id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 38
232
⌀ |
|---|---|---|---|---|---|---|---|---|
GHSA-6648-qm4m-vqcm
|
Untrusted search path vulnerability in STDU Explorer 1.0.201 allows local users to gain privileges via a Trojan horse dwmapi.dll file in the current working directory. NOTE: some of these details are obtained from third party information.
|
[] | null | null | null | null | null |
|
GHSA-h887-7vmx-g264
|
The issue was addressed with improvements to the file handling protocol. This issue is fixed in iOS 16.6 and iPadOS 16.6. An app may be able to break out of its sandbox.
|
[] | null | 8.6
| null | null | null |
|
GHSA-p53p-8qcj-mq4g
|
There is a resource management errors vulnerability in Huawei P30. Local attackers construct broadcast message for some application, causing this application to send this broadcast message and impact the customer's use experience.
|
[] | null | null | null | null | null |
|
CVE-2013-1373
|
Buffer overflow in Adobe Flash Player before 10.3.183.63 and 11.x before 11.6.602.168 on Windows, before 10.3.183.61 and 11.x before 11.6.602.167 on Mac OS X, before 10.3.183.61 and 11.x before 11.2.202.270 on Linux, before 11.1.111.43 on Android 2.x and 3.x, and before 11.1.115.47 on Android 4.x; Adobe AIR before 3.6.0.597; and Adobe AIR SDK before 3.6.0.599 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2013-0642, CVE-2013-0645, CVE-2013-1365, CVE-2013-1366, CVE-2013-1367, CVE-2013-1368, CVE-2013-1369, CVE-2013-1370, and CVE-2013-1372.
|
[
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*"
] | null | null | null | 10
| null |
|
CVE-2006-2900
|
Internet Explorer 6 allows user-assisted remote attackers to read arbitrary files by tricking a user into typing the characters of the target filename in a text box and using the OnKeyDown, OnKeyPress, and OnKeyUp Javascript keystroke events to change the focus and cause those characters to be inserted into a file upload input control, which can then upload the file when the user submits the form.
|
[
"cpe:2.3:a:microsoft:ie:5.01:windows_2000_sp4:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:ie:6:*:windows_xp_professional_64bit:*:*:*:*:*",
"cpe:2.3:a:microsoft:ie:6:sp1:windows_98:*:*:*:*:*",
"cpe:2.3:a:microsoft:ie:6:sp1:windows_98_se:*:*:*:*:*",
"cpe:2.3:a:microsoft:ie:6:sp1:windows_millennium:*:*:*:*:*",
"cpe:2.3:a:microsoft:ie:6:sp1:windows_xpsp1:*:*:*:*:*",
"cpe:2.3:a:microsoft:ie:6:windows_2000_sp4:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:ie:6:windows_server_2003_sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:ie:6:windows_server_2003_sp1_itanium:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:ie:6:windows_xp_sp2:*:*:*:*:*:*",
"cpe:2.3:h:canon:network_camera_server_vb101:*:*:*:*:*:*:*:*"
] | null | null | null | 4
| null |
|
GHSA-qx28-hg2r-f42q
|
Archer C1200 firmware versions prior to 'Archer C1200(JP)_V2_230508' and Archer C9 firmware versions prior to 'Archer C9(JP)_V3_230508' allow a network-adjacent unauthenticated attacker to execute arbitrary OS commands.
|
[] | null | 8.8
| null | null | null |
|
RHSA-2016:0449
|
Red Hat Security Advisory: samba4 security update
|
samba: Incorrect ACL get/set allowed on symlink path
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null | null |
CVE-2006-5323
|
Unspecified vulnerability in IBM WebSphere Application Server before 6.1.0.2 has unspecified impact and attack vectors, related to a "possible security exposure," aka PK29360.
|
[
"cpe:2.3:a:ibm:websphere_application_server:*:*:*:*:*:*:*:*"
] | null | null | null | 10
| null |
|
GHSA-cg3q-c6pr-7ff8
|
Adobe Experience Manager version 6.5.14 (and earlier) is affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
|
[] | null | 6.1
| null | null | null |
|
GHSA-w6mf-g43r-8j5g
|
Unspecified vulnerability in Microsoft Internet Explorer on Windows Mobile 5.0 allows remote attackers to cause a denial of service (loss of browser and other device functionality) via a malformed WML page, related to an "overflow state." NOTE: it is possible that this issue is related to CVE-2007-0685.
|
[] | null | null | null | null | null |
|
CVE-2021-45972
|
The giftrans function in giftrans 1.12.2 contains a stack-based buffer overflow because a value inside the input file determines the amount of data to write. This allows an attacker to overwrite up to 250 bytes outside of the allocated buffer with arbitrary data.
|
[
"cpe:2.3:a:giftrans_project:giftrans:1.12.2:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*"
] | null | 7.1
| null | 5.8
| null |
|
CVE-2014-8361
|
The miniigd SOAP service in Realtek SDK allows remote attackers to execute arbitrary code via a crafted NewInternalClient request, as exploited in the wild through 2023.
