id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
189k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
patch_commit_url
stringlengths
36
232
RHSA-2021:3946
Red Hat Security Advisory: redis:5 security update
redis: Lua scripts can overflow the heap-based Lua stack redis: Integer overflow issue with Streams redis: Integer overflow bug in the ziplist data structure redis: Denial of service via Redis Standard Protocol (RESP) request redis: Integer overflow issue with intsets redis: Integer overflow issue with strings
[ "cpe:/a:redhat:rhel_eus:8.1::appstream" ]
null
7.5
null
null
null
CVE-2006-6469
Xerox WorkCentre and WorkCentre Pro before 12.050.03.000, 13.x before 13.050.03.000, and 14.x before 14.050.03.000 do not block the postgres port (5432/tcp), which has unknown impact and remote attack vectors, probably related to unauthorized connections to a PostgreSQL daemon.
[ "cpe:2.3:h:xerox:workcentre:*:*:*:*:*:*:*:*", "cpe:2.3:h:xerox:workcentre:*:*:pro:*:*:*:*:*" ]
null
null
null
5.8
null
GHSA-9whh-jc85-fxmx
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.24. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox as well as unauthorized update, insert or delete access to some of Oracle VM VirtualBox accessible data and unauthorized read access to a subset of Oracle VM VirtualBox accessible data. Note: This vulnerability applies to Solaris x86 and Linux systems only. CVSS 3.1 Base Score 7.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:H).
[]
null
7.3
null
null
null
CVE-2022-0660
Generation of Error Message Containing Sensitive Information in microweber/microweber
Generation of Error Message Containing Sensitive Information in Packagist microweber/microweber prior to 1.2.11.
[ "cpe:2.3:a:microweber:microweber:*:*:*:*:*:*:*:*" ]
null
null
9.4
null
null
GHSA-vjh6-vph2-j2q4
The Integration for Pipedrive and Contact Form 7, WPForms, Elementor, Ninja Forms plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.2.3 via deserialization of untrusted input within the verify_field_val() function. This makes it possible for unauthenticated attackers to inject a PHP Object. The additional presence of a POP chain in the Contact Form 7 plugin, which is likely to be used alongside, allows attackers to delete arbitrary files, leading to a denial of service or remote code execution when the wp-config.php file is deleted.
[]
null
9.8
null
null
null
CVE-2020-24406
Document root path disclosure on Maintenance page
When in maintenance mode, Magento version 2.4.0 and 2.3.4 (and earlier) are affected by an information disclosure vulnerability that could expose the installation path during build deployments. This information could be helpful to attackers if they are able to identify other exploitable vulnerabilities in the environment.
[ "cpe:2.3:a:magento:magento:*:*:*:*:commerce:*:*:*", "cpe:2.3:a:magento:magento:*:*:*:*:open_source:*:*:*", "cpe:2.3:a:magento:magento:2.4.0:*:*:*:commerce:*:*:*", "cpe:2.3:a:magento:magento:2.4.0:*:*:*:open_source:*:*:*" ]
null
3.7
null
null
null
GHSA-7xfw-m94r-38p2
Path traversal vulnerability in Cybozu Garoon 4.0.0 to 5.0.1 allows remote authenticated attackers to obtain unintended information via unspecified vectors.
[]
null
null
null
null
null
CVE-2014-5026
Multiple cross-site scripting (XSS) vulnerabilities in Cacti 0.8.8b allow remote authenticated users with console access to inject arbitrary web script or HTML via a (1) Graph Tree Title in a delete or (2) edit action; (3) CDEF Name, (4) Data Input Method Name, or (5) Host Templates Name in a delete action; (6) Data Source Title; (7) Graph Title; or (8) Graph Template Name in a delete or (9) duplicate action.
[ "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:cacti:cacti:0.8.8b:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*" ]
null
null
null
3.5
null
GHSA-c9gr-fm33-6r9r
The Ads Pro Plugin - Multi-Purpose WordPress Advertising Manager plugin for WordPress is vulnerable to Local File Inclusion which leads to Remote Code Execution in all versions up to, and including, 4.89. This is due to the presence of a SQL Injection vulnerability and Local File Inclusion vulnerability that can be chained with an image upload. This makes it possible for unauthenticated attackers to execute code on the server upload image files on the server than can be fetched via a SQL injection vulnerability, and ultimately executed as PHP code through the local file inclusion vulnerability.
[]
null
9.8
null
null
null
RHSA-2021:2475
Red Hat Security Advisory: Red Hat Process Automation Manager 7.11.0 security update
xmlgraphics-commons: SSRF due to improper input validation by the XMPParser jackson-databind: FasterXML DOMDeserializer insecure entity expansion is vulnerable to XML external entity (XXE) XStream: Server-Side Forgery Request vulnerability can be activated when unmarshalling XStream: arbitrary file deletion on the local host when unmarshalling XStream: allow a remote attacker to cause DoS only by manipulating the processed input stream XStream: SSRF via crafted input stream XStream: arbitrary file deletion on the local host via crafted input stream XStream: Unsafe deserizaliation of javax.sql.rowset.BaseRowSet XStream: Unsafe deserizaliation of com.sun.corba.se.impl.activation.ServerTableEntry XStream: Unsafe deserizaliation of sun.swing.SwingLazyValue XStream: Unsafe deserizaliation of com.sun.tools.javac.processing.JavacProcessingEnvironment NameProcessIterator XStream: ReDoS vulnerability XStream: SSRF can be activated unmarshalling with XStream to access data streams from an arbitrary URL referencing a resource in an intranet or the local host XStream: Unsafe deserizaliation of com.sun.org.apache.bcel.internal.util.ClassLoader XStream: allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream
[ "cpe:/a:redhat:jboss_enterprise_bpms_platform:7.11" ]
null
8
null
null
null
CVE-2025-56499
Incorrect access control in mihomo v1.19.11 allows authenticated attackers with low-level privileges to read arbitrary files with elevated privileges via obtaining the external control key from the config file.
[]
null
null
null
null
null
GHSA-6qxv-37xg-xg4w
Certain HP Enterprise LaserJet and HP LaserJet Managed Printers are potentially vulnerable to information disclosure when IPsec is enabled with FutureSmart version 5.6.
