id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
189k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
patch_commit_url
stringlengths
36
232
GHSA-mwvc-v6v5-5p39
Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution.
[]
null
null
null
null
null
CVE-2025-5512
quequnlong shiyi-blog Administrator Backend verifyPassword improper authentication
A vulnerability, which was classified as critical, was found in quequnlong shiyi-blog up to 1.2.1. Affected is an unknown function of the file /api/sys/user/verifyPassword/ of the component Administrator Backend. The manipulation leads to improper authentication. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
[]
6.9
7.3
7.3
7.5
null
CVE-2017-8827
forgotpassword.php in GeniXCMS 1.0.2 lacks a rate limit, which might allow remote attackers to cause a denial of service (login inability) or possibly conduct Arbitrary User Password Reset attacks via a series of requests.
[ "cpe:2.3:a:genixcms:genixcms:1.0.2:*:*:*:*:*:*:*" ]
null
null
9.1
6.4
null
CVE-1999-0174
The view-source CGI program allows remote attackers to read arbitrary files via a .. (dot dot) attack.
[ "cpe:2.3:a:netscape:communicator:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:netscape:communicator:4.05:*:*:*:*:*:*:*", "cpe:2.3:a:netscape:communicator:4.5:*:*:*:*:*:*:*", "cpe:2.3:a:netscape:communicator:4.06:*:*:*:*:*:*:*", "cpe:2.3:a:netscape:communicator:4.6:*:*:*:*:*:*:*", "cpe:2.3:a:netscape:communicator:4.07:*:*:*:*:*:*:*", "cpe:2.3:a:netscape:communicator:4.51:*:*:*:*:*:*:*" ]
null
null
null
6.4
null
CVE-2020-35545
Time-based SQL injection exists in Spotweb 1.4.9 via the query string.
[ "cpe:2.3:a:spotweb_project:spotweb:1.4.9:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
null
CVE-2021-21375
Crash in receiving updated SDP answer after initial SDP negotiation failed
PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In PJSIP version 2.10 and earlier, after an initial INVITE has been sent, when two 183 responses are received, with the first one causing negotiation failure, a crash will occur. This results in a denial of service.
[ "cpe:2.3:a:teluu:pjsip:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" ]
null
6.5
null
null
null
GHSA-45vq-42x3-g38f
In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, a length variable which is used to copy data has a size of only 8 bits and can be exceeded resulting in a denial of service.
[]
null
null
7.5
null
null
GHSA-mh9h-44jv-cw34
Software installed and run as a non-privileged user may conduct improper GPU system calls to gain access to the graphics buffers of a parent process.
[]
null
8.4
null
null
null
GHSA-r587-wfm5-v67q
Directory traversal vulnerability in the DeviceStorage API in Mozilla FirefoxOS before 1.2.2 allows attackers to bypass the media sandbox protection mechanism, and read or modify arbitrary files, via a crafted application that uses a relative pathname for a DeviceStorageFile object.
[]
null
null
null
null
null
GHSA-ffg8-5m28-xmv3
Cross Site Scripting (XSS) vulnerability in mblog 3.5 via the nickname field to /settings/profile.
[]
null
null
null
null
null
CVE-2022-0985
Insufficient capability checks could allow users with the moodle/site:uploadusers capability to delete users, without having the necessary moodle/user:delete capability.
[ "cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*" ]
null
4.3
null
4
null
CVE-2024-36949
amd/amdkfd: sync all devices to wait all processes being evicted
In the Linux kernel, the following vulnerability has been resolved: amd/amdkfd: sync all devices to wait all processes being evicted If there are more than one device doing reset in parallel, the first device will call kfd_suspend_all_processes() to evict all processes on all devices, this call takes time to finish. other device will start reset and recover without waiting. if the process has not been evicted before doing recover, it will be restored, then caused page fault.
[]
null
4.7
null
null
null
CVE-2016-7099
The tls.checkServerIdentity function in Node.js 0.10.x before 0.10.47, 0.12.x before 0.12.16, 4.x before 4.6.0, and 6.x before 6.7.0 does not properly handle wildcards in name fields of X.509 certificates, which allows man-in-the-middle attackers to spoof servers via a crafted certificate.
[ "cpe:2.3:a:nodejs:node.js:0.10.0:*:*:*:*:*:*:*", "cpe:2.3:a:nodejs:node.js:0.10.1:*:*:*:*:*:*:*", "cpe:2.3:a:nodejs:node.js:0.10.2:*:*:*:*:*:*:*", "cpe:2.3:a:nodejs:node.js:0.10.3:*:*:*:*:*:*:*", "cpe:2.3:a:nodejs:node.js:0.10.4:*:*:*:*:*:*:*", "cpe:2.3:a:nodejs:node.js:0.10.5:*:*:*:*:*:*:*", "cpe:2.3:a:nodejs:node.js:0.10.6:*:*:*:*:*:*:*", "cpe:2.3:a:nodejs:node.js:0.10.7:*:*:*:*:*:*:*", "cpe:2.3:a:nodejs:node.js:0.10.8:*:*:*:*:*:*:*", "cpe:2.3:a:nodejs:node.js:0.10.9:*:*:*:*:*:*:*", "cpe:2.3:a:nodejs:node.js:0.10.10:*:*:*:*:*:*:*", "cpe:2.3:a:nodejs:node.js:0.10.11:*:*:*:*:*:*:*", "cpe:2.3:a:nodejs:node.js:0.10.12:*:*:*:*:*:*:*", "cpe:2.3:a:nodejs:node.js:0.10.13:*:*:*:*:*:*:*", "cpe:2.3:a:nodejs:node.js:0.10.14:*:*:*:*:*:*:*", "cpe:2.3:a:nodejs:node.js:0.10.15:*:*:*:*:*:*:*", "cpe:2.3:a:nodejs:node.js:0.10.16:*:*:*:*:*:*:*", "cpe:2.3:a:nodejs:node.js:0.10.16-isaacs-manual:*:*:*:*:*:*:*", "cpe:2.3:a:nodejs:node.js:0.10.17:*:*:*:*:*:*:*", "cpe:2.3:a:nodejs:node.js:0.10.18:*:*:*:*:*:*:*", "cpe:2.3:a:nodejs:node.js:0.10.19:*:*:*:*:*:*:*", "cpe:2.3:a:nodejs:node.js:0.10.20:*:*:*:*:*:*:*", "cpe:2.3:a:nodejs:node.js:0.10.21:*:*:*:*:*:*:*", "cpe:2.3:a:nodejs:node.js:0.10.22:*:*:*:*:*:*:*", "cpe:2.3:a:nodejs:node.js:0.10.23:*:*:*:*:*:*:*", "cpe:2.3:a:nodejs:node.js:0.10.24:*:*:*:*:*:*:*", "cpe:2.3:a:nodejs:node.js:0.10.25:*:*:*:*:*:*:*", "cpe:2.3:a:nodejs:node.js:0.10.26:*:*:*:*:*:*:*", "cpe:2.3:a:nodejs:node.js:0.10.27:*:*:*:*:*:*:*", "cpe:2.3:a:nodejs:node.js:0.10.28:*:*:*:*:*:*:*", "cpe:2.3:a:nodejs:node.js:0.10.29:*:*:*:*:*:*:*", "cpe:2.3:a:nodejs:node.js:0.10.30:*:*:*:*:*:*:*", "cpe:2.3:a:nodejs:node.js:0.10.31:*:*:*:*:*:*:*", "cpe:2.3:a:nodejs:node.js:0.10.32:*:*:*:*:*:*:*", "cpe:2.3:a:nodejs:node.js:0.10.33:*:*:*:*:*:*:*", "cpe:2.3:a:nodejs:node.js:0.10.34:*:*:*:*:*:*:*", "cpe:2.3:a:nodejs:node.js:0.10.35:*:*:*:*:*:*:*", "cpe:2.3:a:nodejs:node.js:0.10.36:*:*:*:*:*:*:*", "cpe:2.3:a:nodejs:node.js:0.10.37:*:*:*:*:*:*:*", "cpe:2.3:a:nodejs:node.js:0.10.38:*:*:*:*:*:*:*", "cpe:2.3:a:nodejs:node.js:0.10.39:*:*:*:*:*:*:*", "cpe:2.3:a:nodejs:node.js:0.10.40:*:*:*:*:*:*:*", "cpe:2.3:a:nodejs:node.js:0.10.41:*:*:*:*:*:*:*", "cpe:2.3:a:nodejs:node.js:0.10.42:*:*:*:*:*:*:*", "cpe:2.3:a:nodejs:node.js:0.10.43:*:*:*:*:*:*:*", "cpe:2.3:a:nodejs:node.js:0.10.44:*:*:*:*:*:*:*", "cpe:2.3:a:nodejs:node.js:0.10.45:*:*:*:*:*:*:*", "cpe:2.3:a:nodejs:node.js:0.10.46:*:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*", "cpe:2.3:a:nodejs:node.js:6.