id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
139k
cpes
sequencelengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
CVE-2021-21409
Possible request smuggling in HTTP/2 due missing validation of content-length
Netty is an open-source, asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. In Netty (io.netty:netty-codec-http2) before version 4.1.61.Final there is a vulnerability that enables request smuggling. The content-length header is not correctly validated if the request only uses a single Http2HeaderFrame with the endStream set to to true. This could lead to request smuggling if the request is proxied to a remote peer and translated to HTTP/1.1. This is a followup of GHSA-wm47-8v5p-wjpj/CVE-2021-21295 which did miss to fix this one case. This was fixed as part of 4.1.61.Final.
[ "cpe:2.3:a:netty:netty:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:oncommand_api_services:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:banking_corporate_lending_process_management:14.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:banking_corporate_lending_process_management:14.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:banking_corporate_lending_process_management:14.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:banking_credit_facilities_process_management:14.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:banking_credit_facilities_process_management:14.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:banking_credit_facilities_process_management:14.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:banking_trade_finance_process_management:14.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:banking_trade_finance_process_management:14.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:banking_trade_finance_process_management:14.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:coherence:12.2.1.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:coherence:14.1.1.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:12.0.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:communications_cloud_native_core_console:1.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:communications_cloud_native_core_policy:1.14.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:communications_design_studio:7.4.2.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:communications_messaging_server:8.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:helidon:1.4.10:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:helidon:2.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:*:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:nosql_database:*:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:primavera_gateway:*:*:*:*:*:*:*:*", "cpe:2.3:a:quarkus:quarkus:*:*:*:*:*:*:*:*" ]
null
5.9
null
null
CVE-2015-5791
WebKit, as used in JavaScriptCore in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3.
[ "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*" ]
null
null
null
6.8
CVE-2007-5144
Buffer overflow in the GDI engine in Windows Live Messenger, as used for Windows MSN Live 8.1, allows user-assisted remote attackers to cause a denial of service (application crash or system crash) and possibly execute arbitrary code by placing a malformed file in a new folder under the Sharing Folders path, and triggering a synchronize operation through the Windows MSN Live online service, possibly related to extended file attributes and possibly related to an incomplete fix for MS07-046, as demonstrated by a (1) .jpg, (2) .gif, (3) .wmf, (4) .doc, or (5) .ico file.
[ "cpe:2.3:a:microsoft:windows_live_messenger:8.1:*:*:*:*:*:*:*" ]
null
null
null
4.3
CVE-2023-41969
ZSATrayManager Arbitrary File Deletion
An arbitrary file deletion in ZSATrayManager where it protects the temporary encrypted ZApp issue reporting file from the unprivileged end user access and modification. Fixed version: Win ZApp 4.3.0 and later.
[ "cpe:2.3:a:zscaler:client_connector:*:*:*:*:*:*:*:*" ]
null
7.3
null
null
GHSA-gp7f-2x97-vf49
Cross-site scripting (XSS) vulnerability in info2www before 1.2.2.9 allows remote attackers to inject arbitrary web script or HTML via the arguments to info2www.
[]
null
null
null
null
GHSA-33jq-g649-fc48
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Andy Moyle Church Admin allows Reflected XSS.This issue affects Church Admin: from n/a before 5.0.0.
[]
null
7.1
null
null
GHSA-p8xr-4v2c-rvgp
High severity vulnerability that affects org.apache.hbase:hbase
Apache HBase 0.98 before 0.98.12.1, 1.0 before 1.0.1.1, and 1.1 before 1.1.0.1, as used in IBM InfoSphere BigInsights 3.0, 3.0.0.1, and 3.0.0.2 and other products, uses incorrect ACLs for ZooKeeper coordination state, which allows remote attackers to cause a denial of service (daemon outage), obtain sensitive information, or modify data via unspecified client traffic.
[]
null
null
7.3
null
CVE-2018-15974
Adobe Framemaker versions 1.0.5.1 and below have an insecure library loading (dll hijacking) vulnerability. Successful exploitation could lead to privilege escalation.
[ "cpe:2.3:a:adobe:framemaker:*:*:*:*:*:*:*:*" ]
null
null
7.8
6.8
GHSA-5c4g-wxx8-6c9r
A memory corruption issue was addressed with improved validation. This issue is fixed in tvOS 15.4, iOS 15.4 and iPadOS 15.4, watchOS 8.5. Processing a maliciously crafted image may lead to heap corruption.
[]
null
7.8
null
null
CVE-2021-44430
A vulnerability has been identified in JT Utilities (All versions < V13.1.1.0), JTTK (All versions < V11.1.1.0). JTTK library in affected products is vulnerable to an out of bounds write past the end of an allocated structure while parsing specially crafted JT files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-14829)
[ "cpe:2.3:a:siemens:jt_open_toolkit:*:*:*:*:*:*:*:*", "cpe:2.3:a:siemens:jt_utilities:*:*:*:*:*:*:*:*" ]
null
7.8
null
6.8
CVE-2021-0284
Junos OS: Upon receipt of specific sequences of genuine packets destined to the device the kernel will crash and restart (vmcore)
A buffer overflow vulnerability in the TCP/IP stack of Juniper Networks Junos OS allows an attacker to send specific sequences of packets to the device thereby causing a Denial of Service (DoS). By repeatedly sending these sequences of packets to the device, an attacker can sustain the Denial of Service (DoS) condition. The device will abnormally shut down as a result of these sent packets. A potential indicator of compromise will be the following message in the log files: "eventd[13955]: SYSTEM_ABNORMAL_SHUTDOWN: System abnormally shut down" This issue is only triggered by traffic destined to the device. Transit traffic will not trigger this issue. This issue affects: Juniper Networks Junos OS 12.3 versions prior to 12.3R12-S19; 15.1 versions prior to 15.1R7-S10; 17.3 versions prior to 17.3R3-S12; 18.4 versions prior to 18.4R2-S9, 18.4R3-S9; 19.1 versions prior to 19.1R3-S7; 19.2 versions prior to 19.2R1-S7, 19.2R3-S3; 19.3 versions prior to 19.3R2-S7, 19.3R3-S3; 19.4 versions prior to 19.4R3-S5; 20.1 versions prior to 20.1R3-S1; 20.2 versions prior to 20.2R3-S2; 20.3 versions prior to 20.3R3-S1; 20.4 versions prior to 20.4R2-S2, 20.4R3; 21.1 versions prior to 21.1R2; 21.2 versions prior to 21.2R1-S1, 21.2R2.
