Datasets:

id
stringlengths
13
19
title
stringlengths
0
256
description
stringlengths
3
13.3k
cpes
sequencelengths
0
5.42k
CVE-2023-53083
nfsd: don't replace page in rq_pages if it's a continuation of last page
In the Linux kernel, the following vulnerability has been resolved: nfsd: don't replace page in rq_pages if it's a continuation of last page The splice read calls nfsd_splice_actor to put the pages containing file data into the svc_rqst->rq_pages array. It's possible however to get a splice result that only has a partial page at the end, if (e.g.) the filesystem hands back a short read that doesn't cover the whole page. nfsd_splice_actor will plop the partial page into its rq_pages array and return. Then later, when nfsd_splice_actor is called again, the remainder of the page may end up being filled out. At this point, nfsd_splice_actor will put the page into the array _again_ corrupting the reply. If this is done enough times, rq_next_page will overrun the array and corrupt the trailing fields -- the rq_respages and rq_next_page pointers themselves. If we've already added the page to the array in the last pass, don't add it to the array a second time when dealing with a splice continuation. This was originally handled properly in nfsd_splice_actor, but commit 91e23b1c3982 ("NFSD: Clean up nfsd_splice_actor()") removed the check for it.
[]
GHSA-3jcm-w957-2h9v
An issue was discovered on Samsung mobile devices with Q(10.0) (Exynos980 9630 and Exynos990 9830 chipsets) software. The Bootloader has a heap-based buffer overflow because of the mishandling of specific commands. The Samsung IDs are SVE-2020-16981, SVE-2020-16991 (May 2020).
[]
CVE-2004-1763
Buffer overflow in hsrun.exe for HAHTsite Scenario Server 5.1 Patch 06 (build 91) allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long project name.
[ "cpe:2.3:a:haht_commerce:hahtsite_scenario_server:5.1:*:*:*:*:*:*:*", "cpe:2.3:a:haht_commerce:hahtsite_scenario_server:5.1_patch_1:*:*:*:*:*:*:*", "cpe:2.3:a:haht_commerce:hahtsite_scenario_server:5.1_patch_2:*:*:*:*:*:*:*", "cpe:2.3:a:haht_commerce:hahtsite_scenario_server:5.1_patch_3:*:*:*:*:*:*:*", "cpe:2.3:a:haht_commerce:hahtsite_scenario_server:5.1_patch_4:*:*:*:*:*:*:*", "cpe:2.3:a:haht_commerce:hahtsite_scenario_server:5.1_patch_5:*:*:*:*:*:*:*", "cpe:2.3:a:haht_commerce:hahtsite_scenario_server:5.1_patch_6:*:*:*:*:*:*:*" ]
GHSA-jp3g-72vx-f4gh
A local file inclusion issue was discovered in the WooCommerce Products Filter (aka WOOF) plugin before 2.2.0 for WordPress, as demonstrated by the shortcode parameter in a woof_redraw_woof action. The vulnerability is due to the lack of args/input validation on render_html before allowing it to be called by extract(), a PHP built-in function. Because of this, the supplied args/input can be used to overwrite the $pagepath variable, which then could lead to a local file inclusion attack.
[]
GHSA-xhrx-9p3c-7wxw
A vulnerability in the IPv4 Software-Defined Access (SD-Access) fabric edge node feature of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause high CPU utilization and stop all traffic processing, resulting in a denial of service (DoS) condition on an affected device.This vulnerability is due to improper handling of certain IPv4 packets. An attacker could exploit this vulnerability by sending certain IPv4 packets to an affected device. A successful exploit could allow the attacker to cause the device to exhaust CPU resources and stop processing traffic, resulting in a DoS condition.
[]
GHSA-j9r6-j2mr-f6mm
Multiple SQL injection vulnerabilities in view_all_bug_page.php in MantisBT before 1.2.18 allow remote attackers to execute arbitrary SQL commands via the (1) sort or (2) dir parameter to view_all_set.php.
[]
CVE-2018-0885
The Microsoft Hyper-V Network Switch in 64-bit versions of Microsoft Windows Server 2008 SP2 and R2 SP1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and 1709, Windows Server 2016 and Windows Server, version 1709 allows a denial of service vulnerability due to how input from a privileged user on a guest operating system is validated, aka "Hyper-V Denial of Service Vulnerability".
[ "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*" ]
GHSA-mcv7-hmm4-fr3m
Because of an integer overflow in sam2p 0.49.3, a loop executes 0xffffffff times, ending with an invalid read of size 1 in the Image::Indexed::sortPal function in image.cpp. However, this also causes memory corruption because of an attempted write to the invalid d[0xfffffffe] array element.
[]
GHSA-r9p4-q4p6-83c5
The sysvshm extension for PHP 5.2 through 5.2.13 and 5.3 through 5.3.2 allows context-dependent attackers to write to arbitrary memory addresses by using an object's __sleep function to interrupt an internal call to the shm_put_var function, which triggers access of a freed resource.
[]
GHSA-5rvr-64v7-jvww
Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier allows remote authenticated users to affect availability via vectors related to Server : InnoDB : DDL : Foreign Key.
[]
CVE-2022-41962
BigBlueButton contains Incorrect Authorization for setting emoji status
BigBlueButton is an open source web conferencing system. Versions prior to 2.4-rc-6, and 2.5-alpha-1 contain Incorrect Authorization for setting emoji status. A user with moderator rights can use the clear status feature to set any emoji status for other users. Moderators should only be able to set none as the status of other users. This issue is patched in 2.4-rc-6 and 2.5-alpha-1There are no workarounds.
