id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
189k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
patch_commit_url
stringlengths
36
232
GHSA-j7m5-q9g3-5q68
An Incorrect Authorization vulnerability in the web server of Juniper Networks Junos OS on SRX Series allows an unauthenticated, network-based attacker to reach theJuniper Web Device Manager(J-Web).When Juniper Secure connect (JSC) is enabled on specific interfaces, or multiple interfaces are configured for J-Web, the J-Web UI is reachable over more than the intended interfaces. This issue affects Junos OS:all versions before 21.4R3-S9,22.2 versions before 22.2R3-S5,22.4 versions before 22.4R3-S5,23.2 versions before 23.2R2-S3,23.4 versions before 23.4R2-S5,24.2 versions before 24.2R2.
[]
6.9
6.5
null
null
null
GHSA-6jcq-vf6j-f35g
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of shift events. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code under the context of the current process. Was ZDI-CAN-5762.
[]
null
null
8.8
null
null
CVE-2008-3911
The proc_do_xprt function in net/sunrpc/sysctl.c in the Linux kernel 2.6.26.3 does not check the length of a certain buffer obtained from userspace, which allows local users to overflow a stack-based buffer and have unspecified other impact via a crafted read system call for the /proc/sys/sunrpc/transports file.
[ "cpe:2.3:o:linux:linux_kernel:2.6.26.3:*:*:*:*:*:*:*" ]
null
null
null
7.2
null
CVE-2016-10569
embedza is a module to create HTML snippets/embeds from URLs using info from oEmbed, Open Graph, meta tags. embedza versions below 1.2.4 download JavaScript resources over HTTP, which leaves it vulnerable to MITM attacks. It may be possible to cause remote code execution (RCE) by swapping out the requested JavaScript file with an attacker controlled JavaScript file if the attacker is on the network or positioned in between the user and the remote server.
[ "cpe:2.3:a:embedza_project:embedza:*:*:*:*:*:node.js:*:*" ]
null
null
8.1
9.3
null
CVE-2025-8843
NASM Netwide Assember outmacho.c macho_no_dead_strip heap-based overflow
A vulnerability was found in NASM Netwide Assember 2.17rc0. This affects the function macho_no_dead_strip of the file outmacho.c. The manipulation leads to heap-based buffer overflow. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used.
[]
4.8
5.3
5.3
4.3
null
PYSEC-2023-307
null
Vyper is a Pythonic Smart Contract Language for the Ethereum Virtual Machine (EVM). Contracts containing large arrays might underallocate the number of slots they need by 1. Prior to v0.3.8, the calculation to determine how many slots a storage variable needed used `math.ceil(type_.size_in_bytes / 32)`. The intermediate floating point step can produce a rounding error if there are enough bits set in the IEEE-754 mantissa. Roughly speaking, if `type_.size_in_bytes` is large (> 2**46), and slightly less than a power of 2, the calculation can overestimate how many slots are needed by 1. If `type_.size_in_bytes` is slightly more than a power of 2, the calculation can underestimate how many slots are needed by 1. This issue is patched in version 0.3.8.
[]
null
7.5
null
null
null
GHSA-2mh9-q72v-7c49
H3C Magic NX18 Plus NX18PV100R003 was discovered to contain a stack overflow via the function edditactionlist.
[]
null
7.8
null
null
null
CVE-2024-36888
workqueue: Fix selection of wake_cpu in kick_pool()
In the Linux kernel, the following vulnerability has been resolved: workqueue: Fix selection of wake_cpu in kick_pool() With cpu_possible_mask=0-63 and cpu_online_mask=0-7 the following kernel oops was observed: smp: Bringing up secondary CPUs ... smp: Brought up 1 node, 8 CPUs Unable to handle kernel pointer dereference in virtual kernel address space Failing address: 0000000000000000 TEID: 0000000000000803 [..] Call Trace: arch_vcpu_is_preempted+0x12/0x80 select_idle_sibling+0x42/0x560 select_task_rq_fair+0x29a/0x3b0 try_to_wake_up+0x38e/0x6e0 kick_pool+0xa4/0x198 __queue_work.part.0+0x2bc/0x3a8 call_timer_fn+0x36/0x160 __run_timers+0x1e2/0x328 __run_timer_base+0x5a/0x88 run_timer_softirq+0x40/0x78 __do_softirq+0x118/0x388 irq_exit_rcu+0xc0/0xd8 do_ext_irq+0xae/0x168 ext_int_handler+0xbe/0xf0 psw_idle_exit+0x0/0xc default_idle_call+0x3c/0x110 do_idle+0xd4/0x158 cpu_startup_entry+0x40/0x48 rest_init+0xc6/0xc8 start_kernel+0x3c4/0x5e0 startup_continue+0x3c/0x50 The crash is caused by calling arch_vcpu_is_preempted() for an offline CPU. To avoid this, select the cpu with cpumask_any_and_distribute() to mask __pod_cpumask with cpu_online_mask. In case no cpu is left in the pool, skip the assignment. tj: This doesn't fully fix the bug as CPUs can still go down between picking the target CPU and the wake call. Fixing that likely requires adding cpu_online() test to either the sched or s390 arch code. However, regardless of how that is fixed, workqueue shouldn't be picking a CPU which isn't online as that would result in unpredictable and worse behavior.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.6:-:*:*:*:*:*:*" ]
null
6.2
null
null
null
CVE-2001-1047
Race condition in OpenBSD VFS allows local users to cause a denial of service (kernel panic) by (1) creating a pipe in one thread and causing another thread to set one of the file descriptors to NULL via a close, or (2) calling dup2 on a file descriptor in one process, then setting the descriptor to NULL via a close in another process that is created via rfork.
