id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
139k
cpes
sequencelengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
CVE-2018-13024
Metinfo v6.0.0 allows remote attackers to write code into a .php file, and execute that code, via the module parameter to admin/column/save.php in an editor upload action.
[ "cpe:2.3:a:metinfo:metinfo:6.0.0:*:*:*:*:*:*:*" ]
null
null
7.2
6.5
GHSA-q2x3-46w3-r77p
An issue was discovered in certain Apple products. macOS before 10.12.5 is affected. The issue involves the "WindowServer" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app.
[]
null
null
7.8
null
GHSA-c947-wh56-7wqm
IBM Jazz Foundation is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.
[]
null
null
5.4
null
RHSA-2021:1343
Red Hat Security Advisory: Ansible security update (2.9.20)
ansible: multiple modules expose secured values
[ "cpe:/a:redhat:ansible_engine:2.9::el7", "cpe:/a:redhat:ansible_engine:2.9::el8" ]
null
5
null
null
GHSA-2gj9-8rm6-pv54
A insertion of sensitive information into log file in Fortinet FortiPortal versions 7.4.0, versions 7.2.0 through 7.2.5, and versions 7.0.0 through 7.0.9 may allow an authenticated attacker with at least read-only admin permissions to view encrypted secrets via the FortiPortal System Log.
[]
null
2.3
null
null
GHSA-785g-rp7v-287f
jpress 4.2.0 is vulnerable to remote code execution via io.jpress.module.article.kit.ArticleNotifyKit#doSendEmail. The admin panel provides a function through which attackers can edit the email templates and inject some malicious code.
[]
null
null
null
null
CVE-2024-38114
Windows IP Routing Management Snapin Remote Code Execution Vulnerability
Windows IP Routing Management Snapin Remote Code Execution Vulnerability
[ "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*" ]
null
8.8
null
null
GHSA-mjww-934m-h4jw
Improper Certificate Validation in OPCFoundation.NetStandard.Opc.Ua.Core
A Privilege Elevation vulnerability in OPC UA .NET Standard Stack 1.4.363.107 allows attackers to establish a connection using invalid certificates.
[]
null
4.4
null
null
CVE-2005-0759
ImageMagick before 6.0 allows remote attackers to cause a denial of service (application crash) via a TIFF image with an invalid tag.
[ "cpe:2.3:a:imagemagick:imagemagick:5.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:5.3.8:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:5.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:5.4.4.5:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:5.4.7:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:5.4.8:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:5.4.8.2.1.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:5.5.3.2.1.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:5.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:5.5.6:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:5.5.6.0_2003-04-09:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:5.5.7:*:*:*:*:*:*:*", "cpe:2.3:a:sgi:propack:3.0:*:*:*:*:*:*:*" ]
null
null
null
5
CVE-2024-0066
Johan Fagerström, member of the AXIS OS Bug Bounty Program, has found that a O3C feature may expose sensitive traffic between the client (Axis device) and (O3C) server. If O3C is not being used this flaw does not apply. Axis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution.
[ "cpe:2.3:o:axis:axis_os_2020:*:*:*:*:lts:*:*:*", "cpe:2.3:o:axis:axis_os_2022:-:*:*:*:lts:*:*:*", "cpe:2.3:o:axis:axis_os:5.51:*:*:*:*:*:*:*" ]
null
5.3
null
null
GHSA-7436-qp9j-h84q
The Javascript engine in Opera 7.23 allows remote attackers to cause a denial of service (crash) by creating a new Array object with a large size value, then writing into that array.
[]
null
null
null
null
CVE-2021-39994
There is an arbitrary address access vulnerability with the product line test code.Successful exploitation of this vulnerability may affect service confidentiality, integrity, and availability.
[ "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
CVE-2021-34382
Trusty TLK contains a vulnerability in the NVIDIA TLK kernel’s tz_map_shared_mem function where an integer overflow on the size parameter causes the request buffer and the logging buffer to overflow, allowing writes to arbitrary addresses within the kernel.
[ "cpe:2.3:o:nvidia:jetson_linux:*:*:*:*:*:*:*:*", "cpe:2.3:h:nvidia:jetson_tx1:-:*:*:*:*:*:*:*" ]
null
6.7
null
null
CVE-2009-2611
Directory traversal vulnerability in infusions/last_seen_users_panel/last_seen_users_panel.php in MyFusion (aka MyF) 6 Beta, when register_globals is enabled, allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the settings[locale] parameter.
[ "cpe:2.3:a:gander:myfusion:6:beta:*:*:*:*:*:*" ]
null
null
null
6.8
CVE-2017-8723
Microsoft Edge in Microsoft Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an attacker to trick a user into loading a page containing malicious content, due to the way that the Edge Content Security Policy (CSP) validates certain specially crafted documents, aka "Microsoft Edge Security Feature Bypass Vulnerability". This CVE ID is unique from CVE-2017-8754.
[ "cpe:2.3:a:microsoft:edge:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*" ]
null
null
4.3
4.3
GHSA-fgxx-cm7r-ghp7
The Anviz Management System for access control has insufficient logging for device events such as door open requests.
[]
null
null
null
null
GHSA-7622-r9xj-6gwh
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Maxim Glazunov XML for Avito allows Reflected XSS. This issue affects XML for Avito: from n/a through 2.5.2.
