id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
189k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
patch_commit_url
stringlengths
36
232
RHSA-2022:0074
Red Hat Security Advisory: samba security update
samba: SMB1 client connections can be downgraded to plaintext authentication samba: Active Directory (AD) domain user could become root on domain members
[ "cpe:/a:redhat:rhel_eus:8.2::crb", "cpe:/o:redhat:rhel_eus:8.2::baseos" ]
null
8.1
null
null
null
CVE-2024-47645
WordPress WPOptin plugin <= 2.0.1 - Local File Inclusion vulnerability
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Sajid Javed Top Bar – PopUps – by WPOptin allows PHP Local File Inclusion.This issue affects Top Bar – PopUps – by WPOptin: from n/a through 2.0.1.
[ "cpe:2.3:a:sajidjaved:top_bar-popups-by_wpoptin:*:*:*:*:*:*:*:*" ]
null
7.5
null
null
null
GHSA-f68g-4p63-5wh7
A keystroke logging issue was discovered in Virtual Keyboard in Qt 5.7.x, 5.8.x, 5.9.x, 5.10.x, and 5.11.x before 5.11.3.
[]
null
null
7.5
null
null
GHSA-j5fm-79jj-cwpj
SQL injection vulnerability in all versions prior to V4.01.01 of the ZTE ZXCDN-SNS product allows remote attackers to execute arbitrary SQL commands via the aoData parameter, resulting in the disclosure of database information.
[]
null
null
7.5
null
null
RHSA-2025:8980
Red Hat Security Advisory: gstreamer1-plugins-bad-free security update
GStreamer: GStreamer H265 Codec Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability
[ "cpe:/a:redhat:rhel_aus:8.4::appstream" ]
null
8.8
null
null
null
CVE-2019-3718
Dell SupportAssist Client versions prior to 3.2.0.90 contain an improper origin validation vulnerability. An unauthenticated remote attacker could potentially exploit this vulnerability to attempt CSRF attacks on users of the impacted systems.
[ "cpe:2.3:a:dell:supportassist:*:*:*:*:*:*:*:*" ]
null
null
7.6
null
null
GHSA-pmjf-334r-5j9j
The web server used by MikroTik RouterOS version 6 is affected by a heap memory corruption issue. A remote and unauthenticated attacker can corrupt the server's heap memory by sending a crafted HTTP request. As a result, the web interface crashes and is immediately restarted. The issue was fixed in RouterOS 6.49.10 stable. RouterOS version 7 is not affected.
[]
null
7.5
null
null
null
GHSA-h689-32cr-m2v5
Multiple cross-site scripting (XSS) vulnerabilities in the login application in vBook 4.2.17 allow remote attackers to inject arbitrary web script or HTML via the (1) title and (2) message parameters.
[]
null
null
null
null
null
CVE-2014-7048
The Bear ID Lock (aka com.wBearIDLock) application 0.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[ "cpe:2.3:a:bearidlock:bear_id_lock:0.1:*:*:*:*:android:*:*" ]
null
null
null
5.4
null
GHSA-9x8w-jj9g-vgv3
The Bello - Directory & Listing WordPress theme before 1.6.0 did not properly sanitise and escape its listing_list_view, bt_bb_listing_field_my_lat, bt_bb_listing_field_my_lng, bt_bb_listing_field_distance_value, bt_bb_listing_field_my_lat_default, bt_bb_listing_field_keyword, bt_bb_listing_field_location_autocomplete, bt_bb_listing_field_price_range_from and bt_bb_listing_field_price_range_to parameter in ints listing page, leading to reflected Cross-Site Scripting issues.
[]
null
null
null
null
null
GHSA-6rhx-w4jr-jr58
SQL injection vulnerability in index.php in EACOMM DO-CMS 3.0 allows remote attackers to execute arbitrary SQL commands via the p parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
[]
null
null
null
null
null
CVE-2018-13726
The mintToken function of a smart contract implementation for ISeeVoiceToken, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value.
[ "cpe:2.3:a:iseevoicetoken_project:iseevoicetoken:-:*:*:*:*:*:*:*" ]
null
null
7.5
5
null
CVE-2019-6957
Buffer Overflow for Bosch Video Systems, PSIM and Access Control Systems
A recently discovered security vulnerability affects all Bosch Video Management System (BVMS) versions 9.0 and below, DIVAR IP 2000, 3000, 5000 and 7000, Video Recording Manager (VRM), Video Streaming Gateway (VSG), Configuration Manager, Building Integration System (BIS) with Video Engine, Access Professional Edition (APE), Access Easy Controller (AEC), Bosch Video Client (BVC) and Video SDK (VSDK). The vulnerability potentially allows the unauthorized execution of code in the system via the network interface.
[ "cpe:2.3:a:bosch:access_professional_edition:*:*:*:*:*:*:*:*", "cpe:2.3:a:bosch:bosch_video_client:*:*:*:*:*:*:*:*", "cpe:2.3:a:bosch:bosch_video_management_system:*:*:*:*:*:*:*:*", "cpe:2.3:a:bosch:building_integration_system:*:*:*:*:*:*:*:*", "cpe:2.3:a:bosch:building_integration_system:4.5:*:*:*:*:*:*:*", "cpe:2.3:a:bosch:building_integration_system:4.6:*:*:*:*:*:*:*", "cpe:2.3:a:bosch:building_integration_system:4.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:bosch:configuration_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:bosch:video_recording_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:bosch:video_sdk:*:*:*:*:*:*:*:*", "cpe:2.3:a:bosch:video_streaming_gateway:*:*:*:*:*:*:*:*", "cpe:2.3:o:bosch:dip_2000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:bosch:dip_2000:-:*:*:*:*:*:*:*", "cpe:2.3:o:bosch:dip_3000_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:bosch:dip_3000:-:*:*:*:*:*:*:*", "cpe:2.3:o:bosch:dip_5000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:bosch:dip_5000:-:*:*:*:*:*:*:*", "cpe:2.3:o:bosch:dip_7000_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:bosch:dip_7000:gen1:*:*:*:*:*:*:*", "cpe:2.3:h:bosch:dip_7000:gen2:*:*:*:*:*:*:*", "cpe:2.3:o:bosch:access_easy_controller_firmware:2.1.8.5:*:*:*:*:*:*:*", "cpe:2.3:o:bosch:access_easy_controller_firmware:2.1.9.0:*:*:*:*:*:*:*", "cpe:2.3:o:bosch:access_easy_controller_firmware:2.1.9.1:*:*:*:*:*:*:*", "cpe:2.3:o:bosch:access_easy_controller_firmware:2.1.9.3:*:*:*:*:*:*:*", "cpe:2.3:h:bosch:access_easy_controller:-:*:*:*:*:*:*:*" ]
null
null
9.8
null
null
GHSA-gm9h-jqqh-9434
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley MicroStation CONNECT 10.16.02.34. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of IFC files. Crafted data in an IFC file can trigger a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-16392.