[ "cpe:2.3:o:openbsd:openbsd:2.6:*:*:*:*:*:*:*", "cpe:2.3:o:openbsd:openbsd:2.7:*:*:*:*:*:*:*", "cpe:2.3:o:openbsd:openbsd:2.8:*:*:*:*:*:*:*", "cpe:2.3:o:openbsd:openbsd:2.9:*:*:*:*:*:*:*" ]
null
null
null
1.2
null
CVE-2016-5337
The megasas_ctrl_get_info function in hw/scsi/megasas.c in QEMU allows local guest OS administrators to obtain sensitive host memory information via vectors related to reading device control information.
[ "cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" ]
null
5.5
null
2.1
null
GHSA-jpxf-vxxr-4pvx
A vulnerability has been identified in SCALANCE X-200 switch family (incl. SIPLUS NET variants) (Versions < V5.0.0 for CVE-2013-3633 and versions < V4.5.0 for CVE-2013-3634), SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) (All versions < V5.1.0). The user privileges for the web interface are only enforced on client side and not properly verified on server side. Therefore, an attacker is able to execute privileged commands using an unprivileged account.
[]
null
null
null
null
null
GHSA-cgx9-v459-56fj
An elevation of privilege vulnerability in the kernel ION subsystem could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Critical due to the possibility of a local permanent device compromise, which may require reflashing the operating system to repair the device. Product: Android. Versions: Kernel-3.18. Android ID: A-33940449.
[]
null
null
7.8
null
null
CVE-2017-15519
Versions of SnapCenter 2.0 through 3.0.1 allow unauthenticated remote attackers to view and modify backup related data via the Plug-in for NAS File Services. All users are urged to move to version 3.0.1 and perform the mitigation steps or upgrade to 4.0 following the product documentation.
[ "cpe:2.3:a:netapp:snapcenter_server:*:*:*:*:*:*:*:*" ]
null
null
7.2
6.4
null
CVE-2020-1058
A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory, aka 'VBScript Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1035, CVE-2020-1060, CVE-2020-1093.
[ "cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*" ]
null
7.5
null
7.6
null
CVE-2008-7186
Coppermine Photo Gallery (CPG) 1.4.14 does not restrict access to update.php, which allows remote attackers to obtain sensitive information such as the database table prefix via a direct request. NOTE: this might be leveraged for attacks against CVE-2008-0504.
[ "cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.4.14:*:*:*:*:*:*:*" ]
null
null
null
5
null
CVE-2024-31814
TOTOLINK EX200 V4.0.3c.7646_B20201211 allows attackers to bypass login through the Form_Login function.
[ "cpe:2.3:o:totolink:ex200_firmware:4.0.3c.7646_b20201211:*:*:*:*:*:*:*" ]
null
8.8
null
null
null
GHSA-4q9j-5567-rg22
Tenda AC18 V15.03.05.19 was discovered to contain a stack overflow via the funcpara1 parameter in the formSetCfm function.
[]
null
5.7
null
null
null
GHSA-pccm-w2w7-v4p2
An issue was discovered in Artifex MuJS 1.0.5. regcompx in regexp.c does not restrict regular expression program size, leading to an overflow of the parsed syntax list size.
[]
null
null
9.8
null
null
CVE-2002-0721
Microsoft SQL Server 7.0 and 2000 installs with weak permissions for extended stored procedures that are associated with helper functions, which could allow unprivileged users, and possibly remote attackers, to run stored procedures with administrator privileges via (1) xp_execresultset, (2) xp_printstatements, or (3) xp_displayparamstmt.
[ "cpe:2.3:a:microsoft:data_engine:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:data_engine:2000:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sql_server:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sql_server:7.0:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sql_server:7.0:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sql_server:7.0:sp3:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sql_server:7.0:sp4:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sql_server:2000:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sql_server:2000:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sql_server:2000:sp2:*:*:*:*:*:*" ]
null
null
null
10
null
CVE-2023-4877
Exposure of Sensitive Information to an Unauthorized Actor in hamza417/inure
Exposure of Sensitive Information to an Unauthorized Actor in GitHub repository hamza417/inure prior to build92.
[ "cpe:2.3:a:hamza417:inure:*:*:*:*:*:android:*:*" ]
null
null
5.5
null
null
CVE-2017-7255
XSS exists in the CMS Made Simple (CMSMS) 2.1.6 "Content-->News-->Add Article" feature via the m1_title parameter. Someone must login to conduct the attack.
[ "cpe:2.3:a:cmsmadesimple:cms_made_simple:2.1.6:*:*:*:*:*:*:*" ]
null
null
5.4
3.5
null
CVE-2023-3238
OTCMS server-side request forgery
A vulnerability, which was classified as critical, has been found in OTCMS up to 6.62. This issue affects some unknown processing of the file /admin/read.php?mudi=getSignal. The manipulation of the argument signalUrl leads to server-side request forgery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-231509 was assigned to this vulnerability.
[ "cpe:2.3:a:otcms:otcms:*:*:*:*:*:*:*:*" ]
null
6.3
6.3
6.5
null
CVE-2013-6644
Multiple unspecified vulnerabilities in Google Chrome before 32.0.1700.76 on Windows and before 32.0.1700.77 on Mac OS X and Linux allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
GHSA-jhv5-cxf2-r67v
UVDesk Community Skeleton v1.1.1 allows unauthenticated attackers to perform brute force attacks on the login page to gain access to the application.
