id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 36
232
⌀ |
---|---|---|---|---|---|---|---|---|
CVE-2018-6494
|
MFSBGN03807 rev.1 - HP Service Manager Software, Multiple Vulnerabilities
|
Remote SQL Injection against the HP Service Manager Software Web Tier, version 9.30, 9.31, 9.32, 9.33, 9.34, 9.35, 9.40, 9.41, 9.50, 9.51, may lead to unauthorized disclosure of data.
|
[
"cpe:2.3:a:microfocus:service_manager:9.30:*:*:*:*:*:*:*",
"cpe:2.3:a:microfocus:service_manager:9.31:*:*:*:*:*:*:*",
"cpe:2.3:a:microfocus:service_manager:9.32:*:*:*:*:*:*:*",
"cpe:2.3:a:microfocus:service_manager:9.33:*:*:*:*:*:*:*",
"cpe:2.3:a:microfocus:service_manager:9.34:*:*:*:*:*:*:*",
"cpe:2.3:a:microfocus:service_manager:9.35:*:*:*:*:*:*:*",
"cpe:2.3:a:microfocus:service_manager:9.40:*:*:*:*:*:*:*",
"cpe:2.3:a:microfocus:service_manager:9.41:*:*:*:*:*:*:*",
"cpe:2.3:a:microfocus:service_manager:9.50:*:*:*:*:*:*:*",
"cpe:2.3:a:microfocus:service_manager:9.51:*:*:*:*:*:*:*"
] | null | null | 6.4 | null | null |
CVE-2009-3118
|
SQL injection vulnerability in mod/poll/comment.php in the vote module in Danneo CMS 0.5.2 and earlier allows remote attackers to execute arbitrary SQL commands via the comtext parameter, in conjunction with crafted comname and comtitle parameters, in a poll action to index.php, related to incorrect input sanitization in base/danneo.function.php.
|
[
"cpe:2.3:a:danneo:cms:*:*:*:*:*:*:*:*",
"cpe:2.3:a:danneo:cms:0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:danneo:cms:0.5.1:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-8g48-5w7p-5hg3
|
Zyxel P2000W Version 1 VOIP WIFI Phone Wj.00.10 allows remote attackers to obtain sensitive information and possibly cause a denial of service via a direct connection to UDP port 9090, which is undocumented and does not require authentication.
|
[] | null | null | null | null | null |
|
CVE-2021-43204
|
A improper control of a resource through its lifetime in Fortinet FortiClientWindows version 6.4.1 and 6.4.0, version 6.2.9 and below, version 6.0.10 and below allows attacker to cause a complete denial of service of its components via changes of directory access permissions.
|
[
"cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:windows:*:*",
"cpe:2.3:a:fortinet:forticlient:4.0.1:*:*:*:*:windows:*:*",
"cpe:2.3:a:fortinet:forticlient:4.0.2:*:*:*:*:windows:*:*",
"cpe:2.3:a:fortinet:forticlient:4.0.3:*:*:*:*:windows:*:*",
"cpe:2.3:a:fortinet:forticlient:4.0.4:*:*:*:*:windows:*:*",
"cpe:2.3:a:fortinet:forticlient:4.1.0:*:*:*:*:windows:*:*",
"cpe:2.3:a:fortinet:forticlient:4.1.1:*:*:*:*:windows:*:*",
"cpe:2.3:a:fortinet:forticlient:4.1.2:*:*:*:*:windows:*:*",
"cpe:2.3:a:fortinet:forticlient:4.1.3:*:*:*:*:windows:*:*",
"cpe:2.3:a:fortinet:forticlient:4.2.0:*:*:*:*:windows:*:*",
"cpe:2.3:a:fortinet:forticlient:4.2.1:*:*:*:*:windows:*:*",
"cpe:2.3:a:fortinet:forticlient:4.2.2:*:*:*:*:windows:*:*",
"cpe:2.3:a:fortinet:forticlient:4.2.3:*:*:*:*:windows:*:*",
"cpe:2.3:a:fortinet:forticlient:4.2.4:*:*:*:*:windows:*:*",
"cpe:2.3:a:fortinet:forticlient:4.2.5:*:*:*:*:windows:*:*",
"cpe:2.3:a:fortinet:forticlient:4.2.6:*:*:*:*:windows:*:*",
"cpe:2.3:a:fortinet:forticlient:4.2.7:*:*:*:*:windows:*:*",
"cpe:2.3:a:fortinet:forticlient:4.3.0:*:*:*:*:windows:*:*",
"cpe:2.3:a:fortinet:forticlient:4.3.1:*:*:*:*:windows:*:*",
"cpe:2.3:a:fortinet:forticlient:4.3.2:*:*:*:*:windows:*:*",
"cpe:2.3:a:fortinet:forticlient:4.3.3:*:*:*:*:windows:*:*",
"cpe:2.3:a:fortinet:forticlient:4.3.4:*:*:*:*:windows:*:*",
"cpe:2.3:a:fortinet:forticlient:4.3.5:*:*:*:*:windows:*:*",
"cpe:2.3:a:fortinet:forticlient:5.2.0:*:*:*:*:windows:*:*",
"cpe:2.3:a:fortinet:forticlient:5.2.1:*:*:*:*:windows:*:*",
"cpe:2.3:a:fortinet:forticlient:5.2.2:*:*:*:*:windows:*:*",
"cpe:2.3:a:fortinet:forticlient:5.2.3:*:*:*:*:windows:*:*",
"cpe:2.3:a:fortinet:forticlient:5.2.4:*:*:*:*:windows:*:*",
"cpe:2.3:a:fortinet:forticlient:5.2.5:*:*:*:*:windows:*:*",
"cpe:2.3:a:fortinet:forticlient:5.2.6:*:*:*:*:windows:*:*",
"cpe:2.3:a:fortinet:forticlient:6.4.0:*:*:*:*:windows:*:*",
"cpe:2.3:a:fortinet:forticlient:6.4.1:*:*:*:*:windows:*:*"
] | null | 4.4 | null | null | null |
|
GHSA-69jx-9pq4-2cqh
|
Cross-site scripting (XSS) vulnerability in read.php in bitweaver CMS 1.2.1 allows remote attackers to inject arbitrary web script or HTML via the comment_title parameter.
|
[] | null | null | null | null | null |
|
GHSA-jvvm-gq28-8rgc
|
Incorrect User Management vulnerability in Naukowa i Akademicka Sieć Komputerowa - Państwowy Instytut Badawczy EZD RP allows logged-in user to change the password of any user, including root user, which could lead to privilege escalation. This issue affects EZD RP: from 15 before 15.84, from 16 before 16.15, from 17 before 17.2.
|
[] | 8.7 | 8.8 | null | null | null |
|
CVE-2023-44765
|
A Cross Site Scripting (XSS) vulnerability in Concrete CMS versions 8.5.12 and below, and 9.0 through 9.2.1 allows an attacker to execute arbitrary code via a crafted script to Plural Handle of the Data Objects from System & Settings.
