id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 36
232
⌀ |
---|---|---|---|---|---|---|---|---|
GHSA-x9xm-pqf5-5g9w
|
MFScripts YetiShare v3.5.2 through v4.5.4 might allow an attacker to reset a password by using a leaked hash (the hash never expires until used).
|
[] | null | null | null | null | null |
|
CVE-2021-40480
|
Microsoft Office Visio Remote Code Execution Vulnerability
|
Microsoft Office Visio Remote Code Execution Vulnerability
|
[
"cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
GHSA-3fq7-vqr9-hr59
|
A stack-based buffer overflow issue was discovered in Advantech WebAccess versions prior to V8.2_20170817. Researchers have identified multiple vulnerabilities where there is a lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer, which could allow an attacker to execute arbitrary code under the context of the process.
|
[] | null | null | 9.8 | null | null |
|
CVE-2021-3423
|
Privilege escalation in Bitdefender GravityZone Business Security
|
Uncontrolled Search Path Element vulnerability in the openssl component as used in Bitdefender GravityZone Business Security allows an attacker to load a third party DLL to elevate privileges. This issue affects Bitdefender GravityZone Business Security versions prior to 6.6.23.329.
|
[
"cpe:2.3:a:bitdefender:gravityzone_business_security:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
GHSA-5jqg-5g42-mwgq
|
K7TSMngr.exe in K7Computing K7AntiVirus Premium 15.1.0.53 has a Memory Leak.
|
[] | null | null | null | null | null |
|
GHSA-jm7x-w2c2-x6qr
|
Cisco IOS 12.2, 12.4, 15.0, 15.2, and 15.3 allows remote attackers to cause a denial of service (device reload) via malformed Common Industrial Protocol (CIP) TCP packets, aka Bug ID CSCun63514.
|
[] | null | null | null | null | null |
|
CVE-2018-19531
|
HTTL (aka Hyper-Text Template Language) through 1.0.11 allows remote command execution because the decodeXml function uses java.beans.XMLEncoder unsafely when configured without an xml.codec= setting.
|
[
"cpe:2.3:a:httl_project:httl:*:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 | null |
|
CVE-2023-44809
|
D-Link device DIR-820L 1.05B03 is vulnerable to Insecure Permissions.
|
[
"cpe:2.3:h:d-link:dir-820l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dir-820l_firmware:1.05b03:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dir-820l:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
|
CVE-2003-0734
|
Unknown vulnerability in the pam_filter mechanism in pam_ldap before version 162, when LDAP based authentication is being used, allows users to bypass host-based access restrictions and log onto the system.
|
[
"cpe:2.3:a:padl_software:pam_ldap:*:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
CVE-2020-29054
|
An issue was discovered on CDATA 72408A, 9008A, 9016A, 92408A, 92416A, 9288, 97016, 97024P, 97028P, 97042P, 97084P, 97168P, FD1002S, FD1104, FD1104B, FD1104S, FD1104SN, FD1108S, FD1204S-R2, FD1204SN, FD1204SN-R2, FD1208S-R2, FD1216S-R1, FD1608GS, FD1608SN, FD1616GS, FD1616SN, and FD8000 devices. Attackers can use "show system infor" to discover cleartext TELNET credentials.
|
[
"cpe:2.3:o:cdatatec:72408a_firmware:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:72408a_firmware:2.4.03_000:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:72408a_firmware:2.4.04_001:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:72408a_firmware:2.4.05_000:*:*:*:*:*:*:*",
"cpe:2.3:h:cdatatec:72408a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:9008a_firmware:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:9008a_firmware:2.4.03_000:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:9008a_firmware:2.4.04_001:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:9008a_firmware:2.4.05_000:*:*:*:*:*:*:*",
"cpe:2.3:h:cdatatec:9008a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:9016a_firmware:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:9016a_firmware:2.4.03_000:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:9016a_firmware:2.4.04_001:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:9016a_firmware:2.4.05_000:*:*:*:*:*:*:*",
"cpe:2.3:h:cdatatec:9016a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:92408a_firmware:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:92408a_firmware:2.4.03_000:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:92408a_firmware:2.4.04_001:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:92408a_firmware:2.4.05_000:*:*:*:*:*:*:*",
"cpe:2.3:h:cdatatec:92408a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:92416a_firmware:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:92416a_firmware:2.4.03_000:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:92416a_firmware:2.4.04_001:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:92416a_firmware:2.4.05_000:*:*:*:*:*:*:*",
"cpe:2.3:h:cdatatec:92416a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:9288_firmware:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:9288_firmware:2.4.03_000:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:9288_firmware:2.4.04_001:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:9288_firmware:2.4.05_000:*:*:*:*:*:*:*",
"cpe:2.3:h:cdatatec:9288:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:97016_firmware:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:97016_firmware:2.4.03_000:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:97016_firmware:2.4.04_001:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:97016_firmware:2.4.05_000:*:*:*:*:*:*:*",
"cpe:2.3:h:cdatatec:97016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:97024p_firmware:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:97024p_firmware:2.4.03_000:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:97024p_firmware:2.4.04_001:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:97024p_firmware:2.4.05_000:*:*:*:*:*:*:*",
"cpe:2.3:h:cdatatec:97024p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:97028p_firmware:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:97028p_firmware:2.4.03_000:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:97028p_firmware:2.4.04_001:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:97028p_firmware:2.4.05_000:*:*:*:*:*:*:*",
"cpe:2.3:h:cdatatec:97028p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:97042p_firmware:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:97042p_firmware:2.4.03_000:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:97042p_firmware:2.4.04_001:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:97042p_firmware:2.4.05_000:*:*:*:*:*:*:*",
"cpe:2.3:h:cdatatec:97042p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:97084p_firmware:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:97084p_firmware:2.4.03_000:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:97084p_firmware:2.4.04_001:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:97084p_firmware:2.4.05_000:*:*:*:*:*:*:*",