[]
null
9.8
null
null
null
CVE-2008-3459
Unspecified vulnerability in OpenVPN 2.1-beta14 through 2.1-rc8, when running on non-Windows systems, allows remote servers to execute arbitrary commands via crafted (1) lladdr and (2) iproute configuration directives, probably related to shell metacharacters.
[ "cpe:2.3:a:openvpn:openvpn:2.1:beta-14:*:*:*:*:*:*", "cpe:2.3:a:openvpn:openvpn:2.1:beta-15:*:*:*:*:*:*", "cpe:2.3:a:openvpn:openvpn:2.1:beta-16:*:*:*:*:*:*", "cpe:2.3:a:openvpn:openvpn:2.1:rc_1:*:*:*:*:*:*", "cpe:2.3:a:openvpn:openvpn:2.1:rc_2:*:*:*:*:*:*", "cpe:2.3:a:openvpn:openvpn:2.1:rc_3:*:*:*:*:*:*", "cpe:2.3:a:openvpn:openvpn:2.1:rc_4:*:*:*:*:*:*", "cpe:2.3:a:openvpn:openvpn:2.1:rc_5:*:*:*:*:*:*", "cpe:2.3:a:openvpn:openvpn:2.1:rc_6:*:*:*:*:*:*", "cpe:2.3:a:openvpn:openvpn:2.1:rc_7:*:*:*:*:*:*", "cpe:2.3:a:openvpn:openvpn:2.1:rc_8:*:*:*:*:*:*" ]
null
null
null
7.6
null
GHSA-j898-7mvf-jvmr
IBM Operational Decision Management 8.5, 8.6, 8.7, 8.8, and 8.9 is vulnerable to a XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 150170.
[]
null
null
9.1
null
null
GHSA-x94f-c3w2-hwp6
Out of bound access occurs while handling the WMI FW event due to lack of check of buffer argument which comes directly from the WLAN FW in Snapdragon Auto, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking in APQ8096AU, IPQ4019, IPQ8064, IPQ8074, MDM9607, MSM8996AU, QCA6574AU, QCA8081, QCN7605, SDX55, SM6150, SM7150, SM8150
[]
null
null
null
null
null
GHSA-rq4p-m4xx-74r6
In TOTOLINK T6 V4.1.5cu.709_B20210518, there is an execute arbitrary command in cstecgi.cgi.
[]
null
9.8
null
null
null
CVE-2025-49675
Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability
Use after free in Kernel Streaming WOW Thunk Service Driver allows an authorized attacker to elevate privileges locally.
[]
null
7.8
null
null
null
CVE-2006-0199
SQL injection vulnerability in news.asp in Mini-Nuke CMS System 1.8.2 and earlier allows remote attackers to execute arbitrary SQL commands via the hid parameter.
[ "cpe:2.3:a:mini-nuke:cms_system:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
GHSA-c42h-jhjr-mv7v
Unrestricted file upload vulnerability in the "Add Image Macro" feature in WebCards 1.3 allows remote authenticated administrators to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the uploaded file.
[]
null
null
null
null
null
GHSA-jfpc-9686-g9rf
The Raptive Ads plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the site_ads_files_reset() and cls_file_reset() functions in all versions up to, and including, 3.6.3. This makes it possible for unauthenticated attackers to reset the ad and cls files.
[]
null
5.3
null
null
null
CVE-2016-9832
PricewaterhouseCoopers (PwC) ACE-ABAP 8.10.304 for SAP Security allows remote authenticated users to conduct ABAP injection attacks and execute arbitrary code via (1) SAPGUI or (2) Internet Communication Framework (ICF) over HTTP or HTTPS, as demonstrated by WEBGUI or Report.
[ "cpe:2.3:a:pwc:ace-advanced_business_application_programming:8.10.304:*:*:*:*:*:*:*" ]
null
null
9.9
6.5
null
CVE-2024-57660
An issue in the sqlo_expand_jts component of openlink virtuoso-opensource v7.2.11 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
[]
null
7.5
null
null
null
CVE-2015-5111
Use-after-free vulnerability in Adobe Reader and Acrobat 10.x before 10.1.15 and 11.x before 11.0.12, Acrobat and Acrobat Reader DC Classic before 2015.006.30060, and Acrobat and Acrobat Reader DC Continuous before 2015.008.20082 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-4448, CVE-2015-5095, CVE-2015-5099, CVE-2015-5101, CVE-2015-5113, and CVE-2015-5114.
[ "cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
null
null
6.8
null
CVE-2017-0598
An information disclosure vulnerability in the Framework APIs could enable a local malicious application to bypass operating system protections that isolate application data from other applications. This issue is rated as High because it could be used to gain access to data that the application does not have access to. Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2. Android ID: A-34128677.
[ "cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.2:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.3:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.3.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.4:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.4.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.4.2:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.4.3:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.4.4:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:5.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:5.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:5.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:5.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:7.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:*" ]
null
null
5.5
4.3
null
CVE-2017-20069
Hindu Matrimonial Script countrymanagement.php privileges management
A vulnerability classified as critical has been found in Hindu Matrimonial Script. This affects an unknown part of the file /admin/countrymanagement.php. The manipulation leads to improper privilege management. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
[ "cpe:2.3:a:hindu_matrimonial_script_project:hindu_matrimonial_script:-:*:*:*:*:*:*:*" ]
null
6.3
null
null
null
GHSA-9crx-q2j4-3x69
Cross-Site Request Forgery (CSRF) vulnerability in Noor Alam WordPress Image SEO allows Cross Site Request Forgery.This issue affects WordPress Image SEO: from n/a through 1.1.4.
