulnerabilities in the Web UI in Xymon before 4.3.1 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.
[ "cpe:2.3:a:xymon:xymon:*:beta3:*:*:*:*:*:*", "cpe:2.3:a:xymon:xymon:*:beta4:*:*:*:*:*:*", "cpe:2.3:a:xymon:xymon:*:beta5:*:*:*:*:*:*", "cpe:2.3:a:xymon:xymon:*:beta6:*:*:*:*:*:*", "cpe:2.3:a:xymon:xymon:*:rc1:*:*:*:*:*:*", "cpe:2.3:a:xymon:xymon:*:rc2:*:*:*:*:*:*", "cpe:2.3:a:xymon:xymon:*:rc3:*:*:*:*:*:*", "cpe:2.3:a:xymon:xymon:*:rc4:*:*:*:*:*:*", "cpe:2.3:a:xymon:xymon:*:rc5:*:*:*:*:*:*", "cpe:2.3:a:xymon:xymon:*:rc6:*:*:*:*:*:*", "cpe:2.3:a:xymon:xymon:*:*:*:*:*:*:*:*", "cpe:2.3:a:xymon:xymon:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:xymon:xymon:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:xymon:xymon:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:xymon:xymon:4.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:xymon:xymon:4.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:xymon:xymon:4.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:xymon:xymon:4.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:xymon:xymon:4.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:xymon:xymon:4.1.2:p1:*:*:*:*:*:*", "cpe:2.3:a:xymon:xymon:4.1.2:p2:*:*:*:*:*:*", "cpe:2.3:a:xymon:xymon:4.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:xymon:xymon:4.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:xymon:xymon:4.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:xymon:xymon:4.3.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:xymon:xymon:4.3.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:xymon:xymon:4.3.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:xymon:xymon:4.3.0:rc1:*:*:*:*:*:*" ]
null
null
null
4.3
null
GHSA-wv6v-35vp-99p3
EveryBlog 5.x and 6.x, a module for Drupal, allows remote attackers to bypass access restrictions via unknown vectors.
[]
null
null
null
null
null
GHSA-prjw-g7wq-rf93
A URL Redirection to Untrusted Site vulnerability exists in the embedded web servers in all Modicon M340, Premium, Quantum PLCs and BMXNOR0200 where a user clicking on a specially crafted link can be redirected to a URL of the attacker's choosing.
[]
null
null
6.1
null
null
CVE-2021-29934
An issue was discovered in PartialReader in the uu_od crate before 0.0.4 for Rust. Attackers can read the contents of uninitialized memory locations via a user-provided Read operation.
[ "cpe:2.3:a:uu_od_project:uu_od:*:*:*:*:*:rust:*:*" ]
null
7.3
null
7.5
null
CVE-2020-35275
Coastercms v5.8.18 is affected by cross-site Scripting (XSS). A user can steal a cookie and make the user redirect to any malicious website because it is trigged on the main home page of the product/application.
[ "cpe:2.3:a:coastercms:coastercms:5.8.18:*:*:*:*:*:*:*" ]
null
5.4
null
3.5
null
CVE-2012-4587
McAfee Enterprise Mobility Manager (EMM) Agent before 4.8 and Server before 10.1, when one-time provisioning (OTP) mode is enabled, have an improper dependency on DNS SRV records, which makes it easier for remote attackers to discover user passwords by spoofing the EMM server, as demonstrated by a password entered on an iOS device.
