id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
189k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
patch_commit_url
stringlengths
38
232
CVE-2025-7131
Campcodes Payroll Management System ajax.php sql injection
A vulnerability was found in Campcodes Payroll Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /ajax.php?action=save_employee_attendance. The manipulation of the argument employee_id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
[]
6.9
7.3
7.3
7.5
null
GHSA-qr32-j4j6-3m7r
Command Injection in fs-git
Affected versions of `fs-git` do not sanitize strings passed into the `buildCommand` method, resulting in arbitrary code execution.RecommendationUpdate to version 1.0.2 or later.
[]
null
null
null
null
null
CVE-2013-5996
Multiple cross-site scripting (XSS) vulnerabilities in shopping/payment.tpl components in LOCKON EC-CUBE 2.11.0 through 2.13.0 allow remote attackers to inject arbitrary web script or HTML via crafted values.
[ "cpe:2.3:a:lockon:ec-cube:2.11.0:*:*:*:*:*:*:*", "cpe:2.3:a:lockon:ec-cube:2.11.0:beta:*:*:*:*:*:*", "cpe:2.3:a:lockon:ec-cube:2.11.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:lockon:ec-cube:2.11.1:*:*:*:*:*:*:*", "cpe:2.3:a:lockon:ec-cube:2.11.2:*:*:*:*:*:*:*", "cpe:2.3:a:lockon:ec-cube:2.11.3:*:*:*:*:*:*:*", "cpe:2.3:a:lockon:ec-cube:2.11.4:*:*:*:*:*:*:*", "cpe:2.3:a:lockon:ec-cube:2.11.5:*:*:*:*:*:*:*", "cpe:2.3:a:lockon:ec-cube:2.12.0:*:*:*:*:*:*:*", "cpe:2.3:a:lockon:ec-cube:2.12.1:*:*:*:*:*:*:*", "cpe:2.3:a:lockon:ec-cube:2.12.2:*:*:*:*:*:*:*", "cpe:2.3:a:lockon:ec-cube:2.12.3:*:*:*:*:*:*:*", "cpe:2.3:a:lockon:ec-cube:2.12.3en:*:*:*:*:*:*:*", "cpe:2.3:a:lockon:ec-cube:2.12.3enp1:*:*:*:*:*:*:*", "cpe:2.3:a:lockon:ec-cube:2.12.3enp2:*:*:*:*:*:*:*", "cpe:2.3:a:lockon:ec-cube:2.12.4en:*:*:*:*:*:*:*", "cpe:2.3:a:lockon:ec-cube:2.12.5:*:*:*:*:*:*:*", "cpe:2.3:a:lockon:ec-cube:2.12.5en:*:*:*:*:*:*:*", "cpe:2.3:a:lockon:ec-cube:2.12.6:*:*:*:*:*:*:*", "cpe:2.3:a:lockon:ec-cube:2.12.6en:*:*:*:*:*:*:*", "cpe:2.3:a:lockon:ec-cube:2.13.0:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
GHSA-j4q4-qv6g-h5fv
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 8.0.16 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
[]
null
4.9
null
null
null
GHSA-wgp7-3rwh-vpgw
An attacker could send a malicious link to an authenticated operator, which may allow remote attackers to perform actions with the permissions of the user on the Sunny WebBox Firmware Version 1.6 and prior. This device uses IP addresses to maintain communication after a successful login, which would increase the ease of exploitation.
[]
null
8.8
null
null
null
CVE-2022-33915
Versions of the Amazon AWS Apache Log4j hotpatch package before log4j-cve-2021-44228-hotpatch-1.3.5 are affected by a race condition that could lead to a local privilege escalation. This Hotpatch package is not a replacement for updating to a log4j version that mitigates CVE-2021-44228 or CVE-2021-45046; it provides a temporary mitigation to CVE-2021-44228 by hotpatching the local Java virtual machines. To do so, it iterates through all running Java processes, performs several checks, and executes the Java virtual machine with the same permissions and capabilities as the running process to load the hotpatch. A local user could cause the hotpatch script to execute a binary with elevated privileges by running a custom java process that performs exec() of an SUID binary after the hotpatch has observed the process path and before it has observed its effective user ID.
[ "cpe:2.3:a:amazon:hotpatch:*:*:*:*:*:log4j:*:*" ]
null
7
null
null
null
GHSA-8wqc-vgv5-hpgj
Certain configurations of IPsec, when using Encapsulating Security Payload (ESP) in tunnel mode, integrity protection at a higher layer, or Authentication Header (AH), allow remote attackers to decrypt IPSec communications by modifying the outer packet in ways that cause plaintext data from the inner packet to be returned in ICMP messages, as demonstrated using bit-flipping attacks and (1) Destination Address Rewriting, (2) a modified header length that causes portions of the packet to be interpreted as IP Options, or (3) a modified protocol field and source address.
[]
null
null
null
null
null
CVE-2014-3596
The getCN function in Apache Axis 1.4 and earlier does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a certificate with a subject that specifies a common name in a field that is not the CN field. NOTE: this issue exists because of an incomplete fix for CVE-2012-5784.
[ "cpe:2.3:a:apache:axis:*:*:*:*:*:*:*:*", "cpe:2.3:a:apache:axis:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:axis:1.0:beta:*:*:*:*:*:*", "cpe:2.3:a:apache:axis:1.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:apache:axis:1.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:apache:axis:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:axis:1.1:beta:*:*:*:*:*:*", "cpe:2.3:a:apache:axis:1.1:rc1:*:*:*:*:*:*", "cpe:2.3:a:apache:axis:1.1:rc2:*:*:*:*:*:*", "cpe:2.3:a:apache:axis:1.2:*:*:*:*:*:*:*", "cpe:2.3:a:apache:axis:1.2:alpha:*:*:*:*:*:*", "cpe:2.3:a:apache:axis:1.2:beta1:*:*:*:*:*:*", "cpe:2.3:a:apache:axis:1.2:beta2:*:*:*:*:*:*", "cpe:2.3:a:apache:axis:1.2:beta3:*:*:*:*:*:*", "cpe:2.3:a:apache:axis:1.2:rc1:*:*:*:*:*:*", "cpe:2.3:a:apache:axis:1.2:rc2:*:*:*:*:*:*", "cpe:2.3:a:apache:axis:1.2:rc3:*:*:*:*:*:*", "cpe:2.3:a:apache:axis:1.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:axis:1.3:*:*:*:*:*:*:*" ]
null
null
null
5.8
null
GHSA-rf7m-8c9f-5c53
Multiple SQL injection vulnerabilities in sign.php in tinyguestbook allow remote attackers to execute arbitrary SQL commands via the (1) name and (2) msg parameters. NOTE: some of these details are obtained from third party information.