[]
null
7.8
null
null
null
CVE-2025-5302
Denial of Service (DOS) in JSONReader in run-llama/llama_index
A denial of service vulnerability exists in the JSONReader component of the run-llama/llama_index repository, specifically in version v0.12.37. The vulnerability is caused by uncontrolled recursion when parsing deeply nested JSON files, which can lead to Python hitting its maximum recursion depth limit. This results in high resource consumption and potential crashes of the Python process. The issue is resolved in version 0.12.38.
[]
null
null
8.6
null
null
CVE-2025-47040
Adobe Experience Manager | Cross-site Scripting (DOM-based XSS) (CWE-79)
Adobe Experience Manager versions 6.5.22 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
[]
null
5.4
null
null
null
CVE-2024-48459
A command execution vulnerability exists in the AX2 Pro home router produced by Shenzhen Tenda Technology Co., Ltd. (Jixiang Tenda) v.DI_7003G-19.12.24A1V16.03.29.50;V16.03.29.50;V16.03.29.50. An attacker can exploit this vulnerability by constructing a malicious payload to execute commands and further obtain shell access to the router's file system with the highest privileges.
[ "cpe:2.3:o:tenda:ax2_pro_firmware:*:*:*:*:*:*:*:*" ]
null
7.3
null
null
null
GHSA-m9gr-8xj6-cq2p
phpcart.php in PHPCart 3.2 allows remote attackers to change product price information by modifying the (1) price or (2) postage parameters. NOTE: it was later reported that 3.4 through 4.6.4 are also affected.
[]
null
null
null
null
null
GHSA-9x4x-qwhq-g8f7
In the Linux kernel, the following vulnerability has been resolved:net: fix use-after-free in tw_timer_handlerA real world panic issue was found as follow in Linux 5.4.This issue was also reported since 2017 in the thread [1], unfortunately, the issue was still can be reproduced after fixing DCCP.The ipv4_mib_exit_net is called before tcp_sk_exit_batch when a net namespace is destroyed since tcp_sk_ops is registered befrore ipv4_mib_ops, which means tcp_sk_ops is in the front of ipv4_mib_ops in the list of pernet_list. There will be a use-after-free on net->mib.net_statistics in tw_timer_handler after ipv4_mib_exit_net if there are some inflight time-wait timers.This bug is not introduced by commit f2bf415cfed7 ("mib: add net to NET_ADD_STATS_BH") since the net_statistics is a global variable instead of dynamic allocation and freeing. Actually, commit 61a7e26028b9 ("mib: put net statistics on struct net") introduces the bug since it put net statistics on struct net and free it when net namespace is destroyed.Moving init_ipv4_mibs() to the front of tcp_init() to fix this bug and replace pr_crit() with panic() since continuing is meaningless when init_ipv4_mibs() fails.[1] https://groups.google.com/g/syzkaller/c/p1tn-_Kc6l4/m/smuL_FMAAgAJ?pli=1
[]
null
7.8
null
null
null
GHSA-9hv9-87gp-7pw8
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in markkinchin Beds24 Online Booking allows Stored XSS. This issue affects Beds24 Online Booking: from n/a through 2.0.29.
[]
null
6.5
null
null
null
CVE-2020-1172
Scripting Engine Memory Corruption Vulnerability
<p>A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user.</p> <p>If the current user is logged on with administrative user rights, an attacker who successfully exploited the vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.</p> <p>The security update addresses the vulnerability by modifying how the ChakraCore scripting engine handles objects in memory.</p>
[ "cpe:2.3:a:microsoft:chakracore:*:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*" ]
null
4.2
null
null
null
GHSA-v3gv-gj4m-f92w
An Insecure Direct Object Reference (IDOR) vulnerability in OpenEMR 6.0.0 allows any authenticated attacker to access and modify unauthorized areas via a crafted POST request to /modules/zend_modules/public/Installer/register.
[]
null
8.1
null
null
null
GHSA-5gp5-jqc5-m4v7
Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in Safari 13.0.1, iOS 13.1 and iPadOS 13.1, iCloud for Windows 10.7, iCloud for Windows 7.14, tvOS 13, watchOS 6, iTunes 12.10.1 for Windows. Processing maliciously crafted web content may lead to arbitrary code execution.
[]
null
null
null
null
null
RHEA-2024:11005
Red Hat Enhancement Advisory: Errata Advisory for Red Hat OpenShift GitOps v1.15.0
word-wrap: ReDoS
[ "cpe:/a:redhat:openshift_gitops:1.15::el8", "cpe:/a:redhat:openshift_gitops:1.15::el9" ]
null
7.5
null
null
null
CVE-2022-0118
Inappropriate implementation in WebShare in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to potentially hide the contents of the Omnibox (URL bar) via a crafted HTML page.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*" ]
null
4.3
null
4.3
null
CVE-2025-21592
Junos OS: SRX Series: Low privileged user able to access highly sensitive information on file system
An Exposure of Sensitive Information to an Unauthorized Actor vulnerability in the command-line interface (CLI) of Juniper Networks Junos OS on SRX Series devices allows a local, low-privileged user with access to the Junos CLI to view the contents of sensitive files on the file system. Through the execution of either 'show services advanced-anti-malware' or 'show services security-intelligence' command, a user with limited permissions (e.g., a low privilege login class user) can access protected files that should not be accessible to the user. These files may contain sensitive information that can be used to cause further impact to the system. This issue affects Junos OS SRX Series: * All versions before 21.4R3-S8, * from 22.2 before 22.2R3-S5, * from 22.3 before 22.3R3-S3, * from 22.4 before 22.4R3-S2, * from 23.2 before 23.2R2-S1, * from 23.4 before 23.4R2.
[]
6.8
5.5
null
null
null
CVE-2022-36885
Jenkins GitHub Plugin 1.34.4 and earlier uses a non-constant time comparison function when checking whether the provided and computed webhook signatures are equal, allowing attackers to use statistical methods to obtain a valid webhook signature.