[]
null
7.5
null
null
null
CVE-2017-7067
An issue was discovered in certain Apple products. macOS before 10.12.6 is affected. The issue involves the "Kernel" component. It allows attackers to bypass intended memory-read restrictions via a crafted app.
[ "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*" ]
null
null
5.5
4.3
null
GHSA-v9vm-w355-5p8c
The administrative linker functionality in Atlassian Fisheye and Crucible before version 4.7.0 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the href parameter.
[]
null
null
4.8
null
null
CVE-2023-1908
SourceCodester Simple Mobile Comparison Website GET Parameter view_category.php sql injection
A vulnerability was found in SourceCodester Simple Mobile Comparison Website 1.0. It has been classified as critical. Affected is an unknown function of the file /admin/categories/view_category.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-225150 is the identifier assigned to this vulnerability.
[ "cpe:2.3:a:simple_mobile_comparison_website_project:simple_mobile_comparison_website:1.0:*:*:*:*:*:*:*" ]
null
6.3
6.3
6.5
null
GHSA-7v3x-w835-5wrm
Cisco IOS 12.4 and 15.0 through 15.6 and IOS XE 3.1 through 3.18 and 16.1 allow remote attackers to cause a denial of service (memory consumption or device reload) via fragmented IKEv1 packets, aka Bug ID CSCuy47382.
[]
null
null
7.5
null
null
CVE-2006-4464
The Nokia Browser, possibly Nokia Symbian 60 Browser 3rd edition, allows remote attackers to cause a denial of service (crash) via JavaScript that constructs a large Unicode string.
[ "cpe:2.3:a:nokia:symbian:s60:3:*:*:*:*:*:*" ]
null
null
null
5
null
CVE-2020-14536
Vulnerability in the Oracle Commerce Guided Search / Oracle Commerce Experience Manager product of Oracle Commerce (component: Workbench). Supported versions that are affected are 11.0, 11.1, 11.2 and prior to 11.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Commerce Guided Search / Oracle Commerce Experience Manager. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Commerce Guided Search / Oracle Commerce Experience Manager accessible data as well as unauthorized access to critical data or complete access to all Oracle Commerce Guided Search / Oracle Commerce Experience Manager accessible data. CVSS 3.1 Base Score 7.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N).
[ "cpe:2.3:a:oracle:commerce_experience_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:commerce_guided_search:*:*:*:*:*:*:*:*" ]
null
7.4
null
null
null
CVE-2024-6292
Use after free in Dawn in Google Chrome prior to 126.0.6478.126 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*" ]
null
7.5
null
null
null
CVE-2022-1071
User after free in mrb_vm_exec in mruby/mruby
User after free in mrb_vm_exec in GitHub repository mruby/mruby prior to 3.2.
[ "cpe:2.3:a:mruby:mruby:*:*:*:*:*:*:*:*" ]
null
null
7.7
null
null
CVE-2022-48851
staging: gdm724x: fix use after free in gdm_lte_rx()
In the Linux kernel, the following vulnerability has been resolved: staging: gdm724x: fix use after free in gdm_lte_rx() The netif_rx_ni() function frees the skb so we can't dereference it to save the skb->len.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
null
7.8
null
null
null
GHSA-r7xh-cr9c-6wxq
In the Linux kernel, the following vulnerability has been resolved:staging: vt6655: fix some erroneous memory clean-up loopsIn some initialization functions of this driver, memory is allocated with 'i' acting as an index variable and increasing from 0. The commit in "Fixes" introduces some clean-up codes in case of allocation failure, which free memory in reverse order with 'i' decreasing to 0. However, there are some problems:The case i=0 is left out. Thus memory is leaked.In case memory allocation fails right from the start, the memory freeing loops will start with i=-1 and invalid memory locations will be accessed.One of these loops has been fixed in commit c8ff91535880 ("staging: vt6655: fix potential memory leak"). Fix the remaining erroneous loops.
[]
null
null
null
null
null
GHSA-8mxj-8hjq-5r24
Unspecified vulnerability in the Oracle Applications Framework component in Oracle E-Business Suite 11.5.10.2, 12.0.6, and 12.1.2 allows remote authenticated users to affect confidentiality via unknown vectors.
[]
null
null
null
null
null
GHSA-g56j-5qqv-7cxw
Multiple cross-site request forgery (CSRF) vulnerabilities in the admin panel in osCMax before 2.5.1 allow remote attackers to hijack the authentication of administrators for requests that conduct SQL injection attacks via the (1) status parameter to admin/stats_monthly_sales.php or (2) country parameter in a process action to admin/create_account_process.php.
[]
null
null
null
null
null
GHSA-g3h3-m2g5-25f2
A vulnerability, which was classified as critical, was found in WoWonder. Affected is the file /requests.php which is responsible to handle group messages. The manipulation of the argument group_id allows posting messages in other groups. It is possible to launch the attack remotely but it might require authentication. A video explaining the attack has been disclosed to the public.
[]
null
4.3
null
null
null
GHSA-975p-qpvw-m767
Out-of-bounds write in Linux kernel mode driver for some Intel(R) Ethernet Network Controllers and Adapters before version 28.3 may allow an authenticated user to potentially enable escalation of privilege via local access.
[]
9.3
8.8
null
null
null
CVE-2010-0578
The IKE implementation in Cisco IOS 12.2 through 12.4 on Cisco 7200 and 7301 routers with VAM2+ allows remote attackers to cause a denial of service (device reload) via a malformed IKE packet, aka Bug ID CSCtb13491.
