id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 38
232
⌀ |
|---|---|---|---|---|---|---|---|---|
GHSA-m3xw-wjv6-wx6x
|
A vulnerability has been identified in Opcenter Quality V13.1 (All versions < V13.1.20220624), Opcenter Quality V13.2 (All versions < V13.2.20220624). The affected applications do not properly validate login information during authentication. This could lead to denial of service condition for existing users or allow unauthenticated remote attackers to successfully login without credentials.
|
[] | null | 7.5
| null | null | null |
|
CVE-2002-1374
|
The COM_CHANGE_USER command in MySQL 3.x before 3.23.54, and 4.x before 4.0.6, allows remote attackers to gain privileges via a brute force attack using a one-character password, which causes MySQL to only compare the provided password against the first character of the real password.
|
[
"cpe:2.3:a:oracle:mysql:3.22.26:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:3.22.27:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:3.22.28:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:3.22.29:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:3.22.30:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:3.22.32:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:3.23.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:3.23.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:3.23.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:3.23.5:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:3.23.8:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:3.23.9:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:3.23.10:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:3.23.23:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:3.23.24:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:3.23.25:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:3.23.26:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:3.23.27:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:3.23.28:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:3.23.29:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:3.23.30:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:3.23.31:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:3.23.34:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:3.23.36:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:3.23.37:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:3.23.38:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:3.23.39:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:3.23.40:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:3.23.41:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:3.23.42:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:3.23.43:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:3.23.44:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:3.23.45:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:3.23.46:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:3.23.47:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:3.23.48:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:3.23.49:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:3.23.50:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:3.23.51:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:3.23.52:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:3.23.53:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:3.23.53a:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:4.0.5a:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec_veritas:netbackup_advanced_reporter:3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec_veritas:netbackup_advanced_reporter:4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec_veritas:netbackup_advanced_reporter:4.5_fp1:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec_veritas:netbackup_advanced_reporter:4.5_fp2:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec_veritas:netbackup_advanced_reporter:4.5_fp3:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec_veritas:netbackup_advanced_reporter:4.5_mp1:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec_veritas:netbackup_advanced_reporter:4.5_mp2:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec_veritas:netbackup_advanced_reporter:4.5_mp3:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec_veritas:netbackup_global_data_manager:4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec_veritas:netbackup_global_data_manager:4.5_fp1:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec_veritas:netbackup_global_data_manager:4.5_fp2:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec_veritas:netbackup_global_data_manager:4.5_fp3:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec_veritas:netbackup_global_data_manager:4.5_mp1:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec_veritas:netbackup_global_data_manager:4.5_mp2:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec_veritas:netbackup_global_data_manager:4.5_mp3:*:*:*:*:*:*:*"
] | null | null | null | 7.5
| null |
|
GHSA-rwf5-4mqx-9qx5
|
Unspecified vulnerability in Oracle MySQL Server 5.6.26 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Security : Privileges.
|
[] | null | null | null | null | null |
|
CVE-2023-1584
|
Quarkus-oidc: id and access tokens leak via the authorization code flow
|
A flaw was found in Quarkus. Quarkus OIDC can leak both ID and access tokens in the authorization code flow when an insecure HTTP protocol is used, which can allow attackers to access sensitive user data directly from the ID token or by using the access token to access user data from OIDC provider services. Please note that passwords are not stored in access tokens.
|
[
"cpe:2.3:a:quarkus:quarkus:*:*:*:*:*:*:*:*",
"cpe:/a:redhat:quarkus:2.13",
"cpe:/a:redhat:service_registry:2.5"
] | null | 7.5
| null | null | null |
CVE-2018-2677
|
Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: AWT). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L).
|
[
"cpe:2.3:a:oracle:jdk:1.6.0:update171:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update161:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.8.0:update152:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:9.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update171:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update161:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.8.0:update152:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:9.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*",
"cpe:2.3:a:schneider-electric:struxureware_data_center_expert:*:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:xp_command_view:*:*:*:*:advanced:*:*:*",
"cpe:2.3:a:hp:xp_p9000_command_view:*:*:*:*:advanced:*:*:*",
"cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*"
] | null | 4.3
| null | 4.3
| null |
|
CVE-2004-0850
|
Star before 1.5_alpha46 does not drop the effective user ID (euid) before calling external programs, which could allow local users to gain privileges by modifying the RSH environment variable to reference a malicious program.
|
[
"cpe:2.3:a:joerg_schilling:star_tape_archiver:1.5_a45:*:*:*:*:*:*:*"
] | null | null | null | 7.2
| null |
|
CVE-2014-5287
|
A Bash script injection vulnerability exists in Kemp Load Master 7.1-16 and earlier due to a failure to sanitize input in the Web User Interface (WUI).
|
[
"cpe:2.3:a:kemptechnologies:loadmaster:*:*:*:*:*:*:*:*"
] | null | 8.8
| null | 6.8
| null |
|
CVE-2023-3103
|
Authentication Bypass by Spoofing in Unitree Robotics A1
|
Authentication bypass vulnerability, the exploitation of which could allow a local attacker to perform a Man-in-the-Middle (MITM) attack on the robot's camera video stream. In addition, if a MITM attack is carried out, it is possible to consume the robot's resources, which could lead to a denial-of-service (DOS) condition.
|
[
"cpe:2.3:o:unitree:a1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unitree:a1:1.16:*:*:*:*:*:*:*"
] | null | 8
| null | null | null |
GHSA-rqj6-qq4v-5w96
|
In Weintek's cMT3000 HMI Web CGI device, an anonymous attacker can execute arbitrary commands after login to the device.