|
[
"cpe:2.3:h:dlink:dir-905l:a1:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dir-905l:b1:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dir-905l_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dir-605l:a1:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dir-605l_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dir-600l:a1:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dir-600l_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:a:realtek:realtek_sdk:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dir-619l:a1:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dir-619l_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dir-809:a1:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dir-809:a2:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dir-809_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dir-605l:b1:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dir-605l:c1:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dir-619l:b1:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dir-600l:b1:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dir-501_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dir-501:a1:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dir-515_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dir-515:a1:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dir-615_firmware:10.01b02:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dir-615:j1:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dir-615_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dir-615:fx:*:*:*:*:*:*:*",
"cpe:2.3:o:aterm:wg1900hp2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:aterm:wg1900hp2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:aterm:wg1900hp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:aterm:wg1900hp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:aterm:wg1800hp4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:aterm:wg1800hp4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:aterm:wg1800hp3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:aterm:wg1800hp3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:aterm:wg1200hs2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:aterm:wg1200hs2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:aterm:wg1200hp3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:aterm:wg1200hp3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:aterm:wg1200hp2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:aterm:wg1200hp2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:aterm:w1200ex_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:aterm:w1200ex:-:*:*:*:*:*:*:*",
"cpe:2.3:o:aterm:w1200ex-ms_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:aterm:w1200ex-ms:-:*:*:*:*:*:*:*",
"cpe:2.3:o:aterm:wg1200hs_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:aterm:wg1200hs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:aterm:wg1200hp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:aterm:wg1200hp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:aterm:wf800hp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:aterm:wf800hp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:aterm:wf300hp2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:aterm:wf300hp2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:aterm:wr8165n_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:aterm:wr8165n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:aterm:w500p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:aterm:w500p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:aterm:w300p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:aterm:w300p:-:*:*:*:*:*:*:*"
] | null | 9.8
| null | 10
| null |
|
GHSA-q46j-pj2f-x9cc
|
Adobe Substance 3D Stager versions 2.1.1 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[] | null | 5.5
| null | null | null |
|
CVE-2009-4198
|
SQL injection vulnerability in my_orders.php in MyMiniBill allows remote authenticated users to execute arbitrary SQL commands via the orderid parameter in a status action.
|
[
"cpe:2.3:a:cupidsystems:myminibill:*:*:*:*:*:*:*:*"
] | null | null | null | 6.5
| null |
|
GHSA-r999-j7hp-qmgq
|
Cloud Foundry Routing Release, all versions prior to 0.188.0, contains a vulnerability that can hijack the traffic to route services hosted outside the platform. A user with space developer permissions can create a private domain that shadows the external domain of the route service, and map that route to an app. When the gorouter receives traffic destined for the external route service, this traffic will instead be directed to the internal app using the shadow route.
|
[] | null | 6.5
| null | null | null |
|
GHSA-rrx9-x9wf-g3vh
|
Sensitive information disclosure due to cleartext storage of sensitive information. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979.
|
[] | null | null | 5.5
| null | null |
|
CVE-2006-0650
|
Cross-site scripting (XSS) vulnerability in cpaint2.inc.php in the CPAINT library before 2.0.3, as used in multiple scripts, allows remote attackers to inject arbitrary web script or HTML via the cpaint_response_type parameter, which is displayed in a resulting error message, as demonstrated using a hex-encoded IFRAME tag.
|
[
"cpe:2.3:a:cpaint:cpaint:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cpaint:cpaint:1.01:*:*:*:*:*:*:*",
"cpe:2.3:a:cpaint:cpaint:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cpaint:cpaint:1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cpaint:cpaint:1.3_sp:*:*:*:*:*:*:*",
"cpe:2.3:a:cpaint:cpaint:1.3_sp1:*:*:*:*:*:*:*",
"cpe:2.3:a:cpaint:cpaint:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cpaint:cpaint:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cpaint:cpaint:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cpaint:cpaint:pre1.0:*:*:*:*:*:*:*"
] | null | null | null | 4.3
| null |
|
GHSA-mc9v-rq2q-h4r4
|
The Client secret is not checked when using the OAuth Password grant type.By exploiting this vulnerability, an attacker could connect to a web server using a client application not explicitly authorized as part of the OAuth deployment.
Exploitation requires valid credentials and does not permit the attacker to bypass user privileges.
|
[] | 2.3
| null | null | null | null |
|
GHSA-24jg-h6v2-qfrg
|
Multiple directory traversal vulnerabilities in Algo Risk Application (ARA) 2.4.0.1 through 4.9.1 in IBM Algo One allow remote authenticated users to bypass intended access restrictions via a crafted pathname for a (1) configuration or (2) JAR file.
|
[] | null | null | null | null | null |
|
PYSEC-2007-3
| null |
Trac before 0.10.3.1 does not send a Content-Disposition HTTP header specifying an attachment in certain "unsafe" situations, which has unknown impact and remote attack vectors.
|
[] | null | null | null | null | null |
RHSA-2013:1537
|
Red Hat Security Advisory: augeas security, bug fix, and enhancement update
|
augeas: susceptible to symlink attack augeas: susceptible to mountpoint attack
|
[
"cpe:/a:redhat:enterprise_linux:6::hypervisor",
"cpe:/a:redhat:storage:3:server:el6",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null | null |
GHSA-777h-5433-29fx
|
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley MicroStation CONNECT 10.16.0.80. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of DGN files. Crafted data in a DGN file can trigger a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-15507.
|
[] | null | null | null | null | null |
|
GHSA-x773-f7wv-p2hw
|
The Transaction Language 1 (TL1) login interface in Cisco ONS 15327 4.6(0) and 4.6(1) and 15454 and 15454 SDH 4.6(0) and 4.6(1), when a user account is configured with a blank password, allows remote attackers to gain unauthorized access by logging in with a password larger than 10 characters.
|
[] | null | null | null | null | null |
|
GHSA-xvhr-qprg-rjpw
|
mruby is vulnerable to NULL Pointer Dereference
|
[] | null | null | null | null | null |
|
cisco-sa-20190327-rsp3-ospf
|
Cisco Aggregation Services Router 900 Route Switch Processor 3 OSPFv2 Denial of Service Vulnerability
|
A vulnerability in the ingress traffic validation of Cisco IOS XE Software for Cisco Aggregation Services Router (ASR) 900 Route Switch Processor 3 (RSP3) could allow an unauthenticated, adjacent attacker to trigger a reload of an affected device, resulting in a denial of service (DoS) condition.
