id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
189k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
patch_commit_url
stringlengths
38
232
CVE-2019-20627
AutoUpdater.cs in AutoUpdater.NET before 1.5.8 allows XXE.
[ "cpe:2.3:a:rbsoft:autoupdater.net:*:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
null
CVE-2024-30528
WordPress Spiffy Calendar plugin <= 4.9.10 - Broken Access Control vulnerability
Missing Authorization vulnerability in Spiffy Plugins Spiffy Calendar.This issue affects Spiffy Calendar: from n/a through 4.9.10.
[ "cpe:2.3:a:spiffyplugins:spiffy_calendar:*:*:*:*:*:wordpress:*:*" ]
null
5.4
null
null
null
GHSA-5mwq-xh9g-83gq
A stored cross-site scripting (XSS) vulnerability in /index.php?page=category_list of Online Jewelry Shop v1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Category Name parameter.
[]
null
5.4
null
null
null
GHSA-v5gf-r78h-55q6
document-merge-service vulnerable to Remote Code Execution via Server-Side Template Injection
ImpactA remote code execution (RCE) via server-side template injection (SSTI) allows for user supplied code to be executed in the server's context where it is executed as the document-merge-server user with the UID 901 thus giving an attacker considerable control over the container.PatchesIt has been patched in v6.5.2Referenceshttps://book.hacktricks.xyz/pentesting-web/ssti-server-side-template-injection/jinja2-sstiPOCAdd the following to a document, upload and render it:The index might be different, so to debug this first render a template with `{{ PLACEHOLDER.__class__.__mro__[1].__subclasses__() }}` and then get the index of `subprocess.Popen` and replace 202 with that.![image](https://github.com/adfinis/document-merge-service/assets/110528300/0a1dfcff-2eba-40f1-af9c-08c8ec2bc0a1)
[]
null
9.1
null
null
null
GHSA-qvjx-h46h-h827
Cross-site scripting (XSS) vulnerability in Junos Space before 15.2R2 allows remote attackers to steal sensitive information or perform certain administrative actions.
[]
null
null
6.1
null
null
CVE-2006-2844
Multiple PHP remote file inclusion vulnerabilities in Redaxo 3.0 allow remote attackers to execute arbitrary PHP code via a URL in the REX[INCLUDE_PATH] parameter to (1) simple_user/pages/index.inc.php and (2) stats/pages/index.inc.php.
[ "cpe:2.3:a:redaxo:redaxo:3.0:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
GHSA-qj9v-7hv9-cw8w
SQL injection vulnerability in the Tiny Market (hm_tinymarket) extension 0.5.4 and earlier for TYPO3 allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
[]
null
null
null
null
null
CVE-2023-31612
An issue in the dfe_qexp_list component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
[ "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*" ]
null
7.5
null
null
null
CVE-2017-17290
The Light Directory Access Protocol (LDAP) clients of Huawei TE60 with software V600R006C00, ViewPoint 9030 with software V100R011C02, V100R011C03 have a resource management errors vulnerability. An unauthenticated, remote attacker may make the LDAP server not respond to the client's request by controlling the LDAP server. Due to improper management of LDAP connection resource, a successful exploit may cause the connection resource exhausted of the LDAP client.
[ "cpe:2.3:o:huawei:te60_firmware:v600r006c00:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:te60:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c02:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:viewpoint_9030:-:*:*:*:*:*:*:*" ]
null
null
7.5
5
null
CVE-2018-12678
Portainer before 1.18.0 supports unauthenticated requests to the websocket endpoint with an unvalidated id query parameter for the /websocket/exec endpoint, which allows remote attackers to bypass intended access restrictions or conduct SSRF attacks.
[ "cpe:2.3:a:portainer:portainer:*:*:*:*:*:*:*:*" ]
null
null
9.8
7.5
null
CVE-2025-29523
D-Link DSL-7740C with firmware DSL7740C.V6.TR069.20211230 was discovered to contain a command injection vulnerability via the ping6 function.
[]
null
7.2
null
null
null
CVE-2023-36033
Windows DWM Core Library Elevation of Privilege Vulnerability
Windows DWM Core Library Elevation of Privilege Vulnerability
[ "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*" ]
null
7.8
null
null
null
GHSA-9cr9-j2r9-7m87
Cross-site scripting vulnerability in ELECOM LAN routers (WRH-733GBK firmware v1.02.9 and prior and WRH-733GWH firmware v1.02.9 and prior) allows a remote authenticated attacker to inject an arbitrary script via unspecified vectors.
[]
null
null
null
null
null
GHSA-vvg7-3vpg-wq97
Amazon FreeRTOS up to and including v1.4.8 for AWS lacks length checking in prvProcessReceivedPublish, resulting in leakage of arbitrary memory contents on a device to an attacker. An attacker sends a malformed MQTT publish packet, and waits for an MQTTACK packet containing the leaked data.
[]
null
7.5
null
null
null
GHSA-v567-j6g5-phvx
During Ion compilation, a Garbage Collection could have resulted in a use-after-free condition, allowing an attacker to write two NUL bytes, and cause a potentially exploitable crash. This vulnerability affects Firefox < 118, Firefox ESR < 115.3, and Thunderbird < 115.3.
[]
null
6.5
null
null
null
GHSA-fr94-f6f6-4wxj
A vulnerability was found in SourceCodester Online Food Ordering System 2.0 and classified as critical. Affected by this issue is some unknown functionality of the file /fos/admin/ajax.php?action=save_settings of the component POST Request Handler. The manipulation leads to improper access controls. The attack may be launched remotely. VDB-223214 is the identifier assigned to this vulnerability.
