id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
189k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
patch_commit_url
stringlengths
36
232
CVE-2018-6494
MFSBGN03807 rev.1 - HP Service Manager Software, Multiple Vulnerabilities
Remote SQL Injection against the HP Service Manager Software Web Tier, version 9.30, 9.31, 9.32, 9.33, 9.34, 9.35, 9.40, 9.41, 9.50, 9.51, may lead to unauthorized disclosure of data.
[ "cpe:2.3:a:microfocus:service_manager:9.30:*:*:*:*:*:*:*", "cpe:2.3:a:microfocus:service_manager:9.31:*:*:*:*:*:*:*", "cpe:2.3:a:microfocus:service_manager:9.32:*:*:*:*:*:*:*", "cpe:2.3:a:microfocus:service_manager:9.33:*:*:*:*:*:*:*", "cpe:2.3:a:microfocus:service_manager:9.34:*:*:*:*:*:*:*", "cpe:2.3:a:microfocus:service_manager:9.35:*:*:*:*:*:*:*", "cpe:2.3:a:microfocus:service_manager:9.40:*:*:*:*:*:*:*", "cpe:2.3:a:microfocus:service_manager:9.41:*:*:*:*:*:*:*", "cpe:2.3:a:microfocus:service_manager:9.50:*:*:*:*:*:*:*", "cpe:2.3:a:microfocus:service_manager:9.51:*:*:*:*:*:*:*" ]
null
null
6.4
null
null
CVE-2009-3118
SQL injection vulnerability in mod/poll/comment.php in the vote module in Danneo CMS 0.5.2 and earlier allows remote attackers to execute arbitrary SQL commands via the comtext parameter, in conjunction with crafted comname and comtitle parameters, in a poll action to index.php, related to incorrect input sanitization in base/danneo.function.php.
[ "cpe:2.3:a:danneo:cms:*:*:*:*:*:*:*:*", "cpe:2.3:a:danneo:cms:0.5:*:*:*:*:*:*:*", "cpe:2.3:a:danneo:cms:0.5.1:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
GHSA-8g48-5w7p-5hg3
Zyxel P2000W Version 1 VOIP WIFI Phone Wj.00.10 allows remote attackers to obtain sensitive information and possibly cause a denial of service via a direct connection to UDP port 9090, which is undocumented and does not require authentication.
[]
null
null
null
null
null
CVE-2021-43204
A improper control of a resource through its lifetime in Fortinet FortiClientWindows version 6.4.1 and 6.4.0, version 6.2.9 and below, version 6.0.10 and below allows attacker to cause a complete denial of service of its components via changes of directory access permissions.
[ "cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:windows:*:*", "cpe:2.3:a:fortinet:forticlient:4.0.1:*:*:*:*:windows:*:*", "cpe:2.3:a:fortinet:forticlient:4.0.2:*:*:*:*:windows:*:*", "cpe:2.3:a:fortinet:forticlient:4.0.3:*:*:*:*:windows:*:*", "cpe:2.3:a:fortinet:forticlient:4.0.4:*:*:*:*:windows:*:*", "cpe:2.3:a:fortinet:forticlient:4.1.0:*:*:*:*:windows:*:*", "cpe:2.3:a:fortinet:forticlient:4.1.1:*:*:*:*:windows:*:*", "cpe:2.3:a:fortinet:forticlient:4.1.2:*:*:*:*:windows:*:*", "cpe:2.3:a:fortinet:forticlient:4.1.3:*:*:*:*:windows:*:*", "cpe:2.3:a:fortinet:forticlient:4.2.0:*:*:*:*:windows:*:*", "cpe:2.3:a:fortinet:forticlient:4.2.1:*:*:*:*:windows:*:*", "cpe:2.3:a:fortinet:forticlient:4.2.2:*:*:*:*:windows:*:*", "cpe:2.3:a:fortinet:forticlient:4.2.3:*:*:*:*:windows:*:*", "cpe:2.3:a:fortinet:forticlient:4.2.4:*:*:*:*:windows:*:*", "cpe:2.3:a:fortinet:forticlient:4.2.5:*:*:*:*:windows:*:*", "cpe:2.3:a:fortinet:forticlient:4.2.6:*:*:*:*:windows:*:*", "cpe:2.3:a:fortinet:forticlient:4.2.7:*:*:*:*:windows:*:*", "cpe:2.3:a:fortinet:forticlient:4.3.0:*:*:*:*:windows:*:*", "cpe:2.3:a:fortinet:forticlient:4.3.1:*:*:*:*:windows:*:*", "cpe:2.3:a:fortinet:forticlient:4.3.2:*:*:*:*:windows:*:*", "cpe:2.3:a:fortinet:forticlient:4.3.3:*:*:*:*:windows:*:*", "cpe:2.3:a:fortinet:forticlient:4.3.4:*:*:*:*:windows:*:*", "cpe:2.3:a:fortinet:forticlient:4.3.5:*:*:*:*:windows:*:*", "cpe:2.3:a:fortinet:forticlient:5.2.0:*:*:*:*:windows:*:*", "cpe:2.3:a:fortinet:forticlient:5.2.1:*:*:*:*:windows:*:*", "cpe:2.3:a:fortinet:forticlient:5.2.2:*:*:*:*:windows:*:*", "cpe:2.3:a:fortinet:forticlient:5.2.3:*:*:*:*:windows:*:*", "cpe:2.3:a:fortinet:forticlient:5.2.4:*:*:*:*:windows:*:*", "cpe:2.3:a:fortinet:forticlient:5.2.5:*:*:*:*:windows:*:*", "cpe:2.3:a:fortinet:forticlient:5.2.6:*:*:*:*:windows:*:*", "cpe:2.3:a:fortinet:forticlient:6.4.0:*:*:*:*:windows:*:*", "cpe:2.3:a:fortinet:forticlient:6.4.1:*:*:*:*:windows:*:*" ]
null
4.4
null
null
null
GHSA-69jx-9pq4-2cqh
Cross-site scripting (XSS) vulnerability in read.php in bitweaver CMS 1.2.1 allows remote attackers to inject arbitrary web script or HTML via the comment_title parameter.
[]
null
null
null
null
null
GHSA-jvvm-gq28-8rgc
Incorrect User Management vulnerability in Naukowa i Akademicka Sieć Komputerowa - Państwowy Instytut Badawczy EZD RP allows logged-in user to change the password of any user, including root user, which could lead to privilege escalation. This issue affects EZD RP: from 15 before 15.84, from 16 before 16.15, from 17 before 17.2.
[]
8.7
8.8
null
null
null
CVE-2023-44765
A Cross Site Scripting (XSS) vulnerability in Concrete CMS versions 8.5.12 and below, and 9.0 through 9.2.1 allows an attacker to execute arbitrary code via a crafted script to Plural Handle of the Data Objects from System & Settings.
[ "cpe:2.3:a:concretecms:concrete_cms:9.2.1:*:*:*:*:*:*:*" ]
null
5.4
null
null
null
CVE-2004-0576
The radius daemon (radiusd) for GNU Radius 1.1, when compiled with the -enable-snmp option, allows remote attackers to cause a denial of service (server crash) via malformed SNMP messages containing an invalid OID.