The vulnerability exists because the software insufficiently validates ingress traffic on the ASIC used on the RSP3 platform. An attacker could exploit this vulnerability by sending a malformed OSPF version 2 (OSPFv2) message to an affected device. A successful exploit could allow the attacker to cause a reload of the iosd process, triggering a reload of the affected device and resulting in a DoS condition.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-rsp3-ospf ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-rsp3-ospf"]
This advisory is part of the March 27, 2019, release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication, which includes 17 Cisco Security Advisories that describe 19 vulnerabilities. For a complete list of the advisories and links to them, see Cisco Event Response: March 2019 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication ["https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-71135"].
|
[] | null | null | 7.4
| null | null |
GHSA-9qhw-fgvr-j3cm
|
The PayPal Pro PayFlow module in osCommerce does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
|
[] | null | null | null | null | null |
|
GHSA-29fh-98q8-5ghm
|
Mintty before 3.4.5 allows remote servers to cause a denial of service (Windows GUI hang) by telling the Mintty window to change its title repeatedly at high speed, which results in many SetWindowTextA or SetWindowTextW calls. In other words, it does not implement a usleep or similar delay upon processing a title change.
|
[] | null | null | null | null | null |
|
GHSA-hrqq-x4q8-f6c2
|
The United Hawk Nation (aka com.united12thman) application 2.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
|
[] | null | null | null | null | null |
|
GHSA-v2pp-pjq5-47rj
|
Windows Print Spooler Elevation of Privilege Vulnerability
|
[] | null | 7.3
| null | null | null |
|
GHSA-hw6h-46jp-34wm
|
The Coolpad Defiant (Coolpad/cp3632a/cp3632a:7.1.1/NMF26F/099480857:user/release-keys) and the T-Mobile Revvl Plus (Coolpad/alchemy/alchemy:7.1.1/143.14.171129.3701A-TMO/buildf_nj_02-206:user/release-keys) Android devices contain a pre-installed platform app with a package name of com.qualcomm.qti.telephony.extcarrierpack (versionCode=25, versionName=7.1.1) containing an exported broadcast receiver app component named com.qualcomm.qti.telephony.extcarrierpack.UiccReceiver that allows any app co-located on the device to programmatically perform a factory reset. In addition, the app initiating the factory reset does not require any permissions. A factory reset will remove all user data and apps from the device. This will result in the loss of any data that have not been backed up or synced externally. The capability to perform a factory reset is not directly available to third-party apps (those that the user installs themselves with the exception of enabled Mobile Device Management (MDM) apps), although this capability can be obtained by leveraging an unprotected app component of a pre-installed platform app.
|
[] | null | null | 7.5
| null | null |
|
GHSA-qj6q-34pj-64w4
|
Cross-Site Request Forgery (CSRF) vulnerability in plainware PlainInventory allows Stored XSS. This issue affects PlainInventory: from n/a through 3.1.9.
|
[] | null | 7.1
| null | null | null |
|
RHSA-2022:0270
|
Red Hat Security Advisory: polkit security update
|
polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector
|
[
"cpe:/o:redhat:rhel_aus:7.3::server"
] | null | 7.8
| null | null | null |
CVE-2023-43197
|
D-Link device DI-7200GV2.E1 v21.04.09E1 was discovered to contain a stack overflow via the fn parameter in the tgfile.asp function.
|
[
"cpe:2.3:a:d-link:di-7200gv2.e1:*:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:di-7200g_firmware:21.04.09e1:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:di-7200g:2.e1:*:*:*:*:*:*:*"
] | null | 9.8
| null | null | null |
|
GHSA-rm7f-f74m-5fjv
|
Vulnerability in the MySQL Client product of Oracle MySQL (component: Client: mysqldump). Supported versions that are affected are 8.0.0-8.0.42, 8.4.0-8.4.5 and 9.0.0-9.3.0. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Client accessible data as well as unauthorized read access to a subset of MySQL Client accessible data. CVSS 3.1 Base Score 3.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:N).
|
[] | null | 3.1
| null | null | null |
|
GHSA-vm4g-rwpv-cp8x
|
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
|
[] | null | null | null | null | null |
|
GHSA-gcq5-qc75-mh9g
|
A vulnerability, which was classified as critical, has been found in FoxCMS up to 1.2.5. This issue affects the function batchCope of the file app/admin/controller/Download.php. The manipulation of the argument ids leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
|
[] | 2.1
| 6.3
| null | null | null |
|
CVE-2022-48880
|
platform/surface: aggregator: Add missing call to ssam_request_sync_free()
|
In the Linux kernel, the following vulnerability has been resolved:
platform/surface: aggregator: Add missing call to ssam_request_sync_free()
Although rare, ssam_request_sync_init() can fail. In that case, the
request should be freed via ssam_request_sync_free(). Currently it is
leaked instead. Fix this.
