id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 38
232
⌀ |
|---|---|---|---|---|---|---|---|---|
CVE-2018-2447
|
SAP BusinessObjects Business Intelligence (Launchpad Web Intelligence), version 4.2, allows an attacker to execute crafted InfoObject queries, exposing the CMS InfoObjects database.
|
[
"cpe:2.3:a:sap:businessobjects_business_intelligence:4.2:*:*:*:*:*:*:*"
] | null | null | 6.5
| 4
| null |
|
CVE-2009-1266
|
Unspecified vulnerability in Wireshark before 1.0.7 has unknown impact and attack vectors.
|
[
"cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.7.9:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.8.16:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.8.19:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.9.5:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.9.6:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.9.7:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.9.8:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.9.10:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.9.14:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.10.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.10.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.10.4:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.10.5:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.10.6:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.10.7:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.10.8:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.10.9:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.10.10:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.10.11:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.10.12:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.10.13:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.10.14:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.99:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.99.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.99.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.99.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.99.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.99.4:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.99.5:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.99.6:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.99.6a:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.99.7:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.99.8:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.0.6:*:*:*:*:*:*:*"
] | null | null | null | 10
| null |
|
GHSA-q68r-994w-38vq
|
The web interface of Gira Giersiepen Gira KNX/IP-Router 3.1.3683.0 and 3.3.8.0 allows a remote attacker to read sensitive files via directory-traversal sequences in the URL.
|
[] | null | 7.5
| null | null | null |
|
CVE-2023-43207
|
D-LINK DWL-6610 FW_v_4.3.0.8B003C was discovered to contain a command injection vulnerability in the function config_upload_handler. This vulnerability allows attackers to execute arbitrary commands via the configRestore parameter.
|
[
"cpe:2.3:o:dlink:dwl-6610ap_firmware:4.3.0.8b003c:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dwl-6610ap:-:*:*:*:*:*:*:*"
] | null | 8
| null | null | null |
|
GHSA-mm48-wj9h-vg49
|
Protection mechanism failure in Microsoft Edge (Chromium-based) allows an unauthorized attacker to execute code over a network.
|
[] | null | 6.3
| null | null | null |
|
GHSA-cjrc-87qf-22gg
|
TOTOLINK X6000R v9.4.0cu.652_B20230116 was discovered to contain a remote command execution (RCE) vulnerability via the sub_ The 41A414 function.
|
[] | null | 9.8
| null | null | null |
|
GHSA-m2g9-986c-m53w
|
IBM Security QRadar SIEM 7.2 before 7.2.3 Patch 1 does not properly handle SSH connections, which allows remote attackers to obtain sensitive cleartext information by sniffing the network.
|
[] | null | null | null | null | null |
|
GHSA-8cf2-pgv8-hqvm
|
The Bitcoin / Altcoin Faucet WordPress plugin through 1.6.0 does not have any CSRF check when saving its settings, allowing attacker to make a logged in admin change them via a CSRF attack. Furthermore, due to the lack of sanitisation and escaping, it could also lead to Stored Cross-Site Scripting issues
|
[] | null | 5.4
| null | null | null |
|
ICSA-22-109-03
|
FANUC ROBOGUIDE Simulation Platform
|
The affected product is vulnerable to misconfigured binaries, allowing users on the target PC with SYSTEM level privileges access to overwrite the binary and modify files to gain privilege escalation.CVE-2021-38483 has been assigned to this vulnerability. A CVSS v3 base score of 6.0 has been calculated; the CVSS vector string is (AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:H). The setup program for the affected product configures its files and folders with full access, which may allow unauthorized users permission to replace original binaries and achieve privilege escalation.CVE-2021-43986 has been assigned to this vulnerability. A CVSS v3 base score of 6.0 has been calculated; the CVSS vector string is (AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:H). The affected product is vulnerable to a network-based attack by threat actors utilizing crafted naming conventions of files to gain unauthorized access rights.CVE-2021-43988 has been assigned to this vulnerability. A CVSS v3 base score of 6.1 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:N/A:H). The affected product is vulnerable to a network-based attack by threat actors supplying a crafted, malicious XML payload designed to trigger an external entity reference call.CVE-2021-43990 has been assigned to this vulnerability. A CVSS v3 base score of 6.1 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:N/A:H). The affected product is vulnerable to a network-based attack by threat actors sending unimpeded requests to the receiving server, which could cause a denial-of-service condition due to lack of heap memory resources.CVE-2021-43933 has been assigned to this vulnerability. A CVSS v3 base score of 6.1 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:N/A:H).
|
[] | null | null | 6.1
| null | null |
GHSA-cg4j-xgw8-xrvj
|
Multiple Cross-Site Request Forgery vulnerabilities in All-In-One Security (AIOS) – Security and Firewall (WordPress plugin) <= 5.1.0 on WordPress.
|
[] | null | 8.8
| null | null | null |
|
CVE-2024-33942
|
WordPress Google Typography plugin <= 1.1.2 - Broken Access Control vulnerability
|
Missing Authorization vulnerability in Eric Alli Google Typography.This issue affects Google Typography: from n/a through 1.1.2.
|
[] | null | 4.3
| null | null | null |
GHSA-vq5p-c2v7-53v5
|
A vulnerability has been found in itwanger paicoding 1.0.0/1.0.1/1.0.2/1.0.3 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /paicoding-core/src/main/java/com/github/paicoding/forum/core/util/CrossUtil.java. The manipulation leads to permissive cross-domain policy with untrusted domains. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used.
|
[] | 2.3
| 3.1
| null | null | null |
|
CVE-2019-4593
|
IBM QRadar 7.3.0 to 7.3.3 Patch 2 generates an error message that includes sensitive information that could be used in further attacks against the system. IBM X-ForceID: 167743.
|
[
"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.3:-:*:*:*:*:*:*",
"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.3:p1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"
] | null | null | 4.3
| null | null |
|
GHSA-xc42-4qwg-572q
|
RLE Nova-Wind Turbine HMI devices store cleartext credentials, which allows remote attackers to obtain sensitive information via unspecified vectors.
|
[] | null | null | null | null | null |
|
GHSA-mj99-7g8m-f698
|
SQL injection vulnerability in the CallManager Interactive Voice Response (CMIVR) interface in Cisco Unified Communications Manager (UCM) allows remote attackers to execute arbitrary SQL commands via a crafted URL, aka Bug ID CSCum05318.
|
[] | null | null | null | null | null |
|
CVE-2022-48772
|
media: lgdt3306a: Add a check against null-pointer-def
|
In the Linux kernel, the following vulnerability has been resolved:
media: lgdt3306a: Add a check against null-pointer-def
The driver should check whether the client provides the platform_data.