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:nodejs:node.js:6.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:nodejs:node.js:6.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:nodejs:node.js:6.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:nodejs:node.js:6.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:nodejs:node.js:6.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:nodejs:node.js:6.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:nodejs:node.js:6.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:nodejs:node.js:6.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:nodejs:node.js:6.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:nodejs:node.js:0.12.0:*:*:*:*:*:*:*", "cpe:2.3:a:nodejs:node.js:0.12.1:*:*:*:*:*:*:*", "cpe:2.3:a:nodejs:node.js:0.12.2:*:*:*:*:*:*:*", "cpe:2.3:a:nodejs:node.js:0.12.3:*:*:*:*:*:*:*", "cpe:2.3:a:nodejs:node.js:0.12.4:*:*:*:*:*:*:*", "cpe:2.3:a:nodejs:node.js:0.12.5:*:*:*:*:*:*:*", "cpe:2.3:a:nodejs:node.js:0.12.6:*:*:*:*:*:*:*", "cpe:2.3:a:nodejs:node.js:0.12.7:*:*:*:*:*:*:*", "cpe:2.3:a:nodejs:node.js:0.12.8:*:*:*:*:*:*:*", "cpe:2.3:a:nodejs:node.js:0.12.9:*:*:*:*:*:*:*", "cpe:2.3:a:nodejs:node.js:0.12.10:*:*:*:*:*:*:*", "cpe:2.3:a:nodejs:node.js:0.12.11:*:*:*:*:*:*:*", "cpe:2.3:a:nodejs:node.js:0.12.12:*:*:*:*:*:*:*", "cpe:2.3:a:nodejs:node.js:0.12.13:*:*:*:*:*:*:*", "cpe:2.3:a:nodejs:node.js:0.12.14:*:*:*:*:*:*:*", "cpe:2.3:a:nodejs:node.js:0.12.15:*:*:*:*:*:*:*", "cpe:2.3:a:nodejs:node.js:4.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:nodejs:node.js:4.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:nodejs:node.js:4.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:nodejs:node.js:4.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:nodejs:node.js:4.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:nodejs:node.js:4.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:nodejs:node.js:4.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:nodejs:node.js:4.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:nodejs:node.js:4.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:nodejs:node.js:4.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:nodejs:node.js:4.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:nodejs:node.js:4.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:nodejs:node.js:4.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:nodejs:node.js:4.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:nodejs:node.js:4.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:nodejs:node.js:4.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:nodejs:node.js:4.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:nodejs:node.js:4.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:nodejs:node.js:4.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:nodejs:node.js:4.4.5:*:*:*:*:*:*:*", "cpe:2.3:a:nodejs:node.js:4.4.6:*:*:*:*:*:*:*", "cpe:2.3:a:nodejs:node.js:4.4.7:*:*:*:*:*:*:*", "cpe:2.3:a:nodejs:node.js:4.5.0:*:*:*:*:*:*:*" ]
null
null
5.9
4.3
null
GHSA-vp7q-rg64-pxr9
Windows Common Log File System Driver Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35803.
[]
null
7.8
null
null
null
GHSA-2r6x-xmcw-65m8
In the Linux kernel, the following vulnerability has been resolved:f2fs: fix to do sanity check on direct node in truncate_dnode()syzbot reports below bug:BUG: KASAN: slab-use-after-free in f2fs_truncate_data_blocks_range+0x122a/0x14c0 fs/f2fs/file.c:574 Read of size 4 at addr ffff88802a25c000 by task syz-executor148/5000CPU: 1 PID: 5000 Comm: syz-executor148 Not tainted 6.4.0-rc7-syzkaller-00041-ge660abd551f1 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 Call Trace: <TASK> __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xd9/0x150 lib/dump_stack.c:106 print_address_description.constprop.0+0x2c/0x3c0 mm/kasan/report.c:351 print_report mm/kasan/report.c:462 [inline] kasan_report+0x11c/0x130 mm/kasan/report.c:572 f2fs_truncate_data_blocks_range+0x122a/0x14c0 fs/f2fs/file.c:574 truncate_dnode+0x229/0x2e0 fs/f2fs/node.c:944 f2fs_truncate_inode_blocks+0x64b/0xde0 fs/f2fs/node.c:1154 f2fs_do_truncate_blocks+0x4ac/0xf30 fs/f2fs/file.c:721 f2fs_truncate_blocks+0x7b/0x300 fs/f2fs/file.c:749 f2fs_truncate.part.0+0x4a5/0x630 fs/f2fs/file.c:799 f2fs_truncate include/linux/fs.h:825 [inline] f2fs_setattr+0x1738/0x2090 fs/f2fs/file.c:1006 notify_change+0xb2c/0x1180 fs/attr.c:483 do_truncate+0x143/0x200 fs/open.c:66 handle_truncate fs/namei.c:3295 [inline] do_open fs/namei.c:3640 [inline] path_openat+0x2083/0x2750 fs/namei.c:3791 do_filp_open+0x1ba/0x410 fs/namei.c:3818 do_sys_openat2+0x16d/0x4c0 fs/open.c:1356 do_sys_open fs/open.c:1372 [inline] __do_sys_creat fs/open.c:1448 [inline] __se_sys_creat fs/open.c:1442 [inline] __x64_sys_creat+0xcd/0x120 fs/open.c:1442 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x39/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x63/0xcdThe root cause is, inodeA references inodeB via inodeB's ino, once inodeA is truncated, it calls truncate_dnode() to truncate data blocks in inodeB's node page, it traverse mapping data from node->i.i_addr[0] to node->i.i_addr[ADDRS_PER_BLOCK() - 1], result in out-of-boundary access.This patch fixes to add sanity check on dnode page in truncate_dnode(), so that, it can help to avoid triggering such issue, and once it encounters such issue, it will record newly introduced ERROR_INVALID_NODE_REFERENCE error into superblock, later fsck can detect such issue and try repairing.Also, it removes f2fs_truncate_data_blocks() for cleanup due to the function has only one caller, and uses f2fs_truncate_data_blocks_range() instead.
