id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
GHSA-h27q-wm75-844h | Multiple integer overflows in X.org libX11 1.5.99.901 (1.6 RC1) and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XQueryFont, (2) _XF86BigfontQueryFont, (3) XListFontsWithInfo, (4) XGetMotionEvents, (5) XListHosts, (6) XGetModifierMapping, (7) XGetPointerMapping, (8) XGetKeyboardMapping, (9) XGetWindowProperty, (10) XGetImage, (11) LoadColornameDB, (12) XrmGetFileDatabase, (13) _XimParseStringFile, or (14) TransFileName functions. | [] | null | null | null | null |
|
CVE-2014-9694 | Huawei Tecal RH1288 V2 V100R002C00SPC107 and earlier versions, Tecal RH2265 V2 V100R002C00, Tecal RH2285 V2 V100R002C00SPC115 and earlier versions, Tecal RH2265 V2 V100R002C00, Tecal RH2285H V2 V100R002C00SPC111 and earlier versions, Tecal RH2268 V2 V100R002C00, Tecal RH2288 V2 V100R002C00SPC117 and earlier versions, Tecal RH2288H V2 V100R002C00SPC115 and earlier versions, Tecal RH2485 V2 V100R002C00SPC502 and earlier versions, Tecal RH5885 V2 V100R001C02SPC109 and earlier versions, Tecal RH5885 V3 V100R003C01SPC102 and earlier versions, Tecal RH5885H V3 V100R003C00SPC102 and earlier versions, Tecal XH310 V2 V100R001C00SPC110 and earlier versions, Tecal XH311 V2 V100R001C00SPC110 and earlier versions, Tecal XH320 V2 V100R001C00SPC110 and earlier versions, Tecal XH621 V2 V100R001C00SPC106 and earlier versions, Tecal DH310 V2 V100R001C00SPC110 and earlier versions, Tecal DH320 V2 V100R001C00SPC106 and earlier versions, Tecal DH620 V2 V100R001C00SPC106 and earlier versions, Tecal DH621 V2 V100R001C00SPC107 and earlier versions, Tecal DH628 V2 V100R001C00SPC107 and earlier versions, Tecal BH620 V2 V100R002C00SPC107 and earlier versions, Tecal BH621 V2 V100R002C00SPC106 and earlier versions, Tecal BH622 V2 V100R002C00SPC110 and earlier versions, Tecal BH640 V2 V100R002C00SPC108 and earlier versions, Tecal CH121 V100R001C00SPC180 and earlier versions, Tecal CH140 V100R001C00SPC110 and earlier versions, Tecal CH220 V100R001C00SPC180 and earlier versions, Tecal CH221 V100R001C00SPC180 and earlier versions, Tecal CH222 V100R002C00SPC180 and earlier versions, Tecal CH240 V100R001C00SPC180 and earlier versions, Tecal CH242 V100R001C00SPC180 and earlier versions, Tecal CH242 V3 V100R001C00SPC110 and earlier versions have a CSRF vulnerability. The products do not use the Token mechanism for web access control. When users log in to the Huawei servers and access websites containing the malicious CSRF script, the CSRF script is executed, which may cause configuration tampering and system restart. | [
"cpe:2.3:o:huawei:tecal_rh1288_v2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:tecal_rh1288_v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:tecal_rh2265_v2_firmware:v100r002c00:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:tecal_rh2265_v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:tecal_rh2285_v2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:tecal_rh2285_v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:tecal_rh2285h_v2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:tecal_rh2285h_v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:tecal_rh2268_v2_firmware:v100r002c00:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:tecal_rh2268_v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:tecal_rh2288_v2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:tecal_rh2288_v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:tecal_rh2288h_v2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:tecal_rh2288h_v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:tecal_rh2485_v2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:tecal_rh2485_v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:tecal_rh5885_v2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:tecal_rh5885_v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:tecal_rh5885_v3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:tecal_rh5885_v3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:tecal_rh5885h_v3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:tecal_rh5885h_v3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:tecal_xh310_v2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:tecal_xh310_v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:tecal_xh311_v2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:tecal_xh311_v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:tecal_xh320_v2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:tecal_xh320_v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:tecal_xh621_v2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:tecal_xh621_v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:tecal_dh310_v2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:tecal_dh310_v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:tecal_dh320_v2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:tecal_dh320_v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:tecal_dh620_v2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:tecal_dh620_v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:tecal_dh621_v2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:tecal_dh621_v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:tecal_dh628_v2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:tecal_dh628_v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:tecal_bh620_v2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:tecal_bh620_v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:tecal_bh621_v2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:tecal_bh621_v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:tecal_bh622_v2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:tecal_bh622_v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:tecal_bh640_v2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:tecal_bh640_v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:tecal_ch121_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:tecal_ch121:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:tecal_ch140_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:tecal_ch140:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:tecal_ch220_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:tecal_ch220:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:tecal_ch221_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:tecal_ch221:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:tecal_ch222_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:tecal_ch222:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:tecal_ch240_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:tecal_ch240:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:tecal_ch242_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:tecal_ch242:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:tecal_ch242_v3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:tecal_ch242_v3:-:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.8 |