|
[] | null | 8.8
| null | null | null |
|
GHSA-32jx-cx53-vp3r
|
The Connexion Logs WordPress plugin through 3.0.2 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack
|
[] | null | 4.3
| null | null | null |
|
CVE-2017-8950
|
A Disclosure of Sensitive Information vulnerability in HPE SiteScope version v11.2x, v11.3x was found.
|
[
"cpe:2.3:a:hp:sitescope:11.20:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:sitescope:11.21:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:sitescope:11.22:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:sitescope:11.23:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:sitescope:11.24:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:sitescope:11.24.391:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:sitescope:11.30:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:sitescope:11.30.521:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:sitescope:11.31:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:sitescope:11.32:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:sitescope:11.33:*:*:*:*:*:*:*"
] | null | null | 5.5
| 2.1
| null |
|
GHSA-wmvv-2fxc-9j89
|
Multiple cross-site scripting (XSS) vulnerabilities in Anantasoft Gazelle CMS 1.0 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) user parameter to user.php or (2) lookup parameter to search.php.
|
[] | null | null | null | null | null |
|
GHSA-p594-hvv6-pr97
|
An unauthenticated file upload vulnerability has been identified in the Web Client component of Micro Focus Content Manager 9.1, 9.2, and 9.3 when configured to use the ADFS authentication method. The vulnerability could be exploited by an unauthenticated remote attacker to upload content to arbitrary locations on the Content Manager server.
|
[] | null | null | 7.5
| null | null |
|
CVE-2019-6457
|
An issue was discovered in GNU Recutils 1.8. There is a memory leak in rec_aggregate_reg_new in rec-aggregate.c in librec.a.
|
[
"cpe:2.3:a:gnu:recutils:1.8:*:*:*:*:*:*:*"
] | null | null | 6.5
| 4.3
| null |
|
CVE-2016-8007
|
Authentication bypass vulnerability in McAfee Host Intrusion Prevention Services (HIPS) 8.0 Patch 7 and earlier allows authenticated users to manipulate the product's registry keys via specific conditions.
|
[
"cpe:2.3:a:mcafee:host_intrusion_prevention_services:*:*:*:*:*:*:*:*"
] | null | null | 6.3
| 3
| null |
|
CVE-2014-3826
|
Cross-site scripting (XSS) vulnerability in MyBB before 1.6.13 allows remote authenticated users to inject arbitrary web script or HTML via the name parameter in the edit action of the config-profile_fields module.
|
[
"cpe:2.3:a:mybb:mybb:*:*:*:*:*:*:*:*"
] | null | 5.4
| null | 3.5
| null |
|
GHSA-j8mx-pwfr-v53j
|
A vulnerability has been found in SourceCodester Online Exam Form Submission 1.0. Affected is an unknown function of the file /admin/index.php. Such manipulation of the argument email leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
|
[] | 5.5
| 7.3
| null | null | null |
|
GHSA-qqf8-29gp-9wqx
|
In the Linux kernel, the following vulnerability has been resolved:x86/kexec: fix memory leak of elf header bufferThis is reported by kmemleak detector:unreferenced object 0xffffc900002a9000 (size 4096):
comm "kexec", pid 14950, jiffies 4295110793 (age 373.951s)
hex dump (first 32 bytes):
7f 45 4c 46 02 01 01 00 00 00 00 00 00 00 00 00 .ELF............
04 00 3e 00 01 00 00 00 00 00 00 00 00 00 00 00 ..>.............
backtrace:
[<0000000016a8ef9f>] __vmalloc_node_range+0x101/0x170
[<000000002b66b6c0>] __vmalloc_node+0xb4/0x160
[<00000000ad40107d>] crash_prepare_elf64_headers+0x8e/0xcd0
[<0000000019afff23>] crash_load_segments+0x260/0x470
[<0000000019ebe95c>] bzImage64_load+0x814/0xad0
[<0000000093e16b05>] arch_kexec_kernel_image_load+0x1be/0x2a0
[<000000009ef2fc88>] kimage_file_alloc_init+0x2ec/0x5a0
[<0000000038f5a97a>] __do_sys_kexec_file_load+0x28d/0x530
[<0000000087c19992>] do_syscall_64+0x3b/0x90
[<0000000066e063a4>] entry_SYSCALL_64_after_hwframe+0x44/0xaeIn crash_prepare_elf64_headers(), a buffer is allocated via vmalloc() to
store elf headers. While it's not freed back to system correctly when
kdump kernel is reloaded or unloaded. Then memory leak is caused. Fix it
by introducing x86 specific function arch_kimage_file_post_load_cleanup(),
and freeing the buffer there.And also remove the incorrect elf header buffer freeing code. Before
calling arch specific kexec_file loading function, the image instance has
been initialized. So 'image->elf_headers' must be NULL. It doesn't make
sense to free the elf header buffer in the place.Three different people have reported three bugs about the memory leak on
x86_64 inside Redhat.
|
[] | null | 5.5
| null | null | null |
|
CVE-2009-4421
|
Directory traversal vulnerability in languages_cgi.php in Simple PHP Blog 0.5.1 and earlier allows remote authenticated users to include and execute arbitrary local files via a .. (dot dot) in the blog_language1 parameter.