[ "cpe:2.3:a:gnu:radius:1.1:*:*:*:*:*:*:*" ]
null
null
null
5
null
GHSA-68ch-f5wf-r95v
Unspecified vulnerability in HP Data Protector Notebook Extension 6.20 and Data Protector for Personal Computers 7.0 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1225.
[]
null
null
null
null
null
CVE-2016-1274
Juniper Junos OS 14.1X53 before 14.1X53-D30 on QFX Series switches allows remote attackers to cause a denial of service (PFE panic) via a high rate of unspecified VXLAN packets.
[ "cpe:2.3:o:juniper:junos:14.1x53:*:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:14.1x53:d10:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:14.1x53:d15:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:14.1x53:d16:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:14.1x53:d25:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:14.1x53:d26:*:*:*:*:*:*", "cpe:2.3:h:juniper:qfx10000:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:qfx3500:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:qfx3600:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:qfx5100:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:qfx5200:-:*:*:*:*:*:*:*" ]
null
null
7.5
7.8
null
CVE-2015-1682
Microsoft Office 2010 SP2, Excel 2010 SP2, PowerPoint 2010 SP2, Word 2010 SP2, Office 2013 SP1, Excel 2013 SP1, PowerPoint 2013 SP1, Word 2013 SP1, Office 2013 RT SP1, Excel 2013 RT SP1, PowerPoint 2013 RT SP1, Word 2013 RT SP1, Office for Mac 2011, Excel for Mac 2011, PowerPoint for Mac 2011, Word for Mac 2011, PowerPoint Viewer, Word Automation Services on SharePoint Server 2010 SP2 and 2013 SP1, Excel Services on SharePoint Server 2010 SP2 and 2013 SP1, Office Web Apps 2010 SP2, Excel Web App 2010 SP2, Office Web Apps Server 2013 SP1, SharePoint Foundation 2010 SP2, and SharePoint Server 2013 SP1 allow remote attackers to execute arbitrary code via a crafted document, aka "Microsoft Office Memory Corruption Vulnerability."
[ "cpe:2.3:a:microsoft:excel:2010:sp2:*:*:*:*:x64:*", "cpe:2.3:a:microsoft:excel:2010:sp2:*:*:*:*:x86:*", "cpe:2.3:a:microsoft:excel:2013:sp1:*:*:rt:*:*:*", "cpe:2.3:a:microsoft:excel_web_app:2010:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2010:sp2:*:*:*:*:x64:*", "cpe:2.3:a:microsoft:office:2010:sp2:*:*:*:*:x86:*", "cpe:2.3:a:microsoft:office:2011:*:*:*:mac:*:*:*", "cpe:2.3:a:microsoft:office:2013:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2013:sp1:*:*:rt:*:*:*", "cpe:2.3:a:microsoft:office_web_apps_server:2010:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office_web_apps_server:2013:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:powerpoint:2010:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:powerpoint:2011:*:*:*:mac:*:*:*", "cpe:2.3:a:microsoft:powerpoint:2013:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:powerpoint:2013:sp1:*:*:rt:*:*:*", "cpe:2.3:a:microsoft:powerpoint_viewer:-:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sharepoint_foundation:2010:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sharepoint_foundation:2013:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sharepoint_server:2010:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sharepoint_server:2013:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:word:2010:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:word:2011:*:*:*:mac:*:*:*", "cpe:2.3:a:microsoft:word:2013:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:word:2013:sp1:*:*:rt:*:*:*" ]
null
null
null
9.3
null
CVE-2025-1704
ComponentInstaller Modification in ComponentInstaller in Google ChromeOS 15823.23.0 on Chromebooks allows enrolled users with local access to unenroll devices and intercept device management requests via loading components from the unencrypted stateful partition.
[]
null
6.5
null
null
null
GHSA-rm99-52xq-2r9w
A flaw was found in Ceph, relating to the URL processing on RGW backends. An attacker can exploit the URL processing by providing a null URL to crash the RGW, causing a denial of service.
[]
null
6.5
null
null
null
CVE-2012-2165
IBM Rational ClearQuest 7.1.x before 7.1.2.7 and 8.x before 8.0.0.3, when ClearQuest Authentication is enabled, allows remote authenticated users to read password hashes via a user query.
[ "cpe:2.3:a:ibm:rational_clearquest:7.1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_clearquest:7.1.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_clearquest:7.1.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_clearquest:7.1.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_clearquest:7.1.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_clearquest:7.1.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_clearquest:7.1.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_clearquest:7.1.1.8:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_clearquest:7.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_clearquest:7.1.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_clearquest:7.1.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_clearquest:7.1.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_clearquest:7.1.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_clearquest:7.1.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_clearquest:7.1.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_clearquest:8.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_clearquest:8.0.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_clearquest:8.0.0.2:*:*:*:*:*:*:*" ]
null
null
null
3.5
null
CVE-2022-45389
A missing permission check in Jenkins XP-Dev Plugin 1.0 and earlier allows unauthenticated attackers to trigger builds of jobs corresponding to an attacker-specified repository.
[ "cpe:2.3:a:jenkins:xp-dev:*:*:*:*:*:jenkins:*:*" ]
null
5.3
null
null
null
CVE-2006-3838
Multiple stack-based buffer overflows in eIQnetworks Enterprise Security Analyzer (ESA) before 2.5.0, as used in products including (a) Sidewinder, (b) iPolicy Security Manager, (c) Astaro Report Manager, (d) Fortinet FortiReporter, (e) Top Layer Network Security Analyzer, and possibly other products, allow remote attackers to execute arbitrary code via long (1) DELTAINTERVAL, (2) LOGFOLDER, (3) DELETELOGS, (4) FWASERVER, (5) SYSLOGPUBLICIP, (6) GETFWAIMPORTLOG, (7) GETFWADELTA, (8) DELETERDEPDEVICE, (9) COMPRESSRAWLOGFILE, (10) GETSYSLOGFIREWALLS, (11) ADDPOLICY, and (12) EDITPOLICY commands to the Syslog daemon (syslogserver.exe); (13) GUIADDDEVICE, (14) ADDDEVICE, and (15) DELETEDEVICE commands to the Topology server (Topology.exe); the (15) LICMGR_ADDLICENSE command to the License Manager (EnterpriseSecurityAnalyzer.exe); the (16) TRACE and (17) QUERYMONITOR commands to the Monitoring agent (Monitoring.exe); and possibly other vectors related to the Syslog daemon (syslogserver.exe).
[ "cpe:2.3:a:eiqnetworks:enterprise_security_analyzer:*:*:*:*:*:*:*:*" ]
null
null
null
10
null
CVE-2024-4602
Embed Peertube Playlist < 1.10 - Editor+ Stored XSS
The Embed Peertube Playlist WordPress plugin before 1.10 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
[ "cpe:2.3:a:infod7:embed_peertube_playlist:*:*:*:*:*:*:*:*" ]
null
5.4
null
null
null
GHSA-26ch-2fxx-xjff
Some Huawei smart phones with software Berlin-L21C10B130,Berlin-L21C185B133,Berlin-L21HNC10B131,Berlin-L21HNC185B140,Berlin-L21HNC432B151,Berlin-L22C636B160,Berlin-L22HNC636B130,Berlin-L22HNC675B150CUSTC675D001,Berlin-L23C605B131,Berlin-L24HNC567B110,FRD-L02C432B120,FRD-L02C635B130,FRD-L02C675B170CUSTC675D001,FRD-L04C567B162,FRD-L04C605B131,FRD-L09C10B130,FRD-L09C185B130,FRD-L09C432B131,FRD-L09C636B130,FRD-L14C567B162,FRD-L19C10B130,FRD-L19C432B131,FRD-L19C636B130 have a factory Reset Protection (FRP) bypass security vulnerability. When re-configuring the mobile phone using the factory reset protection (FRP) function, an attacker can login the configuration flow by Swype Keyboard and can perform some operations to update the Google account. As a result, the FRP function is bypassed.