[]
null
9.8
null
null
null
GHSA-f5ch-pqm5-5632
IBM InfoSphere Information Server could allow an authenticated user to consume file space resources due to unrestricted file uploads. IBM X-Force ID: 298279.
[]
null
6.5
null
null
null
GHSA-rg97-cq96-v6fx
The files function in the administration section in CS-Cart 4.6.2 and earlier allows attackers to execute arbitrary PHP code via vectors involving a custom page.
[]
null
null
7.2
null
null
CVE-2013-5848
Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, and JavaFX 2.2.40 and earlier allows remote attackers to affect integrity via unknown vectors related to Deployment.
[ "cpe:2.3:a:oracle:jdk:*:update40:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update1:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update10:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update11:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update13:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update15:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update17:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update2:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update21:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update25:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update3:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update4:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update5:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update6:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update7:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update9:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:*:update40:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update1:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update10:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update11:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update13:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update15:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update17:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update2:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update21:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update25:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update3:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update4:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update5:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update6:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update7:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update9:*:*:*:*:*:*", "cpe:2.3:a:oracle:javafx:*:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:javafx:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:javafx:2.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:javafx:2.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:javafx:2.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:javafx:2.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:javafx:2.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:javafx:2.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:javafx:2.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:javafx:2.2.7:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:javafx:2.2.21:*:*:*:*:*:*:*" ]
null
null
null
5
null
GHSA-v9q2-wpg8-f6j6
Missing Authorization vulnerability in bPlugins Tiktok Feed allows Accessing Functionality Not Properly Constrained by ACLs. This issue affects Tiktok Feed: from n/a through 1.0.21.
[]
null
7.1
null
null
null
CVE-2010-0610
Multiple SQL injection vulnerabilities in the Photoblog (com_photoblog) component for Joomla! allow remote attackers to execute arbitrary SQL commands via the blog parameter in an images action to index.php. NOTE: a separate vector for the id parameter to detail.php may also exist.
[ "cpe:2.3:a:webguerilla:com_photoblog:*:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:1.5.0:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2021-21487
SAP Payment Engine version 500, does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges.
[ "cpe:2.3:a:sap:payment_engine:500:*:*:*:*:*:*:*" ]
null
null
6.8
null
null
GHSA-mpr3-94w6-rc26
Dell BSAFE Crypto-C Micro Edition, versions before 4.1.5, and Dell BSAFE Micro Edition Suite, versions before 4.5.2, contain an Observable Timing Discrepancy Vulnerability.
[]
null
9.8
null
null
null
CVE-2016-7282
Cross-site scripting (XSS) vulnerability in Microsoft Internet Explorer 9 through 11 and Microsoft Edge allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka "Microsoft Browser Information Disclosure Vulnerability."
[ "cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*" ]
null
null
6.1
4.3
null
GHSA-5mrw-645j-x2vj
SQL injection vulnerability in system/index.php in Audins Audiens 3.3 allows remote attackers to execute arbitrary SQL commands via the PHPSESSID cookie. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
[]
null
null
null
null
null
GHSA-v5c4-vv55-556f
EyouCMS V1.5.8-UTF8-SP1 is vulnerable to Cross Site Request Forgery (CSRF) via the background, column management function and add.
[]
null
8.8
null
null
null
GHSA-5j5p-cr5c-763j
An issue was discovered in the pixxio (aka pixx.io integration or DAM) extension before 1.0.6 for TYPO3. The Access Control in the bundled media browser is broken, which allows an unauthenticated attacker to perform requests to the pixx.io API for the configured API user. This allows an attacker to download various media files from the DAM system.
[]
null
8.8
null
null
null
GHSA-g3rq-g295-4j3m
Regular Expression Denial of Service (ReDoS) in Jinja2
This affects the package jinja2 from 0.0.0 and before 2.11.3. The ReDOS vulnerability of the regex is mainly due to the sub-pattern [a-zA-Z0-9._-]+.[a-zA-Z0-9._-]+ This issue can be mitigated by Markdown to format user content instead of the urlize filter, or by implementing request timeouts and limiting process memory.
[]
6.9
5.3
null
null
null
GHSA-fv6q-cpfx-7rj8
IBM Cloud Orchestrator and IBM Cloud Orchestrator Enterprise 2.5 through 2.5.0.9 and 2.4 through 2.4.0.5 stores sensitive information in URL parameters. This may lead to information disclosure if unauthorized parties have access to the URLs via server logs, referrer header or browser history. IBM X-Force ID: 162239
[]
null
6.5
null
null
null
GHSA-46p6-x25q-mhqr
Several Ricoh printers have multiple buffer overflows parsing LPD packets, which allow an attacker to cause a denial of service or code execution via crafted requests to the web server. Affected firmware versions depend on the printer models. One affected congiguration is cpe:2.3:o:ricoh:sp_c250dn_firmware:-:*:*:*:*:*:*:* up to (including) 1.06 running on cpe:2.3:o:ricoh:sp_c250dn:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252dn:-:*:*:*:*:*:*:*. Another affected congiguration is cpe:2.3:o:ricoh:sp_c250sf_firmware:-:*:*:*:*:*:*:* up to (including) 1.12 running on cpe:2.3:o:ricoh:sp_c250sf:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252sf:-:*:*:*:*:*:*:*.