[]
null
4.3
null
null
null
GHSA-3qqm-2wjh-qxhf
Vulnerability in the Oracle Common Applications component of Oracle E-Business Suite (subcomponent: CRM User Management Framework). Supported versions that are affected are 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6, 12.2.7 and 12.2.8. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Common Applications. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Common Applications, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Common Applications accessible data as well as unauthorized update, insert or delete access to some of Oracle Common Applications accessible data. CVSS 3.0 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N).
[]
null
null
null
null
null
CVE-2009-0974
Unspecified vulnerability in the Portal component in Oracle Application Server 10.1.2.3 and 10.1.4.2 allows remote attackers to affect integrity via unknown vectors, a different vulnerability than CVE-2009-0983 and CVE-2009-3407.
[ "cpe:2.3:a:oracle:application_server:10.1.2.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:application_server:10.1.4.2.0:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
RHSA-2024:3854
Red Hat Security Advisory: kernel-rt security and bug fix update
kernel: KVM: SVM: improper check in svm_set_x2apic_msr_interception allows direct access to host x2apic msrs kernel: bluetooth: bt_sock_ioctl race condition leads to use-after-free in bt_sock_recvmsg kernel: net/mlx5e: fix a potential double-free in fs_any_create_groups kernel: kvm: Avoid potential UAF in LPI translation cache
[ "cpe:/a:redhat:rhel_eus:9.2::nfv", "cpe:/a:redhat:rhel_eus:9.2::realtime" ]
null
7.8
null
null
null
GHSA-whhr-7f2w-qqj2
phonenumber panics on parsing crafted RFC3966 inputs
ImpactThe phonenumber parsing code may panic due to a panic-guarded out-of-bounds access on the phonenumber string.In a typical deployment of `rust-phonenumber`, this may get triggered by feeding a maliciously crafted phonenumber over the network, specifically the string `.;phone-context=`.PatchesPatches will be published as version `0.3.3+8.13.9` and backported as `0.2.5+8.11.3`.Workaroundsn.a.Referencesn.a.
[]
null
7.5
null
null
null
GHSA-vq6h-p287-jxff
The virtual memory management system in FreeBSD 4.5-RELEASE and earlier does not properly check the existence of a VM object during page invalidation, which allows local users to cause a denial of service (crash) by calling msync on an unaccessed memory map created with MAP_ANON and MAP_NOSYNC flags.
[]
null
null
null
null
null
CVE-2015-6944
Cross-site request forgery (CSRF) vulnerability in JSP/MySQL Administrador Web 1 allows remote attackers to hijack the authentication of users for requests that execute arbitrary SQL commands via the cmd parameter to sys/sys/listaBD2.jsp.
[ "cpe:2.3:a:jsp\\/mysql_administrador_web_project:jsp\\/mysql_administrador_web:1.0:*:*:*:*:*:*:*" ]
null
null
null
6.8
null
CVE-2023-25753
Server-Side Request Forgery in Apache ShenYu
There exists an SSRF (Server-Side Request Forgery) vulnerability located at the /sandbox/proxyGateway endpoint. This vulnerability allows us to manipulate arbitrary requests and retrieve corresponding responses by inputting any URL into the requestUrl parameter. Of particular concern is our ability to exert control over the HTTP method, cookies, IP address, and headers. This effectively grants us the capability to dispatch complete HTTP requests to hosts of our choosing. This issue affects Apache ShenYu: 2.5.1. Upgrade to Apache ShenYu 2.6.0 or apply patch  https://github.com/apache/shenyu/pull/4776  .
[ "cpe:2.3:a:apache:shenyu:2.5.1:*:*:*:*:*:*:*" ]
null
6.5
null
null
null
GHSA-8p8g-pp68-479w
A heap out-of-bounds read flaw was found in builtin.c in the gawk package. This issue may lead to a crash and could be used to read sensitive information.
[]
null
4.4
null
null
null
CVE-2006-2218
Unspecified vulnerability in Internet Explorer 6.0 on Microsoft Windows XP SP2 allows remote attackers to execute arbitrary code via "exceptional conditions" that trigger memory corruption, as demonstrated using an exception handler and nested object tags, a variant of CVE-2006-1992.
[ "cpe:2.3:a:microsoft:internet_explorer:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*" ]
null
null
null
9.3
null
ICSA-23-180-04
Mitsubishi Electric MELSEC-F Series
An authentication bypass vulnerability due to authentication bypass by capture-replay exists in the MELSEC-F series main modules.
[]
null
null
7.5
null
null
GHSA-f33m-6r3x-9gcf
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 9.0.0-9.1.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
[]
null
4.9
null
null
null
RHSA-2022:6763
Red Hat Security Advisory: bind security update
bind: BIND 9 resolvers configured to answer from cache with zero stale-answer-timeout may terminate unexpectedly bind: memory leak in ECDSA DNSSEC verification code bind: memory leaks in EdDSA DNSSEC verification code
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
7.5
null
null
null
GHSA-8g43-4g4j-g9r5
ChakraCore RCE Vulnerability
The Chakra JavaScript engine in Microsoft Edge allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Scripting Engine Memory Corruption Vulnerability," a different vulnerability than CVE-2016-3265.