[]
null
null
4.6
null
null
GHSA-3j66-pf2w-87jq
In Bluetooth driver, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local denial of service with User execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00418045; Issue ID: MSV-3481.
[]
null
5.5
null
null
null
CVE-2015-5200
The trace functionality in libvdpau before 1.1.1, when used in a setuid or setgid application, allows local users to write to arbitrary files via unspecified vectors.
[ "cpe:2.3:a:libvdpau_project:libvdpau:*:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*" ]
null
null
null
6.3
null
CVE-2024-25808
Cross-site Request Forgery (CSRF) vulnerability in Lychee version 3.1.6, allows remote attackers to execute arbitrary code via the create new album function.
[ "cpe:2.3:a:lycheeorg:lychee:*:*:*:*:*:*:*:*" ]
null
8.3
null
null
null
CVE-2001-0154
HTML e-mail feature in Internet Explorer 5.5 and earlier allows attackers to execute attachments by setting an unusual MIME type for the attachment, which Internet Explorer does not process correctly.
[ "cpe:2.3:a:microsoft:internet_explorer:*:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:5.01:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
GHSA-f7fp-x9mv-9jhh
Server-Side Request Forgery (SSRF) vulnerability in Kerfred FG Drupal to WordPress allows Server Side Request Forgery. This issue affects FG Drupal to WordPress: from n/a through 3.90.0.
[]
null
4.4
null
null
null
cisco-sa-vmanwebid-5QWMcCvt
Cisco SD-WAN vManage Software Information Disclosure Vulnerability
A vulnerability in the web-based management interface of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to read arbitrary files on the underlying filesystem of the device. The vulnerability is due to insufficient file scope limiting. An attacker could exploit this vulnerability by creating a specific file reference on the filesystem and then accessing it through the web-based management interface. A successful exploit could allow the attacker to read arbitrary files from the filesystem of the underlying operating system. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanwebid-5QWMcCvt ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanwebid-5QWMcCvt"]
[]
null
null
6.5
null
null
CVE-2003-1036
Multiple buffer overflows in the AGate component for SAP Internet Transaction Server (ITS) allow remote attackers to execute arbitrary code via long (1) ~command, (2) ~runtimemode, or (3) ~session parameters, or (4) a long HTTP Content-Type header.
[ "cpe:2.3:a:sap:internet_transaction_server:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2020-22741
An issue was discovered in Xuperchain 3.6.0 that allows for attackers to recover any arbitrary users' private key after obtaining the partial signature in multisignature.
[ "cpe:2.3:a:baidu:xuperchain:3.6.0:*:*:*:*:*:*:*" ]
null
7.5
null
5
null
CVE-2024-11653
EnGenius ENH1350EXT/ENS500-AC/ENS620EXT diag_traceroute command injection
A vulnerability was found in EnGenius ENH1350EXT, ENS500-AC and ENS620EXT up to 20241118. It has been rated as critical. Affected by this issue is some unknown functionality of the file /admin/network/diag_traceroute. The manipulation of the argument diag_traceroute leads to command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
[ "cpe:2.3:a:engenius:enh1350ext:20241118:*:*:*:*:*:*:*", "cpe:2.3:a:engenius:ens500-ac:20241118:*:*:*:*:*:*:*", "cpe:2.3:a:engenius:ens620ext:20241118:*:*:*:*:*:*:*", "cpe:2.3:o:engeniustech:enh1350ext_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:engeniustech:enh1350ext:-:*:*:*:*:*:*:*", "cpe:2.3:o:engeniustech:ens500-ac_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:engeniustech:eens500-ac:-:*:*:*:*:*:*:*", "cpe:2.3:o:engeniustech:ens620ext_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:engeniustech:ens620ext:-:*:*:*:*:*:*:*" ]
5.1
4.7
4.7
5.8
null
GHSA-mgg6-45mj-x85q
liblivemedia in Live555 before 2019.02.03 mishandles the termination of an RTSP stream after RTP/RTCP-over-RTSP has been set up, which could lead to a Use-After-Free error that causes the RTSP server to crash (Segmentation fault) or possibly have unspecified other impact.
[]
null
null
9.8
null
null
GHSA-8hmh-xv5p-r2p5
A denial of service vulnerability in Bionic DNS could enable a remote attacker to use a specially crafted network packet to cause a device hang or reboot. This issue is rated as High due to the possibility of remote denial of service. Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1. Android ID: A-32322088.
[]
null
null
7.5
null
null
CVE-2024-26710
powerpc/kasan: Limit KASAN thread size increase to 32KB
In the Linux kernel, the following vulnerability has been resolved: powerpc/kasan: Limit KASAN thread size increase to 32KB KASAN is seen to increase stack usage, to the point that it was reported to lead to stack overflow on some 32-bit machines (see link). To avoid overflows the stack size was doubled for KASAN builds in commit 3e8635fb2e07 ("powerpc/kasan: Force thread size increase with KASAN"). However with a 32KB stack size to begin with, the doubling leads to a 64KB stack, which causes build errors: arch/powerpc/kernel/switch.S:249: Error: operand out of range (0x000000000000fe50 is not between 0xffffffffffff8000 and 0x0000000000007fff) Although the asm could be reworked, in practice a 32KB stack seems sufficient even for KASAN builds - the additional usage seems to be in the 2-3KB range for a 64-bit KASAN build. So only increase the stack for KASAN if the stack size is < 32KB.
[]
null
5.5
null
null
null
RHSA-2023:3177
Red Hat Security Advisory: apr-util security update
apr-util: out-of-bounds writes in the apr_base64
[ "cpe:/a:redhat:rhel_e4s:8.1::appstream" ]
null
6.5
null
null
null
GHSA-58xh-xqmq-2mmr
The Inline Related Posts WordPress plugin before 3.8.0 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
[]
null
5.9
null
null
null
RHSA-2021:0354
Red Hat Security Advisory: kernel-alt security update
kernel: some ipv6 protocols not encrypted over ipsec tunnel kernel: use-after-free in fs/block_dev.c kernel: locking issue in drivers/tty/tty_jobctrl.c can lead to an use-after-free
[ "cpe:/o:redhat:enterprise_linux:7::server" ]
null
7.8
null
null
null
CVE-2022-0623
Out-of-bounds Read in mruby/mruby
Out-of-bounds Read in Homebrew mruby prior to 3.2.
[ "cpe:2.3:a:mruby:mruby:*:*:*:*:*:*:*:*" ]
null
null
6.5
null
null
PYSEC-2021-39
null
An issue was discovered in Pillow before 8.1.1. There is an out-of-bounds read in SGIRleDecode.c.