[ "cpe:2.3:a:bigbluebutton:bigbluebutton:*:*:*:*:*:*:*:*", "cpe:2.3:a:bigbluebutton:bigbluebutton:2.4:alpha1:*:*:*:*:*:*", "cpe:2.3:a:bigbluebutton:bigbluebutton:2.4:alpha2:*:*:*:*:*:*", "cpe:2.3:a:bigbluebutton:bigbluebutton:2.4:beta1:*:*:*:*:*:*", "cpe:2.3:a:bigbluebutton:bigbluebutton:2.4:beta2:*:*:*:*:*:*", "cpe:2.3:a:bigbluebutton:bigbluebutton:2.4:beta3:*:*:*:*:*:*", "cpe:2.3:a:bigbluebutton:bigbluebutton:2.4:beta4:*:*:*:*:*:*", "cpe:2.3:a:bigbluebutton:bigbluebutton:2.4:rc1:*:*:*:*:*:*", "cpe:2.3:a:bigbluebutton:bigbluebutton:2.4:rc3:*:*:*:*:*:*", "cpe:2.3:a:bigbluebutton:bigbluebutton:2.4:rc4:*:*:*:*:*:*", "cpe:2.3:a:bigbluebutton:bigbluebutton:2.4:rc5:*:*:*:*:*:*" ]
GHSA-8c4j-frh5-89w4
Sql injection vulnerability in koa2-blog 1.0.0 allows remote attackers to Injecting a malicious SQL statement via the name parameter to the signin page.
[]
GHSA-p292-884c-4jjm
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Turna Advertising Administration Panel allows SQL Injection.This issue affects Advertising Administration Panel: before 1.1.
[]
GHSA-8c36-rqcc-rv4q
xArrow SCADA versions 7.2 and prior is vulnerable to cross-site scripting due to parameter ‘edate’ of the resource xhisalarm.htm, which may allow an unauthorized attacker to execute arbitrary code.
[]
GHSA-r2rq-3h56-fqm4
Symfony DoS
An issue was discovered in the HttpFoundation component in Symfony 2.7.x before 2.7.48, 2.8.x before 2.8.41, 3.3.x before 3.3.17, 3.4.x before 3.4.11, and 4.0.x before 4.0.11. The PDOSessionHandler class allows storing sessions on a PDO connection. Under some configurations and with a well-crafted payload, it was possible to do a denial of service on a Symfony application without too much resources.
[]
GHSA-j4m7-86jc-4qp8
Adobe Experience Manager versions 6.5.18 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
[]
CVE-2004-1097
Format string vulnerability in the cherokee_logger_ncsa_write_string function in Cherokee 0.4.17 and earlier, when authenticating via auth_pam, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via format string specifiers in the URL.
[ "cpe:2.3:a:cherokee:cherokee_httpd:0.1:*:*:*:*:*:*:*", "cpe:2.3:a:cherokee:cherokee_httpd:0.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:cherokee:cherokee_httpd:0.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:cherokee:cherokee_httpd:0.2:*:*:*:*:*:*:*", "cpe:2.3:a:cherokee:cherokee_httpd:0.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:cherokee:cherokee_httpd:0.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:cherokee:cherokee_httpd:0.2.7:*:*:*:*:*:*:*", "cpe:2.3:a:cherokee:cherokee_httpd:0.4.6:*:*:*:*:*:*:*", "cpe:2.3:a:cherokee:cherokee_httpd:0.4.7:*:*:*:*:*:*:*", "cpe:2.3:a:cherokee:cherokee_httpd:0.4.8:*:*:*:*:*:*:*", "cpe:2.3:a:cherokee:cherokee_httpd:0.4.17:*:*:*:*:*:*:*" ]
GHSA-x86m-rpvh-x8w4
Internet Explorer in Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, and Microsoft Edge and Internet Explorer in Windows 10 Gold, 1511, 1607, 1703, 1709, Windows Server 2016 and Windows Server, version 1709 allows information disclosure, due to how Microsoft browsers handle objects in memory, aka "Microsoft Browser Information Disclosure Vulnerability".
[]
CVE-2022-30973
Missing fix for CVE-2022-30126 in 1.28.2
We failed to apply the fix for CVE-2022-30126 to the 1.x branch in the 1.28.2 release. In Apache Tika, a regular expression in the StandardsText class, used by the StandardsExtractingContentHandler could lead to a denial of service caused by backtracking on a specially crafted file. This only affects users who are running the StandardsExtractingContentHandler, which is a non-standard handler. This is fixed in 1.28.3.
[ "cpe:2.3:a:apache:tika:*:*:*:*:*:*:*:*" ]
GHSA-qh2r-8xwr-qrx9
IBM Maximo Asset Management 7.1 through 7.1.1.13, 7.5 before 7.5.0.10 IF4, and 7.6 before 7.6.0.5 IF3 allows remote attackers to obtain sensitive information via a crafted HTTP request that triggers construction of a runtime error message.
[]
GHSA-jvv6-jf53-h7v7
WFS-SR03 v1.0.3 was discovered to contain a command injection vulnerability via the sys_smb_pwdmod function.
[]
CVE-2010-1523
Multiple heap-based buffer overflows in vp6.w5s (aka the VP6 codec) in Winamp before 5.59 Beta build 3033 might allow remote attackers to execute arbitrary code via a crafted VP6 (1) video file or (2) video stream.