The following log reveals it:
[ 29.610324] BUG: KASAN: null-ptr-deref in kmemdup+0x30/0x40
[ 29.610730] Read of size 40 at addr 0000000000000000 by task bash/414
[ 29.612820] Call Trace:
[ 29.613030] <TASK>
[ 29.613201] dump_stack_lvl+0x56/0x6f
[ 29.613496] ? kmemdup+0x30/0x40
[ 29.613754] print_report.cold+0x494/0x6b7
[ 29.614082] ? kmemdup+0x30/0x40
[ 29.614340] kasan_report+0x8a/0x190
[ 29.614628] ? kmemdup+0x30/0x40
[ 29.614888] kasan_check_range+0x14d/0x1d0
[ 29.615213] memcpy+0x20/0x60
[ 29.615454] kmemdup+0x30/0x40
[ 29.615700] lgdt3306a_probe+0x52/0x310
[ 29.616339] i2c_device_probe+0x951/0xa90
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | 5.5
| null | null | null |
CVE-2020-27182
|
Multiple cross-site scripting (XSS) vulnerabilities in konzept-ix publiXone before 2020.015 allow remote attackers to inject arbitrary JavaScript or HTML via appletError.jsp, job_jacket_detail.jsp, ixedit/editor_component.jsp, or the login form.
|
[
"cpe:2.3:a:konzept-ix:publixone:*:*:*:*:*:*:*:*"
] | null | 6.1
| null | 4.3
| null |
|
GHSA-wq32-2pg5-3r7p
|
Memory corruption resulting in a potentially exploitable crash during WebGL functions using a vector constructor with a varying array within libGLES. This vulnerability affects Firefox < 50.1, Firefox ESR < 45.6, and Thunderbird < 45.6.
|
[] | null | null | 7.5
| null | null |
|
CVE-2015-1937
|
IBM PowerVC 1.2.0.x through 1.2.0.4, 1.2.1.x through 1.2.1.2, and 1.2.2.x through 1.2.2.2 does not require authentication for the ceilometer NoSQL database, which allows remote attackers to read or write to arbitrary database records, and consequently obtain administrator privileges, via a session on port 27017.
|
[
"cpe:2.3:a:ibm:powervc:1.2.0.0:*:*:*:express:*:*:*",
"cpe:2.3:a:ibm:powervc:1.2.0.0:*:*:*:standard:*:*:*",
"cpe:2.3:a:ibm:powervc:1.2.0.1:*:*:*:express:*:*:*",
"cpe:2.3:a:ibm:powervc:1.2.0.1:*:*:*:standard:*:*:*",
"cpe:2.3:a:ibm:powervc:1.2.0.2:*:*:*:express:*:*:*",
"cpe:2.3:a:ibm:powervc:1.2.0.2:*:*:*:standard:*:*:*",
"cpe:2.3:a:ibm:powervc:1.2.0.3:*:*:*:express:*:*:*",
"cpe:2.3:a:ibm:powervc:1.2.0.3:*:*:*:standard:*:*:*",
"cpe:2.3:a:ibm:powervc:1.2.0.4:*:*:*:express:*:*:*",
"cpe:2.3:a:ibm:powervc:1.2.0.4:*:*:*:standard:*:*:*",
"cpe:2.3:a:ibm:powervc:1.2.1.0:*:*:*:express:*:*:*",
"cpe:2.3:a:ibm:powervc:1.2.1.0:*:*:*:standard:*:*:*",
"cpe:2.3:a:ibm:powervc:1.2.1.1:*:*:*:express:*:*:*",
"cpe:2.3:a:ibm:powervc:1.2.1.2:*:*:*:express:*:*:*",
"cpe:2.3:a:ibm:powervc:1.2.1.2:*:*:*:standard:*:*:*",
"cpe:2.3:a:ibm:powervc:1.2.2.0:*:*:*:express:*:*:*",
"cpe:2.3:a:ibm:powervc:1.2.2.0:*:*:*:standard:*:*:*",
"cpe:2.3:a:ibm:powervc:1.2.2.1:*:*:*:express:*:*:*",
"cpe:2.3:a:ibm:powervc:1.2.2.1:*:*:*:standard:*:*:*",
"cpe:2.3:a:ibm:powervc:1.2.2.2:*:*:*:express:*:*:*",
"cpe:2.3:a:ibm:powervc:1.2.2.2:*:*:*:standard:*:*:*"
] | null | null | null | 7.5
| null |
|
GHSA-626w-hmpw-x74j
|
paypal/invoice-sdk-php reflected XSS
|
paypal/invoice-sdk-php is vulnerable to reflected XSS in samples/permissions.php via the permToken parameter, resulting in code execution.