[]
null
null
8.8
null
null
CVE-2024-0340
Kernel: information disclosure in vhost/vhost.c:vhost_new_msg()
A vulnerability was found in vhost_new_msg in drivers/vhost/vhost.c in the Linux kernel, which does not properly initialize memory in messages passed between virtual guests and the host operating system in the vhost/vhost.c:vhost_new_msg() function. This issue can allow local privileged users to read some kernel memory contents when reading from the /dev/vhost-net device file.
[ "cpe:/a:redhat:enterprise_linux:8::nfv", "cpe:/a:redhat:enterprise_linux:8::realtime", "cpe:/a:redhat:enterprise_linux:8::crb", "cpe:/o:redhat:enterprise_linux:8::baseos", "cpe:/a:redhat:enterprise_linux:9::crb", "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/o:redhat:enterprise_linux:9::baseos", "cpe:/a:redhat:enterprise_linux:9::realtime", "cpe:/a:redhat:enterprise_linux:9::nfv", "cpe:/a:redhat:rhel_eus:9.4::realtime", "cpe:/a:redhat:rhel_eus:9.4::crb", "cpe:/a:redhat:rhel_eus:9.4::appstream", "cpe:/o:redhat:rhel_eus:9.4::baseos", "cpe:/a:redhat:rhel_eus:9.4::nfv", "cpe:/o:redhat:enterprise_linux:6", "cpe:/o:redhat:enterprise_linux:7", "cpe:/o:redhat:enterprise_linux:9", "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.4:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.4:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.4:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.4:rc4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.4:rc5:*:*:*:*:*:*" ]
null
4.4
null
null
null
CVE-2010-5073
The JavaScript implementation in Google Chrome 4 does not properly restrict the set of values contained in the object returned by the getComputedStyle method, which allows remote attackers to obtain sensitive information about visited web pages by calling this method. NOTE: this may overlap CVE-2010-5070.
[ "cpe:2.3:a:google:chrome:4.0.212.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.212.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.221.8:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.222.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.222.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.222.5:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.222.12:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.223.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.223.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.223.2:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.223.4:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.223.5:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.223.7:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.223.8:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.223.9:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.224.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.229.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.235.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.236.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.237.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.237.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.239.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.240.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.241.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.242.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.243.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.244.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.245.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.245.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.246.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.247.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.248.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.2:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.3:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.4:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.5:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.6:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.7:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.8:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.9:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.10:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.11:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.12:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.14:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.16:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.17:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.18:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.19:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.20:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.21:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.22:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.23:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.24:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.25:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.26:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.27:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.28:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.29:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.30:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.31:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.32:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.33:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.34:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.35:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.36:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.37:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.38:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.39:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.40:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.41:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.42:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.43:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.44:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.45:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.46:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.47:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.48:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.49:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.50:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.51:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.52:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.53:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.54:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.55:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.56:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.57:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.58:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.59:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.60:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.61:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.62:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.63:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.64:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.65:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.66:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.67:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.68:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.69:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.70:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.71:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.72:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.73:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.74:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.75:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.76:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.77:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.78:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.78:beta:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.79:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.80:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.81:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.82:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.89:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.250.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.250.2:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.251.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.252.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.254.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.255.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.256.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.257.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.258.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.259.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.260.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.261.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.262.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.263.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.264.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.265.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.266.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.267.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.268.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.269.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.271.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.272.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.275.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.275.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.276.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.277.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.278.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.286.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.287.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.288.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.288.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.289.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.290.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.292.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.294.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.295.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.296.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.299.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.300.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.301.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.302.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.302.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.302.2:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.302.3:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.303.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.304.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.305.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1:beta:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1001:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1004:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1006:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1007:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1008:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1009:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1010:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1011:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1012:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1013:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1014:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1015:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1016:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1017:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1018:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1019:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1020:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1021:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1022:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1023:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1024:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1025:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1026:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1027:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1028:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1029:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1030:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1031:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1032:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1033:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1034:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1035:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1036:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1037:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1038:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1039:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1040:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1041:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1042:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1043:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1044:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1045:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1046:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1047:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1048:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1049:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1050:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1051:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1052:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1053:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1054:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1055:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1056:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1057:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1058:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1059:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1060:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1061:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1062:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1063:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1064:*:*:*:*:*:*:*" ]
null
null
null
5
null
GHSA-xfq7-m4gq-rfwq
Covid-19 Travel Pass Management System v1.0 is vulnerable to SQL Injection via ctpms/admin/?page=user/manage_user&id=.
[]
null
7.2
null
null
null
CVE-2021-37940
An information disclosure via GET request server-side request forgery vulnerability was discovered with the Workplace Search Github Enterprise Server integration. Using this vulnerability, a malicious Workplace Search admin could use the GHES integration to view hosts that might not be publicly accessible.
[ "cpe:2.3:a:elastic:enterprise_search:*:*:*:*:*:*:*:*" ]
null
6.8
null
4
null
GHSA-28mc-g557-92m7
@75lb/deep-merge Prototype Pollution vulnerability
Prototype Pollution in 75lb deep-merge 1.1.1 allows attackers to execute arbitrary code or cause a Denial of Service (DoS) and cause other impacts via merge methods of lodash to merge objects.
