id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
139k
cpes
sequencelengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
CVE-2025-24677
WordPress Post/Page Copying Tool to Export and Import post/page for Cross site Migration Plugin <= 2.0.3 - Remote Code Execution (RCE) vulnerability
Improper Control of Generation of Code ('Code Injection') vulnerability in WPSpins Post/Page Copying Tool allows Remote Code Inclusion. This issue affects Post/Page Copying Tool: from n/a through 2.0.3.
[]
null
9.9
null
null
GHSA-fwgv-8gvm-4fwm
The WP Discord Invite WordPress plugin before 2.5.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
[]
null
4.8
null
null
GHSA-pr2j-hh93-wg3x
Multiple cross-site scripting (XSS) vulnerabilities in oBlog allow remote attackers to inject arbitrary web script or HTML via the (1) commentName, (2) commentEmail, (3) commentWeb, or (4) commentText parameter to article.php; and allow remote authenticated administrators to inject arbitrary web script or HTML via the (5) article_id or (6) title parameter to admin/write.php, the (7) category_id or (8) category_name parameter to admin/groups.php, the (9) blogroll_id or (10) title parameter to admin/blogroll.php, or the (11) blog_name or (12) tag_line parameter to admin/settings.php.
[]
null
null
null
null
GHSA-h2qg-mwvc-gg7v
Multiple cross-site scripting (XSS) vulnerabilities in configuration-details screens in the OAC component in IBM Financial Transaction Manager (FTM) 2.0 before 2.0.0.3 allow remote authenticated users to inject arbitrary web script or HTML via a crafted text value.
[]
null
null
null
null
PYSEC-2021-87
null
Cranelift is an open-source code generator maintained by Bytecode Alliance. It translates a target-independent intermediate representation into executable machine code. There is a bug in 0.73 of the Cranelift x64 backend that can create a scenario that could result in a potential sandbox escape in a Wasm program. This bug was introduced in the new backend on 2020-09-08 and first included in a release on 2020-09-30, but the new backend was not the default prior to 0.73. The recently-released version 0.73 with default settings, and prior versions with an explicit build flag to select the new backend, are vulnerable. The bug in question performs a sign-extend instead of a zero-extend on a value loaded from the stack, under a specific set of circumstances. If those circumstances occur, the bug could allow access to memory addresses upto 2GiB before the start of the Wasm program heap. If the heap bound is larger than 2GiB, then it would be possible to read memory from a computable range dependent on the size of the heaps bound. The impact of this bug is highly dependent on heap implementation, specifically: * if the heap has bounds checks, and * does not rely exclusively on guard pages, and * the heap bound is 2GiB or smaller * then this bug cannot be used to reach memory from another Wasm program heap. The impact of the vulnerability is mitigated if there is no memory mapped in the range accessible using this bug, for example, if there is a 2 GiB guard region before the Wasm program heap. The bug in question performs a sign-extend instead of a zero-extend on a value loaded from the stack, when the register allocator reloads a spilled integer value narrower than 64 bits. This interacts poorly with another optimization: the instruction selector elides a 32-to-64-bit zero-extend operator when we know that an instruction producing a 32-bit value actually zeros the upper 32 bits of its destination register. Hence, we rely on these zeroed bits, but the type of the value is still i32, and the spill/reload reconstitutes those bits as the sign extension of the i32’s MSB. The issue would thus occur when: * An i32 value in a Wasm program is greater than or equal to 0x8000_0000; * The value is spilled and reloaded by the register allocator due to high register pressure in the program between the value’s definition and its use; * The value is produced by an instruction that we know to be “special” in that it zeroes the upper 32 bits of its destination: add, sub, mul, and, or; * The value is then zero-extended to 64 bits in the Wasm program; * The resulting 64-bit value is used. Under these circumstances there is a potential sandbox escape when the i32 value is a pointer. The usual code emitted for heap accesses zero-extends the Wasm heap address, adds it to a 64-bit heap base, and accesses the resulting address. If the zero-extend becomes a sign-extend, the program could reach backward and access memory up to 2GiB before the start of its heap. In addition to assessing the nature of the code generation bug in Cranelift, we have also determined that under specific circumstances, both Lucet and Wasmtime using this version of Cranelift may be exploitable. See referenced GitHub Advisory for more details.
[]
null
null
null
null
GHSA-p346-6xg3-w894
A vulnerability in the web-based management interface of Cisco Jabber Guest Server 10.6(9), 11.0(0), and 11.0(1) could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of the affected software. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of the affected software. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or allow the attacker to access sensitive browser-based information. Cisco Bug IDs: CSCve09718.
[]
null
null
6.1
null
GHSA-vxjm-8m57-p725
IBM Cognos Business Intelligence 10.2 could allow a user with lower privilege Capabilities to adopt the Capabilities of a higher-privilege user by intercepting the higher-privilege user's cookie value from its HTTP request and then reusing it in subsequent requests. IBM Reference #: 1993718.
[]
null
null
8.8
null
CVE-2024-34687
Cross-Site Scripting (XSS) vulnerability in SAP NetWeaver Application server for ABAP and ABAP Platform
SAP NetWeaver Application Server for ABAP and ABAP Platform do not sufficiently encode user controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability. An attacker can control code that is executed within a user’s browser, which could result in modification, deletion of data, including accessing or deleting files, or stealing session cookies which an attacker could use to hijack a user’s session. Hence, this could have impact on Confidentiality, Integrity and Availability of the system.
[ "cpe:2.3:a:sap_se:sap_netweaver_application_server_for_abap_and_abap_platform:sap_basis_700:*:*:*:*:*:*:*" ]
null
6.5
null
null
CVE-2025-1192
SourceCodester Multi Restaurant Table Reservation System select-menu.php sql injection
A vulnerability was found in SourceCodester Multi Restaurant Table Reservation System 1.0. It has been classified as critical. Affected is an unknown function of the file select-menu.php. The manipulation of the argument table leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
[]
5.3
6.3
6.3
6.5
CVE-2022-44168
Tenda AC15 V15.03.05.18 is vulnerable to Buffer Overflow via function fromSetRouteStatic..