|
[] | null | null | 5.4
| null | null |
CVE-2021-33913
|
libspf2 before 1.2.11 has a heap-based buffer overflow that might allow remote attackers to execute arbitrary code (via an unauthenticated e-mail message from anywhere on the Internet) with a crafted SPF DNS record, because of SPF_record_expand_data in spf_expand.c. The amount of overflowed data depends on the relationship between the length of an entire domain name and the length of its leftmost label. The vulnerable code may be part of the supply chain of a site's e-mail infrastructure (e.g., with additional configuration, Exim can use libspf2; the Postfix web site links to unofficial patches for use of libspf2 with Postfix; older versions of spfquery relied on libspf2) but most often is not.
|
[
"cpe:2.3:a:libspf2_project:libspf2:*:*:*:*:*:*:*:*"
] | null | 9.8
| null | 9.3
| null |
|
GHSA-f7f4-5w9j-23p2
|
festivaltts4r allows arbitrary command execution
|
The festivaltts4r gem for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in a string to the (1) `to_speech` or (2) `to_mp3` method in `lib/festivaltts4r/festival4r.rb`.
|
[] | null | null | 9.8
| null | null |
GHSA-23x8-g5mh-phmc
|
In the Linux kernel, the following vulnerability has been resolved:HID: i2c-hid: remove I2C_HID_READ_PENDING flag to prevent lock-upThe flag I2C_HID_READ_PENDING is used to serialize I2C operations.
However, this is not necessary, because I2C core already has its own
locking for that.More importantly, this flag can cause a lock-up: if the flag is set in
i2c_hid_xfer() and an interrupt happens, the interrupt handler
(i2c_hid_irq) will check this flag and return immediately without doing
anything, then the interrupt handler will be invoked again in an
infinite loop.Since interrupt handler is an RT task, it takes over the CPU and the
flag-clearing task never gets scheduled, thus we have a lock-up.Delete this unnecessary flag.
|
[] | null | 5.5
| null | null | null |
|
CVE-2021-30674
|
This issue was addressed with improved checks. This issue is fixed in iOS 14.6 and iPadOS 14.6. A malicious application may disclose restricted memory.
|
[
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"
] | null | 5.5
| null | 4.3
| null |
|
CVE-2023-49575
|
XSS vulnerability in VX Search Enterprise
|
A vulnerability has been discovered in VX Search Enterprise affecting version 10.2.14, in Sync Breeze Enterprise Server 10.4.18 version, and in Disk Pulse Enterprise 10.4.18 version, that could allow an attacker to execute persistent XSS through /setup_smtp in smtp_server, smtp_user, smtp_password and smtp_email_address parameters. This vulnerability could allow an attacker to store malicious JavaScript payloads on the system to be triggered when the page loads.
|
[] | null | 7.1
| null | null | null |
CVE-2017-0132
|
A remote code execution vulnerability exists in the way affected Microsoft scripting engines render when handling objects in memory in Microsoft browsers. These vulnerabilities could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited the vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. This vulnerability is different from those described in CVE-2017-0010, CVE-2017-0015, CVE-2017-0032, CVE-2017-0035, CVE-2017-0067, CVE-2017-0070, CVE-2017-0071, CVE-2017-0094, CVE-2017-0131, CVE-2017-0133, CVE-2017-0134, CVE-2017-0136, CVE-2017-0137, CVE-2017-0138, CVE-2017-0141, CVE-2017-0150, and CVE-2017-0151.
|
[
"cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*"
] | null | null | 7.5
| 7.6
| null |
|
GHSA-c258-vh6c-2m44
|
The Baseboard Management Controller(BMC) in HPE Cloudline CL5800 Gen9 Server; HPE Cloudline CL5200 Gen9 Server; HPE Cloudline CL4100 Gen10 Server; HPE Cloudline CL3100 Gen10 Server; HPE Cloudline CL5800 Gen10 Server BMC firmware has a local buffer overlfow in spx_restservice setradiusconfig_func function.
|
[] | null | null | null | null | null |
|
GHSA-fhgh-fjh9-vq62
|
Moodle allows remote authenticated users to cause a denial of service (invalid database records)
|
Moodle 2.0.x before 2.0.3 allows remote authenticated users to cause a denial of service (invalid database records) via a series of crafted comments operations.
|
[] | 4.9
| null | null | null | null |
GHSA-rfh3-642q-jvpx
|
Multiple exploitable buffer overflow vulnerabilities exist in the PubNub message handler for the "cc" channel of Insteon Hub running firmware version 1012. Specially crafted commands sent through the PubNub service can cause a stack-based buffer overflow overwriting arbitrary data. An attacker should send an authenticated HTTP request to trigger this vulnerability. In cmd s_b, at 0x9d016530, the value for the `grp` key is copied using `strcpy` to the buffer at `$sp+0x1b4`.This buffer is 8 bytes large, sending anything longer will cause a buffer overflow.
|
[] | null | 8.8
| null | null | null |
|
GHSA-rq93-8x3r-f79v
|
A Code Execution vulnerability exists in the memcpy function when processing AMF requests in Ezhometech EzServer 7.0, which could let a remote malicious user execute arbitrary code or cause a Denial of Service
|
[] | null | null | null | null | null |
|
CVE-2015-6748
|
Cross-site scripting (XSS) vulnerability in jsoup before 1.8.3.
|
[
"cpe:2.3:a:jsoup:jsoup:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
] | null | 6.1
| null | 4.3
| null |
|
CVE-2023-3009
|
Cross-site Scripting (XSS) - Stored in nilsteampassnet/teampass
|
Cross-site Scripting (XSS) - Stored in GitHub repository nilsteampassnet/teampass prior to 3.0.9.
|
[
"cpe:2.3:a:teampass:teampass:*:*:*:*:*:*:*:*"
] | null | null | 8.1
| null | null |
GHSA-j5fx-9h45-wv8q
|
Race condition in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges, and consequently read the contents of arbitrary kernel memory locations, via a crafted application, a different vulnerability than other CVEs listed in MS13-016.