[ "cpe:2.3:o:juniper:junos:12.3:-:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3:r10:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3:r10-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3:r10-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3:r11:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3:r12:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3:r12-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3:r12-s10:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3:r12-s11:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3:r12-s12:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3:r12-s13:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3:r12-s14:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3:r12-s15:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3:r12-s16:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3:r12-s17:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3:r12-s18:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3:r12-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3:r12-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3:r12-s6:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3:r12-s8:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:-:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:a1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:f:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:f1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:f2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:f2-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:f2-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:f2-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:f2-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:f3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:f4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:f5:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:f5-s7:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:f6:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:f6-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:f6-s10:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:f6-s12:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:f6-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:f6-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:f6-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:f6-s5:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:f6-s6:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:f6-s7:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:f6-s8:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:f6-s9:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:f7:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:r:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:r4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:r4-s7:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:r4-s8:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:r4-s9:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:r5:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:r5-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:r5-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:r5-s5:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:r5-s6:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:r6:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:r6-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:r6-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:r6-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:r6-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:r6-s6:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:r7:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:r7-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:r7-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:r7-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:r7-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:r7-s5:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:r7-s6:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:r7-s7:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:r7-s8:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:r7-s9:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.3:-:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.3:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.3:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.3:r1-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.3:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.3:r2-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.3:r2-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.3:r2-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.3:r2-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.3:r2-s5:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.3:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.3:r3:-:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.3:r3-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.3:r3-s10:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.3:r3-s11:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.3:r3-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.3:r3-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.3:r3-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.3:r3-s5:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.3:r3-s6:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.3:r3-s7:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.3:r3-s8:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.3:r3-s9:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:-:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:r1-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:r1-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:r1-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:r1-s5:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:r1-s6:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:r1-s7:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:r2-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:r2-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:r2-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:r2-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:r2-s5:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:r2-s6:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:r2-s7:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:r2-s8:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:r3-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:r3-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:r3-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:r3-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:r3-s5:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:r3-s6:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:r3-s7:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:r3-s8:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.2:-:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.2:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.2:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.2:r1-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.2:r1-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.2:r1-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.2:r1-s5:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.2:r1-s6:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.2:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.2:r2-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.2:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.2:r3-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.2:r3-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.3:-:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.3:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.3:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.3:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.3:r2-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.3:r2-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.3:r2-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.3:r2-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.3:r2-s5:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.3:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.3:r3-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.3:r3-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r1-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r1-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r2-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r2-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r2-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r3-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r3-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r3-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r3-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.1:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.1:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.1:r1-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.1:r1-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.1:r1-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.1:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.1:r2-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.1:r2-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.1:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.2:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.2:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.2:r1-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.2:r1-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.2:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.2:r2-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.2:r2-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.2:r2-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.2:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.2:r3-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.3:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.3:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.3:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.3:r2-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.3:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.4:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.4:r2-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.1:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.1:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*" ]
null
7.5
null
null
CVE-2021-42784
OS Command Injection in debug_fcgi in D-Link DWR-932C E1 Firmware 1.0.0.4
OS Command Injection vulnerability in debug_fcgi of D-Link DWR-932C E1 firmware allows a remote attacker to perform command injection via a crafted HTTP request.
[ "cpe:2.3:o:dlink:dwr-932c_e1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:dwr-932c:revision_e:*:*:*:*:*:*:*" ]
null
9.8
null
10
GHSA-x3cf-w64x-4cp2
Symfony Path Disclosure
An issue was discovered in Symfony 2.7.x before 2.7.50, 2.8.x before 2.8.49, 3.x before 3.4.20, 4.0.x before 4.0.15, 4.1.x before 4.1.9, and 4.2.x before 4.2.1. When using the scalar type hint `string` in a setter method (e.g. `setName(string $name)`) of a class that's the `data_class` of a form, and when a file upload is submitted to the corresponding field instead of a normal text input, then `UploadedFile::__toString()` is called which will then return and disclose the path of the uploaded file. If combined with a local file inclusion issue in certain circumstances this could escalate it to a Remote Code Execution.
[]
null
null
5.3
null
CVE-2017-2851
In the web management interface in Foscam C1 Indoor HD cameras with application firmware 2.52.2.37, a specially crafted HTTP request can cause a buffer overflow.
[ "cpe:2.3:o:foscam:c1_indoor_hd_camera_firmware:2.52.2.37:*:*:*:*:*:*:*", "cpe:2.3:h:foscam:c1_indoor_hd_camera:-:*:*:*:*:*:*:*" ]
null
null
7.5
null
CVE-2013-1508
Unspecified vulnerability in the Oracle GlassFish Server component in Oracle Sun Middleware Products 3.0.1 and 3.1.2 allows remote attackers to affect integrity via vectors related to REST Interface.
[ "cpe:2.3:a:oracle:glassfish_server:3.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:glassfish_server:3.1.2:*:*:*:*:*:*:*" ]
null
null
null
4.3
CVE-2024-43318
WordPress E2Pdf – Export To Pdf Tool for WordPress plugin <= 1.25.05 - Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in E2Pdf.Com allows Stored XSS.This issue affects e2pdf: from n/a through 1.25.05.
[ "cpe:2.3:a:e2pdf:e2pdf:*:*:*:*:*:wordpress:*:*" ]
null
6.5
null
null
GHSA-79qh-6942-3q57
A privacy issue was addressed with improved private data redaction for log entries. This issue is fixed in macOS Ventura 13.3, macOS Big Sur 11.7.5, watchOS 9.4, tvOS 16.4, iOS 15.7.4 and iPadOS 15.7.4, iOS 16.4 and iPadOS 16.4. An app may be able to access information about a user’s contacts
[]
null
3.3
null
null
CVE-2017-9372
PJSIP, as used in Asterisk Open Source 13.x before 13.15.1 and 14.x before 14.4.1, Certified Asterisk 13.13 before 13.13-cert4, and other products, allows remote attackers to cause a denial of service (buffer overflow and application crash) via a SIP packet with a crafted CSeq header in conjunction with a Via header that lacks a branch parameter.