[]
null
null
null
null
null
CVE-2023-44025
SQL injection vulnerability in addify Addifyfreegifts v.1.0.2 and before allows a remote attacker to execute arbitrary code via a crafted script to the getrulebyid function in the AddifyfreegiftsModel.php component.
[ "cpe:2.3:a:addify:free_gifts:*:*:*:*:*:prestashop:*:*" ]
null
9.8
null
null
null
GHSA-mx2f-qv6j-3c6h
Multiple PHP remote file inclusion vulnerabilities in BlueShoes Framework 4.6 allow remote attackers to execute arbitrary PHP code via a URL in the (1) APP[path][applications] parameter to (a) Bs_Faq.class.php, (2) APP[path][core] parameter to (b) fileBrowserInner.php, (c) file.php, and (d) viewer.php, and (e) Bs_ImageArchive.class.php, (3) GLOBALS[APP][path][core] parameter to (f) Bs_Ml_User.class.php, or (4) APP[path][plugins] parameter to (g) Bs_Wse_Profile.class.php.
[]
null
null
null
null
null
GHSA-j2jw-vxpm-g78j
Integer overflow in GDI+ in Microsoft Office XP SP3 allows remote attackers to execute arbitrary code via an Office document with a bitmap (aka BMP) image that triggers memory corruption, aka "Office BMP Integer Overflow Vulnerability."
[]
null
null
null
null
null
CVE-2021-35580
Vulnerability in the Oracle Applications Manager product of Oracle E-Business Suite (component: View Reports). Supported versions that are affected are 12.1.3 and 12.2.3-12.2.10. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Applications Manager. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Applications Manager, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Applications Manager accessible data as well as unauthorized read access to a subset of Oracle Applications Manager accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).
[ "cpe:2.3:a:oracle:applications_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:applications_manager:12.1.3:*:*:*:*:*:*:*" ]
null
6.1
null
null
null
CVE-2020-14671
Vulnerability in the Oracle Advanced Outbound Telephony product of Oracle E-Business Suite (component: User Interface). Supported versions that are affected are 12.1.1-12.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Advanced Outbound Telephony. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Advanced Outbound Telephony, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Advanced Outbound Telephony accessible data as well as unauthorized update, insert or delete access to some of Oracle Advanced Outbound Telephony accessible data. CVSS 3.1 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N).
[ "cpe:2.3:a:oracle:advanced_outbound_telephony:*:*:*:*:*:*:*:*" ]
null
8.2
null
null
null
GHSA-8qh8-j4mx-j6jr
Unspecified vulnerability in secldapclntd in IBM AIX 5.3 with SP 5300-11-02 allows attackers to cause a denial of service (LDAP login failure) via unknown vectors. NOTE: some of these details are obtained from third party information. NOTE: there may be no attacker role, and the issue may be triggered entirely by an administrator's installation of an official service pack.
[]
null
null
null
null
null
GHSA-jh56-m69f-g6q7
IBM Aspera Shares 1.9.0 through 1.10.0 PL6 is vulnerable to HTML injection. A remote attacker could inject malicious HTML code, which when viewed, would be executed in the victim's Web browser within the security context of the hosting site.
[]
null
4.8
null
null
null
GHSA-vfhg-fr72-xjpm
An issue was discovered in certain Apple products. iOS before 11 is affected. macOS before 10.13 is affected. iCloud before 7.0 on Windows is affected. tvOS before 11 is affected. watchOS before 4 is affected. The issue involves the "SQLite" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app.
[]
null
null
7.8
null
null
GHSA-gfqw-7q63-8qv4
The web framework in IronPort AsyncOS on Cisco Web Security Appliance devices before 7.1.3-013, 7.5 before 7.5.0-838, and 7.7 before 7.7.0-550 allows remote authenticated users to execute arbitrary commands via crafted command-line input in a URL sent over IPv4, aka Bug ID CSCzv69294.
[]
null
null
null
null
null
GHSA-r38x-qwc8-xv5f
The /rest-service-fecru/server-v1 resource in Fisheye and Crucible before version 4.8.9 allowed authenticated remote attackers to obtain information about installation directories via information disclosure vulnerability.
[]
null
4.3
null
null
null
GHSA-6pxv-7652-xcm8
SUBNET Solutions Inc. has identified vulnerabilities in third-party components used in PowerSYSTEM Server 2021 and Substation Server 2021.
[]
null
8.4
null
null
null
GHSA-4r6h-327w-8qwr
libvterm through 0+bzr726, as used in Vim and other products, mishandles certain out-of-memory conditions, leading to a denial of service (application crash), related to screen.c, state.c, and vterm.c.
[]
null
null
7.5
null
null
GHSA-rwg8-pcch-2mh5
IOMobileFrameBuffer in Apple iOS before 9 allows local users to gain privileges or cause a denial of service (memory corruption) via unspecified vectors.
[]
null
null
null
null
null
GHSA-v729-w778-vqwm
A improper neutralization of special elements used in an sql command ('sql injection') in Fortinet FortiPortal versions 7.2.4 through 7.2.0 and 7.0.0 through 7.2.8 may allow an authenticated attacker to view the SQL query being run server-side when submitting an HTTP request, via including special elements in said request.
[]
null
4.3
null
null
null
GHSA-7f7g-8q3x-jpx9
Cross site scripting in Elefant CMS
A vulnerability, which was classified as problematic, has been found in Elefant CMS 1.3.12-RC. Affected by this issue is some unknown functionality of the component Title Handler. The manipulation with the input </title><img src=no onerror=alert(1)> leads to basic cross site scripting (Persistent). The attack may be launched remotely. Upgrading to version 1.3.13 is able to address this issue. It is recommended to upgrade the affected component.
[]
null
5.4
null
null
null
CVE-2012-4435
fwknop before 2.0.3 does not properly validate IP addresses, which allows remote authenticated users to cause a denial of service (server crash) via a long IP address.
[ "cpe:2.3:a:cipherdyne:fwknop:*:*:*:*:*:*:*:*", "cpe:2.3:a:cipherdyne:fwknop:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:cipherdyne:fwknop:2.0.1:*:*:*:*:*:*:*" ]
null
null
null
4
null
GHSA-8fm5-gg2f-f66q
Publify Vulnerable To Cross-Site Scripting (XSS) Via Redirects Requiring User Interaction
SummaryA publisher on a `publify` application is able to perform a cross-site scripting attack on an administrator using the redirect functionality.DetailsA publisher on a `publify` application is able to perform a cross-site scripting attack on an administrator using the redirect functionality. The exploitation of this XSS vulnerability requires the administrator to click a malicious link.We can create a redirect to a `javascript:alert()` URL. Whilst the redirect itself doesn't work, on the administrative panel, an a tag is created with the payload as the URI. Upon clicking this link, the XSS is triggered.An attack could attempt to hide their payload by using HTML, or other encodings, as to not make it obvious to an administrator that this is a malicious link.PoCA publisher can create a new redirect as shown below. The payload used is `javascript:alert()`. ![image](https://user-images.githubusercontent.com/44903767/295206083-3cf432c6-1f58-49a2-b09c-777e9707e0ff.png)An administrator will now see this redirect in their overview of the page. ![image](https://user-images.githubusercontent.com/44903767/295206204-3d4dc59a-8f82-42f3-98b2-a1809790351f.png)If they click the link on the right, it triggers the XSS. ![image](https://user-images.githubusercontent.com/44903767/295206292-3fea85f5-6918-4eff-8206-4a275a6e79e4.png)ImpactA publisher may attempt to use this vulnerability to escalate their privileges and become an administrator.