|
[
"cpe:2.3:a:alexander_palmo:simple_php_blog:*:*:*:*:*:*:*:*",
"cpe:2.3:a:alexander_palmo:simple_php_blog:0.3.7c:*:*:*:*:*:*:*",
"cpe:2.3:a:alexander_palmo:simple_php_blog:0.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:alexander_palmo:simple_php_blog:0.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:alexander_palmo:simple_php_blog:0.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:alexander_palmo:simple_php_blog:0.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:alexander_palmo:simple_php_blog:0.4.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:alexander_palmo:simple_php_blog:0.5.0.1:*:*:*:*:*:*:*"
] | null | null | null | 6.5
| null |
|
CVE-2011-2348
|
Google V8, as used in Google Chrome before 12.0.742.112, performs an incorrect bounds check, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] | null | null | null | 6.8
| null |
|
CVE-2024-48874
|
Ruijie Reyee OS Server-Side Request Forgery
|
Ruijie Reyee OS versions 2.206.x up to but not including 2.320.x could give attackers the ability to force Ruijie's proxy servers to perform any request the attackers choose. Using this, attackers could access internal services used by Ruijie and their internal cloud infrastructure via AWS cloud metadata services.
|
[
"cpe:2.3:o:ruijie:reyee_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:ruijienetworks:reyee_os:*:*:*:*:*:*:*:*"
] | 9.3
| 9.8
| null | null | null |
GHSA-xv69-6rf3-w5g2
|
Missing permission check in Jenkins Cloud Statistics Plugin
|
Jenkins Cloud Statistics Plugin 0.26 and earlier does not perform a permission check in an HTTP endpoint.This allows attackers with Overall/Read permission and knowledge of random activity IDs to view related provisioning exception error messages.Jenkins Cloud Statistics Plugin 0.27 requires Overall/Administer permission to access provisioning exception error messages.
|
[] | null | 4.3
| null | null | null |
GHSA-8x6f-f882-qfh8
|
Nagios XI versions prior to 5.11.3 are vulnerable to cross-site scripting (XSS) via the Bulk Modifications tool. Insufficient validation or escaping of user-supplied input may allow an attacker to inject and execute arbitrary script in the context of a victim's browser.
|
[] | 5.1
| null | null | null | null |
|
GHSA-j6w4-j677-qv94
|
A vulnerability in the conferencing component of Mitel MiVoice Connect through 19.3 SP2 and 20.x, 21.x, and 22.x through 22.24.1500.0 could allow an unauthenticated attacker to conduct a reflected cross-site scripting (XSS) attack due to insufficient validation for the test_presenter.php page. A successful exploit could allow an attacker to execute arbitrary scripts.
|
[] | null | 7.4
| null | null | null |
|
CVE-2021-23387
|
Open Redirect
|
The package trailing-slash before 2.0.1 are vulnerable to Open Redirect via the use of trailing double slashes in the URL when accessing the vulnerable endpoint (such as https://example.com//attacker.example/). The vulnerable code is in index.js::createTrailing(), as the web server uses relative URLs instead of absolute URLs.
|
[
"cpe:2.3:a:trailing-slash_project:trailing-slash:*:*:*:*:*:node.js:*:*"
] | null | 5.4
| null | null | null |
CVE-2025-11407
|
D-Link DI-7001 MINI upgrade_filter.asp os command injection
|
A weakness has been identified in D-Link DI-7001 MINI 24.04.18B1. Impacted is an unknown function of the file /upgrade_filter.asp. This manipulation of the argument path causes os command injection. The attack may be initiated remotely. The exploit has been made available to the public and could be exploited.
|
[] | 5.3
| 6.3
| 6.3
| 6.5
| null |
GHSA-cqxq-6p9g-3g96
|
Cross-site scripting vulnerability (XSS) in BasiliX Webmail 1.10 allows remote attackers to execute arbitrary script as other users by injecting script into the (1) subject or (2) message fields.
|
[] | null | null | null | null | null |
|
CVE-2015-1396
|
A Directory Traversal vulnerability exists in the GNU patch before 2.7.4. A remote attacker can write to arbitrary files via a symlink attack in a patch file. NOTE: this issue exists because of an incomplete fix for CVE-2015-1196.
|
[
"cpe:2.3:a:gnu:patch:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*"
] | null | 7.5
| null | 6.4
| null |
|
GHSA-6543-h8cq-cc73
|
A flaw was found in Foreman project. A credential leak was identified which will expose Azure Compute Profile password through JSON of the API output. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
|
[] | null | 8.8
| null | null | null |
|
GHSA-hwxv-7gw9-pfm4
|
An issue was discovered in Poppler 0.74.0. A recursive function call, in JBIG2Stream::readGenericBitmap() located in JBIG2Stream.cc, can be triggered by sending a crafted pdf file to (for example) the pdfseparate binary. It allows an attacker to cause Denial of Service (Segmentation fault) or possibly have unspecified other impact. This is related to JArithmeticDecoder::decodeBit.
|
[] | null | null | 8.8
| null | null |
|
GHSA-7r5g-766r-x96m
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in nanbu Welcart e-Commerce allows Stored XSS. This issue affects Welcart e-Commerce: from n/a through 2.11.16.
|
[] | null | 5.9
| null | null | null |
|
CVE-2014-0420
|
Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.34 and earlier, and 5.6.14 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Replication.
|
[
"cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*"
] | null | null | null | 2.8
| null |
|
GHSA-wrjq-6j55-j564
|
The User Submitted Posts plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the usp_check_images function in versions up to, and including, 20190312. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected sites server which may make remote code execution possible.
|
[] | null | 9.8
| null | null | null |
|
CVE-2023-37136
|
A stored cross-site scripting (XSS) vulnerability in the Basic Website Information module of eyoucms v1.6.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload.