|
[
"cpe:2.3:a:concretecms:concrete_cms:9.2.1:*:*:*:*:*:*:*"
] | null | 5.4 | null | null | null |
|
CVE-2004-0576
|
The radius daemon (radiusd) for GNU Radius 1.1, when compiled with the -enable-snmp option, allows remote attackers to cause a denial of service (server crash) via malformed SNMP messages containing an invalid OID.
|
[
"cpe:2.3:a:gnu:radius:1.1:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-68ch-f5wf-r95v
|
Unspecified vulnerability in HP Data Protector Notebook Extension 6.20 and Data Protector for Personal Computers 7.0 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1225.
|
[] | null | null | null | null | null |
|
CVE-2016-1274
|
Juniper Junos OS 14.1X53 before 14.1X53-D30 on QFX Series switches allows remote attackers to cause a denial of service (PFE panic) via a high rate of unspecified VXLAN packets.
|
[
"cpe:2.3:o:juniper:junos:14.1x53:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1x53:d10:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1x53:d15:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1x53:d16:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1x53:d25:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1x53:d26:*:*:*:*:*:*",
"cpe:2.3:h:juniper:qfx10000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:qfx3500:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:qfx3600:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:qfx5100:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:qfx5200:-:*:*:*:*:*:*:*"
] | null | null | 7.5 | 7.8 | null |
|
CVE-2015-1682
|
Microsoft Office 2010 SP2, Excel 2010 SP2, PowerPoint 2010 SP2, Word 2010 SP2, Office 2013 SP1, Excel 2013 SP1, PowerPoint 2013 SP1, Word 2013 SP1, Office 2013 RT SP1, Excel 2013 RT SP1, PowerPoint 2013 RT SP1, Word 2013 RT SP1, Office for Mac 2011, Excel for Mac 2011, PowerPoint for Mac 2011, Word for Mac 2011, PowerPoint Viewer, Word Automation Services on SharePoint Server 2010 SP2 and 2013 SP1, Excel Services on SharePoint Server 2010 SP2 and 2013 SP1, Office Web Apps 2010 SP2, Excel Web App 2010 SP2, Office Web Apps Server 2013 SP1, SharePoint Foundation 2010 SP2, and SharePoint Server 2013 SP1 allow remote attackers to execute arbitrary code via a crafted document, aka "Microsoft Office Memory Corruption Vulnerability."
|
[
"cpe:2.3:a:microsoft:excel:2010:sp2:*:*:*:*:x64:*",
"cpe:2.3:a:microsoft:excel:2010:sp2:*:*:*:*:x86:*",
"cpe:2.3:a:microsoft:excel:2013:sp1:*:*:rt:*:*:*",
"cpe:2.3:a:microsoft:excel_web_app:2010:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2010:sp2:*:*:*:*:x64:*",
"cpe:2.3:a:microsoft:office:2010:sp2:*:*:*:*:x86:*",
"cpe:2.3:a:microsoft:office:2011:*:*:*:mac:*:*:*",
"cpe:2.3:a:microsoft:office:2013:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2013:sp1:*:*:rt:*:*:*",
"cpe:2.3:a:microsoft:office_web_apps_server:2010:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_web_apps_server:2013:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:powerpoint:2010:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:powerpoint:2011:*:*:*:mac:*:*:*",
"cpe:2.3:a:microsoft:powerpoint:2013:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:powerpoint:2013:sp1:*:*:rt:*:*:*",
"cpe:2.3:a:microsoft:powerpoint_viewer:-:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_foundation:2010:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_foundation:2013:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_server:2010:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_server:2013:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:word:2010:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:word:2011:*:*:*:mac:*:*:*",
"cpe:2.3:a:microsoft:word:2013:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:word:2013:sp1:*:*:rt:*:*:*"
] | null | null | null | 9.3 | null |
|
CVE-2025-1704
|
ComponentInstaller Modification in ComponentInstaller in Google ChromeOS 15823.23.0 on Chromebooks allows enrolled users with local access to unenroll devices
and intercept device management requests via loading components from the unencrypted stateful partition.
|
[] | null | 6.5 | null | null | null |
|
GHSA-rm99-52xq-2r9w
|
A flaw was found in Ceph, relating to the URL processing on RGW backends. An attacker can exploit the URL processing by providing a null URL to crash the RGW, causing a denial of service.
|
[] | null | 6.5 | null | null | null |
|
CVE-2012-2165
|
IBM Rational ClearQuest 7.1.x before 7.1.2.7 and 8.x before 8.0.0.3, when ClearQuest Authentication is enabled, allows remote authenticated users to read password hashes via a user query.
|
[
"cpe:2.3:a:ibm:rational_clearquest:7.1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearquest:7.1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearquest:7.1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearquest:7.1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearquest:7.1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearquest:7.1.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearquest:7.1.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearquest:7.1.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearquest:7.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearquest:7.1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearquest:7.1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearquest:7.1.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearquest:7.1.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearquest:7.1.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearquest:7.1.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearquest:8.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearquest:8.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearquest:8.0.0.2:*:*:*:*:*:*:*"
] | null | null | null | 3.5 | null |
|
CVE-2022-45389
|
A missing permission check in Jenkins XP-Dev Plugin 1.0 and earlier allows unauthenticated attackers to trigger builds of jobs corresponding to an attacker-specified repository.
|
[
"cpe:2.3:a:jenkins:xp-dev:*:*:*:*:*:jenkins:*:*"
] | null | 5.3 | null | null | null |
|
CVE-2006-3838
|
Multiple stack-based buffer overflows in eIQnetworks Enterprise Security Analyzer (ESA) before 2.5.0, as used in products including (a) Sidewinder, (b) iPolicy Security Manager, (c) Astaro Report Manager, (d) Fortinet FortiReporter, (e) Top Layer Network Security Analyzer, and possibly other products, allow remote attackers to execute arbitrary code via long (1) DELTAINTERVAL, (2) LOGFOLDER, (3) DELETELOGS, (4) FWASERVER, (5) SYSLOGPUBLICIP, (6) GETFWAIMPORTLOG, (7) GETFWADELTA, (8) DELETERDEPDEVICE, (9) COMPRESSRAWLOGFILE, (10) GETSYSLOGFIREWALLS, (11) ADDPOLICY, and (12) EDITPOLICY commands to the Syslog daemon (syslogserver.exe); (13) GUIADDDEVICE, (14) ADDDEVICE, and (15) DELETEDEVICE commands to the Topology server (Topology.exe); the (15) LICMGR_ADDLICENSE command to the License Manager (EnterpriseSecurityAnalyzer.exe); the (16) TRACE and (17) QUERYMONITOR commands to the Monitoring agent (Monitoring.exe); and possibly other vectors related to the Syslog daemon (syslogserver.exe).