[]
null
7.1
null
null
GHSA-vx97-8q8q-qgq5
Mattermost's detailed error messages reveal the full file path
Mattermost versions 9.6.x <= 9.6.0, 9.5.x <= 9.5.2, 9.4.x <= 9.4.4 and 8.1.x <= 8.1.11 fail to remove detailed error messages in API requests even if the developer mode is off which allows an attacker to get information about the server such as the full path were files are stored
[]
null
4.3
null
null
RHSA-2024:0725
Red Hat Security Advisory: kernel-rt security update
kernel: sctp: fail if no bound addresses can be used for a given scope kernel: NULL pointer dereference in nvmet_tcp_build_iovec kernel: NULL pointer dereference in nvmet_tcp_execute_request kernel: NULL pointer dereference in __nvmet_req_complete kernel: Out-Of-Bounds Read vulnerability in smbCalcSize kernel: OOB Access in smb2_dump_detail kernel: use-after-free in IPv4 IGMP kernel: refcount leak in ctnetlink_create_conntrack() kernel: drivers/usb/storage/ene_ub6250.c kernel: ktls overwrites readonly memory pages when using function splice with a ktls socket as destination
[ "cpe:/a:redhat:rhel_eus:9.2::nfv", "cpe:/a:redhat:rhel_eus:9.2::realtime" ]
null
7
null
null
RHBA-2019:2715
Red Hat Bug Fix Advisory: virt:rhel bug fix update
QEMU: slirp: heap buffer overflow during packet reassembly
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
null
7
null
GHSA-jpc9-rmm6-c6xg
RiSearch 1.0.01 and RiSearch Pro 3.2.06 allows remote attackers to use the show.pl script as an open proxy, or read arbitrary local files, by setting the url parameter to a (1) http://, (2) ftp://, or (3) file:// URL.
[]
null
9.8
null
null
GHSA-8889-9g3f-73rj
Pimcore Discloses Usernames In Use
Pimcore before 6.2.2 allow attackers to brute-force (guess) valid usernames by using the 'forgot password' functionality as it returns distinct messages for invalid password and non-existing users.
[]
null
7.5
null
null
GHSA-gcgj-rj3h-jxpp
SeaCMS 6.64 and 7.2 allows remote attackers to delete arbitrary files via the filedir parameter.
[]
null
7.5
null
null
CVE-2025-31575
WordPress Flag Icons plugin <= 2.2 - Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vulnerability in Vasilis Triantafyllou Flag Icons allows Stored XSS. This issue affects Flag Icons: from n/a through 2.2.
[]
null
5.9
null
null
CVE-2024-38310
Improper access control in some Intel(R) Graphics Driver software installers may allow an authenticated user to potentially enable escalation of privilege via local access.
[]
5.4
8.2
null
null
GHSA-wjcq-p2hh-4gr7
Toshiba printers will display the password of the admin user in clear-text and additional passwords when sending 2 specific HTTP requests to the internal API. An attacker stealing the cookie of an admin or abusing a XSS vulnerability can recover this password in clear-text and compromise the printer. This vulnerability can be executed in combination with other vulnerabilities and difficult to execute alone. So, the CVSS score for this vulnerability alone is lower than the score listed in the "Base Score" of this vulnerability. For detail on related other vulnerabilities, please ask to the below contact point. https://www.toshibatec.com/contacts/products/ As for the affected products/models/versions, see the reference URL.
[]
null
6.5
null
null
CVE-2023-2533
PaperCut MF/NG 22.0.10 (Build 65996 2023-03-27) - Remote code execution via CSRF
A Cross-Site Request Forgery (CSRF) vulnerability has been identified in PaperCut NG/MF, which, under specific conditions, could potentially enable an attacker to alter security settings or execute arbitrary code. This could be exploited if the target is an admin with a current login session. Exploiting this would typically involve the possibility of deceiving an admin into clicking a specially crafted malicious link, potentially leading to unauthorized changes.
[ "cpe:2.3:a:papercut:papercut_mf:22.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:papercut:papercut_ng:22.0.10:*:*:*:*:*:*:*" ]
null
8.4
null
null
CVE-2023-1074
A memory leak flaw was found in the Linux kernel's Stream Control Transmission Protocol. This issue may occur when a user starts a malicious networking service and someone connects to this service. This could allow a local user to starve resources, causing a denial of service.
[ "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*" ]
null
5.5
null
null
CVE-2024-21512
Versions of the package mysql2 before 3.9.8 are vulnerable to Prototype Pollution due to improper user input sanitization passed to fields and tables when using nestTables.
[ "cpe:2.3:a:mysql2:mysql2:-:*:*:*:*:*:*:*" ]
null
8.2
null
null
GHSA-pvv9-p2gj-w426
A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause an out-of-bound write in in fs/jbd2/transaction.c code, a denial of service, and a system crash by unmounting a crafted ext4 filesystem image.
[]
null
null
5.5
null
GHSA-c2wq-m25g-5c8w
In the Linux kernel, the following vulnerability has been resolved:tracing/probes: fix error check in parse_btf_field()btf_find_struct_member() might return NULL or an error via the ERR_PTR() macro. However, its caller in parse_btf_field() only checks for the NULL condition. Fix this by using IS_ERR() and returning the error up the stack.
[]
null
5.5
null
null
GHSA-fc3r-7v33-7x96
Cross-Site Request Forgery (CSRF) vulnerability in Ciprian Popescu W3P SEO allows Stored XSS.This issue affects W3P SEO: from n/a before 1.8.6.
[]
null
7.1
null
null
GHSA-wm46-fj3j-35j9
In all android releases(Android for MSM, Firefox OS for MSM, QRD Android) from CAF using the linux kernel, Absence of length sanity check may lead to possible stack overflow resulting in memory corruption in trustzone region.