[]
null
null
null
null
null
CVE-2025-5903
TOTOLINK T10 POST Request cstecgi.cgi setWiFiAclRules buffer overflow
A vulnerability was found in TOTOLINK T10 4.1.8cu.5207. It has been classified as critical. Affected is the function setWiFiAclRules of the file /cgi-bin/cstecgi.cgi of the component POST Request Handler. The manipulation of the argument desc leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
[]
8.7
8.8
8.8
9
null
GHSA-prq7-8x29-rfm8
A vulnerability classified as critical was found in corincerami curiosity. Affected by this vulnerability is an unknown functionality of the file app/controllers/image_controller.rb. The manipulation of the argument sol leads to sql injection. The name of the patch is d64fddd74ca72714e73f4efe24259ca05c8190eb. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-217639.
[]
null
9.8
null
null
null
GHSA-f48x-7rw5-v6gv
An issue was discovered in YzmCMS V5.8. There is a CSRF vulnerability that can add member user accounts via member/member/add.html.
[]
null
null
null
null
null
CVE-2023-42657
WS_FTP Server Directory Traversal
In WS_FTP Server versions prior to 8.7.4 and 8.8.2, a directory traversal vulnerability was discovered.  An attacker could leverage this vulnerability to perform file operations (delete, rename, rmdir, mkdir) on files and folders outside of their authorized WS_FTP folder path.  Attackers could also escape the context of the WS_FTP Server file structure and perform the same level of operations (delete, rename, rmdir, mkdir) on file and folder locations on the underlying operating system.
[ "cpe:2.3:a:progress:ws_ftp_server:*:*:*:*:*:*:*:*" ]
null
9.9
null
null
null
GHSA-68x4-crpm-89qf
An elevation of privilege vulnerability in the Qualcomm sound driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-31253255. References: QC-CR#1072166.
[]
null
null
7
null
null
CVE-2020-0067
In f2fs_xattr_generic_list of xattr.c, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not required for exploitation.Product: Android. Versions: Android kernel. Android ID: A-120551147.
[ "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*" ]
null
4.4
null
2.1
null
CVE-2022-0660
Generation of Error Message Containing Sensitive Information in microweber/microweber
Generation of Error Message Containing Sensitive Information in Packagist microweber/microweber prior to 1.2.11.
[ "cpe:2.3:a:microweber:microweber:*:*:*:*:*:*:*:*" ]
null
null
9.4
null
null
GHSA-97m2-g29m-rv4q
A Remote Arbitrary Code Execution vulnerability in HPE Intelligent Management Center (IMC) PLAT version 7.2 E0403P06 was found.
[]
null
null
8.8
null
null
GHSA-559q-jfjp-2w9j
The xp_enumresultset function in SQL Server and Microsoft SQL Server Desktop Engine (MSDE) does not properly restrict the length of a buffer before calling the srv_paraminfo function in the SQL Server API for Extended Stored Procedures (XP), which allows an attacker to cause a denial of service or execute arbitrary commands, aka the "Extended Stored Procedure Parameter Parsing" vulnerability.
[]
null
null
null
null
null
CVE-2015-5223
OpenStack Object Storage (Swift) before 2.4.0 allows attackers to obtain sensitive information via a PUT tempurl and a DLO object manifest that references an object in another container.
[ "cpe:2.3:a:openstack:swift:*:*:*:*:*:*:*:*" ]
null
null
null
5
null
GHSA-5gxv-52gp-vmhp
Type confusion in V8 in Google Chrome prior to 112.0.5615.121 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
[]
null
8.8
null
null
null
GHSA-g8c4-9gqr-q3cf
In Advantech WebAccess versions V8.2_20170817 and prior, WebAccess versions V8.3.0 and prior, WebAccess Dashboard versions V.2.0.15 and prior, WebAccess Scada Node versions prior to 8.3.1, and WebAccess/NMS 2.0.3 and prior, an external control of file name or path vulnerability has been identified, which may allow an attacker to delete files.
[]
null
null
7.5
null
null
CVE-2021-46979
iio: core: fix ioctl handlers removal
In the Linux kernel, the following vulnerability has been resolved: iio: core: fix ioctl handlers removal Currently ioctl handlers are removed twice. For the first time during iio_device_unregister() then later on inside iio_device_unregister_eventset() and iio_buffers_free_sysfs_and_mask(). Double free leads to kernel panic. Fix this by not touching ioctl handlers list directly but rather letting code responsible for registration call the matching cleanup routine itself.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*" ]
null
5.5
null
null
null
CVE-2016-0535
Unspecified vulnerability in Oracle Sun Solaris 10 and 11 allows remote attackers to affect availability via vectors related to RPC.
[ "cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*", "cpe:2.3:o:oracle:solaris:11:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
GHSA-46v6-hq2c-4h25
A vulnerability has been found in Tenda 4G300 1.01.42 and classified as critical. Affected by this vulnerability is the function sub_41E858. The manipulation of the argument GO/page leads to stack-based buffer overflow. The attack can be launched remotely. The identifier VDB-261985 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
[]
null
8.8
null
null
null
CVE-2021-22231
A denial of service in user's profile page is found starting with GitLab CE/EE 8.0 that allows attacker to reject access to their profile page via using a specially crafted username.
[ "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*" ]
null
3.5
null
null
null
GHSA-7wf8-gwxc-fc4v
Buffer overflow in Adobe Reader and Acrobat before 10.1.8 and 11.x before 11.0.04 on Windows and Mac OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2013-3353.
[]
null
null
null
null
null
GHSA-w3fh-pxv3-4cx4
include/iniset.php in Roundcube Webmail 0.5.4 and earlier, when PHP 5.3.7 or 5.3.8 is used, allows remote attackers to trigger a GET request for an arbitrary URL, and cause a denial of service (resource consumption and inbox outage), via a Subject header containing only a URL, a related issue to CVE-2011-3379.