"cpe:2.3:h:cdatatec:97084p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:97168p_firmware:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:97168p_firmware:2.4.03_000:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:97168p_firmware:2.4.04_001:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:97168p_firmware:2.4.05_000:*:*:*:*:*:*:*",
"cpe:2.3:h:cdatatec:97168p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1002s_firmware:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1002s_firmware:2.4.03_000:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1002s_firmware:2.4.04_001:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1002s_firmware:2.4.05_000:*:*:*:*:*:*:*",
"cpe:2.3:h:cdatatec:fd1002s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1104_firmware:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1104_firmware:2.4.03_000:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1104_firmware:2.4.04_001:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1104_firmware:2.4.05_000:*:*:*:*:*:*:*",
"cpe:2.3:h:cdatatec:fd1104:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1104b_firmware:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1104b_firmware:2.4.03_000:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1104b_firmware:2.4.04_001:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1104b_firmware:2.4.05_000:*:*:*:*:*:*:*",
"cpe:2.3:h:cdatatec:fd1104b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1104s_firmware:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1104s_firmware:2.4.03_000:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1104s_firmware:2.4.04_001:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1104s_firmware:2.4.05_000:*:*:*:*:*:*:*",
"cpe:2.3:h:cdatatec:fd1104s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1104sn_firmware:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1104sn_firmware:2.4.03_000:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1104sn_firmware:2.4.04_001:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1104sn_firmware:2.4.05_000:*:*:*:*:*:*:*",
"cpe:2.3:h:cdatatec:fd1104sn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1108s_firmware:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1108s_firmware:2.4.03_000:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1108s_firmware:2.4.04_001:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1108s_firmware:2.4.05_000:*:*:*:*:*:*:*",
"cpe:2.3:h:cdatatec:fd1108s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1204s-r2_firmware:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1204s-r2_firmware:2.4.03_000:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1204s-r2_firmware:2.4.04_001:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1204s-r2_firmware:2.4.05_000:*:*:*:*:*:*:*",
"cpe:2.3:h:cdatatec:fd1204s-r2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1204sn_firmware:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1204sn_firmware:2.4.03_000:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1204sn_firmware:2.4.04_001:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1204sn_firmware:2.4.05_000:*:*:*:*:*:*:*",
"cpe:2.3:h:cdatatec:fd1204sn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1204sn-r2_firmware:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1204sn-r2_firmware:2.4.03_000:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1204sn-r2_firmware:2.4.04_001:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1204sn-r2_firmware:2.4.05_000:*:*:*:*:*:*:*",
"cpe:2.3:h:cdatatec:fd1204sn-r2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1208s-r2_firmware:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1208s-r2_firmware:2.4.03_000:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1208s-r2_firmware:2.4.04_001:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1208s-r2_firmware:2.4.05_000:*:*:*:*:*:*:*",
"cpe:2.3:h:cdatatec:fd1208s-r2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1216s-r1_firmware:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1216s-r1_firmware:2.4.03_000:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1216s-r1_firmware:2.4.04_001:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1216s-r1_firmware:2.4.05_000:*:*:*:*:*:*:*",
"cpe:2.3:h:cdatatec:fd1216s-r1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1608gs_firmware:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1608gs_firmware:2.4.03_000:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1608gs_firmware:2.4.04_001:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1608gs_firmware:2.4.05_000:*:*:*:*:*:*:*",
"cpe:2.3:h:cdatatec:fd1608gs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1608sn_firmware:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1608sn_firmware:2.4.03_000:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1608sn_firmware:2.4.04_001:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1608sn_firmware:2.4.05_000:*:*:*:*:*:*:*",
"cpe:2.3:h:cdatatec:fd1608sn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1616gs_firmware:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1616gs_firmware:2.4.03_000:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1616gs_firmware:2.4.04_001:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1616gs_firmware:2.4.05_000:*:*:*:*:*:*:*",
"cpe:2.3:h:cdatatec:fd1616gs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1616sn_firmware:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1616sn_firmware:2.4.03_000:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1616sn_firmware:2.4.04_001:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1616sn_firmware:2.4.05_000:*:*:*:*:*:*:*",
"cpe:2.3:h:cdatatec:fd1616sn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd8000_firmware:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd8000_firmware:2.4.03_000:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd8000_firmware:2.4.04_001:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd8000_firmware:2.4.05_000:*:*:*:*:*:*:*",
"cpe:2.3:h:cdatatec:fd8000:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | 5 | null |
|
GHSA-74g4-6hq9-8qwm
|
The kernel in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an authenticated attacker to obtain information via a specially crafted application. aka "Windows Kernel Information Disclosure Vulnerability," a different vulnerability than CVE-2017-8492, CVE-2017-8490, CVE-2017-8489, CVE-2017-8488, CVE-2017-8485, CVE-2017-8483, CVE-2017-8482, CVE-2017-8480, CVE-2017-8479, CVE-2017-8478, CVE-2017-8476, CVE-2017-8474, CVE-2017-8469, CVE-2017-8462, CVE-2017-0300, CVE-2017-0299, and CVE-2017-0297.
|
[] | null | null | 5 | null | null |
|
CVE-2020-7647
|
All versions before 1.6.7 and all versions after 2.0.0 inclusive and before 2.8.2 of io.jooby:jooby and org.jooby:jooby are vulnerable to Directory Traversal via two separate vectors.