[ "cpe:2.3:o:tenda:ac15_firmware:15.03.05.18:*:*:*:*:*:*:*", "cpe:2.3:h:tenda:ac15:-:*:*:*:*:*:*:*" ]
null
7.5
null
null
CVE-2022-0112
Incorrect security UI in Browser UI in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to display missing URL or incorrect URL via a crafted URL.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*" ]
null
4.3
null
4.3
GHSA-34m8-5x3c-2ccr
IBM Cloud Pak for Business Automation 18.0.0, 18.0.1, 18.0.2,19.0.1, 19.0.2, 19.0.3,20.0.1, 20.0.2, 20.0.3, 21.0.1, 21.0.2, 21.0.3, 22.0.1,2 2.0.2, 23.0.1, and 23.0.2 may allow end users to query more documents than expected from a connected Enterprise Content Management system when configured to use a system account. IBM X-Force ID: 275938.
[]
null
5.3
null
null
GHSA-532m-842f-wrr5
Cross-Site Request Forgery (CSRF) vulnerability in Feedbucket Feedbucket – Website Feedback Tool allows Cross Site Request Forgery. This issue affects Feedbucket – Website Feedback Tool: from n/a through 1.0.6.
[]
null
5.4
null
null
CVE-2023-1749
CVE-2023-1749
The listed versions of Nexx Smart Home devices lack proper access control when executing actions. An attacker with a valid NexxHome deviceId could send API requests that the affected devices would execute.
[ "cpe:2.3:o:getnexx:nxal-100_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:getnexx:nxal-100:-:*:*:*:*:*:*:*", "cpe:2.3:o:getnexx:nxg-100b_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:getnexx:nxg-100b:-:*:*:*:*:*:*:*", "cpe:2.3:o:getnexx:nxpg-100w_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:getnexx:nxpg-100w:-:*:*:*:*:*:*:*", "cpe:2.3:o:getnexx:nxg-200_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:getnexx:nxg-200:-:*:*:*:*:*:*:*" ]
null
6.5
null
null
CVE-2022-40264
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in ICONICS/Mitsubishi Electric GENESIS64 versions 10.96 to 10.97.2 allows an unauthenticated attacker to create, tamper with or destroy arbitrary files by getting a legitimate user import a project package file crafted by the attacker.
[ "cpe:2.3:a:iconics:genesis64:*:*:*:*:*:*:*:*" ]
null
6.3
null
null
GHSA-wqfg-hv39-hm6x
A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. The vulnerability exists because the web-based management interface of the affected device does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
[]
null
null
6.1
null
GHSA-x7v9-4x5r-vpv8
Vulnerabilities exist which allow an authenticated attacker to access sensitive information on the ArubaOS command line interface. Successful exploitation could allow access to data beyond what is authorized by the users existing privilege level.
[]
null
6.5
null
null
GHSA-jxw3-833q-c4j7
An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory, aka "Win32k Elevation of Privilege Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2019, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-8639.
[]
null
null
7.8
null
CVE-2024-31203
A “CWE-121: Stack-based Buffer Overflow” in the wd210std.dll dynamic library packaged with the ThermoscanIP installer allows a local attacker to possibly trigger a Denial-of-Service (DoS) condition on the target component.
[ "cpe:2.3:a:proges:thermoscan_ip:20211103:*:*:*:*:*:*:*" ]
null
3.3
null
null
CVE-2018-17081
e107 2.1.9 allows CSRF via e107_admin/wmessage.php?mode=&action=inline&ajax_used=1&id= for changing the title of an arbitrary page.
[ "cpe:2.3:a:e107:e107:2.1.9:*:*:*:*:*:*:*" ]
null
null
4.3
4.3
GHSA-hvj6-6hh6-hg48
A vulnerability, which was classified as critical, was found in code-projects Responsive Hotel Site 1.0. Affected is an unknown function of the file /admin/print.php. The manipulation of the argument pid leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
[]
5.3
6.3
null
null
CVE-2022-40347
SQL Injection vulnerability in Intern Record System version 1.0 in /intern/controller.php in 'phone', 'email', 'deptType' and 'name' parameters, allows attackers to execute arbitrary code and gain sensitive information.
[ "cpe:2.3:a:intern_record_system_project:intern_record_system:1.0:*:*:*:*:*:*:*" ]
null
9.8
null
null
GHSA-7m75-x27w-r52r
qdrant input validation failure
qdrant/qdrant version 1.9.0-dev is vulnerable to arbitrary file read and write during the snapshot recovery process. Attackers can exploit this vulnerability by manipulating snapshot files to include symlinks, leading to arbitrary file read by adding a symlink that points to a desired file on the filesystem and arbitrary file write by including a symlink and a payload file in the snapshot's directory structure. This vulnerability allows for the reading and writing of arbitrary files on the server, which could potentially lead to a full takeover of the system. The issue is fixed in version v1.9.0.
[]
null
null
9.8
null
GHSA-rpqw-5g6j-x944
The postfix.postinst script in the Debian GNU/Linux and Ubuntu postfix 2.5.5 package grants the postfix user write access to /var/spool/postfix/pid, which might allow local users to conduct symlink attacks that overwrite arbitrary files.
[]
null
null
null
null
GHSA-p4mx-p49m-8rw4
Improper Neutralization of Input During Web Page Generation in JavaMelody
Cross-site scripting (XSS) vulnerability in HtmlSessionInformationsReport.java in JavaMelody 1.46 and earlier allows remote attackers to inject arbitrary web script or HTML via a crafted X-Forwarded-For header.