|
[
"cpe:2.3:a:eiqnetworks:enterprise_security_analyzer:*:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
CVE-2024-4602
|
Embed Peertube Playlist < 1.10 - Editor+ Stored XSS
|
The Embed Peertube Playlist WordPress plugin before 1.10 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
|
[
"cpe:2.3:a:infod7:embed_peertube_playlist:*:*:*:*:*:*:*:*"
] | null | 5.4 | null | null | null |
GHSA-26ch-2fxx-xjff
|
Some Huawei smart phones with software Berlin-L21C10B130,Berlin-L21C185B133,Berlin-L21HNC10B131,Berlin-L21HNC185B140,Berlin-L21HNC432B151,Berlin-L22C636B160,Berlin-L22HNC636B130,Berlin-L22HNC675B150CUSTC675D001,Berlin-L23C605B131,Berlin-L24HNC567B110,FRD-L02C432B120,FRD-L02C635B130,FRD-L02C675B170CUSTC675D001,FRD-L04C567B162,FRD-L04C605B131,FRD-L09C10B130,FRD-L09C185B130,FRD-L09C432B131,FRD-L09C636B130,FRD-L14C567B162,FRD-L19C10B130,FRD-L19C432B131,FRD-L19C636B130 have a factory Reset Protection (FRP) bypass security vulnerability. When re-configuring the mobile phone using the factory reset protection (FRP) function, an attacker can login the configuration flow by Swype Keyboard and can perform some operations to update the Google account. As a result, the FRP function is bypassed.
|
[] | null | null | 4.6 | null | null |
|
GHSA-3j66-pf2w-87jq
|
In Bluetooth driver, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local denial of service with User execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00418045; Issue ID: MSV-3481.
|
[] | null | 5.5 | null | null | null |
|
CVE-2015-5200
|
The trace functionality in libvdpau before 1.1.1, when used in a setuid or setgid application, allows local users to write to arbitrary files via unspecified vectors.
|
[
"cpe:2.3:a:libvdpau_project:libvdpau:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*"
] | null | null | null | 6.3 | null |
|
CVE-2024-25808
|
Cross-site Request Forgery (CSRF) vulnerability in Lychee version 3.1.6, allows remote attackers to execute arbitrary code via the create new album function.
|
[
"cpe:2.3:a:lycheeorg:lychee:*:*:*:*:*:*:*:*"
] | null | 8.3 | null | null | null |
|
CVE-2001-0154
|
HTML e-mail feature in Internet Explorer 5.5 and earlier allows attackers to execute attachments by setting an unusual MIME type for the attachment, which Internet Explorer does not process correctly.
|
[
"cpe:2.3:a:microsoft:internet_explorer:*:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:5.01:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-f7fp-x9mv-9jhh
|
Server-Side Request Forgery (SSRF) vulnerability in Kerfred FG Drupal to WordPress allows Server Side Request Forgery. This issue affects FG Drupal to WordPress: from n/a through 3.90.0.
|
[] | null | 4.4 | null | null | null |
|
cisco-sa-vmanwebid-5QWMcCvt
|
Cisco SD-WAN vManage Software Information Disclosure Vulnerability
|
A vulnerability in the web-based management interface of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to read arbitrary files on the underlying filesystem of the device.
The vulnerability is due to insufficient file scope limiting. An attacker could exploit this vulnerability by creating a specific file reference on the filesystem and then accessing it through the web-based management interface. A successful exploit could allow the attacker to read arbitrary files from the filesystem of the underlying operating system.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanwebid-5QWMcCvt ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanwebid-5QWMcCvt"]
|
[] | null | null | 6.5 | null | null |
CVE-2003-1036
|
Multiple buffer overflows in the AGate component for SAP Internet Transaction Server (ITS) allow remote attackers to execute arbitrary code via long (1) ~command, (2) ~runtimemode, or (3) ~session parameters, or (4) a long HTTP Content-Type header.
|
[
"cpe:2.3:a:sap:internet_transaction_server:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2020-22741
|
An issue was discovered in Xuperchain 3.6.0 that allows for attackers to recover any arbitrary users' private key after obtaining the partial signature in multisignature.
|
[
"cpe:2.3:a:baidu:xuperchain:3.6.0:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null |
|
CVE-2024-11653
|
EnGenius ENH1350EXT/ENS500-AC/ENS620EXT diag_traceroute command injection
|
A vulnerability was found in EnGenius ENH1350EXT, ENS500-AC and ENS620EXT up to 20241118. It has been rated as critical. Affected by this issue is some unknown functionality of the file /admin/network/diag_traceroute. The manipulation of the argument diag_traceroute leads to command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
|
[
"cpe:2.3:a:engenius:enh1350ext:20241118:*:*:*:*:*:*:*",
"cpe:2.3:a:engenius:ens500-ac:20241118:*:*:*:*:*:*:*",
"cpe:2.3:a:engenius:ens620ext:20241118:*:*:*:*:*:*:*",
"cpe:2.3:o:engeniustech:enh1350ext_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:engeniustech:enh1350ext:-:*:*:*:*:*:*:*",
"cpe:2.3:o:engeniustech:ens500-ac_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:engeniustech:eens500-ac:-:*:*:*:*:*:*:*",
"cpe:2.3:o:engeniustech:ens620ext_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:engeniustech:ens620ext:-:*:*:*:*:*:*:*"
] | 5.1 | 4.7 | 4.7 | 5.8 | null |
GHSA-mgg6-45mj-x85q
|
liblivemedia in Live555 before 2019.02.03 mishandles the termination of an RTSP stream after RTP/RTCP-over-RTSP has been set up, which could lead to a Use-After-Free error that causes the RTSP server to crash (Segmentation fault) or possibly have unspecified other impact.
|
[] | null | null | 9.8 | null | null |
|
GHSA-8hmh-xv5p-r2p5
|
A denial of service vulnerability in Bionic DNS could enable a remote attacker to use a specially crafted network packet to cause a device hang or reboot. This issue is rated as High due to the possibility of remote denial of service. Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1. Android ID: A-32322088.
|
[] | null | null | 7.5 | null | null |
|
CVE-2024-26710
|
powerpc/kasan: Limit KASAN thread size increase to 32KB
|
In the Linux kernel, the following vulnerability has been resolved:
powerpc/kasan: Limit KASAN thread size increase to 32KB
KASAN is seen to increase stack usage, to the point that it was reported
to lead to stack overflow on some 32-bit machines (see link).
To avoid overflows the stack size was doubled for KASAN builds in
commit 3e8635fb2e07 ("powerpc/kasan: Force thread size increase with
KASAN").
However with a 32KB stack size to begin with, the doubling leads to a
64KB stack, which causes build errors:
arch/powerpc/kernel/switch.S:249: Error: operand out of range (0x000000000000fe50 is not between 0xffffffffffff8000 and 0x0000000000007fff)
Although the asm could be reworked, in practice a 32KB stack seems
sufficient even for KASAN builds - the additional usage seems to be in
the 2-3KB range for a 64-bit KASAN build.