[]
null
null
9.8
null
null
GHSA-m9jp-5r56-gqvq
Multiple cross-site scripting (XSS) vulnerabilities in yorumkaydet.asp in Dersimiz Haber Ekleme Modulu allow remote attackers to inject arbitrary web script or HTML via the (1) yazan, (2) mail, and (3) yorum parameters. NOTE: some of these details are obtained from third party information.
[]
null
null
null
null
null
CVE-2025-7103
BoyunCMS curl Index.php server-side request forgery
A vulnerability was found in BoyunCMS up to 1.4.20. It has been rated as critical. This issue affects some unknown processing of the file /application/pay/controller/Index.php of the component curl. The manipulation leads to server-side request forgery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
[]
5.3
6.3
6.3
6.5
null
CVE-2024-39162
pyspider through 0.3.10 allows /update XSS. NOTE: This vulnerability only affects products that are no longer supported by the maintainer
[]
null
6.1
null
null
null
CVE-2018-13684
The mintToken function of a smart contract implementation for ZIP, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value.
[ "cpe:2.3:a:zip_project:zip:-:*:*:*:*:*:*:*" ]
null
null
7.5
5
null
CVE-2010-3491
The (1) ActiveMatrix Runtime and (2) ActiveMatrix Administrator components in TIBCO ActiveMatrix Service Grid before 2.3.1, ActiveMatrix Service Bus before 2.3.1, ActiveMatrix BusinessWorks Service Engine before 5.8.1, and ActiveMatrix Service Performance Manager before 1.3.2 do not properly handle JMX connections, which allows remote attackers to execute arbitrary code, obtain sensitive information, or cause a denial of service via unspecified vectors.
[ "cpe:2.3:a:tibco:activematrix_businessworks_service_engine:*:*:*:*:*:*:*:*", "cpe:2.3:a:tibco:activematrix_service_bus:*:*:*:*:*:*:*:*", "cpe:2.3:a:tibco:activematrix_service_grid:*:*:*:*:*:*:*:*", "cpe:2.3:a:tibco:activematrix_service_performance_manager:*:*:*:*:*:*:*:*" ]
null
null
null
10
null
GHSA-5qmc-pjcc-q3m7
An issue was discovered in Veritas InfoScale Operations Manager (VIOM) before 7.4.2 Patch 600 and 8.x before 8.0.0 Patch 100. A reflected cross-site scripting (XSS) vulnerability in admin/cgi-bin/listdir.pl allows authenticated remote administrators to inject arbitrary web script or HTML into an HTTP GET parameter (which reflect the user input without sanitization).
[]
null
4.8
null
null
null
CVE-2016-7175
epan/dissectors/packet-qnet6.c in the QNX6 QNET dissector in Wireshark 2.x before 2.0.6 mishandles MAC address data, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet.
[ "cpe:2.3:a:wireshark:wireshark:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:2.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:2.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:2.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:2.0.5:*:*:*:*:*:*:*" ]
null
null
5.9
4.3
null
GHSA-3r4g-mm9v-9r4p
Buffer overflow in the IMAP service for SPA-PRO Mail @Solomon 4.00 allows remote authenticated users to execute arbitrary code via a long CREATE command.
[]
null
null
null
null
null
GHSA-mqxr-gww5-9jhp
Exim through 4.93 has an out-of-bounds read in the SPA authenticator that could result in SPA/NTLM authentication bypass in auths/spa.c and auths/auth-spa.c.
[]
null
7.5
null
null
null
CVE-2022-31176
Grafana Image Renderer leaking files
Grafana Image Renderer is a Grafana backend plugin that handles rendering of panels & dashboards to PNGs using a headless browser (Chromium/Chrome). An internal security review identified an unauthorized file disclosure vulnerability. It is possible for a malicious user to retrieve unauthorized files under some network conditions or via a fake datasource (if user has admin permissions in Grafana). All Grafana installations should be upgraded to version 3.6.1 as soon as possible. As a workaround it is possible to [disable HTTP remote rendering](https://grafana.com/docs/grafana/latest/setup-grafana/configure-grafana/#plugingrafana-image-renderer).
[ "cpe:2.3:a:grafana:grafana-image-renderer:*:*:*:*:*:grafana:*:*" ]
null
8.3
null
null
null
CVE-2014-4199
vm-support 0.88 in VMware Tools, as distributed with VMware Workstation through 10.0.3 and other products, allows local users to write to arbitrary files via a symlink attack on a file in /tmp.
[ "cpe:2.3:a:vmware:tools:*:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:vm-support:0.88:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:workstation:10.0:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:workstation:10.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:workstation:10.0.2:*:*:*:*:*:*:*" ]
null
null
null
6.3
null
CVE-2014-9089
Multiple SQL injection vulnerabilities in view_all_bug_page.php in MantisBT before 1.2.18 allow remote attackers to execute arbitrary SQL commands via the (1) sort or (2) dir parameter to view_all_set.php.
[ "cpe:2.3:o:debian:debian_linux:1.2:*:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2024-37234
WordPress Academy LMS plugin <= 2.0.4 - Open Redirection vulnerability
URL Redirection to Untrusted Site ('Open Redirect') vulnerability in Kodezen Limited Academy LMS.This issue affects Academy LMS: from n/a through 2.0.4.
[]
null
3.5
null
null
null
GHSA-wpgx-q62h-3583
Unspecified vulnerability in the Oracle Forms component in Oracle Application Server 10.1.2.2 and E-Business Suite 12.0.3 allows remote attackers to affect integrity via unknown vectors, aka AS04.