[]
8.7
5.9
null
null
null
GHSA-ggjv-5q8p-39gf
Mozilla Firefox 3.x before 3.0.5 and 2.x before 2.0.0.19, Thunderbird 2.x before 2.0.0.19, and SeaMonkey 1.x before 1.1.14 does not properly parse URLs with leading whitespace or control characters, which might allow remote attackers to misrepresent URLs and simplify phishing attacks.
[]
null
null
null
null
null
CVE-2018-18794
School Event Management System 1.0 allows CSRF via user/controller.php?action=edit.
[ "cpe:2.3:a:school_event_management_system_project:school_event_management_system:1.0:*:*:*:*:*:*:*" ]
null
null
8.8
6.8
null
CVE-2016-6910
The non-existent notification listener vulnerability was introduced in the initial Android 5.0.2 builds for the Samsung Galaxy S6 Edge devices, but the vulnerability can persist on the device even after the device has been upgraded to an Android 5.1.1 or 6.0.1 build. The vulnerable system app gives a non-existent app the ability to read the notifications from the device, which a third-party app can utilize if it uses a package name of com.samsung.android.app.portalservicewidget. This vulnerability allows an unprivileged third-party app to obtain the text of the user's notifications, which tend to contain personal data.
[ "cpe:2.3:o:google:android:5.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:5.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*" ]
null
null
5.5
4.3
null
GHSA-fwjq-j8gc-2f24
OneBlog v2.3.4 was discovered to contain a Server-Side Request Forgery (SSRF) vulnerability via the Logo parameter under the Link module.
[]
null
4.3
null
null
null
PYSEC-2019-15
null
Django 2.1 before 2.1.15 and 2.2 before 2.2.8 allows unintended model editing. A Django model admin displaying inline related models, where the user has view-only permissions to a parent model but edit permissions to the inline model, would be presented with an editing UI, allowing POST requests, for updating the inline model. Directly editing the view-only parent model was not possible, but the parent model's save() method was called, triggering potential side effects, and causing pre and post-save signal handlers to be invoked. (To resolve this, the Django admin is adjusted to require edit permissions on the parent model in order for inline models to be editable.)
[]
null
null
null
null
null
CVE-2023-49987
A cross-site scripting (XSS) vulnerability in the component /management/term of School Fees Management System v1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the tname parameter.
[]
null
5.4
null
null
null
GHSA-qgv4-7jhx-c72q
Missing webhook endpoint authorization in Jenkins Rundeck Plugin
Jenkins Rundeck Plugin 3.6.11 and earlier does not protect access to the `/plugin/rundeck/webhook/` endpoint, allowing users with Overall/Read permission to trigger jobs that are configured to be triggerable via Rundeck.
[]
null
5.4
null
null
null
CVE-2024-56752
drm/nouveau/gr/gf100: Fix missing unlock in gf100_gr_chan_new()
In the Linux kernel, the following vulnerability has been resolved: drm/nouveau/gr/gf100: Fix missing unlock in gf100_gr_chan_new() When the call to gf100_grctx_generate() fails, unlock gr->fecs.mutex before returning the error. Fixes smatch warning: drivers/gpu/drm/nouveau/nvkm/engine/gr/gf100.c:480 gf100_gr_chan_new() warn: inconsistent returns '&gr->fecs.mutex'.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
null
5.5
null
null
null
GHSA-8668-w4w3-r36q
SQL injection vulnerability in index.php in Hi Web Wiesbaden Live Shopping Multi Portal System allows remote attackers to execute arbitrary SQL commands via the artikel parameter.
[]
null
null
null
null
null
GHSA-xwrr-gvqm-j58v
In pblS2mpuResume of s2mpu.c, there is a possible mitigation bypass due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
[]
null
7.8
null
null
null
CVE-2024-56003
WordPress Caldera SMTP Mailer plugin <= 1.0.1 - Broken Access Control vulnerability
Missing Authorization vulnerability in David Cramer Caldera SMTP Mailer.This issue affects Caldera SMTP Mailer: from n/a through 1.0.1.
[]
null
4.3
null
null
null
CVE-2007-2806
Multiple cross-site scripting (XSS) vulnerabilities in index.php in GaliX 2.0 allow remote attackers to inject arbitrary web script or HTML via the (1) galix_cat_detail, (2) galix_gal_detail, and (3) galix_cat_detail_sort parameters.
[ "cpe:2.3:a:galix:galix:2.0:*:*:*:*:*:*:*" ]
null
null
null
5.8
null
GHSA-393p-mc4h-j8g2
The Beaver Builder – WordPress Page Builder for WordPress is vulnerable to Stored Cross-Site Scripting via the 'Caption - On Hover' value associated with images in versions up to, and including, 2.5.5.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with access to the Beaver Builder editor to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
5.4
null
null
null
CVE-2002-2211
BIND 4 and BIND 8, when resolving recursive DNS queries for arbitrary hosts, allows remote attackers to conduct DNS cache poisoning via a birthday attack that uses a large number of open queries for the same resource record (RR) combined with spoofed responses, which increases the possibility of successfully spoofing a response in a way that is more efficient than brute force methods.