[ "cpe:2.3:a:jenkins:github:*:*:*:*:*:jenkins:*:*" ]
null
5.3
null
null
null
GHSA-jjgp-jxfq-2w96
The Bdat driver of Prague smart phones with software versions earlier than Prague-AL00AC00B211, versions earlier than Prague-AL00BC00B211, versions earlier than Prague-AL00CC00B211, versions earlier than Prague-TL00AC01B211, versions earlier than Prague-TL10AC01B211 has integer overflow vulnerability due to the lack of parameter validation. An attacker tricks a user into installing a malicious APP and execute it as a specific privilege; the APP can then send a specific parameter to the driver of the smart phone, causing arbitrary code execution.
[]
null
null
7.8
null
null
CVE-2015-3280
OpenStack Compute (nova) before 2014.2.4 (juno) and 2015.1.x before 2015.1.2 (kilo) does not properly delete instances from compute nodes, which allows remote authenticated users to cause a denial of service (disk consumption) by deleting instances while in the resize state.
[ "cpe:2.3:a:openstack:nova:*:*:*:*:*:*:*:*" ]
null
null
null
6.8
null
CVE-2019-3462
Incorrect sanitation of the 302 redirect field in HTTP transport method of apt versions 1.4.8 and earlier can lead to content injection by a MITM attacker, potentially leading to remote code execution on the target machine.
[ "cpe:2.3:a:debian:advanced_package_tool:*:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:active_iq:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*" ]
null
8.1
null
9.3
null
GHSA-2hgm-fhfg-mc3p
Tenda AC6V1.0 V15.03.05.19 was discovered to contain a buffer overflow via the limitSpeed parameter in the formSetClientState function.
[]
null
7.5
null
null
null
GHSA-5m62-c8gp-6qqv
A state machine transition flaw in the Bluetooth Low Energy (BLE) stack of Cypress PSoC4 v3.66 allows attackers to bypass the pairing process and authentication via a crafted pairing_failed packet.
[]
null
8.1
null
null
null
GHSA-8hg7-p3vv-gx38
The pdf-print plugin before 2.0.3 for WordPress has multiple XSS issues.
[]
null
null
6.1
null
null
CVE-2019-6833
A CWE-754 – Improper Check for Unusual or Exceptional Conditions vulnerability exists in Magelis HMI Panels (all versions of - HMIGTO, HMISTO, XBTGH, HMIGTU, HMIGTUX, HMISCU, HMISTU, XBTGT, XBTGT, HMIGXO, HMIGXU), which could cause a temporary freeze of the HMI when a high rate of frames is received. When the attack stops, the buffered commands are processed by the HMI panel.
[ "cpe:2.3:o:schneider-electric:hmigto_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:hmigto1300:-:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:hmigto1310:-:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:hmigto2300:-:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:hmigto2310:-:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:hmigto2315:-:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:hmigto3510:-:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:hmigto4310:-:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:hmigto5310:-:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:hmigto5315:-:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:hmigto6310:-:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:hmigto6315:-:*:*:*:*:*:*:*", "cpe:2.3:o:schneider-electric:hmisto_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:hmisto501:-:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:hmisto511:-:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:hmisto512:-:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:hmisto531:-:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:hmisto532:-:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:hmisto705:-:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:hmisto715:-:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:hmisto735:-:*:*:*:*:*:*:*", "cpe:2.3:o:schneider-electric:xbtgh_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:xbtgh2460:-:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:hmigtu_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:hmig2u:-:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:hmig3u:-:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:hmig3ufc:-:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:hmig5u:-:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:hmig5u2:-:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:hmig5ufc:-:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:hmig5ul8a:-:*:*:*:*:*:*:*", "cpe:2.3:o:schneider-electric:hmiscu_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:hmiscu6a5:-:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:hmiscu6b5:-:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:hmiscu8a5:-:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:hmiscu8b5:-:*:*:*:*:*:*:*", "cpe:2.3:o:schneider-electric:hmistu_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:hmistu655:-:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:hmistu655w:-:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:hmistu855:-:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:hmistu855w:-:*:*:*:*:*:*:*", "cpe:2.3:o:schneider-electric:xbtgt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:xbtgt2430:-:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:xbtgt2930:-:*:*:*:*:*:*:*", "cpe:2.3:o:schneider-electric:hmigxo_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:hmigxo:-:*:*:*:*:*:*:*", "cpe:2.3:o:schneider-electric:hmigxu_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:hmigxu35:-:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:hmigxu55:-:*:*:*:*:*:*:*" ]
null
6.5
null
4.3
null
CVE-2020-22403
Cross Site Request Forgery (CSRF) vulnerability in Express cart v1.1.16 allows attackers to add an administrator account, add discount code or other unspecified impacts.
[ "cpe:2.3:a:express-cart_project:express-cart:*:*:*:*:*:node.js:*:*" ]
null
8.8
null
6.8
null
CVE-2022-24046
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Sonos One Speaker prior to 3.4.1 (S2 systems) and 11.2.13 build 57923290 (S1 systems). Authentication is not required to exploit this vulnerability. The specific flaw exists within the anacapd daemon. The issue results from the lack of proper validation of user-supplied data, which can result in an integer underflow before writing to memory. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-15828.
[ "cpe:2.3:a:sonos:s1:*:*:*:*:*:*:*:*", "cpe:2.3:a:sonos:s2:*:*:*:*:*:*:*:*", "cpe:2.3:h:sonos:one:-:*:*:*:*:*:*:*" ]
null
null
9.8
null
null
CVE-2016-1486
A vulnerability in the email attachment scanning functionality of the Advanced Malware Protection (AMP) feature of Cisco AsyncOS Software for Cisco Email Security Appliances could allow an unauthenticated, remote attacker to cause an affected device to stop scanning and forwarding email messages due to a denial of service (DoS) condition. Affected Products: This vulnerability affects Cisco AsyncOS Software releases 9.7.1 and later, prior to the first fixed release, for both virtual and hardware Cisco Email Security Appliances, if the AMP feature is configured to scan incoming email attachments. More Information: CSCuy99453. Known Affected Releases: 9.7.1-066. Known Fixed Releases: 10.0.0-125 9.7.1-207 9.7.2-047.