[]
null
null
null
null
null
GHSA-49gg-c8j8-3j2c
Pexip Infinity before 34.1 has Improper Access Control for persons in a waiting room. They can see the conference roster list, and perform certain actions that should not be allowed before they are admitted to the meeting.
[]
null
4.3
null
null
null
GHSA-95g7-fcwr-c2p8
doorGets 7.0 has a sensitive information disclosure vulnerability in /fileman/php/renamefile.php. A remote unauthenticated attacker can exploit this vulnerability to obtain server-sensitive information or make the server unserviceable.
[]
null
null
8.2
null
null
GHSA-wr6h-564j-w633
The Ultimate Addons for Elementor (Formerly Elementor Header & Footer Builder) plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the save_hfe_compatibility_option_callback ()function in all versions up to, and including, 2.4.6. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update the compatibility option setting.
[]
null
4.3
null
null
null
CVE-2014-2129
The SIP inspection engine in Cisco Adaptive Security Appliance (ASA) Software 8.2 before 8.2(5.48), 8.4 before 8.4(6.5), 9.0 before 9.0(3.1), and 9.1 before 9.1(2.5) allows remote attackers to cause a denial of service (memory consumption or device reload) via crafted SIP packets, aka Bug ID CSCuh44052.
[ "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1:*:*:*:*:*:*:*" ]
null
null
null
7.1
null
GHSA-x9cj-35rq-fj52
A remote code execution vulnerability exists in Microsoft PowerPoint 2007 Service Pack 3, Microsoft PowerPoint 2010 Service Pack 2, Microsoft PowerPoint 2013 Service Pack 1, Microsoft PowerPoint 2013 RT Service Pack 1, Microsoft PowerPoint 2016, Microsoft PowerPoint Viewer 2007, Microsoft SharePoint Server 2013 Service Pack 1, Microsoft SharePoint Enterprise Server 2016, Microsoft Office Web Apps 2010 Service Pack 2, and Microsoft Office Compatibility Pack Service Pack 3 when they fail to properly handle objects in memory, aka "PowerPoint Remote Code Execution Vulnerability". This CVE ID is unique from CVE-2017-8743.
[]
null
null
7.8
null
null
RHSA-2024:1454
Red Hat Security Advisory: OpenShift Container Platform 4.13.38 bug fix and security update
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)
[ "cpe:/a:redhat:openshift:4.13::el8", "cpe:/a:redhat:openshift:4.13::el9" ]
null
7.5
null
null
null
CVE-2020-9674
Adobe Bridge versions 10.0.3 and earlier have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution.
[ "cpe:2.3:a:adobe:bridge:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
7.8
null
6.8
null
GHSA-j4vv-mqwg-vrfp
Substance3D - Stager versions 3.0.3 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[]
null
7.8
null
null
null
CVE-2017-10820
Untrusted search path vulnerability in Installer of IP Messenger for Win 4.60 and earlier allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.
[ "cpe:2.3:a:ipa:ip_messenger:*:*:*:*:*:windows:*:*" ]
null
null
7.8
9.3
null
GHSA-r586-r9hc-jwq2
The HGiga OAKlouds mobile portal does not filter special characters of the IPv6 Gateway parameter of the network interface card setting page. Remote attackers can use this vulnerability to perform command injection and execute arbitrary commands in the system without logging in.
[]
null
null
null
null
null
CVE-2023-3643
Boss Mini document file inclusion
A vulnerability was found in Boss Mini 1.4.0 Build 6221. It has been classified as critical. This affects an unknown part of the file boss/servlet/document. The manipulation of the argument path leads to file inclusion. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-233889 was assigned to this vulnerability.
[ "cpe:2.3:o:carel:boss_mini_firmware:1.4.0:build_6221:*:*:*:*:*:*", "cpe:2.3:h:carel:boss_mini:-:*:*:*:*:*:*:*" ]
null
7.3
7.3
7.5
null
GHSA-rx94-fvxc-g9vh
The change password option in the Windows Security interface for Windows 2000 allows attackers to use the option to attempt to change passwords of other users on other systems or identify valid accounts by monitoring error messages, possibly due to a problem in the NetuserChangePassword function.
[]
null
null
null
null
null
CVE-2021-42306
Azure Active Directory Information Disclosure Vulnerability
An information disclosure vulnerability manifests when a user or an application uploads unprotected private key data as part of an authentication certificate keyCredential  on an Azure AD Application or Service Principal (which is not recommended). This vulnerability allows a user or service in the tenant with application read access to read the private key data that was added to the application. Azure AD addressed this vulnerability by preventing disclosure of any private key values added to the application. Microsoft has identified services that could manifest this vulnerability, and steps that customers should take to be protected. Refer to the FAQ section for more information. For more details on this issue, please refer to the MSRC Blog Entry.
[ "cpe:2.3:a:microsoft:azure_active_directory:*:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:azure_active_site_recovery:*:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:azure_automation:*:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:azure_migrate:*:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:azure_automation:-:*:*:*:*:*:*:*" ]
null
8.1
null
null
null
RHSA-2022:1139
Red Hat Security Advisory: httpd security update
httpd: mod_lua: Possible buffer overflow when parsing multipart content httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling
[ "cpe:/o:redhat:rhel_aus:7.3::server" ]
null
8.3
null
null
null
CVE-2021-24357
FooGallery < 2.0.35 - Authenticated Stored Cross-Site Scripting
In the Best Image Gallery & Responsive Photo Gallery – FooGallery WordPress plugin before 2.0.35, the Custom CSS field of each gallery is not properly sanitised or validated before being being output in the page where the gallery is embed, leading to a stored Cross-Site Scripting issue.