[]
null
null
7.8
null
CVE-2002-2154
Directory traversal vulnerability in Monkey HTTP Daemon 0.1.4 allows remote attackers to read arbitrary files via .. (dot dot) sequences.
[ "cpe:2.3:a:monkey-project:monkey:0.1.4:*:*:*:*:*:*:*" ]
null
null
null
5
GHSA-vgr2-h473-jfqv
The RenderTable::simplifiedNormalFlowLayout function in core/rendering/RenderTable.cpp in Blink, as used in Google Chrome before 40.0.2214.91, skips captions during table layout in certain situations, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors related to the Fonts implementation.
[]
null
null
null
null
GHSA-9pwx-6j3h-ffxq
Vulnerability in the Primavera P6 Enterprise Project Portfolio Management component of Oracle Construction and Engineering Suite (subcomponent: Web Access). Supported versions that are affected are 16.2 and 17.1 - 17.12. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Primavera P6 Enterprise Project Portfolio Management. While the vulnerability is in Primavera P6 Enterprise Project Portfolio Management, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Primavera P6 Enterprise Project Portfolio Management accessible data. CVSS 3.0 Base Score 7.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N).
[]
null
null
7.7
null
GHSA-vrc8-63q3-rgq3
SAP 3D Visual Enterprise Viewer, version - 9, allows a user to open manipulated DIB file received from untrusted sources which results in crashing of the application and becoming temporarily unavailable until the user restarts the application, this is caused due to Improper Input Validation.
[]
null
null
null
null
CVE-2016-1000155
Reflected XSS in wordpress plugin wpsolr-search-engine v7.6
[ "cpe:2.3:a:wpsolr:wpsolr-search-engine:7.6:*:*:*:*:wordpress:*:*" ]
null
null
6.1
4.3
CVE-2010-4540
Stack-based buffer overflow in the load_preset_response function in plug-ins/lighting/lighting-ui.c in the "LIGHTING EFFECTS > LIGHT" plugin in GIMP 2.6.11 allows user-assisted remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long Position field in a plugin configuration file. NOTE: it may be uncommon to obtain a GIMP plugin configuration file from an untrusted source that is separate from the distribution of the plugin itself. NOTE: some of these details are obtained from third party information.
[ "cpe:2.3:a:gimp:gimp:2.6.11:*:*:*:*:*:*:*" ]
null
null
null
6.8
GHSA-w66m-7qj6-9pv2
In Cacti through 1.2.6, authenticated users may bypass authorization checks (for viewing a graph) via a direct graph_json.php request with a modified local_graph_id parameter.
[]
null
null
null
null
CVE-2024-52367
IBM Concert Software information disclosure
IBM Concert Software 1.0.0, 1.0.1, 1.0.2, 1.0.2.1, and 1.0.3 could disclose sensitive system information to an unauthorized actor that could be used in further attacks against the system.
[ "cpe:2.3:a:ibm:concert:1.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:concert:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:concert:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:concert:1.0.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:concert:1.0.3:*:*:*:*:*:*:*" ]
null
5.3
null
null
CVE-2021-21167
Use after free in bookmarks in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*" ]
null
8.8
null
6.8
GHSA-5jgj-h9wp-53fr
Known vulnerable to code execution via SVG file in v1.3.1
An issue in the isSVG() function of Known v1.3.1 allows attackers to execute arbitrary code via a crafted SVG file.The researcher report indicates that versions 1.3.1 and prior are vulnerable. Version 1.2.2 is the last version tagged on GitHub and in Packagist, and development related to the 1.3.x branch is currently on the `dev` branch of the idno/known repository.
[]
null
6.1
null
null
RHSA-2025:4797
Red Hat Security Advisory: thunderbird security update
firefox: thunderbird: Privilege escalation in Firefox Updater firefox: thunderbird: Process isolation bypass using "javascript:" URI links in cross-origin frames firefox: thunderbird: Unsafe attribute access during XPath parsing firefox: thunderbird: Memory safety bugs fixed in Firefox 138, Thunderbird 138, Firefox ESR 128.10, and Thunderbird 128.10 firefox: thunderbird: Memory safety bug fixed in Firefox ESR 128.10 and Thunderbird 128.10
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8.8
null
null
CVE-2015-8814
Umbraco before 7.4.0 allows remote attackers to bypass anti-forgery security measures and conduct cross-site request forgery (CSRF) attacks as demonstrated by editing user account information in the templates.asmx.cs file.
[ "cpe:2.3:a:umbraco:umbraco:7.3.8:*:*:*:*:*:*:*" ]
null
null
8.8
6.8
CVE-2024-11971
Guizhou Xiaoma Technology jpress Avatar upload cross site scripting
A vulnerability classified as problematic was found in Guizhou Xiaoma Technology jpress 5.1.2. Affected by this vulnerability is an unknown functionality of the file /commons/attachment/upload of the component Avatar Handler. The manipulation of the argument files leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
[ "cpe:2.3:a:jpress:jpress:5.1.2:*:*:*:*:*:*:*" ]
5.3
3.5
3.5
4
GHSA-hvfh-qhgx-vqxm
The Contact Form Builder by vcita plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'email' parameter in versions up to, and including, 4.9.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with the edit_posts capability, such as contributors and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
6.4
null
null
CVE-2022-23320
XMPie uStore 12.3.7244.0 allows for administrators to generate reports based on raw SQL queries. Since the application ships with default administrative credentials, an attacker may authenticate into the application and exfiltrate sensitive information from the database.