[ "cpe:2.3:a:cisco:email_security_appliance:8.5.0-000:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:email_security_appliance:8.5.0-er1-198:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:email_security_appliance:8.5.6-052:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:email_security_appliance:8.5.6-073:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:email_security_appliance:8.5.6-074:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:email_security_appliance:8.5.6-106:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:email_security_appliance:8.5.6-113:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:email_security_appliance:8.5.7-042:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:email_security_appliance:8.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:email_security_appliance:8.6.0-011:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:email_security_appliance:8.9.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:email_security_appliance:8.9.1-000:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:email_security_appliance:8.9.2-032:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:email_security_appliance:9.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:email_security_appliance:9.0.0-212:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:email_security_appliance:9.0.0-461:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:email_security_appliance:9.0.5-000:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:email_security_appliance:9.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:email_security_appliance:9.1.0-011:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:email_security_appliance:9.1.0-032:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:email_security_appliance:9.1.0-101:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:email_security_appliance:9.1.1-000:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:email_security_appliance:9.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:email_security_appliance:9.4.4-000:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:email_security_appliance:9.5.0-000:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:email_security_appliance:9.5.0-201:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:email_security_appliance:9.6.0-000:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:email_security_appliance:9.6.0-042:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:email_security_appliance:9.6.0-051:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:email_security_appliance:9.7.0-125:*:*:*:*:*:*:*" ]
null
null
7.5
7.8
null
CVE-2014-0157
Cross-site scripting (XSS) vulnerability in the Horizon Orchestration dashboard in OpenStack Dashboard (aka Horizon) 2013.2 before 2013.2.4 and icehouse before icehouse-rc2 allows remote attackers to inject arbitrary web script or HTML via the description field of a Heat template.
[ "cpe:2.3:a:openstack:horizon:2013.2:*:*:*:*:*:*:*", "cpe:2.3:a:openstack:horizon:2013.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:openstack:horizon:2013.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:openstack:horizon:2013.2.3:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
CVE-2009-0956
Apple QuickTime before 7.6.2 does not properly initialize memory before use in handling movie files, which allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a movie containing a user data atom of size zero.
[ "cpe:2.3:a:apple:quicktime:*:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:-:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:4.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:4.1.2:-:mac:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:4.1.2:-:windows:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:5.0.1:-:mac:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:5.0.1:-:windows:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:5.0.2:-:mac:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:5.0.2:-:windows:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:6.0:-:windows:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:6.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:6.0.0:-:mac:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:6.0.0:-:windows:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:6.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:6.0.1:-:mac:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:6.0.1:-:windows:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:6.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:6.0.2:-:mac:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:6.0.2:-:windows:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:6.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:6.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:6.1.0:-:mac:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:6.1.0:-:windows:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:6.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:6.1.1:-:mac:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:6.1.1:-:windows:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:6.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:6.2.0:-:mac:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:6.2.0:-:windows:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:6.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:6.3.0:-:mac:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:6.3.0:-:windows:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:6.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:6.4.0:-:mac:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:6.4.0:-:windows:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:6.5:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:6.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:6.5.0:-:mac:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:6.5.0:-:windows:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:6.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:6.5.1:-:mac:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:6.5.1:-:windows:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:6.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:6.5.2:-:mac:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:6.5.2:-:windows:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.0:*:windows:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.0:-:windows:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.0.0:-:mac:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.0.0:-:windows:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.0.1:*:windows:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.0.1:-:mac:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.0.1:-:windows:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.0.2:*:windows:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.0.2:-:mac:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.0.2:-:windows:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.0.3:-:mac:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.0.3:-:windows:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.0.4:-:mac:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.0.4:-:windows:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.1.0:-:mac:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.1.0:-:windows:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.1.1:-:mac:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.1.1:-:windows:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.1.2:-:mac:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.1.2:-:windows:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.1.3:-:mac:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.1.3:-:windows:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.1.4:-:mac:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.1.4:-:windows:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.1.5:-:mac:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.1.5:-:windows:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.1.6:-:mac:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.1.6:-:windows:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.2:*:vista:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.2.0:-:mac:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.2.0:-:windows:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.2.1:-:mac:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.2.1:-:windows:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.3:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.3.0:-:mac:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.3.0:-:windows:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.3.1:-:mac:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.3.1:-:windows:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.3.1.70:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.4:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.4.0:-:mac:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.4.0:-:windows:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.4.1:-:mac:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.4.1:-:windows:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.4.5:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.4.5:-:mac:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.4.5:-:windows:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.5:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.5.0:-:mac:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.5.0:-:windows:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.5.5:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.5.5:-:mac:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.5.5:-:windows:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.6.0:*:*:*:*:*:*:*" ]
null
null
null
9.3
null
CVE-2006-3959
SQL injection vulnerability in protect.php in X-Scripts X-Protection 1.10, with magic_quotes_gpc disabled, allows remote attackers to execute arbitrary SQL commands via the (1) username and (2) password parameter.
[ "cpe:2.3:a:x-scripts:x-statistics:1.10:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
GHSA-h733-wxxx-34v2
Adobe Experience Manager versions 6.5 and earlier have a cross-site scripting (dom-based) vulnerability. Successful exploitation could lead to arbitrary javascript execution in the browser.
[]
null
null
null
null
null
CVE-2017-10699
avcodec 2.2.x, as used in VideoLAN VLC media player 2.2.7-x before 2017-06-29, allows out-of-bounds heap memory write due to calling memcpy() with a wrong size, leading to a denial of service (application crash) or possibly code execution.
[ "cpe:2.3:a:videolan:vlc_media_player:2.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc_media_player:2.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc_media_player:2.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc_media_player:2.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc_media_player:2.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc_media_player:2.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc_media_player:2.2.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc_media_player:2.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc_media_player:2.2.7:*:*:*:*:*:*:*" ]
null
null
9.8
7.5
null
GHSA-rm8v-mxj3-5rmq
github.com/lestrrat-go/jwx vulnerable to Potential Padding Oracle Attack
SummaryDecrypting AES-CBC encrypted JWE has Potential Padding Oracle Attack Vulnerability.DetailsOn [v2.0.10](https://github.com/lestrrat-go/jwx/releases/tag/v2.0.10), decrypting AES-CBC encrypted JWE may return an error "failed to generate plaintext from decrypted blocks: invalid padding":https://github.com/lestrrat-go/jwx/blob/8840ffd4afc5839f591ff0e9ba9034af52b1643e/jwe/internal/aescbc/aescbc.go#L210-L213Reporting padding error causes [Padding Oracle Attack](https://en.wikipedia.org/wiki/Padding_oracle_attack) Vulnerability. RFC 7516 JSON Web Encryption (JWE) says that we **MUST NOT** do this.11.5. Timing Attacks To mitigate the attacks described in RFC 3218 [RFC3218], the recipient MUST NOT distinguish between format, padding, and length errors of encrypted keys. It is strongly recommended, in the event of receiving an improperly formatted key, that the recipient substitute a randomly generated CEK and proceed to the next step, to mitigate timing attacks.In addition, the time to remove padding depends on the length of the padding. It may leak the length of the padding by Timing Attacks.https://github.com/lestrrat-go/jwx/blob/796b2a9101cf7e7cb66455e4d97f3c158ee10904/jwe/internal/aescbc/aescbc.go#L33-L66To mitigate Timing Attacks, it MUST be done in constant time.ImpactThe authentication tag is verified, so it is not an immediate attack.