[ "cpe:2.3:a:fooplugins:foogallery:*:*:*:*:*:wordpress:*:*" ]
null
5.4
null
3.5
null
GHSA-99gr-qjpq-vqh5
Multiple cross-site scripting (XSS) vulnerabilities in Fujitsu-Siemens WebTransactions 7.0, 7.1, and possibly other versions allow remote attackers to inject arbitrary web script or HTML via vectors associated with (1) a demo application shipped with WebTransactions and possibly (2) an unspecified "dynamic application."
[]
null
null
null
null
null
GHSA-cmj4-q56c-v7p7
SQL injection vulnerability exists in OS4ED openSIS-Classic Version 9.1, specifically in the resetuserinfo.php file. The vulnerability is due to improper input validation of the $username_stn_id parameter, which can be manipulated by an attacker to inject arbitrary SQL commands.
[]
null
9.8
null
null
null
CVE-2020-1009
An elevation of privilege vulnerability exists in the way that the Microsoft Store Install Service handles file operations in protected locations, aka 'Windows Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0934, CVE-2020-0983, CVE-2020-1011, CVE-2020-1015.
[ "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*" ]
null
7.8
null
7.2
null
CVE-2025-34232
Vasion Print (formerly PrinterLogic) Blind SSRF via Lexmark dellCheck.php
Vasion Print (formerly PrinterLogic) Virtual Appliance Host prior to version 25.1.102 and Application prior to version 25.1.1413 (VA/SaaS deployments) contain a blind server-side request forgery (SSRF) vulnerability reachable via the /var/www/app/console_release/lexmark/dellCheck.php script that can be exploited by an unauthenticated user. When a printer is registered, the software stores the printer’s host name in the variable $printer_vo->str_host_address. The code later builds a URL like 'http://<host‑address>:80/DevMgmt/DiscoveryTree.xml' and sends the request with curl. No validation, whitelist, or private‑network filtering is performed before the request is made. Because the request is blind, an attacker cannot see the data directly, but can still: probe internal services, trigger internal actions, or gather other intelligence. This vulnerability has been confirmed to be remediated, but it is unclear as to when the patch was introduced.
[]
6.9
null
null
null
null
GHSA-r7v4-jwx9-wx43
Authorization Bypass Through User-Controlled Key when using CILogonOAuthenticator oauthenticator
BackgroundCILogon is a federated auth provider that allows users to authenticate themselves via a number of Identity Providers (IdP), focused primarily on educational and research institutions (such as Universities). More traditional and open IdPs such as GitHub, ORCID, Google, Microsoft, etc are also supported.CILogonOAuthenticator is provided by the OAuthenticator package, and lets users log in to a JupyterHub via CILogon. This is primarily used to restrict a JupyterHub only to users of a given institute. The allowed_idps configuration trait of CILogonOAuthenticator is documented to be a list of domains that indicate the institutions whose users are authorized to access this JupyterHub. This authorization is validated by ensuring that the *email* field provided to us by CILogon has a *domain* that matches one of the domains listed in `allowed_idps`.ImpactIf `allowed_idps` contains `berkeley.edu`, you might expect only users with valid current credentials provided by University of California, Berkeley to be able to access the JupyterHub. However, CILogonOAuthenticator does *not* verify which provider is used by the user to login, only the email address provided. So a user can login with a GitHub account that has email set to `<something>@berkeley.edu`, and that will be treated exactly the same as someone logging in using the UC Berkeley official Identity Provider. This has two consequences:Since GitHub (and most other providers we tested) only require you to verify your email once, a user can access a JupyterHub even if their access to the institution's IdP has been revoked or expired.CILogon supports hundreds of identity providers - if even one of them allows users to set any email ids without verifying, that can be used to impersonate *any* user on any other identity provider! While CILogon itself has a stellar security record, this particular method of doing authorization means an attacker would only need to compromise a single identity provider to compromise all of CILogonWe currently do not know of any identity provider that provides *unverified* email addresses to CILogon, so this is not a severe known vulnerability. However, there are hundreds of IdPs, and we could not try them all.PatchesThis patch makes a *breaking change* in how `allowed_idps` is interpreted. It's no longer a list of domains, but configuration representing the `EntityID` of the IdPs that are allowed, picked from the [list maintained by CILogon](https://cilogon.org/idplist/). So instead of `berkeley.edu`, you would specify `urn:mace:incommon:berkeley.edu` to allow logins from users currently with `berkeley.edu` accounts. GitHub users with a verified `berkeley.edu` email will no longer be allowed to log in.For details on how to transition your CILogonOAuthenticator configuration to the patched version 15.0.0 or above, see [the migration](https://oauthenticator.readthedocs.io/en/latest/migrations.html) documentation.
[]
null
4.2
null
null
null
CVE-2025-30639
WordPress IDonatePro Plugin <= 2.1.9 - Broken Access Control Vulnerability
Missing Authorization vulnerability in ThemeAtelier IDonatePro allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects IDonatePro: from n/a through 2.1.9.