[ "cpe:2.3:o:cisco:ios:12.2sb:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2sca:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2scb:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2scc:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2sra:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3t:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3xe:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3xj:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3xr:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3xu:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3xw:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3xx:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3yf:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3yg:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3yk:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3yq:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3ys:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3yu:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3yx:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3za:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4gc:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4ja:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4jda:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4jdc:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4jdd:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4jk:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4jl:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4jma:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4jmb:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4jx:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4md:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4mda:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4mr:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4sw:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4t:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xa:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xb:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xc:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xd:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xe:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xf:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xg:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xj:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xk:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xl:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xm:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xn:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xp:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xq:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xr:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xt:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xv:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xw:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xy:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xz:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4ya:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4yb:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4yd:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4ye:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4yg:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:7200_router:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:7301_router:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:router_7200:*:*:*:*:*:*:*:*" ]
null
null
null
7.8
null
GHSA-5mjw-pmfh-7vh5
Multiple cross-site scripting (XSS) vulnerabilities in qdPM 8.3 allow remote attackers to inject arbitrary web script or HTML via the (1) search[keywords] parameter to index.php/users page; the (2) "Name of application" on index.php/configuration; (3) a new project name on index.php/projects; (4) the task name on index.php/tasks; (5) ticket name on index.php/tickets; (6) discussion name on index.php/discussions; (7) report name on index.php/projectReports; or (8) event name on index.php/scheduler/personal.
[]
null
null
6.1
null
null
CVE-2021-26989
Clustered Data ONTAP versions prior to 9.3P21, 9.5P16, 9.6P12, 9.7P9 and 9.8 are susceptible to a vulnerability which could allow a remote authenticated attacker to cause a Denial of Service (DoS) on clustered Data ONTAP configured for SMB access.
[ "cpe:2.3:o:netapp:data_ontap:9.3.0:-:*:*:*:*:*:*", "cpe:2.3:o:netapp:data_ontap:9.3.0:p1:*:*:*:*:*:*", "cpe:2.3:o:netapp:data_ontap:9.3.0:p10:*:*:*:*:*:*", "cpe:2.3:o:netapp:data_ontap:9.3.0:p11:*:*:*:*:*:*", "cpe:2.3:o:netapp:data_ontap:9.3.0:p12:*:*:*:*:*:*", "cpe:2.3:o:netapp:data_ontap:9.3.0:p13:*:*:*:*:*:*", "cpe:2.3:o:netapp:data_ontap:9.3.0:p14:*:*:*:*:*:*", "cpe:2.3:o:netapp:data_ontap:9.3.0:p15:*:*:*:*:*:*", "cpe:2.3:o:netapp:data_ontap:9.3.0:p16:*:*:*:*:*:*", "cpe:2.3:o:netapp:data_ontap:9.3.0:p17:*:*:*:*:*:*", "cpe:2.3:o:netapp:data_ontap:9.3.0:p18:*:*:*:*:*:*", "cpe:2.3:o:netapp:data_ontap:9.3.0:p19:*:*:*:*:*:*", "cpe:2.3:o:netapp:data_ontap:9.3.0:p2:*:*:*:*:*:*", "cpe:2.3:o:netapp:data_ontap:9.3.0:p20:*:*:*:*:*:*", "cpe:2.3:o:netapp:data_ontap:9.3.0:p3:*:*:*:*:*:*", "cpe:2.3:o:netapp:data_ontap:9.3.0:p4:*:*:*:*:*:*", "cpe:2.3:o:netapp:data_ontap:9.3.0:p5:*:*:*:*:*:*", "cpe:2.3:o:netapp:data_ontap:9.3.0:p6:*:*:*:*:*:*", "cpe:2.3:o:netapp:data_ontap:9.3.0:p7:*:*:*:*:*:*", "cpe:2.3:o:netapp:data_ontap:9.3.0:p8:*:*:*:*:*:*", "cpe:2.3:o:netapp:data_ontap:9.3.0:p9:*:*:*:*:*:*", "cpe:2.3:o:netapp:data_ontap:9.5.0:-:*:*:*:*:*:*", "cpe:2.3:o:netapp:data_ontap:9.5.0:p1:*:*:*:*:*:*", "cpe:2.3:o:netapp:data_ontap:9.5.0:p10:*:*:*:*:*:*", "cpe:2.3:o:netapp:data_ontap:9.5.0:p11:*:*:*:*:*:*", "cpe:2.3:o:netapp:data_ontap:9.5.0:p12:*:*:*:*:*:*", "cpe:2.3:o:netapp:data_ontap:9.5.0:p13:*:*:*:*:*:*", "cpe:2.3:o:netapp:data_ontap:9.5.0:p14:*:*:*:*:*:*", "cpe:2.3:o:netapp:data_ontap:9.5.0:p15:*:*:*:*:*:*", "cpe:2.3:o:netapp:data_ontap:9.5.0:p2:*:*:*:*:*:*", "cpe:2.3:o:netapp:data_ontap:9.5.0:p3:*:*:*:*:*:*", "cpe:2.3:o:netapp:data_ontap:9.5.0:p4:*:*:*:*:*:*", "cpe:2.3:o:netapp:data_ontap:9.5.0:p5:*:*:*:*:*:*", "cpe:2.3:o:netapp:data_ontap:9.5.0:p6:*:*:*:*:*:*", "cpe:2.3:o:netapp:data_ontap:9.5.0:p7:*:*:*:*:*:*", "cpe:2.3:o:netapp:data_ontap:9.5.0:p8:*:*:*:*:*:*", "cpe:2.3:o:netapp:data_ontap:9.5.0:p9:*:*:*:*:*:*", "cpe:2.3:o:netapp:data_ontap:9.6.0:-:*:*:*:*:*:*", "cpe:2.3:o:netapp:data_ontap:9.6.0:p1:*:*:*:*:*:*", "cpe:2.3:o:netapp:data_ontap:9.6.0:p10:*:*:*:*:*:*", "cpe:2.3:o:netapp:data_ontap:9.6.0:p11:*:*:*:*:*:*", "cpe:2.3:o:netapp:data_ontap:9.6.0:p2:*:*:*:*:*:*", "cpe:2.3:o:netapp:data_ontap:9.6.0:p3:*:*:*:*:*:*", "cpe:2.3:o:netapp:data_ontap:9.6.0:p4:*:*:*:*:*:*", "cpe:2.3:o:netapp:data_ontap:9.6.0:p5:*:*:*:*:*:*", "cpe:2.3:o:netapp:data_ontap:9.6.0:p6:*:*:*:*:*:*", "cpe:2.3:o:netapp:data_ontap:9.6.0:p7:*:*:*:*:*:*", "cpe:2.3:o:netapp:data_ontap:9.6.0:p8:*:*:*:*:*:*", "cpe:2.3:o:netapp:data_ontap:9.6.0:p9:*:*:*:*:*:*", "cpe:2.3:o:netapp:data_ontap:9.7.0:-:*:*:*:*:*:*", "cpe:2.3:o:netapp:data_ontap:9.7.0:p1:*:*:*:*:*:*", "cpe:2.3:o:netapp:data_ontap:9.7.0:p2:*:*:*:*:*:*", "cpe:2.3:o:netapp:data_ontap:9.7.0:p3:*:*:*:*:*:*", "cpe:2.3:o:netapp:data_ontap:9.7.0:p4:*:*:*:*:*:*", "cpe:2.3:o:netapp:data_ontap:9.7.0:p5:*:*:*:*:*:*", "cpe:2.3:o:netapp:data_ontap:9.7.0:p6:*:*:*:*:*:*", "cpe:2.3:o:netapp:data_ontap:9.7.0:p7:*:*:*:*:*:*", "cpe:2.3:o:netapp:data_ontap:9.8.0:-:*:*:*:*:*:*" ]
null
6.5
null
3.5
null
GHSA-2rmr-49w2-jxx7
Data Illusion Survey Software Solutions ngSurvey version 2.4.28 and below is vulnerable to Denial of Service if a survey contains a "Text Field", "Comment Field" or "Contact Details".