[]
null
null
null
null
null
GHSA-3j5x-8vq5-wc5h
Hitachi Vantara Pentaho Business Analytics Server versions before 9.3.0.0, 9.2.0.2 and 8.3.0.25 with the Data Lineage feature enabled transmits database passwords in clear text. The transmission of sensitive data in clear text allows unauthorized actors with access to the network to sniff and obtain sensitive information that can be later used to gain unauthorized access.
[]
null
7.5
null
null
null
GHSA-m8p9-q9xx-54j2
TRENDnet TEW-657BRM 1.00.1 has an authenticated remote OS command injection vulnerability in the setup.cgi binary, exploitable via the HTTP parameters "command", "todo", and "next_file," which allows an attacker to execute arbitrary commands with root privileges.
[]
null
8
null
null
null
GHSA-7864-h326-5m8j
In sdp_copy_raw_data of sdp_discovery.cc, there is a possible system compromise due to a double free. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-174052148
[]
null
null
null
null
null
CVE-2019-5998
Buffer overflow in PTP (Picture Transfer Protocol) of EOS series digital cameras (EOS-1D X firmware version 2.1.0 and earlier, EOS-1D X MKII firmware version 1.1.6 and earlier, EOS-1D C firmware version 1.4.1 and earlier, EOS 5D MARK III firmware version 1.3.5 and earlier, EOS 5D MARK IV firmware version 1.2.0 and earlier, EOS 5DS firmware version 1.1.2 and earlier, EOS 5DS R firmware version 1.1.2 and earlier, EOS 6D firmware version 1.1.8 and earlier, EOS 6D MARK II firmware version 1.0.4 and earlier, EOS 7D MARK II firmware version 1.1.2 and earlier, EOS 70 D firmware version 1.1.2 and earlier, EOS 80 D firmware version 1.0.2 and earlier, EOS KISS X7I / EOS D REBEL T5I / EOS 700D firmware version 1.1.5 and earlier, EOS KISS X8I / EOS D REBEL T6I / EOS 750D firmware version 1.0.0 and earlier, EOS KISS X9I / EOS D REBEL T7I / EOS 800D firmware version 1.0.1 and earlier, EOS KISS X7 / EOS D REBEL SL1 / EOS 100D firmware version 1.0.1 and earlier, EOS KISS X9 / EOS D REBEL SL2 / EOS 200D firmware version 1.0.1 and earlier, EOS KISS X10 / EOS D REBEL SL3 / EOS 200D / EOS 250D firmware version 1.0.1 and earlier, EOS 8000D / EOS D REBEL T6S / EOS 760D firmware version 1.0.0 and earlier, EOS 9000D / EOS 77D firmware version 1.0.2 and earlier, EOS KISS X70 / EOS D REBEL T5 / EOS 1200D firmware version 1.0.2 and earlier, EOS D REBEL T5 RE / EOS 1200D MG / EOS HI firmware version 1.0.2 and earlier, EOS KISS X80 / EOS D REBEL T6 / EOS 1300D firmware version 1.1.0 and earlier, EOS KISS X90 / EOS D REBEL T7 / EOS 1500D / EOS 2000D firmware version 1.0.0 and earlier, EOS D REBEL T100 / EOS 3000D / EOS 4000D firmware version 1.0.0 and earlier, EOS R firmware version 1.3.0 and earlier, EOS RP firmware version 1.2.0 and earlier, EOS RP GOLD firmware version 1.2.0 and earlier, EOS M2 firmware version 1.0.3 and earlier, EOS M3 firmware version 1.2.0 and earlier, EOS M5 firmware version 1.0.1 and earlier, EOS M6 firmware version 1.0.1 and earlier, EOS M6(China) firmware version 5.0.0 and earlier, EOS M10 firmware version 1.1.0 and earlier, EOS M100 firmware version 1.0.0 and earlier, EOS KISS M / EOS M50 firmware version 1.0.2 and earlier) and PowerShot SX740 HS firmware version 1.0.1 and earlier, PowerShot SX70 HS firmware version 1.1.0 and earlier, and PowerShot G5Xmark II firmware version 1.0.1 and earlier allows an attacker on the same network segment to trigger the affected product being unresponsive or to execute arbitrary code on the affected product via notifybtstatus command.
[ "cpe:2.3:o:canon:eos-1d_x_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:canon:eos-1d_x:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:eos-1d_x_mkii_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:canon:eos-1d_x_mkii:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:eos-1d_c_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:canon:eos-1d_c:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:eos_5d_mark_iii_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:canon:eos_5d_mark_iii:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:eos_5d_mark_iv_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:canon:eos_5d_mark_iv:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:eos_5ds_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:canon:eos_5ds:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:eos_5ds_r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:canon:eos_5ds_r:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:eos_6d_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:canon:eos_6d:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:eos_7d_mark_ii_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:canon:eos_7d_mark_ii:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:eos_70d_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:canon:eos_70d:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:eos_80d_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:canon:eos_80d:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:eos_kiss_x7i_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:canon:eos_kiss_x7i:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:eos_d_rebel_t5i_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:canon:eos_d_rebel_t5i:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:eos_700d_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:canon:eos_700d:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:eos_kiss_x8i_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:canon:eos_kiss_x8i:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:eos_d_rebel_t6i_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:canon:eos_d_rebel_t6i:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:eos_750d_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:canon:eos_750d:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:eos_kiss_x9i_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:canon:eos_kiss_x9i:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:eos_d_rebel_t7i_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:canon:eos_d_rebel_t7i:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:eos_800d_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:canon:eos_800d:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:eos_kiss_x7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:canon:eos_kiss_x7:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:eos_d_rebel_sl1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:canon:eos_d_rebel_sl1:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:eos_100d_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:canon:eos_100d:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:eos_kiss_x9_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:canon:eos_kiss_x9:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:eos_d_rebel_sl2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:canon:eos_d_rebel_sl2:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:eos_200d_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:canon:eos_200d:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:eos_kiss_x10_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:canon:eos_kiss_x10:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:eos_d_rebel_sl3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:canon:eos_d_rebel_sl3:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:eos_250d_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:canon:eos_250d:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:eos_8000d_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:canon:eos_8000d:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:eos_d_rebel_t6s_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:canon:eos_d_rebel_t6s:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:eos_760d_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:canon:eos_760d:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:eos_9000d_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:canon:eos_9000d:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:eos_77d_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:canon:eos_77d:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:eos_kiss_x70_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:canon:eos_kiss_x70:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:eos_d_rebel_t5_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:canon:eos_d_rebel_t5:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:eos_1200d_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:canon:eos_1200d:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:eos_d_rebel_t5_re_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:canon:eos_d_rebel_t5_re:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:eos_1200d_mg_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:canon:eos_1200d_mg:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:eos_hi_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:canon:eos_hi:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:eos_kiss_x80_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:canon:eos_kiss_x80:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:eos_d_rebel_t6_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:canon:eos_d_rebel_t6:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:eos_1300d_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:canon:eos_1300d:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:eos_kiss_x90_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:canon:eos_kiss_x90:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:eos_d_rebel_t7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:canon:eos_d_rebel_t7:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:eos_1500d_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:canon:eos_1500d:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:eos_2000d_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:canon:eos_2000d:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:eos_d_rebel_t100_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:canon:eos_d_rebel_t100:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:eos_3000d_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:canon:eos_3000d:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:eos_4000d_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:canon:eos_4000d:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:eos_r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:canon:eos_r:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:eos_rp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:canon:eos_rp:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:eos_rp_gold_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:canon:eos_rp_gold:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:eos_m2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:canon:eos_m2:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:eos_m3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:canon:eos_m3:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:eos_m5_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:canon:eos_m5:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:eos_m6_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:canon:eos_m6:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:eos_m6\\(china\\)_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:canon:eos_m6\\(china\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:eos_m10_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:canon:eos_m10:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:eos_m100_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:canon:eos_m100:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:eos_kiss_m_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:canon:eos_kiss_m:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:eos_m50_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:canon:eos_m50:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:powershot_sx740_hs_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:canon:powershot_sx740_hs:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:powershot_sx70_hs_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:canon:powershot_sx70_hs:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:powershot_g5xmark_ii_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:canon:powershot_g5xmark_ii:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:eos_6d_mark_ii_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:canon:eos_6d_mark_ii:-:*:*:*:*:*:*:*" ]
null
null
8.8
8.3
null
CVE-2021-25766
In JetBrains YouTrack before 2020.4.4701, improper resource access checks were made.