|
[
"cpe:2.3:a:jooby:jooby:*:*:*:*:*:*:*:*"
] | null | 5.3 | null | 5 | null |
|
GHSA-43wh-qf2q-fxjw
|
The Data Protection extension in the VMware GUI in IBM Tivoli Storage Manager for Virtual Environments: Data Protection for VMware (aka Spectrum Protect for Virtual Environments) 7.1 before 7.1.4 and Tivoli Storage FlashCopy Manager for VMware (aka Spectrum Protect Snapshot) 4.1 before 4.1.4 allows remote authenticated users to restore arbitrary virtual machines and consequently obtain sensitive information by visiting the vSphere inventory.
|
[] | null | null | 8.5 | null | null |
|
CVE-2021-0436
|
In CryptoPlugin::decrypt of CryptoPlugin.cpp, there is a possible out of bounds read due to integer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-176496160
|
[
"cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*"
] | null | 5.5 | null | 2.1 | null |
|
CVE-2022-0831
|
Cross-site Scripting (XSS) - Stored in pimcore/pimcore
|
Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 10.3.3.
|
[
"cpe:2.3:a:pimcore:pimcore:*:*:*:*:*:*:*:*"
] | null | null | 4.6 | null | null |
GHSA-j2m5-w7qp-hqg7
|
An issue was discovered in Qt before 5.15.15, 6.x before 6.2.9, and 6.3.x through 6.5.x before 6.5.1. When a SVG file with an image inside it is rendered, a QTextLayout buffer overflow can be triggered.
|
[] | null | 7.5 | null | null | null |
|
GHSA-hc4w-25w5-j59v
|
A vulnerability, which was classified as problematic, was found in OpenMRS Appointment Scheduling Module up to 1.16.x. This affects the function getNotes of the file api/src/main/java/org/openmrs/module/appointmentscheduling/AppointmentRequest.java of the component Notes Handler. The manipulation of the argument notes leads to cross site scripting. It is possible to initiate the attack remotely. Upgrading to version 1.17.0 is able to address this issue. The name of the patch is 2ccbe39c020809765de41eeb8ee4c70b5ec49cc8. It is recommended to upgrade the affected component. The identifier VDB-216741 was assigned to this vulnerability.
|
[] | null | 6.1 | null | null | null |
|
GHSA-3959-4243-g349
|
Improper input validation for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow a privileged user to potentially enable escalation of privilege via local access.
|
[] | null | null | null | null | null |
|
GHSA-c332-g293-hmxg
|
DLL Search Order Hijacking vulnerability in Microsoft Windows client in McAfee Total Protection (MTP) Free Antivirus Trial 16.0.R18 and earlier allows local users to execute arbitrary code via execution from a compromised folder placed by an attacker with administrator rights.
|
[] | null | 6.5 | null | null | null |
|
CVE-2003-0089
|
Buffer overflow in the Software Distributor utilities for HP-UX B.11.00 and B.11.11 allows local users to execute arbitrary code via a long LANG environment variable to setuid programs such as (1) swinstall and (2) swmodify.
|
[
"cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:11.11:*:*:*:*:*:*:*"
] | null | null | null | 7.2 | null |
|
RHSA-2021:3073
|
Red Hat Security Advisory: nodejs:12 security, bug fix, and enhancement update
|
libuv: out-of-bounds read in uv__idna_toascii() can lead to information disclosures or crashes nodejs-hosted-git-info: Regular Expression denial of service via shortcutMatch in fromUrl() nodejs-ssri: Regular expression DoS (ReDoS) when parsing malicious SRI in strict mode
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | 5.3 | null | null |
GHSA-vxr6-pwvm-cf57
|
A vulnerability has been identified in Siveillance Video Mobile Server V2022 R2 (All versions < V22.2a (80)). The mobile server component of affected applications improperly handles the log in for Active Directory accounts that are part of Administrators group. This could allow an unauthenticated remote attacker to access the application without a valid account.
|
[] | null | 9.8 | null | null | null |
|
GHSA-36mr-q5jp-rfp3
|
A flaw was found in ImageMagick in MagickCore/quantum-export.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned long long` as well as a shift exponent that is too large for 64-bit type. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0.
|
[] | null | 3.3 | null | null | null |
|
GHSA-396g-xc2g-5qhm
|
Vulnerability in Tenda AC8v4 .V16.03.34.09 due to sscanf and the last digit of s8 being overwritten with \x0. After executing set_client_qos, control over the gp register can be obtained.
|
[] | null | 6.3 | null | null | null |
|
CVE-2024-11540
|
IrfanView DXF File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability
|
IrfanView DXF File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of DXF files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24700.
|
[
"cpe:2.3:a:irfanview:irfanview:-:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:4.67:*:*:*:*:*:x64:*",
"cpe:2.3:a:irfanview:irfanview:4.67:*:*:*:*:*:x86:*"
] | null | null | 7.8 | null | null |
GHSA-749r-cw7g-mfcq
|
AtomCMS 2.0 is vulnerabie to SQL Injection via Atom.CMS_admin_ajax_list-sort.php
|
[] | null | 9.8 | null | null | null |
|
CVE-2018-19754
|
Tarantella Enterprise before 3.11 allows bypassing Access Control.
|
[
"cpe:2.3:a:oracle:tarantella_enterprise:*:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.5 | null |
|
CVE-2022-1175
|
Improper neutralization of user input in GitLab CE/EE versions 14.4 before 14.7.7, all versions starting from 14.8 before 14.8.5, all versions starting from 14.9 before 14.9.2 allowed an attacker to exploit XSS by injecting HTML in notes.