[]
1.8
null
null
null
null
GHSA-vc52-47rr-w6j9
Untrusted search path vulnerability in ALFTP before 5.31 allows local users to gain privileges via a Trojan horse executable file in a directory that is accessed for reading an extensionless file, as demonstrated by executing the README.exe file when a user attempts to access the README file.
[]
null
null
null
null
null
GHSA-wpf4-f6g8-892r
In Bluetooth, there is a possible out of bounds read due to a heap buffer overflow. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-206478022
[]
null
6.5
null
null
null
GHSA-3c39-w687-672w
Azure SDK Spoofing Vulnerability
[]
null
7.5
null
null
null
GHSA-x5xc-9jvw-6v9f
Use-after-free vulnerability in the sofree function in slirp/socket.c in QEMU (aka Quick Emulator) allows attackers to cause a denial of service (QEMU instance crash) by leveraging failure to properly clear ifq_so from pending packets.
[]
null
7.5
null
null
null
GHSA-7hm7-fv7g-c6pr
The ms_fnmatch function in Samba 3.0.4 and 3.0.7 and possibly other versions allows remote authenticated users to cause a denial of service (CPU consumption) via a SAMBA request that contains multiple * (wildcard) characters.
[]
null
null
null
null
null
GHSA-fcgf-3g9q-p3r9
The Security Audit Log facility in SAP Enhancement Package (EHP) 6 for SAP ERP 6.0 allows remote attackers to modify or delete arbitrary log classes via unspecified vectors. NOTE: some of these details are obtained from third party information.
[]
null
null
null
null
null
GHSA-x22v-5fx6-wj7x
The WebLinks module in Php-Nuke 6.x through 7.3 allows remote attackers to obtain sensitive information via an invalid show parameter, which displays the full path in a PHP error message.
[]
null
null
null
null
null
CVE-2022-0738
An issue has been discovered in GitLab affecting all versions starting from 14.6 before 14.6.5, all versions starting from 14.7 before 14.7.4, all versions starting from 14.8 before 14.8.2. GitLab was leaking user passwords when adding mirrors with SSH credentials under specific conditions.
[ "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*" ]
null
4.2
null
null
null
CVE-2007-5857
Quick Look in Apple Mac OS X 10.5.1 does not prevent a movie from accessing URLs when the movie file is previewed or if an icon is created, which might allow remote attackers to obtain sensitive information via HREFTrack.
[ "cpe:2.3:o:apple:mac_os_x:10.5.1:*:*:*:*:*:*:*" ]
null
null
null
6.4
null
CVE-2022-43140
kkFileView v4.1.0 was discovered to contain a Server-Side Request Forgery (SSRF) via the component cn.keking.web.controller.OnlinePreviewController#getCorsFile. This vulnerability allows attackers to force the application to make arbitrary requests via injection of crafted URLs into the url parameter.
[ "cpe:2.3:a:keking:kkfileview:4.1.0:*:*:*:*:*:*:*" ]
null
7.5
null
null
null
ICSMA-21-294-01
B. Braun Infusomat Space Large Volume Pump
An improper sanitization of input vulnerability in B. Braun SpaceCom2 prior to 012U000062 allows a remote unauthenticated attacker to gain user-level command-line access by passing a raw external string straight through to printf statements. The attacker is required to be on the same network as the device. CVE-2021-33886 has been assigned to this vulnerability. A CVSS v3 base score of 6.8 has been calculated; the CVSS vector string is (AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N). An insufficient verification of data authenticity vulnerability in B. Braun SpaceCom2 prior to 012U000062 allows a remote unauthenticated attacker to send the device malicious data to be used in place of the correct data. This results in full system command access and execution because of the lack of cryptographic signatures on critical data sets. CVE-2021-33885 has been assigned to this vulnerability. A CVSS v3 base score of 9.0 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H). A missing authentication for critical function vulnerability in B. Braun SpaceCom2 prior to 012U000062 allows a remote attacker to reconfigure the device from an unknown source because of the lack of authentication on proprietary networking commands. CVE-2021-33882 has been assigned to this vulnerability. A CVSS v3 base score of 6.8 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N). A cleartext transmission of sensitive information vulnerability in B. Braun SpaceCom2 prior to 012U000062 allows a remote attacker to obtain sensitive information by obtaining access to network traffic. The exposed data includes critical values for a pump's internal configuration. CVE-2021-33883 has been assigned to this vulnerability. A CVSS v3 base score of 5.9 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N). An unrestricted upload of file with dangerous type vulnerability in B. Braun SpaceCom2 prior to 012U000062 allows remote attackers to upload any files to the /tmp directory of the device through the webpage API, which can result in critical files being overwritten. CVE-2021-33884 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N).
[]
null
null
6.5
null
null
GHSA-938w-vx4g-p5w6
core/string_api.php in Mantis before 1.1.3 does not check the privileges of the viewer before composing a link with issue data in the source anchor, which allows remote attackers to discover an issue's title and status via a request with a modified issue number.
[]
null
null
null
null
null
GHSA-v5gf-r78h-55q6
document-merge-service vulnerable to Remote Code Execution via Server-Side Template Injection
ImpactA remote code execution (RCE) via server-side template injection (SSTI) allows for user supplied code to be executed in the server's context where it is executed as the document-merge-server user with the UID 901 thus giving an attacker considerable control over the container.PatchesIt has been patched in v6.5.2Referenceshttps://book.hacktricks.xyz/pentesting-web/ssti-server-side-template-injection/jinja2-sstiPOCAdd the following to a document, upload and render it:The index might be different, so to debug this first render a template with `{{ PLACEHOLDER.__class__.__mro__[1].__subclasses__() }}` and then get the index of `subprocess.Popen` and replace 202 with that.![image](https://github.com/adfinis/document-merge-service/assets/110528300/0a1dfcff-2eba-40f1-af9c-08c8ec2bc0a1)
[]
null
9.1
null
null
null
GHSA-7h8p-mgrw-pw6c
Open redirect vulnerability in Splunk Enterprise 6.4.x prior to 6.4.3, Splunk Enterprise 6.3.x prior to 6.3.6, Splunk Enterprise 6.2.x prior to 6.2.10, Splunk Enterprise 6.1.x prior to 6.1.11, Splunk Enterprise 6.0.x prior to 6.0.12, Splunk Enterprise 5.0.x prior to 5.0.16 and Splunk Light prior to 6.4.3 allows to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors.
[]
null
null
6.1
null
null
GHSA-f4vm-g8q2-m52q
Unspecified vulnerability in Oracle Java SE 5.0u55, 6u65, and 7u45; JRockit R27.7.7 and R28.2.9; Java SE Embedded 7u45; and OpenJDK 7 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. NOTE: the previous information is from the January 2014 CPU. Oracle has not commented on third-party claims that the issue is due to incorrect input validation in LookupProcessor.cpp in the ICU Layout Engine, which allows attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted font file.
