id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
139k
cpes
sequencelengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
CVE-2024-25854
Cross Site Scripting (XSS) vulnerability in Sourcecodester Insurance Management System 1.0 allows attackers to run arbitrary code via the Subject and Description fields when submitting a support ticket.
[ "cpe:2.3:a:sourcecodester:insurance_management_system:1.0:*:*:*:*:*:*:*" ]
null
6.1
null
null
GHSA-fcvv-549h-h48p
A SQL Injection vulnerability exists in Ivanti LANDESK Management Suite (LDMS, aka Endpoint Manager) 10.0.1.168 Service Update 5 due to improper username sanitization in the Basic Authentication implementation in core/provisioning.secure/ProvisioningSecure.asmx in Provisioning.Secure.dll.
[]
null
null
8.1
null
GHSA-hpqf-m68j-2pfx
js-object-utilities Vulnerable to Prototype Pollution
**Vulnerability type:** Prototype Pollution**Affected Package:**Product: js-object-utilitiesVersion: 2.2.0**Remedy:**Update package to version 2.2.1.**Vulnerability Location(s):****Description:**The latest version of `js-object-utilities (2.2.0)`, (previous versions are also affected), is vulnerable to Prototype Pollution through the entry function(s) `lib.set`. An attacker can supply a payload with Object.prototype setter to introduce or modify properties within the global prototype chain, causing denial of service (DoS) a the minimum consequence.Moreover, the consequences of this vulnerability can escalate to other injection-based attacks, depending on how the library integrates within the application. For instance, if the polluted property propagates to sensitive Node.js APIs (e.g., exec, eval), it could enable an attacker to execute arbitrary commands within the application's context.**PoC:****Reporter Credit:**Tariq Hawis
[]
7
null
null
null
GHSA-2cr4-grq6-5cq2
The issue was addressed with improved handling of caches. This issue is fixed in macOS Sonoma 14. An app may be able to modify Printer settings.
[]
null
5.5
null
null
RHSA-2019:2281
Red Hat Security Advisory: ghostscript security, bug fix, and enhancement update
ghostscript: status command permitted with -dSAFER in psi/zfile.c allowing attackers to identify the size and existence of files
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
5.3
null
CVE-2011-4973
Authentication bypass vulnerability in mod_nss 1.0.8 allows remote attackers to assume the identity of a valid user by using their certificate and entering 'password' as the password.
[ "cpe:2.3:a:mod_nss_project:mod_nss:1.0.8:*:*:*:*:*:*:*" ]
null
null
9.8
7.5
RHSA-2017:2471
Red Hat Security Advisory: spice security update
spice: Possible buffer overflow via invalid monitor configurations
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
9.1
null
RHSA-2008:0221
Red Hat Security Advisory: flash-plugin security update
Flash Player input validation error Flash plugin DNS rebinding Flash Player input validation error Flash Player cross-domain and cross-site scripting flaws Flash Player content injection flaw Flash Player cross domain HTTP header flaw Flash Player DNS rebind flaw security flaw
[ "cpe:/a:redhat:rhel_extras:3", "cpe:/a:redhat:rhel_extras:4", "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server" ]
null
null
null
null
CVE-2021-27160
An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded user / 888888 credentials for an ISP.
[ "cpe:2.3:o:fiberhome:hg6245d_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:fiberhome:hg6245d:-:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
GHSA-9c3w-8m3v-q5m8
Unknown vulnerability in the bsd.a kernel networking for SGI IRIX 6.5.22 through 6.5.25, and possibly earlier versions, in which "t_unbind changes t_bind's behavior," has unknown impact and attack vectors.
[]
null
null
null
null
CVE-2024-30216
Missing Authorization check in SAP S/4 HANA (Cash Management)
Cash Management in SAP S/4 HANA does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges. By exploiting this vulnerability, attacker can add notes in the review request with 'completed' status affecting the integrity of the application. Confidentiality and Availability are not impacted.
[]
null
4.3
null
null
RHSA-2008:0601
Red Hat Security Advisory: adminutil security update
Server: multiple XSS issues
[ "cpe:/a:redhat:directory_server:8::el4", "cpe:/a:redhat:directory_server:8::el5" ]
null
null
null
null
GHSA-xr3m-j4q9-hqr4
Dell BIOS contains a stack based buffer overflow vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by using an SMI to send larger than expected input to a parameter in order to gain arbitrary code execution in SMRAM.
[]
null
7.5
null
null
RHSA-2011:1219
Red Hat Security Advisory: samba security update
samba: mount.cifs improper device name and mountpoint strings sanitization samba: Race condition by mount (mount.cifs) operations samba/cifs-utils: mount.cifs and umount.cifs fail to anticipate RLIMIT_FSIZE (SWAT): Absent CSRF protection in various Samba web configuration formulars (SWAT): XSS flaw in Change Password page Samba mtab lock file race condition
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
GHSA-9g56-qqc5-7rw9
Use after free issue in editcap could cause denial of service via crafted capture file
[]
null
3.6
null
null
GHSA-4p64-mr2w-44cv
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in I Thirteen Web Solution Email Subscription Popup allows Stored XSS.This issue affects Email Subscription Popup: from n/a through 1.2.20.
[]
null
7.1
null
null
CVE-2023-1033
Cross-Site Request Forgery (CSRF) in froxlor/froxlor
Cross-Site Request Forgery (CSRF) in GitHub repository froxlor/froxlor prior to 2.0.11.
[ "cpe:2.3:a:froxlor:froxlor:*:*:*:*:*:*:*:*" ]
null
null
6.8
null
GHSA-gg4x-m58x-wxg7
Cells Blog 3.5 has XSS via the jfdname parameter in an act=showpic request.
[]
null
null
6.1
null
GHSA-8c25-f3mj-v6h8
Sequelize information disclosure vulnerability
Due to improper input filtering in the sequelize js library, can malicious queries lead to sensitive information disclosure.
[]
null
5.3
null
null
CVE-2017-11845
Microsoft Edge in Microsoft Windows 10 1703 allows an attacker to execute arbitrary code in the context of the current user, due to how Microsoft Edge handles objects in memory, aka "Microsoft Edge Memory Corruption Vulnerability".