|
[
"cpe:2.3:a:eyoucms:eyoucms:1.6.3:*:*:*:*:*:*:*"
] | null | 5.4
| null | null | null |
|
GHSA-x38x-mmg5-94j9
|
Unspecified vulnerability in the Enterprise Manager Base Platform component in Oracle Database Server 10.2.0.3, 10.2.0.4, 10.2.0.5, 11.1.0.7, 11.2.0.2, and 11.2.0.3, and Oracle Enterprise Manager Grid Control 10.2.0.5, allows remote attackers to affect integrity via unknown vectors related to Schema Management, a different vulnerability than CVE-2012-0526.
|
[] | null | null | null | null | null |
|
RHSA-2005:109
|
Red Hat Security Advisory: python security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null | null |
GHSA-79h5-2hp9-w4p4
|
Cross-site scripting (XSS) vulnerability in view.php in Moodle 1.4.2 and earlier allows remote attackers to inject arbitrary web script or HTML via the search parameter.
|
[] | null | null | null | null | null |
|
CVE-2014-7054
|
The musica de barrios sonideros (aka com.nobexinc.wls_93155702.rc) application 3.3.10 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
|
[
"cpe:2.3:a:nobexrc:musica_de_barrios_sonideros:3.3.10:*:*:*:*:android:*:*"
] | null | null | null | 5.4
| null |
|
GHSA-mm5g-273g-mjm7
|
Format string vulnerability in the Cio_PrintF function of cio_main.c in Unreal IRCd 3.1.1 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via format string specifiers.
|
[] | null | null | null | null | null |
|
RHSA-2009:1431
|
Red Hat Security Advisory: seamonkey security update
|
firefox: URL bar spoofing vulnerability Firefox 3.5.3 3.0.14 browser engine crashes Firefox 3.5.2 3.0.14 JavaScript engine crashes Firefox 3.0.14 Insufficient warning for PKCS11 module installation and removal Firefox 3.5.3 3.0.14 TreeColumns dangling pointer vulnerability
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null | null |
GHSA-h76p-mc68-jv3p
|
Denial of service in Jenkins Core
|
Jenkins 2.393 and earlier, LTS 2.375.3 and earlier uses the Apache Commons FileUpload library without specifying limits for the number of request parts introduced in version 1.5 for CVE-2023-24998 in org.kohsuke.stapler.RequestImpl, allowing attackers to trigger a denial of service.
|
[] | null | 7.5
| null | null | null |
RHBA-2021:4684
|
Red Hat Bug Fix Advisory: virt:av bug fix and enhancement update
|
libvirt: segmentation fault during VM shutdown can lead to vdsm hang
|
[
"cpe:/a:redhat:advanced_virtualization:8.5::el8"
] | null | 5.3
| null | null | null |
GHSA-96q8-85wv-4x4w
|
Buffer overflow in SCTP in Linux kernel before 2.6.16.17 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a malformed HB-ACK chunk.
|
[] | null | null | null | null | null |
|
GHSA-4v35-rh24-xvq6
|
The sell function of a smart contract implementation for MoneyTree (TREE), an Ethereum token, has an integer overflow in which "amount * sellPrice" can be zero, consequently reducing a seller's assets.
|
[] | null | null | 7.5
| null | null |
|
CVE-2024-11048
|
D-Link DI-8003 dbsrv.asp dbsrv_asp stack-based overflow
|
A vulnerability was found in D-Link DI-8003 16.07.16A1. It has been rated as critical. Affected by this issue is the function dbsrv_asp of the file /dbsrv.asp. The manipulation of the argument str leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
|
[
"cpe:2.3:o:d-link:di-8003_firmware:16.07.16a1:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:di-8003_firmware:16.07.16a1:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:di-8003:a1:*:*:*:*:*:*:*"
] | 8.7
| 8.8
| 8.8
| 9
| null |
GHSA-q66q-9pr9-q26r
|
Multiple cross-site scripting (XSS) vulnerabilities in MAXdev MD-Pro 1.0.73, and possibly earlier versions, allow remote attackers to inject arbitrary web script or HTML via (1) the print parameter to the print module, the sitename parameter to (2) bb_smilies or (3) bbcode_ref module, or (4) the hlpfile parameter to openwindow.php.
|
[] | null | null | null | null | null |
|
GHSA-xw45-9vvw-6qg3
|
Retool (self-hosted) before 3.196.0 allows Host header injection. When the BASE_DOMAIN environment variable is not set, the HTTP host header can be manipulated.
|
[] | null | 7.1
| null | null | null |
|
PYSEC-2021-544
| null |
TensorFlow is an end-to-end open source platform for machine learning. The implementation of TrySimplify(https://github.com/tensorflow/tensorflow/blob/c22d88d6ff33031aa113e48aa3fc9aa74ed79595/tensorflow/core/grappler/optimizers/arithmetic_optimizer.cc#L390-L401) has undefined behavior due to dereferencing a null pointer in corner cases that result in optimizing a node with no inputs. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
|
[] | null | null | null | null | null |
CVE-2023-28195
|
A privacy issue was addressed with improved private data redaction for log entries. This issue is fixed in macOS Ventura 13.3. An app may be able to read sensitive location information.
|
[
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*"
] | null | 3.3
| null | null | null |
|
GHSA-7x72-m5pv-w2m4
|
PHP remote file inclusion vulnerability in inc/linkbar.php in Small Axe Weblog 0.3.1 allows remote attackers to execute arbitrary PHP code via a URL in the ffile parameter, a different vector than CVE-2008-0376. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
|
[] | null | null | null | null | null |
|
GHSA-8g2f-8jp6-pr2w
|
A CRLF injection vulnerability in E-Staff v5.1 allows attackers to insert Carriage Return (CR) and Line Feed (LF) characters into input fields, leading to HTTP response splitting and header manipulation.
|
[] | null | 9.8
| null | null | null |
|
CVE-2021-46586
|
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley MicroStation CONNECT 10.16.0.80. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of 3DS files. Crafted data in a 3DS file can trigger a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-15380.