[]
null
null
null
null
null
GHSA-g5cw-f884-7rc6
Adobe Dimension versions 3.4.10 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[]
null
5.5
null
null
null
CVE-2024-26737
bpf: Fix racing between bpf_timer_cancel_and_free and bpf_timer_cancel
In the Linux kernel, the following vulnerability has been resolved: bpf: Fix racing between bpf_timer_cancel_and_free and bpf_timer_cancel The following race is possible between bpf_timer_cancel_and_free and bpf_timer_cancel. It will lead a UAF on the timer->timer. bpf_timer_cancel(); spin_lock(); t = timer->time; spin_unlock(); bpf_timer_cancel_and_free(); spin_lock(); t = timer->timer; timer->timer = NULL; spin_unlock(); hrtimer_cancel(&t->timer); kfree(t); /* UAF on t */ hrtimer_cancel(&t->timer); In bpf_timer_cancel_and_free, this patch frees the timer->timer after a rcu grace period. This requires a rcu_head addition to the "struct bpf_hrtimer". Another kfree(t) happens in bpf_timer_init, this does not need a kfree_rcu because it is still under the spin_lock and timer->timer has not been visible by others yet. In bpf_timer_cancel, rcu_read_lock() is added because this helper can be used in a non rcu critical section context (e.g. from a sleepable bpf prog). Other timer->timer usages in helpers.c have been audited, bpf_timer_cancel() is the only place where timer->timer is used outside of the spin_lock. Another solution considered is to mark a t->flag in bpf_timer_cancel and clear it after hrtimer_cancel() is done. In bpf_timer_cancel_and_free, it busy waits for the flag to be cleared before kfree(t). This patch goes with a straight forward solution and frees timer->timer after a rcu grace period.
[]
null
5.5
null
null
null
CVE-2012-2907
Cross-site scripting (XSS) vulnerability in the aberdeen_breadcrumb function in template.php in the Aberdeen theme 6.x-1.x before 6.x-1.11 for Drupal, when set to append the content title to the breadcrumb, allows remote attackers to inject arbitrary web script or HTML via the content title in a breadcrumb.
[ "cpe:2.3:a:ishmael_sanchez:aberdeen:6.x-1.8:*:*:*:*:*:*:*", "cpe:2.3:a:ishmael_sanchez:aberdeen:6.x-1.9:*:*:*:*:*:*:*", "cpe:2.3:a:ishmael_sanchez:aberdeen:6.x-1.10:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*" ]
null
null
null
2.6
null
cisco-sa-n9kaci-unauth-access-5PWzDx2w
Cisco Nexus 9000 Series Fabric Switches ACI Mode Fabric Infrastructure VLAN Unauthorized Access Vulnerability
A vulnerability in the fabric infrastructure VLAN connection establishment of Cisco Nexus 9000 Series Fabric Switches in Application Centric Infrastructure (ACI) Mode could allow an unauthenticated, adjacent attacker to bypass security validations and connect an unauthorized server to the infrastructure VLAN. This vulnerability is due to insufficient security requirements during the Link Layer Discovery Protocol (LLDP) setup phase of the infrastructure VLAN. An attacker could exploit this vulnerability by sending a crafted LLDP packet on the adjacent subnet to an affected device. A successful exploit could allow the attacker to connect an unauthorized server to the infrastructure VLAN, which is highly privileged. With a connection to the infrastructure VLAN, the attacker can make unauthorized connections to Cisco Application Policy Infrastructure Controller (APIC) services or join other host endpoints. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-n9kaci-unauth-access-5PWzDx2w ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-n9kaci-unauth-access-5PWzDx2w"] This advisory is part of the February 2021 Cisco FXOS and NX-OS Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: February 2021 Cisco FXOS and NX-OS Software Security Advisory Bundled Publication ["https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-74414"].
[]
null
7.4
null
null
null
CVE-2020-18773
An invalid memory access in the decode function in iptc.cpp of Exiv2 0.27.99.0 allows attackers to cause a denial of service (DOS) via a crafted tif file.
[ "cpe:2.3:a:exiv2:exiv2:0.27.99.0:*:*:*:*:*:*:*" ]
null
6.5
null
4.3
null
GHSA-m5g9-3wxp-6r7f
A Memory Corruption Vulnerability in Autodesk FBX Review version 1.4.0 may lead to remote code execution through maliciously crafted DLL files.
[]
null
null
null
null
null
GHSA-p8fm-w787-x6x3
Malicious Package in portionfatty12
All versions of `portionfatty12` are considered malicious. The package is malware designed to steal user's data. When installed it uploads the user's public SSH keys to a remote server.RecommendationThis package is not available on the npm Registry anymore. If you happen to find this package in your environment you should consider the system it was installed on compromised and assess if further response (such as rotating all credentials found on the compromised machine) is necessary.
[]
null
9.8
null
null
null
CVE-2023-51953
Tenda AX1803 v1.0.0.1 contains a stack overflow via the iptv.stb.mode parameter in the function formSetIptv.
[ "cpe:2.3:o:tenda:ax1803_firmware:1.0.0.1:*:*:*:*:*:*:*", "cpe:2.3:h:tenda:ax1803:-:*:*:*:*:*:*:*" ]
null
9.8
null
null
null
RHBA-2024:0928
Red Hat Bug Fix Advisory: MTV 2.5.5 Images
follow-redirects: Improper Input Validation due to the improper handling of URLs by the url.parse() jsrsasign: vulnerable to Observable Discrepancy via the RSA PKCS1.5 or RSAOAEP decryption process
[ "cpe:/a:redhat:migration_toolkit_virtualization:2.5::el8", "cpe:/a:redhat:migration_toolkit_virtualization:2.5::el9" ]
null
7.5
null
null
null
CVE-2016-3725
Jenkins before 2.3 and LTS before 1.651.2 allows remote authenticated users to trigger updating of update site metadata by leveraging a missing permissions check. NOTE: this issue can be combined with DNS cache poisoning to cause a denial of service (service disruption).
[ "cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*", "cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:openshift:3.1:*:*:*:enterprise:*:*:*", "cpe:2.3:a:redhat:openshift:3.2:*:*:*:enterprise:*:*:*" ]
null
null
4.3
5
null
GHSA-fw6g-56pg-38xh
The ping_recvmsg function in net/ipv4/ping.c in the Linux kernel before 3.12.4 does not properly interact with read system calls on ping sockets, which allows local users to cause a denial of service (NULL pointer dereference and system crash) by leveraging unspecified privileges to execute a crafted application.
[]
null
null
null
null
null
GHSA-h2v5-5p47-rmq3
IBM DOORS Next Generation (DNG/RRC) 6.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 134064.
[]
null
null
5.4
null
null
GHSA-mfgp-fvpm-hx5v
Studio Network Solutions ShareBrowser before 7.0 on macOS mishandles signature verification, aka PMP-2636.