[ "cpe:2.3:a:xerox:xmpie_ustore:12.3.7244.0:*:*:*:*:*:*:*" ]
null
7.5
null
5
GHSA-cvxv-rh32-gj86
On affected platforms running Arista EOS with SNMP configured, a specially crafted packet can cause a memory leak in the snmpd process. This may result in the snmpd processing being terminated (causing SNMP requests to time out until snmpd is automatically restarted) and potential memory resource exhaustion for other processes on the switch. The vulnerability does not have any confidentiality or integrity impacts to the system.
[]
null
7.5
null
null
CVE-2018-13338
System command injection in ajaxdata.php in TerraMaster TOS version 3.1.03 allows attackers to execute system commands via the "username" parameter during user creation.
[ "cpe:2.3:o:terra-master:terramaster_operating_system:3.1.03:*:*:*:*:*:*:*" ]
null
null
9.8
10
GHSA-w6pj-h54r-cg97
The DeviceManager in Huawei OceanStor UDS devices with software before V100R002C01SPC102 might allow remote attackers to obtain sensitive information via a crafted UDS patch with JavaScript.
[]
null
null
7.5
null
GHSA-6427-rmfx-x2xr
Multiple stack-based buffer overflows in the AVCC reassembly implementation in Utils.cpp in libstagefright in MediaMuxer in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, 6.x before 2016-09-01, and 7.0 before 2016-09-01 allow remote attackers to execute arbitrary code via a crafted media file, aka internal bug 29161888.
[]
null
null
7.8
null
CVE-2023-38022
An issue was discovered in Fortanix EnclaveOS Confidential Computing Manager (CCM) Platform before 3.29 for Intel SGX. Insufficient pointer validation allows a local attacker to access unauthorized information. This relates to strlen and sgx_is_within_user.
[ "cpe:2.3:a:fortanix:confidential_computing_manager:*:*:*:*:*:intel_software_guard_extensions:*:*" ]
null
5.5
null
null
CVE-2008-4297
Mercurial before 1.0.2 does not enforce the allowpull permission setting for a pull operation from hgweb, which allows remote attackers to read arbitrary files from a repository via an "hg pull" request.
[ "cpe:2.3:a:mercurial:mercurial:*:*:*:*:*:*:*:*" ]
null
null
null
5
RHSA-2024:1492
Red Hat Security Advisory: thunderbird security update
nss: timing attack against RSA decryption Mozilla: Crash in NSS TLS method Mozilla: Leaking of encrypted email subjects to other conversations Mozilla: JIT code failed to save return registers on Armv7-A Mozilla: Integer overflow could have led to out of bounds write Mozilla: Improper handling of html and body tags enabled CSP nonce leakage Mozilla: Clickjacking vulnerability could have led to a user accidentally granting permissions Mozilla: Self referencing object could have potentially led to a use-after-free Mozilla: Memory safety bugs fixed in Firefox 124, Firefox ESR 115.9, and Thunderbird 115.9
[ "cpe:/a:redhat:rhel_eus:9.2::appstream" ]
null
7.5
null
null
CVE-2022-20109
In ion, there is a possible use after free due to improper update of reference count. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06399915; Issue ID: ALPS06399915.
[ "cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8695:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8696:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*" ]
null
7.8
null
4.6
CVE-2007-6102
Cross-site scripting (XSS) vulnerability in Feed to JavaScript (Feed2JS) 1.91 allows remote attackers to inject arbitrary web script or HTML via a URL in a feed.
[ "cpe:2.3:a:feed2js:feed2js:1.91:*:*:*:*:*:*:*" ]
null
null
null
4.3
GHSA-x6f6-fmwf-4mpg
Certain NETGEAR devices are affected by command injection by an authenticated user. This affects D7800 before 1.0.1.58, R7500v2 before 1.0.3.48, R7800 before 1.0.2.68, R8900 before 1.0.5.2, R9000 before 1.0.5.2, RAX120 before 1.0.1.108, and XR700 before 1.0.1.20.
[]
null
null
null
null
RHSA-2011:1304
Red Hat Security Advisory: jbossws-common security update
JBossWS remote Denial of Service
[ "cpe:/a:redhat:jboss_enterprise_web_platform:5.1" ]
null
null
null
null
CVE-2001-1146
AllCommerce with debugging enabled in EnGarde Secure Linux 1.0.1 creates temporary files with predictable names, which allows local users to modify files via a symlink attack.
[ "cpe:2.3:a:lee_herron:allcommerce:1.2.3:*:*:*:*:*:*:*" ]
null
null
null
1.2
GHSA-vwr7-42j6-c6wm
Symantec pcAnywhere 12.5 uses weak default permissions for the "Symantec\pcAnywhere\Hosts" folder, which allows local users to gain privileges by inserting a superuser .cif (aka caller or CallerID) file into the folder, and then using a pcAnywhere client to login as a local administrator.
[]
null
null
null
null
GHSA-h5j7-7wgr-m2hf
mm-wiki v0.2.1 was discovered to contain a Cross-Site Request Forgery (CSRF) which allows attackers to arbitrarily add user accounts and modify user information.
[]
null
6.5
null
null
GHSA-2wwv-3g3g-h8w3
In the Linux kernel, the following vulnerability has been resolved:ASoC: fsl: fsl_qmc_audio: Check devm_kasprintf() returned valuedevm_kasprintf() can return a NULL pointer on failure but this returned value is not checked.Fix this lack and check the returned value.
[]
null
5.5
null
null
GHSA-c6fp-j53m-qjjq
The Organic Groups (OG) Vocabulary module 6.x-1.x before 6.x-1.2 for Drupal allows remote authenticated users with certain administrator permissions to modify the vocabularies of other groups via unspecified vectors.