|
GHSA-hv4h-fc69-69wr | A vulnerability was found in SourceCodester Online Food Ordering System 2.0. It has been classified as critical. Affected is an unknown function of the file admin/manage_user.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-218472. | [] | null | 9.8 | null | null |
|
GHSA-5qwm-rcv7-qqcf | An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded admin / admin credentials for an ISP. | [] | null | null | null | null |
|
CVE-2014-8837 | Multiple unspecified vulnerabilities in the Bluetooth driver in Apple OS X before 10.10.2 allow attackers to execute arbitrary code in a privileged context via a crafted app. | [
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
GHSA-jhwq-8hmr-8f6m | A "missing request validation" error in phpBB 2 before 2.0.18 allows remote attackers to edit private messages of other users, probably by modifying certain parameters or other inputs. | [] | null | null | null | null |
|
GHSA-ggjg-gjpc-93cx | This issue was addressed with improved redaction of sensitive information. This issue is fixed in macOS Ventura 13.7.3, macOS Sequoia 15.3, macOS Sonoma 14.7.3. Deleting a conversation in Messages may expose user contact information in system logging. | [] | null | 9.8 | null | null |
|
CVE-2019-3786 | BBR could run arbitrary scripts on deployment VMs | Cloud Foundry BOSH Backup and Restore CLI, all versions prior to 1.5.0, does not check the authenticity of backup scripts in BOSH. A remote authenticated malicious user can modify the metadata file of a Bosh Backup and Restore job to request extra backup files from different jobs upon restore. The exploited hooks in this metadata script were only maintained in the cfcr-etcd-release, so clusters deployed with the BBR job for etcd in this release are vulnerable. | [
"cpe:2.3:a:cloudfoundry:bosh_backup_and_restore:*:*:*:*:*:*:*:*"
] | null | null | 7.7 | null |
CVE-2017-10799 | When GraphicsMagick 1.3.25 processes a DPX image (with metadata indicating a large width) in coders/dpx.c, a denial of service (OOM) can occur in ReadDPXImage(). | [
"cpe:2.3:a:graphicsmagick:graphicsmagick:1.3.25:*:*:*:*:*:*:*"
] | null | null | 5.5 | 4.3 |
|
GHSA-5vxq-fv88-x9jq | An unsafe deserialization vulnerability exists in the Engine.plugin ProfileInformation ProfileData functionality of CODESYS GmbH CODESYS Development System 3.5.16 and 3.5.17. A specially crafted file can lead to arbitrary command execution. An attacker can provide a malicious file to trigger this vulnerability. | [] | null | 7.8 | null | null |
|
CVE-2023-45705 | HCL BigFix Platform is susceptible to Server Side Request Forgery (SSRF) | An administrative user of WebReports may perform a Server Side Request Forgery (SSRF) exploit through SMTP configuration options.
| [] | null | 3.5 | null | null |
GHSA-jgp8-v927-5p6w | usr/log.c in iscsid in open-iscsi (iscsi-initiator-utils) before 2.0-865 uses a semaphore with insecure permissions (world-writable/world-readable) for managing log messages using shared memory, which allows local users to cause a denial of service (hang) by grabbing the semaphore. | [] | null | null | null | null |
|
GHSA-57c8-7jwm-wc5w | A flaw exists in Purity//FB whereby a local account is permitted to authenticate to the management interface using an unintended method that allows an attacker to gain privileged access to the array. | [] | 9.3 | null | null | null |
|
CVE-2024-39824 | Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers - Sensitive Information Exposure | Sensitive information disclosure in some Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers may allow a privileged user to conduct an information disclosure via network access. | [
"cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:android:*:*",
"cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:iphone_os:*:*",
"cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:macos:*:*",
"cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:windows:*:*",
"cpe:2.3:a:zoom:rooms:*:*:*:*:*:ipados:*:*",
"cpe:2.3:a:zoom:rooms:*:*:*:*:*:macos:*:*",
"cpe:2.3:a:zoom:rooms:*:*:*:*:*:windows:*:*",
"cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:android:*:*",
"cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:linux:*:*",
"cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:macos:*:*",
"cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:windows:*:*",
"cpe:2.3:a:zoom:workplace:*:*:*:*:*:android:*:*",
"cpe:2.3:a:zoom:workplace:*:*:*:*:*:iphone_os:*:*",
"cpe:2.3:a:zoom:workplace_desktop:*:*:*:*:*:linux:*:*",
"cpe:2.3:a:zoom:workplace_desktop:*:*:*:*:*:macos:*:*",
"cpe:2.3:a:zoom:workplace_desktop:*:*:*:*:*:windows:*:*",
"cpe:2.3:a:zoom:workplace_virtual_desktop_infrastructure:*:*:*:*:*:windows:*:*"
] | null | 4.9 | null | null |
GHSA-qw7r-4xg5-247x | Out-of-bounds read in subsystem in Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow a privileged user to potentially enable information disclosure via local access. | [] | null | 4.4 | null | null |
|
cisco-sa-20180926-cmp | Cisco IOS and IOS XE Software Cluster Management Protocol Denial of Service Vulnerability | A vulnerability in the implementation of the cluster feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to trigger a denial of service (DoS) condition on an affected device.
The vulnerability is due to improper input validation when handling Cluster Management Protocol (CMP) messages. An attacker could exploit this vulnerability by sending a malicious CMP message to an affected device. A successful exploit could allow the attacker to cause the switch to crash and reload or to hang, resulting in a DoS condition. If the switch hangs it will not reboot automatically, and it will need to be power cycled manually to recover.