So only increase the stack for KASAN if the stack size is < 32KB.
|
[] | null | 5.5 | null | null | null |
RHSA-2023:3177
|
Red Hat Security Advisory: apr-util security update
|
apr-util: out-of-bounds writes in the apr_base64
|
[
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 6.5 | null | null | null |
GHSA-58xh-xqmq-2mmr
|
The Inline Related Posts WordPress plugin before 3.8.0 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
|
[] | null | 5.9 | null | null | null |
|
RHSA-2021:0354
|
Red Hat Security Advisory: kernel-alt security update
|
kernel: some ipv6 protocols not encrypted over ipsec tunnel kernel: use-after-free in fs/block_dev.c kernel: locking issue in drivers/tty/tty_jobctrl.c can lead to an use-after-free
|
[
"cpe:/o:redhat:enterprise_linux:7::server"
] | null | 7.8 | null | null | null |
CVE-2022-0623
|
Out-of-bounds Read in mruby/mruby
|
Out-of-bounds Read in Homebrew mruby prior to 3.2.
|
[
"cpe:2.3:a:mruby:mruby:*:*:*:*:*:*:*:*"
] | null | null | 6.5 | null | null |
PYSEC-2021-39
| null |
An issue was discovered in Pillow before 8.1.1. There is an out-of-bounds read in SGIRleDecode.c.
|
[] | null | null | null | null | null |
CVE-2023-44025
|
SQL injection vulnerability in addify Addifyfreegifts v.1.0.2 and before allows a remote attacker to execute arbitrary code via a crafted script to the getrulebyid function in the AddifyfreegiftsModel.php component.
|
[
"cpe:2.3:a:addify:free_gifts:*:*:*:*:*:prestashop:*:*"
] | null | 9.8 | null | null | null |
|
GHSA-mx2f-qv6j-3c6h
|
Multiple PHP remote file inclusion vulnerabilities in BlueShoes Framework 4.6 allow remote attackers to execute arbitrary PHP code via a URL in the (1) APP[path][applications] parameter to (a) Bs_Faq.class.php, (2) APP[path][core] parameter to (b) fileBrowserInner.php, (c) file.php, and (d) viewer.php, and (e) Bs_ImageArchive.class.php, (3) GLOBALS[APP][path][core] parameter to (f) Bs_Ml_User.class.php, or (4) APP[path][plugins] parameter to (g) Bs_Wse_Profile.class.php.
|
[] | null | null | null | null | null |
|
GHSA-j2jw-vxpm-g78j
|
Integer overflow in GDI+ in Microsoft Office XP SP3 allows remote attackers to execute arbitrary code via an Office document with a bitmap (aka BMP) image that triggers memory corruption, aka "Office BMP Integer Overflow Vulnerability."
|
[] | null | null | null | null | null |
|
CVE-2021-35580
|
Vulnerability in the Oracle Applications Manager product of Oracle E-Business Suite (component: View Reports). Supported versions that are affected are 12.1.3 and 12.2.3-12.2.10. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Applications Manager. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Applications Manager, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Applications Manager accessible data as well as unauthorized read access to a subset of Oracle Applications Manager accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).
|
[
"cpe:2.3:a:oracle:applications_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:applications_manager:12.1.3:*:*:*:*:*:*:*"
] | null | 6.1 | null | null | null |
|
CVE-2020-14671
|
Vulnerability in the Oracle Advanced Outbound Telephony product of Oracle E-Business Suite (component: User Interface). Supported versions that are affected are 12.1.1-12.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Advanced Outbound Telephony. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Advanced Outbound Telephony, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Advanced Outbound Telephony accessible data as well as unauthorized update, insert or delete access to some of Oracle Advanced Outbound Telephony accessible data. CVSS 3.1 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N).
|
[
"cpe:2.3:a:oracle:advanced_outbound_telephony:*:*:*:*:*:*:*:*"
] | null | 8.2 | null | null | null |
|
GHSA-8qh8-j4mx-j6jr
|
Unspecified vulnerability in secldapclntd in IBM AIX 5.3 with SP 5300-11-02 allows attackers to cause a denial of service (LDAP login failure) via unknown vectors. NOTE: some of these details are obtained from third party information. NOTE: there may be no attacker role, and the issue may be triggered entirely by an administrator's installation of an official service pack.
|
[] | null | null | null | null | null |
|
GHSA-jh56-m69f-g6q7
|
IBM Aspera Shares 1.9.0 through 1.10.0 PL6 is vulnerable to HTML injection. A remote attacker could inject malicious HTML code, which when viewed, would be executed in the victim's Web browser within the security context of the hosting site.
|
[] | null | 4.8 | null | null | null |
|
GHSA-vfhg-fr72-xjpm
|
An issue was discovered in certain Apple products. iOS before 11 is affected. macOS before 10.13 is affected. iCloud before 7.0 on Windows is affected. tvOS before 11 is affected. watchOS before 4 is affected. The issue involves the "SQLite" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app.
|
[] | null | null | 7.8 | null | null |
|
GHSA-gfqw-7q63-8qv4
|
The web framework in IronPort AsyncOS on Cisco Web Security Appliance devices before 7.1.3-013, 7.5 before 7.5.0-838, and 7.7 before 7.7.0-550 allows remote authenticated users to execute arbitrary commands via crafted command-line input in a URL sent over IPv4, aka Bug ID CSCzv69294.
|
[] | null | null | null | null | null |
|
GHSA-r38x-qwc8-xv5f
|
The /rest-service-fecru/server-v1 resource in Fisheye and Crucible before version 4.8.9 allowed authenticated remote attackers to obtain information about installation directories via information disclosure vulnerability.
|
[] | null | 4.3 | null | null | null |
|
GHSA-6pxv-7652-xcm8
|
SUBNET Solutions Inc. has identified vulnerabilities in third-party
components used in PowerSYSTEM Server 2021 and Substation Server 2021.
|
[] | null | 8.4 | null | null | null |
|
GHSA-4r6h-327w-8qwr
|
libvterm through 0+bzr726, as used in Vim and other products, mishandles certain out-of-memory conditions, leading to a denial of service (application crash), related to screen.c, state.c, and vterm.c.
|
[] | null | null | 7.5 | null | null |
|
GHSA-rwg8-pcch-2mh5
|
IOMobileFrameBuffer in Apple iOS before 9 allows local users to gain privileges or cause a denial of service (memory corruption) via unspecified vectors.
|
[] | null | null | null | null | null |
|
GHSA-v729-w778-vqwm
|
A improper neutralization of special elements used in an sql command ('sql injection') in Fortinet FortiPortal versions 7.2.4 through 7.2.0 and 7.0.0 through 7.2.8 may allow an authenticated attacker to view the SQL query being run server-side when submitting an HTTP request, via including special elements in said request.
|
[] | null | 4.3 | null | null | null |
|
GHSA-7f7g-8q3x-jpx9
|
Cross site scripting in Elefant CMS
|
A vulnerability, which was classified as problematic, has been found in Elefant CMS 1.3.12-RC. Affected by this issue is some unknown functionality of the component Title Handler. The manipulation with the input </title><img src=no onerror=alert(1)> leads to basic cross site scripting (Persistent). The attack may be launched remotely. Upgrading to version 1.3.13 is able to address this issue. It is recommended to upgrade the affected component.