[]
null
null
null
null
CVE-2023-34924
H3C Magic B1STW B1STV100R012 was discovered to contain a stack overflow via the function SetAPInfoById. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request.
[ "cpe:2.3:h:h3c:magic_b1stw:-:*:*:*:*:*:*:*", "cpe:2.3:o:h3c:magic_b1stw_firmware:b1stv100r012:*:*:*:*:*:*:*" ]
null
7.5
null
null
GHSA-qwph-q65f-w8rg
A remote code execution vulnerability exists in Microsoft Office when the software fails to properly handle objects in memory, aka "Office Remote Code Execution Vulnerability". This CVE ID is unique from CVE-2017-8509, CVE-2017-8510, CVE-2017-8512, CVE-2017-0260, and CVE-2017-8506.
[]
null
null
7.8
null
CVE-2010-1653
Directory traversal vulnerability in graphics.php in the Graphics (com_graphics) component 1.0.6 and 1.5.0 for Joomla! allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the controller parameter to index.php. NOTE: some of these details are obtained from third party information.
[ "cpe:2.3:a:htmlcoderhelper:com_graphics:1.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:htmlcoderhelper:com_graphics:1.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2008-0563
Cross-site request forgery (CSRF) vulnerability in service/impl/UserLocalServiceImpl.java in Liferay Portal 4.3.6 allows remote attackers to perform unspecified actions as unspecified authenticated users via the User-Agent HTTP header, which is used when composing Forgot Password e-mail messages in HTML format.
[ "cpe:2.3:a:liferay:liferay_enterprise_portal:4.3.6:*:*:*:*:*:*:*" ]
null
null
null
4.3
CVE-2016-9449
The taxonomy module in Drupal 7.x before 7.52 and 8.x before 8.2.3 might allow remote authenticated users to obtain sensitive information about taxonomy terms by leveraging inconsistent naming of access query tags.
[ "cpe:2.3:a:drupal:drupal:8.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:8.0.0:alpha10:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:8.0.0:alpha11:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:8.0.0:alpha12:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:8.0.0:alpha13:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:8.0.0:alpha14:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:8.0.0:alpha15:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:8.0.0:alpha2:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:8.0.0:alpha3:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:8.0.0:alpha4:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:8.0.0:alpha5:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:8.0.0:alpha6:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:8.0.0:alpha7:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:8.0.0:alpha8:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:8.0.0:alpha9:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:8.0.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:8.0.0:beta10:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:8.0.0:beta11:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:8.0.0:beta12:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:8.0.0:beta13:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:8.0.0:beta14:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:8.0.0:beta15:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:8.0.0:beta16:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:8.0.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:8.0.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:8.0.0:beta4:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:8.0.0:beta6:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:8.0.0:beta7:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:8.0.0:beta9:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:8.0.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:8.0.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:8.0.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:8.0.0:rc4:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:8.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:8.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:8.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:8.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:8.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:8.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:8.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:8.1.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:8.1.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:8.1.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:8.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:8.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:8.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:8.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:8.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:8.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:8.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:8.1.8:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:8.1.9:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:8.1.10:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:8.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:8.2.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:8.2.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:8.2.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:8.2.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:8.2.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:8.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:8.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.0:alpha1:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.0:alpha2:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.0:alpha3:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.0:alpha4:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.0:alpha5:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.0:alpha6:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.0:alpha7:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.0:dev:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.0:rc4:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.1:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.2:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.3:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.4:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.10:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.11:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.12:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.13:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.14:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.15:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.16:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.17:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.18:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.19:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.20:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.21:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.22:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.23:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.24:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.25:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.26:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.27:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.28:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.29:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.30:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.31:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.32:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.33:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.34:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.35:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.36:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.37:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.38:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.40:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.41:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.42:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.43:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.44:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.50:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.51:*:*:*:*:*:*:*" ]
null
null
4.3
4
GHSA-4p6f-m4f9-ch88
Binary vulnerable to Slice Memory Allocation with Excessive Size Value
Impact_What kind of vulnerability is it? Who is impacted?_The vulnerability is a memory allocation vulnerability that can be exploited to allocate slices in memory with (arbitrary) excessive size value, which can either exhaust available memory or crash the whole program.When using `github.com/gagliardetto/binary` to parse unchecked (or wrong type of) data from untrusted sources of input (e.g. the blockchain) into slices, it's possible to allocate memory with excessive size.When `dec.Decode(&val)` method is used to parse data into a structure that is or contains slices of values, the length of the slice was previously read directly from the data itself without any checks on the size of it, and then a slice was allocated. This could lead to an overflow and an allocation of memory with excessive size value.Example:Patches_Has the problem been patched? What versions should users upgrade to?_The vulnerability has been patched in `github.com/gagliardetto/binary` `v0.7.1`Users should upgrade to `v0.7.1` or higher.To upgrade to `v0.7.1` or higher, run:Workarounds_Is there a way for users to fix or remediate the vulnerability without upgrading?_A workaround is not to rely on the `dec.Decode(&val)` function to parse the data, but to use a custom `UnmarshalWithDecoder()` method that reads and checks the length of any slice.References_Are there any links users can visit to find out more?_For more informationIf you have any questions or comments about this advisory:Open an issue in [github.com/gagliardetto/binary](https://github.com/gagliardetto/binary)DM me on [twitter](https://twitter.com/immaterial_ink)
[]
null
8.8
null
null
CVE-2013-4396
Use-after-free vulnerability in the doImageText function in dix/dixfonts.c in the xorg-server module before 1.14.4 in X.Org X11 allows remote authenticated users to cause a denial of service (daemon crash) or possibly execute arbitrary code via a crafted ImageText request that triggers memory-allocation failure.