[]
null
null
null
null
null
RHSA-2024:6197
Red Hat Security Advisory: ghostscript security update
ghostscript: format string injection leads to shell command execution (SAFER bypass) ghostscript: path traversal and command execution due to path reduction ghostscript: path traversal to arbitrary files if the current directory is in the permitted paths
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
6.8
null
null
null
GHSA-jgff-87j3-r73h
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in pozzad Global Translator allows Stored XSS. This issue affects Global Translator: from n/a through 2.0.2.
[]
null
5.9
null
null
null
CVE-2009-4180
Stack-based buffer overflow in snmpviewer.exe in HP OpenView Network Node Manager (OV NNM) 7.01, 7.51, and 7.53 allows remote attackers to execute arbitrary code via a long HTTP Host header.
[ "cpe:2.3:a:hp:openview_network_node_manager:7.0.1:*:hp_ux:*:*:*:*:*", "cpe:2.3:a:hp:openview_network_node_manager:7.0.1:*:linux:*:*:*:*:*", "cpe:2.3:a:hp:openview_network_node_manager:7.0.1:*:solaris:*:*:*:*:*", "cpe:2.3:a:hp:openview_network_node_manager:7.0.1:*:windows:*:*:*:*:*", "cpe:2.3:a:hp:openview_network_node_manager:7.51:-:hp-ux:*:*:*:*:*", "cpe:2.3:a:hp:openview_network_node_manager:7.51:-:linux:*:*:*:*:*", "cpe:2.3:a:hp:openview_network_node_manager:7.51:-:solaris:*:*:*:*:*", "cpe:2.3:a:hp:openview_network_node_manager:7.51:-:windows:*:*:*:*:*", "cpe:2.3:a:hp:openview_network_node_manager:7.53:-:hp-ux:*:*:*:*:*", "cpe:2.3:a:hp:openview_network_node_manager:7.53:-:linux:*:*:*:*:*", "cpe:2.3:a:hp:openview_network_node_manager:7.53:-:solaris:*:*:*:*:*", "cpe:2.3:a:hp:openview_network_node_manager:7.53:-:windows:*:*:*:*:*" ]
null
null
null
10
null
GHSA-7v79-m7r5-h737
The AppCacheUpdateJob::URLFetcher::OnResponseStarted function in content/browser/appcache/appcache_update_job.cc in Google Chrome before 40.0.2214.91 proceeds with AppCache caching for SSL sessions even if there is an X.509 certificate error, which allows man-in-the-middle attackers to spoof HTML5 application content via a crafted certificate.
[]
null
null
null
null
null
GHSA-vghf-7644-rgvm
MSFM before 2025.01.01 was discovered to contain a SQL injection vulnerability via the s_name parameter at table/list.
[]
null
7.5
null
null
null
CVE-2015-1449
Buffer overflow in the integrated web server on Siemens Ruggedcom WIN51xx devices with firmware before SS4.4.4624.35, WIN52xx devices with firmware before SS4.4.4624.35, WIN70xx devices with firmware before BS4.4.4621.32, and WIN72xx devices with firmware before BS4.4.4621.32 allows remote attackers to execute arbitrary code via unspecified vectors.
[ "cpe:2.3:o:siemens:ruggedcom_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:ruggedcom_win7000:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:ruggedcom_win7200:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:ruggedcom_win5100:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:ruggedcom_win5200:*:*:*:*:*:*:*:*" ]
null
null
null
10
null
GHSA-pr2f-gqh3-f57w
The Tickera – WordPress Event Ticketing plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 3.5.4.4. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes.
[]
null
7.3
null
null
null
CVE-2018-13084
The mintToken function of a smart contract implementation for Good Time Coin (GTY), an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value.
[ "cpe:2.3:a:goodtimecoin_project:goodtimecoin:-:*:*:*:*:*:*:*" ]
null
7.5
null
5
null
RHSA-2008:0201
Red Hat Security Advisory: redhat-ds-admin security update
Server: shell command injection in CGI replication monitor Server: unrestricted access to CGI scripts
[ "cpe:/a:redhat:directory_server:8::el4", "cpe:/a:redhat:directory_server:8::el5" ]
null
null
null
null
null
RHSA-2025:15057
Red Hat Security Advisory: postgresql:13 security update
postgresql: PostgreSQL code execution in restore operation postgresql: PostgreSQL executes arbitrary code in restore operation
[ "cpe:/a:redhat:rhel_aus:8.4::appstream" ]
null
8.8
null
null
null
CVE-2021-30139
In Alpine Linux apk-tools before 2.12.5, the tarball parser allows a buffer overflow and crash.
[ "cpe:2.3:o:alpinelinux:apk-tools:*:*:*:*:*:*:*:*" ]
null
7.5
null
5
null
CVE-2023-2712
Malicious File Upload vulnerability in "Rental Module" developed by third-party for Ideasoft's E-commerce Platform.
Unrestricted Upload of File with Dangerous Type vulnerability in "Rental Module" developed by third-party for Ideasoft's E-commerce Platform allows Command Injection, Using Malicious Files, Upload a Web Shell to a Web Server.This issue affects Rental Module: before 23.05.15.
[ "cpe:2.3:a:rental_module_project:rental_module:*:*:*:*:*:*:*:*" ]
null
9.8
null
null
null
GHSA-h93v-m49q-355g
Pegasus e-mail client 3.0 and earlier uses weak encryption to store POP3 passwords in the pmail.ini file, which allows local users to easily decrypt the passwords and read e-mail.
[]
null
null
null
null
null
GHSA-5j7g-2499-22jg
The xo-security plugin before 1.5.3 for WordPress has XSS.