Cisco has released software updates that address this vulnerability. There are workarounds that address this vulnerability.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180926-cmp ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180926-cmp"]
This advisory is part of the September 26, 2018, release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication, which includes 12 Cisco Security Advisories that describe 13 vulnerabilities. For a complete list of the advisories and links to them, see Cisco Event Response: September 2018 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication ["https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-69981"]. | [] | null | null | 7.4 | null |
CVE-2024-3821 | wpDataTables - Tables & Table Charts (Premium) <= 6.3.2 - Missing Authorization to DataTable Access & Modification | The wpDataTables – WordPress Data Table, Dynamic Tables & Table Charts Plugin plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on several functions in the wdt_ajax_actions.php file in all versions up to, and including, 6.3.2. This makes it possible for unauthenticated attackers to manipulate data tables. Please note this only affects the premium version of the plugin. | [] | null | 7.3 | null | null |
CVE-2014-0618 | Juniper Junos before 10.4 before 10.4R16, 11.4 before 11.4R8, 12.1R before 12.1R7, 12.1X44 before 12.1X44-D20, and 12.1X45 before 12.1X45-D10 on SRX Series service gateways, when used as a UAC enforcer and captive portal is enabled, allows remote attackers to cause a denial of service (flowd crash) via a crafted HTTP message. | [
"cpe:2.3:o:juniper:junos:10.4:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:11.4:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.1r:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.1x44:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.1x45:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx100:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx110:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx1400:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx210:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx220:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx240:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx3400:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx3600:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx550:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx5600:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx5800:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx650:-:*:*:*:*:*:*:*"
] | null | null | null | 7.8 |
|
CVE-2018-16529 | A password reset vulnerability has been discovered in Forcepoint Email Security 8.5.x. The password reset URL can be used after the intended expiration period or after the URL has already been used to reset a password. | [
"cpe:2.3:a:forcepoint:email_security:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | 5 |
|
GHSA-fv4r-7842-6m86 | The iControl API in F5 BIG-IP LTM, AFM, Analytics, APM, ASM, Link Controller, and PEM 11.3.0 before 11.5.3 HF2 and 11.6.0 before 11.6.0 HF6, BIG-IP AAM 11.4.0 before 11.5.3 HF2 and 11.6.0 before 11.6.0 HF6, BIG-IP Edge Gateway, WebAccelerator, and WOM 11.3.0, BIG-IP GTM 11.3.0 before 11.6.0 HF6, BIG-IP PSM 11.3.0 through 11.4.1, Enterprise Manager 3.1.0 through 3.1.1, BIG-IQ Cloud and Security 4.0.0 through 4.5.0, BIG-IQ Device 4.2.0 through 4.5.0, and BIG-IQ ADC 4.5.0 allows remote authenticated users with the "Resource Administrator" role to gain privileges via an iCall (1) script or (2) handler in a SOAP request to iControl/iControlPortal.cgi. | [] | null | null | null | null |
|
GHSA-x3g3-334f-q6h4 | Pandao editor.md vulnerable to DOM XSS | pandao Editor.md 1.5.0 has DOM XSS via input starting with a `<<` substring, which is mishandled during construction of an `A` element. | [] | null | null | 6.1 | null |
CVE-2007-3136 | PHP remote file inclusion vulnerability in inc/nuke_include.php in newsSync 1.5.0rc6 allows remote attackers to execute arbitrary PHP code via a URL in the newsSync_NUKE_PATH parameter. | [
"cpe:2.3:a:newssync:newssync:1.5.0_rc6:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-2vh8-pg5g-9p42 | The User::randomPassword function in MediaWiki before 1.23.12, 1.24.x before 1.24.5, 1.25.x before 1.25.4, and 1.26.x before 1.26.1 generates passwords smaller than $wgMinimalPasswordLength, which makes it easier for remote attackers to obtain access via a brute-force attack. | [] | null | null | 9.8 | null |
|
GHSA-ccp3-x69x-vx8q | A post-authentication privilege escalation in the web application of Combodo iTop before 2.7 allows regular authenticated users to access information and modify information with administrative privileges by not following the HTTP Location header in server responses. | [] | null | null | null | null |
|
CVE-2015-4669 | The MySQL "root" user in Xsuite 2.x does not have a password set, which allows local users to access databases on the system. | [
"cpe:2.3:a:xceedium:xsuite:2.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:xceedium:xsuite:2.4.3.0:*:*:*:*:*:*:*"
] | null | null | 7.8 | 7.2 |
|
CVE-2023-4365 | Inappropriate implementation in Fullscreen in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Medium) | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*"
] | null | 4.3 | null | null |
|
CVE-2021-39283 | liveMedia/FramedSource.cpp in Live555 through 1.08 allows an assertion failure and application exit via multiple SETUP and PLAY commands. | [
"cpe:2.3:a:live555:live555:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | 4.3 |
|
CVE-2017-17725 | In Exiv2 0.26, there is an integer overflow leading to a heap-based buffer over-read in the Exiv2::getULong function in types.cpp. Remote attackers can exploit the vulnerability to cause a denial of service via a crafted image file. Note that this vulnerability is different from CVE-2017-14864, which is an invalid memory address dereference. | [
"cpe:2.3:a:exiv2:exiv2:0.26:*:*:*:*:*:*:*"
] | null | null | 6.5 | 4.3 |
|
CVE-2007-6743 | Double free vulnerability in IBM Tivoli Directory Server (TDS) 5.2 before 5.2.0.5-TIV-ITDS-LA0005 allows remote authenticated users to cause a denial of service (ABEND) via search operations that trigger recursive filter_free calls. | [
"cpe:2.3:a:ibm:tivoli_directory_server:5.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_directory_server:5.2.0.4:*:*:*:*:*:*:*"
] | null | null | null | 4 |
|
CVE-2024-9927 | WooCommerce Order Proposal <= 2.0.5 - Authenticated (Shop Manager+) Privilege Escalation via Order Proposal | The WooCommerce Order Proposal plugin for WordPress is vulnerable to privilege escalation via order proposal in all versions up to and including 2.0.5. This is due to the improper implementation of allow_payment_without_login function. This makes it possible for authenticated attackers, with Shop Manager-level access and above, to log in to WordPress as an arbitrary user account, including administrators. | [
"cpe:2.3:a:wordpress:woocommerce_order_proposal:*:*:*:*:*:*:*:*",
"cpe:2.3:a:wpovernight:woocommerce_order_proposal:*:*:*:*:*:wordpress:*:*"
] | null | 7.2 | null | null |