|
[] | null | null | null | null | null |
|
CVE-2024-45547
|
Buffer Copy Without Checking Size of Input (`Classic Buffer Overflow`) in WLAN Windows Host
|
Memory corruption while processing IOCTL call invoked from user-space to verify non extension FIPS encryption and decryption functionality.
|
[
"cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:fastconnect_6900:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:fastconnect_7800:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcc2073_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcc2073:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcc2076_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcc2076:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sc8380xp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sc8380xp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8840_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8840:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8845_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8845:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8845h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8845h:-:*:*:*:*:*:*:*"
] | null | 7.8
| null | null | null |
PYSEC-2022-205
| null |
Waitress is a Web Server Gateway Interface server for Python 2 and 3. Waitress versions 2.1.0 and 2.1.1 may terminate early due to a thread closing a socket while the main thread is about to call select(). This will lead to the main thread raising an exception that is not handled and then causing the entire application to be killed. This issue has been fixed in Waitress 2.1.2 by no longer allowing the WSGI thread to close the socket. Instead, that is always delegated to the main thread. There is no work-around for this issue. However, users using waitress behind a reverse proxy server are less likely to have issues if the reverse proxy always reads the full response.
|
[] | null | null | null | null | null |
CVE-2008-7321
|
The tubepress plugin before 1.6.5 for WordPress has XSS.
|
[
"cpe:2.3:a:tubepress:tubepress:*:*:*:*:*:wordpress:*:*"
] | null | null | 6.1
| 4.3
| null |
|
GHSA-px72-8g3v-62xm
|
Acrobat Reader versions 24.005.20307, 24.001.30213, 24.001.30193, 20.005.30730, 20.005.30710 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[] | null | 5.5
| null | null | null |
|
CVE-2025-24956
|
A vulnerability has been identified in OpenV2G (All versions < V0.9.6). The OpenV2G EXI parsing feature is missing a length check when parsing X509 serial numbers. Thus, an attacker could introduce a buffer overflow that leads to memory corruption.
|
[] | 6.9
| 6.2
| null | null | null |
|
CVE-2024-38586
|
r8169: Fix possible ring buffer corruption on fragmented Tx packets.
|
In the Linux kernel, the following vulnerability has been resolved:
r8169: Fix possible ring buffer corruption on fragmented Tx packets.
An issue was found on the RTL8125b when transmitting small fragmented
packets, whereby invalid entries were inserted into the transmit ring
buffer, subsequently leading to calls to dma_unmap_single() with a null
address.
This was caused by rtl8169_start_xmit() not noticing changes to nr_frags
which may occur when small packets are padded (to work around hardware
quirks) in rtl8169_tso_csum_v2().
To fix this, postpone inspecting nr_frags until after any padding has been
applied.
|
[] | null | 7.8
| null | null | null |
CVE-2023-7023
|
Tongda OA 2017 delete.php sql injection
|
A vulnerability was found in Tongda OA 2017 up to 11.9. It has been rated as critical. Affected by this issue is some unknown functionality of the file general/vehicle/query/delete.php. The manipulation of the argument VU_ID leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 11.10 is able to address this issue. It is recommended to upgrade the affected component. VDB-248570 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
|
[
"cpe:2.3:a:tongda2000:office_anywhere_2017:*:*:*:*:*:*:*:*"
] | null | 6.3
| 6.3
| 6.5
| null |
GHSA-5gjg-jgh4-gppm
|
Websocket requests did not call AuthenticateMethod
|
ImpactDepending on implementation, a denial-of-service or privilege escalation vulnerability may occur in software that uses the `github.com/ecnepsnai/web` package with Web Sockets that have an AuthenticateMethod.The `AuthenticateMethod` is not called, and `UserData` will be nil in request methods. Attempts to read the `UserData` may result in a panic.This issue only affects web sockets where an `AuthenticateMethod` is supplied to the handle options. Users who do not use web sockets, or users who do not require authentication are not at risk.ExampleIn the example below, one would expect that the `AuthenticateMethod` function would be called for each request to `/example`However, the method is not called, and therefor the `UserData` parameter of the request object in the handle will be nil, when it would have been expected to be the `session` object we returned.PatchesRelease v1.5.2 fixes this vulnerability. The authenticate method is now called for websocket requests.All users of the web package should update to v1.5.2 or later.WorkaroundsYou may work around this issue by making the authenticate method a named function, then calling that function at the start of the handle method for the websocket. Reject connections when the return value of the method is nil.
|
[] | null | null | null | null | null |
RHSA-2023:0045
|
Red Hat Security Advisory: tigervnc security update
|
xorg-x11-server: XkbGetKbdByName use-after-free xorg-x11-server: XTestSwapFakeInput stack overflow xorg-x11-server: XIPassiveUngrab out-of-bounds access xorg-x11-server: XvdiSelectVideoNotify use-after-free xorg-x11-server: ScreenSaverSetAttributes use-after-free xorg-x11-server: XIChangeProperty out-of-bounds access
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.8
| null | null | null |
GHSA-7g5v-cv2p-7c8v
|
A vulnerability classified as problematic has been found in Victor Zsviot Camera 8.26.31. This affects an unknown part of the component MQTT Packet Handler. The manipulation leads to denial of service. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-265077 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
|
[] | null | 6.5
| null | null | null |
|
CVE-2024-47014
|
Android before 2024-10-05 on Google Pixel devices allows privilege escalation in the ABL component, A-330537292.
|
[
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] | null | 8.8
| null | null | null |
|
CVE-2021-4307
|
Yomguithereal Baobab prototype pollution
|
A vulnerability was found in Yomguithereal Baobab up to 2.6.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality. The manipulation leads to improperly controlled modification of object prototype attributes ('prototype pollution'). The attack can be launched remotely. Upgrading to version 2.6.1 is able to address this issue. The patch is named c56639532a923d9a1600fb863ec7551b188b5d19. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-217627.
|
[
"cpe:2.3:a:baobab_project:baobab:*:*:*:*:*:*:*:*"
] | null | 6.3
| 6.3
| 6.5
|
https://github.com/Yomguithereal/baobab/commit/c56639532a923d9a1600fb863ec7551b188b5d19
|
CVE-2024-42097
|
ALSA: emux: improve patch ioctl data validation
|
In the Linux kernel, the following vulnerability has been resolved:
ALSA: emux: improve patch ioctl data validation
In load_data(), make the validation of and skipping over the main info
block match that in load_guspatch().