|
[
"cpe:2.3:a:bentley:microstation:*:*:*:*:*:*:*:*",
"cpe:2.3:a:bentley:microstation_connect:10.16.0.80:*:*:*:*:*:*:*",
"cpe:2.3:a:bentley:view:*:*:*:*:*:*:*:*"
] | null | null | 7.8
| null | null |
|
GHSA-92v8-64cc-mmr5
|
Buffer overflow in the get_msg_text of chan_sip.c in the Session Initiation Protocol (SIP) protocol implementation for Asterisk releases before August 15, 2003, allows remote attackers to execute arbitrary code via certain (1) MESSAGE or (2) INFO requests.
|
[] | null | null | null | null | null |
|
GHSA-53hc-55fr-f547
|
Insufficient technical documentation issue exists in thermal camera TMC series all firmware versions. The user of the affected product is not aware of the internally saved data. By accessing the affected product physically, an attacker may retrieve the internal data.
|
[] | null | 4.6
| null | null | null |
|
GHSA-vq44-9mcp-gv3x
|
The Blocksy Companion plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Newsletter widget in all versions up to, and including, 2.0.31 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] | null | 6.5
| null | null | null |
|
GHSA-qvmv-j2f9-75pf
|
A SQL Injection vulnerability in the web framework of Cisco Prime Service Catalog could allow an unauthenticated, remote attacker to execute unauthorized Structured Query Language (SQL) queries. The vulnerability is due to a failure to validate user-supplied input that is used in SQL queries. An attacker could exploit this vulnerability by sending a crafted SQL statement to an affected system. Successful exploitation could allow the attacker to read entries in some database tables. Cisco Bug IDs: CSCvg30333.
|
[] | null | null | 6.5
| null | null |
|
GHSA-fxj2-prj4-mpf5
|
SQL injection vulnerability in Sourcecodester Online Leave Management System v1 by oretnom23, allows attackers to execute arbitrary SQL commands via the username parameter to /leave_system/classes/Login.php.
|
[] | null | null | null | null | null |
|
CVE-2017-3520
|
Vulnerability in the PeopleSoft Enterprise PeopleTools component of Oracle PeopleSoft Products (subcomponent: Fluid Core). Supported versions that are affected are 8.54 and 8.55. Easily "exploitable" vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.0 Base Score 6.5 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N).
|
[
"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.54:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.55:*:*:*:*:*:*:*"
] | null | null | 6.5
| 7.1
| null |
|
RHSA-2025:9918
|
Red Hat Security Advisory: python3.11 security update
|
cpython: python: Bypass extraction filter to modify file metadata outside extraction directory cpython: python: Bypassing extraction filter to create symlinks to arbitrary targets outside extraction directory cpython: python: Extraction filter bypass for linking outside extraction directory cpython: Tarfile extracts filtered members when errorlevel=0 python: cpython: Arbitrary writes via tarfile realpath overflow
|
[
"cpe:/a:redhat:rhel_eus:9.4::appstream",
"cpe:/a:redhat:rhel_eus:9.4::crb"
] | null | 7.6
| null | null | null |
CVE-2000-0077
|
The October 1998 version of the HP-UX aserver program allows local users to gain privileges by specifying an alternate PATH which aserver uses to find the ps and grep commands.
|
[
"cpe:2.3:o:hp:hp-ux:10:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:11:*:*:*:*:*:*:*"
] | null | null | null | 7.2
| null |
|
GHSA-283g-59hf-7q7h
|
The get_icu_disp_value_src_php function in ext/intl/locale/locale_methods.c in PHP before 5.3.29, 5.4.x before 5.4.30, and 5.5.x before 5.5.14 does not properly restrict calls to the ICU uresbund.cpp component, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a locale_get_display_name call with a long first argument.
|
[] | null | null | 9.8
| null | null |
|
GHSA-77mv-p94f-qcq4
|
Magento 2 Community Edition XSS Vulnerability
|
A stored cross-site scripting vulnerability exists in the admin panel of Magento Open Source prior to 1.9.4.2, and Magento Commerce prior to 1.14.4.2, Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2. This could be exploited by an authenticated user with privileges to edit newsletter templates to inject malicious javascript.
|
[] | null | null | 4.8
| null | null |
GHSA-3wxc-cg64-x24r
|
Online Armor Personal Firewall 2.0.1.215 does not properly validate certain parameters to System Service Descriptor Table (SSDT) function handlers, which allows local users to cause a denial of service (crash) and possibly gain privileges via unspecified kernel SSDT hooks for Windows Native API functions including (1) NtAllocateVirtualMemory, (2) NtConnectPort, (3) NtCreateFile, (4) NtCreateKey, (5) NtCreatePort, (6) NtDeleteFile, (7) NtDeleteValueKey, (8) NtLoadKey, (9) NtOpenFile, (10) NtOpenProcess, (11) NtOpenThread, (12) NtResumeThread, (13) NtSetContextThread, (14) NtSetValueKey, (15) NtSuspendProcess, (16) NtSuspendThread, and (17) NtTerminateThread.
|
[] | null | null | null | null | null |
|
GHSA-662w-w5c4-f4mr
|
Adobe Reader and Acrobat 9.x before 9.5.5, 10.x before 10.1.7, and 11.x before 11.0.03 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-2718, CVE-2013-2720, CVE-2013-2721, CVE-2013-2722, CVE-2013-2723, CVE-2013-2725, CVE-2013-2726, CVE-2013-2731, CVE-2013-2732, CVE-2013-2734, CVE-2013-2735, CVE-2013-2736, CVE-2013-3337, CVE-2013-3338, CVE-2013-3339, CVE-2013-3340, and CVE-2013-3341.