|
[] | null | 5.4 | null | null | null |
CVE-2012-4435
|
fwknop before 2.0.3 does not properly validate IP addresses, which allows remote authenticated users to cause a denial of service (server crash) via a long IP address.
|
[
"cpe:2.3:a:cipherdyne:fwknop:*:*:*:*:*:*:*:*",
"cpe:2.3:a:cipherdyne:fwknop:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cipherdyne:fwknop:2.0.1:*:*:*:*:*:*:*"
] | null | null | null | 4 | null |
|
GHSA-8fm5-gg2f-f66q
|
Publify Vulnerable To Cross-Site Scripting (XSS) Via Redirects Requiring User Interaction
|
SummaryA publisher on a `publify` application is able to perform a cross-site scripting attack on an administrator using the redirect functionality.DetailsA publisher on a `publify` application is able to perform a cross-site scripting attack on an administrator using the redirect functionality. The exploitation of this XSS vulnerability requires the administrator to click a malicious link.We can create a redirect to a `javascript:alert()` URL. Whilst the redirect itself doesn't work, on the administrative panel, an a tag is created with the payload as the URI. Upon clicking this link, the XSS is triggered.An attack could attempt to hide their payload by using HTML, or other encodings, as to not make it obvious to an administrator that this is a malicious link.PoCA publisher can create a new redirect as shown below. The payload used is `javascript:alert()`.
An administrator will now see this redirect in their overview of the page.
If they click the link on the right, it triggers the XSS.
ImpactA publisher may attempt to use this vulnerability to escalate their privileges and become an administrator.
|
[] | 1.8 | null | null | null | null |
GHSA-vc52-47rr-w6j9
|
Untrusted search path vulnerability in ALFTP before 5.31 allows local users to gain privileges via a Trojan horse executable file in a directory that is accessed for reading an extensionless file, as demonstrated by executing the README.exe file when a user attempts to access the README file.
|
[] | null | null | null | null | null |
|
GHSA-wpf4-f6g8-892r
|
In Bluetooth, there is a possible out of bounds read due to a heap buffer overflow. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-206478022
|
[] | null | 6.5 | null | null | null |
|
GHSA-3c39-w687-672w
|
Azure SDK Spoofing Vulnerability
|
[] | null | 7.5 | null | null | null |
|
GHSA-x5xc-9jvw-6v9f
|
Use-after-free vulnerability in the sofree function in slirp/socket.c in QEMU (aka Quick Emulator) allows attackers to cause a denial of service (QEMU instance crash) by leveraging failure to properly clear ifq_so from pending packets.
|
[] | null | 7.5 | null | null | null |
|
GHSA-7hm7-fv7g-c6pr
|
The ms_fnmatch function in Samba 3.0.4 and 3.0.7 and possibly other versions allows remote authenticated users to cause a denial of service (CPU consumption) via a SAMBA request that contains multiple * (wildcard) characters.
|
[] | null | null | null | null | null |
|
GHSA-fcgf-3g9q-p3r9
|
The Security Audit Log facility in SAP Enhancement Package (EHP) 6 for SAP ERP 6.0 allows remote attackers to modify or delete arbitrary log classes via unspecified vectors. NOTE: some of these details are obtained from third party information.
|
[] | null | null | null | null | null |
|
GHSA-x22v-5fx6-wj7x
|
The WebLinks module in Php-Nuke 6.x through 7.3 allows remote attackers to obtain sensitive information via an invalid show parameter, which displays the full path in a PHP error message.
|
[] | null | null | null | null | null |
|
CVE-2022-0738
|
An issue has been discovered in GitLab affecting all versions starting from 14.6 before 14.6.5, all versions starting from 14.7 before 14.7.4, all versions starting from 14.8 before 14.8.2. GitLab was leaking user passwords when adding mirrors with SSH credentials under specific conditions.
|
[
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*"
] | null | 4.2 | null | null | null |
|
CVE-2007-5857
|
Quick Look in Apple Mac OS X 10.5.1 does not prevent a movie from accessing URLs when the movie file is previewed or if an icon is created, which might allow remote attackers to obtain sensitive information via HREFTrack.
|
[
"cpe:2.3:o:apple:mac_os_x:10.5.1:*:*:*:*:*:*:*"
] | null | null | null | 6.4 | null |
|
CVE-2022-43140
|
kkFileView v4.1.0 was discovered to contain a Server-Side Request Forgery (SSRF) via the component cn.keking.web.controller.OnlinePreviewController#getCorsFile. This vulnerability allows attackers to force the application to make arbitrary requests via injection of crafted URLs into the url parameter.
|
[
"cpe:2.3:a:keking:kkfileview:4.1.0:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
|
ICSMA-21-294-01
|
B. Braun Infusomat Space Large Volume Pump
|
An improper sanitization of input vulnerability in B. Braun SpaceCom2 prior to 012U000062 allows a remote unauthenticated attacker to gain user-level command-line access by passing a raw external string straight through to printf statements. The attacker is required to be on the same network as the device. CVE-2021-33886 has been assigned to this vulnerability. A CVSS v3 base score of 6.8 has been calculated; the CVSS vector string is (AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N). An insufficient verification of data authenticity vulnerability in B. Braun SpaceCom2 prior to 012U000062 allows a remote unauthenticated attacker to send the device malicious data to be used in place of the correct data. This results in full system command access and execution because of the lack of cryptographic signatures on critical data sets. CVE-2021-33885 has been assigned to this vulnerability. A CVSS v3 base score of 9.0 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H). A missing authentication for critical function vulnerability in B. Braun SpaceCom2 prior to 012U000062 allows a remote attacker to reconfigure the device from an unknown source because of the lack of authentication on proprietary networking commands. CVE-2021-33882 has been assigned to this vulnerability. A CVSS v3 base score of 6.8 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N). A cleartext transmission of sensitive information vulnerability in B. Braun SpaceCom2 prior to 012U000062 allows a remote attacker to obtain sensitive information by obtaining access to network traffic. The exposed data includes critical values for a pump's internal configuration. CVE-2021-33883 has been assigned to this vulnerability. A CVSS v3 base score of 5.9 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N). An unrestricted upload of file with dangerous type vulnerability in B. Braun SpaceCom2 prior to 012U000062 allows remote attackers to upload any files to the /tmp directory of the device through the webpage API, which can result in critical files being overwritten. CVE-2021-33884 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N).
|
[] | null | null | 6.5 | null | null |
GHSA-938w-vx4g-p5w6
|
core/string_api.php in Mantis before 1.1.3 does not check the privileges of the viewer before composing a link with issue data in the source anchor, which allows remote attackers to discover an issue's title and status via a request with a modified issue number.
|
[] | null | null | null | null | null |
|
GHSA-v5gf-r78h-55q6
|
document-merge-service vulnerable to Remote Code Execution via Server-Side Template Injection
|
ImpactA remote code execution (RCE) via server-side template injection (SSTI) allows for user supplied code to be executed in the server's context where it is executed as the document-merge-server user with the UID 901 thus giving an attacker considerable control over the container.PatchesIt has been patched in v6.5.2Referenceshttps://book.hacktricks.xyz/pentesting-web/ssti-server-side-template-injection/jinja2-sstiPOCAdd the following to a document, upload and render it:The index might be different, so to debug this first render a template with `{{ PLACEHOLDER.__class__.__mro__[1].__subclasses__() }}` and then get the index of `subprocess.Popen` and replace 202 with that.