[ "cpe:2.3:a:mcafee:enterprise_mobility_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:mcafee:enterprise_mobility_manager_agent:*:*:*:*:*:*:*:*" ]
null
null
null
3.5
null
CVE-2020-3164
Cisco ESA, Cisco WSA, and Cisco SMA GUI Denial of Service Vulnerability
A vulnerability in the web-based management interface of Cisco AsyncOS for Cisco Email Security Appliance (ESA), Cisco Web Security Appliance (WSA), and Cisco Content Security Management Appliance (SMA) could allow an unauthenticated remote attacker to cause high CPU usage on an affected device, resulting in a denial of service (DoS) condition. The vulnerability is due to improper validation of specific HTTP request headers. An attacker could exploit this vulnerability by sending a malformed HTTP request to an affected device. A successful exploit could allow the attacker to trigger a prolonged status of high CPU utilization relative to the GUI process(es). Upon successful exploitation of this vulnerability, an affected device will still be operative, but its response time and overall performance may be degraded.
[ "cpe:2.3:a:cisco:cloud_email_security:*:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:content_security_management_appliance:*:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:email_security_appliance:*:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:web_security_appliance:*:*:*:*:*:*:*:*" ]
null
null
5.3
null
null
CVE-2023-31161
Improper Input Validation in Web Interface
An Improper Input Validation vulnerability in the Schweitzer Engineering Laboratories Real-Time Automation Controller (SEL RTAC) Web Interface could allow an authenticated remote attacker to use internal resources, allowing a variety of potential effects. See SEL Service Bulletin dated 2022-11-15 for more details.
[ "cpe:2.3:o:selinc:sel-3350_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:selinc:sel-3350:-:*:*:*:*:*:*:*", "cpe:2.3:o:selinc:sel-3532_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:selinc:sel-3532:-:*:*:*:*:*:*:*", "cpe:2.3:o:selinc:sel-3555_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:selinc:sel-3555:-:*:*:*:*:*:*:*", "cpe:2.3:o:selinc:sel-3560e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:selinc:sel-3560e:-:*:*:*:*:*:*:*", "cpe:2.3:o:selinc:sel-3560s_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:selinc:sel-3560s:-:*:*:*:*:*:*:*" ]
null
5.9
null
null
null
RHSA-2022:8863
Red Hat Security Advisory: Red Hat OpenStack Platform 16.1.9 (python-paramiko) security update
python-paramiko: Race condition in the write_private_key_file function
[ "cpe:/a:redhat:openstack:16.1::el8" ]
null
5.1
null
null
null
CVE-2017-1000395
Jenkins 2.73.1 and earlier, 2.83 and earlier provides information about Jenkins user accounts which is generally available to anyone with Overall/Read permissions via the /user/(username)/api remote API. This included e.g. Jenkins users' email addresses if the Mailer Plugin is installed. The remote API now no longer includes information beyond the most basic (user ID and name) unless the user requesting it is a Jenkins administrator.
[ "cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*", "cpe:2.3:a:jenkins:jenkins:*:*:*:*:-:*:*:*" ]
null
null
4.3
4
null
GHSA-x348-x493-xr7c
Cross-site scripting (XSS) vulnerability in Upload/engine.php in Chevereto 1.91 allows remote attackers to inject arbitrary web script or HTML via the v parameter.
[]
null
null
null
null
null
GHSA-ggjw-r373-gj64
kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging incorrect BPF_RSH signed bounds calculations.
[]
null
null
7.8
null
null
GHSA-27fg-773w-qwfr
An issue was discovered in Thunar before 4.16.7 and 4.17.x before 4.17.2. When called with a regular file as a command-line argument, it delegates to a different program (based on the file type) without user confirmation. This could be used to achieve code execution.
[]
null
9.8
null
null
null
GHSA-4328-qrj5-x8r7
Safari in Mac OS X 10.3.9 and 10.4.2, when rendering Rich Text Format (RTF) files, can directly access URLs without performing the normal security checks, which allows remote attackers to execute arbitrary commands.