[]
null
9.8
null
null
null
CVE-2024-12872
Zalomení <= 1.5 - Admin+ Stored XSS
The Zalomení WordPress plugin through 1.5 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
[]
null
4.8
null
null
null
CVE-2012-4263
Cross-site scripting (XSS) vulnerability in inc/admin/content.php in the Better WP Security (better_wp_security) plugin before 3.2.5 for WordPress allows remote attackers to inject arbitrary web script or HTML via the HTTP_USER_AGENT header.
[ "cpe:2.3:a:bit51:better-wp-security:*:*:*:*:*:*:*:*", "cpe:2.3:a:bit51:better-wp-security:-:alpha1:*:*:*:*:*:*", "cpe:2.3:a:bit51:better-wp-security:-:alpha10:*:*:*:*:*:*", "cpe:2.3:a:bit51:better-wp-security:-:alpha11:*:*:*:*:*:*", "cpe:2.3:a:bit51:better-wp-security:-:alpha2:*:*:*:*:*:*", "cpe:2.3:a:bit51:better-wp-security:-:alpha3:*:*:*:*:*:*", "cpe:2.3:a:bit51:better-wp-security:-:alpha4:*:*:*:*:*:*", "cpe:2.3:a:bit51:better-wp-security:-:alpha5:*:*:*:*:*:*", "cpe:2.3:a:bit51:better-wp-security:-:alpha6:*:*:*:*:*:*", "cpe:2.3:a:bit51:better-wp-security:-:alpha7:*:*:*:*:*:*", "cpe:2.3:a:bit51:better-wp-security:-:alpha8:*:*:*:*:*:*", "cpe:2.3:a:bit51:better-wp-security:-:alpha9:*:*:*:*:*:*", "cpe:2.3:a:bit51:better-wp-security:0.1:alpha:*:*:*:*:*:*", "cpe:2.3:a:bit51:better-wp-security:0.1:beta:*:*:*:*:*:*", "cpe:2.3:a:bit51:better-wp-security:0.2:beta:*:*:*:*:*:*", "cpe:2.3:a:bit51:better-wp-security:0.3:beta:*:*:*:*:*:*", "cpe:2.3:a:bit51:better-wp-security:0.4:beta:*:*:*:*:*:*", "cpe:2.3:a:bit51:better-wp-security:0.5:beta:*:*:*:*:*:*", "cpe:2.3:a:bit51:better-wp-security:0.6:beta:*:*:*:*:*:*", "cpe:2.3:a:bit51:better-wp-security:0.7:beta:*:*:*:*:*:*", "cpe:2.3:a:bit51:better-wp-security:0.8:beta:*:*:*:*:*:*", "cpe:2.3:a:bit51:better-wp-security:0.9:beta:*:*:*:*:*:*", "cpe:2.3:a:bit51:better-wp-security:0.10:beta:*:*:*:*:*:*", "cpe:2.3:a:bit51:better-wp-security:0.11:beta:*:*:*:*:*:*", "cpe:2.3:a:bit51:better-wp-security:0.13:beta:*:*:*:*:*:*", "cpe:2.3:a:bit51:better-wp-security:0.14:beta:*:*:*:*:*:*", "cpe:2.3:a:bit51:better-wp-security:0.15:beta:*:*:*:*:*:*", "cpe:2.3:a:bit51:better-wp-security:0.16:beta:*:*:*:*:*:*", "cpe:2.3:a:bit51:better-wp-security:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:bit51:better-wp-security:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:bit51:better-wp-security:1.2:*:*:*:*:*:*:*", "cpe:2.3:a:bit51:better-wp-security:1.3:*:*:*:*:*:*:*", "cpe:2.3:a:bit51:better-wp-security:1.4:*:*:*:*:*:*:*", "cpe:2.3:a:bit51:better-wp-security:1.5:*:*:*:*:*:*:*", "cpe:2.3:a:bit51:better-wp-security:1.6:*:*:*:*:*:*:*", "cpe:2.3:a:bit51:better-wp-security:1.7:*:*:*:*:*:*:*", "cpe:2.3:a:bit51:better-wp-security:1.8:*:*:*:*:*:*:*", "cpe:2.3:a:bit51:better-wp-security:1.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:bit51:better-wp-security:1.9:*:*:*:*:*:*:*", "cpe:2.3:a:bit51:better-wp-security:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:bit51:better-wp-security:2.1:*:*:*:*:*:*:*", "cpe:2.3:a:bit51:better-wp-security:2.2:*:*:*:*:*:*:*", "cpe:2.3:a:bit51:better-wp-security:2.3:*:*:*:*:*:*:*", "cpe:2.3:a:bit51:better-wp-security:2.4:*:*:*:*:*:*:*", "cpe:2.3:a:bit51:better-wp-security:2.5:*:*:*:*:*:*:*", "cpe:2.3:a:bit51:better-wp-security:2.6:*:*:*:*:*:*:*", "cpe:2.3:a:bit51:better-wp-security:2.7:*:*:*:*:*:*:*", "cpe:2.3:a:bit51:better-wp-security:2.8:*:*:*:*:*:*:*", "cpe:2.3:a:bit51:better-wp-security:2.9:*:*:*:*:*:*:*", "cpe:2.3:a:bit51:better-wp-security:2.10:*:*:*:*:*:*:*", "cpe:2.3:a:bit51:better-wp-security:2.11:*:*:*:*:*:*:*", "cpe:2.3:a:bit51:better-wp-security:2.12:*:*:*:*:*:*:*", "cpe:2.3:a:bit51:better-wp-security:2.13:*:*:*:*:*:*:*", "cpe:2.3:a:bit51:better-wp-security:2.14:*:*:*:*:*:*:*", "cpe:2.3:a:bit51:better-wp-security:2.15:*:*:*:*:*:*:*", "cpe:2.3:a:bit51:better-wp-security:2.16:*:*:*:*:*:*:*", "cpe:2.3:a:bit51:better-wp-security:2.17:*:*:*:*:*:*:*", "cpe:2.3:a:bit51:better-wp-security:2.18:*:*:*:*:*:*:*", "cpe:2.3:a:bit51:better-wp-security:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:bit51:better-wp-security:3.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:bit51:better-wp-security:3.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:bit51:better-wp-security:3.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:bit51:better-wp-security:3.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:bit51:better-wp-security:3.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:bit51:better-wp-security:3.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:bit51:better-wp-security:3.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:bit51:better-wp-security:3.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:bit51:better-wp-security:3.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:bit51:better-wp-security:3.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:bit51:better-wp-security:3.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:bit51:better-wp-security:3.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:bit51:better-wp-security:3.1:*:*:*:*:*:*:*", "cpe:2.3:a:bit51:better-wp-security:3.2:*:*:*:*:*:*:*", "cpe:2.3:a:bit51:better-wp-security:3.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:bit51:better-wp-security:3.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:bit51:better-wp-security:3.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:bit51:better-wp-security:3.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:-:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
CVE-2021-28166
In Eclipse Mosquitto version 2.0.0 to 2.0.9, if an authenticated client that had connected with MQTT v5 sent a crafted CONNACK message to the broker, a NULL pointer dereference would occur.
[ "cpe:2.3:a:eclipse:mosquitto:*:*:*:*:*:*:*:*" ]
null
6.5
null
null
null
CVE-2002-0198
Buffer overflow in plDaniels ripMime 1.2.6 and earlier, as used in other programs such as xamime and inflex, allows remote attackers to execute arbitrary code via an attachment in a long filename.