[ "cpe:2.3:a:nullsoft:winamp:*:*:*:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:0.20a:*:*:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:0.92:*:*:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:1.006:*:*:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:1.90:*:*:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:2.4:*:*:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:2.5e:*:*:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:2.6:*:*:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:2.6x:*:*:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:2.7x:*:*:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:2.9:*:*:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:2.10:*:*:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:2.24:*:*:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:2.50:*:*:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:2.60:*:*:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:2.60:*:full:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:2.60:*:lite:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:2.61:*:*:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:2.61:*:full:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:2.62:*:*:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:2.62:*:standard:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:2.64:*:*:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:2.64:*:standard:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:2.65:*:*:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:2.70:*:*:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:2.70:*:full:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:2.71:*:*:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:2.72:*:*:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:2.73:*:*:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:2.73:*:full:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:2.74:*:*:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:2.75:*:*:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:2.76:*:*:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:2.77:*:*:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:2.78:*:*:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:2.79:*:*:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:2.80:*:*:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:2.81:*:*:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:2.90:*:*:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:2.91:*:*:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:2.92:*:*:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:2.95:*:*:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:3.1:*:*:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:5.01:*:*:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:5.1:*:*:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:5.1:-:surround:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:5.02:*:*:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:5.2:*:*:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:5.3:*:*:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:5.03:*:*:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:5.03a:*:*:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:5.04:*:*:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:5.05:*:*:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:5.5:*:*:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:5.06:*:*:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:5.07:*:*:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:5.08:*:*:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:5.08:c:*:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:5.08:d:*:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:5.08:e:*:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:5.08c:*:*:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:5.08d:*:*:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:5.08e:*:*:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:5.09:*:*:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:5.11:*:*:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:5.12:*:*:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:5.13:*:*:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:5.21:*:*:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:5.22:*:*:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:5.23:*:*:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:5.24:*:*:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:5.31:*:*:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:5.32:*:*:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:5.33:*:*:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:5.34:*:*:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:5.35:*:*:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:5.36:*:*:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:5.51:*:*:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:5.52:*:*:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:5.53:*:*:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:5.54:*:*:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:5.55:*:*:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:5.56:*:*:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:5.57:*:*:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:5.58:*:*:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:5.091:*:*:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:5.093:*:*:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:5.094:*:*:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:5.111:*:*:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:5.112:*:*:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:5.531:*:*:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:5.541:*:*:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:5.551:*:*:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:5.552:*:*:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:5.572:*:*:*:*:*:*:*" ]
GHSA-q44p-8prh-c6rh
The Tripetto plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 8.0.9. This is due to missing nonce validation. This makes it possible for unauthenticated attackers to delete arbitrary results via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
[]
GHSA-297x-8xj4-vcxv
Improper Control of Generation of Code in doT
The dot package v1.1.2 uses Function() to compile templates. This can be exploited by the attacker if they can control the given template or if they can control the value set on Object.prototype.
[]
CVE-2012-3805
Multiple cross-site scripting (XSS) vulnerabilities in the getAllPassedParams function in system/functions.php in Kajona before 3.4.2 allow remote attackers to inject arbitrary web script or HTML via the (1) absender_name, (2) absender_email, or (3) absender_nachricht parameter to the content page; (4) comment_name, (5) comment_subject, or (6) comment_message parameter to the postacomment module; (7) module parameter to index.php; (8) action parameter to the admin login page; (9) pv or (10) pe parameter in a list action to the user module; (11) user_username, (12) user_email, (13) user_forename, (14) user_name, (15) user_street, (16) user_postal, (17) user_city, (18) user_tel, or (19) user_mobil parameter in a newUser action to the user module; (20) group_name or (21) group_desc parameter in a groupNew action to the user module; (22) name, (23) browsername, (24) seostring, (25) keywords, or (26) folder_id parameter in a newPage action to the pages module; (27) element_name or (28) element_cachetime parameter in a newElement action in the pages module; (29) aspect_name parameter in a newAspect action in the system module; (30) filemanager_name, (31) filemanager_path, (32) filemanager_upload_filter, or (33) filemanager_view_filter parameter in a NewRepo action to the filemanager module; or (34) archive_title or (35) archive_path parameter in a newArchive action to the downloads module. NOTE: some of these details are obtained from third party information.
[ "cpe:2.3:a:kajona:kajona:*:*:*:*:*:*:*:*", "cpe:2.3:a:kajona:kajona:3.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:kajona:kajona:3.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:kajona:kajona:3.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:kajona:kajona:3.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:kajona:kajona:3.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:kajona:kajona:3.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:kajona:kajona:3.4.0:*:*:*:*:*:*:*" ]
CVE-2023-23649
WordPress MainWP Links Manager Extension Plugin <= 2.1 - Unauthenticated PHP Object Injection Vulnerability
Deserialization of Untrusted Data vulnerability in MainWP MainWP Links Manager Extension.This issue affects MainWP Links Manager Extension: from n/a through 2.1.
[ "cpe:2.3:a:mainwp:mainwp_links_manager_extension:*:*:*:*:*:*:*:*" ]
GHSA-45v7-gg96-grpr
** DISPUTED ** QueryString.php in Simple Machines Forum (SMF) 1.0.7 and earlier, and 1.1rc2 and earlier, allows remote attackers to more easily spoof the IP address and evade banning via a modified X-Forwarded-For HTTP header, which is preferred instead of other more reliable sources for the IP address. NOTE: the original researcher claims that the vendor has disputed this issue.