[ "cpe:2.3:a:digium:open_source:13.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:open_source:13.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:open_source:13.1.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:open_source:13.1.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:open_source:13.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:open_source:13.2.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:open_source:13.3.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:open_source:13.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:open_source:13.4.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:open_source:13.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:open_source:13.5.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:open_source:13.6.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:open_source:13.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:open_source:13.7.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:open_source:13.8.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:open_source:13.8.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:open_source:13.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:open_source:13.8.2:*:*:*:*:*:*:*", "cpe:2.3:a:digium:open_source:13.9.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:open_source:13.9.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:open_source:13.10.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:open_source:13.11.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:open_source:13.12.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:open_source:13.12.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:open_source:13.12.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:open_source:13.12.2:*:*:*:*:*:*:*", "cpe:2.3:a:digium:open_source:13.13.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:open_source:13.14.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:open_source:13.15.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:open_source:14.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:open_source:14.0.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:digium:open_source:14.0.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:digium:open_source:14.0.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:open_source:14.1.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:open_source:14.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:open_source:14.2.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:open_source:14.2.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:open_source:14.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:open_source:14.3.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:open_source:14.4.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:certified_asterisk:13.13.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:certified_asterisk:13.13.0:cert1:*:*:*:*:*:*", "cpe:2.3:a:digium:certified_asterisk:13.13.0:cert1-rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:certified_asterisk:13.13.0:cert1-rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:certified_asterisk:13.13.0:cert1-rc3:*:*:*:*:*:*", "cpe:2.3:a:digium:certified_asterisk:13.13.0:cert1-rc4:*:*:*:*:*:*", "cpe:2.3:a:digium:certified_asterisk:13.13.0:cert2:*:*:*:*:*:*", "cpe:2.3:a:digium:certified_asterisk:13.13.0:cert3:*:*:*:*:*:*", "cpe:2.3:a:digium:certified_asterisk:13.13.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:certified_asterisk:13.13.0:rc2:*:*:*:*:*:*" ]
null
null
7.5
5
GHSA-pqg9-w7ww-pq5c
SQL injection vulnerability in administration/index.php in chCounter 3.1.3 allows remote attackers to execute arbitrary SQL commands via the login_name parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
[]
null
null
null
null
CVE-2007-3472
Integer overflow in gdImageCreateTrueColor function in the GD Graphics Library (libgd) before 2.0.35 allows user-assisted remote attackers to have unspecified attack vectors and impact.
[ "cpe:2.3:a:libgd:gd_graphics_library:*:rc5:*:*:*:*:*:*", "cpe:2.3:a:libgd:gd_graphics_library:2.0.33:*:*:*:*:*:*:*", "cpe:2.3:a:libgd:gd_graphics_library:2.0.34:*:*:*:*:*:*:*", "cpe:2.3:a:libgd:gd_graphics_library:2.0.34:rc1:*:*:*:*:*:*", "cpe:2.3:a:libgd:gd_graphics_library:2.0.34:rc2:*:*:*:*:*:*", "cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc1:*:*:*:*:*:*", "cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc2:*:*:*:*:*:*", "cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc3:*:*:*:*:*:*", "cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc4:*:*:*:*:*:*" ]
null
null
null
4.3
GHSA-254w-gr7h-wvh4
The Frontend File Manager plugin for WordPress is vulnerable to Authenticated Settings Change in versions up to, and including, 18.2. This is due to lacking capability checks and a security nonce, all on the wpfm_save_settings AJAX action. This makes it possible for subscriber-level attackers to edit the plugin settings, such as the allowed upload file types. This can lead to remote code execution through other vulnerabilities.
[]
null
9.9
null
null
GHSA-jhvm-5xg8-647w
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Themis Solutions, Inc. Clio Grow allows Reflected XSS.This issue affects Clio Grow: from n/a through 1.0.2.
[]
null
7.1
null
null
GHSA-6qfq-9m7h-9wwm
IBM Manage Application 8.8.0 and 8.9.0 in the IBM Maximo Application Suite is vulnerable to incorrect default permissions which could give access to a user to actions that they should not have access to. IBM X-Force ID: 242953.
[]
null
6.5
null
null
GHSA-hvf9-qhxq-6pcq
In radare2 through 3.5.1, the rcc_context function of libr/egg/egg_lang.c mishandles changing context. This allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact (invalid memory access in r_egg_lang_parsechar; invalid free in rcc_pusharg).
[]
null
7.8
null
null
GHSA-6wr7-fwxp-gg3v
A vulnerability, which was classified as problematic, was found in SourceCodester Online Graduate Tracer System 1.0. Affected is an unknown function of the file admin/. The manipulation leads to session expiration. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-224994 is the identifier assigned to this vulnerability.
[]
null
9.8
null
null
GHSA-j6mh-5h78-837x
Cross-site scripting (XSS) vulnerability in myWebland MyBloggie 2.1.3 and earlier allows remote attackers to inject arbitrary web script or HTML via a JavaScript event in a BBCode img tag.
[]
null
null
null
null
CVE-2024-38546
drm: vc4: Fix possible null pointer dereference
In the Linux kernel, the following vulnerability has been resolved: drm: vc4: Fix possible null pointer dereference In vc4_hdmi_audio_init() of_get_address() may return NULL which is later dereferenced. Fix this bug by adding NULL check. Found by Linux Verification Center (linuxtesting.org) with SVACE.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
null
5.5
null
null
GHSA-mfjg-xr43-wxf9
TYPO3 before 4.1.14, 4.2.x before 4.2.13, 4.3.x before 4.3.4 and 4.4.x before 4.4.1 allows Header Injection in the secure download feature jumpurl.
[]
null
null
null
null
GHSA-ffw3-6mp6-jmvj
Improper Access Control in Apache Airflow
Improper Access Control on Configurations Endpoint for the Stable API of Apache Airflow allows users with Viewer or User role to get Airflow Configurations including sensitive information even when `[webserver] expose_config` is set to `False` in `airflow.cfg`. This allowed a privilege escalation attack. This issue affects Apache Airflow 2.0.0.
[]
7.1
6.5
null
null
RHSA-2023:3380
Red Hat Security Advisory: apr-util security update
apr-util: out-of-bounds writes in the apr_base64
[ "cpe:/a:redhat:rhel_aus:8.2::appstream", "cpe:/a:redhat:rhel_e4s:8.2::appstream", "cpe:/a:redhat:rhel_tus:8.2::appstream" ]
null
6.5
null
null
GHSA-h6p5-h73r-mpjh
In the Linux kernel, the following vulnerability has been resolved:can: dev: can_set_termination(): allow sleeping GPIOsIn commit 6e86a1543c37 ("can: dev: provide optional GPIO based termination support") GPIO based termination support was added.For no particular reason that patch uses gpiod_set_value() to set the GPIO. This leads to the following warning, if the systems uses a sleeping GPIO, i.e. behind an I2C port expander:| WARNING: CPU: 0 PID: 379 at /drivers/gpio/gpiolib.c:3496 gpiod_set_value+0x50/0x6c | CPU: 0 UID: 0 PID: 379 Comm: ip Not tainted 6.11.0-20241016-1 #1 823affae360cc91126e4d316d7a614a8bf86236cReplace gpiod_set_value() by gpiod_set_value_cansleep() to allow the use of sleeping GPIOs.