[]
null
7.5
null
null
null
CVE-2018-1524
IBM Maximo Asset Management 7.6 through 7.6.3 installs with a default administrator account that a remote intruder could use to gain administrator access to the system. This vulnerability is due to an incomplete fix for CVE-2015-4966. IBM X-Force ID: 142116.
[ "cpe:2.3:a:ibm:maximo_asset_management:*:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_for_aviation:7.6.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_for_aviation:7.6.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_for_aviation:7.6.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_for_aviation:7.6.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_for_aviation:7.6.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_for_life_sciences:7.6.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_for_nuclear_power:7.6.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_for_oil_and_gas:7.5.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_for_oil_and_gas:7.6.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_for_transportation:7.6.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_for_transportation:7.6.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_for_transportation:7.6.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_for_transportation:7.6.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_for_transportation:7.6.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_for_transportation:7.6.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_for_utilities:7.6.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:smartcloud_control_desk:7.6.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:smartcloud_control_desk:7.6.0.1:*:*:*:*:*:*:*" ]
null
null
8.8
null
null
CVE-2005-1478
Format string vulnerability in dSMTP (dsmtp.exe) in DMail 3.1a allows remote attackers to execute arbitrary code via format string specifiers in the xtellmail command.
[ "cpe:2.3:a:netwin:dmail:3.1a:*:*:*:*:*:*:*", "cpe:2.3:a:netwin:dmail:3.1b:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
GHSA-xv4c-h899-8cjv
A vulnerability was found in code-projects E-Commerce Website 1.0. Affected is an unknown function of the file /pages/product_add.php. The manipulation of the argument prod_name/prod_desc/prod_cost results in cross site scripting. It is possible to launch the attack remotely. The exploit has been made public and could be used.
[]
2.1
4.3
null
null
null
GHSA-vv4q-84xw-r5qv
The BoomBox Theme Extensions plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1.8.0 via the 'boombox_listing' shortcode 'type' attribute. This makes it possible for authenticated attackers, with contributor-level and above permissions, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where php file type can be uploaded and included.
[]
null
8.8
null
null
null
CVE-2022-39915
Improper access control vulnerability in Calendar prior to versions 11.6.08.0 in Android Q(10), 12.2.11.3000 in Android R(11), 12.3.07.2000 in Android S(12), and 12.4.02.0 in Android T(13) allows attackers to access sensitive information via implicit intent.
[ "cpe:2.3:a:samsung:calendar:*:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*" ]
null
3.3
null
null
null
GHSA-3867-jc5c-66qf
Broken Access Control order API in Shopware
ImpactIn the Shopware CMS, the state handler for orders fails to sufficiently verify user authorizations for actions that modify the payment, delivery, and/or order status. Due to this inadequate implementation, users lacking 'write' permissions for orders are still able to change the order state.PatchesUpdate to Shopware 6.5.7.4WorkaroundsFor older versions of 6.1, 6.2, 6.3 and 6.4 corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version.
[]
null
4.9
null
null
null
GHSA-4vrx-hp2c-wxxw
A vulnerability, which was classified as critical, has been found in SourceCodester Client Database Management System 1.0. This issue affects some unknown processing of the file /user_customer_create_order.php. The manipulation of the argument user_id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
[]
5.5
7.3
null
null
null
PYSEC-2021-651
null
TensorFlow is an end-to-end open source platform for machine learning. An attacker can trigger a division by 0 in `tf.raw_ops.Conv2DBackpropInput`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/b40060c9f697b044e3107917c797ba052f4506ab/tensorflow/core/kernels/conv_grad_input_ops.h#L625-L655) does a division by a quantity that is controlled by the caller. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
[]
null
null
null
null
null
ICSA-22-342-03
Rockwell Automation Logix controllers
An unauthorized user could use a specially crafted sequence of Ethernet and IP messages and combine them with heavy traffic loading to cause a denial-of-service condition in Rockwell Automation Logix controllers, resulting in a denial-of-service condition. If the target device becomes unavailable in this condition, a user would have to clear and redownload the user project file to bring the device back online.CVE-2022-3752 has been assigned to this vulnerability. A CVSS v3 base score of 8.6 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H).
[]
null
null
8.6
null
null
CVE-2023-38230
ZDI-CAN-21318: Adobe Acrobat Reader DC Font Parsing Use-After-Free Information Disclosure Vulnerability
Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by a Use-After-Free vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[ "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*" ]
null
5.5
null
null
null
GHSA-9pj4-3hjv-frj6
Unspecified vulnerability in the PeopleSoft Enterprise FMS - Cash Management component in Oracle PeopleSoft and JDEdwards Suite 8.9 Bundle #38, 9.0 Bundle #31, and 9.1 Bundle #6 allows remote authenticated users to affect confidentiality and integrity via unknown vectors.