[]
null
null
null
null
CVE-2023-5315
The Google Maps made Simple plugin for WordPress is vulnerable to SQL Injection via the plugin's shortcode in versions up to, and including, 0.6 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers with subscriber-level and above permissions to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
[ "cpe:2.3:a:matthewschwartz:google_maps_made_simple:*:*:*:*:*:wordpress:*:*" ]
null
8.8
null
null
RHSA-2019:1973
Red Hat Security Advisory: kernel-alt security and bug fix update
Kernel: vhost_net: infinite loop while receiving packets leads to DoS
[ "cpe:/o:redhat:enterprise_linux:7::server" ]
null
null
6.3
null
GHSA-crvq-r2jc-v9jv
Missing Authorization vulnerability in Fahad Mahmood WP Docs allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects WP Docs: from n/a through n/a.
[]
null
4.3
null
null
RHSA-2023:0333
Red Hat Security Advisory: curl security update
curl: POST following PUT confusion
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
4.8
null
null
CVE-2019-0351
A remote code execution vulnerability exists in the SAP NetWeaver UDDI Server (Services Registry), versions 7.10, 7.20, 7.30, 7.31, 7.40, 7.50. Because of this, an attacker can exploit Services Registry potentially enabling them to take complete control of the product, including viewing, changing, or deleting data by injecting code into the working memory which is subsequently executed by the application. It can also be used to cause a general fault in the product, causing the product to terminate.
[ "cpe:2.3:a:sap:netweaver:7.10:*:*:*:*:*:*:*", "cpe:2.3:a:sap:netweaver:7.20:*:*:*:*:*:*:*", "cpe:2.3:a:sap:netweaver:7.30:*:*:*:*:*:*:*", "cpe:2.3:a:sap:netweaver:7.31:*:*:*:*:*:*:*", "cpe:2.3:a:sap:netweaver:7.40:*:*:*:*:*:*:*", "cpe:2.3:a:sap:netweaver:7.50:*:*:*:*:*:*:*" ]
null
null
8.8
6.5
GHSA-hc5w-c9f8-9cc4
Langchain Path Traversal vulnerability
A path traversal vulnerability exists in the `getFullPath` method of langchain-ai/langchainjs version 0.2.5. This vulnerability allows attackers to save files anywhere in the filesystem, overwrite existing text files, read `.txt` files, and delete files. The vulnerability is exploited through the `setFileContent`, `getParsedFile`, and `mdelete` methods, which do not properly sanitize user input.
[]
6.9
null
6.5
null
CVE-2023-43816
Delta Electronics Delta Industrial Automation DOPSoft DPS File wKPFStringLen Buffer Overflow Remote Code Execution
A buffer overflow vulnerability exists in Delta Electronics Delta Industrial Automation DOPSoft version 2 when parsing the wKPFStringLen field of a DPS file. An anonymous attacker can exploit this vulnerability by enticing a user to open a specially crafted DPS file to achieve code execution.
[ "cpe:2.3:a:deltaww:dopsoft:*:*:*:*:*:*:*:*" ]
null
6.3
null
6.8
GHSA-rmr7-mhgx-r5f9
Cross-Site Request Forgery (CSRF) vulnerability in Gangesh Matta Simple Org Chart plugin <= 2.3.4 versions.
[]
null
4.3
null
null
GHSA-7294-h4jp-x95f
Shenzhen Libituo Technology Co., Ltd LBT-T300-mini1 v1.2.9 was discovered to contain a buffer overflow via lan_netmask parameter at /apply.cgi.
[]
null
5.7
null
null
CVE-2024-53180
ALSA: pcm: Add sanity NULL check for the default mmap fault handler
In the Linux kernel, the following vulnerability has been resolved: ALSA: pcm: Add sanity NULL check for the default mmap fault handler A driver might allow the mmap access before initializing its runtime->dma_area properly. Add a proper NULL check before passing to virt_to_page() for avoiding a panic.
[]
null
5.5
null
null
GHSA-2924-9cv7-3gpq
An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in Xcode 11.3. Compiling with untrusted sources may lead to arbitrary code execution with user privileges.
[]
null
null
null
null
CVE-2024-43736
Adobe Experience Manager | Cross-site Scripting (Stored XSS) (CWE-79)
Adobe Experience Manager versions 6.5.21 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
[ "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*", "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*" ]
null
5.4
null
null
CVE-2022-2025
Grandstream GSD3710 Stack-based Buffer Overflow
an attacker with knowledge of user/pass of Grandstream GSD3710 in its 1.0.11.13 version, could overflow the stack since it doesn't check the param length before use the strcopy instruction. The explotation of this vulnerability may lead an attacker to execute a shell with full access.
[ "cpe:2.3:o:grandstream:gds3710_firmware:1.0.11.13:*:*:*:*:*:*:*", "cpe:2.3:h:grandstream:gds3710:-:*:*:*:*:*:*:*" ]
null
9.8
null
null
CVE-2024-20803
Improper authentication vulnerability in Bluetooth pairing process prior to SMR Jan-2024 Release 1 allows remote attackers to establish pairing process without user interaction.
[ "cpe:2.3:o:samsung:android:11.0:-:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-apr-2021-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-apr-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-apr-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-aug-2021-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-aug-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-aug-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-dec-2020-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-dec-2021-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-dec-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-dec-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-feb-2021-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-feb-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-feb-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-jan-2021-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-jan-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-jan-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-jul-2021-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-jul-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-jul-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-jun-2021-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-jun-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-jun-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-mar-2021-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-mar-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-mar-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-may-2021-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-may-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-may-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-nov-2021-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-nov-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-nov-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-oct-2021-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-oct-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-oct-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-sep-2021-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-sep-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-sep-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:-:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-apr-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-apr-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-aug-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-aug-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-dec-2021-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-dec-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-dec-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-feb-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-feb-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-jan-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-jan-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-jul-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-jul-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-jun-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-jun-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-mar-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-mar-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-may-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-may-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-nov-2021-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-nov-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-nov-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-oct-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-oct-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-sep-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-sep-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:-:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-apr-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-aug-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-dec-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-dec-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-feb-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-jan-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-jul-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-jun-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-mar-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-may-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-nov-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-nov-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-oct-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-oct-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-sep-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:-:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-apr-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-aug-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-dec-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-feb-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-jan-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-jul-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-jun-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-mar-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-may-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-nov-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-nov-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-oct-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-oct-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-sep-2023-r1:*:*:*:*:*:*" ]
null
6.8
null
null
GHSA-qm85-wjm8-m9v8
The IPMI dissector in Wireshark 1.2.0 through 1.2.4 on Windows allows remote attackers to cause a denial of service (crash) via a crafted packet, related to "formatting a date/time using strftime."