[]
null
null
null
null
CVE-2004-0989
Multiple buffer overflows in libXML 2.6.12 and 2.6.13 (libxml2), and possibly other versions, may allow remote attackers to execute arbitrary code via (1) a long FTP URL that is not properly handled by the xmlNanoFTPScanURL function, (2) a long proxy URL containing FTP data that is not properly handled by the xmlNanoFTPScanProxy function, and other overflows related to manipulation of DNS length values, including (3) xmlNanoFTPConnect, (4) xmlNanoHTTPConnectHost, and (5) xmlNanoHTTPConnectHost.
[ "cpe:2.3:a:xmlsoft:libxml:1.8.17:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:2.5.11:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:2.6.6:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:2.6.7:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:2.6.8:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:2.6.9:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:2.6.11:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:2.6.12:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:2.6.13:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:2.6.14:*:*:*:*:*:*:*", "cpe:2.3:a:xmlstarlet:command_line_xml_toolkit:0.9.1:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*", "cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*", "cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*", "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*", "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*" ]
null
null
null
10
CVE-2022-36571
Tenda AC9 V15.03.05.19 was discovered to contain a stack overflow via the mask parameter at /goform/WanParameterSetting.
[ "cpe:2.3:o:tenda:ac9_firmware:15.03.05.19:*:*:*:*:*:*:*", "cpe:2.3:h:tenda:ac9:-:*:*:*:*:*:*:*" ]
null
7.2
null
null
CVE-2024-49636
WordPress Agile Video Player Lite plugin <= 1.0 - Reflected Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Prashant Mavinkurve Agile Video Player Lite allows Reflected XSS.This issue affects Agile Video Player Lite: from n/a through 1.0.
[ "cpe:2.3:a:prashantmavinkurve:agile_video_player_lite:*:*:*:*:*:wordpress:*:*" ]
null
7.1
null
null
CVE-2023-5136
Incorrect Permission Assignment in the TopoGrafix DataPlugin for GPX
An incorrect permission assignment in the TopoGrafix DataPlugin for GPX could result in information disclosure. An attacker could exploit this vulnerability by getting a user to open a specially crafted data file.
[ "cpe:2.3:a:ni:topografix_data_plugin:2023:-:*:*:*:gpx:*:*", "cpe:2.3:a:ni:diadem:2014:*:*:*:*:*:*:*", "cpe:2.3:a:ni:diadem:2015:-:*:*:*:*:*:*", "cpe:2.3:a:ni:diadem:2015:sp2:*:*:*:*:*:*", "cpe:2.3:a:ni:diadem:2017:-:*:*:*:*:*:*", "cpe:2.3:a:ni:diadem:2017:sp1:*:*:*:*:*:*", "cpe:2.3:a:ni:diadem:2018:-:*:*:*:*:*:*", "cpe:2.3:a:ni:diadem:2018:sp1:*:*:*:*:*:*", "cpe:2.3:a:ni:diadem:2019:-:*:*:*:*:*:*", "cpe:2.3:a:ni:diadem:2019:sp1:*:*:*:*:*:*", "cpe:2.3:a:ni:diadem:2020:-:*:*:*:*:*:*", "cpe:2.3:a:ni:diadem:2020:sp1:*:*:*:*:*:*", "cpe:2.3:a:ni:diadem:2021:-:*:*:*:*:*:*", "cpe:2.3:a:ni:diadem:2021:sp1:*:*:*:*:*:*", "cpe:2.3:a:ni:diadem:2022:q2:*:*:*:*:*:*", "cpe:2.3:a:ni:diadem:2022:q4:*:*:*:*:*:*", "cpe:2.3:a:ni:diadem:2023:q2:*:*:*:*:*:*", "cpe:2.3:a:ni:veristand:2013:sp1:*:*:*:*:*:*", "cpe:2.3:a:ni:veristand:2014:*:*:*:*:*:*:*", "cpe:2.3:a:ni:veristand:2015:-:*:*:*:*:*:*", "cpe:2.3:a:ni:veristand:2015:sp1:*:*:*:*:*:*", "cpe:2.3:a:ni:veristand:2016:*:*:*:*:*:*:*", "cpe:2.3:a:ni:veristand:2017:*:*:*:*:*:*:*", "cpe:2.3:a:ni:veristand:2018:-:*:*:*:*:*:*", "cpe:2.3:a:ni:veristand:2018:sp1:*:*:*:*:*:*", "cpe:2.3:a:ni:veristand:2019:-:*:*:*:*:*:*", "cpe:2.3:a:ni:veristand:2019:r2:*:*:*:*:*:*", "cpe:2.3:a:ni:veristand:2019:r3:*:*:*:*:*:*", "cpe:2.3:a:ni:veristand:2019:r3f1:*:*:*:*:*:*", "cpe:2.3:a:ni:veristand:2020:-:*:*:*:*:*:*", "cpe:2.3:a:ni:veristand:2020:r2:*:*:*:*:*:*", "cpe:2.3:a:ni:veristand:2020:r3:*:*:*:*:*:*", "cpe:2.3:a:ni:veristand:2020:r4:*:*:*:*:*:*", "cpe:2.3:a:ni:veristand:2020:r5:*:*:*:*:*:*", "cpe:2.3:a:ni:veristand:2020:r6:*:*:*:*:*:*", "cpe:2.3:a:ni:veristand:2021:-:*:*:*:*:*:*", "cpe:2.3:a:ni:veristand:2021:r2:*:*:*:*:*:*", "cpe:2.3:a:ni:veristand:2021:r3:*:*:*:*:*:*", "cpe:2.3:a:ni:veristand:2023:q1:*:*:*:*:*:*", "cpe:2.3:a:ni:veristand:2023:q2:*:*:*:*:*:*", "cpe:2.3:a:ni:veristand:2023:q3:*:*:*:*:*:*", "cpe:2.3:a:ni:veristand:2023:q4:*:*:*:*:*:*", "cpe:2.3:a:ni:flexlogger:2018:r1:*:*:*:*:*:*", "cpe:2.3:a:ni:flexlogger:2018:r2:*:*:*:*:*:*", "cpe:2.3:a:ni:flexlogger:2018:r3:*:*:*:*:*:*", "cpe:2.3:a:ni:flexlogger:2018:r4:*:*:*:*:*:*", "cpe:2.3:a:ni:flexlogger:2019:r1:*:*:*:*:*:*", "cpe:2.3:a:ni:flexlogger:2019:r2:*:*:*:*:*:*", "cpe:2.3:a:ni:flexlogger:2019:r3:*:*:*:*:*:*", "cpe:2.3:a:ni:flexlogger:2019:r4:*:*:*:*:*:*", "cpe:2.3:a:ni:flexlogger:2020:r1:*:*:*:*:*:*", "cpe:2.3:a:ni:flexlogger:2020:r2:*:*:*:*:*:*", "cpe:2.3:a:ni:flexlogger:2020:r3:*:*:*:*:*:*", "cpe:2.3:a:ni:flexlogger:2020:r4:*:*:*:*:*:*", "cpe:2.3:a:ni:flexlogger:2021:r1:*:*:*:*:*:*", "cpe:2.3:a:ni:flexlogger:2021:r2:*:*:*:*:*:*", "cpe:2.3:a:ni:flexlogger:2021:r3:*:*:*:*:*:*", "cpe:2.3:a:ni:flexlogger:2021:r4:*:*:*:*:*:*", "cpe:2.3:a:ni:flexlogger:2022:q2:*:*:*:*:*:*", "cpe:2.3:a:ni:flexlogger:2022:q4:*:*:*:*:*:*", "cpe:2.3:a:ni:flexlogger:2023:q1:*:*:*:*:*:*", "cpe:2.3:a:ni:flexlogger:2023:q2:*:*:*:*:*:*", "cpe:2.3:a:ni:flexlogger:2023:q3:*:*:*:*:*:*", "cpe:2.3:a:ni:flexlogger:2023:q4:*:*:*:*:*:*" ]
null
5.5
null
null
GHSA-8hw7-7h75-8xrp
IBM WebSphere Commerce 6.x through 6.0.0.11 and 7.x through 7.0.0.8 allows remote authenticated users to read arbitrary files or send TCP requests to intranet servers via XML data containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.