[]
GHSA-jffw-g7w7-wfvv
ClipperCMS 1.3.3 was discovered to contain a Server-Side Request Forgery (SSRF) via the pkg_url parameter at /manager/index.php.
[]
CVE-2007-5334
Mozilla Firefox before 2.0.0.8 and SeaMonkey before 1.1.5 can hide the window's titlebar when displaying XUL markup language documents, which makes it easier for remote attackers to conduct phishing and spoofing attacks by setting the hidechrome attribute.
[ "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*" ]
GHSA-5gvj-wjmj-hg4f
Not used in 2022
[]
GHSA-3chw-v2q9-5w9w
Mozilla Firefox 3.5.x before 3.5.10 and 3.6.x before 3.6.4, and SeaMonkey before 2.0.5, does not properly handle situations in which both "Content-Disposition: attachment" and "Content-Type: multipart" are present in HTTP headers, which allows remote attackers to conduct cross-site scripting (XSS) attacks via an uploaded HTML document.
[]
CVE-2011-0688
Intel Alert Management System (aka AMS or AMS2), as used in Symantec Antivirus Corporate Edition (SAVCE) 10.x before 10.1 MR10, Symantec System Center (SSC) 10.x, and Symantec Quarantine Server 3.5 and 3.6, allows remote attackers to execute arbitrary commands via crafted messages over TCP, as discovered by Junaid Bohio, a different vulnerability than CVE-2010-0110 and CVE-2010-0111. NOTE: some of these details are obtained from third party information.
[ "cpe:2.3:a:symantec:antivirus:10.0:*:corporate:*:*:*:*:*", "cpe:2.3:a:symantec:antivirus:10.0:mr1:corporate:*:*:*:*:*", "cpe:2.3:a:symantec:antivirus:10.0:mr2:corporate:*:*:*:*:*", "cpe:2.3:a:symantec:antivirus:10.0.1:*:corporate:*:*:*:*:*", "cpe:2.3:a:symantec:antivirus:10.0.1.1:*:corporate:*:*:*:*:*", "cpe:2.3:a:symantec:antivirus:10.0.1.2:*:corporate:*:*:*:*:*", "cpe:2.3:a:symantec:antivirus:10.0.2:*:corporate:*:*:*:*:*", "cpe:2.3:a:symantec:antivirus:10.0.2.1:*:corporate:*:*:*:*:*", "cpe:2.3:a:symantec:antivirus:10.0.2.2:*:corporate:*:*:*:*:*", "cpe:2.3:a:symantec:antivirus:10.0.3:*:corporate:*:*:*:*:*", "cpe:2.3:a:symantec:antivirus:10.0.4:*:corporate:*:*:*:*:*", "cpe:2.3:a:symantec:antivirus:10.0.5:*:corporate:*:*:*:*:*", "cpe:2.3:a:symantec:antivirus:10.0.6:*:corporate:*:*:*:*:*", "cpe:2.3:a:symantec:antivirus:10.0.7:*:corporate:*:*:*:*:*", "cpe:2.3:a:symantec:antivirus:10.0.8:*:corporate:*:*:*:*:*", "cpe:2.3:a:symantec:antivirus:10.0.9:*:corporate:*:*:*:*:*", "cpe:2.3:a:symantec:antivirus:10.1:*:corporate:*:*:*:*:*", "cpe:2.3:a:symantec:antivirus:10.1:mp1:corporate:*:*:*:*:*", "cpe:2.3:a:symantec:antivirus:10.1:mr4:corporate:*:*:*:*:*", "cpe:2.3:a:symantec:antivirus:10.1:mr5:corporate:*:*:*:*:*", "cpe:2.3:a:symantec:antivirus:10.1:mr6:corporate:*:*:*:*:*", "cpe:2.3:a:symantec:antivirus:10.1:mr7:corporate:*:*:*:*:*", "cpe:2.3:a:symantec:antivirus:10.1.0.1:*:corporate:*:*:*:*:*", "cpe:2.3:a:symantec:antivirus:10.1.4:*:corporate:*:*:*:*:*", "cpe:2.3:a:symantec:antivirus:10.1.4.1:*:corporate:*:*:*:*:*", "cpe:2.3:a:symantec:antivirus:10.1.5:*:corporate:*:*:*:*:*", "cpe:2.3:a:symantec:antivirus:10.1.5.1:*:corporate:*:*:*:*:*", "cpe:2.3:a:symantec:antivirus:10.1.6:*:corporate:*:*:*:*:*", "cpe:2.3:a:symantec:antivirus:10.1.6.1:*:corporate:*:*:*:*:*", "cpe:2.3:a:symantec:antivirus:10.1.7:*:corporate:*:*:*:*:*", "cpe:2.3:a:symantec:antivirus:10.1.8:*:corporate:*:*:*:*:*", "cpe:2.3:a:symantec:antivirus:10.1.9:*:corporate:*:*:*:*:*", "cpe:2.3:a:symantec:antivirus:10.2:*:corporate:*:*:*:*:*", "cpe:2.3:a:symantec:antivirus:10.2:mr2:corporate:*:*:*:*:*", "cpe:2.3:a:symantec:antivirus:10.2:mr3:corporate:*:*:*:*:*", "cpe:2.3:a:symantec:system_center:10.0:*:*:*:*:*:*:*", "cpe:2.3:a:symantec:system_center:10.1:*:*:*:*:*:*:*", "cpe:2.3:a:symantec:antivirus_central_quarantine_server:3.5:*:*:*:*:*:*:*", "cpe:2.3:a:symantec:antivirus_central_quarantine_server:3.6:*:*:*:*:*:*:*" ]
CVE-2010-1988
Mozilla Firefox 3.6.3 on Windows XP SP3 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) or possibly execute arbitrary code via JavaScript code that performs certain string concatenation and substring operations, a different vulnerability than CVE-2009-1571.