[]
null
null
null
null
null
GHSA-vcgf-vmpc-ph79
Microweber Incorrect Permission Assignment for Critical Resource vulnerability
In Microweber prior to 1.2.11, a non-admin user is able to access other users' sensitive information.
[]
null
6.5
null
null
null
CVE-2018-1000526
Openpsa contains a XML Injection vulnerability in RSS file upload feature that can result in Remote denial of service. This attack appear to be exploitable via Specially crafted XML file. This vulnerability appears to have been fixed in after commit 4974a26.
[ "cpe:2.3:a:openpsa2:openpsa:-:*:*:*:*:*:*:*" ]
null
null
7.5
5
null
GHSA-642p-23g6-ph4w
The issue was addressed with improved memory handling. This issue is fixed in macOS Sequoia 15.6, iOS 18.6 and iPadOS 18.6, tvOS 18.6, watchOS 11.6, visionOS 2.6. Processing maliciously crafted web content may lead to an unexpected Safari crash.
[]
null
6.5
null
null
null
CVE-2023-7018
Deserialization of Untrusted Data in huggingface/transformers
Deserialization of Untrusted Data in GitHub repository huggingface/transformers prior to 4.36.
[ "cpe:2.3:a:huggingface:transformers:*:*:*:*:*:*:*:*" ]
null
null
9.6
null
null
CVE-2023-2386
Netgear SRX5308 Web Management Interface cross site scripting
A vulnerability classified as problematic has been found in Netgear SRX5308 up to 4.3.5-3. Affected is an unknown function of the file scgi-bin/platform.cgi?page=firewall_logs_email.htm of the component Web Management Interface. The manipulation of the argument smtpServer.toAddr leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-227664. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
[ "cpe:2.3:o:netgear:srx5308_firmware:4.3.5-3:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:srx5308:-:*:*:*:*:*:*:*" ]
null
2.4
2.4
3.3
null
CVE-2001-0753
Cisco CBOS 2.3.8 and earlier stores the passwords for (1) exec and (2) enable in cleartext in the NVRAM and a configuration file, which could allow unauthorized users to obtain the passwords and gain privileges.
[ "cpe:2.3:o:cisco:cbos:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2004-0013
jabber 1.4.2, 1.4.2a, and possibly earlier versions, does not properly handle SSL connections, which allows remote attackers to cause a denial of service (crash).
[ "cpe:2.3:a:jabber_software_foundation:jabber_server:1.4.2a:*:*:*:*:*:*:*", "cpe:2.3:a:jabber_software_foundation:jabber_server:1.4.3:*:*:*:*:*:*:*" ]
null
null
null
5
null
RHSA-2025:0714
Red Hat Security Advisory: rsync security update
rsync: Info Leak via Uninitialized Stack Contents
[ "cpe:/o:redhat:rhel_els:7" ]
null
7.5
null
null
null
GHSA-97x2-vjfg-fjhm
An issue was discovered in the Responsive Poll through 1.3.4 for Wordpress. It allows an unauthenticated user to manipulate polls, e.g., delete, clone, or view a hidden poll. This is due to the usage of the callback wp_ajax_nopriv function in Includes/Total-Soft-Poll-Ajax.php for sensitive operations.
[]
null
null
null
null
null
GHSA-8q5x-76jx-443h
Vulnerability in the Oracle Solaris product of Oracle Systems (component: LDAP Library). The supported version that is affected is 11. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle Solaris executes to compromise Oracle Solaris. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Solaris. CVSS 3.0 Base Score 1.8 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:L).
[]
null
1.8
null
null
null
GHSA-5ghg-233h-7j79
PyDio Stored XSS Vulnerability
A stored XSS vulnerability exists in the web application of Pydio through 8.2.2 that can be exploited by levering the file upload and file preview features of the application. An authenticated attacker can upload an HTML file containing JavaScript code and afterwards a file preview URL can be used to access the uploaded file. If a malicious user shares an uploaded HTML file containing JavaScript code with another user of the application, and tricks an authenticated victim into accessing a URL that results in the HTML code being interpreted by the web browser, then the included JavaScript code is executed under the context of the victim user session.
[]
null
null
5.4
null
null
GHSA-vh7x-8rfm-rpf4
Observable Discrepancy, Exposure of Sensitive Information to an Unauthorized Actor, Exposure of Private Personal Information to an Unauthorized Actor vulnerability in CBK Soft Software Hardware Electronic Computer Systems Industry and Trade Inc. EnVision allows Account Footprinting.This issue affects enVision: before 250566.
[]
null
7.5
null
null
null
GHSA-qc4p-7g72-jqrq
An uninitialized memory use vulnerability exists in Tinyproxy 1.11.1 while parsing HTTP requests. In certain configurations, a specially crafted HTTP request can result in disclosure of data allocated on the heap, which could contain sensitive information. An attacker can make an unauthenticated HTTP request to trigger this vulnerability.
[]
null
5.9
null
null
null
CVE-2023-40667
WordPress Simple URLs Plugin <= 117 is vulnerable to Cross Site Scripting (XSS)
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Lasso Simple URLs plugin <= 117 versions.
[ "cpe:2.3:a:getlasso:simple_urls:*:*:*:*:*:wordpress:*:*" ]
null
7.1
null
null
null
GHSA-9vh5-qcwf-6gp4
An improper input validation vulnerability in the Schweitzer Engineering Laboratories SEL-411L could allow a malicious actor to manipulate authorized users to click on a link that could allow undesired behavior.See product Instruction Manual Appendix A dated 20230830 for more details.