[]
null
null
6.1
null
null
GHSA-9gm2-7mpc-rwc6
Remote Code Execution in the following products Hybrid Cloud Management Containerized Suite HCM2017.11, HCM2018.02, HCM2018.05, Operations Bridge Containerized Suite 2017.11, 2018.02, 2018.05, Data Center Automation Containerized Suite 2017.01 until 2018.05, Service Management Automation Suite 2017.11, 2018.02, 2018.05, Service Virtualization (SV) with floating licenses using Any version using APLS older than 10.7, Unified Functional Testing (UFT) with floating licenses using Any version using APLS older than 10.7, Network Virtualization (NV) with floating licenses using Any version using APLS older than 10.7 and Network Operations Management (NOM) Suite CDF 2017.11, 2018.02, 2018.05 will allow Remote Code Execution.
[]
null
null
9.8
null
null
GHSA-65p6-f2x3-5fgg
A Microsoft ActiveX control allows a remote attacker to execute a malicious cabinet file via an attachment and an embedded script in an HTML mail, aka the "Active Setup Control" vulnerability.
[]
null
null
null
null
null
CVE-2023-25949
Uncontrolled resource consumption in some Intel(R) Aptio* V UEFI Firmware Integrator Tools may allow an authenticated user to potentially enable denial of service via local access.
[ "cpe:2.3:a:intel:aptio_v_uefi_firmware_integrator_tools:5.27.03.0003:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "cpe:2.3:a:intel:aptio_v_uefi_firmware_integrator_tools:5.27.06.0017:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*" ]
null
5.5
null
null
null
CVE-2008-2788
Cross-site scripting (XSS) vulnerability in index.php in OpenDocMan 1.2.5 allows remote attackers to inject arbitrary web script or HTML via the redirection parameter.
[ "cpe:2.3:a:opendocman:opendocman:1.2.5:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
GHSA-crjg-m2r7-8q93
An XSS issue was discovered in SEMCMS 3.4 via admin/SEMCMS_Menu.php?lgid=1 during editing.
[]
null
null
4.8
null
null
GHSA-hj8g-f5gh-vqmq
NEXTU FLETA AX1500 WIFI6 Router v1.0.3 was discovered to contain a stack overflow via the url parameter at /boafrm/formFilter. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request.
[]
null
7.3
null
null
null
CVE-2019-19912
In Intland codeBeamer ALM 9.5 and earlier, a cross-site scripting (XSS) vulnerability in the Upload Flash File feature allows authenticated remote attackers to inject arbitrary scripts via an active script embedded in an SWF file.
[ "cpe:2.3:a:intland:codebeamer:*:*:*:*:*:*:*:*" ]
null
4.8
null
3.5
null
CVE-2020-1299
A remote code execution vulnerability exists in Microsoft Windows that could allow remote code execution if a .LNK file is processed.An attacker who successfully exploited this vulnerability could gain the same user rights as the local user, aka 'LNK Remote Code Execution Vulnerability'.
[ "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*" ]
null
8.8
null
9.3
null
GHSA-rprc-6487-2q3v
In the Linux kernel, the following vulnerability has been resolved:net/smc: fix lacks of icsk_syn_mss with IPPROTO_SMCEric report a panic on IPPROTO_SMC, and give the facts that when INET_PROTOSW_ICSK was set, icsk->icsk_sync_mss must be set too.Bug: Unable to handle kernel NULL pointer dereference at virtual address 0000000000000000 Mem abort info: ESR = 0x0000000086000005 EC = 0x21: IABT (current EL), IL = 32 bits SET = 0, FnV = 0 EA = 0, S1PTW = 0 FSC = 0x05: level 1 translation fault user pgtable: 4k pages, 48-bit VAs, pgdp=00000001195d1000 [0000000000000000] pgd=0800000109c46003, p4d=0800000109c46003, pud=0000000000000000 Internal error: Oops: 0000000086000005 [#1] PREEMPT SMP Modules linked in: CPU: 1 UID: 0 PID: 8037 Comm: syz.3.265 Not tainted 6.11.0-rc7-syzkaller-g5f5673607153 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : 0x0 lr : cipso_v4_sock_setattr+0x2a8/0x3c0 net/ipv4/cipso_ipv4.c:1910 sp : ffff80009b887a90 x29: ffff80009b887aa0 x28: ffff80008db94050 x27: 0000000000000000 x26: 1fffe0001aa6f5b3 x25: dfff800000000000 x24: ffff0000db75da00 x23: 0000000000000000 x22: ffff0000d8b78518 x21: 0000000000000000 x20: ffff0000d537ad80 x19: ffff0000d8b78000 x18: 1fffe000366d79ee x17: ffff8000800614a8 x16: ffff800080569b84 x15: 0000000000000001 x14: 000000008b336894 x13: 00000000cd96feaa x12: 0000000000000003 x11: 0000000000040000 x10: 00000000000020a3 x9 : 1fffe0001b16f0f1 x8 : 0000000000000000 x7 : 0000000000000000 x6 : 000000000000003f x5 : 0000000000000040 x4 : 0000000000000001 x3 : 0000000000000000 x2 : 0000000000000002 x1 : 0000000000000000 x0 : ffff0000d8b78000 Call trace: 0x0 netlbl_sock_setattr+0x2e4/0x338 net/netlabel/netlabel_kapi.c:1000 smack_netlbl_add+0xa4/0x154 security/smack/smack_lsm.c:2593 smack_socket_post_create+0xa8/0x14c security/smack/smack_lsm.c:2973 security_socket_post_create+0x94/0xd4 security/security.c:4425 __sock_create+0x4c8/0x884 net/socket.c:1587 sock_create net/socket.c:1622 [inline] __sys_socket_create net/socket.c:1659 [inline] __sys_socket+0x134/0x340 net/socket.c:1706 __do_sys_socket net/socket.c:1720 [inline] __se_sys_socket net/socket.c:1718 [inline] __arm64_sys_socket+0x7c/0x94 net/socket.c:1718 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151 el0_svc+0x54/0x168 arch/arm64/kernel/entry-common.c:712 el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:730 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:598 Code: ???????? ???????? ???????? ???????? (????????) ---[ end trace 0000000000000000 ]---This patch add a toy implementation that performs a simple return to prevent such panic. This is because MSS can be set in sock_create_kern or smc_setsockopt, similar to how it's done in AF_SMC. However, for AF_SMC, there is currently no way to synchronize MSS within __sys_connect_file. This toy implementation lays the groundwork for us to support such feature for IPPROTO_SMC in the future.
[]
null
5.5
null
null
null
GHSA-w6mc-6grg-6x9m
A flaw was found in djvulibre-3.5.28 and earlier. An integer overflow in function render() in tools/ddjvu via crafted djvu file may lead to application crash and other consequences.