|
[
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*"
] | null | 8.7 | null | null | null |
|
GHSA-jrqc-6vfg-cfj2
|
Directory Services in Apple Mac OS X 10.0.2, 10.0.3, 10.2.8, 10.3.2 and Apple Mac OS X Server 10.2 through 10.3.2 accepts authentication server information from unknown LDAP or NetInfo sources as provided by a malicious DHCP server, which allows remote attackers to gain privileges.
|
[] | null | null | null | null | null |
|
GHSA-f9cv-665r-275h
|
Prototype Pollution in merge-change
|
All current versions of package merge-change are vulnerable to Prototype Pollution via the utils.set function.
|
[] | null | 9.8 | null | null | null |
CVE-2012-5339
|
Multiple cross-site scripting (XSS) vulnerabilities in phpMyAdmin 3.5.x before 3.5.3 allow remote authenticated users to inject arbitrary web script or HTML via a crafted name of (1) an event, (2) a procedure, or (3) a trigger.
|
[
"cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.2:*:*:*:*:*:*:*"
] | null | null | null | 3.5 | null |
|
CVE-2023-21165
|
In DevmemIntUnmapPMR of devicemem_server.c, there is a possible arbitrary code execution due to a use after free. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation.
|
[
"cpe:2.3:h:imaginationtech:powervr-gpu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] | null | 8.4 | null | null | null |
|
CVE-2021-37289
|
Insecure Permissions in administration interface in Planex MZK-DP150N 1.42 and 1.43 allows attackers to execute system command as root via etc_ro/web/syscmd.asp.
|
[
"cpe:2.3:o:planex:mzk-dp150n_firmware:1.42:*:*:*:*:*:*:*",
"cpe:2.3:o:planex:mzk-dp150n_firmware:1.43:*:*:*:*:*:*:*",
"cpe:2.3:h:planex:mzk-dp150n:*:*:*:*:*:*:*:*"
] | null | 7.2 | null | null | null |
|
CVE-2021-21209
|
Inappropriate implementation in storage in Google Chrome prior to 90.0.4430.72 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4.3 | null |
|
CVE-2024-38634
|
serial: max3100: Lock port->lock when calling uart_handle_cts_change()
|
In the Linux kernel, the following vulnerability has been resolved:
serial: max3100: Lock port->lock when calling uart_handle_cts_change()
uart_handle_cts_change() has to be called with port lock taken,
Since we run it in a separate work, the lock may not be taken at
the time of running. Make sure that it's taken by explicitly doing
that. Without it we got a splat:
WARNING: CPU: 0 PID: 10 at drivers/tty/serial/serial_core.c:3491 uart_handle_cts_change+0xa6/0xb0
...
Workqueue: max3100-0 max3100_work [max3100]
RIP: 0010:uart_handle_cts_change+0xa6/0xb0
...
max3100_handlerx+0xc5/0x110 [max3100]
max3100_work+0x12a/0x340 [max3100]
|
[] | null | null | null | null | null |
GHSA-r825-m227-647m
|
Macromedia Flash Plugin before 6,0,47,0 allows remote attackers to bypass the same-domain restriction and read arbitrary files via (1) an HTTP redirect, (2) a "file://" base in a web document, or (3) a relative URL from a web archive (mht file).
|
[] | null | null | null | null | null |
|
CVE-2024-41305
|
A Server-Side Request Forgery (SSRF) in the Plugins Page of WonderCMS v3.4.3 allows attackers to force the application to make arbitrary requests via injection of crafted URLs into the pluginThemeUrl parameter.
|
[
"cpe:2.3:a:wondercms:wondercms:3.4.3:*:*:*:*:*:*:*"
] | null | 7.1 | null | null | null |
|
GHSA-x3qv-75j5-j7h2
|
Business Space in IBM WebSphere Process Server 6.1.2.0 through 7.0.0.5 and Business Process Manager Advanced 7.5.x through 7.5.1.2, 8.0.x through 8.0.1.3, 8.5.0.x through 8.5.0.2, 8.5.5.x through 8.5.5.0, and 8.5.6.x through 8.5.6.2 allows remote authenticated users to bypass intended access restrictions and create an arbitrary page or space via unspecified vectors.
|
[] | null | null | 4.3 | null | null |
|
GHSA-2j8g-w8gx-h43r
|
The vulnerability, if exploited, could allow an authenticated miscreant
(with privileges to create or access publication targets of type Text
File or HDFS) to upload and persist files that could potentially be
executed.
|
[] | 7.1 | 7.1 | null | null | null |
|
GHSA-x9pj-x79p-c849
|
The Download Manager and Payment Form WordPress Plugin – WP SmartPay plugin for WordPress is vulnerable to Insecure Direct Object Reference in versions 1.1.0 to 2.7.13 via the show() function due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with Subscriber-level access and above, to view other user's data like email address, name, and notes.
|
[] | null | 4.3 | null | null | null |
|
RHSA-2015:1042
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: pipe: iovec overrun leading to memory corruption
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null | null |
GHSA-x5qv-v22x-8gfj
|
A Cross-origin vulnerability exists in WebKit in Apple Safari before 10.0.1 when processing location attributes, which could let a remote malicious user obtain sensitive information.
|
[] | null | null | null | null | null |
|
GHSA-v52w-54r2-qg83
|
ARRIS SBG6580-2 D30GW-SEAEAGLE-1.5.2.5-GA-00-NOSH devices allow remote attackers to discover credentials via iso.3.6.1.4.1.4491.2.4.1.1.6.1.1.0 and iso.3.6.1.4.1.4491.2.4.1.1.6.1.2.0 SNMP requests.