[]
null
7.5
null
null
null
RHSA-2024:4564
Red Hat Security Advisory: java-11-openjdk security update
OpenJDK: potential UTF8 size overflow (8314794) OpenJDK: Excessive symbol length can lead to infinite loop (8319859) OpenJDK: Range Check Elimination (RCE) pre-loop limit overflow (8320548) OpenJDK: Pack200 increase loading time due to improper header validation (8322106) OpenJDK: Out-of-bounds access in 2D image handling (8324559) OpenJDK: RangeCheckElimination array index overflow (8323231)
[ "cpe:/o:redhat:rhel_els:7" ]
null
7.4
null
null
null
GHSA-hfrm-xrcq-wmjv
IBM Remote Supervisor Adapter II firmware for System x3650, x3850 M2, and x3950 M2 1.13 and earlier generates weak RSA keys, which makes it easier for attackers to defeat cryptographic protection mechanisms via unspecified vectors.
[]
null
null
null
null
null
CVE-2015-6611
mediaserver in Android before 5.1.1 LMY48X and 6.0 before 2015-11-01 allows remote attackers to obtain sensitive information, and consequently bypass an unspecified protection mechanism, via unknown vectors, aka internal bugs 23905951, 23912202, 23953967, 23696300, 23600291, 23756261, 23541506, 23284974, 23542351, and 23542352, a different vulnerability than CVE-2015-8074.
[ "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*" ]
null
null
null
5
null
CVE-2020-14103
The application in the mobile phone can read the SNO information of the device, Xiaomi 10 MIUI < 2020.01.15.
[ "cpe:2.3:o:mi:miui:*:*:*:*:*:*:*:*", "cpe:2.3:h:mi:mi_10:-:*:*:*:*:*:*:*" ]
null
5.5
null
4.3
null
CVE-2025-20218
Cisco Secure Firepower Management Center Software XPATH Injection Vulnerability
A vulnerability in the web-based management interface of Cisco Secure Firewall Management Center (FMC) Software could allow an authenticated, remote attacker to retrieve sensitive information from an affected device. This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending a crafted request to the web-based management interface of an affected device. A successful exploit could allow the attacker to retrieve sensitive information from the affected device. To exploit this vulnerability, the attacker must have valid administrative credentials.
[]
null
4.9
null
null
null
GHSA-35rf-2xxr-prvf
Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in Bowo System Dashboard allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects System Dashboard: from n/a through 2.8.18.
[]
null
4.3
null
null
null
GHSA-23qj-fcjw-2v26
Unspecified vulnerability in Oracle Database Server 9.0.1.5 and 9.2.0.7 has unknown impact and attack vectors in the Oracle Enterprise Manager Intelligent Agent component, aka Vuln# DB07.
[]
null
null
null
null
null
GHSA-467f-p48c-3q9m
Unspecified vulnerability in the PeopleSoft Enterprise PT PeopleTools component in Oracle PeopleSoft Products 8.52 and 8.53 allows remote attackers to affect integrity via vectors related to PIA Core Technology.
[]
null
null
null
null
null
CVE-2005-1627
Unknown vulnerability in Viewglob before 2.0.1, related to "a potential security issue with the Viewglob display and ssh X forwarding," has unknown impact.
[ "cpe:2.3:a:viewglob:viewglob:0.8.0:*:*:*:*:*:*:*", "cpe:2.3:a:viewglob:viewglob:0.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:viewglob:viewglob:0.8.2:*:*:*:*:*:*:*", "cpe:2.3:a:viewglob:viewglob:0.8.3:*:*:*:*:*:*:*", "cpe:2.3:a:viewglob:viewglob:0.8.4:*:*:*:*:*:*:*", "cpe:2.3:a:viewglob:viewglob:0.9.0:*:*:*:*:*:*:*", "cpe:2.3:a:viewglob:viewglob:0.9.1:*:*:*:*:*:*:*", "cpe:2.3:a:viewglob:viewglob:1.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:viewglob:viewglob:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:viewglob:viewglob:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:viewglob:viewglob:1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:viewglob:viewglob:1.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:viewglob:viewglob:1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:viewglob:viewglob:2.0:*:*:*:*:*:*:*" ]
null
null
null
2.1
null
CVE-2017-16401
An issue was discovered in Adobe Acrobat and Reader: 2017.012.20098 and earlier versions, 2017.011.30066 and earlier versions, 2015.006.30355 and earlier versions, and 11.0.22 and earlier versions. This vulnerability occurs as a result of a computation that reads data that is past the end of the target buffer; the computation is part of an image conversion, specifically in Enhanced Metafile Format Plus (EMF +) processing modules. The use of an invalid (out-of-range) pointer offset during access of internal data structure fields causes the vulnerability. A successful attack can lead to sensitive data exposure.
[ "cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*" ]
null
null
8.8
9.3
null
CVE-2020-11959
An unsafe configuration of nginx lead to information leak in Xiaomi router R3600 ROM before 1.0.50.
[ "cpe:2.3:o:mi:xiaomi_r3600_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:mi:xiaomi_r3600:-:*:*:*:*:*:*:*" ]
null
7.5
null
5
null
CVE-2017-7513
It was found that Satellite 5 configured with SSL/TLS for the PostgreSQL backend failed to correctly validate X.509 server certificate host name fields. A man-in-the-middle attacker could use this flaw to spoof a PostgreSQL server using a specially crafted X.509 certificate.