|
[] | null | 9.1 | null | null | null |
GHSA-7h8p-mgrw-pw6c
|
Open redirect vulnerability in Splunk Enterprise 6.4.x prior to 6.4.3, Splunk Enterprise 6.3.x prior to 6.3.6, Splunk Enterprise 6.2.x prior to 6.2.10, Splunk Enterprise 6.1.x prior to 6.1.11, Splunk Enterprise 6.0.x prior to 6.0.12, Splunk Enterprise 5.0.x prior to 5.0.16 and Splunk Light prior to 6.4.3 allows to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors.
|
[] | null | null | 6.1 | null | null |
|
GHSA-f4vm-g8q2-m52q
|
Unspecified vulnerability in Oracle Java SE 5.0u55, 6u65, and 7u45; JRockit R27.7.7 and R28.2.9; Java SE Embedded 7u45; and OpenJDK 7 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. NOTE: the previous information is from the January 2014 CPU. Oracle has not commented on third-party claims that the issue is due to incorrect input validation in LookupProcessor.cpp in the ICU Layout Engine, which allows attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted font file.
|
[] | null | null | null | null | null |
|
GHSA-g5cw-f884-7rc6
|
Adobe Dimension versions 3.4.10 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[] | null | 5.5 | null | null | null |
|
CVE-2024-26737
|
bpf: Fix racing between bpf_timer_cancel_and_free and bpf_timer_cancel
|
In the Linux kernel, the following vulnerability has been resolved:
bpf: Fix racing between bpf_timer_cancel_and_free and bpf_timer_cancel
The following race is possible between bpf_timer_cancel_and_free
and bpf_timer_cancel. It will lead a UAF on the timer->timer.
bpf_timer_cancel();
spin_lock();
t = timer->time;
spin_unlock();
bpf_timer_cancel_and_free();
spin_lock();
t = timer->timer;
timer->timer = NULL;
spin_unlock();
hrtimer_cancel(&t->timer);
kfree(t);
/* UAF on t */
hrtimer_cancel(&t->timer);
In bpf_timer_cancel_and_free, this patch frees the timer->timer
after a rcu grace period. This requires a rcu_head addition
to the "struct bpf_hrtimer". Another kfree(t) happens in bpf_timer_init,
this does not need a kfree_rcu because it is still under the
spin_lock and timer->timer has not been visible by others yet.
In bpf_timer_cancel, rcu_read_lock() is added because this helper
can be used in a non rcu critical section context (e.g. from
a sleepable bpf prog). Other timer->timer usages in helpers.c
have been audited, bpf_timer_cancel() is the only place where
timer->timer is used outside of the spin_lock.
Another solution considered is to mark a t->flag in bpf_timer_cancel
and clear it after hrtimer_cancel() is done. In bpf_timer_cancel_and_free,
it busy waits for the flag to be cleared before kfree(t). This patch
goes with a straight forward solution and frees timer->timer after
a rcu grace period.
|
[] | null | 5.5 | null | null | null |
CVE-2012-2907
|
Cross-site scripting (XSS) vulnerability in the aberdeen_breadcrumb function in template.php in the Aberdeen theme 6.x-1.x before 6.x-1.11 for Drupal, when set to append the content title to the breadcrumb, allows remote attackers to inject arbitrary web script or HTML via the content title in a breadcrumb.
|
[
"cpe:2.3:a:ishmael_sanchez:aberdeen:6.x-1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ishmael_sanchez:aberdeen:6.x-1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:ishmael_sanchez:aberdeen:6.x-1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*"
] | null | null | null | 2.6 | null |
|
cisco-sa-n9kaci-unauth-access-5PWzDx2w
|
Cisco Nexus 9000 Series Fabric Switches ACI Mode Fabric Infrastructure VLAN Unauthorized Access Vulnerability
|
A vulnerability in the fabric infrastructure VLAN connection establishment of Cisco Nexus 9000 Series Fabric Switches in Application Centric Infrastructure (ACI) Mode could allow an unauthenticated, adjacent attacker to bypass security validations and connect an unauthorized server to the infrastructure VLAN.
This vulnerability is due to insufficient security requirements during the Link Layer Discovery Protocol (LLDP) setup phase of the infrastructure VLAN. An attacker could exploit this vulnerability by sending a crafted LLDP packet on the adjacent subnet to an affected device. A successful exploit could allow the attacker to connect an unauthorized server to the infrastructure VLAN, which is highly privileged. With a connection to the infrastructure VLAN, the attacker can make unauthorized connections to Cisco Application Policy Infrastructure Controller (APIC) services or join other host endpoints.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-n9kaci-unauth-access-5PWzDx2w ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-n9kaci-unauth-access-5PWzDx2w"]
This advisory is part of the February 2021 Cisco FXOS and NX-OS Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: February 2021 Cisco FXOS and NX-OS Software Security Advisory Bundled Publication ["https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-74414"].
|
[] | null | 7.4 | null | null | null |
CVE-2020-18773
|
An invalid memory access in the decode function in iptc.cpp of Exiv2 0.27.99.0 allows attackers to cause a denial of service (DOS) via a crafted tif file.
|
[
"cpe:2.3:a:exiv2:exiv2:0.27.99.0:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4.3 | null |
|
GHSA-m5g9-3wxp-6r7f
|
A Memory Corruption Vulnerability in Autodesk FBX Review version 1.4.0 may lead to remote code execution through maliciously crafted DLL files.
|
[] | null | null | null | null | null |
|
GHSA-p8fm-w787-x6x3
|
Malicious Package in portionfatty12
|
All versions of `portionfatty12` are considered malicious. The package is malware designed to steal user's data. When installed it uploads the user's public SSH keys to a remote server.RecommendationThis package is not available on the npm Registry anymore. If you happen to find this package in your environment you should consider the system it was installed on compromised and assess if further response (such as rotating all credentials found on the compromised machine) is necessary.
|
[] | null | 9.8 | null | null | null |
CVE-2023-51953
|
Tenda AX1803 v1.0.0.1 contains a stack overflow via the iptv.stb.mode parameter in the function formSetIptv.
|
[
"cpe:2.3:o:tenda:ax1803_firmware:1.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:h:tenda:ax1803:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
|
RHBA-2024:0928
|
Red Hat Bug Fix Advisory: MTV 2.5.5 Images
|
follow-redirects: Improper Input Validation due to the improper handling of URLs by the url.parse() jsrsasign: vulnerable to Observable Discrepancy via the RSA PKCS1.5 or RSAOAEP decryption process
|
[
"cpe:/a:redhat:migration_toolkit_virtualization:2.5::el8",
"cpe:/a:redhat:migration_toolkit_virtualization:2.5::el9"
] | null | 7.5 | null | null | null |
CVE-2016-3725
|
Jenkins before 2.3 and LTS before 1.651.2 allows remote authenticated users to trigger updating of update site metadata by leveraging a missing permissions check. NOTE: this issue can be combined with DNS cache poisoning to cause a denial of service (service disruption).