[]
null
null
null
null
null
CVE-2018-15995
Adobe Acrobat and Reader versions 2019.008.20081 and earlier, 2019.008.20080 and earlier, 2019.008.20081 and earlier, 2017.011.30106 and earlier version, 2017.011.30105 and earlier version, 2015.006.30457 and earlier, and 2015.006.30456 and earlier have an integer overflow vulnerability. Successful exploitation could lead to information disclosure.
[ "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*" ]
null
null
6.5
4.3
null
GHSA-7f7j-qrh6-xj4j
CuteNews 2.0.1 allows remote authenticated attackers to execute arbitrary PHP code via unspecified vectors.
[]
null
null
null
null
null
CVE-2025-20218
Cisco Secure Firepower Management Center Software XPATH Injection Vulnerability
A vulnerability in the web-based management interface of Cisco Secure Firewall Management Center (FMC) Software could allow an authenticated, remote attacker to retrieve sensitive information from an affected device. This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending a crafted request to the web-based management interface of an affected device. A successful exploit could allow the attacker to retrieve sensitive information from the affected device. To exploit this vulnerability, the attacker must have valid administrative credentials.
[]
null
4.9
null
null
null
CVE-2022-40144
A vulnerability in Trend Micro Apex One and Trend Micro Apex One as a Service could allow an attacker to bypass the product's login authentication by falsifying request parameters on affected installations.
[ "cpe:2.3:a:trendmicro:apex_one:-:*:*:*:*:saas:*:*", "cpe:2.3:a:trendmicro:apex_one:2019:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
9.8
null
null
null
GHSA-xgmg-7q7c-fhxx
The AI ChatBot for WordPress – WPBot plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 5.5.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
[]
null
5.5
null
null
null
GHSA-gj9x-3fhj-p23h
The CIDAM Protocol on some Huawei Products has multiple input validation vulnerabilities due to insufficient validation of specific messages when the protocol is implemented. An authenticated remote attacker could send a malicious message to a target system. Successful exploit could allow the attacker to tamper with business and make the system abnormal. Affected Huawei Products are: DP300 versions V500R002C00, V500R002C00B010, V500R002C00B011, V500R002C00B012, V500R002C00B013, V500R002C00B014, V500R002C00B017, V500R002C00B018, V500R002C00SPC100, V500R002C00SPC200, V500R002C00SPC300, V500R002C00SPC400, V500R002C00SPC500, V500R002C00SPC600, V500R002C00SPC800, V500R002C00SPC900, V500R002C00SPCa00; RP200 versions V500R002C00SPC200, V600R006C00, V600R006C00SPC200, V600R006C00SPC300, V600R006C00SPC400, V600R006C00SPC500; TE30 versions V100R001C10SPC300, V100R001C10SPC500, V100R001C10SPC600, V100R001C10SPC700B010, V500R002C00SPC200, V500R002C00SPC500, V500R002C00SPC600, V500R002C00SPC700, V500R002C00SPC900, V500R002C00SPCb00, V600R006C00, V600R006C00SPC200, V600R006C00SPC300, V600R006C00SPC400, V600R006C00SPC500; TE40 versions V500R002C00SPC600, V500R002C00SPC700, V500R002C00SPC900, V500R002C00SPCb00, V600R006C00, V600R006C00SPC200, V600R006C00SPC300, V600R006C00SPC400, V600R006C00SPC500; TE50 versions V500R002C00SPC600, V500R002C00SPC700, V500R002C00SPCb00, V600R006C00, V600R006C00SPC200, V600R006C00SPC300, V600R006C00SPC400, V600R006C00SPC500; TE60 versions V100R001C10, V100R001C10B001, V100R001C10B002, V100R001C10B010, V100R001C10B011, V100R001C10B012, V100R001C10B013, V100R001C10B014, V100R001C10B016, V100R001C10B017, V100R001C10B018, V100R001C10B019, V100R001C10SPC400, V100R001C10SPC500, V100R001C10SPC600, V100R001C10SPC700, V100R001C10SPC800B011, V100R001C10SPC900, V500R002C00, V500R002C00B010, V500R002C00B011, V500R002C00SPC100, V500R002C00SPC200, V500R002C00SPC300, V500R002C00SPC600, V500R002C00SPC700, V500R002C00SPC800, V500R002C00SPC900, V500R002C00SPCa00, V500R002C00SPCb00, V500R002C00SPCd00, V500R002C00SPCe00, V600R006C00, V600R006C00SPC100, V600R006C00SPC200, V600R006C00SPC300, V600R006C00SPC400, V600R006C00SPC500; eSpace U1981 version V200R003C20SPC900.
[]
null
null
6.5
null
null
GHSA-66h3-v5f7-5w52
PHP Scripts Mall PHP Multivendor Ecommerce has SQL Injection via the shopping-cart.php cusid parameter.
[]
null
null
9.8
null
null
CVE-2023-29108
IP filter vulnerability in ABAP Platform and SAP Web Dispatcher
The IP filter in ABAP Platform and SAP Web Dispatcher - versions WEBDISP 7.85, 7.89, KERNEL 7.85, 7.89, 7.91, may be vulnerable by erroneous IP netmask handling. This may enable access to backend applications from unwanted sources.
[ "cpe:2.3:a:sap:abap_platform_kernel:7.85:*:*:*:*:*:*:*", "cpe:2.3:a:sap:abap_platform_kernel:7.89:*:*:*:*:*:*:*", "cpe:2.3:a:sap:abap_platform_kernel:7.91:*:*:*:*:*:*:*", "cpe:2.3:a:sap:web_dispatcher:7.85:*:*:*:*:*:*:*", "cpe:2.3:a:sap:web_dispatcher:7.89:*:*:*:*:*:*:*" ]
null
5
null
null
null
CVE-2022-26301
TuziCMS v2.0.6 was discovered to contain a SQL injection vulnerability via the component App\Manage\Controller\ZhuantiController.class.php.
[ "cpe:2.3:a:yejiao:tuzicms:2.0.6:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
null
GHSA-77wf-92x9-j58v
Huawei USG5500, USG2100, USG2200, and USG5100 unified security gateways with software before V300R001C10SPC600, when "DHCP Snooping" is enabled and either "option82 insert" or "option82 rebuild" is enabled on an interface, allow remote attackers to cause a denial of service (reboot) via crafted DHCP packets.