|
[] | null | null | null | null | null |
|
CVE-2009-3130
|
Heap-based buffer overflow in Microsoft Office Excel 2002 SP3, Office 2004 and 2008 for Mac, and Open XML File Format Converter for Mac allows remote attackers to execute arbitrary code via a spreadsheet containing a malformed Binary File Format (aka BIFF) record that triggers memory corruption, aka "Excel Document Parsing Heap Overflow Vulnerability."
|
[
"cpe:2.3:a:microsoft:compatibility_pack_word_excel_powerpoint:2007:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:compatibility_pack_word_excel_powerpoint:2007:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:excel:2002:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:excel:2003:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:excel:2007:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:excel:2007:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:excel_viewer:*:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:excel_viewer:*:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:excel_viewer:2003:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2004:*:mac:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2008:*:mac:*:*:*:*:*",
"cpe:2.3:a:microsoft:open_xml_file_format_converter:*:*:mac:*:*:*:*:*"
] | null | null | null | 9.3
| null |
|
GHSA-9mvm-qj8p-rrmj
|
IBM WebSphere MQ 8.0.0.0 through 8.0.0.9 and 9.0.0.0 through 9.1.1 could allow a local attacker to cause a denial of service within the error log reporting system. IBM X-Force ID: 156163.
|
[] | null | 5.5
| null | null | null |
|
GHSA-xcxp-hg27-3gg9
|
The WP Login Box WordPress plugin through 2.0.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
|
[] | null | 4.8
| null | null | null |
|
CVE-2022-49913
|
btrfs: fix inode list leak during backref walking at find_parent_nodes()
|
In the Linux kernel, the following vulnerability has been resolved:
btrfs: fix inode list leak during backref walking at find_parent_nodes()
During backref walking, at find_parent_nodes(), if we are dealing with a
data extent and we get an error while resolving the indirect backrefs, at
resolve_indirect_refs(), or in the while loop that iterates over the refs
in the direct refs rbtree, we end up leaking the inode lists attached to
the direct refs we have in the direct refs rbtree that were not yet added
to the refs ulist passed as argument to find_parent_nodes(). Since they
were not yet added to the refs ulist and prelim_release() does not free
the lists, on error the caller can only free the lists attached to the
refs that were added to the refs ulist, all the remaining refs get their
inode lists never freed, therefore leaking their memory.
Fix this by having prelim_release() always free any attached inode list
to each ref found in the rbtree, and have find_parent_nodes() set the
ref's inode list to NULL once it transfers ownership of the inode list
to a ref added to the refs ulist passed to find_parent_nodes().
|
[] | null | null | null | null | null |
GHSA-2w49-pm36-8jp5
|
An information disclosure issue existed in the transition of program state. This issue was addressed with improved state handling. This issue is fixed in iTunes 12.11 for Windows. A malicious application may be able to access local users Apple IDs.
|
[] | null | null | null | null | null |
|
ICSA-23-131-04
|
Siemens SIMATIC Cloud Connect 7
|
The web based management of affected devices does not properly validate user input, making it susceptible to command injection. This could allow an authenticated privileged remote attacker to execute arbitrary code with root privileges. The affected device uses a hard-coded password to protect the diagnostic files. This could allow an authenticated attacker to access protected data. The filename in the upload feature of the web based management of the affected device is susceptible to a path traversal vulnerability. This could allow an authenticated privileged remote attacker to overwrite any file the Linux user `ccuser` has write access to, or to download any file the Linux user `ccuser` has read-only access to. The affected device is vulnerable to a denial of service while parsing a random (non-JSON) MQTT payload. This could allow an attacker who can manipulate the communication between the MQTT broker and the affected device to cause a denial of service (DoS). The export endpoint is accessible via REST API without authentication. This could allow an unauthenticated remote attacker to download the files available via the endpoint. The export endpoint discloses some undocumented files. This could allow an unauthenticated remote attacker to gain access to additional information resources. The filename in the upload feature of the web based management of the affected device is susceptible to a path traversal vulnerability. This could allow an authenticated privileged remote attacker to write any file with the extension `.db`.
|
[] | null | 3.8
| null | null | null |
GHSA-994m-9j4p-7hqx
|
An issue was discovered in zzcms 8.3. SQL Injection exists in admin/special_add.php via a zxbigclassid cookie. (This needs an admin user login.)
|
[] | null | null | 7.2
| null | null |
|
GHSA-86mr-6m89-vgj3
|
Buffer Overflow in node-weakauras-parser
|
Affected versions of `node-weakauras-parser` are vulnerable to a Buffer Overflow. The `encode_weakaura` function fails to properly validate the input size. A buffer of 13835058055282163711 bytes causes an overflow on 64-bit systems.RecommendationUpgrade to versions 1.0.5, 2.0.2, 3.0.1 or later.
|
[] | null | null | null | null | null |
CVE-2017-3015
|
Adobe Acrobat Reader versions 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier have an exploitable memory corruption vulnerability in the JBIG2 parsing functionality. Successful exploitation could lead to arbitrary code execution.