[ "cpe:2.3:a:isc:bind:4.9:*:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:4.9.2:*:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:4.9.3:*:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:4.9.4:*:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:4.9.5:*:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:4.9.5:p1:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:4.9.6:*:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:4.9.7:*:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:4.9.8:*:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:4.9.9:*:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:4.9.10:*:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:8.2:*:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:8.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:8.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:8.2.2:p1:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:8.2.2:p2:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:8.2.2:p3:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:8.2.2:p4:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:8.2.2:p5:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:8.2.2:p6:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:8.2.2:p7:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:8.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:8.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:8.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:8.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:8.2.7:*:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:8.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:8.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:8.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:8.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:8.3.4:*:*:*:*:*:*:*" ]
null
null
null
5
null
CVE-2023-6697
The WP Go Maps (formerly WP Google Maps) plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the map id parameter in all versions up to, and including, 9.0.28 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
[ "cpe:2.3:a:wpgmaps:wp_go_maps:*:*:*:*:*:wordpress:*:*" ]
null
6.1
null
null
null
GHSA-r36r-pw7g-37xr
Directory traversal vulnerability in users/login.php in Gnew 2013.1 and earlier allows remote attackers to read arbitrary files via a .. (dot dot) in the gnew_language cookie.
[]
null
null
null
null
null
CVE-2005-2766
Symantec AntiVirus Corporate Edition 9.0.1.x and 9.0.4.x, and possibly other versions, when obtaining updates from an internal LiveUpdate server, stores sensitive information in cleartext in the Log.Liveupdate log file, which allows attackers to obtain the username and password to the internal LiveUpdate server.
[ "cpe:2.3:a:symantec:norton_antivirus:9.0.1.1.1000:*:corporate:*:*:*:*:*", "cpe:2.3:a:symantec:norton_antivirus:9.0.4:*:corporate:*:*:*:*:*" ]
null
null
null
2.1
null
GHSA-v6r3-x6mm-4r84
Cross-Site Request Forgery (CSRF) vulnerability in Billy Bryant Tabs allows Stored XSS. This issue affects Tabs: from n/a through 4.0.3.
[]
null
7.1
null
null
null
PYSEC-2024-63
null
In Roundup before 2.4.0, classhelpers (_generic.help.html) allow XSS.
[]
null
null
null
null
null
GHSA-397x-mch8-3p5m
A vulnerability, which was classified as critical, has been found in Conjure Position Department Service Quality Evaluation System up to 1.0.11. Affected by this issue is the function eval of the file public/assets/less/bootstrap-less/mixins/head.php. The manipulation of the argument payload leads to backdoor. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
[]
2.1
6.3
null
null
null
GHSA-58x6-9vjj-69q7
Online Nurse Hiring System v1.0 was discovered to contain multiple SQL injection vulnerabilities in the component /admin/add-nurse.php via the gender and emailid parameters.
[]
null
7.2
null
null
null
CVE-2017-6786
A vulnerability in Cisco Elastic Services Controller could allow an authenticated, local, unprivileged attacker to access sensitive information, including credentials for system accounts, on an affected system. The vulnerability is due to improper protection of sensitive log files. An attacker could exploit this vulnerability by logging in to an affected system and accessing unprotected log files. A successful exploit could allow the attacker to access sensitive log files, which may include system credentials, on the affected system. Cisco Bug IDs: CSCvc76616. Known Affected Releases: 2.2(9.76).
[ "cpe:2.3:a:cisco:elastic_services_controller:2.2\\(9.76\\):*:*:*:*:*:*:*" ]
null
null
6.3
4.6
null
RHSA-2016:0491
Red Hat Security Advisory: foomatic security update
foomatic: potential remote arbitrary code execution cups-filters: foomatic-rip did not consider the back tick as an illegal shell escape character cups-filters: foomatic-rip did not consider semicolon as illegal shell escape character
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
null
CVE-2022-42060
Tenda AC1200 Router Model W15Ev2 V15.11.0.10(1576) was discovered to contain a stack overflow via the setWanPpoe function. This vulnerability allows attackers to cause a Denial of Service (DoS) via crafted overflow data.
[ "cpe:2.3:o:tenda:w15e_firmware:15.11.0.10\\(1576\\):*:*:*:*:*:*:*", "cpe:2.3:h:tenda:w15e:2.0:*:*:*:*:*:*:*" ]
null
7.5
null
null
null
RHSA-2014:0520
Red Hat Security Advisory: kernel security and bug fix update
kernel: net: sctp: null pointer dereference when processing authenticated cookie_echo chunk kernel: pty layer race condition leading to memory corruption kernel: netfilter: nf_conntrack_dccp: incorrect skb_header_pointer API usages
[ "cpe:/o:redhat:rhel_mission_critical:6.2::server" ]
null
null
null
null
null
CVE-2023-22581
White Rabbit Switch - Unauthenticated remote code execution
White Rabbit Switch contains a vulnerability which makes it possible for an attacker to perform system commands under the context of the web application (the default installation makes the webserver run as the root user).
[ "cpe:2.3:o:home.cern:white_rabbit_switch_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:home.cern:white_rabbit_switch:-:*:*:*:*:*:*:*" ]
null
9.8
null
null
null
CVE-2022-30528
SQL Injection vulnerability in asith-eranga ISIC tour booking through version published on Feb 13th 2018, allows attackers to execute arbitrary commands via the username parameter to /system/user/modules/mod_users/controller.php.
[ "cpe:2.3:a:isic.lk_project:isic.lk:*:*:*:*:*:*:*:*" ]
null
9.8
null
null
null
GHSA-wr78-6xg8-vgj2
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory, aka 'Jet Database Engine Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1074.