[ "cpe:2.3:a:x:x.org_x11:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:x:x.org_x11:6.1:*:*:*:*:*:*:*", "cpe:2.3:a:x:x.org_x11:6.3:*:*:*:*:*:*:*", "cpe:2.3:a:x:x.org_x11:6.4:*:*:*:*:*:*:*", "cpe:2.3:a:x:x.org_x11:6.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:x:x.org_x11:6.6:*:*:*:*:*:*:*", "cpe:2.3:a:x:x.org_x11:6.7:*:*:*:*:*:*:*", "cpe:2.3:a:x:x.org_x11:6.8:*:*:*:*:*:*:*", "cpe:2.3:a:x:x.org_x11:6.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:x:x.org_x11:6.8.2:*:*:*:*:*:*:*", "cpe:2.3:a:x:x.org_x11:6.9.0:*:*:*:*:*:*:*", "cpe:2.3:a:x:x.org_x11:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:x:x.org_x11:7.1:*:*:*:*:*:*:*", "cpe:2.3:a:x:x.org_x11:7.2:*:*:*:*:*:*:*", "cpe:2.3:a:x:x.org_x11:7.3:*:*:*:*:*:*:*", "cpe:2.3:a:x:x.org_x11:7.4:*:*:*:*:*:*:*", "cpe:2.3:a:x:x.org_x11:7.5:*:*:*:*:*:*:*", "cpe:2.3:a:x:x.org_x11:7.5:rc1:*:*:*:*:*:*", "cpe:2.3:a:x:x.org_x11:7.6:*:*:*:*:*:*:*", "cpe:2.3:a:x:x.org_x11:7.6:rc1:*:*:*:*:*:*", "cpe:2.3:a:x:x.org_x11:7.7:*:*:*:*:*:*:*", "cpe:2.3:a:x:x.org_x11:7.7:rc1:*:*:*:*:*:*" ]
null
null
null
6.5
GHSA-4rjg-w3c9-89p9
The Royal Elementor Addons and Templates plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Logo Widget in all versions up to, and including, 1.3.91 due to insufficient input sanitization and output escaping on user supplied URLs. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
5.4
null
null
GHSA-4rm4-8m7j-xwx3
tip on multiple BSD-based operating systems allows local users to cause a denial of service (execution prevention) by using flock() to lock the /var/log/acculog file.
[]
null
5.5
null
null
GHSA-43v9-p898-p49x
An HTTP parameter pollution issue was discovered on Shenzhen Dragon Brothers Fingerprint Bluetooth Round Padlock FB50 2.3. With the user ID, user name, and the lock's MAC address, anyone can unbind the existing owner of the lock, and bind themselves instead. This leads to complete takeover of the lock. The user ID, name, and MAC address are trivially obtained from APIs found within the Android or iOS application. With only the MAC address of the lock, any attacker can transfer ownership of the lock from the current user, over to the attacker's account. Thus rendering the lock completely inaccessible to the current user.
[]
null
null
9.8
null
GHSA-gv2f-vxwc-xp58
Broadcasting Intent including the BluetoothDevice object without proper restriction of receivers in sendIntentSessionError function of Bluetooth prior to SMR Jun-2022 Release 1 leaks MAC address of the connected Bluetooth device.
[]
null
4.3
null
null
GHSA-chj7-ph5p-5643
ASPwebSoft Speedy Asp Discussion Forum allows remote attackers to change the password of any account via a modified account id and possibly arbitrary values of the name, email, country, password, and passwordre parameters to profileupdate.asp.
[]
null
null
null
null
GHSA-wm32-3r4m-jvcc
Symbiote Seed Open Redirect vulnerability
A vulnerability was found in Symbiote Seed up to 6.0.2. It has been classified as critical. Affected is the function `onBeforeSecurityLogin` of the file `code/extensions/SecurityLoginExtension.php` of the component `Login`. The manipulation of the argument URL leads to open redirect. It is possible to launch the attack remotely. Upgrading to version 6.0.3 can address this issue. The name of the patch is b065ebd82da53009d273aa7e989191f701485244. It is recommended to upgrade the affected component. VDB-217626 is the identifier assigned to this vulnerability.
[]
null
6.1
null
null
GHSA-6988-g89m-27vf
Magento stored cross-site scripting (XSS) in the customer address upload feature
Magento versions 2.4.1 (and earlier), 2.4.0-p1 (and earlier) and 2.3.6 (and earlier) are vulnerable to a stored cross-site scripting (XSS) in the customer address upload feature. Successful exploitation could lead to arbitrary JavaScript execution in the victim's browser. Exploitation of this issue requires user interaction.
[]
null
8.1
null
null
GHSA-xgwj-62j7-h8hh
LG SuperSign CMS allows reading of arbitrary files via signEzUI/playlist/edit/upload/..%2f URIs.
[]
null
null
8.6
null
CVE-2024-31921
WordPress Ultimate Product Catalog plugin <= 5.2.15 - Cross Site Request Forgery (CSRF) vulnerability
Cross-Site Request Forgery (CSRF) vulnerability in Etoile Web Design Ultimate Product Catalogue.This issue affects Ultimate Product Catalogue: from n/a through 5.2.15.
[]
null
4.3
null
null
CVE-2012-2333
Integer underflow in OpenSSL before 0.9.8x, 1.0.0 before 1.0.0j, and 1.0.1 before 1.0.1c, when TLS 1.1, TLS 1.2, or DTLS is used with CBC encryption, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted TLS packet that is not properly handled during a certain explicit IV calculation.