[ "cpe:2.3:a:jetbrains:youtrack:*:*:*:*:*:*:*:*" ]
null
5.3
null
5
null
GHSA-47gg-69h8-fx9p
An Improper Certificate Validation vulnerability [CWE-295] in FortiOS version 7.6.1 and below, version 7.4.7 and below may allow an EAP verified remote user to connect from FortiClient via revoked certificate.
[]
null
6.5
null
null
null
CVE-2006-0998
The SSL server implementation in NILE.NLM in Novell NetWare 6.5 and Novell Open Enterprise Server (OES) sometimes selects a weak cipher instead of an available stronger cipher, which makes it easier for remote attackers to sniff and decrypt an SSL protected session.
[ "cpe:2.3:o:novell:open_enterprise_server:*:*:*:*:*:*:*:*", "cpe:2.3:o:novell:netware:6.5:*:*:*:*:*:*:*", "cpe:2.3:o:novell:netware:6.5:sp1:*:*:*:*:*:*", "cpe:2.3:o:novell:netware:6.5:sp1.1a:*:*:*:*:*:*", "cpe:2.3:o:novell:netware:6.5:sp1.1b:*:*:*:*:*:*", "cpe:2.3:o:novell:netware:6.5:sp2:*:*:*:*:*:*", "cpe:2.3:o:novell:netware:6.5:sp3:*:*:*:*:*:*", "cpe:2.3:o:novell:netware:6.5:sp4:*:*:*:*:*:*" ]
null
null
null
5
null
GHSA-h95j-w8vr-v949
A regression error in the Perl package for Red Hat Enterprise Linux 4 omits the patch for CVE-2005-0155, which allows local users to overwrite arbitrary files with debugging information.
[]
null
null
null
null
null
GHSA-h2f9-j85c-642x
An arbitrary File download vulnerability exists in Novel-Plus v4.3.0-RC1 and prior at com.java2nb.common.controller.FileController: fileDownload(). An attacker can pass in specially crafted filePath and fieName parameters to perform arbitrary File download.
[]
null
9.8
null
null
null
GHSA-h2jh-xp68-gwgf
Red Hat JBoss EAP version 5 is vulnerable to a deserialization of untrusted data in the JMX endpoint when deserializes the credentials passed to it. An attacker could exploit this vulnerability resulting in a denial of service attack.
[]
null
null
5.3
null
null
CVE-2019-15001
The Jira Importers Plugin in Atlassian Jira Server and Data Cente from version with 7.0.10 before 7.6.16, from 7.7.0 before 7.13.8, from 8.0.0 before 8.1.3, from 8.2.0 before 8.2.5, from 8.3.0 before 8.3.4 and from 8.4.0 before 8.4.1 allows remote attackers with Administrator permissions to gain remote code execution via a template injection vulnerability through the use of a crafted PUT request.
[ "cpe:2.3:a:atlassian:jira_server:*:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:jira_server:8.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:jira_data_center:*:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:jira_data_center:8.4.0:*:*:*:*:*:*:*" ]
null
7.2
null
9
null
CVE-2021-24073
Skype for Business and Lync Spoofing Vulnerability
Skype for Business and Lync Spoofing Vulnerability
[ "cpe:2.3:a:microsoft:lync_server:2013:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:skype_for_business_server:2015:cu8:*:*:*:*:*:*" ]
null
6.5
null
null
null
CVE-2018-9590
In add_attr of sdp_discovery.c in Android-7.0, Android-7.1.1, Android-7.1.2, Android-8.0, Android-8.1 and Android-9, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Android ID: A-115900043.
[ "cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*" ]
null
null
7.5
5
null
CVE-2021-41185
Download file outside intended directory
Mycodo is an environmental monitoring and regulation system. An exploit in versions prior to 8.12.7 allows anyone with access to endpoints to download files outside the intended directory. A patch has been applied and a release made. Users should upgrade to version 8.12.7. As a workaround, users may manually apply the changes from the fix commit.
[ "cpe:2.3:a:mycodo_project:mycodo:*:*:*:*:*:*:*:*" ]
null
8.8
null
null
null
GHSA-8vrf-cvxp-7364
HTMLCOIN through 2.12 (a chain-based proof-of-stake cryptocurrency) allows a remote denial of service. The attacker sends invalid headers/blocks. The attack requires no stake and can fill the victim's disk and RAM.
[]
null
7.5
null
null
null
CVE-2019-1990
In ihevcd_fmt_conv_420sp_to_420p of ihevcd_fmt_conv.c, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-7.0 Android-7.1.1 Android-7.1.2 Android-8.0 Android-8.1 Android-9Android ID: A-118453553
[ "cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*" ]
null
null
8.8
9.3
null
CVE-2024-30473
Dell ECS, versions prior to 3.8.1, contain a privilege elevation vulnerability in user management. A remote high privileged attacker could potentially exploit this vulnerability, gaining access to unauthorized end points.
[]
null
4.9
null
null
null
GHSA-pv77-wcvm-2654
Vulnerability in the Oracle Installed Base product of Oracle E-Business Suite (component: APIs). Supported versions that are affected are 12.1.1-12.1.3 and 12.2.3-12.2.9. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Installed Base. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Installed Base, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Installed Base accessible data. CVSS 3.1 Base Score 4.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N).
[]
null
null
null
null
null
RHSA-2019:2004
Red Hat Security Advisory: icedtea-web security update
icedtea-web: unsigned code injection in a signed JAR file icedtea-web: path traversal while processing <jar/> elements of JNLP files results in arbitrary file overwrite icedtea-web: directory traversal in the nested jar auto-extraction leading to arbitrary file overwrite
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
null
8.2
null
null
GHSA-j3r3-5gjp-qv35
The URL handler in the manual browser option for Gaim before 0.59.1 allows remote attackers to execute arbitrary script via shell metacharacters in a link.