ICSA-21-348-01 | Advantech R-SeeNet | Advantech is aware of multiple SQL injection vulnerabilities in the following pages: group_list, company_list, user_list, and device_list. An attacker could send a specially crafted HTTP request to trigger the vulnerabilities.CVE-2021-21915, CVE-2021-21916, CVE-2021-21917, CVE-2021-21918, CVE-2021-21919, CVE-2021-21920, CVE-2021-21921, CVE-2021-21922, CVE-2021-21923, CVE-2021-21924, CVE-2021-21925, CVE-2021-21926, CVE-2021-21927, CVE-2021-21928, CVE-2021-21929, CVE-2021-21930, CVE-2021-21931, CVE-2021-21932, CVE-2021-21933, CVE-2021-21934, CVE-2021-21935, CVE-2021-21936, and CVE-2021-21937 have been assigned to these vulnerabilities. A CVSS v3 base score of 7.7 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N). Advantech is aware of multiple privilege escalation vulnerabilities that could be triggered when an authenticated user replaces a specially crafted file in the system to escalate privileges to NT SYSTEM authority.CVE-2021-21910, CVE-2021-21911, and CVE-2021-21912 have been assigned to these vulnerabilities. A CVSS v3 base score of 8.8 has been assigned; the CVSS vector string is (AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H). | [] | null | null | 8.8 | null |
RHSA-2020:2740 | Red Hat Security Advisory: candlepin and satellite security update | apache-commons-beanutils: does not suppresses the class property in PropertyUtilsBean by default | [
"cpe:/a:redhat:satellite:6.5::el7",
"cpe:/a:redhat:satellite_capsule:6.5::el7"
] | null | null | 7.3 | null |
GHSA-53xv-c2hx-5w6q | Command Injection in node-windows | lib/cmd.js in the node-windows package before 1.0.0-beta.6 for Node.js allows command injection via the PID parameter. | [] | null | 9.8 | null | null |
CVE-2024-26969 | clk: qcom: gcc-ipq8074: fix terminating of frequency table arrays | In the Linux kernel, the following vulnerability has been resolved:
clk: qcom: gcc-ipq8074: fix terminating of frequency table arrays
The frequency table arrays are supposed to be terminated with an
empty element. Add such entry to the end of the arrays where it
is missing in order to avoid possible out-of-bound access when
the table is traversed by functions like qcom_find_freq() or
qcom_find_freq_floor().
Only compile tested. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
CVE-2024-5713 | if-so < 1.8.0.4 - Reflected XSS | The If-So Dynamic Content Personalization WordPress plugin before 1.8.0.4 does not escape the $_SERVER['REQUEST_URI'] parameter before outputting it back in an attribute, which could lead to Reflected Cross-Site Scripting in old web browsers | [
"cpe:2.3:a:if-so:dynamic_content_personalization:*:*:*:*:*:*:*:*"
] | null | 5.4 | null | null |
GHSA-wfwm-wprr-j47w | Stack-based buffer overflow in IBM Informix Dynamic Server (IDS) 7.x through 7.31, 9.x through 9.40, 10.00 before 10.00.xC10, 11.10 before 11.10.xC3, and 11.50 before 11.50.xC3 allows remote authenticated users to execute arbitrary code via long DBINFO keyword arguments in a SQL statement, aka idsdb00165017, idsdb00165019, idsdb00165021, idsdb00165022, and idsdb00165023. | [] | null | null | null | null |
|
GHSA-xv9w-4fw4-w5r9 | IBM Security QRadar SIEM QRM 7.1 MR1 and QRM/QVM 7.2 MR2 does not include the HTTPOnly flag in a Set-Cookie header for the session cookie, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie. | [] | null | null | null | null |
|
GHSA-c593-7jfr-vjj8 | The mintToken function of a smart contract implementation for EncryptedToken (ECC), an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value. | [] | null | null | 7.5 | null |
|
GHSA-rx9w-c6jv-2grg | LibVNCServer 0.9.12 release and earlier contains heap buffer overflow vulnerability within the HandleCursorShape() function in libvncclient/cursor.c. An attacker sends cursor shapes with specially crafted dimensions, which can result in remote code execution. | [] | null | 8.8 | null | null |
|
CVE-2025-1010 | An attacker could have caused a use-after-free via the Custom Highlight API, leading to a potentially exploitable crash. This vulnerability affects Firefox < 135, Firefox ESR < 115.20, Firefox ESR < 128.7, Thunderbird < 128.7, and Thunderbird < 135. | [] | null | 9.8 | null | null |
|
GHSA-35mm-cc6r-8fjp | Cross-site scripting in actionpack | In actionpack gem >= 6.0.0, a possible XSS vulnerability exists when an application is running in development mode allowing an attacker to send or embed (in another page) a specially crafted URL which can allow the attacker to execute JavaScript in the context of the local application. This vulnerability is in the Actionable Exceptions middleware.WorkaroundsUntil such time as the patch can be applied, application developers should disable the Actionable Exceptions middleware in their development environment via a line such as this one in their config/environment/development.rb: `config.middleware.delete ActionDispatch::ActionableExceptions` | [] | null | 6.1 | null | null |
CVE-2022-32240 | When a user opens manipulated Jupiter Tesselation (.jt, JTReader.x3d) files received from untrusted sources in SAP 3D Visual Enterprise Viewer, the application crashes and becomes temporarily unavailable to the user until restart of the application. | [
"cpe:2.3:a:sap:3d_visual_enterprise_viewer:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | 4.3 |
|
CVE-2012-6339 | Multiple cross-site scripting (XSS) vulnerabilities in the administrative web interface in Cerberus FTP Server before 5.0.6.0 allow (1) remote attackers to inject arbitrary web script or HTML via a log entry that is not properly handled within the Log Manager component, and might allow (2) remote authenticated administrators to inject arbitrary web script or HTML via a Messages field to the servermanager program. | [
"cpe:2.3:a:cerberusftp:ftp_server:*:*:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:1.0:-:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:1.01:*:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:1.02:*:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:1.03:*:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:1.05:*:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:1.6:beta:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:1.22:*:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:1.71:*:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:2.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:2.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:2.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:2.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:2.01:*:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:2.02:*:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:2.02:beta:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:2.2:beta1:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:2.2:beta2:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:2.2:beta3:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:2.4:beta1:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:2.4:beta2:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:2.4:beta3:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:2.11:*:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:2.11:beta:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:2.11:beta2:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:2.15:*:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:2.15:beta:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:2.16:*:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:2.21:*:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:2.22:*:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:2.23:beta:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:2.31:*:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:2.32:*:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:2.41:*:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:2.42:*:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:2.43:*:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:2.44:*:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:2.45:*:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:2.46:*:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:2.47:*:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:2.48:*:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:2.49:*:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:2.50:*:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:3.