[ "cpe:2.3:a:microsoft:edge:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*" ]
null
null
7.5
7.6
GHSA-6x7r-m64x-22r6
PHP before 5.4.42, 5.5.x before 5.5.26, and 5.6.x before 5.6.10 does not ensure that pathnames lack %00 sequences, which might allow remote attackers to read or write to arbitrary files via crafted input to an application that calls (1) a DOMDocument save method or (2) the GD imagepsloadfont function, as demonstrated by a filename\0.html attack that bypasses an intended configuration in which client users may write to only .html files.
[]
null
null
6.5
null
GHSA-cgqf-hpv9-9g6m
Stack-based buffer overflow in Novell GroupWise Messenger before 2.0 Public Beta 2 allows remote attackers to execute arbitrary code via a long Accept-Language value without a comma or semicolon. NOTE: due to a typo, the original ZDI advisory accidentally referenced CVE-2006-0092. This is the correct identifier.
[]
null
null
null
null
GHSA-5mwr-c944-45q4
Cross-Site Request Forgery (CSRF) vulnerability in Luděk Melichar Better Anchor Links allows Cross-Site Scripting (XSS).This issue affects Better Anchor Links: from n/a through 1.7.5.
[]
null
7.1
null
null
CVE-2008-2910
Buffer overflow in the DXTTextOutEffect ActiveX control (aka the Text-Effect DXT Filter), as distributed in TextOut.dll 6.0.18.1 and mvtextout.dll, in muvee autoProducer 6.0 and 6.1 allows remote attackers to execute arbitrary code via a long FontSetting property value.
[ "cpe:2.3:a:muvee:autoproducer:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:muvee:autoproducer:6.1:*:*:*:*:*:*:*" ]
null
null
null
9.3
GHSA-xfh6-pvv6-h7qg
In the login screens (in agent and customer interface), Username and Password fields use autocomplete, which might be considered as security issue. This issue affects: ((OTRS)) Community Edition: 5.0.41 and prior versions, 6.0.26 and prior versions. OTRS: 7.0.15 and prior versions.
[]
null
4.3
null
null
CVE-2025-22327
WordPress EO4WP plugin <= 1.0.7 - Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Olaf Lederer EO4WP allows Stored XSS.This issue affects EO4WP: from n/a through 1.0.7.
[]
null
6.5
null
null
CVE-2020-14391
A flaw was found in the GNOME Control Center in Red Hat Enterprise Linux 8 versions prior to 8.2, where it improperly uses Red Hat Customer Portal credentials when a user registers a system through the GNOME Settings User Interface. This flaw allows a local attacker to discover the Red Hat Customer Portal password. The highest threat from this vulnerability is to confidentiality.
[ "cpe:2.3:a:gnome:control_center:-:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_aus:8.2:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_tus:8.2:*:*:*:*:*:*:*" ]
null
5.5
null
2.1
GHSA-wqc4-2cj5-89rj
Use-after-free vulnerability in Adobe Flash Player before 18.0.0.241 and 19.x before 19.0.0.185 on Windows and OS X and before 11.2.202.521 on Linux, Adobe AIR before 19.0.0.190, Adobe AIR SDK before 19.0.0.190, and Adobe AIR SDK & Compiler before 19.0.0.190 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-5570, CVE-2015-5581, CVE-2015-5584, and CVE-2015-6682.
[]
null
null
null
null
CVE-2022-4348
y_project RuoYi-Cloud JSON cross site scripting
A vulnerability was found in y_project RuoYi-Cloud. It has been rated as problematic. Affected by this issue is some unknown functionality of the component JSON Handler. The manipulation leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-215108.
[ "cpe:2.3:a:ruoyi:ruoyi-cloud:-:*:*:*:*:*:*:*" ]
null
3.5
null
null
GHSA-wh99-hh68-w2m5
In the Linux kernel, the following vulnerability has been resolved:drm/amd/display: Add null check for head_pipe in dcn201_acquire_free_pipe_for_layerThis commit addresses a potential null pointer dereference issue in the `dcn201_acquire_free_pipe_for_layer` function. The issue could occur when `head_pipe` is null.The fix adds a check to ensure `head_pipe` is not null before asserting it. If `head_pipe` is null, the function returns NULL to prevent a potential null pointer dereference.Reported by smatch: drivers/gpu/drm/amd/amdgpu/../display/dc/resource/dcn201/dcn201_resource.c:1016 dcn201_acquire_free_pipe_for_layer() error: we previously assumed 'head_pipe' could be null (see line 1010)
[]
null
5.5
null
null
GHSA-vfj5-r4fr-mp4h
Use after free in CSS in Google Chrome prior to 84.0.4147.105 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
[]
null
null
null
null
CVE-2020-6174
TUF (aka The Update Framework) through 0.12.1 has Improper Verification of a Cryptographic Signature.
[ "cpe:2.3:a:linuxfoundation:the_update_framework:*:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
CVE-2022-1125
Use after free in Portals in Google Chrome prior to 100.0.4896.60 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially exploit heap corruption via user interaction.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" ]
null
8.8
null
null
CVE-2007-5257
Stack-based buffer overflow in the EDraw.OfficeViewer ActiveX control in officeviewer.ocx in EDraw Office Viewer Component 5.3.220.1 and earlier allows remote attackers to execute arbitrary code via long strings in the first and second arguments to the FtpDownloadFile method, a different vector than CVE-2007-4821 and CVE-2007-3169.
[ "cpe:2.3:a:edraw:office_viewer_component:*:*:*:*:*:*:*:*" ]
null
null
null
10
GHSA-9pvp-xr4h-8mvr
Exposure of sensitive information to an unauthorized actor for some Edge Orchestrator software for Intel(R) Tiber™ Edge Platform may allow an authenticated user to potentially enable information disclosure via local access.
[]
4.8
5.5
null
null
GHSA-7hqw-2fxf-q78w
Lenovo Help Android mobile app versions earlier than 6.1.2.0327 allowed information to be transmitted over an HTTP channel, permitting others observing the channel to potentially see this information.
[]
null
null
7.5
null
GHSA-fxj6-8fmc-7h79
The Enjoy Social Feed plugin for WordPress website WordPress plugin through 6.2.2 does not have authorisation when resetting its database, allowing any authenticated users, such as subscriber to perform such action
[]
null
8.8
null
null
CVE-2012-4238
Cross-site scripting (XSS) vulnerability in admin/code/tce_edit_answer.php in TCExam before 11.3.008 allows remote authenticated users with level 5 or greater permissions to inject arbitrary web script or HTML via the question_subject_id parameter.