[]
null
null
null
null
null
CVE-2004-1349
gzip before 1.3 in Solaris 8, when called with the -f or -force flags, will change the permissions of files that are hard linked to the target files, which allows local users to view or modify these files.
[ "cpe:2.3:a:gnu:gzip:*:*:*:*:*:*:*:*", "cpe:2.3:o:oracle:solaris:8:*:*:*:*:*:*:*" ]
null
null
null
2.1
null
GHSA-mp76-7w5v-pr75
TurboBoost Commands vulnerable to arbitrary method invocation
ImpactTurboBoost Commands has existing protections in place to guarantee that only public methods on Command classes can be invoked; however, the existing checks aren't as robust as they should be. It's possible for a sophisticated attacker to invoke more methods than should be permitted depending on the the strictness of authorization checks that individual applications enforce. Being able to call some of these methods can have security implications.DetailsCommands verify that the class must be a `Command` and that the method requested is defined as a public method; however, this isn't robust enough to guard against all unwanted code execution. The library should more strictly enforce which methods are considered safe before allowing them to be executed.PatchesPatched in the following versions.0.1.3[NPM Package](https://www.npmjs.com/package/@turbo-boost/commands/v/0.1.3)[Ruby GEM](https://rubygems.org/gems/turbo_boost-commands/versions/0.1.3)0.2.2[NPM Package](https://www.npmjs.com/package/@turbo-boost/commands/v/0.2.2)[Ruby GEM](https://rubygems.org/gems/turbo_boost-commands/versions/0.2.2)WorkaroundsYou can add this guard to mitigate the issue if running an unpatched version of the library.
[]
null
8.1
null
null
null
GHSA-fh9c-m4hq-c8c4
Cross-site request forgery (CSRF) vulnerability in Special:CreateCategory in the SemanticForms extension for MediaWiki before 1.19.10, 1.2x before 1.21.4, and 1.22.x before 1.22.1 allows remote attackers to hijack the authentication of users for requests that create categories via unspecified vectors.
[]
null
null
null
null
null
GHSA-m945-cp8g-j6x8
XML external entity (XXE) vulnerability in QlikTech Qlikview before 11.20 SR12 allows remote attackers to conduct server-side request forgery (SSRF) attacks and read arbitrary files via crafted XML data in a request to AccessPoint.aspx.
[]
null
null
null
null
null
RHSA-2025:9126
Red Hat Security Advisory: libvpx security update
libvpx: Double-free in libvpx encoder
[ "cpe:/a:redhat:rhel_aus:8.6::appstream", "cpe:/a:redhat:rhel_e4s:8.6::appstream", "cpe:/a:redhat:rhel_tus:8.6::appstream" ]
null
8.1
null
null
null
CVE-2025-49690
Capability Access Management Service (camsvc) Elevation of Privilege Vulnerability
Concurrent execution using shared resource with improper synchronization ('race condition') in Capability Access Management Service (camsvc) allows an unauthorized attacker to elevate privileges locally.
[]
null
7.4
null
null
null
GHSA-jmcc-mpgx-5c8c
In the Linux kernel, the following vulnerability has been resolved:bus: fsl-mc: don't assume child devices are all fsl-mc devicesChanges in VFIO caused a pseudo-device to be created as child of fsl-mc devices causing a crash [1] when trying to bind a fsl-mc device to VFIO. Fix this by checking the device type when enumerating fsl-mc child devices.[1] Modules linked in: Internal error: Oops: 0000000096000004 [#1] PREEMPT SMP CPU: 6 PID: 1289 Comm: sh Not tainted 6.2.0-rc5-00047-g7c46948a6e9c #2 Hardware name: NXP Layerscape LX2160ARDB (DT) pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : mc_send_command+0x24/0x1f0 lr : dprc_get_obj_region+0xfc/0x1c0 sp : ffff80000a88b900 x29: ffff80000a88b900 x28: ffff48a9429e1400 x27: 00000000000002b2 x26: ffff48a9429e1718 x25: 0000000000000000 x24: 0000000000000000 x23: ffffd59331ba3918 x22: ffffd59331ba3000 x21: 0000000000000000 x20: ffff80000a88b9b8 x19: 0000000000000000 x18: 0000000000000001 x17: 7270642f636d2d6c x16: 73662e3030303030 x15: ffffffffffffffff x14: ffffd59330f1d668 x13: ffff48a8727dc389 x12: ffff48a8727dc386 x11: 0000000000000002 x10: 00008ceaf02f35d4 x9 : 0000000000000012 x8 : 0000000000000000 x7 : 0000000000000006 x6 : ffff80000a88bab0 x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffff80000a88b9e8 x2 : ffff80000a88b9e8 x1 : 0000000000000000 x0 : ffff48a945142b80 Call trace: mc_send_command+0x24/0x1f0 dprc_get_obj_region+0xfc/0x1c0 fsl_mc_device_add+0x340/0x590 fsl_mc_obj_device_add+0xd0/0xf8 dprc_scan_objects+0x1c4/0x340 dprc_scan_container+0x38/0x60 vfio_fsl_mc_probe+0x9c/0xf8 fsl_mc_driver_probe+0x24/0x70 really_probe+0xbc/0x2a8 __driver_probe_device+0x78/0xe0 device_driver_attach+0x30/0x68 bind_store+0xa8/0x130 drv_attr_store+0x24/0x38 sysfs_kf_write+0x44/0x60 kernfs_fop_write_iter+0x128/0x1b8 vfs_write+0x334/0x448 ksys_write+0x68/0xf0 __arm64_sys_write+0x1c/0x28 invoke_syscall+0x44/0x108 el0_svc_common.constprop.1+0x94/0xf8 do_el0_svc+0x38/0xb0 el0_svc+0x20/0x50 el0t_64_sync_handler+0x98/0xc0 el0t_64_sync+0x174/0x178 Code: aa0103f4 a9025bf5 d5384100 b9400801 (79401260) ---[ end trace 0000000000000000 ]---
[]
null
5.5
null
null
null
GHSA-vwjx-mmwm-pwrf
Lucee RCE/XXE Vulnerability
ImpactThe Lucee team received a responsible disclosure of a security vulnerability which affects all previous releases of Lucee.After reviewing the report and confirming the vulnerability, the Lucee team then conducted a further security review and found additional vulnerabilities which have been addressed as part of this this security update.PatchesLucee 5.4.3.2 and 5.3.12.1 stable releases have been patched with additional hardeningThe older releases, 5.3.7.59., 5.3.8.236 and 5.3.9.173 have also been patchedAny users running older release, should plan to immediately upgrade to the latest stable release6.0 will have a RC as it's not yet released
[]
null
10
null
null
null
GHSA-gcqv-qxrf-w8gq
The Admin CP in vBulletin 5.6.3 allows XSS via an admincp/attachment.php&do=rebuild&type= URI.