|
[
"cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*",
"cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openshift:3.1:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:redhat:openshift:3.2:*:*:*:enterprise:*:*:*"
] | null | null | 4.3 | 5 | null |
|
GHSA-fw6g-56pg-38xh
|
The ping_recvmsg function in net/ipv4/ping.c in the Linux kernel before 3.12.4 does not properly interact with read system calls on ping sockets, which allows local users to cause a denial of service (NULL pointer dereference and system crash) by leveraging unspecified privileges to execute a crafted application.
|
[] | null | null | null | null | null |
|
GHSA-h2v5-5p47-rmq3
|
IBM DOORS Next Generation (DNG/RRC) 6.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 134064.
|
[] | null | null | 5.4 | null | null |
|
GHSA-mfgp-fvpm-hx5v
|
Studio Network Solutions ShareBrowser before 7.0 on macOS mishandles signature verification, aka PMP-2636.
|
[] | null | 9.8 | null | null | null |
|
CVE-2024-12872
|
Zalomení <= 1.5 - Admin+ Stored XSS
|
The Zalomení WordPress plugin through 1.5 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
|
[] | null | 4.8 | null | null | null |
CVE-2012-4263
|
Cross-site scripting (XSS) vulnerability in inc/admin/content.php in the Better WP Security (better_wp_security) plugin before 3.2.5 for WordPress allows remote attackers to inject arbitrary web script or HTML via the HTTP_USER_AGENT header.
|
[
"cpe:2.3:a:bit51:better-wp-security:*:*:*:*:*:*:*:*",
"cpe:2.3:a:bit51:better-wp-security:-:alpha1:*:*:*:*:*:*",
"cpe:2.3:a:bit51:better-wp-security:-:alpha10:*:*:*:*:*:*",
"cpe:2.3:a:bit51:better-wp-security:-:alpha11:*:*:*:*:*:*",
"cpe:2.3:a:bit51:better-wp-security:-:alpha2:*:*:*:*:*:*",
"cpe:2.3:a:bit51:better-wp-security:-:alpha3:*:*:*:*:*:*",
"cpe:2.3:a:bit51:better-wp-security:-:alpha4:*:*:*:*:*:*",
"cpe:2.3:a:bit51:better-wp-security:-:alpha5:*:*:*:*:*:*",
"cpe:2.3:a:bit51:better-wp-security:-:alpha6:*:*:*:*:*:*",
"cpe:2.3:a:bit51:better-wp-security:-:alpha7:*:*:*:*:*:*",
"cpe:2.3:a:bit51:better-wp-security:-:alpha8:*:*:*:*:*:*",
"cpe:2.3:a:bit51:better-wp-security:-:alpha9:*:*:*:*:*:*",
"cpe:2.3:a:bit51:better-wp-security:0.1:alpha:*:*:*:*:*:*",
"cpe:2.3:a:bit51:better-wp-security:0.1:beta:*:*:*:*:*:*",
"cpe:2.3:a:bit51:better-wp-security:0.2:beta:*:*:*:*:*:*",
"cpe:2.3:a:bit51:better-wp-security:0.3:beta:*:*:*:*:*:*",
"cpe:2.3:a:bit51:better-wp-security:0.4:beta:*:*:*:*:*:*",
"cpe:2.3:a:bit51:better-wp-security:0.5:beta:*:*:*:*:*:*",
"cpe:2.3:a:bit51:better-wp-security:0.6:beta:*:*:*:*:*:*",
"cpe:2.3:a:bit51:better-wp-security:0.7:beta:*:*:*:*:*:*",
"cpe:2.3:a:bit51:better-wp-security:0.8:beta:*:*:*:*:*:*",
"cpe:2.3:a:bit51:better-wp-security:0.9:beta:*:*:*:*:*:*",
"cpe:2.3:a:bit51:better-wp-security:0.10:beta:*:*:*:*:*:*",
"cpe:2.3:a:bit51:better-wp-security:0.11:beta:*:*:*:*:*:*",
"cpe:2.3:a:bit51:better-wp-security:0.13:beta:*:*:*:*:*:*",
"cpe:2.3:a:bit51:better-wp-security:0.14:beta:*:*:*:*:*:*",
"cpe:2.3:a:bit51:better-wp-security:0.15:beta:*:*:*:*:*:*",
"cpe:2.3:a:bit51:better-wp-security:0.16:beta:*:*:*:*:*:*",
"cpe:2.3:a:bit51:better-wp-security:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:bit51:better-wp-security:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:bit51:better-wp-security:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:bit51:better-wp-security:1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:bit51:better-wp-security:1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:bit51:better-wp-security:1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:bit51:better-wp-security:1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:bit51:better-wp-security:1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:bit51:better-wp-security:1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:bit51:better-wp-security:1.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:bit51:better-wp-security:1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:bit51:better-wp-security:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:bit51:better-wp-security:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:bit51:better-wp-security:2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:bit51:better-wp-security:2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:bit51:better-wp-security:2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:bit51:better-wp-security:2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:bit51:better-wp-security:2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:bit51:better-wp-security:2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:bit51:better-wp-security:2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:bit51:better-wp-security:2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:bit51:better-wp-security:2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:bit51:better-wp-security:2.11:*:*:*:*:*:*:*",
"cpe:2.3:a:bit51:better-wp-security:2.12:*:*:*:*:*:*:*",
"cpe:2.3:a:bit51:better-wp-security:2.13:*:*:*:*:*:*:*",
"cpe:2.3:a:bit51:better-wp-security:2.14:*:*:*:*:*:*:*",
"cpe:2.3:a:bit51:better-wp-security:2.15:*:*:*:*:*:*:*",
"cpe:2.3:a:bit51:better-wp-security:2.16:*:*:*:*:*:*:*",
"cpe:2.3:a:bit51:better-wp-security:2.17:*:*:*:*:*:*:*",
"cpe:2.3:a:bit51:better-wp-security:2.18:*:*:*:*:*:*:*",
"cpe:2.3:a:bit51:better-wp-security:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:bit51:better-wp-security:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:bit51:better-wp-security:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:bit51:better-wp-security:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:bit51:better-wp-security:3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:bit51:better-wp-security:3.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:bit51:better-wp-security:3.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:bit51:better-wp-security:3.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:bit51:better-wp-security:3.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:bit51:better-wp-security:3.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:bit51:better-wp-security:3.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:bit51:better-wp-security:3.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:bit51:better-wp-security:3.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:bit51:better-wp-security:3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:bit51:better-wp-security:3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:bit51:better-wp-security:3.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:bit51:better-wp-security:3.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:bit51:better-wp-security:3.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:bit51:better-wp-security:3.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:-:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
CVE-2021-28166
|
In Eclipse Mosquitto version 2.0.0 to 2.0.9, if an authenticated client that had connected with MQTT v5 sent a crafted CONNACK message to the broker, a NULL pointer dereference would occur.