|
[
"cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:reader:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*"
] | null | null | 7.8
| 9.3
| null |
|
GHSA-694g-r8xx-3669
|
In broadcastServiceStateChanged of TelephonyRegistry.java, there is a possible way to learn base station information without location permission due to a missing permission check. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12 Android-12LAndroid ID: A-210118427
|
[] | null | 5.5
| null | null | null |
|
CVE-2023-48364
|
A vulnerability has been identified in OpenPCS 7 V9.1 (All versions < V9.1 SP2 UC05), SIMATIC BATCH V9.1 (All versions < V9.1 SP2 UC05), SIMATIC PCS 7 V9.1 (All versions < V9.1 SP2 UC05), SIMATIC Route Control V9.1 (All versions < V9.1 SP2 UC05), SIMATIC WinCC Runtime Professional V18 (All versions < V18 Update 4), SIMATIC WinCC Runtime Professional V19 (All versions < V19 Update 2), SIMATIC WinCC V7.4 (All versions), SIMATIC WinCC V7.5 (All versions < V7.5 SP2 Update 15), SIMATIC WinCC V8.0 (All versions < V8.0 Update 4). The implementation of the RPC (Remote Procedure call) communication protocol in the affected products do not properly handle certain malformed RPC messages. An attacker could use this vulnerability to cause a denial of service condition in the RPC server.
|
[
"cpe:2.3:a:siemens:openpcs_7:*:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simatic_batch:*:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simatic_pcs_7:*:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simatic_route_control:*:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simatic_wincc:7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simatic_wincc:7.5:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simatic_wincc:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simatic_wincc_runtime_professional:*:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simatic_wincc_runtime_professional:19:*:*:*:*:*:*:*"
] | 7.1
| 6.5
| null | null | null |
|
CVE-2022-21276
|
Vulnerability in the Oracle Communications Billing and Revenue Management product of Oracle Communications Applications (component: Connection Manager). Supported versions that are affected are 12.0.0.3 and 12.0.0.4. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Communications Billing and Revenue Management. While the vulnerability is in Oracle Communications Billing and Revenue Management, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle Communications Billing and Revenue Management. CVSS 3.1 Base Score 9.9 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H).
|
[
"cpe:2.3:a:oracle:communications_billing_and_revenue_management:12.0.0.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_billing_and_revenue_management:12.0.0.4.0:*:*:*:*:*:*:*"
] | null | 9.9
| null | null | null |
|
GHSA-rpjm-v5w4-ccc9
|
Proxy command injection vulnerabilities in Trend Micro Mobile Security (Enterprise) versions before 9.7 Patch 3 allow remote attackers to execute arbitrary code on vulnerable installations.
|
[] | null | null | 8.8
| null | null |
|
GHSA-jfg7-66gq-jxwj
|
Buffer overflow in Apple QuickTime before 7.4 allows remote attackers to execute arbitrary code via a crafted compressed PICT image, which triggers the overflow during decoding.
|
[] | null | null | null | null | null |
|
CVE-2020-7991
|
Adive Framework 2.0.8 has admin/config CSRF to change the Administrator password.
|
[
"cpe:2.3:a:adive:framework:2.0.8:*:*:*:*:*:*:*"
] | null | 8.8
| null | 6.8
| null |
|
CVE-2021-24917
|
WPS Hide Login < 1.9.1 - Protection Bypass with Referer-Header
|
The WPS Hide Login WordPress plugin before 1.9.1 has a bug which allows to get the secret login page by setting a random referer string and making a request to /wp-admin/options.php as an unauthenticated user.
|
[
"cpe:2.3:a:wpserveur:wps_hide_login:*:*:*:*:*:wordpress:*:*"
] | null | 7.5
| null | 5
| null |
CVE-2018-1455
|
IBM Tivoli Application Dependency Discovery Manager 7.2.2 and 7.3 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 11029.
|
[
"cpe:2.3:a:ibm:tivoli_application_dependency_discovery_manager:7.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_application_dependency_discovery_manager:7.3.0:*:*:*:*:*:*:*"
] | null | null | 4.3
| null | null |
|
CVE-2017-12313
|
An untrusted search path (aka DLL Preload) vulnerability in the Cisco Network Academy Packet Tracer software could allow an authenticated, local attacker to execute arbitrary code via DLL hijacking if a local user with administrative privileges executes the installer in the current working directory where a crafted DLL has been placed by an attacker. The vulnerability is due to incomplete input validation of path and file names of a DLL file before it is loaded. An attacker could exploit this vulnerability by creating a malicious DLL file and installing it in a specific system directory. A successful exploit could allow the attacker to execute commands on the underlying Microsoft Windows host with privileges equivalent to the SYSTEM account. An attacker would need valid user credentials to exploit this vulnerability.
|
[
"cpe:2.3:a:cisco:packet_tracer:*:*:*:*:*:*:*:*"
] | null | null | 6.7
| 7.2
| null |
|
GHSA-c723-8f7g-x2fg
|
An issue was discovered on Samsung mobile devices with M(6.0) and N(7.x) software. There is a buffer overflow in tlc_server. The Samsung ID is SVE-2017-8888 (July 2017).
|
[] | null | null | null | null | null |
|
CVE-2024-39020
|
idccms v1.35 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/vpsApiData_deal.php?mudi=rev&nohrefStr=close
|
[
"cpe:2.3:a:idccms_project:idccms:1.35:*:*:*:*:*:*:*"
] | null | 6.3
| null | null | null |
|
GHSA-8vqf-2742-m7gx
|
WebKit in Apple Safari 3 Beta before Update 3.0.3, and iPhone before 1.0.1, does not properly handle the interaction between International Domain Name (IDN) support and Unicode fonts, which allows remote attackers to create a URL containing "look-alike characters" (homographs) and possibly perform phishing attacks.
|
[] | null | null | null | null | null |
|
GHSA-jhxp-99pw-xwch
|
The facial recognition module has a vulnerability in input parameter verification. Successful exploitation of this vulnerability may cause failed facial recognition.