[]
null
7.8
null
null
null
GHSA-x6xx-q6w3-8m4c
A vulnerability was found in TOTOLINK AC1200 T8 4.1.5cu.862_B20230228. It has been rated as critical. This issue affects the function exportOvpn. The manipulation leads to buffer overflow. The attack may be initiated remotely. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
[]
8.7
8.8
null
null
null
GHSA-wh65-53hg-mxpv
In the Linux kernel, the following vulnerability has been resolved:Revert "fs/ntfs3: Replace inode_trylock with inode_lock"This reverts commit 69505fe98f198ee813898cbcaf6770949636430b.Initially, conditional lock acquisition was removed to fix an xfstest bug that was observed during internal testing. The deadlock reported by syzbot is resolved by reintroducing conditional acquisition. The xfstest bug no longer occurs on kernel version 6.16-rc1 during internal testing. I assume that changes in other modules may have contributed to this.
[]
null
null
null
null
null
CVE-2023-48129
An issue in kimono-oldnew mini-app on Line v13.6.1 allows attackers to send crafted malicious notifications via leakage of the channel access token.
[ "cpe:2.3:a:linecorp:line:13.6.1:*:*:*:*:*:*:*" ]
null
5.4
null
null
null
CVE-2021-40420
A use-after-free vulnerability exists in the JavaScript engine of Foxit Software’s PDF Reader, version 11.1.0.52543. A specially-crafted PDF document can trigger the reuse of previously freed memory, which can lead to arbitrary code execution. An attacker needs to trick the user to open the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially-crafted, malicious site if the browser plugin extension is enabled.
[ "cpe:2.3:a:foxit:pdf_reader:11.1.0.52543:*:*:*:*:*:*:*" ]
null
null
8.8
null
null
CVE-2022-49136
Bluetooth: hci_sync: Fix queuing commands when HCI_UNREGISTER is set
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_sync: Fix queuing commands when HCI_UNREGISTER is set hci_cmd_sync_queue shall return an error if HCI_UNREGISTER flag has been set as that means hci_unregister_dev has been called so it will likely cause a uaf after the timeout as the hdev will be freed.
[]
null
7.8
null
null
null
GHSA-4h8q-jm55-4xg5
BigFix Web Reports authorized users may perform HTML injection for the email administrative configuration page.
[]
null
5.4
null
null
null
GHSA-4rvp-mxg2-gwpf
Race condition in Google Chrome before 19.0.1084.46 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to worker processes.
[]
null
null
null
null
null
CVE-2012-0573
Unspecified vulnerability in the Oracle FLEXCUBE Universal Banking component in Oracle Financial Services Software 10.0.0 through 10.5.0 and 11.0.0 through 11.4.0 allows remote authenticated users to affect confidentiality and integrity via unknown vectors related to Core.
[ "cpe:2.3:a:oracle:financial_services_software:10.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:financial_services_software:10.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:financial_services_software:11.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:financial_services_software:11.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:financial_services_software:11.4.0:*:*:*:*:*:*:*" ]
null
null
null
4.9
null
GHSA-xx5x-v9g7-78fj
IML32.dll in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2111 and CVE-2011-2115.
[]
null
null
null
null
null
GHSA-9vc7-fvqc-rx92
NVIDIA Windows GPU Display Driver, all versions, contains a vulnerability in NVIDIA Control Panel in which it incorrectly loads Windows system DLLs without validating the path or signature (also known as a binary planting or DLL preloading attack), which may lead to denial of service or information disclosure through code execution. The attacker requires local system access.
[]
null
null
null
null
null
CVE-2025-7683
LatestCheckins <= 1 - Cross-Site Request Forgery to Stored Cross-Site Scripting
The LatestCheckins plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1. This is due to missing or incorrect nonce validation on the 'LatestCheckins' page. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
[]
null
6.1
null
null
null
GHSA-rfj5-j343-wwwp
Internet Explorer 5.01 SP4 up to 6 on various Windows operating systems, including IE 6.0.2900.2180 on Windows XP, allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a web page with embedded CLSIDs that reference certain COM objects that are not ActiveX controls, as demonstrated using the JVIEW Profiler (Javaprxy.dll). NOTE: the researcher says that the vendor could not reproduce this problem.
[]
null
null
null
null
null
CVE-2018-13472
The mint function of a smart contract implementation for CloutToken, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value.
[ "cpe:2.3:a:clouttoken_project:clouttoken:-:*:*:*:*:*:*:*" ]
null
null
7.5
5
null
CVE-2014-3170
extensions/common/url_pattern.cc in Google Chrome before 37.0.2062.94 does not prevent use of a '\0' character in a host name, which allows remote attackers to spoof the extension permission dialog by relying on truncation after this character.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.2:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.3:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.4:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.5:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.6:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.7:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.8:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.9:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.10:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.11:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.12:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.13:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.14:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.15:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.16:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.17:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.18:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.19:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.20:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.21:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.22:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.23:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.24:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.25:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.26:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.27:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.28:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.29:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.30:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.31:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.32:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.33:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.34:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.35:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.36:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.37:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.39:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.43:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.44:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.45:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.46:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.47:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.48:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.49:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.50:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.51:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.52:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.53:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.54:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.55:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.56:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.57:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.58:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.59:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.60:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.61:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.62:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.63:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.64:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.65:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.66:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.67:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.68:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.69:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.70:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.71:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.72:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.73:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.74:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.75:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.76:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.77:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.78:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.80:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.81:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.89:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.90:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.91:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.92:*:*:*:*:*:*:*" ]
null
null
null
6.4
null
RHSA-2024:4641
Red Hat Security Advisory: libndp security update
libndp: buffer overflow in route information length field
[ "cpe:/o:redhat:rhel_eus:8.8::baseos" ]
null
8.1
null
null
null
CVE-2019-5522
VMware Tools for Windows update addresses an out of bounds read vulnerability in vm3dmp driver which is installed with vmtools in Windows guest machines. This issue is present in versions 10.2.x and 10.3.x prior to 10.3.10. A local attacker with non-administrative access to a Windows guest with VMware Tools installed may be able to leak kernel information or create a denial of service attack on the same Windows guest machine.
[ "cpe:2.3:a:vmware:tools:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
null
7.1
3.6
null
CVE-2021-31005
Description: A logic issue was addressed with improved state management. This issue is fixed in iOS 15 and iPadOS 15, macOS Monterey 12.0.1. Turning off "Block all remote content" may not apply to all remote content types.