[]
null
null
null
null
null
CVE-2006-0190
Unspecified vulnerability in Sun Solaris 9 and 10 for the x86 platform allows local users to gain privileges or cause a denial of service (panic) via unspecified vectors, possibly involving functions from the mm driver.
[ "cpe:2.3:o:sun:solaris:9.0:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:solaris:10.0:*:sparc:*:*:*:*:*" ]
null
null
null
7.2
null
GHSA-v4g5-82wj-3j9w
An issue was discovered in certain Apple products. iOS before 11.4 is affected. Safari before 11.1.1 is affected. iCloud before 7.5 on Windows is affected. iTunes before 12.7.5 on Windows is affected. tvOS before 11.4 is affected. watchOS before 4.3.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site that triggers an @generatorState use-after-free.
[]
null
null
8.8
null
null
CVE-2023-37982
WordPress Integration for Contact Form 7 and Salesforce Plugin <= 1.3.3 is vulnerable to Open Redirection
URL Redirection to Untrusted Site ('Open Redirect') vulnerability in CRM Perks Integration for Salesforce and Contact Form 7, WPForms, Elementor, Ninja Forms.This issue affects Integration for Salesforce and Contact Form 7, WPForms, Elementor, Ninja Forms: from n/a through 1.3.3.
[ "cpe:2.3:a:crmperks:integration_for_salesforce_and_contact_form_7\\,_wpforms\\,_elementor\\,_ninja_forms:*:*:*:*:*:wordpress:*:*" ]
null
4.7
null
null
null
CVE-2021-31798
The effective key space used to encrypt the cache in CyberArk Credential Provider prior to 12.1 has low entropy, and under certain conditions a local malicious user can obtain the plaintext of cache files.
[ "cpe:2.3:a:cyberark:credential_provider:*:*:*:*:*:*:*:*" ]
null
4.4
null
1.9
null
CVE-2023-34998
An authentication bypass vulnerability exists in the OAS Engine functionality of Open Automation Software OAS Platform v18.00.0072. A specially crafted series of network requests can lead to arbitrary authentication. An attacker can sniff network traffic to trigger this vulnerability.
[ "cpe:2.3:a:openautomationsoftware:oas_platform:18.00.0072:*:*:*:*:*:*:*" ]
null
8.1
null
null
null
CVE-2024-8300
Malicious Code Execution Vulnerability in GENESIS64
Dead Code vulnerability in ICONICS GENESIS64 Version 10.97.2, 10.97.2 CFR1, 10.97.2 CRF2 and 10.97.3 and Mitsubishi Electric GENESIS64 Version 10.97.2, 10.97.2 CFR1, 10.97.2 CRF2 and 10.97.3 allows a local authenticated attacker to execute a malicious code by tampering with a specially crafted DLL. This could lead to disclose, tamper with, destroy, or delete information in the affected products, or cause a denial of service (DoS) condition on the products.
[ "cpe:2.3:a:iconics:genesis64:*:*:*:*:*:*:*:*", "cpe:2.3:a:mitsubishielectric:genesis64:*:*:*:*:*:*:*:*" ]
null
7
null
null
null
CVE-2019-20145
An issue was discovered in GitLab Community Edition (CE) and Enterprise Edition (EE) 11.4 through 12.6.1. It has Incorrect Access Control.
[ "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*" ]
null
4.3
null
4
null
GHSA-f37f-9mx7-xgw5
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the rotate property of a TimeField. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-6485.
[]
null
null
8.8
null
null
GHSA-rj65-h7q6-63qc
Windows DWM Core Library Information Disclosure Vulnerability
[]
null
5.5
null
null
null
CVE-2008-0500
Multiple unspecified vulnerabilities in Mambo LaiThai 4.5.5 have unknown impact and attack vectors related to (1) mod_login and (2) mod_template_chooser.
[ "cpe:2.3:a:mamboxchange:laithai:4.5.5:*:*:*:*:*:*:*" ]
null
null
null
10
null
GHSA-pqc6-v3x2-rr5p
Unspecified vulnerability in Oracle Sun Solaris 9 and 10 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Utility/Umount.
[]
null
null
null
null
null
GHSA-533p-g2hq-qr26
Command Injection in treekill
All versions of `treekill` are vulnerable to Command Injection. The package fails to sanitize values passed to the `kill` function. If this value is user-controlled it may allow attackers to run arbitrary commands in the server. The issue only affects Windows systems.RecommendationNo fix is currently available. Consider using an alternative package until a fix is made available.
[]
null
null
null
null
null
GHSA-qqpc-2hm2-rq5r
Netscape Enterprise servers may list files through the PageServices query.
[]
null
null
null
null
null
RHSA-2025:6977
Red Hat Security Advisory: python3.9 security update
python: cpython: URL parser allowed square brackets in domain names
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
6.8
null
null
null
CVE-2017-6359
QNAP QTS before 4.2.4 Build 20170313 allows attackers to gain administrator privileges and execute arbitrary commands via unspecified vectors.
[ "cpe:2.3:o:qnap:qts:*:*:*:*:*:*:*:*" ]
null
null
9.8
10
null
GHSA-4q79-qphh-pxpm
Integer overflow in the COFF/EPOC/EXPLOAD input file loaders in Hex-Rays IDA Pro 5.7 and 6.0 has unknown impact and attack vectors related to memory allocation.
[]
null
null
null
null
null
GHSA-g4xv-r3qw-v3q2
typo3 Information Disclosure Security Note
Due to reports it has been validated that internal workspaces in Neos are accessible without authentication. Some users assumed this is a planned feature but it is not. A workspace preview should be an additional feature with respective security measures in place.Note that this only allows reading of internal workspaces not writing. And for clarification, an internal workspace is a workspace that is non public and doesn't have an owner.Given that an internal workspace exists in your installation, it is possible to view a page in context of that workspace by opening a link in this format:https://domain/path/to/page.html@workspace-nameThe issue is quite problematic when exploited but at the same time slightly less impactful than it sounds. First of all there is no default internal workspace, so the issue affects only workspaces created by users. That also means the workspace-name, which will also always include a hash is individual to a project and an exploiter must get hold of the workspace-name including the hash. This is non trivial as there is no indication of the existence of it, but obviously brute force and educated guessed can be made.