[]
null
null
null
null
null
GHSA-h6f6-gv69-8854
A vulnerability was found in code-projects Laundry System 1.0. It has been classified as problematic. This affects an unknown part of the file /data/edit_laundry.php. The manipulation of the argument Customer leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
[]
2
3.5
null
null
null
CVE-2022-1413
Missing input masking in GitLab CE/EE affecting all versions starting from 1.0.2 before 14.8.6, all versions from 14.9.0 before 14.9.4, and all versions from 14.10.0 before 14.10.1 causes potentially sensitive integration properties to be disclosed in the web interface
[ "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:14.10.0:*:*:*:community:*:*:*", "cpe:2.3:a:gitlab:gitlab:14.10.0:*:*:*:enterprise:*:*:*" ]
null
5.4
null
null
null
GHSA-rpj6-22m9-9jm9
An issue was discovered in certain Apple products. iOS before 10.3 is affected. macOS before 10.12.4 is affected. tvOS before 10.2 is affected. watchOS before 3.2 is affected. The issue involves the "Kernel" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app.
[]
null
null
7.8
null
null
GHSA-7vgw-xx44-4cc5
SQL injection vulnerability in index.php in DSCounter 1.2, with magic_quotes_gpc disabled, allows remote attackers to execute arbitrary SQL commands via the X-Forwarded-For field (HTTP_X_FORWARDED_FOR environment variable) in an HTTP header.
[]
null
null
null
null
null
GHSA-r2fh-qm7g-x68j
A CWE-669: Incorrect Resource Transfer Between Spheres vulnerability exists that could allow unauthorized access when an attacker uses cross-domain attacks. Affected Products: Wiser Smart, EER21000 & EER21001 (V4.5 and prior)
[]
null
8.2
null
null
null
GHSA-5m7x-c2v2-7479
Race condition in Google Chrome before 25.0.1364.152 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the handling of media threads.
[]
null
null
null
null
null
CVE-2011-4745
Multiple cross-site scripting (XSS) vulnerabilities in the billing system for Parallels Plesk Panel 10.3.1_build1013110726.09 allow remote attackers to inject arbitrary web script or HTML via crafted input to a PHP script, as demonstrated by admin/index.php/default and certain other files.
[ "cpe:2.3:a:parallels:parallels_plesk_panel:10.3.1_build1013110726.09:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
CVE-2010-5086
Directory traversal vulnerability in wiki/rankings.php in Bitweaver 2.7 and 2.8.1 allows remote attackers to read arbitrary files via a .. (dot dot) in the style parameter.
[ "cpe:2.3:a:bitweaver:bitweaver:2.7:*:*:*:*:*:*:*", "cpe:2.3:a:bitweaver:bitweaver:2.8.1:*:*:*:*:*:*:*" ]
null
null
null
5
null
CVE-2021-1446
Cisco IOS XE Software DNS NAT Protocol Application Layer Gateway Denial of Service Vulnerability
A vulnerability in the DNS application layer gateway (ALG) functionality used by Network Address Translation (NAT) in Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload. The vulnerability is due to a logic error that occurs when an affected device inspects certain DNS packets. An attacker could exploit this vulnerability by sending crafted DNS packets through an affected device that is performing NAT for DNS packets. A successful exploit could allow an attacker to cause the device to reload, resulting in a denial of service (DoS) condition on an affected device. The vulnerability can be exploited only by traffic that is sent through an affected device via IPv4 packets. The vulnerability cannot be exploited via IPv6 traffic.