[]
null
null
null
null
GHSA-84mh-26r2-jcpf
Unspecified vulnerability in Oracle MySQL Server 5.6.19 and earlier allows remote authenticated users to affect availability via vectors related to SERVER:INNODB FULLTEXT SEARCH DML.
[]
null
null
null
null
CVE-2017-18510
The custom-sidebars plugin before 3.1.0 for WordPress has CSRF related to set location, import actions, and export actions.
[ "cpe:2.3:a:wpmudev:custom_sidebars:*:*:*:*:*:wordpress:*:*" ]
null
null
8.8
6.8
CVE-2023-38871
The commit 3730880 (April 2023) and v.0.9-beta1 of gugoan Economizzer has a user enumeration vulnerability in the login and forgot password functionalities. The app reacts differently when a user or email address is valid, and when it's not. This may allow an attacker to determine whether a user or email address is valid, or brute force valid usernames and email addresses.
[ "cpe:2.3:a:economizzer:economizzer:0.9:beta1:*:*:*:wordpress:*:*", "cpe:2.3:a:economizzer:economizzer:april_2023:*:*:*:*:wordpress:*:*" ]
null
5.3
null
null
RHSA-2018:0480
Red Hat Security Advisory: JBoss Enterprise Application Platform 7.1.1 for RHEL 7
resteasy: Vary header not added by CORS filter leading to cache poisoning artemis/hornetq: memory exhaustion via UDP and JGroups discovery undertow: Client can use bogus uri in Digest authentication infinispan: Unsafe deserialization of malicious object injected into data cache jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-7525) jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-15095) undertow: ALLOW_ENCODED_SLASH option not taken into account in the AjpRequestParser jackson-databind: unsafe deserialization due to incomplete blacklist (incomplete fix for CVE-2017-7525 and CVE-2017-17485)
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.1::el7" ]
null
null
8.1
null
GHSA-rhqq-6hxm-qhgr
SQL injection vulnerability in index.php in ScriptMagix Recipes 2.0 and earlier allows remote attackers to execute arbitrary SQL commands via the catid parameter.
[]
null
null
null
null
CVE-2013-6394
Percona XtraBackup before 2.1.6 uses a constant string for the initialization vector (IV), which makes it easier for local users to defeat cryptographic protection mechanisms and conduct plaintext attacks.
[ "cpe:2.3:a:percona:xtrabackup:*:*:*:*:*:*:*:*", "cpe:2.3:a:percona:xtrabackup:2.1.0:alpha1:*:*:*:*:*:*", "cpe:2.3:a:percona:xtrabackup:2.1.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:percona:xtrabackup:2.1.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:percona:xtrabackup:2.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:percona:xtrabackup:2.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:percona:xtrabackup:2.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:percona:xtrabackup:2.1.4:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*" ]
null
null
null
2.1
CVE-2016-1935
Buffer overflow in the BufferSubData function in Mozilla Firefox before 44.0 and Firefox ESR 38.x before 38.6 allows remote attackers to execute arbitrary code via crafted WebGL content.
[ "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*", "cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:38.5.0:*:*:*:*:*:*:*" ]
null
null
8.8
9.3
GHSA-mpwr-fprg-72gv
A vulnerability in the SSL session cache management of Cisco Wide Area Application Services (WAAS) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition due to high consumption of disk space. The user would see a performance degradation. More Information: CSCva03095. Known Affected Releases: 5.3(5), 6.1(1), 6.2(1). Known Fixed Releases: 5.3(5g)1, 6.2(2.32).
[]
null
null
5.9
null
CVE-2021-22655
Multiple out-of-bounds read issues have been identified in the way the application processes project files, allowing an attacker to craft a special project file that may allow arbitrary code execution on the Tellus Lite V-Simulator and V-Server Lite (versions prior to 4.0.10.0).
[ "cpe:2.3:a:fujielectric:v-server:*:*:*:*:lite:*:*:*", "cpe:2.3:a:fujielectric:v-simulator:*:*:*:*:lite:*:*:*" ]
null
7.8
null
6.8
GHSA-qfq7-2r89-r328
The WebDAV Message Handler for Internet Information Services (IIS) 5.0, 5.1, and 6.0 allows remote attackers to cause a denial of service (memory and CPU exhaustion, application crash) via a PROPFIND request with an XML message containing XML elements with a large number of attributes.
[]
null
null
null
null
GHSA-7p6h-w6m6-5fm2
In Go before 1.10.6 and 1.11.x before 1.11.3, the "go get" command is vulnerable to directory traversal when executed with the import path of a malicious Go package which contains curly braces (both '{' and '}' characters). Specifically, it is only vulnerable in GOPATH mode, but not in module mode (the distinction is documented at https://golang.org/cmd/go/#hdr-Module_aware_go_get). The attacker can cause an arbitrary filesystem write, which can lead to code execution.