[]
null
7.8
null
null
null
CVE-2022-0513
WP Statistics <= 13.1.4 Unauthenticated Blind SQL Injection via exclusion_reason
The WP Statistics WordPress plugin is vulnerable to SQL Injection due to insufficient escaping and parameterization of the exclusion_reason parameter found in the ~/includes/class-wp-statistics-exclusion.php file which allows attackers without authentication to inject arbitrary SQL queries to obtain sensitive information, in versions up to and including 13.1.4. This requires the "Record Exclusions" option to be enabled on the vulnerable site.
[ "cpe:2.3:a:veronalabs:wp_statistics:*:*:*:*:*:wordpress:*:*" ]
null
9.8
null
null
null
GHSA-4j56-jg72-x59r
Uncontrolled search path vulnerabilities were reported in the Lenovo Universal Device Client (UDC) that could allow an attacker with local access to execute code with elevated privileges.
[]
null
7.8
null
null
null
CVE-2014-3091
Cross-site scripting (XSS) vulnerability in IBM Security QRadar SIEM 7.1.x and 7.2.x allows remote attackers to inject arbitrary web script or HTML via a crafted URL.
[ "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.0:*:*:*:*:*:*:*" ]
null
null
null
5
null
CVE-2016-10173
Directory traversal vulnerability in the minitar before 0.6 and archive-tar-minitar 0.5.2 gems for Ruby allows remote attackers to write to arbitrary files via a .. (dot dot) in a TAR archive entry.
[ "cpe:2.3:a:minitar:archive-tar-minitar:*:*:*:*:*:*:*:*", "cpe:2.3:a:minitar:minitar:*:*:*:*:*:*:*:*" ]
null
null
7.5
5
null
CVE-2025-31141
In JetBrains TeamCity before 2025.03 exception could lead to credential leakage on Cloud Profiles page
[]
null
2.7
null
null
null
GHSA-q862-fq6m-jgm3
A validation issue was addressed with improved logic. This issue is fixed in iOS 14.5 and iPadOS 14.5, watchOS 7.4, macOS Big Sur 11.3. A malicious application may be able to leak sensitive user information.
[]
null
null
null
null
null
CVE-2008-5946
SQL injection vulnerability in readmore.php in PHP-Fusion 4.01 allows remote attackers to execute arbitrary SQL commands via the news_id parameter.
[ "cpe:2.3:a:php-fusion:php-fusion:4.01:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
GHSA-g62r-wr69-gr9p
The Phone Proxy component in Cisco Adaptive Security Appliance (ASA) Software 9.1(.3) and earlier allows remote attackers to bypass authentication and change trust relationships by injecting a Certificate Trust List (CTL) file, aka Bug ID CSCuj66770.
[]
null
null
null
null
null
GHSA-ff62-2g5m-w3f8
The WPC Order Notes for WooCommerce plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.5.2. This is due to missing or incorrect nonce validation on the ajax_update_order_note() function. This makes it possible for unauthenticated attackers to inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
[]
null
6.1
null
null
null
CVE-2023-28739
Incorrect default permissions in some Intel(R) Chipset Driver Software before version 10.1.19444.8378 may allow an authenticated user to potentially enable escalation of privilege via local access.
[ "cpe:2.3:a:intel:chipset_driver_software:*:*:*:*:*:*:*:*", "cpe:2.3:a:intel:chipset_device_software:*:*:*:*:*:*:*:*" ]
null
6.7
null
null
null
CVE-2023-46016
Cross Site Scripting (XSS) in abs.php in Code-Projects Blood Bank 1.0 allows attackers to run arbitrary code via the 'search' parameter in the application URL.
[ "cpe:2.3:a:code-projects:blood_bank:1.0:*:*:*:*:*:*:*" ]
null
6.1
null
null
null
CVE-2025-22458
DLL hijacking in Ivanti Endpoint Manager before version 2024 SU1 or before version 2022 SU7 allows an authenticated attacker to escalate to System.
[]
null
7.8
null
null
null
GHSA-9vfv-f5vf-mq6m
services/flickr/flickr.c in libsocialweb before 0.25.21 automatically connects to Flickr when no Flickr account is set, which might allow remote attackers to obtain sensitive information via a man-in-the-middle (MITM) attack.
[]
null
null
null
null
null
CVE-2025-48939
tarteaucitron.js vulnerable to DOM Clobbering via document.currentScript
tarteaucitron.js is a compliant and accessible cookie banner. Prior to version 1.22.0, a vulnerability was identified in tarteaucitron.js where document.currentScript was accessed without verifying that it referenced an actual <script> element. If an attacker injected an HTML element, it could clobber the document.currentScript property. This causes the script to resolve incorrectly to an element instead of the <script> tag, leading to unexpected behavior or failure to load the script path correctly. This issue arises because in some browser environments, named DOM elements become properties on the global document object. An attacker with control over the HTML could exploit this to change the CDN domain of tarteaucitron. This issue has been patched in version 1.22.0.
[]
null
4.2
null
null
null
CVE-2020-27033
In nfc_ncif_proc_get_routing of nfc_ncif.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-153655153
[ "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*" ]
null
4.4
null
2.1
null
GHSA-3pw7-jp2h-49x7
IBM DB2 for Linux, UNIX and Windows (includes DB2 Connect Server) 10.1, 10.5, and 11.1 tool db2licm is affected by buffer overflow vulnerability that can potentially result in arbitrary code execution. IBM X-Force ID: 146364.
[]
null
null
7.8
null
null