|
[] | null | 5.5
| null | null | null |
RHSA-2022:6750
|
Red Hat Security Advisory: Red Hat OpenStack Platform (openstack-barbican) security update
|
openstack-barbican: access policy bypass via query string injection
|
[
"cpe:/a:redhat:openstack:13::el7",
"cpe:/a:redhat:openstack:16.1::el8",
"cpe:/a:redhat:openstack:16.2::el8",
"cpe:/a:redhat:openstack:17.0::el9"
] | null | 7.1
| null | null | null |
RHSA-2012:1174
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: unfiltered netdev rio_ioctl access by users
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null | null |
CVE-2024-9356
|
Yotpo: Product & Photo Reviews for WooCommerce <= 1.7.8 - Reflected Cross-Site Scripting
|
The Yotpo: Product & Photo Reviews for WooCommerce plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'yotpo_user_email' and 'yotpo_user_name' parameters in all versions up to, and including, 1.7.8 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
|
[
"cpe:2.3:a:yotpo:yotpo:*:*:*:*:*:wordpress:*:*"
] | null | 6.1
| null | null | null |
CVE-2020-2940
|
Vulnerability in the Oracle Financial Services Profitability Management product of Oracle Financial Services Applications (component: User Interface). Supported versions that are affected are 8.0.6 and 8.0.7. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Financial Services Profitability Management. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Financial Services Profitability Management accessible data as well as unauthorized read access to a subset of Oracle Financial Services Profitability Management accessible data. CVSS 3.0 Base Score 7.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N).
|
[
"cpe:2.3:a:oracle:financial_services_profitability_management:8.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:financial_services_profitability_management:8.0.7:*:*:*:*:*:*:*"
] | null | null | 7.1
| null | null |
|
GHSA-6qjm-m8fp-j2mm
|
In PHP versions 7.1.x below 7.1.33, 7.2.x below 7.2.24 and 7.3.x below 7.3.11 in certain configurations of FPM setup it is possible to cause FPM module to write past allocated buffers into the space reserved for FCGI protocol data, thus opening the possibility of remote code execution.
|
[] | null | 9.8
| null | null | null |
|
CVE-2020-26549
|
An issue was discovered in Aviatrix Controller before R5.4.1290. The htaccess protection mechanism to prevent requests to directories can be bypassed for file downloading.
|
[
"cpe:2.3:a:aviatrix:controller:5.3.1516:*:*:*:*:*:*:*"
] | null | 7.5
| null | 5
| null |
|
CVE-2019-20662
|
Certain NETGEAR devices are affected by stored XSS. This affects RBR50 before 2.3.5.30, RBS50 before 2.3.5.30, and RBK50 before 2.3.5.30.
|
[
"cpe:2.3:o:netgear:rbr50_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbr50:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbk50_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbk50:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbs50_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbs50:-:*:*:*:*:*:*:*"
] | null | null | 6
| null | null |
|
CVE-2002-0595
|
Buffer overflow in WTRS_UI.EXE (WTX_REMOTE.DLL) for WebTrends Reporting Center 4.0d allows remote attackers to execute arbitrary code via a long HTTP GET request to the /reports/ directory.
|
[
"cpe:2.3:a:webtrends:reporting_center:4.0d:*:*:*:*:*:*:*"
] | null | null | null | 7.5
| null |
|
GHSA-cchf-xm65-f24c
|
An out-of-bounds write vulnerability exists in the ma_dr_flac__decode_samples__lpc functionality of Miniaudio miniaudio v0.11.21. A specially crafted .flac file can lead to memory corruption. An attacker can provide a malicious file to trigger this vulnerability.
|
[] | null | 7.7
| null | null | null |
|
GHSA-cj2m-cm8v-5rvp
|
A potential buffer overflow in the software drivers for certain HP LaserJet products and Samsung product printers could lead to an escalation of privilege.
|
[] | null | null | null | null | null |
|
RHSA-2022:5152
|
Red Hat Security Advisory: Red Hat OpenShift GitOps security update
|
argocd: vulnerable to an uncontrolled memory consumption bug argocd: vulnerable to a variety of attacks when an SSO login is initiated from the Argo CD CLI or the UI. argocd: cross-site scripting (XSS) allow a malicious user to inject a javascript link in the UI argocd: vulnerable to a symlink following bug allowing a malicious user with repository write access
|
[
"cpe:/a:redhat:openshift_gitops:1.5::el8"
] | null | 4.3
| null | null | null |
GHSA-w78j-w263-gjwc
|
D-Link DAP-2622 DDP Set IPv6 Address Auth Username Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DAP-2622 routers. Authentication is not required to exploit this vulnerability.The specific flaw exists within the DDP service. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-20092.
|
[] | null | null | 8.8
| null | null |
|
CVE-2021-25909
|
ZIV AUTOMATION 4CCT Denial of Service vulnerability
|
ZIV Automation 4CCT-EA6-334126BF firmware version 3.23.80.27.36371, allows an unauthenticated, remote attacker to cause a denial of service condition on the device. An attacker could exploit this vulnerability by sending specific packets to the port 7919.
|
[
"cpe:2.3:o:zivautomation:4cct-ea6-334126bf_firmware:3.23.80.27.36371:*:*:*:*:*:*:*",
"cpe:2.3:h:zivautomation:4cct-ea6-334126bf:-:*:*:*:*:*:*:*"
] | null | 8.6
| null | null | null |
CVE-2006-0993
|
The web management interface in 3Com TippingPoint SMS Server before 2.2.1.4478 does not restrict access to certain directories, which might allow remote attackers to obtain potentially sensitive information such as configuration settings.
|
[
"cpe:2.3:h:3com:tippingpoint_sms_server:*:*:*:*:*:*:*:*"
] | null | null | null | 5
| null |
|
GHSA-xvwh-qhvg-2jjx
|
While processing QCA_NL80211_VENDOR_SUBCMD_AVOID_FREQUENCY vendor command, driver does not validate the data obtained from the user space which could be invalid and thus leads to an undesired behaviour in Snapdragon Auto, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile in MDM9206, MDM9607, MSM8996AU, QCA6174A, QCA6574AU, QCA9377, QCA9379, QCS605, SD 600, SD 625, SD 636, SD 665, SD 675, SD 712 / SD 710 / SD 670, SD 730, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SDM630, SDM660, SDX24
|
[] | null | 7.8
| null | null | null |
|
GHSA-47cg-g52g-mrm5
|
AudioSource.cpp in libstagefright in mediaserver in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-06-01 does not initialize certain data, which allows attackers to obtain sensitive information via a crafted application, aka internal bug 27855172.