[ "cpe:2.3:a:paul_l_daniels:inflex:1.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:paul_l_daniels:ripmime:1.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:paul_l_daniels:ripmime:1.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:paul_l_daniels:ripmime:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:paul_l_daniels:ripmime:1.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:paul_l_daniels:ripmime:1.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:paul_l_daniels:ripmime:1.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:paul_l_daniels:ripmime:1.2.6:*:*:*:*:*:*:*" ]
null
null
null
10
null
GHSA-9pcx-rmqr-hp8m
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Riyaz GetSocial allows Reflected XSS. This issue affects GetSocial: from n/a through 2.0.1.
[]
null
7.1
null
null
null
GHSA-mqrm-h2pw-9j9r
Applications that use Wget to access a remote resource using shorthand URLs and pass arbitrary user credentials in the URL are vulnerable. In these cases attackers can enter crafted credentials which will cause Wget to access an arbitrary host.
[]
null
6.5
null
null
null
CVE-2020-17040
Windows Hyper-V Security Feature Bypass Vulnerability
Windows Hyper-V Security Feature Bypass Vulnerability
[ "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1803:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_1909:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_1903:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2004:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012_r2:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_20h2:*:*:*:*:*:*:*:*" ]
null
6.5
null
null
null
CVE-2002-1928
602Pro LAN SUITE 2002 allows remote attackers to view the directory tree via an HTTP GET request with a trailing "~" (tilde) or ".bak" extension.
[ "cpe:2.3:a:software602:602pro_lan_suite:2002:*:*:*:*:*:*:*" ]
null
null
null
5
null
cisco-sa-sdwan-xss-zQ4KPvYd
Cisco Catalyst SD-WAN Manager Cross-Site Scripting Vulnerability
A vulnerability in the web-based management interface of Cisco Catalyst SD-WAN Manager, formerly Cisco SD-WAN vManage, could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by inserting malicious data into a specific data field in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
[]
null
6.4
null
null
null
CVE-2022-38334
XPDF v4.04 and earlier was discovered to contain a stack overflow via the function Catalog::countPageTree() at Catalog.cc.
[ "cpe:2.3:a:xpdfreader:xpdf:*:*:*:*:*:*:*:*" ]
null
5.5
null
null
null
GHSA-rr88-j2r8-3xpc
AutoGPT, a component of significant-gravitas/autogpt, is vulnerable to an improper neutralization of special elements used in an OS command ('OS Command Injection') due to a flaw in its shell command validation function. Specifically, the vulnerability exists in versions v0.5.0 up to but not including 5.1.0. The issue arises from the application's method of validating shell commands against an allowlist or denylist, where it only checks the first word of the command. This allows an attacker to bypass the intended restrictions by crafting commands that are executed despite not being on the allowlist or by including malicious commands not present in the denylist. Successful exploitation of this vulnerability could allow an attacker to execute arbitrary shell commands.
[]
null
null
8.8
null
null
GHSA-w6v7-rp96-jc74
In the Citadel chip firmware, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-175117047
[]
null
null
null
null
null
CVE-2022-30829
Wedding Management System v1.0 is vulnerable to SQL Injection via \admin\users_edit.php.
[ "cpe:2.3:a:wedding_management_system_project:wedding_management_system:1.0:*:*:*:*:*:*:*" ]
null
7.2
null
6.5
null
CVE-2023-22840
Improper neutralization in software for the Intel(R) oneVPL GPU software before version 22.6.5 may allow an authenticated user to potentially enable denial of service via local access.
[ "cpe:2.3:a:intel:onevpl_gpu_runtime:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*" ]
null
3.3
null
null
null
CVE-2020-28023
Exim 4 before 4.94.2 allows Out-of-bounds Read. smtp_setup_msg may disclose sensitive information from process memory to an unauthenticated SMTP client.
[ "cpe:2.3:a:exim:exim:*:*:*:*:*:*:*:*" ]
null
7.5
null
5
null
RHSA-2024:4262
Red Hat Security Advisory: linux-firmware security update
kernel: Reserved fields in guest message responses may not be zero initialized
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
4.4
null
null
null
CVE-2023-36037
Microsoft Excel Security Feature Bypass Vulnerability
Microsoft Excel Security Feature Bypass Vulnerability
[ "cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:x64:*", "cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:x86:*", "cpe:2.3:a:microsoft:excel:2016:*:*:*:*:*:x64:*", "cpe:2.3:a:microsoft:excel:2016:*:*:*:*:*:x86:*", "cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:x64:*", "cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:x86:*", "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:*:x64:*", "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:*:x86:*", "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:macos:*:*" ]
null
7.8
null
null
null
CVE-2020-28387
A vulnerability has been identified in Solid Edge SE2020 (All Versions < SE2020MP13), Solid Edge SE2021 (All Versions < SE2021MP3). When opening a specially crafted SEECTCXML file, the application could disclose arbitrary files to remote attackers. This is because of the passing of specially crafted content to the underlying XML parser without taking proper restrictions such as prohibiting an external dtd. (ZDI-CAN-11923)
[ "cpe:2.3:a:siemens:solid_edge:*:*:*:*:*:*:*:*", "cpe:2.3:a:siemens:solid_edge:se2021:-:*:*:*:*:*:*", "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack1:*:*:*:*:*:*" ]
null
5.5
null
4.3
null
CVE-2012-1235
Cross-site request forgery (CSRF) vulnerability in Advantech/BroadWin WebAccess 7.0 allows remote authenticated users to hijack the authentication of unspecified victims via unknown vectors. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-0235.
[ "cpe:2.3:a:advantech:advantech_webaccess:*:*:*:*:*:*:*:*", "cpe:2.3:a:advantech:advantech_webaccess:5.0:*:*:*:*:*:*:*" ]
null
null
null
6
null
CVE-2006-3574
Multiple cross-site scripting (XSS) vulnerabilities in Hitachi Groupmax Collaboration Portal and Web Client before 07-20-/D, and uCosminexus Collaboration Portal and Forum/File Sharing before 06-20-/C, allow remote attackers to "execute malicious scripts" via unknown vectors (aka HS06-014-01).
[ "cpe:2.3:a:hitachi:cosminexus_collaboration_portal:*:*:*:*:*:*:*:*", "cpe:2.3:a:hitachi:cosminexus_collaboration_portal:6.2:*:*:*:*:*:*:*", "cpe:2.3:a:hitachi:cosminexus_collaboration_portal:06_00:*:*:*:*:*:*:*", "cpe:2.3:a:hitachi:groupmax_collaboration_portal:*:*:*:*:*:*:*:*", "cpe:2.3:a:hitachi:groupmax_collaboration_portal:7.2:*:*:*:*:*:*:*", "cpe:2.3:a:hitachi:groupmax_collaboration_portal:07_00:*:*:*:*:*:*:*", "cpe:2.3:a:hitachi:groupmax_collaboration_web_client:*:*:*:*:*:*:*:*", "cpe:2.3:a:hitachi:groupmax_collaboration_web_client:7.2:*:*:*:*:*:*:*", "cpe:2.3:a:hitachi:groupmax_collaboration_web_client:07_00:*:*:*:*:*:*:*" ]
null
null
null
6.8
null