In load_guspatch(), add checking that the specified patch length matches
the actually supplied data, like load_data() already did.
|
[] | null | 5.5
| null | null | null |
CVE-2014-3506
|
d1_both.c in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i allows remote attackers to cause a denial of service (memory consumption) via crafted DTLS handshake messages that trigger memory allocations corresponding to large length values.
|
[
"cpe:2.3:a:openssl:openssl:0.9.8:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.8a:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.8b:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.8c:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.8d:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.8e:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.8f:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.8g:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.8h:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.8i:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.8j:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.8k:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.8l:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.8m:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.8m:beta1:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.8n:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.8o:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.8p:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.8q:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.8r:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.8s:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.8t:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.8u:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.8v:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.8w:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.8x:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.8y:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.8za:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.0:beta5:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.0a:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.0b:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.0c:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.0d:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.0e:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.0f:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.0g:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.0h:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.0i:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.0j:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.0k:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.0l:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.0m:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1:beta1:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1:beta2:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1:beta3:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1a:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1b:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1c:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1d:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1e:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1f:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1g:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1h:*:*:*:*:*:*:*"
] | null | null | null | 5
| null |
|
CVE-2024-4499
|
CSRF Vulnerability in parisneo/lollms XTTS Server
|
A Cross-Site Request Forgery (CSRF) vulnerability exists in the XTTS server of parisneo/lollms version 9.6 due to a lax CORS policy. The vulnerability allows attackers to perform unauthorized actions by tricking a user into visiting a malicious webpage, which can then trigger arbitrary LoLLMS-XTTS API requests. This issue can lead to the reading and writing of audio files and, when combined with other vulnerabilities, could allow for the reading of arbitrary files on the system and writing files outside the permitted audio file location.
|
[
"cpe:2.3:a:parisneo:lollms-webui:*:*:*:*:*:*:*:*",
"cpe:2.3:a:lollms:lollms:9.6:*:*:*:*:*:*:*"
] | null | null | 7.6
| null | null |
CVE-2019-16340
|
Belkin Linksys Velop 1.1.8.192419 devices allows remote attackers to discover the recovery key via a direct request for the /sysinfo_json.cgi URI.
|
[
"cpe:2.3:o:linksys:velop_whw0303_firmware:1.1.8.192419:*:*:*:*:*:*:*",
"cpe:2.3:h:linksys:velop_whw0303:-:*:*:*:*:*:*:*",
"cpe:2.3:o:linksys:velop_whw0302_firmware:1.1.8.192419:*:*:*:*:*:*:*",
"cpe:2.3:h:linksys:velop_whw0302:-:*:*:*:*:*:*:*",
"cpe:2.3:o:linksys:velop_whw0301_firmware:1.1.8.192419:*:*:*:*:*:*:*",
"cpe:2.3:h:linksys:velop_whw0301:-:*:*:*:*:*:*:*"
] | null | 9.8
| null | 6.4
| null |
|
CVE-2019-13478
|
The Yoast SEO plugin before 11.6-RC5 for WordPress does not properly restrict unfiltered HTML in term descriptions.
|
[
"cpe:2.3:a:yoast:yoast_seo:*:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:yoast:yoast_seo:11.6:rc1:*:*:*:wordpress:*:*",
"cpe:2.3:a:yoast:yoast_seo:11.6:rc2:*:*:*:wordpress:*:*",
"cpe:2.3:a:yoast:yoast_seo:11.6:rc3:*:*:*:wordpress:*:*",
"cpe:2.3:a:yoast:yoast_seo:11.6:rc4:*:*:*:wordpress:*:*"
] | null | null | 9.9
| null | null |
|
GHSA-wh36-w27p-cfw8
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in ISDO Software Web Software allows SQL Injection.This issue affects Web Software: before 3.6.
|
[] | null | 9.8
| null | null | null |
|
GHSA-gpm7-vrgw-5m8r
|
In the Linux kernel, the following vulnerability has been resolved:ipv4: Fix data-races around sysctl_fib_multipath_hash_fields.While reading sysctl_fib_multipath_hash_fields, it can be changed
concurrently. Thus, we need to add READ_ONCE() to its readers.
|
[] | null | 4.7
| null | null | null |
|
GHSA-34hf-rwhq-v47w
|
Directory listing is a web server function that displays the directory contents when there is no index file in a specific website directory. A directory listing provides an attacker with the complete index of all the resources located inside of the directory. The specific risks and consequences vary depending on which files are listed and accessible.
|
[] | null | 5.3
| null | null | null |
|
GHSA-f8vw-mvjv-r7f9
|
A use after free in PDFium in Google Chrome prior to 61.0.3163.79 for Linux, Windows, and Mac allowed a remote attacker to potentially exploit memory corruption via a crafted PDF file.
|
[] | null | 8.8
| null | null | null |
|
CVE-2020-23980
|
DesignMasterEvents Conference management 1.0.0 allows SQL Injection via the username field on the administrator login page.
|
[
"cpe:2.3:a:designmasterevents:conference_management:1.0.0:*:*:*:*:*:*:*"
] | null | 9.8
| null | 7.5
| null |
|
RHSA-2015:0870
|
Red Hat Security Advisory: kernel security update
|
kernel: infiniband: uverbs: unprotected physical memory access
|
[
"cpe:/o:redhat:rhel_eus:5.9"
] | null | null | null | null | null |
GHSA-3cqh-6mr9-vqm5
|
The GD Rating System plugin 2.3 for WordPress has XSS via the wp-admin/admin.php panel parameter for the gd-rating-system-transfer page.