[ "cpe:2.3:o:cisco:ios_xe:3.7.0bs:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.7.0s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.7.0xas:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.7.0xbs:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.7.1as:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.7.1s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.7.2s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.7.2ts:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.7.3s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.7.4as:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.7.4s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.7.5s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.7.6s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.7.7s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.7.8s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.8.0s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.8.1s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.8.2s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.9.0as:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.9.0s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.9.0xas:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.9.1as:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.9.1s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.9.2s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.10.0s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.10.1s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.10.1xbs:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.10.1xcs:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.10.2as:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.10.2s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.10.2ts:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.10.3s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.10.4s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.10.5s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.10.6s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.10.7s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.10.8as:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.10.8s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.10.9s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.10.10s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.11.0s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.11.1s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.11.2s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.11.3s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.11.4s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.12.0as:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.12.0s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.12.1s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.12.2s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.12.3s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.12.4s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.13.0as:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.13.0s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.13.1s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.13.2as:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.13.2s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.13.3s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.13.4s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.13.5as:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.13.5s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.13.6as:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.13.6bs:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.13.6s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.13.7as:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.13.7s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.13.8s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.13.9s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.13.10s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.14.0s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.14.1s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.14.2s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.14.3s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.14.4s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.15.0s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.15.1cs:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.15.1s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.15.1xbs:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.15.2s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.15.2xbs:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.15.3s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.15.4s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.16.0as:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.16.0bs:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.16.0cs:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.16.0s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.16.1as:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.16.1s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.16.2as:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.16.2bs:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.16.2s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.16.3as:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.16.3s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.16.4as:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.16.4bs:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.16.4cs:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.16.4ds:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.16.4es:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.16.4gs:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.16.4s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.16.5as:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.16.5bs:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.16.5s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.16.6bs:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.16.6s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.16.7as:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.16.7bs:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.16.7s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.16.8s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.16.9s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.16.10as:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.16.10s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.17.0s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.17.1as:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.17.1s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.17.2s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.17.3s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.17.4s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.18.0as:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.18.0s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.18.0sp:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.18.1asp:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.18.1bsp:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.18.1csp:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.18.1gsp:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.18.1hsp:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.18.1isp:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.18.1s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.18.1sp:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.18.2asp:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.18.2s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.18.2sp:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.18.3asp:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.18.3bsp:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.18.3s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.18.3sp:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.18.4s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.18.4sp:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.18.5sp:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.18.6sp:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.18.7sp:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.18.8asp:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.18.8sp:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.1.3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.3.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.3.1a:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.3.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.3.3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.3.4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.3.5:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.3.5b:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.3.6:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.3.7:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.3.8:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.3.9:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.3.10:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.3.11:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.4.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.4.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.4.3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.5.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.5.1a:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.5.1b:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.5.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.5.3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.6.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.6.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.6.3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.6.4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.6.4a:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.6.4s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.6.5:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.6.5a:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.6.5b:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.6.6:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.6.7:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.6.7a:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.6.8:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.7.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.7.1a:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.7.1b:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.7.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.7.3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.7.4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.8.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.8.1a:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.8.1b:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.8.1c:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.8.1d:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.8.1e:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.8.1s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.8.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.8.3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.9.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.9.1a:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.9.1b:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.9.1c:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.9.1d:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.9.1s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.9.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.9.2a:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.9.2s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.9.3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.9.3a:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.9.3h:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.9.3s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.9.4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.9.4c:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.9.5:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.9.5f:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.9.6:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.10.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.10.1a:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.10.1b:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.10.1c:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.10.1d:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.10.1e:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.10.1f:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.10.1g:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.10.1s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.10.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.10.3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.11.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.11.1a:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.11.1b:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.11.1c:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.11.1s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.11.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.12.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.12.1a:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.12.1c:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.12.1s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.12.1t:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.12.1w:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.12.1x:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.12.1y:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.12.1z:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.12.1z1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.12.1za:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.12.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.12.2a:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.12.2s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.12.2t:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.12.3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.12.3a:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.12.3s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.12.4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.12.4a:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:17.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:17.1.1a:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:17.1.1s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:17.1.1t:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:17.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:17.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:17.2.1a:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:17.2.1r:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:17.2.1v:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:17.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:17.2.3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:17.3.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:17.3.1a:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:17.3.1w:*:*:*:*:*:*:*" ]
null
8.6
null
null
null
GHSA-5xw7-vh5g-vh38
The Slidebox module before 7.x-1.4 for Drupal does not properly check permissions, which allows remote attackers to obtain sensitive information via unspecified vectors.