|
[] | null | null | 5.5
| null | null |
|
CVE-2019-20901
|
The login.jsp resource in Jira before version 8.5.2, and from version 8.6.0 before version 8.6.1 allows remote attackers to redirect users to a different website which they may use as part of performing a phishing attack via an open redirect in the os_destination parameter.
|
[
"cpe:2.3:a:atlassian:jira:*:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:jira_server:8.6.0:*:*:*:*:*:*:*"
] | null | 6.1
| null | 5.8
| null |
|
CVE-2023-3861
|
phpscriptpoint Insurance search.php cross site scripting
|
A vulnerability was found in phpscriptpoint Insurance 1.2. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /search.php. The manipulation leads to cross site scripting. The attack can be launched remotely. The identifier VDB-235213 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
|
[
"cpe:2.3:a:phpscriptpoint:insurance:1.2:*:*:*:*:*:*:*"
] | null | 3.5
| 3.5
| 4
| null |
CVE-2017-8251
|
In all Qualcomm products with Android releases from CAF using the Linux kernel, in functions msm_isp_check_stream_cfg_cmd & msm_isp_stats_update_cgc_override, 'stream_cfg_cmd->num_streams' is not checked, and could overflow the array stream_cfg_cmd->stream_handle.
|
[
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*"
] | null | null | 7.8
| 6.8
| null |
|
GHSA-779v-fq79-fc94
|
Unspecified vulnerability in ipmitool for Sun Fire X2100M2 and X2200M2 allows local users to gain privileges and reset or turn off the server.
|
[] | null | null | null | null | null |
|
GHSA-2999-fgm6-2cf3
|
The Houzez Theme - Functionality plugin for WordPress is vulnerable to SQL Injection via the ‘currency_code’ parameter in all versions up to, and including, 3.2.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Custom-level (seller) access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
|
[] | null | 8.8
| null | null | null |
|
CVE-2022-48317
|
Insecure Termination of RestAPI Session Tokens
|
Expired sessions were not securely terminated in the RestAPI for Tribe29's Checkmk <= 2.1.0p10 and Checkmk <= 2.0.0p28 allowing an attacker to use expired session tokens when communicating with the RestAPI.
|
[
"cpe:2.3:a:checkmk:checkmk:2.1.0:-:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:b1:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:b2:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:b3:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:b4:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:b5:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:b6:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:b7:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:b8:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:b9:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p1:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p10:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p2:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p3:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p4:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p5:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p6:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p7:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p8:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p9:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.0.0:-:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.0.0:b1:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.0.0:b2:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.0.0:b3:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.0.0:b4:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.0.0:b5:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.0.0:b6:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.0.0:b7:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.0.0:b8:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.0.0:i1:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.0.0:p1:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.0.0:p10:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.0.0:p11:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.0.0:p12:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.0.0:p13:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.0.0:p14:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.0.0:p15:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.0.0:p16:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.0.0:p17:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.0.0:p18:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.0.0:p19:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.0.0:p2:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.0.0:p20:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.0.0:p21:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.0.0:p22:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.0.0:p23:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.0.0:p24:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.0.0:p25:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.0.0:p26:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.0.0:p27:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.0.0:p28:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.0.0:p3:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.0.0:p4:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.0.0:p5:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.0.0:p6:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.0.0:p7:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.0.0:p8:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.0.0:p9:*:*:*:*:*:*"
] | null | 5.6
| null | null | null |
CVE-2021-1728
|
System Center Operations Manager Elevation of Privilege Vulnerability
|
System Center Operations Manager Elevation of Privilege Vulnerability
|
[
"cpe:2.3:a:microsoft:system_center_operations_manager:2019:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:system_center_operations_manager:2019:-:*:*:*:*:*:*"
] | null | 8.8
| null | null | null |
ICSA-13-106-01
|
MatrikonOPC Multiple Product Vulnerabilities
|
The configuration utility in MatrikonOPC Security Gateway 1.0 allows remote attackers to cause a denial of service (unhandled exception and application crash) via a TCP RST packet. Directory traversal vulnerability in the web interface in the Health Monitor service in MatrikonOPC A&E Historian 1.0.0.0 allows remote attackers to read and delete arbitrary files via a crafted URL.
|
[] | null | null | null | null | null |
RHEA-2025:2427
|
Red Hat Enhancement Advisory: microcode_ctl bug fix and enhancement update
|
microcode_ctl: Improper input validation in UEFI firmware microcode_ctl: Improper input validation in UEFI firmware microcode_ctl: Improper input validation in XmlCli feature for UEFI firmware microcode_ctl: Improper input validation in UEFI firmware microcode_ctl: Improper input validation in UEFI firmware CseVariableStorageSmm
|
[
"cpe:/o:redhat:rhel_els:7"
] | null | 7.5
| null | null | null |
CVE-2019-7024
|
Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
|
[
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | null | 7.5
| 5
| null |
|
GHSA-h6h3-xvvr-7qpw
|
The Cherry Flare S7 Android device with a build fingerprint of Cherry_Mobile/Flare_S7_Deluxe/Flare_S7_Deluxe:8.1.0/O11019/1533920920:user/release-keys contains a pre-installed app with a package name of com.mediatek.wfo.impl app (versionCode=27, versionName=8.1.0) that allows any app co-located on the device to modify a system property through an exported interface without proper authorization.