|
[] | null | 9.8 | null | null | null |
|
GHSA-7q6p-x5rq-pp4c
|
Huawei Quidway S9700 V200R003C00SPC500, Quidway S9300 V200R003C00SPC500, Quidway S7700 V200R003C00SPC500, Quidway S6700 V200R003C00SPC300, Quidway S6300 V200R003C00SPC300, Quidway S5700 V200R003C00SPC300, Quidway S5300 V200R003C00SPC300 enable attackers to launch DoS attacks by crafting and sending malformed packets to these vulnerable products.
|
[] | null | null | 7.5 | null | null |
|
GHSA-75pc-97g8-g5gc
|
Cross-site scripting (XSS) vulnerability in the Administration Console in IBM WebSphere Application Server 7.0 before 7.0.0.23 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
|
[] | null | null | null | null | null |
|
GHSA-2wpm-jf5f-9mrw
|
PDF-XChange Editor PRC File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of PRC files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-26730.
|
[] | null | null | 3.3 | null | null |
|
CVE-2009-2457
|
The DS\NDSD component in Novell eDirectory 8.8 before SP5 allows remote attackers to cause a denial of service (crash) via a malformed bind LDAP packet.
|
[
"cpe:2.3:a:novell:edirectory:8.8:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:edirectory:8.8:sp1:*:*:*:*:*:*",
"cpe:2.3:a:novell:edirectory:8.8:sp2:*:*:*:*:*:*",
"cpe:2.3:a:novell:edirectory:8.8:sp3:*:*:*:*:*:*",
"cpe:2.3:a:novell:edirectory:8.8:sp3:ftf3:*:*:*:*:*",
"cpe:2.3:a:novell:edirectory:8.8:sp4:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-vq62-87gp-hrvv
|
Grafana 8.4.3 allows reading files via (for example) a /dashboard/snapshot/%7B%7Bconstructor.constructor'/.. /.. /.. /.. /.. /.. /.. /.. /etc/passwd URI.
|
[] | null | 7.5 | null | null | null |
|
CVE-2018-1000419
|
An improper authorization vulnerability exists in Jenkins HipChat Plugin 2.2.0 and earlier in HipChatNotifier.java that allows attackers with Overall/Read access to obtain credentials IDs for credentials stored in Jenkins.
|
[
"cpe:2.3:a:atlassian:hipchat:*:*:*:*:*:jenkins:*:*"
] | null | null | 6.5 | 4 | null |
|
GHSA-8v54-wvr5-g36p
|
Improper access control vulnerability in FactoryCameraFB prior to version 3.4.74 allows untrusted applications to access arbitrary files with an escalated privilege.
|
[] | null | 7.8 | null | null | null |
|
GHSA-xc59-v8wf-p73v
|
Cross-Site Request Forgery (CSRF) vulnerability in Scott Kingsley Clark Crony Cronjob Manager.This issue affects Crony Cronjob Manager: from n/a through 0.5.0.
|
[] | null | 4.3 | null | null | null |
|
GHSA-j5hj-fhc9-g24m
|
rack-mini-profiler allows remote attackers to obtain sensitive information about allocated strings and objects
|
The rack-mini-profiler gem before 0.10.1 for Ruby allows remote attackers to obtain sensitive information about allocated strings and objects by leveraging incorrect ordering of security checks.
|
[] | null | null | 5.3 | null | null |
GHSA-7rh9-qc99-8xg9
|
The MSI AmbientLink MsIo64 driver 1.0.0.8 has a Buffer Overflow (0x80102040, 0x80102044, 0x80102050,and 0x80102054).
|
[] | null | null | null | null | null |
|
GHSA-wf73-fprx-hxjj
|
In the Linux kernel, the following vulnerability has been resolved:RDMA/hfi1: Fix potential integer multiplication overflow errorsWhen multiplying of different types, an overflow is possible even when
storing the result in a larger type. This is because the conversion is
done after the multiplication. So arithmetic overflow and thus in
incorrect value is possible.Correct an instance of this in the inter packet delay calculation. Fix by
ensuring one of the operands is u64 which will promote the other to u64 as
well ensuring no overflow.
|
[] | null | 5.5 | null | null | null |
|
CVE-2024-5084
|
Hash Form – Drag & Drop Form Builder <= 1.1.0 - Unauthenticated Arbitrary File Upload to Remote Code Execution
|
The Hash Form – Drag & Drop Form Builder plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'file_upload_action' function in all versions up to, and including, 1.1.0. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
|
[
"cpe:2.3:a:hashthemes:drag_and_drop_form_builder:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
CVE-2018-17955
|
Static tempfile name allows overwriting of arbitrary files
|
In yast2-multipath before version 4.1.1 a static temporary filename allows local attackers to overwrite files on systems without symlink protection
|
[
"cpe:2.3:a:opensuse:yast2-multipath:*:*:*:*:*:*:*:*"
] | null | null | 2.2 | null | null |
CVE-2024-8163
|
Chengdu Everbrite Network Technology BeikeShop files destroyFiles path traversal
|
A vulnerability classified as critical was found in Chengdu Everbrite Network Technology BeikeShop up to 1.5.5. Affected by this vulnerability is the function destroyFiles of the file /admin/file_manager/files. The manipulation of the argument files leads to path traversal. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
|
[
"cpe:2.3:a:chengdu_everbrite_network_technology:beike_shop:*:*:*:*:*:*:*:*",
"cpe:2.3:a:beikeshop:beikeshop:*:*:*:*:*:*:*:*"
] | 5.3 | 5.4 | 5.4 | 5.5 | null |
CVE-2025-26658
|
Broken Authentication in SAP Business One (Service Layer)
|
The Service Layer in SAP Business One, allows attackers to potentially gain unauthorized access and impersonate other users in the application to perform unauthorized actions. Due to the improper session management, the attackers can elevate themselves to higher privilege and can read, modify and/or write new data. To gain authenticated sessions of other users, the attacker must invest considerable time and effort. This vulnerability has a high impact on the confidentiality and integrity of the application with no effect on the availability of the application.