[ "cpe:2.3:a:tecnick:tcexam:*:*:*:*:*:*:*:*", "cpe:2.3:a:tecnick:tcexam:10.1.000:*:*:*:*:*:*:*", "cpe:2.3:a:tecnick:tcexam:10.1.001:*:*:*:*:*:*:*", "cpe:2.3:a:tecnick:tcexam:10.1.002:*:*:*:*:*:*:*", "cpe:2.3:a:tecnick:tcexam:10.1.003:*:*:*:*:*:*:*", "cpe:2.3:a:tecnick:tcexam:10.1.004:*:*:*:*:*:*:*", "cpe:2.3:a:tecnick:tcexam:10.1.005:*:*:*:*:*:*:*", "cpe:2.3:a:tecnick:tcexam:10.1.006:*:*:*:*:*:*:*", "cpe:2.3:a:tecnick:tcexam:10.1.007:*:*:*:*:*:*:*", "cpe:2.3:a:tecnick:tcexam:10.1.008:*:*:*:*:*:*:*", "cpe:2.3:a:tecnick:tcexam:10.1.009:*:*:*:*:*:*:*", "cpe:2.3:a:tecnick:tcexam:10.1.010:*:*:*:*:*:*:*", "cpe:2.3:a:tecnick:tcexam:10.1.011:*:*:*:*:*:*:*", "cpe:2.3:a:tecnick:tcexam:10.1.012:*:*:*:*:*:*:*", "cpe:2.3:a:tecnick:tcexam:10.1.013:*:*:*:*:*:*:*", "cpe:2.3:a:tecnick:tcexam:11.0.000:*:*:*:*:*:*:*", "cpe:2.3:a:tecnick:tcexam:11.0.001:*:*:*:*:*:*:*", "cpe:2.3:a:tecnick:tcexam:11.0.002:*:*:*:*:*:*:*", "cpe:2.3:a:tecnick:tcexam:11.0.003:*:*:*:*:*:*:*", "cpe:2.3:a:tecnick:tcexam:11.0.004:*:*:*:*:*:*:*", "cpe:2.3:a:tecnick:tcexam:11.0.005:*:*:*:*:*:*:*", "cpe:2.3:a:tecnick:tcexam:11.0.006:*:*:*:*:*:*:*", "cpe:2.3:a:tecnick:tcexam:11.0.007:*:*:*:*:*:*:*", "cpe:2.3:a:tecnick:tcexam:11.0.008:*:*:*:*:*:*:*", "cpe:2.3:a:tecnick:tcexam:11.0.009:*:*:*:*:*:*:*", "cpe:2.3:a:tecnick:tcexam:11.0.010:*:*:*:*:*:*:*", "cpe:2.3:a:tecnick:tcexam:11.0.011:*:*:*:*:*:*:*", "cpe:2.3:a:tecnick:tcexam:11.0.012:*:*:*:*:*:*:*", "cpe:2.3:a:tecnick:tcexam:11.0.013:*:*:*:*:*:*:*", "cpe:2.3:a:tecnick:tcexam:11.0.014:*:*:*:*:*:*:*", "cpe:2.3:a:tecnick:tcexam:11.0.015:*:*:*:*:*:*:*", "cpe:2.3:a:tecnick:tcexam:11.0.016:*:*:*:*:*:*:*", "cpe:2.3:a:tecnick:tcexam:11.1.000:*:*:*:*:*:*:*", "cpe:2.3:a:tecnick:tcexam:11.1.001:*:*:*:*:*:*:*", "cpe:2.3:a:tecnick:tcexam:11.1.002:*:*:*:*:*:*:*", "cpe:2.3:a:tecnick:tcexam:11.1.003:*:*:*:*:*:*:*", "cpe:2.3:a:tecnick:tcexam:11.1.004:*:*:*:*:*:*:*", "cpe:2.3:a:tecnick:tcexam:11.1.005:*:*:*:*:*:*:*", "cpe:2.3:a:tecnick:tcexam:11.1.006:*:*:*:*:*:*:*", "cpe:2.3:a:tecnick:tcexam:11.1.007:*:*:*:*:*:*:*", "cpe:2.3:a:tecnick:tcexam:11.1.008:*:*:*:*:*:*:*", "cpe:2.3:a:tecnick:tcexam:11.1.009:*:*:*:*:*:*:*", "cpe:2.3:a:tecnick:tcexam:11.1.010:*:*:*:*:*:*:*", "cpe:2.3:a:tecnick:tcexam:11.1.011:*:*:*:*:*:*:*", "cpe:2.3:a:tecnick:tcexam:11.1.012:*:*:*:*:*:*:*", "cpe:2.3:a:tecnick:tcexam:11.1.013:*:*:*:*:*:*:*", "cpe:2.3:a:tecnick:tcexam:11.1.014:*:*:*:*:*:*:*", "cpe:2.3:a:tecnick:tcexam:11.1.015:*:*:*:*:*:*:*", "cpe:2.3:a:tecnick:tcexam:11.1.016:*:*:*:*:*:*:*", "cpe:2.3:a:tecnick:tcexam:11.1.017:*:*:*:*:*:*:*", "cpe:2.3:a:tecnick:tcexam:11.1.018:*:*:*:*:*:*:*", "cpe:2.3:a:tecnick:tcexam:11.1.019:*:*:*:*:*:*:*", "cpe:2.3:a:tecnick:tcexam:11.1.020:*:*:*:*:*:*:*", "cpe:2.3:a:tecnick:tcexam:11.1.021:*:*:*:*:*:*:*", "cpe:2.3:a:tecnick:tcexam:11.1.022:*:*:*:*:*:*:*", "cpe:2.3:a:tecnick:tcexam:11.1.023:*:*:*:*:*:*:*", "cpe:2.3:a:tecnick:tcexam:11.1.024:*:*:*:*:*:*:*", "cpe:2.3:a:tecnick:tcexam:11.1.025:*:*:*:*:*:*:*", "cpe:2.3:a:tecnick:tcexam:11.1.026:*:*:*:*:*:*:*", "cpe:2.3:a:tecnick:tcexam:11.1.027:*:*:*:*:*:*:*", "cpe:2.3:a:tecnick:tcexam:11.1.028:*:*:*:*:*:*:*", "cpe:2.3:a:tecnick:tcexam:11.1.029:*:*:*:*:*:*:*", "cpe:2.3:a:tecnick:tcexam:11.1.030:*:*:*:*:*:*:*", "cpe:2.3:a:tecnick:tcexam:11.1.031:*:*:*:*:*:*:*", "cpe:2.3:a:tecnick:tcexam:11.2.000:*:*:*:*:*:*:*", "cpe:2.3:a:tecnick:tcexam:11.2.001:*:*:*:*:*:*:*", "cpe:2.3:a:tecnick:tcexam:11.2.002:*:*:*:*:*:*:*", "cpe:2.3:a:tecnick:tcexam:11.2.003:*:*:*:*:*:*:*", "cpe:2.3:a:tecnick:tcexam:11.2.004:*:*:*:*:*:*:*", "cpe:2.3:a:tecnick:tcexam:11.2.005:*:*:*:*:*:*:*", "cpe:2.3:a:tecnick:tcexam:11.2.006:*:*:*:*:*:*:*", "cpe:2.3:a:tecnick:tcexam:11.2.007:*:*:*:*:*:*:*", "cpe:2.3