|
[] | null | null | null | null | null |
|
CVE-2002-1296
|
Directory traversal vulnerability in priocntl system call in Solaris does allows local users to execute arbitrary code via ".." sequences in the pc_clname field of a pcinfo_t structure, which cause priocntl to load a malicious kernel module.
|
[
"cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:7.0:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:8.0:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:9.0:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*"
] | null | null | null | 7.2
| null |
|
CVE-2005-3735
|
Multiple SQL injection vulnerabilities in e-Quick Cart allow remote attackers to execute arbitrary SQL commands via the (1) productid parameter in shopaddtocart.asp, (2) strpemail parameter in shopprojectlogin.asp, and (3) id parameter in shoptellafriend.asp.
|
[
"cpe:2.3:a:coastal_data_management:e-quick_cart:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5
| null |
|
CVE-2018-5486
|
NetApp OnCommand Unified Manager for Linux versions 7.2 though 7.3 ship with the Java Debug Wire Protocol (JDWP) enabled which allows unauthorized local attackers to execute arbitrary code.
|
[
"cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"
] | null | null | 7.8
| 4.6
| null |
|
GHSA-cgcw-rg8c-h26h
|
A Use of Hard-coded Credentials issue was discovered in Smiths Medical Medfusion 4000 Wireless Syringe Infusion Pump, Version 1.1, 1.5, and 1.6. The FTP server on the pump contains hardcoded credentials, which are not fully initialized. The FTP server is only accessible if the pump is configured to allow FTP connections.
|
[] | null | null | 8.1
| null | null |
|
GHSA-jv6q-f63c-9wf2
|
A potential security vulnerability has been identified in Integrated Lights-Out 4 (iLO 4). The vulnerability could allow remote Denial of Service. The vulnerability is resolved in Integrated Lights-Out 4 (iLO 4) 2.80 and later.
|
[] | null | 7.5
| null | null | null |
|
CVE-2024-41023
|
sched/deadline: Fix task_struct reference leak
|
In the Linux kernel, the following vulnerability has been resolved:
sched/deadline: Fix task_struct reference leak
During the execution of the following stress test with linux-rt:
stress-ng --cyclic 30 --timeout 30 --minimize --quiet
kmemleak frequently reported a memory leak concerning the task_struct:
unreferenced object 0xffff8881305b8000 (size 16136):
comm "stress-ng", pid 614, jiffies 4294883961 (age 286.412s)
object hex dump (first 32 bytes):
02 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 .@..............
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
debug hex dump (first 16 bytes):
53 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 S...............
backtrace:
[<00000000046b6790>] dup_task_struct+0x30/0x540
[<00000000c5ca0f0b>] copy_process+0x3d9/0x50e0
[<00000000ced59777>] kernel_clone+0xb0/0x770
[<00000000a50befdc>] __do_sys_clone+0xb6/0xf0
[<000000001dbf2008>] do_syscall_64+0x5d/0xf0
[<00000000552900ff>] entry_SYSCALL_64_after_hwframe+0x6e/0x76
The issue occurs in start_dl_timer(), which increments the task_struct
reference count and sets a timer. The timer callback, dl_task_timer,
is supposed to decrement the reference count upon expiration. However,
if enqueue_task_dl() is called before the timer expires and cancels it,
the reference count is not decremented, leading to the leak.
This patch fixes the reference leak by ensuring the task_struct
reference count is properly decremented when the timer is canceled.
|
[] | null | 5.5
| null | null | null |
GHSA-vxfx-q6cx-2vqm
|
The pstm_exptmod function in MatrixSSL before 3.8.4 allows remote attackers to cause a denial of service (invalid free and crash) via a base zero value for the modular exponentiation.
|
[] | null | null | 7.5
| null | null |
|
GHSA-vf3j-xp87-c8f3
|
DHCP Server Service Remote Code Execution Vulnerability
|
[] | null | 7.2
| null | null | null |
|
GHSA-j9pm-x686-vcvp
|
Apache Traffic Server 9.0.0 is vulnerable to a remote DOS attack on the experimental Slicer plugin.
|
[] | null | null | null | null | null |
|
GHSA-557r-rm2w-qvrj
|
In the Linux kernel, the following vulnerability has been resolved:usb: gadget: configfs: Prevent OOB read/write in usb_string_copy()Userspace provided string 's' could trivially have the length zero. Left
unchecked this will firstly result in an OOB read in the form
`if (str[0 - 1] == '\n') followed closely by an OOB write in the form
`str[0 - 1] = '\0'`.There is already a validating check to catch strings that are too long.
Let's supply an additional check for invalid strings that are too short.
|
[] | null | 5.5
| null | null | null |
|
CVE-2025-37102
|
Authenticated Command Injection Vulnerability In Instant On Command Line Interface
|
An authenticated command injection vulnerability exists in the Command line interface of HPE Networking Instant On Access Points.
A successful exploitation could allow a remote attacker with elevated privileges to execute arbitrary commands on the underlying operating system as a highly privileged user.
|
[] | null | 7.2
| null | null | null |
CVE-2016-2385
|
Heap-based buffer overflow in the encode_msg function in encode_msg.c in the SEAS module in Kamailio (formerly OpenSER and SER) before 4.3.5 allows remote attackers to cause a denial of service (memory corruption and process crash) or possibly execute arbitrary code via a large SIP packet.
|
[
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:kamailio:kamailio:*:*:*:*:*:*:*:*"
] | null | null | 9.8
| 10
| null |
|
CVE-2017-9556
|
Cross-site scripting (XSS) vulnerability in Video Metadata Editor in Synology Video Station before 2.3.0-1435 allows remote authenticated attackers to inject arbitrary web script or HTML via the title parameter.
|
[
"cpe:2.3:a:synology:video_station:*:*:*:*:*:*:*:*"
] | null | null | 5.4
| 3.5
| null |
|
cisco-sa-iosxe-ewlc-dos-TkuPVmZN
|
Cisco IOS XE Software Catalyst 9800 Series Wireless Controllers Denial of Service Vulnerability
|
A vulnerability in the locally significant certificate (LSC) provisioning feature of Cisco Catalyst 9800 Series Wireless Controllers that are running Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a memory leak that could lead to a denial of service (DoS) condition.