[ "cpe:2.3:a:mozilla:firefox:3.6.3:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*" ]
GHSA-xxjv-pwp6-p43h
The Notify module 7.x-1.x before 7.x-1.1 for Drupal does not properly restrict access to (1) new or (2) modified nodes or (3) their fields, which allows remote authenticated users to obtain node titles, teasers, and fields by reading a notification email.
[]
GHSA-m7g5-qwgm-89mc
Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') vulnerability in the licensing feature of ICONICS GENESIS64 versions 10.97 to 10.97.2, Mitsubishi Electric GENESIS64 versions 10.97 to 10.97.2 and Mitsubishi Electric MC Works64 all versions allows a local attacker to execute a malicious code with administrative privileges by tampering with a specific file that is not protected by the system.
[]
CVE-2024-51163
A Local File Inclusion vulnerability in Vegam Solutions Vegam 4i versions 6.3.47.0 and earlier allows a remote attacker to obtain sensitive information through the print label function. Specifically, the filePathList parameter is susceptible to LFI, enabling a malicious user to include files from the web server, such as web.config or /etc/host, leading to the disclosure of sensitive information.
[ "cpe:2.3:a:vegam_solutions:vegam_4i:*:*:*:*:*:*:*:*" ]
CVE-2008-4727
Cross-site scripting (XSS) vulnerability in the contact update page (ss/bwgkoemr.P_UpdateEmrgContacts) in SunGard Banner Student 7.3 allows remote attackers to inject arbitrary web script or HTML via the addr1 parameter. NOTE: this might be resultant from a CSRF vulnerability, but there are insufficient details to be sure.
[ "cpe:2.3:a:sungard:banner_student:7.3:*:*:*:*:*:*:*" ]
CVE-2020-7499
A CWE-863: Incorrect Authorization vulnerability exists in U.motion Servers and Touch Panels (affected versions listed in the security notification) which could cause unauthorized access when a low privileged user makes unauthorized changes.
[ "cpe:2.3:o:schneider-electric:mtn6501-0001_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:mtn6501-0001:-:*:*:*:*:*:*:*", "cpe:2.3:o:schneider-electric:mtn6501-0002_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:mtn6501-0002:-:*:*:*:*:*:*:*", "cpe:2.3:o:schneider-electric:mtn6260-0410_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:mtn6260-0410:-:*:*:*:*:*:*:*", "cpe:2.3:o:schneider-electric:mtn6260-0415_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:mtn6260-0415:-:*:*:*:*:*:*:*", "cpe:2.3:o:schneider-electric:mtn6260-0310_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:mtn6260-0310:-:*:*:*:*:*:*:*", "cpe:2.3:o:schneider-electric:mtn6260-0315_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:mtn6260-0315:-:*:*:*:*:*:*:*" ]
GHSA-33hj-pw6w-7p8m
customapp in Cybozu Office 9.9.0 through 10.3.0 allows remote authenticated users to cause a denial of service (excessive database locking) via a crafted CSV file, a different vulnerability than CVE-2016-1153.
[]
GHSA-cpgw-3398-vj5w
In usb_gadget_giveback_request of core.c, there is a possible use after free out of bounds read due to a race condition. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-161010552References: Upstream kernel
[]
GHSA-75mj-5prh-7q9g
Stack-based buffer overflow in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
[]
CVE-2011-2733
EMC RSA Adaptive Authentication On-Premise (AAOP) 6.0.2.1 SP1 Patch 2, SP1 Patch 3, SP2, SP2 Patch 1, and SP3 does not prevent reuse of authentication information during a session, which allows remote authenticated users to bypass intended access restrictions via vectors related to knowledge of the originally used authentication information and unspecified other session information.
[ "cpe:2.3:a:emc:rsa_adaptive_authentication_on-premise:6.0.2.1:sp1_patch2:*:*:*:*:*:*", "cpe:2.3:a:emc:rsa_adaptive_authentication_on-premise:6.0.2.1:sp1_patch3:*:*:*:*:*:*", "cpe:2.3:a:emc:rsa_adaptive_authentication_on-premise:6.0.2.1:sp2:*:*:*:*:*:*", "cpe:2.3:a:emc:rsa_adaptive_authentication_on-premise:6.0.2.1:sp2_patch1:*:*:*:*:*:*", "cpe:2.3:a:emc:rsa_adaptive_authentication_on-premise:6.0.2.1:sp3:*:*:*:*:*:*" ]
CVE-2021-25523
Insecure storage of device information in Samsung Dialer prior to version 12.7.05.24 allows attacker to get Samsung Account ID.
[ "cpe:2.3:a:samsung:dialer:*:*:*:*:*:*:*:*" ]
GHSA-fcfr-67qx-fpgv
RealVNC VNC Server 6.9.0 through 5.1.0 for Windows allows local privilege escalation because an installer repair operation executes %TEMP% files as SYSTEM.