[]
null
8.1
null
null
RHSA-2023:6732
Red Hat Security Advisory: ghostscript security update
Ghostscript: GhostPDL can lead to remote code execution via crafted PostScript documents
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
8.8
null
null
GHSA-qg5g-gv98-5ffh
rustls network-reachable panic in `Acceptor::accept`
A bug introduced in rustls 0.23.13 leads to a panic if the received TLS ClientHello is fragmented. Only servers that use `rustls::server::Acceptor::accept()` are affected.Servers that use `tokio-rustls`'s `LazyConfigAcceptor` API are affected.Servers that use `tokio-rustls`'s `TlsAcceptor` API are not affected.Servers that use `rustls-ffi`'s `rustls_acceptor_accept` API are affected.
[]
6.9
null
null
null
CVE-2013-1217
The generic input/output control implementation in Cisco IOS does not properly manage buffers, which allows remote authenticated users to cause a denial of service (device reload) by sending many SNMP requests at the same time, aka Bug ID CSCub41105.
[ "cpe:2.3:o:cisco:ios:-:*:*:*:*:*:*:*" ]
null
null
null
6.8
RHSA-2023:7573
Red Hat Security Advisory: firefox security update
Mozilla: Out-of-bound memory access in WebGL2 blitFramebuffer Mozilla: Use-after-free in MessagePort::Entangled Mozilla: Clickjacking permission prompts using the fullscreen transition Mozilla: Use-after-free in ReadableByteStreamQueueEntry::Buffer Mozilla: Using Selection API would copy contents into X11 primary selection. Mozilla: Incorrect parsing of relative URLs starting with "///" Mozilla: Memory safety bugs fixed in Firefox 120, Firefox ESR 115.5, and Thunderbird 115.5
[ "cpe:/a:redhat:rhel_aus:8.2::appstream", "cpe:/a:redhat:rhel_e4s:8.2::appstream", "cpe:/a:redhat:rhel_tus:8.2::appstream" ]
null
8.8
null
null
CVE-2022-23112
A missing permission check in Jenkins Publish Over SSH Plugin 1.22 and earlier allows attackers with Overall/Read access to connect to an attacker-specified SSH server using attacker-specified credentials.
[ "cpe:2.3:a:jenkins:publish_over_ssh:*:*:*:*:*:jenkins:*:*" ]
null
6.5
null
4
GHSA-cj8v-r5w4-97v8
Affected versions of Atlassian Crucible allow remote attackers to impact the application's availability via a Denial of Service (DoS) vulnerability in the file upload request feature of code reviews. The affected versions are before version 4.7.4, and from version 4.8.0 before 4.8.5.
[]
null
null
null
null
GHSA-9qhv-gvfh-83hj
A vulnerability was found in dimtion Shaarlier up to 1.2.2. It has been declared as critical. Affected by this vulnerability is the function createTag of the file app/src/main/java/com/dimtion/shaarlier/TagsSource.java of the component Tag Handler. The manipulation leads to sql injection. Upgrading to version 1.2.3 is able to address this issue. The name of the patch is 3d1d9b239d9b3cd87e8bed45a0f02da583ad371e. It is recommended to upgrade the affected component. The identifier VDB-220453 was assigned to this vulnerability.
[]
null
9.8
null
null
CVE-2023-35710
Ashlar-Vellum Cobalt Stack-based Buffer Overflow Remote Code Execution Vulnerability
Ashlar-Vellum Cobalt Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ashlar-Vellum Cobalt. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of CO files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. . Was ZDI-CAN-19956.
[ "cpe:2.3:a:ashlar:cobalt:*:*:*:*:*:*:*:*" ]
null
null
7.8
null
GHSA-88h3-v66m-cv23
In crasm 1.8-3, invalid input validation, specific files passed to the command line application, can lead to a divide by zero fault in the function opdiv.
[]
null
7.5
null
null
CVE-2025-23827
WordPress Strx Magic Floating Sidebar Maker plugin <= 1.4.1 - CSRF to Stored XSS vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Strx Strx Magic Floating Sidebar Maker allows Stored XSS.This issue affects Strx Magic Floating Sidebar Maker: from n/a through 1.4.1.
[]
null
7.1
null
null
CVE-2025-44175
Tenda AC10 v4 V16.03.10.13 is vulnerable to Buffer Overflow in the GetParentControlInfo function.
[]
null
5.4
null
null
GHSA-chv9-fg26-xg8h
powertip.ts in Lila (for Lichess) before ab0beaf allows XSS in some applications because of an innerHTML usage pattern in which text is extracted from a DOM node and interpreted as HTML.
[]
null
4.7
null
null
CVE-2025-46506
WordPress WpZon – Amazon Affiliate Plugin plugin <= 1.3 - CSRF to XSS vulnerability
Cross-Site Request Forgery (CSRF) vulnerability in Lora77 WpZon – Amazon Affiliate Plugin allows Reflected XSS. This issue affects WpZon – Amazon Affiliate Plugin: from n/a through 1.3.
[]
null
7.1
null
null
GHSA-h956-h9q8-3c53
LINE for iOS version 7.1.3 to 7.1.5 does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[]
null
null
5.9
null
GHSA-9rf3-x554-878q
A vulnerability was found in SourceCodester Gym Management System. It has been rated as critical. Affected by this issue is some unknown functionality of the file /mygym/admin/index.php. The manipulation of the argument edit_tran leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-205856.
[]
null
9.8
null
null
GHSA-wcfh-34hc-3p4p
Einstein 1.0 stores credit card information in plaintext in the world-readable wallets.dat file, which allows local users to steal the information.
[]
null
null
null
null
CVE-2018-0854
A security feature bypass vulnerability exists in Windows Scripting Host which could allow an attacker to bypass Device Guard, aka "Windows Security Feature Bypass Vulnerability." This affects Windows Server 2016, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-0958, CVE-2018-8129, CVE-2018-8132.
[ "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1709:*:*:*:*:*:*:*" ]
null
null
5.3
4.6
GHSA-mg45-3qpx-2hfr
Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.3.5 and 8.3.7 allows remote attackers to affect confidentiality, integrity, and availability, related to Outside In Image Export SDK, a different vulnerability than CVE-2012-0554, CVE-2012-0556, and CVE-2012-0557.
[]
null
null
null
null
GHSA-r946-8c39-rrcc
Cross-site scripting (XSS) vulnerability in the UI in IBM Rational Build Forge 7.0.2 allows remote attackers to inject arbitrary web script or HTML via the mod parameter to the fullcontrol program. NOTE: some of these details are obtained from third party information.