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:3.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:3.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:3.0.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:3.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:3.1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:3.1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:3.1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:3.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:3.1.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:3.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:4.0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:4.0.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:4.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:4.0.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:4.0.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:4.0.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:4.0.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:4.0.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:4.0.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:4.0.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:4.0.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:4.0.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:4.0.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:4.0.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:4.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:4.0.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:4.0.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:4.0.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:4.0.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:4.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:4.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:4.0.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:4.0.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:4.0.7.5:*:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:4.0.7.6:*:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:4.0.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:4.0.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:4.0.8.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:4.0.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:4.0.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:4.0.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:4.0.9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:4.0.9.4:*:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:4.0.9.5:*:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:4.0.9.6:*:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:4.0.9.7:*:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:4.0.9.8:*:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:4.0.10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:4.0.11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:5.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:5.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:5.0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:5.0.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:5.0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:5.0.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:5.0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:5.0.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:5.0.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:5.0.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:5.0.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:5.0.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:5.0.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:5.0.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:5.0.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:5.0.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:5.0.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:5.0.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cerberusftp:ftp_server:5.0.5.0:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2021-45092 | Thinfinity VirtualUI before 3.0 has functionality in /lab.html reachable by default that could allow IFRAME injection via the vpath parameter. | [
"cpe:2.3:a:cybelesoft:thinfinity_virtualui:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
|
RHSA-2004:466 | Red Hat Security Advisory: gtk2 security update | security flaw security flaw security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
CVE-2021-30615 | Chromium: CVE-2021-30615 Cross-origin data leak in Navigation | [
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:edge:*:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:edge_chromium:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4.3 |
|
GHSA-xgcg-f8g4-r3mp | An improper neutralization of input during web page generation vulnerability [CWE-79] in FortiAnalyzer versions prior to 7.2.1, 7.0.4 and 6.4.8 may allow a remote unauthenticated attacker to perform a stored cross site scripting (XSS) attack via the URL parameter observed in the FortiWeb attack event logview in FortiAnalyzer. | [] | null | 6.1 | null | null |
|
GHSA-h5mm-qpcp-gqc7 | Unknown vulnerability in the "frontend authentication" in PHlyMail 3.02.00 has unknown impact and attack vectors. | [] | null | null | null | null |
|
CVE-2014-8513 | Buffer overflow in an ActiveX control in MDraw30.ocx in Schneider Electric ProClima before 6.1.7 allows remote attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2014-8514 and CVE-2014-9188. NOTE: this may be clarified later based on details provided by researchers. | [
"cpe:2.3:a:schneider_electric:proclima:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
RHSA-2023:4079 | Red Hat Security Advisory: firefox security update | Mozilla: Use-after-free in WebRTC certificate generation Mozilla: Potential use-after-free from compartment mismatch in SpiderMonkey Mozilla: Fullscreen notification obscured Mozilla: Lack of warning when opening Diagcab files Mozilla: Memory safety bugs fixed in Firefox 115, Firefox ESR 102.13, and Thunderbird 102.13 | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.8 | null | null |
CVE-2005-0651 | Multiple SQL injection vulnerabilities in ProjectBB 0.4.5.1 allow remote attackers to execute arbitrary SQL commands via (1) liste or (2) desc parameters to divers.php (incorrectly referred to as "drivers.php" by some sources), (3) the search feature text area, (4) post name in the post creation feature, (5) City, (6) Homepage, (7) ICQ, (8) AOL, (9) Yahoo!, (10) MSN, or (11) e-mail fields in the profile feature or (12) the new field in the moderator section. | [