The vulnerability is due to incorrect processing of certain public key infrastructure (PKI) packets. An attacker could exploit this vulnerability by sending crafted Secure Sockets Layer (SSL) packets to an affected device. A successful exploit could cause an affected device to continuously consume memory, which could result in a memory allocation failure that leads to a crash and causes a DoS condition.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-ewlc-dos-TkuPVmZN ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-ewlc-dos-TkuPVmZN"]
This advisory is part of the June 3, 2020, release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication, which includes 23 Cisco Security Advisories that describe 25 vulnerabilities. For a complete list of the advisories and links to them, see Cisco Event Response: June 2020 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication [" https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-73388"].
|
[] | null | null | 8.6
| null | null |
GHSA-w7fp-868g-8q36
|
An issue was discovered in Aviatrix Controller before R6.0.2483. Several APIs contain functions that allow arbitrary files to be uploaded to the web tree.
|
[] | null | null | null | null | null |
|
GHSA-gh2h-p4rv-mq4g
|
An issue was discovered in ext/standard/link_win32.c in PHP before 5.6.37, 7.0.x before 7.0.31, 7.1.x before 7.1.20, and 7.2.x before 7.2.8. The linkinfo function on Windows doesn't implement the open_basedir check. This could be abused to find files on paths outside of the allowed directories.
|
[] | null | null | 7.5
| null | null |
|
GHSA-pwjp-7cv7-53xh
|
IBM DB2 10.5 before FP4 on Linux and AIX creates temporary files during CDE table LOAD operations, which allows local users to obtain sensitive information by reading a file while a LOAD is occurring.
|
[] | null | null | null | null | null |
|
GHSA-cw43-gf6h-h33v
|
Certain NETGEAR devices are affected by authentication bypass. This affects RBW30 before 2.6.2.2, RBS40V before 2.6.2.4, RBK852 before 3.2.17.12, RBK853 before 3.2.17.12, RBK854 before 3.2.17.12, RBR850 before 3.2.17.12, RBS850 before 3.2.17.12, RBK752 before 3.2.17.12, RBK753 before 3.2.17.12, RBK753S before 3.2.17.12, RBK754 before 3.2.17.12, RBR750 before 3.2.17.12, and RBS750 before 3.2.17.12.
|
[] | null | 9.6
| null | null | null |
|
GHSA-qgfg-gvff-523v
|
python-glanceclient vulnerable to SSL server spoofing due to unverified X.509 certificate
|
The Python client library for Glance (python-glanceclient) before 0.10.0 does not properly check the preverify_ok value, which prevents the server hostname from being verified with a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate and allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
|
[] | 8.7
| 7.5
| null | null | null |
GHSA-vg74-mq69-rh74
|
In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Automobile and Snapdragon Mobile SD 425, SD 430, SD 450, SD 625, SD 650/52, SD 820, and SD 820A, no address argument validation is performed on calls to the qsee_get_secure_state syscall.
|
[] | null | null | 9.8
| null | null |
|
GHSA-26pq-368c-c8f2
|
Format string vulnerability in the foreign_option function in options.c for OpenVPN 2.0.x allows remote clients to execute arbitrary code via format string specifiers in a push of the dhcp-option command option.
|
[] | null | null | null | null | null |
|
CVE-2007-1646
|
Multiple cross-site scripting (XSS) vulnerabilities in SubHub 2.3.0 allow remote attackers to inject arbitrary web script or HTML via (1) the searchtext parameter to (a) /search, or the (2) message parameter to (b) /calendar or (c) /subscribe.
|
[
"cpe:2.3:a:subhub:subhub:2.3.0:*:*:*:*:*:*:*"
] | null | null | null | 4.3
| null |
|
RHSA-2024:0216
|
Red Hat Security Advisory: Red Hat OpenStack Platform 17.1 (openstack-tripleo-common) security update
|
openstack/kolla: sudo privilege escalation vulnerability
|
[
"cpe:/a:redhat:openstack:17.1::el9"
] | null | 7.8
| null | null | null |
CVE-2020-12801
|
Crash-recovered MSOffice encrypted documents defaulted to not to using encryption on next save
|
If LibreOffice has an encrypted document open and crashes, that document is auto-saved encrypted. On restart, LibreOffice offers to restore the document and prompts for the password to decrypt it. If the recovery is successful, and if the file format of the recovered document was not LibreOffice's default ODF file format, then affected versions of LibreOffice default that subsequent saves of the document are unencrypted. This may lead to a user accidentally saving a MSOffice file format document unencrypted while believing it to be encrypted. This issue affects: LibreOffice 6-3 series versions prior to 6.3.6; 6-4 series versions prior to 6.4.3.
|
[
"cpe:2.3:a:libreoffice:libreoffice:*:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"
] | null | 5.3
| null | 5
| null |
GHSA-8ccc-fwhg-hphw
|
PHP remote file inclusion vulnerability in includes/global.php in Joshua Wilson pNews System 1.1.0 (aka PowerNews) allows remote attackers to execute arbitrary PHP code via a URL in the nbs parameter.