[]
null
null
null
null
GHSA-3522-f7v7-pv57
The Uncanny Groups for LearnDash plugin for WordPress is vulnerable to user group add due to a missing capability check on the /wp-json/ulgm_management/v1/add_user/ REST API endpoint in all versions up to, and including, 6.1.0.1. This makes it possible for authenticated attackers, with group leader-level access and above, to add users to their group which ultimately allows them to leverage CVE-2024-8349 and gain admin access to the site.
[]
null
2.7
null
null
GHSA-fpm8-vp26-crfh
An ActiveX control in prtstb06.dll in Microsoft Money 2006, when used with WScript in Windows Script Host (WSH) on Windows Vista, allows remote attackers to cause a denial of service (access violation and application crash) via a zero value for the Startup property.
[]
null
null
null
null
CVE-2017-18834
Certain NETGEAR devices are affected by reflected XSS. This affects M4300-28G before 12.0.2.15, M4300-52G before 12.0.2.15, M4300-28G-POE+ before 12.0.2.15, M4300-52G-POE+ before 12.0.2.15, M4300-8X8F before 12.0.2.15, M4300-12X12F before 12.0.2.15, M4300-24X24F before 12.0.2.15, M4300-24X before 12.0.2.15, M4300-48X before 12.0.2.15, and M4200 before 12.0.2.15.
[ "cpe:2.3:o:netgear:m4300-28g_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:m4300-28g:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:m4300-52g_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:m4300-52g:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:m4300-28g-poe\\+_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:m4300-28g-poe\\+:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:m4300-52g-poe\\+_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:m4300-52g-poe\\+:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:m4300-8x8f_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:m4300-8x8f:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:m4300-12x12f_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:m4300-12x12f:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:m4300-24x24f_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:m4300-24x24f:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:m4300-24x_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:m4300-24x:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:m4300-48x_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:m4300-48x:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:m4200_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:m4200:-:*:*:*:*:*:*:*" ]
null
null
6.1
null
GHSA-jqmg-5jqp-94q9
Heap out-of-bounds write vulnerability in bootloader prior to SMR May-2023 Release 1 allows a physical attacker to execute arbitrary code.
[]
null
7.1
null
null
CVE-2023-27704
Void Tools Everything lower than v1.4.1.1022 was discovered to contain a Regular Expression Denial of Service (ReDoS).
[ "cpe:2.3:a:voidtools:everything:*:*:*:*:*:*:*:*" ]
null
5.5
null
null
CVE-2008-5566
Cross-site scripting (XSS) vulnerability in index.php in Triangle Solutions PHP Multiple Newsletters 2.7 allows remote attackers to inject arbitrary web script or HTML via the PATH_INFO.
[ "cpe:2.3:a:phpmultiplenewsletters:phpmultiplenewsletters:2.7:*:*:*:*:*:*:*" ]
null
null
null
4.3
GHSA-7jc3-jgh2-x9w6
Memory leak in the ccnl_app_RX function in ccnl-uapi.c in CCN-lite before 2.00 allows context-dependent attackers to cause a denial of service (memory consumption) via vectors involving an envelope_s structure pointer when the packet format is unknown.
[]
null
null
7.5
null
GHSA-34gc-wf8f-4rcx
Directory traversal vulnerability in the Web TV (com_webtv) component 1.0 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php.
[]
null
null
null
null
GHSA-wxg8-cr3q-q5c8
Out of bound write can occur in playready while processing command due to lack of input validation in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music
[]
null
null
null
null
GHSA-fh5v-r835-mw7v
The csnmp_read_table function in snmp.c in the SNMP plugin in collectd before 5.6.3 is susceptible to a double free in a certain error case, which could lead to a crash (or potentially have other impact).
[]
null
null
9.8
null
CVE-2023-21432
Improper access control vulnerabilities in Smart Things prior to 1.7.93 allows to attacker to invite others without authorization of the owner.
[ "cpe:2.3:a:samsung:smart_things:*:*:*:*:*:*:*:*" ]
null
4.2
null
null
CVE-2002-0698
Buffer overflow in Internet Mail Connector (IMC) for Microsoft Exchange Server 5.5 allows remote attackers to execute arbitrary code via an EHLO request from a system with a long name as obtained through a reverse DNS lookup, which triggers the overflow in IMC's hello response.
[ "cpe:2.3:a:microsoft:exchange_server:5.5:-:*:*:*:*:*:*", "cpe:2.3:a:microsoft:exchange_server:5.5:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:exchange_server:5.5:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:exchange_server:5.5:sp3:*:*:*:*:*:*", "cpe:2.3:a:microsoft:exchange_server:5.5:sp4:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2024-30157
A vulnerability in the Suite Applications Services component of Mitel MiCollab through 9.7.1.110 could allow an authenticated attacker with administrative privileges to conduct a SQL Injection attack due to insufficient validation of user input. A successful exploit could allow an attacker to execute arbitrary database and management operations.
[ "cpe:2.3:a:mitel:micollab:*:*:*:*:*:*:*:*" ]
null
7.2
null
null
GHSA-c6jf-m4vp-74vf
In Wireshark 2.4.0 to 2.4.3 and 2.2.0 to 2.2.11, the WCP dissector could crash. This was addressed in epan/dissectors/packet-wcp.c by validating the available buffer length.
[]
null
null
6.5
null
CVE-2022-49893
cxl/region: Fix cxl_region leak, cleanup targets at region delete
In the Linux kernel, the following vulnerability has been resolved: cxl/region: Fix cxl_region leak, cleanup targets at region delete When a region is deleted any targets that have been previously assigned to that region hold references to it. Trigger those references to drop by detaching all targets at unregister_region() time. Otherwise that region object will leak as userspace has lost the ability to detach targets once region sysfs is torn down.
[]
null
null
null
null
CVE-2018-1000834
runelite version <= runelite-parent-1.4.23 contains a XML External Entity (XXE) vulnerability in Man in the middle runscape services call that can result in Disclosure of confidential data, denial of service, SSRF, port scanning.
[ "cpe:2.3:a:runelite:runelite:*:*:*:*:*:*:*:*" ]
null
null
9
6.8
GHSA-qjv2-p92g-q4wq
scan.c in x11vnc 0.9.16 uses IPC_CREAT|0777 in shmget calls, which allows access by actors other than the current user.
[]
null
null
null
null
CVE-2024-56274
WordPress Astra Widgets plugin <= 1.2.15 - Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Brainstorm Force Astra Widgets allows Stored XSS.This issue affects Astra Widgets: from n/a through 1.2.15.