[ "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:12.0.0:*:*:*:*:*:*:*" ]
null
7.5
null
5
null
RHSA-2020:1021
Red Hat Security Advisory: GNOME security, bug fix, and enhancement update
gnome-shell: partial lock screen bypass
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
4.8
null
null
GHSA-rh3m-2p8j-6cf7
The issue was addressed with improved restriction of data container access. This issue is fixed in macOS Sonoma 14.7.5, iOS 18.4 and iPadOS 18.4, tvOS 18.4, macOS Sequoia 15.4. An app may be able to access sensitive user data.
[]
null
9.8
null
null
null
CVE-2021-28571
Adobe After Effects improper neutralization of special elements could lead to remote code execution
Adobe After Effects version 18.1 (and earlier) is affected by a potential Command injection vulnerability when chained with a development and debugging tool for JavaScript scripts. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[ "cpe:2.3:a:adobe:after_effects:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
8.3
null
null
null
GHSA-fx2r-qhmq-3jjp
The read_multipart function in cgi.rb in Ruby before 1.8.5-p2 does not properly detect boundaries in MIME multipart content, which allows remote attackers to cause a denial of service (infinite loop) via crafted HTTP requests, a different issue than CVE-2006-5467.
[]
null
null
null
null
null
GHSA-p34p-8w3x-9vqr
Billing Software v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'itemnameid' parameter of the material_bill.php?action=itemRelation resource does not validate the characters received and they are sent unfiltered to the database.
[]
null
9.8
null
null
null
GHSA-f57v-gppg-633m
Cross-Site Request Forgery (CSRF) vulnerability in a1post A1POST.BG Shipping for Woo allows Privilege Escalation. This issue affects A1POST.BG Shipping for Woo: from n/a through 1.5.1.
[]
null
8.8
null
null
null
CVE-2019-9557
Ability Mail Server 4.2.6 has Persistent Cross Site Scripting (XSS) via the body e-mail body. To exploit the vulnerability, the victim must open an email with malicious Javascript inserted into the body of the email as an iframe.
[ "cpe:2.3:a:codecrafters:ability_mail_server:4.2.6:*:*:*:*:*:*:*" ]
null
null
6.1
4.3
null
GHSA-mf66-hg2x-cq3r
Cross-site scripting vulnerability in Cybozu Garoon 4.0.0 to 4.10.1 allows remote attackers to inject arbitrary web script or HTML via the application 'Scheduler'.
[]
null
null
null
null
null
GHSA-cq56-j359-2484
Xenstore: Cooperating guests can create arbitrary numbers of nodes T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Since the fix of XSA-322 any Xenstore node owned by a removed domain will be modified to be owned by Dom0. This will allow two malicious guests working together to create an arbitrary number of Xenstore nodes. This is possible by domain A letting domain B write into domain A's local Xenstore tree. Domain B can then create many nodes and reboot. The nodes created by domain B will now be owned by Dom0. By repeating this process over and over again an arbitrary number of nodes can be created, as Dom0's number of nodes isn't limited by Xenstore quota.
[]
null
5.5
null
null
null
GHSA-f79g-9mrm-w496
In versions 14.1.0-14.1.3 and 13.1.0-13.1.3.4, a BIG-IP APM virtual server processing PingAccess requests may lead to a restart of the Traffic Management Microkernel (TMM) process.
[]
null
null
null
null
null
GHSA-5xj2-2rf5-4f67
Heap-based buffer overflow in Apple QuickTime before 7.1 allows remote attackers to execute arbitrary code via a H.264 (M4V) video format file with a certain modified size value.
[]
null
null
null
null
null
GHSA-hf3p-wrj3-r34r
Static code injection vulnerability in admin/admin_configuration.php in Monalbum 0.8.7 allows remote authenticated users to inject arbitrary PHP code into the conf/config.inc.php file via the (1) gadm_pass, (2) gadm_user, (3) gcfgHote, (4) gcfgPass, (5) gcfgUser, (6) gclassement_rep, (7) gcontour, (8) gfond, (9) ggd_version, (10) ghome, (11) ghor, (12) gimg_copyright, (13) glangage, (14) gmenu_visible, (15) gmini_hasard, (16) gordre_rep, (17) gpage, (18) gracine, (19) grech_inactive, (20) grep_mini, (21) grepertoire, (22) gsite, (23) gslide, (24) gtitre, (25) guse_copyright, (26) gversion, (27) gvert, or (28) gcfgBase parameter.
[]
null
null
null
null
null
CVE-2019-12836
The Bobronix JEditor editor before 3.0.6 for Jira allows an attacker to add a URL/Link (to an existing issue) that can cause forgery of a request to an out-of-origin domain. This in turn may allow for a forged request that can be invoked in the context of an authenticated user, leading to stealing of session tokens and account takeover.
[ "cpe:2.3:a:bobronix:jeditor:*:*:*:*:*:*:*:*" ]
null
null
8.8
6.8
null
CVE-2020-2747
Vulnerability in the Oracle Access Manager product of Oracle Fusion Middleware (component: SSO Engine). Supported versions that are affected are 11.1.2.3.0 and 12.2.1.3.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Access Manager. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Access Manager, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Access Manager accessible data as well as unauthorized read access to a subset of Oracle Access Manager accessible data. CVSS 3.0 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N).
[ "cpe:2.3:a:oracle:access_manager:11.1.2.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:access_manager:12.2.1.3.0:*:*:*:*:*:*:*" ]
null
null
5.4
null
null
CVE-2024-9879
Website File Changes < 2.1.1 - Authenticated SQL Injection
The Melapress File Monitor WordPress plugin before 2.1.1 does not sanitize and escape a parameter before using it in a SQL statement, allowing admins to perform SQL injection attacks
[]
null
5.4
null
null
null
CVE-2017-1509
IBM Jazz Foundation products could allow an authenticated user to obtain sensitive information from a stack trace that could be used to aid future attacks. IBM X-Force ID: 129719.
[ "cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:*:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_team_concert:*:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_team_concert:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_doors_next_generation:*:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_doors_next_generation:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_quality_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_quality_manager:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_rhapsody_design_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_rhapsody_design_manager:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_software_architect_design_manager:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_software_architect_design_manager:6.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_software_architect_design_manager:6.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_engineering_lifecycle_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_engineering_lifecycle_manager:5.0.1:*:*:*:*:*:*:*" ]
null
null
4.3
null
null