[]
null
null
null
null
null
CVE-2002-2179
The dynamic initialization feature of the ClearPath MCP environment allows remote attackers to cause a denial of service (crash) via a TCP port scan using a tool such as nmap.
[ "cpe:2.3:h:unisys:clearpath_mcp:*:*:*:*:*:*:*:*" ]
null
null
null
7.8
null
cisco-sa-smb-rv-cmd-inj-8Pv9JMJD
Cisco Small Business RV Series Routers Command Injection Vulnerabilities
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV340 and RV345 Routers could allow an authenticated, remote attacker to inject and execute arbitrary commands on the underlying operating system of an affected device. These vulnerabilities are due to insufficient validation of user-supplied input. An attacker could exploit these vulnerabilities by sending malicious input to an affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying Linux operating system of the affected device. To exploit these vulnerabilities, an attacker would need to have valid Administrator credentials on the affected device. Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.
[]
null
4.7
null
null
null
CVE-2018-3302
Vulnerability in the Oracle Outside In Technology component of Oracle Fusion Middleware (subcomponent: Outside In Filters). The supported version that is affected are 8.5.3 and 8.5.4. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Outside In Technology. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Outside In Technology and unauthorized read access to a subset of Oracle Outside In Technology accessible data. Note: Outside In Technology is a suite of software development kits (SDKs). The protocol and CVSS score depend on the software that uses the Outside In Technology code. The CVSS score assumes that the software passes data received over a network directly to Outside In Technology code, but if data is not received over a network the CVSS score may be lower. CVSS 3.0 Base Score 7.1 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H).
[ "cpe:2.3:a:oracle:outside_in_technology:8.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:outside_in_technology:8.5.4:*:*:*:*:*:*:*" ]
null
null
7.1
5.8
null
GHSA-q8vp-7pjr-536g
Buffer overflow in the SSLv2 implementation in IBM Domino 8.5.x before 8.5.1 FP5 IF3, 8.5.2 before FP4 IF3, 8.5.3 before FP6 IF6, 9.0 before IF7, and 9.0.1 before FP2 IF3 allows remote attackers to execute arbitrary code via unspecified vectors.
[]
null
null
null
null
null
CVE-2025-23580
WordPress BizLibrary plugin <= 1.1 - Reflected Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Matthew Garvin BizLibrary allows Reflected XSS. This issue affects BizLibrary: from n/a through 1.1.
[]
null
7.1
null
null
null
GHSA-xwvc-pqcf-c28g
Cisco TelePresence Video Communication Server (VCS) Expressway X8.5.2 allows remote attackers to cause a denial of service via invalid variables in an authentication packet, aka Bug ID CSCuv40469.
[]
null
null
null
null
null
RHSA-2017:2029
Red Hat Security Advisory: openssh security, bug fix, and enhancement update
openssh: User enumeration via covert timing channel openssh: Denial of service via very long passwords openssh: loading of untrusted PKCS#11 modules in ssh-agent openssh: Leak of host private key material to privilege-separated child process via realloc() openssh: Bounds check can be evaded in the shared memory manager used by pre-authentication compression support openssh: Out of sequence NEWKEYS message can allow remote attacker to cause denial of service
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
5.3
null
null
CVE-2019-1000
An elevation of privilege vulnerability exists in Microsoft Azure Active Directory Connect build 1.3.20.0, which allows an attacker to execute two PowerShell cmdlets in context of a privileged account, and perform privileged actions.To exploit this, an attacker would need to authenticate to the Azure AD Connect server, aka 'Microsoft Azure AD Connect Elevation of Privilege Vulnerability'.
[ "cpe:2.3:a:microsoft:azure_active_directory_connect:-:*:*:*:*:*:*:*" ]
null
null
5.3
3.5
null
CVE-2007-3362
ageet AGEphone before 1.6.2, running on Windows Mobile 5 on the HTC HyTN Pocket PC device, allows remote attackers to (1) cause a denial of service (call disruption and device hang) via a SIP message with a malformed header and (2) cause a denial of service (call disruption, false ring indication, and device outage) via a SIP message with a malformed SDP delimiter.
[ "cpe:2.3:o:microsoft:windows_mobile:5.0:*:*:*:*:*:*:*", "cpe:2.3:h:htc:hytn:*:*:*:*:*:*:*:*", "cpe:2.3:a:ageet:agephone:*:*:*:*:*:*:*:*" ]
null
null
null
7.8
null
CVE-2024-8355
Visteon Infotainment System DeviceManager iAP Serial Number SQL Injection Vulnerability
Visteon Infotainment System DeviceManager iAP Serial Number SQL Injection Vulnerability. This vulnerability allows physically present attackers to execute arbitrary code on affected installations of Visteon Infotainment system. Authentication is not required to exploit this vulnerability. The specific flaw exists within the DeviceManager. When parsing the iAP Serial number, the process does not properly validate a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-20112.
[ "cpe:2.3:a:visteon:infotainment:74.00.311a:*:*:*:*:*:*:*", "cpe:2.3:o:visteon:infotainment_firmware:74.00.311a:*:*:*:*:*:*:*" ]
null
null
6.8
null
null
CVE-2022-21429
Vulnerability in the Oracle Communications Billing and Revenue Management product of Oracle Communications Applications (component: Billing Care). Supported versions that are affected are 12.0.0.4.0-12.0.0.6.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Communications Billing and Revenue Management. Successful attacks of this vulnerability can result in takeover of Oracle Communications Billing and Revenue Management. CVSS 3.1 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).
[ "cpe:2.3:a:oracle:communications_billing_and_revenue_management:*:*:*:*:*:*:*:*" ]
null
8.1
null
null
null
GHSA-5vxq-pj53-vwx3
A vulnerability was found in SourceCodester Advocate Office Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /control/edit_client.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
[]
5.3
6.3
null
null
null
GHSA-3fj9-c88m-7g9f
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in IndiaNIC Widgets Controller allows Reflected XSS.This issue affects Widgets Controller: from n/a through 1.1.
[]
null
7.1
null
null
null
CVE-2022-3817
Axiomatic Bento4 mp4mux memory leak
A vulnerability has been found in Axiomatic Bento4 and classified as problematic. Affected by this vulnerability is an unknown functionality of the component mp4mux. The manipulation leads to memory leak. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-212683.
[ "cpe:2.3:a:axiosys:bento4:1.6.0-639:*:*:*:*:*:*:*" ]
null
4.3
null
null
null
GHSA-39jm-hv2r-rprm
Adobe Acrobat Reader versions 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier have an exploitable heap overflow vulnerability in image conversion, related to parsing offsets in TIFF files. Successful exploitation could lead to arbitrary code execution.
[]
null
null
7.8
null
null
CVE-2024-56569
ftrace: Fix regression with module command in stack_trace_filter
In the Linux kernel, the following vulnerability has been resolved: ftrace: Fix regression with module command in stack_trace_filter When executing the following command: # echo "write*:mod:ext3" > /sys/kernel/tracing/stack_trace_filter The current mod command causes a null pointer dereference. While commit 0f17976568b3f ("ftrace: Fix regression with module command in stack_trace_filter") has addressed part of the issue, it left a corner case unhandled, which still results in a kernel crash.