[]
CVE-2024-9472
PAN-OS: Firewall Denial of Service (DoS) Using Specially Crafted Traffic
A null pointer dereference in Palo Alto Networks PAN-OS software on PA-800 Series, PA-3200 Series, PA-5200 Series, and PA-7000 Series hardware platforms when Decryption policy is enabled allows an unauthenticated attacker to crash PAN-OS by sending specific traffic through the data plane, resulting in a denial of service (DoS) condition. Repeated attempts to trigger this condition will result in PAN-OS entering maintenance mode. Palo Alto Networks VM-Series, Cloud NGFW, and Prisma Access are not affected. This issue only affects PA-800 Series, PA-3200 Series, PA-5200 Series, and PA-7000 Series running these specific versions of PAN-OS: * 10.2.7-h12 * 10.2.8-h10 * 10.2.9-h9 * 10.2.9-h11 * 10.2.10-h2 * 10.2.10-h3 * 10.2.11 * 10.2.11-h1 * 10.2.11-h2 * 10.2.11-h3 * 11.1.2-h9 * 11.1.2-h12 * 11.1.3-h2 * 11.1.3-h4 * 11.1.3-h6 * 11.2.2 * 11.2.2-h1
[ "cpe:2.3:o:paloaltonetworks:pan-os:11.2.2:h1:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:11.2.1:-:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:11.2.0:-:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:11.2:-:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h13:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h12:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h11:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h10:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h9:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h8:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h7:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h6:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h5:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h4:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h3:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h2:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h1:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:-:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:11.1.1:h1:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:11.1.1:-:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:11.1.0:h3:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:11.1.0:h2:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:11.1.0:h1:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:11.1.0:-:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:11.1:-:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h15:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h14:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h13:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h12:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h11:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h10:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h9:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h8:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h7:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h6:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h5:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h4:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h3:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h2:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h1:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:-:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:10.2.6:h3:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:10.2.6:h2:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:10.2.6:h1:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:10.2.6:-:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:10.2.5:h6:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:10.2.5:h5:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:10.2.5:h4:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:10.2.5:h3:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:10.2.5:h2:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:10.2.5:h1:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:10.2.5:-:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h16:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h15:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h14:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h13:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h12:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h11:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h10:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h9:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h8:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h7:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h6:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h5:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h4:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h3:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h2:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h1:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:-:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:h13:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:h12:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:h11:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:h10:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:h9:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:h8:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:h7:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:h6:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:h5:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:h4:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:h3:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:h2:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:h1:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:-:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:10.2.2:h5:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:10.2.2:h4:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:10.2.2:h3:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:10.2.2:h2:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:10.2.2:h1:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:10.2.2:-:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:10.2.1:h2:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:10.2.1:h1:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:10.2.1:-:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:10.2.0:h3:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:10.2.0:h2:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:10.2.0:h1:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:10.2.0:-:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:10.2:-:*:*:*:*:*:*" ]
GHSA-m9c2-85v6-rpch
Cross-site scripting (XSS) vulnerability in ThemeServlet.java in Sun Woodstock 4.2, as used in Sun GlassFish Enterprise Server and other products, allows remote attackers to inject arbitrary web script or HTML via a UTF-7 string in the PATH_INFO, which is displayed on the 404 error page, as demonstrated by the PATH_INFO to theme/META-INF.
[]
GHSA-2rhc-gc9x-8vvf
Cross-Site Request Forgery (CSRF) vulnerability in Andrea Pernici Third Party Cookie Eraser allows Stored XSS.This issue affects Third Party Cookie Eraser: from n/a through 1.0.2.
[]
CVE-2022-24413
Dell PowerScale OneFS, versions 8.2.2-9.3.x, contain a time-of-check-to-time-of-use vulnerability. A local user with access to the filesystem could potentially exploit this vulnerability, leading to data loss.
[ "cpe:2.3:o:dell:emc_powerscale_onefs:*:*:*:*:*:*:*:*" ]
GHSA-x7hw-jwrw-qw78
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in the SonicOS SSLVPN portal allows a remote authenticated attacker as a firewall 'admin' user to store and execute arbitrary JavaScript code.
[]
GHSA-96vh-6p2h-62ph
Multiple directory traversal vulnerabilities in PHP-Fusion before 7.02.06 allow remote authenticated users to include and execute arbitrary files via a .. (dot dot) in the (1) user_theme parameter to maincore.php; or remote authenticated administrators to delete arbitrary files via the (2) enable parameter to administration/user_fields.php or (3) file parameter to administration/db_backup.php.
[]
CVE-2009-2750
IBM WebSphere Service Registry and Repository (WSRR) 6.3.0 before FP2 does not have the intended configuration properties, which allows remote authenticated users to obtain unspecified data access via a property query.
[ "cpe:2.3:a:ibm:websphere_service_registry_and_repository:6.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_service_registry_and_repository:6.3.0.1:*:*:*:*:*:*:*" ]
CVE-2022-36473
H3C B5 Mini B5MiniV100R005 was discovered to contain a stack overflow via the function Edit_BasicSSID_5G.
[ "cpe:2.3:o:h3c:b5_mini_firmware:b5miniv100r005:*:*:*:*:*:*:*", "cpe:2.3:h:h3c:b5_mini:-:*:*:*:*:*:*:*" ]
GHSA-x6w4-6wg6-779c
XnView Classic for Windows Version 2.40 might allow attackers to cause a denial of service or possibly have unspecified other impact via a crafted .rle file, related to "Data from Faulting Address controls Branch Selection starting at ntdll_77df0000!LdrpFindLoadedDllByHandle+0x0000000000000031."