|
[] | null | 6.8 | null | null | null |
GHSA-w9g9-5q3r-qpxx
|
Race condition in the Reset Safari implementation in Apple Safari before 4.0 on Windows might allow local users to read stored web-site passwords via unspecified vectors.
|
[] | null | null | null | null | null |
|
CVE-2025-23897
|
WordPress Apply with LinkedIn buttons plugin <= 2.3 - Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Ivo Brett – ApplyMetrics Apply with LinkedIn buttons allows DOM-Based XSS.This issue affects Apply with LinkedIn buttons: from n/a through 2.3.
|
[] | null | 6.5 | null | null | null |
GHSA-w867-jhfm-5qxq
|
VirtualPC_Services in Microsoft Virtual PC for Mac 6.0 through 6.1 allows local attackers to truncate and overwrite arbitrary files, and execute arbitrary code, via a symlink attack on the VPCServices_Log temporary file.
|
[] | null | null | null | null | null |
|
CVE-2022-20519
|
In onCreate of AddAppNetworksActivity.java, there is a possible way for a guest user to configure WiFi networks due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-224772678
|
[
"cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*"
] | null | 3.3 | null | null | null |
|
GHSA-qvv6-wcx4-cj27
|
Rejected reason: Not used
|
[] | null | null | null | null | null |
|
CVE-2021-23036
|
On version 16.0.x before 16.0.1.2, when a BIG-IP ASM and DataSafe profile are configured on a virtual server, undisclosed requests can cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
|
[
"cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_datasafe:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | 4.3 | null |
|
CVE-2014-0820
|
Directory traversal vulnerability in the download feature in Cybozu Garoon 2.x through 2.5.4 and 3.x through 3.7 SP3 allows remote authenticated users to read arbitrary files via unspecified vectors.
|
[
"cpe:2.3:a:cybozu:garoon:2.0:sp1:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:2.0:sp2:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:2.0:sp3:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:2.0:sp4:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:2.0:sp5:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:2.0:sp6:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:2.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:2.1:sp1:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:2.1:sp2:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:2.1:sp3:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:2.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:2.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:2.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:2.5:sp1:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:2.5:sp2:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:2.5:sp3:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:2.5:sp4:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:2.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:2.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:2.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:2.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:2.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:3.0:sp1:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:3.0:sp2:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:3.0:sp3:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:3.1:sp1:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:3.1:sp2:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:3.1:sp3:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:3.5:sp1:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:3.5:sp2:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:3.5:sp3:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:3.5:sp4:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:3.5:sp5:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:3.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:3.7:sp1:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:3.7:sp2:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:3.7:sp3:*:*:*:*:*:*"
] | null | null | null | 4 | null |
|
CVE-2024-12574
|
SVG Shortcode <= 1.0.1 - Authenticated (Author+) Stored Cross-Site Scripting via SVG Upload
|
The SVG Shortcode plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 1.0.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file.
|
[] | null | 5.4 | null | null | null |
GHSA-rhpf-gwq4-5q7j
|
Missing Authorization vulnerability in redqteam Wishlist allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Wishlist: from n/a through 2.1.0.
|
[] | null | 4.3 | null | null | null |
|
GHSA-qh6p-7hfp-vmv9
|
NVIDIA DCGM for Linux contains a vulnerability in HostEngine (server component) where a user may cause a heap-based buffer overflow through the bound socket. A successful exploit of this vulnerability may lead to denial of service and data tampering.
|
[] | null | 7.1 | null | null | null |
|
GHSA-3vxv-r339-pjwj
|
Vulnerability in the Oracle Business Intelligence Enterprise Edition product of Oracle Analytics (component: Visual Analyzer). The supported version that is affected is 6.4.0.0.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Business Intelligence Enterprise Edition. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Business Intelligence Enterprise Edition, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Business Intelligence Enterprise Edition accessible data as well as unauthorized read access to a subset of Oracle Business Intelligence Enterprise Edition accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N).
|
[] | null | 5.4 | null | null | null |
|
CVE-2025-48202
|
The femanager extension through 8.2.1 for TYPO3 allows Insecure Direct Object Reference.
|
[] | null | 5.3 | null | null | null |
|
CVE-2023-25080
|
Protection mechanism failure in some Intel(R) Distribution of OpenVINO toolkit software before version 2023.0.0 may allow an authenticated user to potentially enable information disclosure via local access.
|
[
"cpe:2.3:a:intel:openvino:*:*:*:*:*:*:*:*"
] | null | 5.3 | null | null | null |
|
CVE-2024-8072
|
Mage AI allows remote unauthenticated attackers to leak the terminal server command history of arbitrary users
|
Mage AI allows remote unauthenticated attackers to leak the terminal server command history of arbitrary users
|
[
"cpe:2.3:a:mage:mage-ai:*:*:*:*:*:python:*:*"
] | null | 5.3 | null | null | null |
CVE-2023-36392
|
DHCP Server Service Denial of Service Vulnerability
|
DHCP Server Service Denial of Service Vulnerability
|
[
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
GHSA-wf4m-rq68-3mfc
|
Incorrect Authorization check affecting all versions of GitLab EE from 13.11 prior to 15.5.7, 15.6 prior to 15.6.4, and 15.7 prior to 15.7.2 allows group access tokens to continue working even after the group owner loses the ability to revoke them.