[]
null
null
null
null
CVE-2020-24364
MineTime through 1.8.5 allows arbitrary command execution via the notes field in a meeting. Could lead to RCE via meeting invite.
[ "cpe:2.3:a:ethz:minetime:*:*:*:*:*:*:*:*" ]
null
8.8
null
6.8
GHSA-2843-97wr-vcmh
Cross-site request forgery (CSRF) vulnerability in the Admin Web UI in IBM Lotus Protector for Mail Security 2.8.x before 2.8.1-22905 allows remote authenticated users to hijack the authentication of unspecified victims via unknown vectors.
[]
null
null
null
null
CVE-2024-49287
WordPress PDF-Rechnungsverwaltung plugin <= 0.0.1 - Local File Inclusion vulnerability
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Marco Heine PDF-Rechnungsverwaltung allows PHP Local File Inclusion.This issue affects PDF-Rechnungsverwaltung: from n/a through 0.0.1.
[ "cpe:2.3:a:marco_heine:pdf-rechnungsverwaltung:*:*:*:*:*:*:*:*" ]
null
7.5
null
null
RHSA-2024:1934
Red Hat Security Advisory: thunderbird security update
Mozilla: Permission prompt input delay could expire when not in focus Mozilla: Denial of Service using HTTP/2 CONTINUATION frames Mozilla: GetBoundName in the JIT returned the wrong object Mozilla: Out-of-bounds-read after mis-optimized switch statement Mozilla: Incorrect JITting of arguments led to use-after-free during garbage collection Mozilla: Integer-overflow led to out-of-bounds-read in the OpenType sanitizer Mozilla: Potential use-after-free due to AlignedBuffer self-move Mozilla: Memory safety bug fixed in Firefox 125, Firefox ESR 115.10, and Thunderbird 115.10
[ "cpe:/a:redhat:rhel_aus:8.2::appstream", "cpe:/a:redhat:rhel_e4s:8.2::appstream", "cpe:/a:redhat:rhel_tus:8.2::appstream" ]
null
7.5
null
null
PYSEC-2022-286
null
Unrestricted Upload of File with Dangerous Type in GitHub repository octoprint/octoprint prior to 1.8.3.
[]
null
null
null
null
GHSA-p2h6-rq92-jmvq
Stack-based buffer overflow in the animated cursor code in Microsoft Windows 2000 SP4 through Vista allows remote attackers to execute arbitrary code or cause a denial of service (persistent reboot) via a large length value in the second (or later) anih block of a RIFF .ANI, cur, or .ico file, which results in memory corruption when processing cursors, animated cursors, and icons, a variant of CVE-2005-0416, as originally demonstrated using Internet Explorer 6 and 7. NOTE: this might be a duplicate of CVE-2007-1765; if so, then CVE-2007-0038 should be preferred.
[]
null
null
null
null
CVE-2006-5795
Multiple PHP remote file inclusion vulnerabilities in OpenEMR 2.8.1 and earlier, when register_globals is enabled, allow remote attackers to execute arbitrary PHP code via a URL in the srcdir parameter to (a) billing_process.php, (b) billing_report.php, (c) billing_report_xml.php, and (d) print_billing_report.php in interface/billing/; (e) login.php; (f) interface/batchcom/batchcom.php; (g) interface/login/login.php; (h) main_info.php and (i) main.php in interface/main/; (j) interface/new/new_patient_save.php; (k) interface/practice/ins_search.php; (l) interface/logout.php; (m) custom_report_range.php, (n) players_report.php, and (o) front_receipts_report.php in interface/reports/; (p) facility_admin.php, (q) usergroup_admin.php, and (r) user_info.php in interface/usergroup/; or (s) custom/import_xml.php.
[ "cpe:2.3:a:openemr:openemr:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-wmcw-73j7-m7xh
The WP SEO Redirect 301 WordPress plugin before 2.3.2 does not have CSRF in place when deleting redirects, which could allow attackers to make a logged in admin delete them via a CSRF attack
[]
null
null
null
null
CVE-2008-1745
Cisco Unified Communications Manager (CUCM) 5.x before 5.1(2) and 6.x before 6.1(1) allows remote attackers to cause a denial of service (service interruption) via a SIP JOIN message with a malformed header, aka Bug ID CSCsi48115.
[ "cpe:2.3:a:cisco:unified_communications_manager:4.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:4.1:\\(3\\)sr.5:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:4.1:\\(3\\)sr4:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:4.1:\\(3\\)sr5:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:4.1:\\(3\\)sr5b:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:4.1:\\(3\\)sr5c:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:4.2:4.2\\(3\\)sr.2:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:4.2:4.2_\\(3\\)sr2b:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:4.2:4.2_\\(3\\)sr3:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:4.3:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:4.3:4.3\\(1\\)sr.1:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:5.1:\\(1\\):*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:5.1:\\(2\\):*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:5.1:\\(2a\\):*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:5.1:\\(2b\\):*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:5.1:\\(3a\\):*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:6.0:\\(1\\):*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:6.0:\\(1a\\):*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:6.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:6.1:\\(1a\\):*:*:*:*:*:*" ]
null
null
null
7.8
CVE-2007-3088
SQL injection vulnerability in index.php in Comicsense allows remote attackers to execute arbitrary SQL commands via the epi parameter.