|
[] | null | null | 6.1
| null | null |
|
CVE-2021-38974
|
IBM Tivoli Key Lifecycle Manager 3.0, 3.0.1, 4.0, and 4.1 could allow an authenticated user to cause a denial of service using specially crafted HTTP requests. IBM X-Force ID: 212779.
|
[
"cpe:2.3:a:ibm:security_guardium_key_lifecycle_manager:4.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_guardium_key_lifecycle_manager:4.1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_guardium_key_lifecycle_manager:4.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_key_lifecycle_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_key_lifecycle_manager:4.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_key_lifecycle_manager:4.1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_key_lifecycle_manager:4.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:-:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | null | 5.4
| null | null |
|
GHSA-3hx3-v4g2-hgqp
|
Under certain conditions, SAP Business One Hana Chef Cookbook, versions - 8.82, 9.0, 9.1, 9.2, 9.3, 10.0, used to install SAP Business One for SAP HANA, allows an attacker to exploit an insecure temporary backup path and to access information which would otherwise be restricted, resulting in Information Disclosure vulnerability highly impacting the confidentiality, integrity and availability of the application.
|
[] | null | 7.8
| null | null | null |
|
GHSA-ch26-285q-m7w2
|
A vulnerability has been identified in Desigo CC (All versions with OIS Extension Module), GMA-Manager (All versions with OIS running on Debian 9 or earlier), Operation Scheduler (All versions with OIS running on Debian 9 or earlier), Siveillance Control (All versions with OIS running on Debian 9 or earlier), Siveillance Control Pro (All versions). The affected application incorrectly neutralizes special elements in a specific HTTP GET request which could lead to command injection. An unauthenticated remote attacker could exploit this vulnerability to execute arbitrary code on the system with root privileges.
|
[] | null | null | null | null | null |
|
GHSA-f7fh-pf49-jf37
|
Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, Thunderbird before 3.0.9 and 3.1.x before 3.1.5, and SeaMonkey before 2.0.9 do not properly handle certain modal calls made by javascript: URLs in circumstances related to opening a new window and performing cross-domain navigation, which allows remote attackers to bypass the Same Origin Policy via a crafted HTML document.
|
[] | null | null | null | null | null |
|
GHSA-ghcq-pgwv-hvxp
|
fontd in Apple Type Services (ATS) in Apple OS X before 10.10.3 allows local users to gain privileges via unspecified vectors, a different vulnerability than CVE-2015-1131, CVE-2015-1132, CVE-2015-1133, and CVE-2015-1135.
|
[] | null | null | null | null | null |
|
CVE-2022-2468
|
SourceCodester Garage Management System editbrand.php sql injection
|
A vulnerability was found in SourceCodester Garage Management System 1.0 and classified as critical. This issue affects some unknown processing of the file /editbrand.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
|
[
"cpe:2.3:a:garage_management_system_project:garage_management_system:1.0:*:*:*:*:*:*:*"
] | null | 6.3
| null | null | null |
CVE-2025-7609
|
code-projects Simple Shopping Cart register.php sql injection
|
A vulnerability has been found in code-projects Simple Shopping Cart 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /register.php. The manipulation of the argument ruser_email leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
|
[] | 6.9
| 7.3
| 7.3
| 7.5
| null |
CVE-2024-13514
|
B Slider- Gutenberg Slider Block for WP <= 1.1.23 - Authenticated (Contributor+) Private Post Disclosure via bsb-slider Shortcode
|
The B Slider- Gutenberg Slider Block for WP plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 1.9.5 via the 'bsb-slider' shortcode due to insufficient restrictions on which posts can be included. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract data from private posts that they should not have access to.
|
[] | null | 4.3
| null | null | null |
CVE-2013-5433
|
The Data Growth Solution for JD Edwards EnterpriseOne in IBM InfoSphere Optim 3.0 through 9.1 has hardcoded database credentials, which allows remote authenticated users to obtain sensitive information by reading an unspecified field in an XML document.
|
[
"cpe:2.3:a:ibm:infosphere_optim_data_growth_solution_for_siebel_crm:3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:infosphere_optim_data_growth_solution_for_siebel_crm:3.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:infosphere_optim_data_growth_solution_for_siebel_crm:3.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:infosphere_optim_data_growth_solution_for_siebel_crm:3.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:infosphere_optim_data_growth_solution_for_siebel_crm:9.1:*:*:*:*:*:*:*"
] | null | null | null | 4
| null |
|
CVE-2002-2362
|
Cross-site scripting (XSS) vulnerability in form_header.php in MyMarket 1.71 allows remote attackers to inject arbitrary web script or HTML via the noticemsg parameter.
|
[
"cpe:2.3:a:sourceforge:mymarket:1.71:*:*:*:*:*:*:*"
] | null | null | null | 4.3
| null |
|
PYSEC-2021-523
| null |
TensorFlow is an end-to-end open source platform for machine learning. The implementation of the `DepthToSpace` TFLite operator is vulnerable to a division by zero error(https://github.com/tensorflow/tensorflow/blob/0d45ea1ca641b21b73bcf9c00e0179cda284e7e7/tensorflow/lite/kernels/depth_to_space.cc#L63-L69). An attacker can craft a model such that `params->block_size` is 0. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
|
[] | null | null | null | null | null |
CVE-2020-9525
|
CS2 Network P2P through 3.x, as used in millions of Internet of Things devices, suffers from an authentication flaw that allows remote attackers to perform a man-in-the-middle attack, as demonstrated by eavesdropping on user video/audio streams, capturing credentials, and compromising devices.