:a:tecnick:tcexam:11.2.008:*:*:*:*:*:*:*", "cpe:2.3:a:tecnick:tcexam:11.2.010:*:*:*:*:*:*:*", "cpe:2.3:a:tecnick:tcexam:11.2.011:*:*:*:*:*:*:*", "cpe:2.3:a:tecnick:tcexam:11.2.012:*:*:*:*:*:*:*", "cpe:2.3:a:tecnick:tcexam:11.2.013:*:*:*:*:*:*:*", "cpe:2.3:a:tecnick:tcexam:11.2.014:*:*:*:*:*:*:*", "cpe:2.3:a:tecnick:tcexam:11.2.015:*:*:*:*:*:*:*", "cpe:2.3:a:tecnick:tcexam:11.2.016:*:*:*:*:*:*:*", "cpe:2.3:a:tecnick:tcexam:11.2.017:*:*:*:*:*:*:*", "cpe:2.3:a:tecnick:tcexam:11.2.018:*:*:*:*:*:*:*", "cpe:2.3:a:tecnick:tcexam:11.2.020:*:*:*:*:*:*:*", "cpe:2.3:a:tecnick:tcexam:11.2.021:*:*:*:*:*:*:*", "cpe:2.3:a:tecnick:tcexam:11.2.022:*:*:*:*:*:*:*", "cpe:2.3:a:tecnick:tcexam:11.2.023:*:*:*:*:*:*:*", "cpe:2.3:a:tecnick:tcexam:11.2.025:*:*:*:*:*:*:*", "cpe:2.3:a:tecnick:tcexam:11.2.026:*:*:*:*:*:*:*", "cpe:2.3:a:tecnick:tcexam:11.2.027:*:*:*:*:*:*:*", "cpe:2.3:a:tecnick:tcexam:11.2.028:*:*:*:*:*:*:*", "cpe:2.3:a:tecnick:tcexam:11.2.029:*:*:*:*:*:*:*", "cpe:2.3:a:tecnick:tcexam:11.2.030:*:*:*:*:*:*:*", "cpe:2.3:a:tecnick:tcexam:11.2.031:*:*:*:*:*:*:*", "cpe:2.3:a:tecnick:tcexam:11.2.032:*:*:*:*:*:*:*", "cpe:2.3:a:tecnick:tcexam:11.3.000:*:*:*:*:*:*:*", "cpe:2.3:a:tecnick:tcexam:11.3.001:*:*:*:*:*:*:*", "cpe:2.3:a:tecnick:tcexam:11.3.002:*:*:*:*:*:*:*", "cpe:2.3:a:tecnick:tcexam:11.3.003:*:*:*:*:*:*:*", "cpe:2.3:a:tecnick:tcexam:11.3.004:*:*:*:*:*:*:*", "cpe:2.3:a:tecnick:tcexam:11.3.005:*:*:*:*:*:*:*", "cpe:2.3:a:tecnick:tcexam:11.3.006:*:*:*:*:*:*:*" ]
null
null
null
2.1
CVE-2022-42733
A vulnerability has been identified in syngo Dynamics (All versions < VA40G HF01). syngo Dynamics application server hosts a web service using an operation with improper read access control that could allow files to be retrieved from any folder accessible to the account assigned to the website’s application pool.
[ "cpe:2.3:a:siemens:syngo_dynamics_cardiovascular_imaging_and_information_system:*:*:*:*:*:*:*:*" ]
null
7.5
null
null
CVE-2022-22778
TIBCO BusinessConnect Trading Community Management Cross-Site Request Forgery Vulnerability
The Web Server component of TIBCO Software Inc.'s TIBCO BusinessConnect Trading Community Management contains an easily exploitable vulnerability that allows an unauthenticated attacker with network access to execute Cross-Site Request Forgery (CSRF) on the affected system. A successful attack using this vulnerability requires human interaction from a person other than the attacker. Affected releases are TIBCO Software Inc.'s TIBCO BusinessConnect Trading Community Management: versions 6.1.0 and below.
[ "cpe:2.3:a:tibco:businessconnect_trading_community_management:*:*:*:*:*:*:*:*" ]
null
8.8
null
null
CVE-2022-4328
WooCommerce Checkout Field Manager < 18.0 - Unauthenticated Arbitrary File Upload
The WooCommerce Checkout Field Manager WordPress plugin before 18.0 does not validate files to be uploaded, which could allow unauthenticated attackers to upload arbitrary files such as PHP on the server
[ "cpe:2.3:a:najeebmedia:woocommerce_checkout_field_manager:*:*:*:*:*:wordpress:*:*" ]
null
9.8
null
null
GHSA-f6rh-p7gj-vxrw
Cross-site scripting (XSS) vulnerability in WebCT Campus Edition allows remote attackers to inject arbitrary HTML or web script via (1) iframe, (2) img, or (3) object tags.
[]
null
null
null
null
GHSA-vhfr-93vm-g72f
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Dreamstime Stock Photos allows Reflected XSS. This issue affects Dreamstime Stock Photos: from n/a through 4.0.
[]
null
7.1
null
null
GHSA-2xg8-4h53-mm3v
Multiple cross-site scripting (XSS) vulnerabilities in the Printfriendly module 6.x before 6.x-1.6 for Drupal allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.