[ "cpe:2.3:a:gaya_design:comicsense:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2000-0940
Directory traversal vulnerability in Metertek pagelog.cgi allows remote attackers to read arbitrary files via a .. (dot dot) attack on the "name" or "display" parameter.
[ "cpe:2.3:a:metertek:pagelog.cgi:1.0:*:*:*:*:*:*:*" ]
null
null
null
6.4
cisco-sa-nxos-dhcp6-relay-dos-znEAA6xn
Cisco NX-OS Software DHCPv6 Relay Agent Denial of Service Vulnerability
A vulnerability in the DHCPv6 relay agent of Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to improper handling of specific fields in a DHCPv6 RELAY-REPLY message. An attacker could exploit this vulnerability by sending a crafted DHCPv6 packet to any IPv6 address that is configured on an affected device. A successful exploit could allow the attacker to cause the dhcp_snoop process to crash and restart multiple times, causing the affected device to reload and resulting in a DoS condition. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is part of the August 2024 Cisco FXOS and NX-OS Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: August 2024 Semiannual Cisco FXOS and NX-OS Software Security Advisory Bundled Publication ["https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75417"].
[]
null
8.6
null
null
CVE-2019-13222
An out-of-bounds read of a global buffer in the draw_line function in stb_vorbis through 2019-03-04 allows an attacker to cause a denial of service or disclose sensitive information by opening a crafted Ogg Vorbis file.
[ "cpe:2.3:a:stb_vorbis_project:stb_vorbis:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*" ]
null
7.1
null
5.8
GHSA-x85r-5p3p-3jxw
Certain NETGEAR devices are affected by stored XSS. This affects D6200 before 1.1.00.38, D7000 before 1.0.1.78, JNR1010v2 before 1.1.0.62, JR6150 before 1.0.1.24, JWNR2010v5 before 1.1.0.62, R6020 before 1.0.0.42, R6050 before 1.0.1.24, R6080 before 1.0.0.42, R6120 before 1.0.0.66, R6220 before 1.1.0.100, R6260 before 1.1.0.76, WNR1000v4 before 1.1.0.62, WNR2020 before 1.1.0.62, and WNR2050 before 1.1.0.62.
[]
null
null
null
null
GHSA-hjg2-q3h8-v7hh
GE Healthcare CADStream Server has a default password of confirma for the admin user, which has unspecified impact and attack vectors.
[]
null
null
null
null
CVE-2006-2561
Edimax BR-6104K router allows remote attackers to bypass access restrictions and conduct unauthorized operations via a UPnP request with a modified InternalClient parameter (possibly within NewInternalClient), which is not validated, as demonstrated by using AddPortMapping to forward arbitrary traffic.
[ "cpe:2.3:h:edimax:br_6104k:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-2rg5-632f-rr5j
Multiple PHP remote file inclusion vulnerabilities in Specimen Image Database (SID), when register_globals is enabled, allow remote attackers to execute arbitrary PHP code via a URL in the dir parameter to (1) client.php or (2) taxonservice.php.
[]
null
null
null
null
CVE-2016-10118
Firejail allows local users to truncate /etc/resolv.conf via a chroot command to /.
[ "cpe:2.3:a:firejail_project:firejail:-:*:*:*:*:*:*:*" ]
null
null
3.3
2.1
GHSA-cfhp-vv5v-8q98
A vulnerability was found in Campcodes Advanced Online Voting System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /admin/positions_add.php. The manipulation of the argument description leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-225935.
[]
null
9.8
null
null
CVE-2016-6497
main/java/org/apache/directory/groovyldap/LDAP.java in the Groovy LDAP API in Apache allows attackers to conduct LDAP entry poisoning attacks by leveraging setting returnObjFlag to true for all search methods.
[ "cpe:2.3:a:apache:groovy_ldap:*:*:*:*:*:*:*:*" ]
null
7.5
null
5
CVE-2014-7533
The NotreDame Seguradora (aka br.com.notredame.mobile.NotreDame) application 1.2 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[ "cpe:2.3:a:notredame:notredame_seguradora:1.2:*:*:*:*:android:*:*" ]
null
null
null
5.4
CVE-2022-4574
An SMI handler input validation vulnerability in the BIOS of some ThinkPad models could allow an attacker with local access and elevated privileges to execute arbitrary code.  