[]
CVE-2024-7124
Reflected XSS in DInGO dLibra
Improper Neutralization of Input During Web Page Generation vulnerability in DInGO dLibra software in the parameter 'filter' in the endpoint 'indexsearch' allows a Reflected Cross-Site Scripting (XSS). An attacker might trick somebody into using a crafted URL, which will cause a script to be run in user's browser. This issue affects DInGO dLibra software in versions from 6.0 before 6.3.20.
[ "cpe:2.3:a:poznan_supercomputing_and_networking_center:dingo_dlibra:*:*:*:*:*:*:*:*" ]
CVE-2023-39002
A cross-site scripting (XSS) vulnerability in the act parameter of system_certmanager.php in OPNsense Community Edition before 23.7 and Business Edition before 23.4.2 allows attackers to execute arbitrary web scripts or HTML via a crafted payload.
[ "cpe:2.3:a:opnsense:opnsense:*:*:*:*:*:*:*:*" ]
CVE-2018-12930
ntfs_end_buffer_async_read in the ntfs.ko filesystem driver in the Linux kernel 4.15.0 allows attackers to trigger a stack-based out-of-bounds write and cause a denial of service (kernel oops or panic) or possibly have unspecified other impact via a crafted ntfs filesystem.
[ "cpe:2.3:o:linux:linux_kernel:4.15:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04.4:*:*:*:lts:*:*:*" ]
CVE-2009-0055
Cross-site request forgery (CSRF) vulnerability in the administration interface in Cisco IronPort Encryption Appliance 6.2.4 before 6.2.4.1.1, 6.2.5, 6.2.6, 6.2.7 before 6.2.7.7, 6.3 before 6.3.0.4, and 6.5 before 6.5.0.2; and Cisco IronPort PostX 6.2.1 before 6.2.1.1 and 6.2.2 before 6.2.2.3; allows remote attackers to modify appliance preferences as arbitrary users via unspecified vectors.
[ "cpe:2.3:h:cisco:ironport_encryption_appliance:6.2.4:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ironport_encryption_appliance:6.2.4.1:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ironport_encryption_appliance:6.2.5:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ironport_encryption_appliance:6.2.6:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ironport_encryption_appliance:6.2.7:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ironport_encryption_appliance:6.2.7.1:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ironport_encryption_appliance:6.2.7.2:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ironport_encryption_appliance:6.2.7.3:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ironport_encryption_appliance:6.2.7.4:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ironport_encryption_appliance:6.2.7.5:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ironport_encryption_appliance:6.2.7.6:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ironport_encryption_appliance:6.3:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ironport_encryption_appliance:6.3.0.1:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ironport_encryption_appliance:6.3.0.2:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ironport_encryption_appliance:6.3.0.3:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ironport_encryption_appliance:6.5:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ironport_encryption_appliance:6.5.0.1:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ironport_postx:6.2.1:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ironport_postx:6.2.2:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ironport_postx:6.2.2.1:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ironport_postx:6.2.2.2:*:*:*:*:*:*:*" ]
CVE-2023-52182
WordPress ARI Stream Quiz Plugin <= 1.3.0 is vulnerable to PHP Object Injection
Deserialization of Untrusted Data vulnerability in ARI Soft ARI Stream Quiz – WordPress Quizzes Builder.This issue affects ARI Stream Quiz – WordPress Quizzes Builder: from n/a through 1.3.0.
[ "cpe:2.3:a:ari-soft:ari_stream_quiz:*:*:*:*:*:wordpress:*:*" ]
CVE-2024-38329
IBM Storage Protect for Virtual Environments: Data Protection for VMware security bypass
IBM Storage Protect for Virtual Environments: Data Protection for VMware 8.1.0.0 through 8.1.22.0 could allow a remote authenticated attacker to bypass security restrictions, caused by improper validation of user permission. By sending a specially crafted request, an attacker could exploit this vulnerability to change its settings, trigger backups, restore backups, and also delete all previous backups via log rotation. IBM X-Force ID: 294994.
[ "cpe:2.3:a:ibm:storage_protect_for_virtual_environments:*:*:*:*:*:*:*:*" ]
CVE-2019-6328
HP Support Assistant 8.7.50 and earlier allows a user to gain system privilege and allows unauthorized modification of directories or files. Note: A different vulnerability than CVE-2019-6329.
[ "cpe:2.3:a:hp:support_assistant:*:*:*:*:*:*:*:*" ]
GHSA-4r9q-wqcj-x85j
Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability.
[]
GHSA-7xgh-mp43-jp2c
Netfilter in Linux kernel 2.6.8.1 allows remote attackers to cause a denial of service (kernel crash) via crafted IP packet fragments.
[]
GHSA-cm35-f8g3-r786
In the Linux kernel, the following vulnerability has been resolved:watchdog: sc520_wdt: Fix possible use-after-free in wdt_turnoff()This module's remove path calls del_timer(). However, that function does not wait until the timer handler finishes. This means that the timer handler may still be running after the driver's remove function has finished, which would result in a use-after-free.Fix by calling del_timer_sync(), which makes sure the timer handler has finished, and unable to re-schedule itself.
[]
GHSA-h44m-9mr3-vj7x
The Web Reports Server for SurfControl SuperScout WebFilter allows remote attackers to cause a denial of service (CPU consumption) via large GET requests, possibly due to a buffer overflow.
[]
GHSA-9c75-8rvc-pmm7
The IAPP dissector (packet-iapp.c) for Ethereal 0.9.1 to 0.10.9 does not properly use certain routines for formatting strings, which could leave it vulnerable to buffer overflows, as demonstrated using modified length values that are not properly handled by the dissect_pdus and pduval_to_str functions.