[]
null
5.5
null
null
null
CVE-2021-47088
mm/damon/dbgfs: protect targets destructions with kdamond_lock
In the Linux kernel, the following vulnerability has been resolved: mm/damon/dbgfs: protect targets destructions with kdamond_lock DAMON debugfs interface iterates current monitoring targets in 'dbgfs_target_ids_read()' while holding the corresponding 'kdamond_lock'. However, it also destructs the monitoring targets in 'dbgfs_before_terminate()' without holding the lock. This can result in a use_after_free bug. This commit avoids the race by protecting the destruction with the corresponding 'kdamond_lock'.
[]
null
7
null
null
null
GHSA-6fpg-25vc-vc92
The XML Editor in Microsoft InfoPath 2007 SP2 and 2010; SQL Server 2005 SP3 and SP4 and 2008 SP1, SP2, and R2; SQL Server Management Studio Express (SSMSE) 2005; and Visual Studio 2005 SP1, 2008 SP1, and 2010 does not properly handle external entities, which allows remote attackers to read arbitrary files via a crafted .disco (Web Service Discovery) file, aka "XML External Entities Resolution Vulnerability."
[]
null
null
null
null
null
GHSA-qmx9-wr57-3mx9
Simple Customer Relationship Management System v1.0 was discovered to contain a SQL injection vulnerability via the name parameter on the registration page.
[]
null
5.4
null
null
null
CVE-2014-7445
The LEGEND OF TRANCE (aka com.legendoftrance) application 1.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[ "cpe:2.3:a:jowangel:legend_of_trance:1:*:*:*:*:android:*:*" ]
null
null
null
5.4
null
GHSA-73ch-cpx9-cfrm
Vulnerability in the Oracle Hospitality Simphony product of Oracle Food and Beverage Applications (component: EMC). Supported versions that are affected are 19.1-19.7. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Hospitality Simphony. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Hospitality Simphony accessible data as well as unauthorized update, insert or delete access to some of Oracle Hospitality Simphony accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Hospitality Simphony. CVSS 3.1 Base Score 7.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L).
[]
null
7.6
null
null
null
GHSA-vhmc-p5m8-7586
Directory traversal vulnerability in EFTP 2.0.8.346 allows local users to read directories via a ... (modified dot dot) in the CWD command.
[]
null
null
null
null
null
GHSA-6hhf-qpp9-xw74
XunRuiCMS v4.5.5 was discovered to contain a reflective cross-site scripting (XSS) vulnerability via the component /admin.php.
[]
null
6.1
null
null
null
GHSA-vmch-3qqq-rp5p
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Team Heateor Heateor Social Login allows Stored XSS.This issue affects Heateor Social Login: from n/a through 1.1.32.
[]
null
6.5
null
null
null
GHSA-9h4h-3fmc-xcrf
IdeaTMS 2022 is vulnerable to SQL Injection via the PATH_INFO
[]
null
9.8
null
null
null
CVE-2023-36528
WordPress kk Star Ratings plugin <= 5.4.3 - Rate Manipulation due to IP Spoofing Vulnerability
Missing Authorization vulnerability in FeedbackWP kk Star Ratings allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects kk Star Ratings: from n/a through 5.4.3.
[]
null
5.3
null
null
null
CVE-2018-20234
There was an argument injection vulnerability in Atlassian Sourcetree for macOS from version 1.2 before version 3.1.1 via filenames in Mercurial repositories. A remote attacker with permission to commit to a Mercurial repository linked in Sourcetree for macOS is able to exploit this issue to gain code execution on the system.
[ "cpe:2.3:a:atlassian:sourcetree:*:*:*:*:*:macos:*:*" ]
null
null
8.8
9
null
CVE-2021-26195
An issue was discovered in JerryScript 2.4.0. There is a heap-buffer-overflow in lexer_parse_number in js-lexer.c file.
[ "cpe:2.3:a:jerryscript:jerryscript:2.4.0:*:*:*:*:*:*:*" ]
null
8.8
null
6.8
null
CVE-2018-19135
ClipperCMS 1.3.3 does not have CSRF protection on its kcfinder file upload (enabled by default). This can be used by an attacker to perform actions for an admin (or any user with the file upload capability). With this vulnerability, one can automatically upload files (by default, it allows html, pdf, xml, zip, and many other file types). A file can be accessed publicly under the "/assets/files" directory.
[ "cpe:2.3:a:clippercms:clippercms:1.3.3:*:*:*:*:*:*:*" ]
null
null
8.8
6.8
null
CVE-2022-40703
CWE-302 Authentication Bypass by Assumed-Immutable Data in AliveCor Kardia App version 5.17.1-754993421 and prior on Android allows an unauthenticated attacker with physical access to the Android device containing the app to bypass application authentication and alter information in the app.
[ "cpe:2.3:a:alivecor:kardia:*:*:*:*:*:android:*:*" ]
null
5.2
null
null
null
GHSA-8cmp-jx7c-f587
A vulnerability, which was classified as critical, has been found in qinguoyi TinyWebServer up to 1.0. Affected by this issue is some unknown functionality of the file /http/http_conn.cpp. The manipulation of the argument name/password leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
[]
6.9
7.3
null
null
null
GHSA-r95r-f5pv-5rr9
Dell BIOS versions contain an Improper Authentication vulnerability. A locally authenticated malicious user could potentially exploit this vulnerability by sending malicious input to an SMI in order to bypass security controls.
[]
null
7.8
null
null
null
PYSEC-2019-103
null
KeyIdentity LinOTP before 2.10.5.3 has Incorrect Access Control (issue 1 of 2).
[]
null
null
null
null
null
GHSA-q9qr-vfrw-vgjq
In Bluetooth, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges and a compromised Firmware needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-146032016
[]
null
null
null
null
null
RHSA-2025:16122
Red Hat Security Advisory: udisks2 security update
udisks: Out-of-bounds read in UDisks Daemon
[ "cpe:/a:redhat:rhel_aus:8.2::appstream" ]
null
8.5
null
null
null
GHSA-9fg7-x9rx-2vx3
Heap-based buffer overflow in Apple Quicktime before 7.0.4 allows remote attackers to execute arbitrary code via a GIF image file with a crafted Netscape Navigator Application Extension Block that modifies the heap in the Picture Modifier block.
[]
null
null
null
null
null
CVE-2020-36174
The Ninja Forms plugin before 3.4.27.1 for WordPress allows CSRF via services integration.
[ "cpe:2.3:a:ninjaforms:ninja_forms:*:*:*:*:*:wordpress:*:*" ]
null
6.5
null
4.3
null
GHSA-mm9r-mqf2-8fj4
Exposure of private personal information to an unauthorized actor in Azure Stack allows an authorized attacker to disclose information locally.
[]
null
4.4
null
null
null