[]
null
4
null
null
null
CVE-2024-11077
code-projects Job Recruitment index.php sql injection
A vulnerability, which was classified as critical, was found in code-projects Job Recruitment 1.0. Affected is an unknown function of the file /index.php. The manipulation of the argument email leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
[ "cpe:2.3:a:code-projects:job_recruitment:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:anisha:job_recruitment:1.0:*:*:*:*:*:*:*" ]
6.9
7.3
7.3
7.5
null
CVE-2021-23877
McAfee Total Protection (MTP) - Privilege Escalation vulnerability
Privilege escalation vulnerability in the Windows trial installer of McAfee Total Protection (MTP) prior to 16.0.34_x may allow a local user to run arbitrary code as the admin user by replacing a specific temporary file created during the installation of the trial version of MTP.
[ "cpe:2.3:a:mcafee:total_protection:*:*:*:*:free_trial:*:*:*" ]
null
6.7
null
null
null
CVE-2009-0631
Unspecified vulnerability in Cisco IOS 12.0 through 12.4, when configured with (1) IP Service Level Agreements (SLAs) Responder, (2) Session Initiation Protocol (SIP), (3) H.323 Annex E Call Signaling Transport, or (4) Media Gateway Control Protocol (MGCP) allows remote attackers to cause a denial of service (blocked input queue on the inbound interface) via a crafted UDP packet.
[ "cpe:2.3:o:cisco:ios:12.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0da:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0db:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0dc:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0sc:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0sl:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0sp:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0st:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0sx:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0sy:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0sz:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0t:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0w:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0wc:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0wt:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0wx:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0xa:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0xb:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0xc:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0xd:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0xe:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0xg:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0xh:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0xi:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0xj:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0xk:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0xl:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0xm:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0xn:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0xq:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0xr:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0xs:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0xt:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0xv:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1aa:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1ax:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1ay:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1az:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1cx:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1da:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1db:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1dc:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1e:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1ea:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1eb:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1ec:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1eo:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1eu:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1ev:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1ew:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1ex:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1ey:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1ez:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1ga:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1gb:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1t:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1xa:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1xb:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1xc:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1xd:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1xe:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1xf:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1xg:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1xh:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1xi:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1xj:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1xl:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1xm:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1xp:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1xq:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1xr:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1xs:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1xt:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1xu:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1xv:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1xw:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1xx:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1xy:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1xz:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1ya:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1yb:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1yc:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1yd:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1ye:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1yf:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1yh:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1yi:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1yj:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2b:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2bc:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2bw:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2bx:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2by:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2bz:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2cx:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2cy:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2cz:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2da:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2dd:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2dx:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2ew:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2ewa:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2ex:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2ey:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2ez:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2fx:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2fy:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2fz:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2ira:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2irb:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2ixa:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2ixb:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2ixc:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2ixd:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2ixe:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2ixf:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2ixg:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2ja:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2jk:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2mb:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2mc:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2sb:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2sbc:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2sca:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2scb:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2se:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2sea:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2seb:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2sec:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2sed:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2see:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2sef:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2seg:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2sg:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2sga:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2sm:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2so:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2sq:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2sra:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2srb:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2src:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2srd:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2ste:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2su:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2sv:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2sva:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2svc:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2svd:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2sve:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2sw:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2sx:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2sxa:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2sxb:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2sxd:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2sxe:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2sxf:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2sxh:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2sxi:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2sy:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2sz:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2t:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2tpc:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xa:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xb:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xc:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xd:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xe:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xf:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xg:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xh:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xi:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xj:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xk:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xl:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xm:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xn:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xna:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xnb:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xo:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xq:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xr:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xs:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xt:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xu:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xv:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xw:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2ya:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2yb:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2yc:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2yd:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2ye:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2yf:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2yg:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2yh:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2yj:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2yk:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2yl:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2ym:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2yn:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2yo:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2yp:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2yq:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2yr:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2yt:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2yu:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2yv:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2yw:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2yx:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2yy:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2yz:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2za:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2zb:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2zc:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2zd:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2ze:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2zf:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2zg:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2zh:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2zj:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2zl:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2zp:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2zu:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2zx:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2zy:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2zya:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3b:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3bc:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3bw:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3ja:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3jea:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3jeb:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3jec:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3jk:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3jl:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3jx:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3t:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3tpc:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3va:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3xa:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3xb:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3xc:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3xd:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3xe:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3xf:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3xg:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3xi:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3xj:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3xk:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3xl:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3xq:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3xr:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3xs:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3xu:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3xw:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3xx:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3xy:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3xz:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3ya:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3yd:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3yf:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3yg:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3yh:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3yi:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3yj:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3yk:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3ym:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3yq:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3ys:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3yt:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3yu:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3yx:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3yz:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4ja:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4jda:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4jk:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4jl:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4jma:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4jmb:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4jx:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4md:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4mr:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4sw:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4t:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xa:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xb:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xc:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xd:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xe:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xf:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xg:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xj:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xk:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xl:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xm:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xn:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xp:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xq:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xr:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xt:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xv:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xw:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xy:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xz:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4ya:*:*:*:*:*:*:*" ]
null
null
null
7.8
null
GHSA-pvrf-2wf8-jrqv
An issue was discovered in the Linux kernel before 6.0.11. Missing validation of IEEE80211_P2P_ATTR_OPER_CHANNEL in drivers/net/wireless/microchip/wilc1000/cfg80211.c in the WILC1000 wireless driver can trigger an out-of-bounds write when parsing the channel list attribute from Wi-Fi management frames.