|
[] | null | 7.5 | null | null | null |
|
GHSA-vxrh-cpg7-8vjr
|
openssl-src subject to NULL dereference validating DSA public key
|
An invalid pointer dereference on read can be triggered when an application tries to check a malformed DSA public key by the `EVP_PKEY_public_check()` function. This will most likely lead to an application crash. This function can be called on public keys supplied from untrusted sources which could allow an attacker to cause a denial of service attack.The TLS implementation in OpenSSL does not call this function but applications might call the function if there are additional security requirements imposed by standards such as FIPS 140-3.
|
[] | null | 7.5 | null | null | null |
GHSA-gwfj-pw2x-h6c2
|
Out of bounds read in simd-json
|
The affected version of this crate did not guard against accessing memory beyond the range of its input data. A pointer cast to read the data into a 256-bit register could lead to a segmentation fault when the end plus the 32 bytes (256 bit) read would overlap into the next page during string parsing. This allows an attacker to eventually crash a service. The flaw was corrected by using a padding buffer for the last read from the input. So that we are we never read over the boundary of the input data.
|
[] | null | 7.5 | null | null | null |
CVE-2023-32545
|
The affected application lacks proper validation of user-supplied data when parsing project files (e.g., CSP). This could lead to an out-of-bounds read in Cscape!CANPortMigration. An attacker could leverage this vulnerability to execute arbitrary code in the context of the current process.
|
[
"cpe:2.3:a:hornerautomation:cscape:9.90:sp8:*:*:*:*:*:*",
"cpe:2.3:a:hornerautomation:cscape_envisionrv:4.70:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
|
CVE-2025-54750
|
WordPress Funnel Builder by FunnelKit Plugin <= 3.11.1 - Local File Inclusion Vulnerability
|
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in FunnelKit Funnel Builder by FunnelKit allows PHP Local File Inclusion. This issue affects Funnel Builder by FunnelKit: from n/a through 3.11.1.
|
[] | null | 7.5 | null | null | null |
CVE-2020-7677
|
Arbitrary Code Execution
|
This affects the package thenify before 3.3.1. The name argument provided to the package can be controlled by users without any sanitization, and this is provided to the eval function without any sanitization.
|
[
"cpe:2.3:a:thenify_project:thenify:*:*:*:*:*:node.js:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*"
] | null | 8.6 | null | null | null |
GHSA-hh3p-9vmh-cjcr
|
Cross-site scripting (XSS) vulnerability in search.php of Gallery 1.1 through 1.3.4 allows remote attackers to insert arbitrary web script via the searchstring parameter.
|
[] | null | null | null | null | null |
|
CVE-2023-31139
|
DHIS2 Core unrestricted session cookies with Personal Access Tokens
|
DHIS2 Core contains the service layer and Web API for DHIS2, an information system for data capture. Starting in the 2.37 branch and prior to versions 2.37.9.1, 2.38.3.1, and 2.39.1.2, Personal Access Tokens (PATs) generate unrestricted session cookies. This may lead to a bypass of other access restrictions (for example, based on allowed IP addresses or HTTP methods). DHIS2 implementers should upgrade to a supported version of DHIS2: 2.37.9.1, 2.38.3.1, or 2.39.1.2. Implementers can work around this issue by adding extra access control validations on a reverse proxy.
|
[
"cpe:2.3:a:dhis2:dhis_2:*:*:*:*:*:*:*:*"
] | null | 4.3 | null | null | null |
CVE-2023-47094
|
A Stored Cross-Site Scripting (XSS) vulnerability in the Account Plans tab of System Settings in Virtualmin 7.7 allows remote attackers to inject arbitrary web script or HTML via the Plan name field while editing Account plan details.
|
[
"cpe:2.3:a:virtualmin:virtualmin:7.7:*:*:*:*:*:*:*"
] | null | 5.4 | null | null | null |
|
GHSA-7mcp-f35c-w4mw
|
Heap-based Buffer Overflow vulnerability in RTI Connext Professional (Core Libraries) allows Overflow Variables and Tags.This issue affects Connext Professional: from 7.4.0 before 7.5.0, from 7.0.0 before 7.3.0.7, from 4.4 before 6.1.2.23.
|
[] | 6.9 | 7.1 | null | null | null |
|
CVE-2020-2549
|
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: WLS Core Components). The supported version that is affected is 10.3.6.0.0. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.0 Base Score 7.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H).
|
[
"cpe:2.3:a:oracle:weblogic_server:10.3.6.0.0:*:*:*:*:*:*:*"
] | null | null | 7.2 | null | null |
|
GHSA-cq2r-3hjp-3c67
|
IBM Emptoris Sourcing 9.5 - 10.1.3 could allow a remote attacker to conduct phishing attacks, using an open redirect attack. By persuading a victim to visit a specially-crafted Web site, a remote attacker could exploit this vulnerability to spoof the URL displayed to redirect a user to a malicious Web site that would appear to be trusted. This could allow the attacker to obtain highly sensitive information or conduct further attacks against the victim. IBM X-Force ID: 128174.
|
[] | null | null | 5.4 | null | null |
|
GHSA-9v82-w8v5-2v72
|
Multiple unknown vulnerabilities in Linux kernel 2.4 and 2.6 allow local users to gain privileges or access kernel memory, as found by the Sparse source code checking tool.