[]
null
6.5
null
null
CVE-2021-1409
Cisco Unified Communications Products Cross-Site Scripting Vulnerabilities
Multiple vulnerabilities in the web-based management interface of Cisco Unified Communications Manager (Unified CM), Cisco Unified Communications Manager IM &amp; Presence Service (Unified CM IM&amp;P), Cisco Unified Communications Manager Session Management Edition (Unified CM SME), and Cisco Unity Connection could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against an interface user. These vulnerabilities exist because the web-based management interface does not properly validate user-supplied input. An attacker could exploit these vulnerabilities by persuading an interface user to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive browser-based information.
[ "cpe:2.3:a:cisco:unified_communications_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:*:*:*:*:session_management:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager_im_\\&_presence_service:*:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unity_connection:*:*:*:*:*:*:*:*" ]
null
6.1
null
null
CVE-2024-53845
AES/CBC Constant IV Vulnerability in ESPTouch v2
ESPTouch is a connection protocol for internet of things devices. In the ESPTouchV2 protocol, while there is an option to use a custom AES key, there is no option to set the IV (Initialization Vector) prior to versions 5.3.2, 5.2.4, 5.1.6, and 5.0.8. The IV is set to zero and remains constant throughout the product's lifetime. In AES/CBC mode, if the IV is not properly initialized, the encrypted output becomes deterministic, leading to potential data leakage. To address the aforementioned issues, the application generates a random IV when activating the AES key starting in versions 5.3.2, 5.2.4, 5.1.6, and 5.0.8. This IV is then transmitted along with the provision data to the provision device. The provision device has also been equipped with a parser for the AES IV. The upgrade is applicable for all applications and users of ESPTouch v2 component from ESP-IDF. As it is implemented in the ESP Wi-Fi stack, there is no workaround for the user to fix the application layer without upgrading the underlying firmware.
[]
6.6
null
null
null
GHSA-crv8-9h6w-q3j9
Cross-site scripting (XSS) vulnerability in search.php in Gallarific allows remote attackers to inject arbitrary web script or HTML via the query parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
[]
null
null
null
null
GHSA-xjjp-35cq-88wh
A heap corruption vulnerability has been identified in PostScript interpreter in various Lexmark devices. The vulnerability can be leveraged by an attacker to execute arbitrary code.
[]
null
9
null
null
GHSA-46f9-f8jm-mw2x
Plone Cross-site Scripting vulnerability in the LiveSearch module
Cross-site scripting (XSS) vulnerability in the LiveSearch module in Plone before 3.0.4 allows remote attackers to inject arbitrary web script or HTML via the Description field for search results, as demonstrated using the onerror Javascript even in an IMG tag.
[]
null
null
null
null
CVE-2023-32787
The OPC UA Legacy Java Stack before 6f176f2 enables an attacker to block OPC UA server applications via uncontrolled resource consumption so that they can no longer serve client applications.
[ "cpe:2.3:a:opcfoundation:ua_java_legacy:*:*:*:*:*:*:*:*", "cpe:2.3:a:prosysopc:ua_historian:*:*:*:*:*:*:*:*", "cpe:2.3:a:prosysopc:ua_modbus_server:*:*:*:*:*:*:*:*", "cpe:2.3:a:prosysopc:ua_simulation_server:*:*:*:*:*:*:*:*" ]
null
7.5
null
null
GHSA-r3cw-4h6g-qxmh
A vulnerability in the web-based guest portal of Cisco Identity Services Engine (ISE) could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface. The vulnerability is due to insufficient validation of user-supplied input that is processed by the web-based management interface. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive browser-based information.
[]
null
6.1
null
null
CVE-2020-25170
B. Braun OnlineSuite
An Excel Macro Injection vulnerability exists in the export feature in the B. Braun OnlineSuite Version AP 3.0 and earlier via multiple input fields that are mishandled in an Excel export.
[ "cpe:2.3:a:bbraun:onlinesuite_application_package:*:*:*:*:*:*:*:*" ]
null
7.8
null
6.8
CVE-2001-0379
Vulnerability in the newgrp program included with HP9000 servers running HP-UX 11.11 allows a local attacker to obtain higher access rights.
[ "cpe:2.3:o:hp:hp-ux:11.11:*:*:*:*:*:*:*" ]
null
null
null
4.6
CVE-2000-0684
BEA WebLogic 5.1.x does not properly restrict access to the JSPServlet, which could allow remote attackers to compile and execute Java JSP code by directly invoking the servlet on any source file.
[ "cpe:2.3:a:bea:weblogic_server:3.1.8:*:*:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:4.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:4.5.1:*:*:*:*:*:*:*" ]
null
null
null
10
CVE-2024-0367
The Unlimited Elements For Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the link field of an installed widget (e.g., 'Button Link') in all versions up to, and including, 1.5.96 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
6.4
null
null
CVE-2024-46698
video/aperture: optionally match the device in sysfb_disable()
In the Linux kernel, the following vulnerability has been resolved: video/aperture: optionally match the device in sysfb_disable() In aperture_remove_conflicting_pci_devices(), we currently only call sysfb_disable() on vga class devices. This leads to the following problem when the pimary device is not VGA compatible: 1. A PCI device with a non-VGA class is the boot display 2. That device is probed first and it is not a VGA device so sysfb_disable() is not called, but the device resources are freed by aperture_detach_platform_device() 3. Non-primary GPU has a VGA class and it ends up calling sysfb_disable() 4. NULL pointer dereference via sysfb_disable() since the resources have already been freed by aperture_detach_platform_device() when it was called by the other device. Fix this by passing a device pointer to sysfb_disable() and checking the device to determine if we should execute it or not. v2: Fix build when CONFIG_SCREEN_INFO is not set v3: Move device check into the mutex Drop primary variable in aperture_remove_conflicting_pci_devices() Drop __init on pci sysfb_pci_dev_is_enabled()
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.11:rc5:*:*:*:*:*:*" ]
null
5.5
null
null
GHSA-x4rh-jv54-gh7g
Heap buffer overflow in extensions in Google Chrome prior to 96.0.4664.93 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension.
[]
null
8.8
null
null
CVE-2022-45613
Book Store Management System v1.0 was discovered to contain a cross-site scripting (XSS) vulnerability in /bsms_ci/index.php/book. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the publisher parameter.
[ "cpe:2.3:a:book_store_management_system_project:book_store_management_system:1.0:*:*:*:*:*:*:*" ]
null
5.4
null
null
RHSA-2006:0206
Red Hat Security Advisory: kdegraphics security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
GHSA-jgxj-6h4c-hpvg
SQL Injection in PHPSHE Mall System v1.7 allows remote attackers to execute arbitrary code by injecting SQL commands into the "user_phone" parameter of a crafted HTTP request to the "admin.php" component.
[]
null
null
null
null