[]
GHSA-jrfw-cw22-5m95
Cross-site scripting (XSS) vulnerability in Null HTTP Server 0.5.0 and earlier allows remote attackers to insert arbitrary HTML into a "404 Not Found" response.
[]
CVE-2018-9526
In device configuration data, there is an improperly configured setting. This could lead to remote disclosure of device location. User interaction is not needed for exploitation. Product: Android. Versions: Android-9. Android ID: A-112159033
[ "cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*" ]
CVE-2023-47262
The startup process and device configurations of the Abbott ID NOW device, before v7.1, can be interrupted and/or modified via physical access to an internal serial port. Direct physical access is required to exploit.
[ "cpe:2.3:o:abbott:id_now_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:abbott:id_now:-:*:*:*:*:*:*:*" ]
GHSA-7f69-j3pp-qvxc
Weak Password Requirements in GitHub repository cloudexplorer-dev/cloudexplorer-lite prior to v 1.2.0.
[]
CVE-2011-0037
Microsoft Malware Protection Engine before 1.1.6603.0, as used in Microsoft Malicious Software Removal Tool (MSRT), Windows Defender, Security Essentials, Forefront Client Security, Forefront Endpoint Protection 2010, and Windows Live OneCare, allows local users to gain privileges via a crafted value of an unspecified user registry key.
[ "cpe:2.3:a:microsoft:forefront_client_security:*:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:forefront_endpoint_protection_2010:-:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:malicious_software_removal_tool:*:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:malware_protection_engine:*:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:malware_protection_engine:0.1.13.192:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:malware_protection_engine:1.1.3520.0:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:security_essentials:*:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:windows_defender:*:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:windows_live_onecare:*:*:*:*:*:*:*:*" ]
CVE-2018-20173
Zoho ManageEngine OpManager 12.3 before 123238 allows SQL injection via the getGraphData API.
[ "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build12300:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123001:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123002:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123003:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123004:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123005:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123006:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123007:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123008:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123009:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123010:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123011:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123012:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123013:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123014:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123015:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123021:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123022:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123023:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123024:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123025:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123026:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123027:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123028:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123029:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123030:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123031:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123032:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123033:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123034:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123035:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123036:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123037:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123043:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123044:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123045:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123046:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123047:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123048:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123049:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123050:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123051:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123052:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123053:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123054:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123055:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123056:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123057:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123062:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123063:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123064:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123065:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123066:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123067:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123068:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123069:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123070:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123076:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123077:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123078:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123079:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123080:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123081:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123082:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123083:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123084:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123086:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123090:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123091:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123092:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123192:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123193:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123194:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123195:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123196:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123197:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123198:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123204:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123205:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123206:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123207:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123208:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123222:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123223:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123224:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123229:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123230:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123231:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123237:*:*:*:*:*:*" ]
CVE-2023-29689
PyroCMS 3.9 contains a remote code execution (RCE) vulnerability that can be exploited through a server-side template injection (SSTI) flaw. This vulnerability allows a malicious attacker to send customized commands to the server and execute arbitrary code on the affected system.
[ "cpe:2.3:a:pyrocms:pyrocms:3.9:*:*:*:*:*:*:*" ]
CVE-2014-9741
Multiple cross-site scripting (XSS) vulnerabilities in ESRI ArcGIS for Desktop, ArcGIS for Engine, and ArcGIS for Server 10.2.2 and earlier allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.
[ "cpe:2.3:a:esri:arcgis_for_desktop:*:*:*:*:*:*:*:*", "cpe:2.3:a:esri:arcgis_for_engine:*:*:*:*:*:*:*:*", "cpe:2.3:a:esri:arcgis_server:*:*:*:*:*:*:*:*" ]
GHSA-jw8x-6495-233v
scikit-learn sensitive data leakage vulnerability
A sensitive data leakage vulnerability was identified in scikit-learn's TfidfVectorizer, specifically in versions up to and including 1.4.1.post1, which was fixed in version 1.5.0. The vulnerability arises from the unexpected storage of all tokens present in the training data within the `stop_words_` attribute, rather than only storing the subset of tokens required for the TF-IDF technique to function. This behavior leads to the potential leakage of sensitive information, as the `stop_words_` attribute could contain tokens that were meant to be discarded and not stored, such as passwords or keys. The impact of this vulnerability varies based on the nature of the data being processed by the vectorizer.
[]
CVE-2025-32405
An Out-of-bounds Write in RT-Labs P-Net version 1.0.1 or earlier allows an attacker to induce a crash in IO devices that use the library by sending a malicious RPC packet.
[]
GHSA-qr89-ccwq-p3qf
Unspecified vulnerability in HP Intelligent Management Center (iMC) and Intelligent Management Center for Automated Network Manager (ANM) before 5.2 E0401 allows remote attackers to obtain sensitive information, modify data, or cause a denial of service via unknown vectors, aka ZDI-CAN-1615.
[]
CVE-2018-2891
Vulnerability in the Oracle Retail Bulk Data Integration component of Oracle Retail Applications (subcomponent: BDI Job Scheduler). The supported version that is affected is 16.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Retail Bulk Data Integration. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Retail Bulk Data Integration, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Retail Bulk Data Integration accessible data as well as unauthorized read access to a subset of Oracle Retail Bulk Data Integration accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).
[ "cpe:2.3:a:oracle:retail_bulk_data_integration:16.0:*:*:*:*:*:*:*" ]