[ "cpe:2.3:a:redhat:satellite:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:satellite:5.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:satellite:5.2:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:satellite:5.3:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:satellite:5.4:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:satellite:5.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:satellite:5.5:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*" ]
null
null
5.4
null
null
GHSA-79m9-mggg-xpg9
Cisco Web Security Appliance (WSA) devices with software 8.5.0-ise-147 do not properly restrict use of the pickle Python module during certain tunnel-status checks, which allows local users to execute arbitrary Python code and gain privileges via crafted serialized objects, aka Bug ID CSCut39230.
[]
null
null
null
null
null
CVE-2024-50115
KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory
In the Linux kernel, the following vulnerability has been resolved: KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory Ignore nCR3[4:0] when loading PDPTEs from memory for nested SVM, as bits 4:0 of CR3 are ignored when PAE paging is used, and thus VMRUN doesn't enforce 32-byte alignment of nCR3. In the absolute worst case scenario, failure to ignore bits 4:0 can result in an out-of-bounds read, e.g. if the target page is at the end of a memslot, and the VMM isn't using guard pages. Per the APM: The CR3 register points to the base address of the page-directory-pointer table. The page-directory-pointer table is aligned on a 32-byte boundary, with the low 5 address bits 4:0 assumed to be 0. And the SDM's much more explicit: 4:0 Ignored Note, KVM gets this right when loading PDPTRs, it's only the nSVM flow that is broken.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:*" ]
null
7.1
null
null
null
CVE-2007-1682
Multiple stack-based buffer overflows in the FileManager ActiveX control in SAFmgPws.dll in SoftArtisans XFile before 2.4.0 allow remote attackers to execute arbitrary code via unspecified calls to the (1) BuildPath, (2) GetDriveName, (3) DriveExists, or (4) DeleteFile method.
[ "cpe:2.3:a:softartisans:xfile:*:*:*:*:*:*:*:*", "cpe:2.3:a:softartisans:xfile:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:softartisans:xfile:1.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:softartisans:xfile:1.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:softartisans:xfile:1.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:softartisans:xfile:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:softartisans:xfile:1.01:*:*:*:*:*:*:*", "cpe:2.3:a:softartisans:xfile:1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:softartisans:xfile:1.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:softartisans:xfile:1.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:softartisans:xfile:1.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:softartisans:xfile:1.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:softartisans:xfile:1.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:softartisans:xfile:1.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:softartisans:xfile:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:softartisans:xfile:2.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:softartisans:xfile:2.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:softartisans:xfile:2.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:softartisans:xfile:2.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:softartisans:xfile:2.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:softartisans:xfile:2.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:softartisans:xfile:2.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:softartisans:xfile:2.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:softartisans:xfile:2.2.4:*:*:*:*:*:*:*" ]
null
null
null
9.3
null
GHSA-2p37-x8h9-2j2q
Multiple cross-site scripting (XSS) vulnerabilities in Joomla! before 1.7.0 allow remote attackers to inject arbitrary web script or HTML via (1) the URI to includes/application.php, reachable through index.php; and, when Internet Explorer or Konqueror is used, (2) allow remote attackers to inject arbitrary web script or HTML via the searchword parameter in a search action to index.php in the com_search component. NOTE: vector 2 exists because of an incomplete fix for CVE-2011-2509.5.
[]
null
null
null
null
null
GHSA-38hp-c2qq-q6vh
The installer in VMware Workstation 7.x before 7.1.2 build 301548 and VMware Player 3.x before 3.1.2 build 301548 renders an index.htm file if present in the installation directory, which might allow local users to trigger unintended interpretation of web script or HTML by creating this file.
[]
null
null
null
null
null
CVE-2018-4854
A vulnerability has been identified in SICLOCK TC100 (All versions) and SICLOCK TC400 (All versions). An attacker with network access to port 69/udp could modify the administrative client stored on the device. If a legitimate user downloads and executes the modified client from the affected device, then he/she could obtain code execution on the client system.
[ "cpe:2.3:o:siemens:siclock_tc400_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:siclock_tc400:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:siclock_tc100_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:siclock_tc100:-:*:*:*:*:*:*:*" ]
null
null
8.8
9.3
null
GHSA-58p5-3cgm-hvjh
The Telnet proxy of 602Pro LAN SUITE 2002 does not restrict the number of outstanding connections to the local host, which allows remote attackers to create a denial of service (memory consumption) via a large number of connections.
[]
null
null
null
null
null
GHSA-5q75-r4xj-cjrr
fastadmin V1.0.0.20200506_beta contains a cross-site scripting (XSS) vulnerability which may allow an attacker to obtain administrator credentials to log in to the background.
[]
null
null
null
null
null
CVE-2023-28629
Stored XSS possible on VSM and Job Details pages via malicious pipeline label configuration in gocd
GoCD is an open source continuous delivery server. GoCD versions before 23.1.0 are vulnerable to a stored XSS vulnerability, where pipeline configuration with a malicious pipeline label configuration can affect browser display of pipeline runs generated from that configuration. An attacker that has permissions to configure GoCD pipelines could include JavaScript elements within the label template, causing a XSS vulnerability to be triggered for any users viewing the Value Stream Map or Job Details for runs of the affected pipeline, potentially allowing them to perform arbitrary actions within the victim's browser context rather than their own. This issue has been fixed in GoCD 23.1.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.