"cpe:2.3:a:projectbb:projectbb:0.4.5.1:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2023-38309 | An issue was discovered in Webmin 2.021. A Reflected Cross-Site Scripting (XSS) vulnerability was discovered in the package search functionality. The vulnerability allows an attacker to inject a malicious payload in the "Search for Package" field, which gets reflected back in the application's response, leading to the execution of arbitrary JavaScript code within the context of the victim's browser. | [
"cpe:2.3:a:webmin:webmin:2.021:*:*:*:*:*:*:*"
] | null | 6.1 | null | null |
|
CVE-2016-3722 | Jenkins before 2.3 and LTS before 1.651.2 allow remote authenticated users with multiple accounts to cause a denial of service (unable to login) by editing the "full name." | [
"cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*",
"cpe:2.3:a:redhat:openshift:3.1:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:redhat:openshift:3.2:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*"
] | null | null | 4.3 | 4 |
|
RHSA-2025:0145 | Red Hat Security Advisory: webkit2gtk3 security update | WebKitGTK: Processing maliciously crafted web content may lead to an unexpected process crash webkit: Processing maliciously crafted web content may lead to an unexpected process crash webkit: Processing maliciously crafted web content may lead to memory corruption webkit: Processing maliciously crafted web content may lead to an unexpected process crash | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 6.5 | null | null |
CVE-2017-7285 | A vulnerability in the network stack of MikroTik Version 6.38.5 released 2017-03-09 could allow an unauthenticated remote attacker to exhaust all available CPU via a flood of TCP RST packets, preventing the affected router from accepting new TCP connections. | [
"cpe:2.3:o:mikrotik:routeros:6.38.5:*:*:*:*:*:*:*"
] | null | null | 7.5 | 7.8 |
|
CVE-2014-5277 | Docker before 1.3.1 and docker-py before 0.5.3 fall back to HTTP when the HTTPS connection to the registry fails, which allows man-in-the-middle attackers to conduct downgrade attacks and obtain authentication and image data by leveraging a network position between the client and the registry to block HTTPS traffic. | [
"cpe:2.3:a:docker:docker:*:*:*:*:*:*:*:*",
"cpe:2.3:a:docker:docker-py:*:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2018-20152 | In WordPress before 4.9.9 and 5.x before 5.0.1, authors could bypass intended restrictions on post types via crafted input. | [
"cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] | null | null | 6.5 | 4 |
|
RHSA-2006:0574 | Red Hat Security Advisory: kernel security update | Possible privilege escalation through prctl() and suid_dumpable | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
CVE-2022-41925 | Tailscale daemon is vulnerable to information disclosure via CSRF | A vulnerability identified in the Tailscale client allows a malicious website to access the peer API, which can then be used to access Tailscale environment variables. In the Tailscale client, the peer API was vulnerable to DNS rebinding. This allowed an attacker-controlled website visited by the node to rebind DNS for the peer API to an attacker-controlled DNS server, and then making peer API requests in the client, including accessing the node’s Tailscale environment variables. An attacker with access to the peer API on a node could use that access to read the node’s environment variables, including any credentials or secrets stored in environment variables. This may include Tailscale authentication keys, which could then be used to add new nodes to the user’s tailnet. The peer API access could also be used to learn of other nodes in the tailnet or send files via Taildrop. All Tailscale clients prior to version v1.32.3 are affected. Upgrade to v1.32.3 or later to remediate the issue. | [
"cpe:2.3:a:tailscale:tailscale:*:*:*:*:*:*:*:*"
] | null | null | 3.8 | null |
GHSA-4f8x-8m63-7qx4 | In lwis_top_register_io of lwis_device_top.c, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-205995178References: N/A | [] | null | 6.7 | null | null |
|
GHSA-p3pg-64pv-v7jg | Prototype Pollution in jsgui-lang-essentials | All versions of package `jsgui-lang-essentials` are vulnerable to Prototype Pollution due to allowing all `Object` attributes to be altered, including their magical attributes such as `proto`, `constructor` and `prototype`. | [] | null | 7.7 | null | null |
CVE-2024-46652 | Tenda AC8v4 V16.03.34.06 has a stack overflow vulnerability in the fromAdvSetMacMtuWan function. | [
"cpe:2.3:o:tenda:ac8v4_firmware:16.03.34.06:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
CVE-2020-15705 | GRUB2: avoid loading unsigned kernels when GRUB is booted directly under secureboot without shim | GRUB2 fails to validate kernel signature when booted directly without shim, allowing secure boot to be bypassed. This only affects systems where the kernel signing certificate has been imported directly into the secure boot database and the GRUB image is booted directly without the use of shim. This issue affects GRUB2 version 2.04 and prior versions. | [
"cpe:2.3:a:gnu:grub2:*:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:enterprise_linux_atomic_host:-:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux_enterprise_server:11:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux_enterprise_server:15:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
] | null | 6.4 | null | null |
GHSA-vqr3-vrrg-f3jh | NodeBB Cross-site scripting (XSS) vulnerability | A persistent cross-site scripting (XSS) vulnerability in NodeBB v3.11.0 allows remote attackers to store arbitrary code in the 'about me' section of their profile. | [] | null | 4.6 | null | null |
CVE-2015-3844 | The getProcessRecordLocked method in services/core/java/com/android/server/am/ActivityManagerService.java in ActivityManager in Android before 5.1.1 LMY48I allows attackers to trigger incorrect process loading via a crafted application, as demonstrated by interfering with use of the Settings application, aka internal bug 21669445. | [
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
CVE-2022-46538 | Tenda F1203 V2.0.1.6 was discovered to contain a command injection vulnerability via the mac parameter at /goform/WriteFacMac. | [
"cpe:2.3:o:tenda:f1203_firmware:2.0.1.6:*:*:*:*:*:*:*",
"cpe:2.3:h:tenda:f1203:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
CVE-2024-4658 | SQLi in TE Informatics' Nova CMS | SQL Injection: Hibernate vulnerability in TE Informatics Nova CMS allows SQL Injection.This issue affects Nova CMS: before 5.0. | [
"cpe:2.3:a:te_informatics:nova_cms:*:*:*:*:*:*:*:*"
] | 6.9 | null | null | null |
CVE-2024-3925 | Element Pack Elementor Addons (Header Footer, Template Library, Dynamic Grid & Carousel, Remote Arrows) <= 5.6.7 - Authenticated (Contributor+) Stored Cross-Site Scripting via onclick events | The Element Pack Elementor Addons (Header Footer, Template Library, Dynamic Grid & Carousel, Remote Arrows) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Creative Button widget in all versions up to, and including, 5.6.7 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] | null | 6.4 | null | null |
GHSA-xhx7-vf2f-vmhh | Multiple buffer overflows in programs used by scoadmin and sysadmsh in SCO OpenServer 5.0.6a and earlier allow local users to gain privileges via a long TERM environment variable to (1) atcronsh, (2) auditsh, (3) authsh, (4) backupsh, (5) lpsh, (6) sysadm.menu, or (7) termsh. | [] | null | null | null | null |
|