|
[] | null | null | null | null | null |
|
CVE-2018-3023
|
Vulnerability in the Oracle Banking Payments component of Oracle Financial Services Applications (subcomponent: Payments Core). Supported versions that are affected are 12.2.0, 12.3.0, 12.4.0, 12.5.0 and 14.1.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Banking Payments. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Banking Payments accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Banking Payments. CVSS 3.0 Base Score 5.4 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L).
|
[
"cpe:2.3:a:oracle:banking_payments:12.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:banking_payments:12.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:banking_payments:12.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:banking_payments:12.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:banking_payments:14.1.0:*:*:*:*:*:*:*"
] | null | null | 5.4 | 5.5 | null |
|
CVE-2019-9874
|
Deserialization of Untrusted Data in the Sitecore.Security.AntiCSRF (aka anti CSRF) module in Sitecore CMS 7.0 to 7.2 and Sitecore XP 7.5 to 8.2 allows an unauthenticated attacker to execute arbitrary code by sending a serialized .NET object in the HTTP POST parameter __CSRFTOKEN.
|
[
"cpe:2.3:a:sitecore:cms:*:*:*:*:*:*:*:*",
"cpe:2.3:a:sitecore:experience_platform:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 | null |
|
GHSA-qf6j-fwrq-x6wp
|
Multiple SQL injection vulnerabilities in clientes.asp in the TopManage OLK module 1.91.30 for SAP allow remote attackers to execute arbitrary SQL commands via the (1) PriceFrom, (2) PriceTo, and (3) InvFrom parameters, as reachable from olk/c_p/searchCart.asp, and other unspecified vectors when performing an advanced search. NOTE: some of these details are obtained from third party information.
|
[] | null | null | null | null | null |
|
CVE-2022-32395
|
Prison Management System v1.0 was discovered to contain a SQL injection vulnerability via the 'id' parameter at /pms/admin/crimes/manage_crime.php:4
|
[
"cpe:2.3:a:prison_management_system_project:prison_management_system:1.0:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.5 | null |
|
GHSA-w7fm-92w5-g2m4
|
Dell EMC ECS, versions prior to 3.5, contains an Exposure of Resource vulnerability. A remote unauthenticated attacker can access the list of DT (Directory Table) objects of all internally running services and gain knowledge of sensitive data of the system.
|
[] | null | null | null | null | null |
|
CVE-2012-2164
|
The Web client in IBM Rational ClearQuest 7.1.x before 7.1.2.7 and 8.x before 8.0.0.3 allows remote authenticated users to bypass intended access restrictions, and use the Site Administration menu to modify system settings, via a parameter-tampering attack.
|
[
"cpe:2.3:a:ibm:rational_clearquest:7.1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearquest:7.1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearquest:7.1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearquest:7.1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearquest:7.1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearquest:7.1.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearquest:7.1.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearquest:7.1.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearquest:7.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearquest:7.1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearquest:7.1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearquest:7.1.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearquest:7.1.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearquest:7.1.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearquest:7.1.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearquest:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearquest:8.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearquest:8.0.0.2:*:*:*:*:*:*:*"
] | null | null | null | 5.5 | null |
|
CVE-2020-1700
|
A flaw was found in the way the Ceph RGW Beast front-end handles unexpected disconnects. An authenticated attacker can abuse this flaw by making multiple disconnect attempts resulting in a permanent leak of a socket connection by radosgw. This flaw could lead to a denial of service condition by pile up of CLOSE_WAIT sockets, eventually leading to the exhaustion of available resources, preventing legitimate users from connecting to the system.
|
[
"cpe:2.3:a:ceph:ceph:-:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openshift_container_storage:4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"
] | null | 6.5 | null | null | null |
|
GHSA-p3vp-jg8v-gfmh
|
The HL Twitter WordPress plugin through 2014.1.18 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack
|
[] | null | 2.4 | null | null | null |
|
GHSA-gjp7-cxjr-8j3h
|
Multiple cross-site scripting (XSS) vulnerabilities in Forms/rpAuth_1 on ZyXEL P-660HW-T1 2 devices with ZyNOS firmware 3.40(AXH.0) allow remote attackers to inject arbitrary web script or HTML via the (1) LoginPassword or (2) hiddenPassword parameter.
|
[] | null | null | 6.1 | null | null |
|
CVE-2021-42272
|
Adobe Animate GIF File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability
|
Adobe Animate version 21.0.9 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious GIF file.
|
[
"cpe:2.3:a:adobe:animate:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | null | 7.8 | null | null |
GHSA-rpqj-rcqg-c3f9
|
Password vulnerability found in Vinga WR-AC1200 81.102.1.4370 and before allows a remote attacker to execute arbitrary code via the password parameter at the /goform/sysTools and /adm/systools.asp endpoints.
|
[] | null | 9.8 | null | null | null |
|
GHSA-vq58-gww6-824f
|
A vulnerability was found in Campcodes Video Sharing Website 1.0. It has been classified as critical. This affects an unknown part of the file watch.php. The manipulation of the argument code leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-225915.
|
[] | null | 9.8 | null | null | null |
|
GHSA-73g9-626v-8vv8
|
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
|
[] | null | null | null | null | null |
|
GHSA-j9gj-f45m-w3fp
|
SQL injection vulnerability in chat/staff/default.aspx in ReadyDesk 9.1 allows remote attackers to execute arbitrary SQL commands via the user name field.
|
[] | null | null | 9.8 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.