|
[] | null | null | null | null | null |
|
GHSA-952h-ff56-x6g3
|
The JobMonster Theme was vulnerable to Directory Listing in the /wp-content/uploads/jobmonster/ folder, as it did not include a default PHP file, or .htaccess file. This could expose personal data such as people's resumes. Although Directory Listing can be prevented by securely configuring the web server, vendors can also take measures to make it less likely to happen.
|
[] | null | 5.3
| null | null | null |
|
GHSA-2w63-2fpg-6vg2
|
Rejected reason: Not used
|
[] | null | null | null | null | null |
|
GHSA-q2vv-3q42-xrpx
|
ConsoleServlet in Symantec Endpoint Protection Manager (SEPM) 12.1 before RU5 allows remote attackers to write to arbitrary files via unspecified vectors.
|
[] | null | null | null | null | null |
|
GHSA-wmhp-g4mm-69rg
|
Missing Authorization vulnerability in By Averta Shortcodes and extra features for Phlox theme allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Shortcodes and extra features for Phlox theme: from n/a through 2.17.2.
|
[] | null | 4.3
| null | null | null |
|
CVE-2024-53128
|
sched/task_stack: fix object_is_on_stack() for KASAN tagged pointers
|
In the Linux kernel, the following vulnerability has been resolved:
sched/task_stack: fix object_is_on_stack() for KASAN tagged pointers
When CONFIG_KASAN_SW_TAGS and CONFIG_KASAN_STACK are enabled, the
object_is_on_stack() function may produce incorrect results due to the
presence of tags in the obj pointer, while the stack pointer does not have
tags. This discrepancy can lead to incorrect stack object detection and
subsequently trigger warnings if CONFIG_DEBUG_OBJECTS is also enabled.
Example of the warning:
ODEBUG: object 3eff800082ea7bb0 is NOT on stack ffff800082ea0000, but annotated.
------------[ cut here ]------------
WARNING: CPU: 0 PID: 1 at lib/debugobjects.c:557 __debug_object_init+0x330/0x364
Modules linked in:
CPU: 0 UID: 0 PID: 1 Comm: swapper/0 Not tainted 6.12.0-rc5 #4
Hardware name: linux,dummy-virt (DT)
pstate: 600000c5 (nZCv daIF -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : __debug_object_init+0x330/0x364
lr : __debug_object_init+0x330/0x364
sp : ffff800082ea7b40
x29: ffff800082ea7b40 x28: 98ff0000c0164518 x27: 98ff0000c0164534
x26: ffff800082d93ec8 x25: 0000000000000001 x24: 1cff0000c00172a0
x23: 0000000000000000 x22: ffff800082d93ed0 x21: ffff800081a24418
x20: 3eff800082ea7bb0 x19: efff800000000000 x18: 0000000000000000
x17: 00000000000000ff x16: 0000000000000047 x15: 206b63617473206e
x14: 0000000000000018 x13: ffff800082ea7780 x12: 0ffff800082ea78e
x11: 0ffff800082ea790 x10: 0ffff800082ea79d x9 : 34d77febe173e800
x8 : 34d77febe173e800 x7 : 0000000000000001 x6 : 0000000000000001
x5 : feff800082ea74b8 x4 : ffff800082870a90 x3 : ffff80008018d3c4
x2 : 0000000000000001 x1 : ffff800082858810 x0 : 0000000000000050
Call trace:
__debug_object_init+0x330/0x364
debug_object_init_on_stack+0x30/0x3c
schedule_hrtimeout_range_clock+0xac/0x26c
schedule_hrtimeout+0x1c/0x30
wait_task_inactive+0x1d4/0x25c
kthread_bind_mask+0x28/0x98
init_rescuer+0x1e8/0x280
workqueue_init+0x1a0/0x3cc
kernel_init_freeable+0x118/0x200
kernel_init+0x28/0x1f0
ret_from_fork+0x10/0x20
---[ end trace 0000000000000000 ]---
ODEBUG: object 3eff800082ea7bb0 is NOT on stack ffff800082ea0000, but annotated.
------------[ cut here ]------------
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | 5.5
| null | null | null |
GHSA-r8jx-rgwf-cw4w
|
Buffer overflow in krshd in Kerberos 5 allows remote attackers to gain root privileges.
|
[] | null | null | null | null | null |
|
GHSA-wqp8-4rw9-285h
|
Missing Authorization vulnerability in Pravin Durugkar User Sync ActiveCampaign allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects User Sync ActiveCampaign: from n/a through 1.3.2.
|
[] | null | 5.4
| null | null | null |
|
CVE-2024-38459
|
langchain_experimental (aka LangChain Experimental) before 0.0.61 for LangChain provides Python REPL access without an opt-in step. NOTE; this issue exists because of an incomplete fix for CVE-2024-27444.
|
[
"cpe:2.3:a:langchain:langchain_experimental:-:*:*:*:*:*:*:*"
] | null | 7.8
| null | null | null |
|
CVE-2024-8620
|
MapPress Maps for WordPress < 2.93 - Admin+ Stored XSS via Map Settings
|
The MapPress Maps for WordPress plugin before 2.93 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
|
[] | null | 4.8
| null | null | null |
GHSA-j2vh-3cxm-9w22
|
Dell ThinOS 10, versions prior to 2508_10.0127, contains an Unverified Ownership vulnerability. A local low-privileged attacker could potentially exploit this vulnerability leading to Unauthorized Access.
|
[] | null | 7.8
| null | null | null |
|
GHSA-9r3m-57qh-73fc
|
ext/wddx/wddx.c in PHP before 5.6.28 and 7.x before 7.0.13 allows remote attackers to cause a denial of service (NULL pointer dereference) via crafted serialized data in a wddxPacket XML document, as demonstrated by a PDORow string.
|
[] | null | null | 7.5
| null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.