[ "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.1c:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.2b:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.3:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.3a:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.4:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.5:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.5:beta1:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.5:beta2:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.5a:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.5a:beta1:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.5a:beta2:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.6:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.6:beta1:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.6:beta2:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.6:beta3:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.6a:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.6a:beta1:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.6a:beta2:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.6a:beta3:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.6b:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.6c:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.6d:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.6e:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.6f:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.6g:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.6h:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.6i:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.6j:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.6k:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.6l:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.6m:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.7:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.7:beta1:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.7:beta2:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.7:beta3:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.7:beta4:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.7:beta5:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.7:beta6:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.7a:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.7b:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.7c:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.7d:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.7e:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.7f:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.7g:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.7h:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.7i:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.7j:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.7k:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.7l:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.7m:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.8:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.8a:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.8b:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.8c:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.8d:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.8e:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.8f:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.8g:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.8h:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.8i:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.8j:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.8k:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.8l:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.8m:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.8m:beta1:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.8n:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.8o:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.8p:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.8q:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.8r:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.8s:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.8t:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.8u:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.8v:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:openssl:0.9.6-15:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:openssl:0.9.6b-3:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:openssl:0.9.7a-2:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.0:beta4:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.0:beta5:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.0a:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.0b:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.0c:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.0d:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.0e:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.0f:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.0g:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.0h:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.1:beta1:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.1:beta2:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.1:beta3:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.1a:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.1b:*:*:*:*:*:*:*" ]
null
null
null
6.8
CVE-2023-4351
Use after free in Network in Google Chrome prior to 116.0.5845.96 allowed a remote attacker who has elicited a browser shutdown to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*" ]
null
8.8
null
null
CVE-2019-9743
An issue was discovered on PHOENIX CONTACT RAD-80211-XD and RAD-80211-XD/HP-BUS devices. Command injection can occur in the WebHMI component.
[ "cpe:2.3:o:phoenixcontact:rad-80211-xd\\/hp-bus_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:rad-80211-xd\\/hp-bus:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:rad-80211-xd_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:rad-80211-xd:-:*:*:*:*:*:*:*" ]
null
null
8.8
9
CVE-2002-2072
java.security.AccessController in Sun Java Virtual Machine (JVM) in JRE 1.2.2 and 1.3.1 allows remote attackers to cause a denial of service (JVM crash) via a Java program that calls the doPrivileged method with a null argument.
[ "cpe:2.3:a:sun:jre:1.2.2:*:linux_production:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.3.1:*:linux:*:*:*:*:*" ]
null
null
null
5
GHSA-pjc4-3w99-j7v4
Open redirect in Flask-Unchained
This affects the package Flask-Unchained before 0.9.0. When using the the _validate_redirect_url function, it is possible to bypass URL validation and redirect a user to an arbitrary URL by providing multiple back slashes such as \\\evil.com/path. This vulnerability is only exploitable if an alternative WSGI server other than Werkzeug is used, or the default behaviour of Werkzeug is modified using 'autocorrect_location_header=False.
[]
5.3
5.4
null
null
CVE-2025-23047
Cilium vulnerable to information leakage via insecure default Hubble UI CORS header
Cilium is a networking, observability, and security solution with an eBPF-based dataplane. An insecure default `Access-Control-Allow-Origin` header value could lead to sensitive data exposure for users of Cilium versions 1.14.0 through 1.14.7, 1.15.0 through 1.15.11, and 1.16.0 through 1.16.4 who deploy Hubble UI using either Cilium CLI or via the Cilium Helm chart. A user with access to a Hubble UI instance affected by this issue could leak configuration details about the Kubernetes cluster which Hubble UI is monitoring, including node names, IP addresses, and other metadata about workloads and the cluster networking configuration. In order for this vulnerability to be exploited, a victim would have to first visit a malicious page. This issue is fixed in Cilium v1.14.18, v1.15.12, and v1.16.5. As a workaround, users who deploy Hubble UI using the Cilium Helm chart directly can remove the CORS headers from the Helm template as shown in the patch from commit a3489f190ba6e87b5336ee685fb6c80b1270d06d.
[]
null
6.5
null
null
CVE-2020-24419
Uncontrolled Search Path Element in Adobe After Effects for Windows
Adobe After Effects version 17.1.1 (and earlier) for Windows is affected by an uncontrolled search path vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[ "cpe:2.3:a:adobe:after_effects:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
7
null
null
GHSA-2p2x-x4c8-xrmc
Vulnerability in the RDBMS Security component of Oracle Database Server. Supported versions that are affected are 12.2.0.1, 19c and 21c. Easily exploitable vulnerability allows high privileged attacker having DBA privilege with network access via Oracle Net to compromise RDBMS Security. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of RDBMS Security as well as unauthorized update, insert or delete access to some of RDBMS Security accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).
[]
null
5.5
null
null
RHSA-2017:2390
Red Hat Security Advisory: qemu-kvm-rhev security update
Qemu: qemu-nbd: server breaks with SIGPIPE upon client abort
[ "cpe:/o:redhat:enterprise_linux:7::hypervisor" ]
null
null
5.3
null
GHSA-jw53-g5p8-77fr
Moxa G3100V2 Series, editions prior to Version 2.8, and OnCell G3111/G3151/G3211/G3251 Series, editions prior to Version 1.7 allows a reflected cross-site scripting attack which may allow an attacker to execute arbitrary script code in the user’s browser within the trust relationship between their browser and the server.