[]
null
null
null
null
null
GHSA-cxgc-6jc8-chjx
An issue was discovered in Das U-Boot through 2019.07. There is a stack-based buffer overflow in this nfs_handler reply helper function: nfs_umountall_reply.
[]
null
null
null
null
null
GHSA-j7xg-5549-jr3j
Improper Certificate Validation in OWASP ZAP
OWASP Zed Attack Proxy (ZAP) through w2022-03-21 does not verify the TLS certificate chain of an HTTPS server.
[]
null
4
null
null
null
CVE-2019-7149
A heap-based buffer over-read was discovered in the function read_srclines in dwarf_getsrclines.c in libdw in elfutils 0.175. A crafted input can cause segmentation faults, leading to denial-of-service, as demonstrated by eu-nm.
[ "cpe:2.3:a:elfutils_project:elfutils:0.175:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" ]
null
null
6.5
4.3
null
CVE-2005-0880
content.php in Vortex Portal allows remote attackers to obtain sensitive information via an invalid act parameter, which leaks the full pathname in a PHP error message.
[ "cpe:2.3:a:vortex_portal:vortex_portal:*:*:*:*:*:*:*:*" ]
null
null
null
5
null
CVE-2022-47591
WordPress Map Multi Marker Plugin <= 3.2.1 is vulnerable to Cross Site Scripting (XSS)
Reflected Cross-Site Scripting (XSS) vulnerability in Mickael Austoni Map Multi Marker plugin <= 3.2.1 versions.
[ "cpe:2.3:a:map_multi_marker_project:map_multi_marker:*:*:*:*:*:wordpress:*:*" ]
null
7.1
null
null
null
GHSA-jjx3-27m5-92gh
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in VideoWhisper Picture Gallery allows Stored XSS.This issue affects Picture Gallery: from n/a through 1.5.11.
[]
null
6.5
null
null
null
CVE-2025-32914
Libsoup: oob read on libsoup through function "soup_multipart_new_from_message" in soup-multipart.c leads to crash or exit of process
A flaw was found in libsoup, where the soup_multipart_new_from_message() function is vulnerable to an out-of-bounds read. This flaw allows a malicious HTTP client to induce the libsoup server to read out of bounds.
[ "cpe:/o:redhat:enterprise_linux:10.0", "cpe:/o:redhat:rhel_els:7", "cpe:/o:redhat:enterprise_linux:8::baseos", "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:rhel_aus:8.2::appstream", "cpe:/o:redhat:rhel_aus:8.2::baseos", "cpe:/a:redhat:rhel_aus:8.4::appstream", "cpe:/o:redhat:rhel_aus:8.4::baseos", "cpe:/o:redhat:rhel_aus:8.6::baseos", "cpe:/a:redhat:rhel_aus:8.6::appstream", "cpe:/o:redhat:rhel_e4s:8.6::baseos", "cpe:/a:redhat:rhel_e4s:8.6::appstream", "cpe:/a:redhat:rhel_tus:8.6::appstream", "cpe:/o:redhat:rhel_tus:8.6::baseos", "cpe:/o:redhat:rhel_eus:8.8::baseos", "cpe:/a:redhat:rhel_eus:8.8::appstream", "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:rhel_e4s:9.0::appstream", "cpe:/a:redhat:rhel_eus:9.2::appstream", "cpe:/a:redhat:rhel_eus:9.4::appstream", "cpe:/o:redhat:enterprise_linux:6" ]
null
7.4
null
null
null
RHSA-2024:0454
Red Hat Security Advisory: python3.9 security update
python: Parsing errors in email/_parseaddr.py lead to incorrect value in email address part of tuple
[ "cpe:/a:redhat:rhel_eus:9.2::appstream", "cpe:/a:redhat:rhel_eus:9.2::crb", "cpe:/o:redhat:rhel_eus:9.2::baseos" ]
null
5.3
null
null
null