[]
null
7.8
null
null
null
CVE-2017-15409
Heap buffer overflow in Skia in Google Chrome prior to 63.0.3239.84 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*" ]
null
null
8.8
6.8
null
GHSA-7qw5-pqhc-xm4g
Users with SCRIPT right can execute arbitrary code in XWiki
ImpactAny user with SCRIPT right (EDIT right before XWiki 7.4) can gain access to the application server Servlet context which contains tools allowing to instantiate arbitrary Java objects and invoke methods that may lead to arbitrary code execution.PatchesIt has been patched in both version XWiki 12.2.1 and XWiki 11.10.5.WorkaroundsThe only workaround is to give SCRIPT right only to trusted users.Referenceshttps://jira.xwiki.org/browse/XWIKI-17141 https://jira.xwiki.org/browse/XWIKI-17266It's been reported by the GitHub Security Lab under #GHSL-2020-046.For more informationIf you have any questions or comments about this advisory:Open an issue in [Jira XWiki](https://jira.xwiki.org)Email us at [our security mailing list](mailto:[email protected])
[]
null
6.6
null
null
null
GHSA-w4pv-w56c-mg4v
Path Traversal in stattic
Versions of `stattic` before 0.3.0 are vulnerable to path traversal allowing a remote attacker to read arbitrary files with any extension from the server that users `stattic`.RecommendationUpdate to version 0.3.0 or later.
[]
null
7.5
null
null
null
GHSA-2r9r-3596-47c9
Vulnerability in the Oracle Process Manufacturing Product Development product of Oracle E-Business Suite (component: Quality Management Specs). The supported version that is affected is 12.2.13. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Process Manufacturing Product Development. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Process Manufacturing Product Development accessible data as well as unauthorized access to critical data or complete access to all Oracle Process Manufacturing Product Development accessible data. CVSS 3.1 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N).
[]
null
8.1
null
null
null
CVE-2000-0764
Intel Express 500 series switches allow a remote attacker to cause a denial of service via a malformed IP packet.
[ "cpe:2.3:h:intel:express_8100:*:*:*:*:*:*:*:*" ]
null
null
null
5
null
GHSA-229f-pm83-vmf3
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Bob Likert Survey Master likert-survey-master allows Reflected XSS.This issue affects Likert Survey Master: from n/a through <= 0.8.0.1.
[]
null
7.1
null
null
null
GHSA-7pf2-qwx3-5fmv
Multiple cross-site scripting (XSS) vulnerabilities in MyBB (aka MyBulletinBoard) 1.8.x before 1.8.2 allow remote attackers to inject arbitrary web script or HTML via the (1) type parameter to report.php, (2) signature parameter in a do_editsig action to usercp.php, or (3) title parameter in the style-templates module in an edit_template action or (4) file parameter in the config-languages module in an edit action to admin/index.php.
[]
null
null
null
null
null
CVE-2023-48505
Adobe Experience Manager | Cross-site Scripting (Stored XSS) (CWE-79)
Adobe Experience Manager versions 6.5.18 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
[ "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:experience_manager_cloud_service:*:*:*:*:*:*:*:*" ]
null
5.4
null
null
null
GHSA-hhvc-3rm5-x4m2
Cross-site request forgery (CSRF) vulnerability in HP System Management Homepage (SMH) before 3.2.3 on HP-UX B.11.23, and before 3.2.8 on HP-UX B.11.31, allows remote attackers to hijack the authentication of unspecified victims via unknown vectors.
[]
null
null
null
null
null
CVE-2014-7122
The Lansing State Journal Print (aka com.lansingjournal.android.prod) application 6.7 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[ "cpe:2.3:a:gannett:lansing_state_journal_print:6.7:*:*:*:*:android:*:*" ]
null
null
null
5.4
null
GHSA-33qw-xh9j-v5v3
Cross Site Scripting (XSS) vulnerability in sourcecodester Multi Restaurant Table Reservation System 1.0 via the Table Name field to /dashboard/table-list.php.
[]
null
5.4
null
null
null
CVE-2022-0221
A CWE-611: Improper Restriction of XML External Entity Reference vulnerability exists that could result in information disclosure when opening a malicious solution file provided by an attacker with SCADAPack Workbench. This could be exploited to pass data from local files to a remote system controlled by an attacker. Affected Product: SCADAPack Workbench (6.6.8a and prior)
[ "cpe:2.3:a:schneider-electric:scadapack_workbench:*:*:*:*:*:*:*:*" ]
null
5.5
null
null
null
RHSA-2025:10459
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 8.0.8 Security update
org.jboss.eap:wildfly-ejb3: Improper Deserialization in JBoss Marshalling Allows Remote Code Execution org.jboss.hal-hal-parent: Stored Cross-Site Scripting (XSS) in JBoss EAP Management Console org.apache.cxf: Apache CXF: Denial of Service vulnerability with temporary files base-x: base-x homograph attack allows Unicode lookalike characters to bypass validation. commons-beanutils: Apache Commons BeanUtils: PropertyUtilsBean does not suppresses an enum's declaredClass property by default
[ "cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8" ]
null
8.8
null
null
null
CVE-2025-30346
Varnish Cache before 7.6.2 and Varnish Enterprise before 6.0.13r10 allow client-side desync via HTTP/1 requests.
[]
null
5.4
null
null
null
GHSA-qhgf-332f-8jqf
IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.1.2.6 and 6.2.0.0 through 6.2.0.3 is vulnerable to cross-site scripting. This vulnerability allows a privileged user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.
[]
null
4.8
null
null
null
RHSA-2024:1982
Red Hat Security Advisory: thunderbird security update
Mozilla: Permission prompt input delay could expire when not in focus Mozilla: Denial of Service using HTTP/2 CONTINUATION frames Mozilla: GetBoundName in the JIT returned the wrong object Mozilla: Out-of-bounds-read after mis-optimized switch statement Mozilla: Incorrect JITting of arguments led to use-after-free during garbage collection Mozilla: Integer-overflow led to out-of-bounds-read in the OpenType sanitizer Mozilla: Potential use-after-free due to AlignedBuffer self-move Mozilla: Memory safety bug fixed in Firefox 125, Firefox ESR 115.10, and Thunderbird 115.10
[ "cpe:/a:redhat:rhel_aus:8.4::appstream", "cpe:/a:redhat:rhel_e4s:8.4::appstream", "cpe:/a:redhat:rhel_tus:8.4::appstream" ]
null
7.5
null
null
null
CVE-2023-38050
A BOLA vulnerability in GET, PUT, DELETE /webhooks/{webhookId} in EasyAppointments < 1.5.0
A BOLA vulnerability in GET, PUT, DELETE /webhooks/{webhookId} allows a low privileged user to fetch, modify or delete a webhook of any user (including admin). This results in unauthorized access and unauthorized data manipulation.