[]
null
null
null
null
GHSA-274q-pmx6-2j27
Cross-site scripting (XSS) vulnerability in add_prest_date.php in PHP-Daily allows remote attackers to inject arbitrary web script or HTML via the date parameter.
[]
null
null
null
null
CVE-2022-34728
Windows Graphics Component Information Disclosure Vulnerability
Windows Graphics Component Information Disclosure Vulnerability
[ "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:azure:*:*:*" ]
null
5.5
null
null
CVE-2023-36573
Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability
Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability
[ "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*" ]
null
7.3
null
null
CVE-2015-6364
Cisco Content Delivery System Manager Software 3.2 on Videoscape Distribution Suite Service Manager allows remote attackers to obtain sensitive information via crafted URLs in REST API requests, aka Bug ID CSCuv86960.
[ "cpe:2.3:a:cisco:videoscape_distribution_suite_service_manager:*:*:*:*:*:*:*:*" ]
null
null
null
5
CVE-2016-11055
Certain NETGEAR devices are affected by CSRF. This affects CM400 before 2017-01-11, CM600 before 2017-01-11, D1500 before 2017-01-11, D500 before 2017-01-11, DST6501 before 2017-01-11, JNR1010v1 before 2017-01-11, JWNR2000Tv3 before 2017-01-11, JWNR2010v3 before 2017-01-11, PLW1000 before 2017-01-11, PLW1010 before 2017-01-11, WNR500 before 2017-01-11, WNR612v3 before 2017-01-11, N450 before 2017-01-11, and CG3000Dv2 before 2017-01-11.
[ "cpe:2.3:o:netgear:cm400_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:cm400:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:cm600_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:cm600:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:d1500_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:d1500:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:d500_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:d500:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:dst6501_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:dst6501:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:jnr1010_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:jnr1010:v1:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:jwnr2000t_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:jwnr2000t:v3:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:jwnr2010_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:jwnr2010:v3:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:plw1000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:plw1000:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:plw1010_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:plw1010:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:wnr500_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:wnr500:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:wnr612_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:wnr612:v3:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:n450_cg3000d_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:n450_cg3000d:v2:*:*:*:*:*:*:*" ]
null
4.3
null
4.3
CVE-2001-0361
Implementations of SSH version 1.5, including (1) OpenSSH up to version 2.3.0, (2) AppGate, and (3) ssh-1 up to version 1.2.31, in certain configurations, allow a remote attacker to decrypt and/or alter traffic via a "Bleichenbacher attack" on PKCS#1 version 1.5.
[ "cpe:2.3:a:openbsd:openssh:1.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:openbsd:openssh:2.1:*:*:*:*:*:*:*", "cpe:2.3:a:openbsd:openssh:2.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ssh:ssh:*:*:*:*:*:*:*:*" ]
null
null
null
4
RHSA-2018:2654
Red Hat Security Advisory: OpenShift Container Platform 3.6 security and bug fix update
atomic-openshift: oc patch with json causes masterapi service crash
[ "cpe:/a:redhat:openshift:3.6::el7" ]
null
null
7.7
null
GHSA-48wg-v88q-c99m
An attacker with physical access can exploit this vulnerability to execute arbitrary code during DXE phase. A malicious code installed as a result of vulnerability exploitation in DXE driver could survive across an operating system (OS) boot process and runtime This issue affects: Module name: AMITSE SHA256: 288769fcb374d9280735e259c579e2dc209491f4da43b085d6aabc2d6e6ee57d Module GUID: b1da0adf-4f77-4070-a88e-bffe1c60529a This issue affects: AMI Aptio 5.x.
[]
null
7.2
null
null
CVE-2008-4635
Unspecified vulnerability in Hisanaga Electric Co, Ltd. hisa_cart 1.29 and earlier, a module for XOOPS, allows remote attackers to obtain sensitive user information via unknown vectors.
[ "cpe:2.3:a:hisanaga_electric_co:hisa_cart:*:*:*:*:*:*:*:*", "cpe:2.3:a:xoops:xoops:*:*:*:*:*:*:*:*" ]
null
null
null
5
CVE-2021-25485
Path traversal vulnerability in FactoryAirCommnadManger prior to SMR Oct-2021 Release 1 allows attackers to write file as system UID via BT remote socket.
[ "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*" ]
null
7.5
null
null
GHSA-vrwq-5w5v-p7gc
An issue was discovered on Samsung mobile devices with O(8.x) and P(9.0) (Exynos chipsets) software. A buffer overflow in the HDCP Trustlet affects secure TEEGRIS memory. The Samsung ID is SVE-2019-15283 (November 2019).
[]
null
null
null
null
GHSA-p26g-qhrp-vr2c
SAP Commerce does not sufficiently validate user-controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability in storefronts that are based on the product. Fixed in versions (SAP Hybris Commerce, versions 6.2, 6.3, 6.4, 6.5, 6.6, 6.7).
[]
null
null
6.1
null
CVE-2019-16225
An issue was discovered in py-lmdb 0.97. For certain values of mp_flags, mdb_page_touch does not properly set up mc->mc_pg[mc->top], leading to an invalid write operation. NOTE: this outcome occurs when accessing a data.mdb file supplied by an attacker.
[ "cpe:2.3:a:py-lmdb_project:py-lmdb:*:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
GHSA-6wrv-4365-28fr
IBM Rational Quality Manager and IBM Rational Collaborative Lifecycle Management 5.0 through 5.0.2 and 6.0 through 6.0.5 are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 125154.
[]
null
null
5.4
null
GHSA-7rp7-7c38-2w9q
The Internet Group Management Protocol (IGMP) allows local users to cause a denial of service via an IGMP membership report to a target's Ethernet address instead of the Multicast group address, which causes the target to stop sending reports to the router and effectively disconnect the group from the network.
[]
null
null
null
null
GHSA-qq83-6xfj-jf89
An unauthenticated Cross-Site Scripting (XSS) vulnerability found in Webkul QloApps 1.6.0 allows an attacker to obtain a user's session cookie and then impersonate that user via GET configure parameter.
[]
null
5.4
null
null
CVE-2021-22171
Insufficient validation of authentication parameters in GitLab Pages for GitLab 11.5+ allows an attacker to steal a victim's API token if they click on a maliciously crafted link
[ "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*" ]
null
7.3
null
null
GHSA-fxxp-x7gp-x9wq
Tenda AC7 V1.0 V15.03.06.44, Tenda AC9 V3.0 V15.03.06.42_multi, and Tenda AC5 V1.0RTL_V15.03.06.28 were discovered to contain a stack overflow via parameter page at url /goform/NatStaticSetting.