[ "cpe:2.3:h:lenovo:thinkpad:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_x13_yoga_gen_2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_x13_yoga_gen_2:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_x13_yoga_gen_1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_x13_yoga_gen_1:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_x13_gen_3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_x13_gen_3:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_x13_gen_2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_x13_gen_2:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_x13_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_x13:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_x1_yoga_7th_gen_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_x1_yoga_7th_gen:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_x1_yoga_6th_gen_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_x1_yoga_6th_gen:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_x1_yoga_5th_gen_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_x1_yoga_5th_gen:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_x1_yoga_4th_gen_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_x1_yoga_4th_gen:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_x1_titanium_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_x1_titanium:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_x1_nano_gen_2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_x1_nano_gen_2:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_x1_nano_gen_1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_x1_nano_gen_1:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_x1_fold_gen_1_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_x1_fold_gen_1:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_x1_extreme_gen_5_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_x1_extreme_gen_5:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_x1_extreme_4th_gen_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_x1_extreme_4th_gen:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_x1_extreme_3rd_gen_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_x1_extreme_3rd_gen:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_x1_carbon_9th_gen_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_x1_carbon_9th_gen:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_x1_carbon_8th_gen_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_x1_carbon_8th_gen:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_x1_carbon_7th_gen_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_x1_carbon_7th_gen:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_x1_carbon_10th_gen_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_x1_carbon_10th_gen:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_t16_gen_1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_t16_gen_1:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_t15p_gen_3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_t15p_gen_3:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_t15p_gen_2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_t15p_gen_2:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_t15p_gen_1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_t15p_gen_1:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_t15g_gen_2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_t15g_gen_2:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_t15g_gen_1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_t15g_gen_1:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_t15_gen_2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_t15_gen_2:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_t14s_gen_3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_t14s_gen_3:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_t14s_gen_2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_t14s_gen_2:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_t14s_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_t14s:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_t14_gen_3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_t14_gen_3:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_t14_gen_2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_t14_gen_2:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_t14_gen_1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_t14_gen_1:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_p17_gen_2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_p17_gen_2:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_p17_gen_1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_p17_gen_1:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_p16s_gen_1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_p16s_gen_1:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_p16_gen_1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_p16_gen_1:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_p15v_gen_3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_p15v_gen_3:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_p15v_gen_2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_p15v_gen_2:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_p15v_gen_1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_p15v_gen_1:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_p15s_gen_2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_p15s_gen_2:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_p15s_gen_1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_p15s_gen_1:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_p15_gen_2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_p15_gen_2:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_p15_gen_1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_p15_gen_1:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_p14s_gen_3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_p14s_gen_3:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_p14s_gen_2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_p14s_gen_2:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_p14s_gen_1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_p14s_gen_1:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_p1_gen_5_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_p1_gen_5:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_p1_gen_4_firmware:1.22:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_p1_gen_4:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_p1_gen_3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_p1_gen_3:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_l15_gen_2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_l15_gen_2:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_l15_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_l15:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_l14_gen_2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_l14_gen_2:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_l14_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_l14:-:*:*:*:*:*:*:*" ]
null
6.7
null
null
GHSA-gqjq-cxgj-v55p
Windows Hyper-V Elevation of Privilege Vulnerability.
[]
null
8
null
null
GHSA-cpfc-m8w6-m9gf
The School Management System – WPSchoolPress plugin for WordPress is vulnerable to SQL Injection via the 'cid' parameter in all versions up to, and including, 2.2.16 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Custom-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
[]
null
6.5
null
null
RHSA-2024:0589
Red Hat Security Advisory: sqlite security update
sqlite: heap-buffer-overflow at sessionfuzz
[ "cpe:/a:redhat:rhel_eus:8.8::appstream", "cpe:/o:redhat:rhel_eus:8.8::baseos" ]
null
7.3
null
null
GHSA-m7q3-2wwp-9pqp
Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
[]
null
6.5
null
null
CVE-2019-4441
IBM WebSphere Application Server 7.0, 8.0, 8.5, 9.0, and Liberty could allow a remote attacker to obtain sensitive information when a stack trace is returned in the browser. IBM X-Force ID: 163177.
[ "cpe:2.3:a:ibm:websphere_application_server:*:*:*:*:-:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:*:*:*:*:hypervisor:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:*:*:*:*:liberty:*:*:*" ]
null
null
5.3
null
GHSA-qwgv-gjp6-rcp4
Cross Site Scripting vulnerabiity exists in WDScanner 1.1 in the system management page.
[]
null
null
null
null
GHSA-3ppf-39fx-hw97
In the Linux kernel, the following vulnerability has been resolved:RDMA/bnxt_re: Fix max SGEs for the Work RequestGen P7 supports up to 13 SGEs for now. WQE software structure can hold only 6 now. Since the max send sge is reported as 13, the stack can give requests up to 13 SGEs. This is causing traffic failures and system crashes.Use the define for max SGE supported for variable size. This will work for both static and variable WQEs.
[]
null
null
null
null
GHSA-jhxg-8fv9-xvgm
An issue was discovered in Couchbase Server 6.5.x and 6.6.x before 6.6.6, 7.x before 7.0.5, and 7.1.x before 7.1.2. During the start-up of a Couchbase Server node, there is a small window of time (before the cluster management authentication has started) where an attacker can connect to the cluster manager using default credentials.
[]
null
8.1
null
null
CVE-2024-21028
Vulnerability in the Oracle Complex Maintenance, Repair, and Overhaul product of Oracle E-Business Suite (component: LOV). Supported versions that are affected are 12.2.3-12.2.13. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Complex Maintenance, Repair, and Overhaul. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Complex Maintenance, Repair, and Overhaul, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Complex Maintenance, Repair, and Overhaul accessible data as well as unauthorized read access to a subset of Oracle Complex Maintenance, Repair, and Overhaul accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).
[ "cpe:2.3:a:oracle:complex_maintenance_repair_and_overhaul:12.2.3-12.2.13:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:complex_maintenance_repair_and_overhaul:*:*:*:*:*:*:*:*" ]
null
6.1
null
null
GHSA-4m7v-wr6v-2mw5
AzuraCast missing brute force prevention
The request rate limiting feature on the login page of AzuraCast before version 0.18.3 can be bypassed, which could allow an attacker to brute force login credentials.
[]
null
9.8
null
null
CVE-2008-1464
Multiple SQL injection vulnerabilities in Gallarific Free Edition 1.1 allow remote attackers to execute arbitrary SQL commands via the (1) query parameter to (a) search.php; (2) gusername and (3) gpassword parameters to (b) login.php; and the (4) username and (5) password parameters to (c) gadmin/index.php in a signin action. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
[ "cpe:2.3:a:gallarific:gallarific:1.1:-:free:*:*:*:*:*" ]
null
null
null
7.5
CVE-2022-27108
OrangeHRM 4.10 is vulnerable to Insecure Direct Object Reference (IDOR) via the end point symfony/web/index.php/time/createTimesheet`. Any user can create a timesheet in another user's account.