[]
null
null
6.1
null
CVE-2010-2849
Cross-site scripting (XSS) vulnerability in productionnu2/nuedit.php in nuBuilder 10.04.20, and possibly other versions before 10.07.12, allows remote attackers to inject arbitrary web script or HTML via the f parameter.
[ "cpe:2.3:a:nusoftware:nubuilder:*:*:*:*:*:*:*:*", "cpe:2.3:a:nusoftware:nubuilder:09.06.10:*:*:*:*:*:*:*", "cpe:2.3:a:nusoftware:nubuilder:09.06.26:*:*:*:*:*:*:*", "cpe:2.3:a:nusoftware:nubuilder:09.07.24:*:*:*:*:*:*:*", "cpe:2.3:a:nusoftware:nubuilder:09.08.20:*:*:*:*:*:*:*", "cpe:2.3:a:nusoftware:nubuilder:09.09.23:*:*:*:*:*:*:*" ]
null
null
null
4.3
GHSA-qfg7-wc25-r3j2
eGroupware Community Edition Stored XSS vulnerability
Stored XSS vulnerability in eGroupware Community Edition before 16.1.20170922 allows an unauthenticated remote attacker to inject JavaScript via the User-Agent HTTP header, which is mishandled during rendering by the application administrator.
[]
null
null
6.1
null
CVE-2023-23814
WordPress Calendar Event Multi View plugin <= 1.4.13 - Broken Access Control vulnerability
Missing Authorization vulnerability in CodePeople CP Multi View Event Calendar allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects CP Multi View Event Calendar : from n/a through 1.4.13.
[]
null
3.8
null
null
GHSA-mcrg-9w29-v64p
The periodic-backup feature in Cisco Identity Services Engine (ISE) allows remote attackers to discover backup-encryption passwords via a crafted request that triggers inclusion of a password in a reply, aka Bug ID CSCur41673.
[]
null
null
null
null
CVE-2017-2346
MS-MPC or MS-MIC crash when passing large fragmented traffic through an ALG
An MS-MPC or MS-MIC Service PIC may crash when large fragmented packets are passed through an Application Layer Gateway (ALG). Repeated crashes of the Service PC can result in an extended denial of service condition. The issue can be seen only if NAT or stateful-firewall rules are configured with ALGs enabled. This issue was caused by the code change for PR 1182910 in Junos OS 14.1X55-D30, 14.1X55-D35, 14.2R7, 15.1R5, and 16.1R2. No other versions of Junos OS and no other Juniper Networks products or platforms are affected by this issue. Affected releases are Juniper Networks Junos OS on MX platforms running: 14.1X55 from 14.1X55-D30 to releases prior to 14.1X55-D35; 14.2R from 14.2R7 to releases prior to 14.2R7-S4, 14.2R8; 15.1R from 15.1R5 to releases prior to 15.1R5-S2, 15.1R6; 16.1R from 16.1R2 to releases prior to 16.1R3-S2, 16.1R4.
[ "cpe:2.3:o:juniper:junos:14.1x55:*:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:14.1x55:d30:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:14.2:r:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:14.2:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:14.2:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:14.2:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:14.2:r4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:14.2:r5:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:14.2:r6:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:14.2:r7:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:r:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:r4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:r5:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:r6:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:16.1:r:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:16.1:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:16.1:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:16.1:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:16.1:r4:*:*:*:*:*:*", "cpe:2.3:h:juniper:mx:-:*:*:*:*:*:*:*" ]
null
null
5.9
null
RHSA-2016:2088
Red Hat Security Advisory: java-1.8.0-oracle security update
OpenJDK: missing algorithm restrictions for jar verification (Libraries, 8155973) OpenJDK: insufficient classloader consistency checks in ClassLoaderWithRepository (JMX, 8157739) JDK: unspecified vulnerability fixed in 6u131, 7u121, and 8u111 (2D) OpenJDK: insufficient checks of JDWP packets (Hotspot, 8159519) OpenJDK: incomplete type checks of System.arraycopy arguments (Hotspot, 8160591) OpenJDK: exposure of server authentication credentials to proxy (Networking, 8160838)
[ "cpe:/a:redhat:rhel_extras_oracle_java:6", "cpe:/a:redhat:rhel_extras_oracle_java:7" ]
null
null
5.3
null
CVE-2024-6617
NinjaTeam Header Footer Custom Code <= 1.2 - Admin+ Stored XSS via CSS Styles
The NinjaTeam Header Footer Custom Code WordPress plugin before 1.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
[ "cpe:2.3:a:ninjateam:header_footer_custom_code:*:*:*:*:*:*:*:*", "cpe:2.3:a:ninjateam:header_footer_custom_code:*:*:*:*:*:wordpress:*:*" ]
null
4.8
null
null
CVE-2013-4888
Cross-site scripting (XSS) vulnerability in index.php in Digital Signage Xibo 1.4.2 allows remote attackers to inject arbitrary web script or HTML via the layout parameter in the layout page.
[ "cpe:2.3:a:springsignage:xibo:1.4.2:*:*:*:*:*:*:*" ]
null
null
null
4.3
RHSA-2019:1161
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.22 security update
tomcat: Host name verification missing in WebSocket client wildfly-core: Cross-site scripting (XSS) in JBoss Management Console dom4j: XML Injection in Class: Element. Methods: addElement, addAttribute which can impact the integrity of XML documents
[ "cpe:/a:redhat:jboss_enterprise_application_platform:6::el7" ]
null
null
5.3
null
GHSA-w3jx-4fjp-hqjc
The Hubbub Lite WordPress plugin before 1.34.4 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
[]
null
4.8
null
null