[]
null
null
null
null
null
CVE-2022-32149
Denial of service via crafted Accept-Language header in golang.org/x/text/language
An attacker may cause a denial of service by crafting an Accept-Language header which ParseAcceptLanguage will take significant time to parse.
[ "cpe:2.3:a:golang:text:*:*:*:*:*:*:*:*" ]
null
7.5
null
null
null
CVE-2025-52043
In Frappe ERPNext v15.57.5, the function import_coa() at erpnext/accounts/doctype/chart_of_accounts_importer/chart_of_accounts_importer.py is vulnerable to SQL injection, which allows an attacker to extract all information from databases by injecting a SQL query into the company parameter.
[]
null
6.5
null
null
null
GHSA-5768-4xxg-h24c
Cisco WebEx Meetings Server 2.6 allows remote authenticated users to conduct command-injection attacks via vectors related to an upload's file type, aka Bug ID CSCuy92715.
[]
null
null
7.5
null
null
CVE-2025-58833
WordPress Invelity MyGLS connect Plugin <= 1.1.1 - Cross Site Request Forgery (CSRF) Vulnerability
Cross-Site Request Forgery (CSRF) vulnerability in INVELITY Invelity MyGLS connect allows Object Injection. This issue affects Invelity MyGLS connect: from n/a through 1.1.1.
[]
null
8.8
null
null
null
RHSA-2017:2704
Red Hat Security Advisory: kernel-rt security update
kernel: stack buffer overflow in the native Bluetooth stack
[ "cpe:/a:redhat:rhel_extras_rt:7" ]
null
null
7.5
null
null
GHSA-54rx-gp68-xqw5
Cross-site scripting (XSS) vulnerability in the Messages functionality in Cybozu Garoon 3.1.x, 3.5.x, and 3.7.x before 3.7 SP4 allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors.
[]
null
null
null
null
null
GHSA-g76j-9r88-7qvg
Deserialization of Untrusted Data vulnerability in uxper Nuss allows Object Injection. This issue affects Nuss: from n/a through 1.3.3.
[]
null
8.8
null
null
null
CVE-2023-45751
WordPress Nexter Extension Plugin <= 2.0.3 is vulnerable to Remote Code Execution (RCE)
Improper Control of Generation of Code ('Code Injection') vulnerability in POSIMYTH Nexter Extension.This issue affects Nexter Extension: from n/a through 2.0.3.
[ "cpe:2.3:a:posimyth:nexter_extension:*:*:*:*:*:wordpress:*:*" ]
null
9.1
null
null
null
CVE-2023-40055
SolarWinds Network Configuration Manager Directory Traversal Remote Code Execution Vulnerability
The Network Configuration Manager was susceptible to a Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows a low-level user to perform the actions with SYSTEM privileges. We found this issue was not resolved in CVE-2023-33227
[ "cpe:2.3:a:solarwinds:network_configuration_manager:*:*:*:*:*:*:*:*" ]
null
8
null
null
null
GHSA-gvr6-g64h-9mj2
When using X11, text selected by the page using the Selection API was erroneously copied into the primary selection, a temporary storage not unlike the clipboard. *This bug only affects Thunderbird on X11. Other systems are unaffected.* This vulnerability affects Firefox < 120, Firefox < 115.5, and Thunderbird < 115.5.0.
[]
null
8.8
null
null
null
CVE-2018-1644
IBM WebSphere Commerce Enterprise, Professional, Express, and Developer 9.0.0.0 - 9.0.0.4, 8.0.0.0 - 8.0.0.19, 8.0.1.0 - 8.0.1.13, 8.0.3.0 - 8.0.3.6, 8.0.4.0 - 8.0.4.14, and 7.0.0.0 Feature Pack 8 could allow an authenticated user to obtain sensitive information about another user.
[ "cpe:2.3:a:ibm:websphere_commerce:*:*:*:*:developer:*:*:*", "cpe:2.3:a:ibm:websphere_commerce:*:*:*:*:enterprise:*:*:*", "cpe:2.3:a:ibm:websphere_commerce:*:*:*:*:express:*:*:*", "cpe:2.3:a:ibm:websphere_commerce:*:*:*:*:professional:*:*:*", "cpe:2.3:a:ibm:websphere_commerce:7.0:feature_pack_8:*:*:*:*:*:*" ]
null
null
3.1
null
null
GHSA-gc2x-3pv6-xhfw
Unspecified vulnerability in the Oracle Common Applications Calendar component in Oracle E-Business Suite 12.1.1, 12.1.2, and 12.1.3 allows remote attackers to affect confidentiality and integrity via vectors related to Tasks.
[]
null
null
8.2
null
null
GHSA-4xqq-q6wp-w8h4
A use-after-free exists in drivers/tee/tee_shm.c in the TEE subsystem in the Linux kernel through 5.15.11. This occurs because of a race condition in tee_shm_get_from_id during an attempt to free a shared memory object.
[]
null
7
null
null
null
CVE-2018-18578
DedeCMS 5.7 SP2 allows XSS via the plus/qrcode.php type parameter.
[ "cpe:2.3:a:dedecms:dedecms:5.7:sp2:*:*:*:*:*:*" ]
null
null
6.1
4.3
null
CVE-2022-47450
In wlan driver, there is a possible missing permission check. This could lead to local information disclosure.
[ "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:sc7731e:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:sc9832e:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t310:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*" ]
null
5.5
null
null
null
GHSA-69hj-qg9v-rx7w
IBM Security Guardium 11.3, 11.4, and 11.5 could allow an unauthorized user to enumerate usernames by sending a specially crafted HTTP request. IBM X-Force ID: 252293.