[]
null
9.8
null
null
GHSA-cvcq-gmc3-q6m8
Apache Airflow logs passwords in plaintext
In Airflow versions prior to 1.10.13, when creating a user using airflow CLI, the password gets logged in plain text in the Log table in Airflow Metadatase. The same happenes when creating a Connection with a password field.
[]
2.4
2.8
null
null
CVE-2015-4051
Beckhoff IPC Diagnostics before 1.8 does not properly restrict access to functions in /config, which allows remote attackers to cause a denial of service (reboot or shutdown), create arbitrary users, or possibly have unspecified other impact via a crafted request, as demonstrated by a beckhoff.com:service:cxconfig:1#Write SOAP action to /upnpisapi.
[ "cpe:2.3:a:beckhoff:ipc_diagnostics:*:*:*:*:*:*:*:*" ]
null
null
null
9
CVE-2024-10412
Poco-z Guns-Medical File Upload upload cross site scripting
A vulnerability was found in Poco-z Guns-Medical 1.0. It has been declared as problematic. Affected by this vulnerability is the function upload of the file /mgr/upload of the component File Upload. The manipulation of the argument picture leads to cross site scripting. The attack can be launched remotely.
[ "cpe:2.3:a:poco-z:guns-medial:1.0:*:*:*:*:*:*:*" ]
5.3
3.5
3.5
4
CVE-2024-50838
A Stored Cross-Site Scripting (XSS) vulnerability was found in /admin/department.php in KASHIPARA E-learning Management System Project 1.0. This vulnerability allows remote attackers to execute arbitrary scripts via the d and pi parameters.
[ "cpe:2.3:a:kashipara:e_learning_management_system_project:*:*:*:*:*:*:*:*" ]
null
5.4
null
null
GHSA-78r6-645f-335q
In the Linux kernel, the following vulnerability has been resolved:drm/amd/display: Refactor DMCUB enter/exit idle interface[Why] We can hang in place trying to send commands when the DMCUB isn't powered on.[How] We need to exit out of the idle state prior to sending a command, but the process that performs the exit also invokes a command itself.Fixing this issue involves the following:Using a software state to track whether or not we need to start the process to exit idle or notify idle.It's possible for the hardware to have exited an idle state without driver knowledge, but entering one is always restricted to a driver allow - which makes the SW state vs HW state mismatch issue purely one of optimization, which should seldomly be hit, if at all.Refactor any instances of exit/notify idle to use a single wrapper that maintains this SW state.This works simialr to dc_allow_idle_optimizations, but works at the DMCUB level and makes sure the state is marked prior to any notify/exit idle so we don't enter an infinite loop.Make sure we exit out of idle prior to sending any commands or waiting for DMCUB idle.This patch takes care of 1/2. A future patch will take care of wrapping DMCUB command submission with calls to this new interface.
[]
null
5.5
null
null
CVE-2023-31273
Protection mechanism failure in some Intel DCM software before version 5.2 may allow an unauthenticated user to potentially enable escalation of privilege via network access.
[ "cpe:2.3:a:intel:data_center_manager:*:*:*:*:*:*:*:*" ]
null
10
null
null
GHSA-jqx9-x6x8-85cw
Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.40 and prior, 8.4.3 and prior and 9.1.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
[]
null
4.9
null
null
GHSA-fv9v-rf5q-x237
Use-after-free vulnerability in Google Chrome before 18.0.1025.151 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to focus handling.
[]
null
null
null
null
GHSA-2jw8-6fx5-rgrf
Google Chrome before 19.0.1084.52 on Linux does not properly perform a cast of an unspecified variable, which allows remote attackers to cause a denial of service or possibly have unknown other impact by leveraging an error in the GTK implementation of the UI.
[]
null
null
null
null
GHSA-fpx3-552f-qj3v
Buffer overflow in mpg123 before 1.18.0.
[]
null
null
7.5
null
CVE-2014-4310
Unspecified vulnerability in the JPublisher component in Oracle Database Server 11.1.0.7, 11.2.0.3, 11.2.0.4, 12.1.0.1, and 12.1.0.2 allows remote authenticated users to affect confidentiality via unknown vectors, a different vulnerability than CVE-2014-4290, CVE-2014-4291, CVE-2014-4292, CVE-2014-4293, CVE-2014-4296, CVE-2014-4297, CVE-2014-6547, and CVE-2014-6477.
[ "cpe:2.3:a:oracle:database_server:11.1.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:database_server:11.2.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:database_server:11.2.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:database_server:12.1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:database_server:12.1.0.2:*:*:*:*:*:*:*" ]
null
null
null
4
CVE-2005-4757
BEA WebLogic Server and WebLogic Express 8.1 SP3 and earlier, and 7.0 SP5 and earlier, do not properly "constrain" a "/" (slash) servlet root URL pattern, which might allow remote attackers to bypass intended servlet protections.
[ "cpe:2.3:a:bea:weblogic_server:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:7.0:*:express:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:7.0:sp1:*:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:7.0:sp1:express:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:7.0:sp2:*:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:7.0:sp2:express:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:7.0:sp3:*:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:7.0:sp3:express:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:7.0:sp4:*:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:7.0:sp4:express:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:7.0:sp5:*:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:7.0:sp5:express:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:8.1:*:*:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:8.1:*:express:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:8.1:sp1:*:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:8.1:sp1:express:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:8.1:sp2:*:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:8.1:sp2:express:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:8.1:sp3:*:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:8.1:sp3:express:*:*:*:*:*" ]
null
null
null
7.5
GHSA-45g3-mf2x-6mxc
Pantomime in Ecartis 1.0.0 snapshot 20050909 stores e-mail attachments in a publicly accessible directory, which may allow remote attackers to upload arbitrary files.
[]
null
null
null
null
CVE-2017-9721
In android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, in the boot loader, a buffer overflow can occur while parsing the splash image.
[ "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*" ]
null
null
7.8
4.6
GHSA-44j6-w488-fjgw
Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45; Java SE Embedded 7u75; and Java SE Embedded 8u33 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JMX.
[]
null
null
null
null
GHSA-7q7g-fjp6-g4rg
Reflected Cross-Site Scripting (XSS) in TeamCal Neo, version 3.8.2. This allows an attacker to execute malicious JavaScript code, after injecting code via the ‘abs’ parameter in ‘/teamcal/src/index.php’.