[ "cpe:2.3:a:easyappointments:easyappointments:*:*:*:*:*:*:*:*" ]
null
9.1
null
null
null
GHSA-fchg-vp85-h7h9
An issue was discovered in swftools through 20200710. A NULL pointer dereference exists in the function parse_metadata() located in abc.c. It allows an attacker to cause Denial of Service.
[]
null
null
null
null
null
GHSA-77h7-8788-mfv3
The Libreswan Project was notified of an issue causing libreswan to restart under some IKEv2 retransmit scenarios when a connection is configured to use PreSharedKeys (authby=secret) and the connection cannot find a matching configured secret. When such a connection is automatically added on startup using the auto= keyword, it can cause repeated crashes leading to a Denial of Service.
[]
null
6.5
null
null
null
GHSA-hx37-57m6-7957
PHP remote file inclusion vulnerability in utils/class_HTTPRetriever.php in phpSearch allows remote attackers to execute arbitrary PHP code via a URL in the libcurlemuinc parameter.
[]
null
null
null
null
null
GHSA-r8gc-4gr6-4vf3
The default configuration of the <Button2> binding in Uzbl before 2010.08.05 does not properly use the @SELECTED_URI feature, which allows user-assisted remote attackers to execute arbitrary commands via a crafted HREF attribute of an A element in an HTML document.
[]
null
null
null
null
null
GHSA-6ggh-94v9-v52c
in OpenHarmony v4.1.0 and prior versions allow a local attacker cause the common permission is upgraded to root and sensitive information leak through out-of-bounds write.
[]
null
8.4
null
null
null
CVE-2017-7940
The iw_read_gif_file function in imagew-gif.c in libimageworsener.a in ImageWorsener 1.3.0 allows remote attackers to consume an amount of available memory via a crafted file.
[ "cpe:2.3:a:entropymine:imageworsener:1.3.0:*:*:*:*:*:*:*" ]
null
null
5.5
4.3
null
CVE-2019-4295
IBM Robotic Process Automation with Automation Anywhere 11 could allow an attacker with specialized access to obtain highly sensitive from the credential vault. IBM X-Force ID: 160758.
[ "cpe:2.3:a:ibm:robotic_process_automation_with_automation_anywhere:*:*:*:*:*:*:*:*" ]
null
null
4.9
null
null
CVE-2022-36492
H3C Magic NX18 Plus NX18PV100R003 was discovered to contain a stack overflow via the function AddMacList.
[ "cpe:2.3:o:h3c:magic_nx18_plus_firmware:nx18pv100r003:*:*:*:*:*:*:*", "cpe:2.3:h:h3c:magic_nx18_plus:-:*:*:*:*:*:*:*" ]
null
7.8
null
null
null
GHSA-5gx5-pfq3-g683
Open redirect vulnerability in IBM FileNet Workplace 4.0.2 before 4.0.2.14 allows remote authenticated users to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors.
[]
null
null
6.8
null
null
CVE-2023-52640
fs/ntfs3: Fix oob in ntfs_listxattr
In the Linux kernel, the following vulnerability has been resolved: fs/ntfs3: Fix oob in ntfs_listxattr The length of name cannot exceed the space occupied by ea.
[]
null
7.1
null
null
null
CVE-2007-1703
SQL injection vulnerability in index.php in the RWCards (com_rwcards) 2.4.3 and earlier component for Joomla! allows remote attackers to execute arbitrary SQL commands via the category_id parameter.
[ "cpe:2.3:a:joomla:rwcards_component:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2025-59713
Snipe-IT before 8.1.18 allows unsafe deserialization.
[]
null
6.8
null
null
null
GHSA-7vcc-w55c-2r5p
Untrusted search path vulnerability in JetAudio 8.0.7.1000 Basic allows local users to gain privileges via a Trojan horse WNASPI32.DLL file in the current working directory, as demonstrated by a directory that contains a .mp3 file. NOTE: some of these details are obtained from third party information.
[]
null
null
null
null
null
CVE-2008-1005
WebCore, as used in Apple Safari before 3.1, does not properly mask the password field when reverse conversion is used with the Kotoeri input method, which allows physically proximate attackers to read the password.
[ "cpe:2.3:a:apple:safari:0.8:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:0.9:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.3:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:2.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:2.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.0.4:*:*:*:*:*:*:*" ]
null
null
null
2.1
null
GHSA-r4r4-cp78-rh67
stb stb_truetype.h through 1.22 has a heap-based buffer over-read in stbtt__buf_get8.
[]
null
null
null
null
null
GHSA-f8cc-p734-ww7f
Password exposure in Cognito Software Moneyworks 8.0.3 and earlier allows attackers to gain administrator access to all data, because verbose logging writes the administrator password to a world-readable file.
[]
null
null
9.8
null
null
CVE-2018-12158
Insufficient input validation in BIOS update utility in Intel NUC FW kits downloaded before May 24, 2018 may allow a privileged user to potentially trigger a denial of service or information disclosure via local access.
[ "cpe:2.3:o:intel:next_unit_of_computing_firmware:*:*:*:*:*:*:*:*" ]
null
null
6
5.6
null
CVE-2010-3415
Google Chrome before 6.0.472.59 does not properly implement Geolocation, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" ]
null
null
null
10
null
GHSA-68g3-xvmv-w62w
Insufficient control flow management for some Intel(R) Xeon Processors may allow an authenticated user to potentially enable denial of service via local access.
[]
6.8
6.5
null
null
null
RHSA-2025:0903
Red Hat Security Advisory: libsoup security update
libsoup: buffer overflow via UTF-8 conversion in soup_header_parse_param_list_strict
[ "cpe:/a:redhat:rhel_aus:8.2::appstream", "cpe:/o:redhat:rhel_aus:8.2::baseos" ]
null
9
null
null
null
CVE-2006-1047
Unspecified vulnerability in the "Remember Me login functionality" in Joomla! 1.0.7 and earlier has unknown impact and attack vectors.