CVE-2015-3415 | The sqlite3VdbeExec function in vdbe.c in SQLite before 3.8.9 does not properly implement comparison operators, which allows context-dependent attackers to cause a denial of service (invalid free operation) or possibly have unspecified other impact via a crafted CHECK clause, as demonstrated by CHECK(0&O>O) in a CREATE TABLE statement. | [
"cpe:2.3:o:apple:mac_os_x:10.10.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*",
"cpe:2.3:a:sqlite:sqlite:*:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-9pgh-qqpf-7wqj | Withdrawn: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in @xmldom/xmldom and xmldom | WithdrawnThis advisory has been withdrawn because the maintainers of `@xmldom/xmldom` and multiple third parties disputed the validity of the issue. Attempts to create or replicate a proof of concept have been unsuccessful.Original DescriptionImpactA prototype pollution vulnerability exists in the function copy in dom.js in the xmldom (published as @xmldom/xmldom) package.PatchesUpdate to `@xmldom/xmldom@~0.7.6`, `@xmldom/xmldom@~0.8.3` (dist-tag `latest`) or `@xmldom/xmldom@>=0.9.0-beta.2` (dist-tag `next`).WorkaroundsNoneReferenceshttps://github.com/xmldom/xmldom/pull/437For more informationIf you have any questions or comments about this advisory:Email us at [email protected] information to https://github.com/xmldom/xmldom/issues/436 | [] | null | 9.8 | null | null |
CVE-2015-2221 | ClamAV before 0.98.7 allows remote attackers to cause a denial of service (infinite loop) via a crafted y0da cryptor file. | [
"cpe:2.3:a:clamav:clamav:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:15.1:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2025-22730 | WordPress Ksher plugin <= 1.1.2 - Broken Access Control vulnerability | Missing Authorization vulnerability in Ksher Ksher allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Ksher: from n/a through 1.1.2. | [] | null | 6.5 | null | null |
CVE-2022-37097 | H3C H200 H200V100R004 was discovered to contain a stack overflow via the function SetAPInfoById. | [
"cpe:2.3:o:h3c:h200_firmware:h200v100r004:*:*:*:*:*:*:*",
"cpe:2.3:h:h3c:h200:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
CVE-2021-24952 | Conversios.io < 4.6.2 - Subscriber+ SQL Injection | The Conversios.io WordPress plugin before 4.6.2 does not sanitise, validate and escape the sync_progressive_data parameter for the tvcajax_product_sync_bantch_wise AJAX action before using it in a SQL statement, allowing any authenticated user to perform SQL injection attacks. | [
"cpe:2.3:a:tatvic:conversios.io:*:*:*:*:*:wordpress:*:*"
] | null | 8.8 | null | 6.5 |
GHSA-7gj2-q7q5-28j5 | Format string vulnerability in the msg command (cat_message function in msg.c) in OpenFTPD 0.30.2 and earlier allows remote authenticated users to execute arbitrary code via format string specifiers in the message argument. | [] | null | null | null | null |
|
CVE-2006-2026 | Double free vulnerability in tif_jpeg.c in libtiff before 3.8.1 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted TIFF image that triggers errors related to "setfield/getfield methods in cleanup functions." | [
"cpe:2.3:a:libtiff:libtiff:*:*:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.7.1:*:*:*:*:*:*:*"
] | null | null | null | 6.5 |
|
CVE-2024-9661 | WP All Import Pro <= 4.9.7 - Cross-Site Request Forgery to Imported Content Deletion | The WP All Import Pro plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 4.9.7. This is due to missing nonce validation on the delete_and_edit function. This makes it possible for unauthenticated attackers to delete imported content (posts, comments, users, etc.) via a forged request, granted they can trick a site administrator into performing an action such as clicking on a link. | [] | null | 4.3 | null | null |
CVE-2024-45758 | H2O.ai H2O through 3.46.0.4 allows attackers to arbitrarily set the JDBC URL, leading to deserialization attacks, file reads, and command execution. Exploitation can occur when an attacker has access to post to the ImportSQLTable URI with a JSON document containing a connection_url property with any typical JDBC Connection URL attack payload such as one that uses queryInterceptors. | [
"cpe:2.3:a:h2oai:h2o-3:*:*:*:*:*:*:*:*"
] | null | 9.1 | null | null |
|
GHSA-977j-j9c4-3v4j | A remote code execution vulnerability in sonivox in Mediaserver could enable an attacker using a specially crafted file to cause memory corruption during media file and data processing. This issue is rated as Critical due to the possibility of remote code execution within the context of the Mediaserver process. Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1. Android ID: A-34031018. | [] | null | null | 7.8 | null |
|
GHSA-7fjc-rgx8-7qpp | Cross-site scripting (XSS) vulnerability in the Hosting Control Panel (psoft.hsphere.CP) in Positive Software H-Sphere 2.4.3 Patch 8 and earlier allows remote attackers to inject arbitrary web script or HTML via the login parameter in a login action. | [] | null | null | null | null |
|
GHSA-5mjp-v9j2-hgpv | Microsoft Silverlight 5 before 5.1.40416.00 allows remote attackers to bypass intended integrity-level restrictions via a crafted Silverlight application, aka "Microsoft Silverlight Out of Browser Application Vulnerability." | [] | null | null | null | null |
|
GHSA-773h-w45w-f2f9 | Denial of service vulnerability exists in libxmljs | libxmljs provides libxml bindings for v8 javascript engine. This affects all versions of package libxmljs. When invoking the libxmljs.parseXml function with a non-buffer argument the V8 code will attempt invoking the .toString method of the argument. If the argument's toString value is not a Function object V8 will crash. | [] | null | 7.5 | null | null |
GHSA-fm93-fhh2-cg2c | Prototype Pollution in min-dash | The package min-dash before 3.8.1 are vulnerable to Prototype Pollution via the set method due to missing enforcement of key types. | [] | null | 7.5 | null | null |
GHSA-8mhr-8p53-r587 | Mozilla developers reported memory safety bugs present in Firefox 76. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 77. | [] | null | null | null | null |
|
GHSA-m9jx-fc37-ppq8 | Adobe Substance 3D Painter versions 8.3.0 (and earlier) is affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [] | null | 7.8 | null | null |
|
GHSA-4vxh-jq3c-5rhw | The Apus Framework plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the 'import_page_options' function in all versions up to, and including, 2.3. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update arbitrary options on the WordPress site. This can be leveraged to update the default role for registration to administrator and enable user registration for attackers to gain administrative user access to a vulnerable site. | [] | null | 8.8 | null | null |
|
PYSEC-2023-95 | null | py-xml v1.0 was discovered to contain an XML External Entity Injection (XXE) vulnerability which allows attackers to execute arbitrary code via a crafted XML file. | [] | null | null | null | null |
GHSA-p2rv-mh7r-fmxh | SQL injection vulnerability in detail.php in Simple Document Management System (SDMS) allows remote attackers to execute arbitrary SQL commands via the doc_id parameter. | [] | null | null | null | null |
|
CVE-2024-33684 | WordPress Save as PDF plugin by Pdfcrowd plugin <= 3.2.0 - Broken Access Control to Stored XSS vulnerability | Missing Authorization vulnerability in Pdfcrowd Save as PDF plugin by Pdfcrowd allows Stored XSS.This issue affects Save as PDF plugin by Pdfcrowd: from n/a through 3.2.0.