[ "cpe:2.3:a:orangehrm:orangehrm:4.10:*:*:*:*:*:*:*" ]
null
4.3
null
4
RHSA-2024:4638
Red Hat Security Advisory: qt5-qtbase security update
qtbase: qtbase: Delay any communication until encrypted() can be responded to
[ "cpe:/a:redhat:rhel_eus:9.2::appstream", "cpe:/a:redhat:rhel_eus:9.2::crb" ]
null
7.5
null
null
CVE-2017-18144
In Android before security patch level 2018-04-05 on Qualcomm Snapdragon Mobile and Snapdragon Wear MSM8909W, SD 210/SD 212/SD 205, SD 450, SD 615/16/SD 415, SD 625, SD 650/52, SD 820, SD 835, SD 845, while processing the retransmission of WPA supplicant command send failures, there is a make after break of the connection to WPA supplicant where the local pointer is not properly updated. If the WPA supplicant command transmission fails, a Use After Free condition will occur.
[ "cpe:2.3:o:qualcomm:msm8909w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:msm8909w:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_210_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_210:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_212_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_212:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_205_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_205:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_450_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_450:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_615_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_615:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_616_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_616:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_415_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_415:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_625_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_625:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_650_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_650:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_652_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_652:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_820_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_820:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_835_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_835:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_845_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_845:-:*:*:*:*:*:*:*" ]
null
null
9.8
10
GHSA-9v29-vghv-pj7f
Vulnerability in the MySQL Enterprise Monitor component of Oracle MySQL (subcomponent: Monitoring: Agent). Supported versions that are affected are 3.1.3.7856 and earlier. Easily exploitable vulnerability allows high privileged attacker with network access via TLS to compromise MySQL Enterprise Monitor. Successful attacks of this vulnerability can result in takeover of MySQL Enterprise Monitor. CVSS v3.0 Base Score 7.2 (Confidentiality, Integrity and Availability impacts).
[]
null
null
7.2
null
CVE-2017-8955
A Remote Code Execution vulnerability in HPE Intelligent Management Center (iMC) PLAT version 7.2 was found.
[ "cpe:2.3:a:hp:intelligent_management_center:7.2:*:*:*:*:*:*:*" ]
null
null
7.5
7.8
GHSA-w8cv-9wfw-379f
Unspecified vulnerability in Oracle Solaris 8, 9, 10, and 11 Express allows local users to affect availability via unknown vectors related to Kernel/Filesystem.
[]
null
null
null
null
CVE-2023-3632
Hard-coded Cryptographic Key in Kunduz - Homework Helper App
Use of Hard-coded Cryptographic Key vulnerability in Sifir Bes Education and Informatics Kunduz - Homework Helper App allows Authentication Abuse, Authentication Bypass.This issue affects Kunduz - Homework Helper App: before 6.2.3.
[ "cpe:2.3:a:kunduz:kunduz:*:*:*:*:*:*:*:*" ]
null
9.8
null
null
CVE-2021-42343
An issue was discovered in the Dask distributed package before 2021.10.0 for Python. Single machine Dask clusters started with dask.distributed.LocalCluster or dask.distributed.Client (which defaults to using LocalCluster) would mistakenly configure their respective Dask workers to listen on external interfaces (typically with a randomly selected high port) rather than only on localhost. A Dask cluster created using this method (when running on a machine that has an applicable port exposed) could be used by a sophisticated attacker to achieve remote code execution.
[ "cpe:2.3:a:anaconda:dask:*:*:*:*:*:python:*:*" ]
null
9.8
null
6.8
CVE-2017-18024
AvantFAX 3.3.3 has XSS via an arbitrary parameter name to the default URI, as demonstrated by a parameter whose name contains a SCRIPT element and whose value is 1.
[ "cpe:2.3:a:avantfax:avantfax:3.3.3:*:*:*:*:*:*:*" ]
null
null
6.1
4.3
GHSA-qh43-w96h-9v7c
slapd in OpenLDAP 1.x before 1.2.12, and 2.x before 2.0.8, allows remote attackers to cause a denial of service (crash) via an invalid Basic Encoding Rules (BER) length field.
[]
null
null
null
null
CVE-2023-47315
Headwind MDM Web panel 5.22.1 is vulnerable to Incorrect Access Control due to a hard-coded JWT Secret. The secret is hardcoded into the source code available to anyone on Git Hub. This secret is used to sign the application’s JWT token and verify the incoming user-supplied tokens.
[ "cpe:2.3:a:h-mdm:headwind_mdm:5.22.1:*:*:*:*:*:*:*" ]
null
8.8
null
null
GHSA-cjqf-877p-7m3f
snapd Race Condition vulnerability
Race condition in snap-confine's `must_mkdir_and_open_with_perms()`
[]
9
7.8
null
null
CVE-2003-0210
Buffer overflow in the administration service (CSAdmin) for Cisco Secure ACS before 3.1.2 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a long user parameter to port 2002.
[ "cpe:2.3:a:cisco:secure_access_control_server:2.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_access_control_server:2.3:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_access_control_server:2.4:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_access_control_server:2.5:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_access_control_server:2.6:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_access_control_server:2.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_access_control_server:2.6.3:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_access_control_server:2.6.4:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_access_control_server:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_access_control_server:3.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_access_control_server:3.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_access_control_server:3.1.1:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2021-29753
IBM Business Automation Workflow 18. 19, 20, 21, and IBM Business Process Manager 8.5 and d8.6 transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.
[ "cpe:2.3:a:ibm:business_automation_workflow:18.0.0.0:*:*:*:-:*:*:*", "cpe:2.3:a:ibm:business_automation_workflow:19.0.0.0:*:*:*:-:*:*:*", "cpe:2.3:a:ibm:business_automation_workflow:20.0.0.0:*:*:*:-:*:*:*", "cpe:2.3:a:ibm:business_automation_workflow:21.0.0.0:*:*:*:-:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.5.0.0:*:*:*:-:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.6.0.0:-:*:*:-:*:*:*" ]
null
null
5.9
null
GHSA-ppcr-6xhq-q423
An integer overflow at a u_read_undo memory allocation site would occur for vim before patch 8.0.0377, if it does not properly validate values for tree length when reading a corrupted undo file, which may lead to resultant buffer overflows.