[ "cpe:2.3:a:joomla:joomla:1.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla:1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla:1.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla:1.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla:1.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla:1.0.7:*:*:*:*:*:*:*" ]
null
null
null
10
null
GHSA-h935-95pr-wqf9
Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code via a crafted web page, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2016-3290.
[]
null
null
7.5
null
null
CVE-2009-1447
Unrestricted file upload vulnerability in admin/editor/image.php in e-cart.biz Free Shopping Cart allows remote attackers to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in images/.
[ "cpe:2.3:a:e-cart:free_shopping_cart:*:*:*:*:*:*:*:*" ]
null
null
null
6.8
null
CVE-2023-51446
GLPI LDAP Injection during authentication
GLPI is a Free Asset and IT Management Software package. When authentication is made against a LDAP, the authentication form can be used to perform LDAP injection. Upgrade to 10.0.12.
[ "cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*" ]
null
5.9
null
null
null
CVE-2025-40776
Birthday Attack against Resolvers supporting ECS
A `named` caching resolver that is configured to send ECS (EDNS Client Subnet) options may be vulnerable to a cache-poisoning attack. This issue affects BIND 9 versions 9.11.3-S1 through 9.16.50-S1, 9.18.11-S1 through 9.18.37-S1, and 9.20.9-S1 through 9.20.10-S1.
[]
null
8.6
null
null
null
CVE-2010-1053
Multiple SQL injection vulnerabilities in Zen Time Tracking 2.2 and earlier, when magic_quotes_gpc is disabled, allow remote attackers to execute arbitrary SQL commands via the (1) username and (2) password parameters to (a) userlogin.php and (b) managerlogin.php. NOTE: some of these details are obtained from third party information.
[ "cpe:2.3:a:zentracking:zen_time_tracking:*:*:*:*:*:*:*:*" ]
null
null
null
6.8
null
CVE-2024-8694
JFinalCMS com.cms.controller.admin.TemplateController update path traversal
A vulnerability, which was classified as problematic, was found in JFinalCMS up to 20240903. This affects the function update of the file /admin/template/update of the component com.cms.controller.admin.TemplateController. The manipulation of the argument fileName leads to path traversal. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
[ "cpe:2.3:a:jfinalcms_project:jfinalcms:*:*:*:*:*:*:*:*" ]
5.1
3.8
3.8
4.7
null
GHSA-fjgf-2jpq-hrjf
LibreOffice before 4.4.5 and Apache OpenOffice before 4.1.2 uses the stored LinkUpdateMode configuration information in OpenDocument Format files and templates when handling links, which might allow remote attackers to obtain sensitive information via a crafted document, which embeds data from local files into (1) Calc or (2) Writer.
[]
null
null
null
null
null
CVE-2006-0757
Multiple eval injection vulnerabilities in HiveMail 1.3 and earlier allow remote attackers to execute arbitrary PHP code via (1) the contactgroupid parameter in addressbook.update.php, (2) the messageid parameter in addressbook.add.php, (3) the folderid parameter in folders.update.php, and possibly certain parameters in (4) calendar.event.php, (5) index.php, (6) pop.download.php, (7) read.bounce.php, (8) rules.block.php, (9) language.php, and (10) certain other scripts, as demonstrated by an addressbook.update.php request with a contactgroupid value of phpinfo() preceded by facilitators.
[ "cpe:2.3:a:hivemail:hivemail:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:hivemail:hivemail:1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:hivemail:hivemail:1.2:*:*:*:*:*:*:*", "cpe:2.3:a:hivemail:hivemail:1.2.1_beta1:*:*:*:*:*:*:*", "cpe:2.3:a:hivemail:hivemail:1.2.1_rc:*:*:*:*:*:*:*", "cpe:2.3:a:hivemail:hivemail:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:hivemail:hivemail:1.2_sp1:*:*:*:*:*:*:*", "cpe:2.3:a:hivemail:hivemail:1.3:*:*:*:*:*:*:*", "cpe:2.3:a:hivemail:hivemail:1.3_beta1:*:*:*:*:*:*:*", "cpe:2.3:a:hivemail:hivemail:1.3_rc1:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2020-2608
Vulnerability in the Enterprise Manager Base Platform product of Oracle Enterprise Manager (component: Repository). Supported versions that are affected are 13.2.0.0 and 13.3.0.0. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Enterprise Manager Base Platform. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Enterprise Manager Base Platform accessible data as well as unauthorized update, insert or delete access to some of Enterprise Manager Base Platform accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Enterprise Manager Base Platform. CVSS 3.0 Base Score 6.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:L).
[ "cpe:2.3:a:oracle:enterprise_manager_base_platform:13.2.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:enterprise_manager_base_platform:13.3.0.0:*:*:*:*:*:*:*" ]
null
null
6
null
null
CVE-2020-17506
Artica Web Proxy 4.30.00000000 allows remote attacker to bypass privilege detection and gain web backend administrator privileges through SQL injection of the apikey parameter in fw.login.php.
[ "cpe:2.3:a:articatech:web_proxy:4.30.000000:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
null
CVE-2018-0692
Untrusted search path vulnerability in Baidu Browser Version 43.23.1000.500 and earlier allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.
[ "cpe:2.3:a:baidu:spark_browser:*:*:*:*:*:*:*:*" ]
null
null
7.8
9.3
null
RHSA-2014:1920
Red Hat Security Advisory: Red Hat JBoss Web Server 2.1.0 openssl security update
SSL/TLS: Padding Oracle On Downgraded Legacy Encryption attack
[ "cpe:/a:redhat:jboss_enterprise_web_server:2.1" ]
null
null
null
null
null
GHSA-gc9f-rwq2-6pg3
Improper access control in software for Intel(R) PROSet/Wireless Wi-Fi and Killer(TM) Wi-Fi in Windows 10 and 11 may allow a privileged user to potentially enable escalation of privilege via local access.