|
[
"cpe:2.3:a:eclipse:mosquitto:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | null | null |
|
CVE-2002-0198
|
Buffer overflow in plDaniels ripMime 1.2.6 and earlier, as used in other programs such as xamime and inflex, allows remote attackers to execute arbitrary code via an attachment in a long filename.
|
[
"cpe:2.3:a:paul_l_daniels:inflex:1.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:paul_l_daniels:ripmime:1.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:paul_l_daniels:ripmime:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:paul_l_daniels:ripmime:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:paul_l_daniels:ripmime:1.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:paul_l_daniels:ripmime:1.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:paul_l_daniels:ripmime:1.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:paul_l_daniels:ripmime:1.2.6:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
GHSA-9pcx-rmqr-hp8m
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Riyaz GetSocial allows Reflected XSS. This issue affects GetSocial: from n/a through 2.0.1.
|
[] | null | 7.1 | null | null | null |
|
GHSA-mqrm-h2pw-9j9r
|
Applications that use Wget to access a remote resource using shorthand URLs and pass arbitrary user credentials in the URL are vulnerable. In these cases attackers can enter crafted credentials which will cause Wget to access an arbitrary host.
|
[] | null | 6.5 | null | null | null |
|
CVE-2020-17040
|
Windows Hyper-V Security Feature Bypass Vulnerability
|
Windows Hyper-V Security Feature Bypass Vulnerability
|
[
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1803:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_1909:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_1903:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2004:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012_r2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_20h2:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | null | null |
CVE-2002-1928
|
602Pro LAN SUITE 2002 allows remote attackers to view the directory tree via an HTTP GET request with a trailing "~" (tilde) or ".bak" extension.
|
[
"cpe:2.3:a:software602:602pro_lan_suite:2002:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
cisco-sa-sdwan-xss-zQ4KPvYd
|
Cisco Catalyst SD-WAN Manager Cross-Site Scripting Vulnerability
|
A vulnerability in the web-based management interface of Cisco Catalyst SD-WAN Manager, formerly Cisco SD-WAN vManage, could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface.
This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by inserting malicious data into a specific data field in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
|
[] | null | 6.4 | null | null | null |
CVE-2022-38334
|
XPDF v4.04 and earlier was discovered to contain a stack overflow via the function Catalog::countPageTree() at Catalog.cc.
|
[
"cpe:2.3:a:xpdfreader:xpdf:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
|
GHSA-rr88-j2r8-3xpc
|
AutoGPT, a component of significant-gravitas/autogpt, is vulnerable to an improper neutralization of special elements used in an OS command ('OS Command Injection') due to a flaw in its shell command validation function. Specifically, the vulnerability exists in versions v0.5.0 up to but not including 5.1.0. The issue arises from the application's method of validating shell commands against an allowlist or denylist, where it only checks the first word of the command. This allows an attacker to bypass the intended restrictions by crafting commands that are executed despite not being on the allowlist or by including malicious commands not present in the denylist. Successful exploitation of this vulnerability could allow an attacker to execute arbitrary shell commands.
|
[] | null | null | 8.8 | null | null |
|
GHSA-w6v7-rp96-jc74
|
In the Citadel chip firmware, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-175117047
|
[] | null | null | null | null | null |
|
CVE-2022-30829
|
Wedding Management System v1.0 is vulnerable to SQL Injection via \admin\users_edit.php.
|
[
"cpe:2.3:a:wedding_management_system_project:wedding_management_system:1.0:*:*:*:*:*:*:*"
] | null | 7.2 | null | 6.5 | null |
|
CVE-2023-22840
|
Improper neutralization in software for the Intel(R) oneVPL GPU software before version 22.6.5 may allow an authenticated user to potentially enable denial of service via local access.
|
[
"cpe:2.3:a:intel:onevpl_gpu_runtime:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*"
] | null | 3.3 | null | null | null |
|
CVE-2020-28023
|
Exim 4 before 4.94.2 allows Out-of-bounds Read. smtp_setup_msg may disclose sensitive information from process memory to an unauthenticated SMTP client.
|
[
"cpe:2.3:a:exim:exim:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null |
|
RHSA-2024:4262
|
Red Hat Security Advisory: linux-firmware security update
|
kernel: Reserved fields in guest message responses may not be zero initialized
|
[
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 4.4 | null | null | null |
CVE-2023-36037
|
Microsoft Excel Security Feature Bypass Vulnerability
|
Microsoft Excel Security Feature Bypass Vulnerability
|
[
"cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:x64:*",
"cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:x86:*",
"cpe:2.3:a:microsoft:excel:2016:*:*:*:*:*:x64:*",
"cpe:2.3:a:microsoft:excel:2016:*:*:*:*:*:x86:*",
"cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:x64:*",
"cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:x86:*",
"cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:*:x64:*",
"cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:*:x86:*",
"cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:macos:*:*"
] | null | 7.8 | null | null | null |
CVE-2020-28387
|
A vulnerability has been identified in Solid Edge SE2020 (All Versions < SE2020MP13), Solid Edge SE2021 (All Versions < SE2021MP3). When opening a specially crafted SEECTCXML file, the application could disclose arbitrary files to remote attackers. This is because of the passing of specially crafted content to the underlying XML parser without taking proper restrictions such as prohibiting an external dtd. (ZDI-CAN-11923)
|
[
"cpe:2.3:a:siemens:solid_edge:*:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:solid_edge:se2021:-:*:*:*:*:*:*",
"cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack1:*:*:*:*:*:*"
] | null | 5.5 | null | 4.3 | null |
|
CVE-2012-1235
|
Cross-site request forgery (CSRF) vulnerability in Advantech/BroadWin WebAccess 7.0 allows remote authenticated users to hijack the authentication of unspecified victims via unknown vectors. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-0235.
|
[
"cpe:2.3:a:advantech:advantech_webaccess:*:*:*:*:*:*:*:*",
"cpe:2.3:a:advantech:advantech_webaccess:5.0:*:*:*:*:*:*:*"
] | null | null | null | 6 | null |
|
CVE-2006-3574
|
Multiple cross-site scripting (XSS) vulnerabilities in Hitachi Groupmax Collaboration Portal and Web Client before 07-20-/D, and uCosminexus Collaboration Portal and Forum/File Sharing before 06-20-/C, allow remote attackers to "execute malicious scripts" via unknown vectors (aka HS06-014-01).
|
[
"cpe:2.3:a:hitachi:cosminexus_collaboration_portal:*:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachi:cosminexus_collaboration_portal:6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachi:cosminexus_collaboration_portal:06_00:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachi:groupmax_collaboration_portal:*:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachi:groupmax_collaboration_portal:7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachi:groupmax_collaboration_portal:07_00:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachi:groupmax_collaboration_web_client:*:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachi:groupmax_collaboration_web_client:7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachi:groupmax_collaboration_web_client:07_00:*:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.