|
[] | null | 7.5
| null | null | null |
|
CVE-2011-1922
|
daemon/worker.c in Unbound 1.x before 1.4.10, when debugging functionality and the interface-automatic option are enabled, allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a crafted DNS request that triggers improper error handling.
|
[
"cpe:2.3:a:nlnetlabs:unbound:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:nlnetlabs:unbound:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:nlnetlabs:unbound:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:nlnetlabs:unbound:1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:nlnetlabs:unbound:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:nlnetlabs:unbound:1.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:nlnetlabs:unbound:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:nlnetlabs:unbound:1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:nlnetlabs:unbound:1.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:nlnetlabs:unbound:1.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:nlnetlabs:unbound:1.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:nlnetlabs:unbound:1.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:nlnetlabs:unbound:1.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:nlnetlabs:unbound:1.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:nlnetlabs:unbound:1.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:nlnetlabs:unbound:1.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:nlnetlabs:unbound:1.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:nlnetlabs:unbound:1.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:nlnetlabs:unbound:1.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:nlnetlabs:unbound:1.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:nlnetlabs:unbound:1.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:nlnetlabs:unbound:1.4.9:*:*:*:*:*:*:*"
] | null | null | null | 4.3
| null |
|
CVE-2025-38313
|
bus: fsl-mc: fix double-free on mc_dev
|
In the Linux kernel, the following vulnerability has been resolved:
bus: fsl-mc: fix double-free on mc_dev
The blamed commit tried to simplify how the deallocations are done but,
in the process, introduced a double-free on the mc_dev variable.
In case the MC device is a DPRC, a new mc_bus is allocated and the
mc_dev variable is just a reference to one of its fields. In this
circumstance, on the error path only the mc_bus should be freed.
This commit introduces back the following checkpatch warning which is a
false-positive.
WARNING: kfree(NULL) is safe and this check is probably not required
+ if (mc_bus)
+ kfree(mc_bus);
|
[] | null | null | null | null | null |
CVE-2022-30557
|
Foxit PDF Reader and PDF Editor before 11.2.2 have a Type Confusion issue that causes a crash because of Unsigned32 mishandling during JavaScript execution.
|
[
"cpe:2.3:a:foxit:pdf_editor:*:*:*:*:*:*:*:*",
"cpe:2.3:a:foxit:pdf_reader:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 7.5
| null | 5
| null |
|
GHSA-rc83-8wmp-v9vx
|
Insecure temporary file in the installer for Zoom Rooms before version 5.15.0 may allow an authenticated user to enable an escalation of privilege via local access.
|
[] | null | 8.2
| null | null | null |
|
GHSA-wv8q-jq9m-rpq3
|
, aka 'Microsoft Exchange Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-17117, CVE-2020-17132, CVE-2020-17141, CVE-2020-17144.
|
[] | null | 9.1
| null | null | null |
|
GHSA-p4j5-w3r3-5p3h
|
BitchX 75p3 and 1.0c16 through 1.0c20cvs allows remote attackers to cause a denial of service (segmentation fault) via a malformed RPL_NAMREPLY numeric 353 message.
|
[] | null | null | null | null | null |
|
CVE-2024-51753
|
Refresh tokens are logged when the debug flag is enabled in @workos-inc/authkit-remix
|
The AuthKit library for Remix provides convenient helpers for authentication and session management using WorkOS & AuthKit with Remix. In affected versions refresh tokens are logged to the console when the disabled by default `debug` flag, is enabled. This issue has been patched in version 0.4.1. All users are advised to upgrade. There are no known workarounds for this vulnerability.
|
[] | 2.1
| null | null | null | null |
GHSA-4xx2-x648-8hgc
|
A memory corruption issue was addressed with improved validation. This issue is fixed in Security Update 2021-002 Catalina, Security Update 2021-003 Mojave, iOS 14.5 and iPadOS 14.5, watchOS 7.4, tvOS 14.5, macOS Big Sur 11.3. An application may be able to read restricted memory.
|
[] | null | 7.5
| null | null | null |
|
GHSA-53x2-fcg3-m32m
|
The LayerSlider plugin for WordPress is vulnerable to SQL Injection via the ls_get_popup_markup action in versions 7.9.11 and 7.10.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
|
[] | null | 9.8
| null | null | null |
|
GHSA-42gc-crr9-84r9
|
Multiple PHP remote file inclusion vulnerabilities in RobotStats 0.1 allow remote attackers to execute arbitrary PHP code via a URL in the DOCUMENT_ROOT parameter to (1) graph.php and (2) robotstats.inc.php. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
|
[] | null | null | null | null | null |
|
CVE-2022-48082
|
Easyone CRM v5.50.02 was discovered to contain a SQL Injection vulnerability via the text parameter at /Services/Misc.asmx/SearchTag.
|
[
"cpe:2.3:a:easyone:easyone_crm:5.50.02:*:*:*:*:*:*:*"
] | null | 9.8
| null | null | null |
|
GHSA-xr3x-62qw-vc4w
|
Grafana stored XSS
|
Grafana through 6.7.1 allows stored XSS.
|
[] | 5.1
| 5.4
| null | null | null |
GHSA-r486-q6j7-vv34
|
Integer underflow in Apple iOS before 5.1 allows remote attackers to execute arbitrary code or cause a denial of service (device crash) via a crafted catalog file in an HFS disk image.
|
[] | null | null | null | null | null |
|
GHSA-h3vg-4x76-v28w
|
Dolibarr ERP and CRM contain XSS Vulnerability
|
Cross-site scripting (XSS) vulnerability in Dolibarr ERP/CRM 6.0.0 allows remote authenticated users to inject arbitrary web script or HTML via the Title parameter to htdocs/admin/menus/edit.php.
|
[] | null | null | 5.4
| null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.