[]
null
6.7
null
null
null
CVE-2024-7335
TOTOLINK EX200 getSaveConfig buffer overflow
A vulnerability classified as critical has been found in TOTOLINK EX200 4.0.3c.7646_B20201211. Affected is the function getSaveConfig of the file /cgi-bin/cstecgi.cgi?action=save&setting. The manipulation of the argument http_host leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-273258 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
[ "cpe:2.3:o:totolink:ex200_firmware:4.0.3c.7646_b20201211:*:*:*:*:*:*:*", "cpe:2.3:h:totolink:ex200:-:*:*:*:*:*:*:*" ]
8.7
8.8
8.8
9
null
GHSA-m4cc-hx9x-r2qr
Heap-based buffer overflow in Adobe Reader and Acrobat 10.x before 10.1.15 and 11.x before 11.0.12, Acrobat and Acrobat Reader DC Classic before 2015.006.30060, and Acrobat and Acrobat Reader DC Continuous before 2015.008.20082 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-5096 and CVE-2015-5105.
[]
null
null
null
null
null
CVE-2025-29484
An out-of-memory error in the parseABC_NS_SET_INFO function of libming v0.4.8 allows attackers to cause a Denial of Service (DoS) due to allocator exhaustion.
[]
null
7.5
null
null
null
CVE-2021-43016
Adobe InCopy NULL Pointer Dereference Application Denial of Service
Adobe InCopy version 16.4 (and earlier) is affected by a Null pointer dereference vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[ "cpe:2.3:a:adobe:incopy:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
5.5
null
null
null
CVE-2024-4042
Post Grid, Form Maker, Popup Maker, WooCommerce Blocks, Post Blocks, Post Carousel - Combo Blocks <= 2.2.80 - Authenticated (Contributor+) Stored Cross-Site Scripting via Block Attribute
The Post Grid, Form Maker, Popup Maker, WooCommerce Blocks, Post Blocks, Post Carousel – Combo Blocks plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'class' attribute of the menu-wrap-item block in all versions up to, and including, 2.2.80 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[ "cpe:2.3:a:pickplugins:comboblocks:*:*:*:*:*:wordpress:*:*" ]
null
6.4
null
null
null
CVE-2024-57844
drm/xe: Fix fault on fd close after unbind
In the Linux kernel, the following vulnerability has been resolved: drm/xe: Fix fault on fd close after unbind If userspace holds an fd open, unbinds the device and then closes it, the driver shouldn't try to access the hardware. Protect it by using drm_dev_enter()/drm_dev_exit(). This fixes the following page fault: <6> [IGT] xe_wedged: exiting, ret=98 <1> BUG: unable to handle page fault for address: ffffc901bc5e508c <1> #PF: supervisor read access in kernel mode <1> #PF: error_code(0x0000) - not-present page ... <4> xe_lrc_update_timestamp+0x1c/0xd0 [xe] <4> xe_exec_queue_update_run_ticks+0x50/0xb0 [xe] <4> xe_exec_queue_fini+0x16/0xb0 [xe] <4> __guc_exec_queue_fini_async+0xc4/0x190 [xe] <4> guc_exec_queue_fini_async+0xa0/0xe0 [xe] <4> guc_exec_queue_fini+0x23/0x40 [xe] <4> xe_exec_queue_destroy+0xb3/0xf0 [xe] <4> xe_file_close+0xd4/0x1a0 [xe] <4> drm_file_free+0x210/0x280 [drm] <4> drm_close_helper.isra.0+0x6d/0x80 [drm] <4> drm_release_noglobal+0x20/0x90 [drm] (cherry picked from commit 4ca1fd418338d4d135428a0eb1e16e3b3ce17ee8)
[]
null
5.5
null
null
null
GHSA-99qr-9cc9-fv2x
Moderate severity vulnerability that affects org.apache.hadoop:hadoop-main
In Apache Hadoop versions 2.6.1 to 2.6.5, 2.7.0 to 2.7.3, and 3.0.0-alpha1, if a file in an encryption zone with access permissions that make it world readable is localized via YARN's localization mechanism, that file will be stored in a world-readable location and can be shared freely with any application that requests to localize that file.
[]
null
null
7.8
null
null
RHSA-2024:3560
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.17 Security update
datatables.net: contents of array not escaped by HTML escape entities function EAP: wildfly-elytron has a SSRF security issue cxf-core: Apache CXF SSRF Vulnerability using the Aegis databinding
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el8" ]
null
7.4
null
null
null
CVE-2004-2244
The XML parser in Oracle 9i Application Server Release 2 9.0.3.0 and 9.0.3.1, 9.0.2.3 and earlier, and Release 1 1.0.2.2 and 1.0.2.2.2, and Database Server Release 2 9.2.0.1 and later, allows remote attackers to cause a denial of service (CPU and memory consumption) via a SOAP message containing a crafted DTD.
[ "cpe:2.3:a:oracle:application_server:1.0.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:application_server:1.0.2.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:application_server:9.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:application_server:9.0.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:oracle9i:enterprise_9.0.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:oracle9i:enterprise_9.2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:oracle9i:enterprise_9.2.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:oracle9i:personal_9.0.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:oracle9i:personal_9.2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:oracle9i:personal_9.2.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:oracle9i:standard_9.0.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:oracle9i:standard_9.2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:oracle9i:standard_9.2.0.2:*:*:*:*:*:*:*" ]
null
null
null
5
null
GHSA-mpqr-xh68-rm34
Parameter AttFilterValue in ednareporting.asmx is vulnerable to unauthenticated SQL injection attacks. Specially crafted SOAP web requests can cause SQL injections resulting in data compromise. An attacker can send unauthenticated HTTP requests to trigger this vulnerability.
[]
null
null
null
null
null
CVE-2023-25838
BUG-000157278 – ArcGIS Insights has a security vulnerability.
There is SQL injection vulnerability in Esri ArcGIS Insights 2022.1 for ArcGIS Enterprise and that may allow a remote, authorized attacker to execute arbitrary SQL commands against the back-end database. The effort required to generate the crafted input required to exploit this issue is complex and requires significant effort before a successful attack can be expected.