[ "cpe:2.3:a:thoughtworks:gocd:*:*:*:*:*:*:*:*" ]
null
5.4
null
null
null
CVE-2018-6114
Incorrect enforcement of CSP for <object> tags in Blink in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to bypass content security policy via a crafted HTML page.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*" ]
null
null
6.5
4.3
null
GHSA-3763-pmwr-w4qp
An insufficient DRAM address validation in PMFW may allow a privileged attacker to perform a DMA read from an invalid DRAM address to SRAM, potentially resulting in loss of data integrity.
[]
null
5.2
null
null
null
GHSA-4j6h-qxvh-v5mq
Pulse Secure Virtual Traffic Manager 9.9 versions prior to 9.9r2 and 10.4r1 allow a remote authenticated user to obtain sensitive historical activity information by leveraging incorrect permission validation.
[]
null
4.3
null
null
null
CVE-2025-6096
codesiddhant Jasmin Ransomware dashboard.php sql injection
A vulnerability has been found in codesiddhant Jasmin Ransomware up to 1.0.1 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /dashboard.php. The manipulation of the argument Search leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
[]
5.3
6.3
6.3
6.5
null
GHSA-fgpq-r4xv-rw5g
A vulnerability was found in GNOME libgsf up to 1.14.53. It has been classified as critical. This affects the function gsf_base64_encode_simple. The manipulation of the argument size_t leads to heap-based buffer overflow. An attack has to be approached locally. The vendor was contacted early about this disclosure but did not respond in any way.
[]
4.8
5.3
null
null
null
CVE-2024-25121
Improper Access Control Persisting File Abstraction Layer Entities via Data Handler in TYPO3
TYPO3 is an open source PHP based web content management system released under the GNU GPL. In affected versions of TYPO3 entities of the File Abstraction Layer (FAL) could be persisted directly via `DataHandler`. This allowed attackers to reference files in the fallback storage directly and retrieve their file names and contents. The fallback storage ("zero-storage") is used as a backward compatibility layer for files located outside properly configured file storages and within the public web root directory. Exploiting this vulnerability requires a valid backend user account. Users are advised to update to TYPO3 version 8.7.57 ELTS, 9.5.46 ELTS, 10.4.43 ELTS, 11.5.35 LTS, 12.4.11 LTS, or 13.0.1 which fix the problem described. When persisting entities of the File Abstraction Layer directly via DataHandler, `sys_file` entities are now denied by default, and `sys_file_reference` & `sys_file_metadata` entities are not permitted to reference files in the fallback storage anymore. When importing data from secure origins, this must be explicitly enabled in the corresponding DataHandler instance by using `$dataHandler->isImporting = true;`.
[ "cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:13.0.0:*:*:*:*:*:*:*" ]
null
7.1
null
null
null
GHSA-fcx3-mx84-8j3q
Windows Secure Channel Denial of Service Vulnerability
[]
null
7.5
null
null
null
CVE-2019-19001
eSOMS X-FrameOption
For ABB eSOMS versions 4.0 to 6.0.2, the X-Frame-Options header is not configured in HTTP response. This can potentially allow 'ClickJacking' attacks where an attacker can frame parts of the application on a malicious web site, revealing sensitive user information such as authentication credentials.
[ "cpe:2.3:a:hitachienergy:esoms:*:*:*:*:*:*:*:*" ]
null
6.5
null
null
null
CVE-2025-11350
Campcodes Online Apartment Visitor Management System bwdates-reports-details.php sql injection
A security flaw has been discovered in Campcodes Online Apartment Visitor Management System 1.0. The affected element is an unknown function of the file /bwdates-reports-details.php. The manipulation of the argument fromdate/todate results in sql injection. The attack may be launched remotely. The exploit has been released to the public and may be exploited.
[]
6.9
7.3
7.3
7.5
null
RHSA-2019:2503
Red Hat Security Advisory: OpenShift Container Platform 3.11 jenkins security update
jenkins: Arbitrary file write vulnerability using file parameter definitions (SECURITY-1424) jenkins: CSRF protection tokens did not expire (SECURITY-626) jenkins: Unauthorized view fragment access (SECURITY-534)
[ "cpe:/a:redhat:openshift:3.11::el7" ]
null
null
4.3
null
null
GHSA-r36f-f47x-637q
wolfSSL SP Math All RSA implementation is vulnerable to the Marvin Attack, new variation of a timing Bleichenbacher style attack, when built with the following options to configure:--enable-all CFLAGS="-DWOLFSSL_STATIC_RSA"The define “WOLFSSL_STATIC_RSA” enables static RSA cipher suites, which is not recommended, and has been disabled by default since wolfSSL 3.6.6.  Therefore the default build since 3.6.6, even with "--enable-all", is not vulnerable to the Marvin Attack. The vulnerability is specific to static RSA cipher suites, and expected to be padding-independent.The vulnerability allows an attacker to decrypt ciphertexts and forge signatures after probing with a large number of test observations. However the server’s private key is not exposed.
[]
null
5.9
null
null
null
CVE-2020-13156
modules\users\admin\add_user.php in NukeViet 4.4 allows CSRF to add a user account via the admin/index.php?nv=users&op=user_add URI.
[ "cpe:2.3:a:nukeviet:nukeviet:4.4:*:*:*:*:*:*:*" ]
null
6.5
null
4.3
null
GHSA-xh73-mcmv-h45w
ZoneMinder before 1.32.3 has SQL Injection via the ajax/status.php sort parameter.
[]
null
null
9.8
null
null
GHSA-4rg7-8mp3-c7wh
DHCP Server Service Denial of Service Vulnerability
[]
null
7.5
null
null
null