|
[
"cpe:2.3:a:cs2-network:p2p:*:*:*:*:*:*:*:*"
] | null | 8.1
| null | 6.8
| null |
|
GHSA-79hm-7hpp-wj56
|
Certain NETGEAR devices are affected by command injection by an unauthenticated attacker. This affects RBK20 before 2.6.1.36, RBR20 before 2.6.1.36, RBS20 before 2.6.1.38, RBK40 before 2.6.1.36, RBR40 before 2.6.1.36, RBS40 before 2.6.1.38, RBK50 before 2.6.1.40, RBR50 before 2.6.1.40, RBS50 before 2.6.1.40, and RBS50Y before 2.6.1.40.
|
[] | null | null | null | null | null |
|
GHSA-99xv-c4pc-cc88
|
A vulnerability, which was classified as problematic, was found in mooSocial mooStore 3.1.6. Affected is an unknown function of the file /search/index. The manipulation of the argument q leads to cross site scripting. It is possible to launch the attack remotely. The identifier of this vulnerability is VDB-236208.
|
[] | null | null | 3.5
| null | null |
|
GHSA-j4qw-f97c-g43h
|
An information disclosure vulnerability in the Synaptics touchscreen driver could enable a local malicious application to access data outside of its permission levels. This issue is rated as Low because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-35472278.
|
[] | null | null | 4.7
| null | null |
|
CVE-2008-4169
|
SQL injection vulnerability in detaillist.php in iScripts EasyIndex, possibly 1.0, allows remote attackers to execute arbitrary SQL commands via the produid parameter.
|
[
"cpe:2.3:a:iscripts:easyindex:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5
| null |
|
PYSEC-2021-553
| null |
TensorFlow is an end-to-end open source platform for machine learning. In affected versions the implementation of `tf.raw_ops.SparseReshape` can be made to trigger an integral division by 0 exception. The [implementation](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/kernels/reshape_util.cc#L176-L181) calls the reshaping functor whenever there is at least an index in the input but does not check that shape of the input or the target shape have both a non-zero number of elements. The [reshape functor](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/kernels/reshape_util.cc#L40-L78) blindly divides by the dimensions of the target shape. Hence, if this is not checked, code will result in a division by 0. We have patched the issue in GitHub commit 4923de56ec94fff7770df259ab7f2288a74feb41. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1 as this is the other affected version.
|
[] | null | null | null | null | null |
GHSA-6hqf-qj93-6727
|
In the Active Threads Plugin 1.3.0 for MyBB, the activethreads.php date parameter is vulnerable to XSS when setting a time period.
|
[] | null | 6.1
| null | null | null |
|
GHSA-vwj4-gmcv-4hc7
|
IBM Maximo Anywhere 7.6.0, 7.6.1, 7.6.2, and 7.6.3 does not have device root detection which could result in an attacker gaining sensitive information about the device. IBM X-Force ID: 160198.
|
[] | null | null | null | null | null |
|
CVE-2023-25607
|
An improper neutralization of special elements used in an OS Command ('OS Command Injection') vulnerability [CWE-78 ] in FortiManager 7.2.0 through 7.2.2, 7.0.0 through 7.0.7, 6.4.0 through 6.4.11, 6.2 all versions, 6.0 all versions, FortiAnalyzer 7.2.0 through 7.2.2, 7.0.0 through 7.0.7, 6.4.0 through 6.4.11, 6.2 all versions, 6.0 all versions and FortiADC 7.1.0, 7.0.0 through 7.0.3, 6.2 all versions, 6.1 all versions, 6.0 all versions management interface may allow an authenticated attacker with at least READ permissions on system settings to execute arbitrary commands on the underlying shell due to an unsafe usage of the wordexp function.
|
[
"cpe:2.3:a:fortinet:fortiadc:*:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortiadc:7.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortianalyzer:*:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortianalyzer:7.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortianalyzer:7.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimanager:7.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimanager:7.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimanager:7.2.2:*:*:*:*:*:*:*"
] | null | 7.4
| null | null | null |
|
GHSA-986g-9v6g-f443
|
A vulnerability classified as critical has been found in SourceCodester Simple Company Website 1.0. This affects an unknown part of the file /classes/Login.php. The manipulation of the argument Username leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
|
[] | 5.5
| 7.3
| null | null | null |
|
CVE-2003-1338
|
CRLF injection vulnerability in Aprelium Abyss Web Server 1.1.2 and earlier allows remote attackers to inject arbitrary HTTP headers and possibly conduct HTTP Response Splitting attacks via CRLF sequences in the Location header.
|
[
"cpe:2.3:a:aprelium_technologies:abyss_web_server:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3
| null |
|
GHSA-4p44-cv6p-5gxp
|
Fuji Electric V-Server before 6.0.33.0 is vulnerable to denial of service via a crafted UDP message sent to port 8005. An unauthenticated, remote attacker can crash vserver.exe due to an integer overflow in the UDP message handling logic.
|
[] | null | null | 7.5
| null | null |
|
CVE-2023-23474
|
IBM Cognos Controller information disclosure
|
IBM Cognos Controller 10.4.1, 10.4.2, and 11.0.0 could allow a remote attacker to obtain sensitive information when a stack trace is returned in the browser. IBM X-Force ID: 245403.
|
[
"cpe:2.3:a:ibm:cognos_controller:10.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:cognos_controller:10.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:cognos_controller:11.0.0:*:*:*:*:*:*:*"
] | null | 3.7
| null | null | null |
GHSA-p96h-697j-3c35
|
In StopServicesAndLogViolations of reboot.cpp, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-170315126
|
[] | null | null | null | null | null |
|
GHSA-2wm6-mgmh-92vr
|
In Wireshark 2.2.0 to 2.2.5 and 2.0.0 to 2.0.11, the RPC over RDMA dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-rpcrdma.c by correctly checking for going beyond the maximum offset.