| [
"cpe:2.3:a:pdfcrowd:save_as_pdf:*:*:*:*:*:wordpress:*:*"
] | null | 6.5 | null | null |
CVE-2021-41125 | HTTP authentication credential leak to target websites in scrapy | Scrapy is a high-level web crawling and scraping framework for Python. If you use `HttpAuthMiddleware` (i.e. the `http_user` and `http_pass` spider attributes) for HTTP authentication, all requests will expose your credentials to the request target. This includes requests generated by Scrapy components, such as `robots.txt` requests sent by Scrapy when the `ROBOTSTXT_OBEY` setting is set to `True`, or as requests reached through redirects. Upgrade to Scrapy 2.5.1 and use the new `http_auth_domain` spider attribute to control which domains are allowed to receive the configured HTTP authentication credentials. If you are using Scrapy 1.8 or a lower version, and upgrading to Scrapy 2.5.1 is not an option, you may upgrade to Scrapy 1.8.1 instead. If you cannot upgrade, set your HTTP authentication credentials on a per-request basis, using for example the `w3lib.http.basic_auth_header` function to convert your credentials into a value that you can assign to the `Authorization` header of your request, instead of defining your credentials globally using `HttpAuthMiddleware`. | [
"cpe:2.3:a:scrapy:scrapy:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] | null | 5.7 | null | null |
CVE-2020-2246 | Jenkins Valgrind Plugin 0.28 and earlier does not escape content in Valgrind XML reports, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control Valgrind XML report contents. | [
"cpe:2.3:a:jenkins:valgrind:*:*:*:*:*:jenkins:*:*"
] | null | 5.4 | null | 3.5 |
|
CVE-2023-24935 | Microsoft Edge (Chromium-based) Spoofing Vulnerability | Microsoft Edge (Chromium-based) Spoofing Vulnerability | [
"cpe:2.3:a:microsoft:edge_chromium:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | null |
GHSA-mx37-rcg6-jwqh | TOTOLINK X5000R V9.1.0cu.2350_B20230313 was discovered to contain an OS command injection vulnerability via the "user" parameter in setVpnAccountCfg. | [] | null | 9.8 | null | null |
|
GHSA-995r-hfcw-r5pv | A reflected cross-site scripting (XSS) vulnerability exists in Brocade Webtools PortSetting.html of Brocade Fabric OS version before Brocade Fabric OS v9.2.0 that could allow a remote unauthenticated attacker to execute arbitrary JavaScript code in a target user’s session with the Brocade Webtools application. | [] | null | 6.3 | null | null |
|
CVE-2023-41791 | Lack of Authorization and Stored XSS Via Translation Abuse | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Pandora FMS on all allows Cross-Site Scripting (XSS). This vulnerability allowed users with low privileges to introduce Javascript executables via a translation string that could affect the integrity of some configuration files. This issue affects Pandora FMS: from 700 through 773. | [
"cpe:2.3:a:artica:pandora_fms:*:*:*:*:*:*:*:*"
] | null | 8.4 | null | null |
CVE-2015-9235 | In jsonwebtoken node module before 4.2.2 it is possible for an attacker to bypass verification when a token digitally signed with an asymmetric key (RS/ES family) of algorithms but instead the attacker send a token digitally signed with a symmetric algorithm (HS* family). | [
"cpe:2.3:a:auth0:jsonwebtoken:*:*:*:*:*:node.js:*:*"
] | null | null | 9.8 | 7.5 |
|
GHSA-wm8g-494w-jg7c | eFiction 1.0, 1.1, and 2.0 allows remote attackers to obtain sensitive information via a direct request to storyblock.php without arguments, which leaks the full pathname in the resulting PHP error message. | [] | null | null | null | null |
|
GHSA-hrqr-hxpp-chr3 | Possible Information Leak / Session Hijack Vulnerability in Rack | There's a possible information leak / session hijack vulnerability in Rack. Attackers may be able to find and hijack sessions by using timing attacks targeting the session id. Session ids are usually stored and indexed in a database that uses some kind of scheme for speeding up lookups of that session id. By carefully measuring the amount of time it takes to look up a session, an attacker may be able to find a valid session id and hijack the session.The session id itself may be generated randomly, but the way the session is indexed by the backing store does not use a secure comparison.ImpactThe session id stored in a cookie is the same id that is used when querying the backing session storage engine. Most storage mechanisms (for example a database) use some sort of indexing in order to speed up the lookup of that id. By carefully timing requests and session lookup failures, an attacker may be able to perform a timing attack to determine an existing session id and hijack that session.ReleasesThe 1.6.12 and 2.0.8 releases are available at the normal locations.WorkaroundsThere are no known workarounds.PatchesTo aid users who aren't able to upgrade immediately we have provided patches for
the two supported release series. They are in git-am format and consist of a
single changeset.1-6-session-timing-attack.patch - Patch for 1.6 series2-0-session-timing-attack.patch - Patch for 2.6 seriesCreditsThanks Will Leinweber for reporting this! | [] | null | 6.3 | null | null |
GHSA-j94f-4hmh-hx5v | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Roninwp FAT Services Booking allows Stored XSS.This issue affects FAT Services Booking: from n/a through 5.6. | [] | null | 7.1 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.