[]
null
6.1
null
null
GHSA-m3r4-hpjv-ph84
In the Linux kernel, the following vulnerability has been resolved:powerpc/pseries: Fix use after free in remove_phb_dynamic()In remove_phb_dynamic() we use &phb->io_resource, after we've called device_unregister(&host_bridge->dev). But the unregister may have freed phb, because pcibios_free_controller_deferred() is the release function for the host_bridge.If there are no outstanding references when we call device_unregister() then phb will be freed out from under us.This has gone mainly unnoticed, but with slub_debug and page_poison enabled it can lead to a crash:PID: 7574 TASK: c0000000d492cb80 CPU: 13 COMMAND: "drmgr" #0 [c0000000e4f075a0] crash_kexec at c00000000027d7dc #1 [c0000000e4f075d0] oops_end at c000000000029608 #2 [c0000000e4f07650] __bad_page_fault at c0000000000904b4 #3 [c0000000e4f076c0] do_bad_slb_fault at c00000000009a5a8 #4 [c0000000e4f076f0] data_access_slb_common_virt at c000000000008b30 Data SLB Access [380] exception frame: R0: c000000000167250 R1: c0000000e4f07a00 R2: c000000002a46100 R3: c000000002b39ce8 R4: 00000000000000c0 R5: 00000000000000a9 R6: 3894674d000000c0 R7: 0000000000000000 R8: 00000000000000ff R9: 0000000000000100 R10: 6b6b6b6b6b6b6b6b R11: 0000000000008000 R12: c00000000023da80 R13: c0000009ffd38b00 R14: 0000000000000000 R15: 000000011c87f0f0 R16: 0000000000000006 R17: 0000000000000003 R18: 0000000000000002 R19: 0000000000000004 R20: 0000000000000005 R21: 000000011c87ede8 R22: 000000011c87c5a8 R23: 000000011c87d3a0 R24: 0000000000000000 R25: 0000000000000001 R26: c0000000e4f07cc8 R27: c00000004d1cc400 R28: c0080000031d00e8 R29: c00000004d23d800 R30: c00000004d1d2400 R31: c00000004d1d2540 NIP: c000000000167258 MSR: 8000000000009033 OR3: c000000000e9f474 CTR: 0000000000000000 LR: c000000000167250 XER: 0000000020040003 CCR: 0000000024088420 MQ: 0000000000000000 DAR: 6b6b6b6b6b6b6ba3 DSISR: c0000000e4f07920 Syscall Result: fffffffffffffff2 [NIP : release_resource+56] [LR : release_resource+48] #5 [c0000000e4f07a00] release_resource at c000000000167258 (unreliable) #6 [c0000000e4f07a30] remove_phb_dynamic at c000000000105648 #7 [c0000000e4f07ab0] dlpar_remove_slot at c0080000031a09e8 [rpadlpar_io] #8 [c0000000e4f07b50] remove_slot_store at c0080000031a0b9c [rpadlpar_io] #9 [c0000000e4f07be0] kobj_attr_store at c000000000817d8c #10 [c0000000e4f07c00] sysfs_kf_write at c00000000063e504 #11 [c0000000e4f07c20] kernfs_fop_write_iter at c00000000063d868 #12 [c0000000e4f07c70] new_sync_write at c00000000054339c #13 [c0000000e4f07d10] vfs_write at c000000000546624 #14 [c0000000e4f07d60] ksys_write at c0000000005469f4 #15 [c0000000e4f07db0] system_call_exception at c000000000030840 #16 [c0000000e4f07e10] system_call_vectored_common at c00000000000c168To avoid it, we can take a reference to the host_bridge->dev until we're done using phb. Then when we drop the reference the phb will be freed.
[]
null
7.8
null
null
GHSA-vf89-34pm-h342
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit Studio Photo 3.6.6.909. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the conversion from JPEG to EPS. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated structure. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the current process. Was ZDI-CAN-8809.
[]
null
4.3
null
null
GHSA-qq9x-qfpc-4mc4
Multiple heap-based buffer overflows in EMC RepliStor 6.2 SP2, and possibly earlier versions, allow remote attackers to execute arbitrary code via crafted compressed data.
[]
null
null
null
null
GHSA-m68w-xhxj-vfr6
Apple iTunes before 8.1 on Windows allows remote attackers to cause a denial of service (infinite loop) via a Digital Audio Access Protocol (DAAP) message with a crafted Content-Length header.
[]
null
null
null
null
CVE-2024-50497
WordPress Advanced Online Ordering and Delivery Platform plugin <= 2.0.0 - Local File Inclusion vulnerability
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in BuyNowDepot Advanced Online Ordering and Delivery Platform allows PHP Local File Inclusion.This issue affects Advanced Online Ordering and Delivery Platform: from n/a through 2.0.0.
[ "cpe:2.3:a:buynowdepot:advanced_online_ordering_and_delivery_platform:*:*:*:*:*:*:*:*", "cpe:2.3:a:buynowdepot:advanced_online_ordering_and_delivery_platform:*:*:*:*:*:wordpress:*:*" ]
null
8.1
null
null
CVE-2012-5623
Squirrelmail 4.0 uses the outdated MD5 hash algorithm for passwords.
[ "cpe:2.3:a:squirrelmail:change_passwd:4.0:*:*:*:*:squirrelmail:*:*" ]
null
7.5
null
5
CVE-2019-10311
A missing permission check in Jenkins Ansible Tower Plugin 0.9.1 and earlier in the TowerInstallation.TowerInstallationDescriptor#doTestTowerConnection form validation method allowed attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
[ "cpe:2.3:a:jenkins:ansible_tower:*:*:*:*:*:jenkins:*:*" ]
null
8.8
null
4
CVE-2019-14687
A DLL hijacking vulnerability exists in Trend Micro Password Manager 5.0 in which, if exploited, would allow an attacker to load an arbitrary unsigned DLL into the signed service's process. This process is very similar, yet not identical to CVE-2019-14684.
[ "cpe:2.3:a:trendmicro:password_manager:5.0:*:*:*:*:*:*:*" ]
null
null
7.8
6.8
CVE-2002-2325
The c-client library in Internet Message Access Protocol (IMAP) dated before 2002 RC2, as used by Pine 4.20 through 4.44, allows remote attackers to cause a denial of service (client crash) via a MIME-encoded email with Content-Type header containing an empty boundary field.