[]
null
5.3
null
null
null
RHSA-2024:7481
Red Hat Security Advisory: linux-firmware security update
kernel: hw:amd:IOMMU improperly handles certain special address leading to a loss of guest integrity hw: amd: SMM Lock Bypass kernel: hw:amd: Incomplete system memory cleanup in SEV firmware corrupt guest private memory
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
4.4
null
null
null
CVE-2023-6081
Chart.js for WordPress <= 2023.2 - Editor+ Stored Cross-Site Scripting in New Chart
The chartjs WordPress plugin through 2023.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
[ "cpe:2.3:a:chartjs_project:chartjs:*:*:*:*:*:wordpress:*:*" ]
null
5.4
null
null
null
CVE-2024-40522
There is a remote code execution vulnerability in SeaCMS 12.9. The vulnerability is caused by phomebak.php writing some variable names passed in without filtering them before writing them into the php file. An authenticated attacker can exploit this vulnerability to execute arbitrary commands and obtain system permissions.
[ "cpe:2.3:a:seacms:seacms:12.9:*:*:*:*:*:*:*" ]
null
8.8
null
null
null
GHSA-gv3p-qv63-g8qx
An improper neutralization of special elements used in an OS command vulnerability [CWE-78]  in the command line interpreter of FortiTester 2.3.0 through 7.2.3 may allow an authenticated attacker to execute unauthorized commands via specifically crafted arguments when running execute restore/backup .
[]
null
6.7
null
null
null
CVE-2010-0125
RealNetworks RealPlayer 11.0 through 11.1, RealPlayer SP 1.0 through 1.1.4, RealPlayer Enterprise 2.1.2, and Mac RealPlayer 11.0 through 12.0.0.1444 do not properly parse spectral data in AAC files, which has unspecified impact and remote attack vectors.
[ "cpe:2.3:a:realnetworks:realplayer:11.0:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer:11.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer:11.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer:11.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer:11.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer:11.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer:11.1:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer_sp:1.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer_sp:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer_sp:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer_sp:1.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer_sp:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer_sp:1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer_sp:1.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer_sp:1.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer_sp:1.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer:12.0.0.1444:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer:2.1.2:*:enterprise:*:*:*:*:*" ]
null
null
null
10
null
CVE-2025-52736
WordPress Finale Lite Plugin <= 2.20.0 - Cross Site Scripting (XSS) Vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Daman Jeet Finale Lite finale-woocommerce-sales-countdown-timer-discount allows Reflected XSS.This issue affects Finale Lite: from n/a through <= 2.20.0.
[]
null
7.1
null
null
null
GHSA-h6wq-rhmx-rv6x
A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected application is vulnerable to SQL injection through the internally used 'UnlockProject' method. This could allow an authenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with "NT AUTHORITY\NetworkService" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on.
[]
8.7
8.8
null
null
null
GHSA-7v9p-w84p-x9qq
The DehoistArrayIndex function in hydrogen-dehoist.cc (aka hydrogen.cc) in Google V8 before 3.22.24.7, as used in Google Chrome before 31.0.1650.63, allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via JavaScript code that sets the value of an array element with a crafted index.
[]
null
null
null
null
null
CVE-2004-1941
Fastream NETFile FTP/Web Server 6.5.1.980 allows remote attackers to cause a denial of service via a username that does not exist.
[ "cpe:2.3:a:fastream:netfile_ftp_web_server:6.5.1.980:*:*:*:*:*:*:*" ]
null
null
null
5
null
RHSA-2016:0266
Red Hat Security Advisory: openstack-heat bug fix and security advisory
openstack-heat: Vulnerability in Heat template validation leading to DoS
[ "cpe:/a:redhat:openstack:7::el7" ]
null
null
null
null
null
GHSA-5r59-c396-qwfm
Double-free vulnerability in mysqld for MySQL before 3.23.55 allows attackers with MySQL access to cause a denial of service (crash) via mysql_change_user.
[]
null
null
null
null
null
GHSA-cxmj-72r8-rqj8
An issue was discovered in certain Apple products. iOS before 10.2.1 is affected. Safari before 10.0.3 is affected. iCloud before 6.1.1 is affected. iTunes before 12.5.5 is affected. tvOS before 10.1.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (uninitialized memory access and application crash) via a crafted web site.
[]
null
null
8.8
null
null
CVE-2016-1197
Cross-site scripting (XSS) vulnerability in Cybozu Garoon 4.x before 4.2.1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2015-7775.
[ "cpe:2.3:a:cybozu:garoon:4.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:cybozu:garoon:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:cybozu:garoon:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:cybozu:garoon:4.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:cybozu:garoon:4.2.0:*:*:*:*:*:*:*" ]
null
null
6.1
4.3
null
CVE-2019-9161
WAC on the Sangfor Sundray WLAN Controller version 3.7.4.2 and earlier has a Remote Code Execution issue allowing remote attackers to achieve full access to the system, because shell metacharacters in the nginx_webconsole.php Cookie header can be used to read an etc/config/wac/wns_cfg_admin_detail.xml file containing the admin password. (The password for root is the WebUI admin password concatenated with a static string.)
[ "cpe:2.3:o:xinruidz:sundray_wan_controller_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:xinruidz:sundray_wan_controller:-:*:*:*:*:*:*:*" ]
null
null
9.8
10
null
CVE-2020-5417
Cloud Controller may allow developers to claim sensitive routes
Cloud Foundry CAPI (Cloud Controller), versions prior to 1.97.0, when used in a deployment where an app domain is also the system domain (which is true in the default CF Deployment manifest), were vulnerable to developers maliciously or accidentally claiming certain sensitive routes, potentially resulting in the developer's app handling some requests that were expected to go to certain system components.
[ "cpe:2.3:a:cloudfoundry:capi-release:*:*:*:*:*:*:*:*", "cpe:2.3:a:cloudfoundry:cf-deployment:*:*:*:*:*:*:*:*" ]
null
null
8.5
null
null
CVE-2023-1778
Default Credential Vulnerability in GajShield Data Security Firewall
This vulnerability exists in GajShield Data Security Firewall firmware versions prior to v4.28 (except v4.21) due to insecure default credentials which allows remote attacker to login as superuser by using default username/password via web-based management interface and/or exposed SSH port thereby enabling remote attackers to execute arbitrary commands with administrative/superuser privileges on the targeted systems. The vulnerability has been addressed by forcing the user to change their default password to a new non-default password.
[ "cpe:2.3:o:gajshield:data_security_firewall_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:gajshield:data_security_firewall:-:*:*:*:*:*:*:*" ]
null
10
null
null
null