[ "cpe:2.3:a:esri:arcgis_insights:2022.1:*:*:*:*:*:*:*" ]
null
7.5
null
null
null
CVE-2022-42522
In DoSetCarrierConfig of miscservice.cpp, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-243130038References: N/A
[ "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*" ]
null
4.4
null
null
null
RHSA-2003:030
Red Hat Security Advisory: lynx security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw" ]
null
null
null
null
null
GHSA-j3cm-5453-m956
Cavok – CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
[]
null
9.8
null
null
null
CVE-2003-0812
Stack-based buffer overflow in a logging function for Windows Workstation Service (WKSSVC.DLL) allows remote attackers to execute arbitrary code via RPC calls that cause long entries to be written to a debug log file ("NetSetup.LOG"), as demonstrated using the NetAddAlternateComputerName API.
[ "cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2000:*:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2000:*:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2000:*:sp3:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:*:64-bit:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:*:home:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:*:media_center:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:gold:professional:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:sp1:64-bit:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:sp1:home:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2022-21281
Vulnerability in the Primavera Portfolio Management product of Oracle Construction and Engineering (component: Web Access). Supported versions that are affected are 18.0.0.0-18.0.3.0, 19.0.0.0-19.0.1.2, 20.0.0.0 and 20.0.0.1. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Primavera Portfolio Management. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Primavera Portfolio Management, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Primavera Portfolio Management accessible data as well as unauthorized read access to a subset of Primavera Portfolio Management accessible data. CVSS 3.1 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N).
[ "cpe:2.3:a:oracle:primavera_portfolio_management:*:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:primavera_portfolio_management:20.0.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:primavera_portfolio_management:20.0.0.1:*:*:*:*:*:*:*" ]
null
4.8
null
null
null
CVE-2018-12359
A buffer overflow can occur when rendering canvas content while adjusting the height and width of the canvas element dynamically, causing data to be written outside of the currently computed boundaries. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 60, Thunderbird < 52.9, Firefox ESR < 60.1, Firefox ESR < 52.9, and Firefox < 61.
[ "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:52.9.1:*:*:*:*:*:*:*" ]
null
null
8.8
6.8
null
CVE-2025-53821
WeGIA vulnerable to Open Redirect in endpoint 'control.php' parameter 'nextPage'
WeGIA is an open source web manager with a focus on the Portuguese language and charitable institutions. An Open Redirect vulnerability exists in the web application prior to version 3.4.5. The control.php endpoint allows to specify an arbitrary URL via the `nextPage` parameter, leading to an uncontrolled redirection. Version 3.4.5 contains a fix for the issue.
[]
null
4.7
null
null
null
CVE-2010-5275
Cross-site scripting (XSS) vulnerability in memcache_admin in the Memcache module 5.x before 5.x-1.10 and 6.x before 6.x-1.6 for Drupal allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
[ "cpe:2.3:a:memcache_project:memcache:5.x-1.0:*:*:*:*:*:*:*", "cpe:2.3:a:memcache_project:memcache:5.x-1.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:memcache_project:memcache:5.x-1.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:memcache_project:memcache:5.x-1.0:deprecated:*:*:*:*:*:*", "cpe:2.3:a:memcache_project:memcache:5.x-1.1:*:*:*:*:*:*:*", "cpe:2.3:a:memcache_project:memcache:5.x-1.2:*:*:*:*:*:*:*", "cpe:2.3:a:memcache_project:memcache:5.x-1.3:*:*:*:*:*:*:*", "cpe:2.3:a:memcache_project:memcache:5.x-1.4:*:*:*:*:*:*:*", "cpe:2.3:a:memcache_project:memcache:5.x-1.5:*:*:*:*:*:*:*", "cpe:2.3:a:memcache_project:memcache:5.x-1.6:*:*:*:*:*:*:*", "cpe:2.3:a:memcache_project:memcache:5.x-1.7:*:*:*:*:*:*:*", "cpe:2.3:a:memcache_project:memcache:5.x-1.8:*:*:*:*:*:*:*", "cpe:2.3:a:memcache_project:memcache:5.x-1.9:*:*:*:*:*:*:*", "cpe:2.3:a:memcache_project:memcache:5.x-1.x:dev:*:*:*:*:*:*", "cpe:2.3:a:memcache_project:memcache:6.x-1.0:*:*:*:*:*:*:*", "cpe:2.3:a:memcache_project:memcache:6.x-1.1:*:*:*:*:*:*:*", "cpe:2.3:a:memcache_project:memcache:6.x-1.2:*:*:*:*:*:*:*", "cpe:2.3:a:memcache_project:memcache:6.x-1.3:*:*:*:*:*:*:*", "cpe:2.3:a:memcache_project:memcache:6.x-1.4:*:*:*:*:*:*:*", "cpe:2.3:a:memcache_project:memcache:6.x-1.4:rc1:*:*:*:*:*:*", "cpe:2.3:a:memcache_project:memcache:6.x-1.5:*:*:*:*:*:*:*", "cpe:2.3:a:memcache_project:memcache:6.x-1.5:rc1:*:*:*:*:*:*", "cpe:2.3:a:memcache_project:memcache:6.x-1.x:dev:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:-:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
GHSA-v538-h8wg-rjxf
CastleNet CBV38Z4EC 125.553mp1.39219mp1.899.007, CBV38Z4ECNIT 125.553mp1.39219mp1.899.005ITT, CBW383G4J 37.556mp5.008, and CBW38G4J 37.553mp1.008 devices allow remote attackers to discover credentials via iso.3.6.1.4.1.4491.2.4.1.1.6.1.1.0 and iso.3.6.1.4.1.4491.2.4.1.1.6.1.2.0 SNMP requests.
[]
null
null
9.8
null
null
CVE-2010-4533
offlineimap before 6.3.4 added support for SSL server certificate validation but it is still possible to use SSL v2 protocol, which is a flawed protocol with multiple security deficiencies.
[ "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe:2.3:a:offlineimap:offlineimap:*:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
null