[ "cpe:2.3:a:university_of_washington:pine:4.20:*:*:*:*:*:*:*", "cpe:2.3:a:university_of_washington:pine:4.21:*:*:*:*:*:*:*", "cpe:2.3:a:university_of_washington:pine:4.30:*:*:*:*:*:*:*", "cpe:2.3:a:university_of_washington:pine:4.33:*:*:*:*:*:*:*", "cpe:2.3:a:university_of_washington:pine:4.44:*:*:*:*:*:*:*" ]
null
null
null
7.8
CVE-2021-40988
A remote directory traversal vulnerability was discovered in Aruba ClearPass Policy Manager version(s): ClearPass Policy Manager 6.10.x prior to 6.10.2 - - ClearPass Policy Manager 6.9.x prior to 6.9.7-HF1 - - ClearPass Policy Manager 6.8.x prior to 6.8.9-HF1. Aruba has released patches for ClearPass Policy Manager that address this security vulnerability.
[ "cpe:2.3:a:arubanetworks:clearpass_policy_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:arubanetworks:clearpass_policy_manager:6.8.9:-:*:*:*:*:*:*", "cpe:2.3:a:arubanetworks:clearpass_policy_manager:6.9.7:-:*:*:*:*:*:*" ]
null
7.2
null
9
GHSA-pr3h-6qhj-vf3x
The Bookly plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the full name value in versions up to, and including, 21.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
6.1
null
null
CVE-2000-0419
The Office 2000 UA ActiveX Control is marked as "safe for scripting," which allows remote attackers to conduct unauthorized activities via the "Show Me" function in Office Help, aka the "Office 2000 UA Control" vulnerability.
[ "cpe:2.3:a:microsoft:access:2000:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:excel:2000:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:frontpage:2000:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2000:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:outlook:2000:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:photodraw_2000:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:powerpoint:2000:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:project:2000:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:word:2000:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:works:2000:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2014-3014
Cross-site scripting (XSS) vulnerability in the Meeting Server in IBM Sametime 8.x through 8.5.2.1 and 9.x through 9.0.0.1 allows remote authenticated users to inject arbitrary web script or HTML via a crafted URL.
[ "cpe:2.3:a:ibm:sametime:8.0.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:sametime:8.0.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:sametime:8.0.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:sametime:8.0.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:sametime:8.0.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:sametime:8.5.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:sametime:8.5.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:sametime:8.5.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:sametime:8.5.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:sametime:8.5.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:sametime:9.0.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:sametime:9.0.0.1:*:*:*:*:*:*:*" ]
null
null
null
3.5
GHSA-w843-352m-75pp
Cross-site scripting (XSS) vulnerability in the (1) FreiChat component before 2.1.2 for Joomla! and the (2) FreiChatPure component before 1.2.2 for Joomla! allows remote attackers to inject arbitrary web script or HTML by entering it in an unspecified window.
[]
null
null
null
null
CVE-2022-2856
Insufficient validation of untrusted input in Intents in Google Chrome on Android prior to 104.0.5112.101 allowed a remote attacker to arbitrarily browse to a malicious website via a crafted HTML page.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
6.5
null
null
GHSA-qf43-62jc-r476
A security vulnerability in HPE Integrated Lights-Out 3 prior to v1.90, iLO 4 prior to v2.60, iLO 5 prior to v1.30, Moonshot Chassis Manager firmware prior to v1.58, and Moonshot Component Pack prior to v2.55 could be remotely exploited to create a denial of service.
[]
null
null
8.6
null
GHSA-24px-fh32-jvj7
Cross-site scripting (XSS) vulnerability in IBM Security Network Protection 3100, 4100, 5100, and 7100 devices with firmware 5.2 before 5.2.0.0-ISS-XGS-All-Models-Hotfix-FP0008 and 5.3 before 5.3.0.5 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
[]
null
null
6.1
null
CVE-2012-0293
Multiple SQL injection vulnerabilities in Symantec Altiris WISE Package Studio before 8.0MR1 allow remote attackers to execute arbitrary SQL commands via unspecified vectors.
[ "cpe:2.3:a:symantec:altiris_wise_package_studio:*:*:*:*:*:*:*:*", "cpe:2.3:a:symantec:altiris_wise_package_studio:7:sp2:*:*:*:*:*:*", "cpe:2.3:a:symantec:altiris_wise_package_studio:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:symantec:altiris_wise_package_studio:7.0:sp1:*:*:*:*:*:*", "cpe:2.3:a:symantec:altiris_wise_package_studio:7.0:sp1:mr1:*:*:*:*:*", "cpe:2.3:a:symantec:altiris_wise_package_studio:7.0:sp3:*:*:*:*:*:*" ]
null
null
null
6.8
CVE-2018-3980
An exploitable out-of-bounds write exists in the TIFF-parsing functionality of Canvas Draw version 5.0.0. A specially crafted TIFF image processed via the application can lead to an out-of-bounds write, overwriting arbitrary data. An attacker can deliver a TIFF image to trigger this vulnerability and gain code execution.
[ "cpe:2.3:a:canvasgfx:canvas_draw:5.0.0:*:*:*:*:macos:*:*" ]
null
null
8.8
null
GHSA-vv79-p5p7-73ch
The SNMP implementation in the Cisco Wireless LAN Controller (WLC) before 20070419 uses the default read-only community public, and the default read-write community private, which allows remote attackers to read and modify SNMP variables, aka Bug ID CSCse02384.
[]
null
null
null
null
CVE-2007-4325
PHP remote file inclusion vulnerability in index.php in Gaestebuch 1.5 allows remote attackers to execute arbitrary PHP code via a URL in the config[root_ordner] parameter.
[ "cpe:2.3:a:mapos_scripts:gaestebuch:1.5:*:*:*:*:*:*:*" ]
null
null
null
6.8
CVE-2011-3988
SQL injection vulnerability in data/class/SC_Query.php in EC-CUBE 2.11.0 through 2.11.2 allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
[ "cpe:2.3:a:lockon:ec-cube:2.11.0:*:*:*:*:*:*:*", "cpe:2.3:a:lockon:ec-cube:2.11.1:*:*:*:*:*:*:*", "cpe:2.3:a:lockon:ec-cube:2.11.2:*:*:*:*:*:*:*" ]
null
null
null
7.5