[]
null
null
9.8
null
GHSA-xm2r-2g3f-xg38
In Festo Controller CECC-X-M1 product family in multiple versions, the http-endpoint "cecc-x-web-viewer-request-off" POST request doesn’t check for port syntax. This can result in unauthorized execution of system commands with root privileges due to improper access control command injection.
[]
null
9.8
null
null
CVE-2024-7587
Information Disclosure, Information Tampering and Denial of Service (DoS) Vulnerability in GENESIS64 and MC Works64
Incorrect Default Permissions vulnerability in GenBroker32, which is included in the installers for ICONICS GENESIS64 version 10.97.3 and prior, Mitsubishi Electric GENESIS64 version 10.97.3 and prior and Mitsubishi Electric MC Works64 all versions allows a local authenticated attacker to disclose or tamper with confidential information and data contained in the products, or cause a denial of service (DoS) condition on the products, by accessing a folder with incorrect permissions, when GenBroker32 is installed on the same PC as GENESIS64 or MC Works64.
[ "cpe:2.3:a:iconics:genesis64:*:*:*:*:*:*:*:*", "cpe:2.3:a:mitsubishielectric:mc_works64:*:*:*:*:*:*:*:*", "cpe:2.3:a:mitsubishielectric:mc_works64:-:*:*:*:*:*:*:*" ]
null
7.8
null
null
GHSA-qq6h-hx9q-4fxv
When displaying the sender of an email, and the sender name contained the Braille Pattern Blank space character multiple times, Thunderbird would have displayed all the spaces. This could have been used by an attacker to send an email message with the attacker's digital signature, that was shown with an arbitrary sender email address chosen by the attacker. If the sender name started with a false email address, followed by many Braille space characters, the attacker's email address was not visible. Because Thunderbird compared the invisible sender address with the signature's email address, if the signing key or certificate was accepted by Thunderbird, the email was shown as having a valid digital signature. This vulnerability affects Thunderbird < 91.10.
[]
null
6.5
null
null
CVE-2021-22492
An issue was discovered on Samsung mobile devices with O(8.x), P(9.0), and Q(10.0) (Broadcom Bluetooth chipsets) software. The Bluetooth UART driver has a buffer overflow. The Samsung ID is SVE-2020-18731 (January 2021).
[ "cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*" ]
null
8.8
null
5.8
CVE-2020-26980
A vulnerability has been identified in JT2Go (All versions < V13.1.0), Teamcenter Visualization (All versions < V13.1.0). Affected applications lack proper validation of user-supplied data when parsing JT files. A crafted JT file could trigger a type confusion condition. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-11881)
[ "cpe:2.3:a:siemens:jt2go:*:*:*:*:*:*:*:*", "cpe:2.3:a:siemens:teamcenter_visualization:*:*:*:*:*:*:*:*" ]
null
8.8
null
6.8
GHSA-f2pm-wfcp-596f
Cross-site scripting (XSS) vulnerability in the toStaticHTML API, as used in Microsoft Office InfoPath 2003 SP3, 2007 SP1, and 2007 SP2; Office SharePoint Server 2007 SP1 and SP2; SharePoint Services 3.0 SP1 and SP2; and Internet Explorer 8 allows remote attackers to inject arbitrary web script or HTML via vectors related to sanitization.
[]
null
null
null
null
CVE-2017-15412
Use after free in libxml2 before 2.9.5, as used in Google Chrome prior to 63.0.3239.84 and other products, allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
[ "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:*:*:*:*:*:*:*:*" ]
null
null
8.8
6.8
GHSA-82v2-59rq-5h73
Integer overflow in Microsoft PowerPoint Viewer 2003 allows remote attackers to execute arbitrary code via a PowerPoint file with a malformed picture index that triggers memory corruption, related to handling of CString objects, aka "Memory Allocation Vulnerability."
[]
null
null
null
null
CVE-2000-0395
Buffer overflow in CProxy 3.3 allows remote users to cause a denial of service via a long HTTP request.
[ "cpe:2.3:a:computalynx:cproxy_server:3.3sp2:*:*:*:*:*:*:*" ]
null
null
null
5
CVE-2006-1093
Unspecified vulnerability in IBM WebSphere 5.0.2.10 through 5.0.2.15 and 5.1.1.4 through 5.1.1.9 allows remote attackers to obtain sensitive information via unknown attack vectors, which causes JSP source code to be revealed.
[ "cpe:2.3:a:ibm:websphere_application_server:5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:5.0.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:5.0.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:5.0.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:5.0.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:5.0.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:5.0.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:5.0.2.7:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:5.0.2.8:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:5.0.2.9:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:5.0.2.10:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:5.0.2.11:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:5.0.2.12:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:5.0.2.13:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:5.0.2.14:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:5.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:5.1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:5.1.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:5.1.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:5.1.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:5.1.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:5.1.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:5.1.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:5.1.1.8:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:5.1.1.9:*:*:*:*:*:*:*" ]
null
null
null
6.4
GHSA-3357-829x-m9pr
Apache CXF Fediz application plugins are vulnerable to Denial of Service (DoS) attacks
Application plugins in Apache CXF Fediz prior to version 1.1.3 and 1.2.x prior to 1.2.1 allow remote attackers to create a denial of service.
[]
null
null
7.5
null
GHSA-xf37-6324-4rfx
Cross-site scripting (XSS) vulnerability in Public Knowledge Project (PKP) Open Journal System (OJS) 3.0.0 to 3.1.1-1 allows remote attackers to inject arbitrary web script or HTML via the templates/frontend/pages/search.tpl parameter (aka the By Author field).
[]
null
null
6.1
null