|
[] | null | null | 7.5
| null | null |
|
CVE-2011-3591
|
Multiple cross-site scripting (XSS) vulnerabilities in phpMyAdmin 3.4.x before 3.4.5 allow remote authenticated users to inject arbitrary web script or HTML via a crafted row that triggers an improperly constructed confirmation message after inline-editing and save operations, related to (1) js/functions.js and (2) js/tbl_structure.js.
|
[
"cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.4.0:*:*:*:*:*:*:*"
] | null | null | null | 3.5
| null |
|
GHSA-hx8w-jgqp-8c4c
|
The Pulse Secure Desktop (macOS) 5.3RX before 5.3R5 and 9.0R1 has a Privilege Escalation Vulnerability.
|
[] | null | null | 5.3
| null | null |
|
CVE-2018-13999
|
Catfish CMS v4.7.9 allows XSS via the admin/Index/write.html editorValue parameter (aka an article posted by an administrator).
|
[
"cpe:2.3:a:catfish-cms:catfish_cms:4.7.9:*:*:*:*:*:*:*"
] | null | null | 4.8
| 3.5
| null |
|
GHSA-9vjw-3439-q93q
|
JavaScript in the "about:webrtc" page is not sanitized properly being assigned to "innerHTML". Data on this page is supplied by WebRTC usage and is not under third-party control, making this difficult to exploit, but the vulnerability could possibly be used for a cross-site scripting (XSS) attack. This vulnerability affects Firefox < 55.
|
[] | null | null | 6.1
| null | null |
|
GHSA-243m-j5w7-6mw6
|
The Testimonial Slider Shortcode WordPress plugin before 1.1.9 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admin
|
[] | null | 5.4
| null | null | null |
|
GHSA-868v-4v5r-xmhh
|
Vulnerability in the Oracle Hospitality Reporting and Analytics product of Oracle Food and Beverage Applications (component: Reporting). The supported version that is affected is 9.1.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTPS to compromise Oracle Hospitality Reporting and Analytics. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Hospitality Reporting and Analytics accessible data as well as unauthorized access to critical data or complete access to all Oracle Hospitality Reporting and Analytics accessible data. CVSS 3.1 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N).
|
[] | null | 8.1
| null | null | null |
|
CVE-2023-47773
|
WordPress Permalinks Customizer Plugin <= 2.8.2 is vulnerable to Cross Site Scripting (XSS)
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in YAS Global Team Permalinks Customizer plugin <= 2.8.2 versions.
|
[
"cpe:2.3:a:yasglobal:permalinks_customizer:*:*:*:*:*:wordpress:*:*"
] | null | 7.1
| null | null | null |
GHSA-mjm5-4fpc-477f
|
An out-of-bounds read was addressed with improved input validation. This issue is fixed in AirPort Base Station Firmware Update 7.8.1, AirPort Base Station Firmware Update 7.9.1. A remote attacker may be able to leak memory.
|
[] | null | null | null | null | null |
|
GHSA-99c3-fh27-qg5q
|
The nsTSubstring::ReplacePrep function in Mozilla Firefox before 40.0, Firefox ESR 38.x before 38.2, and Firefox OS before 2.2 might allow remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors, related to an "overflow."
|
[] | null | null | null | null | null |
|
GHSA-m7qw-mwjx-2vpf
|
In NetIQ Sentinel before 8.1.x, a Sentinel user is logged into the Sentinel Web Interface. After performing some tasks within Sentinel the user does not log out but does go idle for a period of time. This in turn causes the interface to timeout so that it requires the user to re-authenticate. If another user is passing by and decides to login, their credentials are accepted. While The user does not inherit any of the other users privileges, they are able to view the previous screen. In this case it is possible that the user can see another users events or configuration information for whatever view is currently showing.
|
[] | null | null | 5.3
| null | null |
|
CVE-2006-5592
|
Admin/adpoll.asp in PacPoll 4.0 and earlier allows remote attackers to bypass authentication by setting the polllog cookie value to "xx".
|
[
"cpe:2.3:a:pacos_drivers:pacpoll:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5
| null |
|
CVE-2019-10672
|
treeRead in hdf/btree.c in libmysofa before 0.7 does not properly validate multiplications and additions.
|
[
"cpe:2.3:a:symonics:libmysofa:*:*:*:*:*:*:*:*"
] | null | null | 9.8
| 7.5
| null |
|
CVE-2023-50223
|
Inductive Automation Ignition ExtendedDocumentCodec Deserialization of Untrusted Data Remote Code Execution Vulnerability
|
Inductive Automation Ignition ExtendedDocumentCodec Deserialization of Untrusted Data Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Inductive Automation Ignition. Authentication is required to exploit this vulnerability.
The specific flaw exists within the ExtendedDocumentCodec class. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-22127.
|
[
"cpe:2.3:a:inductiveautomation:ignition:-:*:*:*:*:*:*:*"
] | null | null | 8.8
| null | null |
GHSA-p8rw-67hv-3rpw
|
INVT Studio 1.2 allows remote attackers to cause a denial of service during import operations.
|
[] | null | null | 5.5
| null | null |
|
GHSA-cq46-g62r-qwff
|
The r_read_le32() function in radare2 2.5.0 allows remote attackers to cause a denial of service (heap-based out-of-bounds read and application crash) via a crafted ELF file.
|
[] | null | null | 5.5
| null | null |
|
CVE-2021-22983
|
On BIG-IP AFM version 15.1.x before 15.1.1, 14.1.x before 14.1.3.1, and 13.1.x before 13.1.3.5, authenticated users accessing the Configuration utility for AFM are vulnerable to a cross-site scripting attack if they attempt to access a maliciously-crafted URL. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated.
|
[
"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*"
] | null | 5.4
| null | 3.5
| null |
|
GHSA-cp2f-vm9g-5gqr
|
CWE-203: Observable Discrepancy
|
[] | null | 4.3
| null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.