id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
GHSA-475g-6fvx-3hr3 | Cross-Site Request Forgery (CSRF) vulnerability in ARI Soft Contact Form 7 Connector.This issue affects Contact Form 7 Connector: from n/a through 1.2.2. | [] | null | 4.3 | null | null |
|
CVE-2017-6462 | Buffer overflow in the legacy Datum Programmable Time Server (DPTS) refclock driver in NTP before 4.2.8p10 and 4.3.x before 4.3.94 allows local users to have unspecified impact via a crafted /dev/datum device. | [
"cpe:2.3:a:ntp:ntp:4.2.8:p9:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.3.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.3.9:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.3.10:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.3.11:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.3.12:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.3.13:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.3.14:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.3.15:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.3.16:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.3.17:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.3.18:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.3.19:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.3.20:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.3.21:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.3.22:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.3.23:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.3.24:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.3.25:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.3.26:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.3.27:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.3.28:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.3.29:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.3.30:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.3.31:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.3.32:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.3.33:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.3.34:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.3.35:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.3.36:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.3.37:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.3.38:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.3.39:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.3.40:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.3.41:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.3.42:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.3.43:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.3.44:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.3.45:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.3.46:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.3.47:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.3.48:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.3.49:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.3.50:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.3.51:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.3.52:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.3.53:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.3.54:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.3.55:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.3.56:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.3.57:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.3.58:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.3.59:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.3.60:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.3.61:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.3.62:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.3.63:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.3.64:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.3.65:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.3.66:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.3.67:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.3.68:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.3.69:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.3.70:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.3.71:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.3.72:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.3.73:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.3.74:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.3.75:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.3.76:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.3.77:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.3.78:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.3.79:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.3.80:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.3.81:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.3.82:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.3.83:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.3.84:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.3.85:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.3.86:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.3.87:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.3.88:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.3.89:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.3.90:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.3.91:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.3.92:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.3.93:*:*:*:*:*:*:*"
] | null | null | 7.8 | 4.6 |
|
RHSA-2014:0254 | Red Hat Security Advisory: activemq security update | HawtJNI: predictable temporary file name leading to local arbitrary code execution Framework: XML External Entity (XXE) injection flaw Camel: remote code execution via header field manipulation Camel: remote code execution via XSL | [
"cpe:/a:redhat:openshift:1.2::el6"
] | null | null | null | null |
GHSA-pjpw-9hx5-m28p | A vulnerability has been identified in SINEC NMS (All versions < V3.0 SP1). The affected application contains a database function, that does not properly restrict the permissions of users to write to the filesystem of the host system.
This could allow an authenticated medium-privileged attacker to write arbitrary content to any location in the filesystem of the host system. | [] | 8.3 | 8.4 | null | null |
|
CVE-2022-21852 | Windows DWM Core Library Elevation of Privilege Vulnerability | Windows DWM Core Library Elevation of Privilege Vulnerability | [
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server:2022:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
CVE-2023-2932 | Use after free in PDF in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: High) | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
|
CVE-2019-7639 | An issue was discovered in gsi-openssh-server 7.9p1 on Fedora 29. If PermitPAMUserChange is set to yes in the /etc/gsissh/sshd_config file, logins succeed with a valid username and an incorrect password, even though a failure entry is recorded in the /var/log/messages file. | [
"cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*",
"cpe:2.3:a:gsi-openssh_project:gsi-openssh:7.9:p1:*:*:*:*:*:*"
] | null | null | 8.1 | 4.3 |
|
CVE-2019-1732 | Cisco NX-OS Software Remote Package Manager Command Injection Vulnerability | A vulnerability in the Remote Package Manager (RPM) subsystem of Cisco NX-OS Software could allow an authenticated, local attacker with administrator credentials to leverage a time-of-check, time-of-use (TOCTOU) race condition to corrupt local variables, which could lead to arbitrary command injection. The vulnerability is due to the lack of a proper locking mechanism on critical variables that need to stay static until used. An attacker could exploit this vulnerability by authenticating to an affected device and issuing a set of RPM-related CLI commands. A successful exploit could allow the attacker to perform arbitrary command injection. The attacker would need administrator credentials for the targeted device. | [
"cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3100:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3100-z:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3100v:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3200:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3400:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3500:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3524-x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3524-xl:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3548-x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3548-xl:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9200:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9300:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx_os:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3600:-:*:*:*:*:*:*:*"
] | null | null | 6.4 | null |
GHSA-wv7w-gjp3-5jw8 | Adobe Experience Manager versions 6.5.18 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | [] | null | 5.4 | null | null |
|
GHSA-g6h6-r377-vh4m | Due to a Missing Authorization weakness and Insufficient Granularity of Access Control in a specific device configuration, a vulnerability exists in Juniper Networks Junos OS on SRX Series whereby an attacker who attempts to access J-Web administrative interfaces can successfully do so from any device interface regardless of the web-management configuration and filter rules which may otherwise protect access to J-Web. This issue affects: Juniper Networks Junos OS SRX Series 20.4 version 20.4R1 and later versions prior to 20.4R2-S1, 20.4R3; 21.1 versions prior to 21.1R1-S1, 21.1R2. This issue does not affect Juniper Networks Junos OS versions prior to 20.4R1. | [] | null | null | null | null |
|
GHSA-r724-v48g-c7g7 | Library Management System v1.0 was discovered to contain a SQL injection vulnerability via the bookId parameter at /admin/delete.php. | [] | null | 9.8 | null | null |
|
GHSA-vhf3-65mf-c545 | Red Hat CloudForms 3.2 Management Engine (CFME) 5.4.4 and CloudForms 4.0 Management Engine (CFME) 5.5.0 do not properly encrypt data in the backend PostgreSQL database, which might allow local users to obtain sensitive data and consequently gain privileges by leveraging access to (1) database exports or (2) log files. | [] | null | null | 5.1 | null |
|
GHSA-968q-p8m8-c87j | Vulnerability in the PeopleSoft Enterprise PeopleTools component of Oracle PeopleSoft Products (subcomponent: Stylesheet). Supported versions that are affected are 8.55, 8.56 and 8.57. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in PeopleSoft Enterprise PeopleTools, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.0 Base Score 4.7 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N). | [] | null | null | 4.7 | null |
|
GHSA-qg97-xp64-p6pc | Heap buffer overflow in Codecs in Google Chrome on Windows prior to 135.0.7049.95 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical) | [] | null | 8.8 | null | null |
|
CVE-2014-9471 | The parse_datetime function in GNU coreutils allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted date string, as demonstrated by the "--date=TZ="123"345" @1" string to the touch or date command. | [
"cpe:2.3:a:gnu:coreutils:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-h82f-8whg-fr4x | Microsoft Internet Explorer 7 through 11 allows user-assisted remote attackers to read the clipboard contents via crafted web script, aka "Internet Explorer Clipboard Information Disclosure Vulnerability." | [] | null | null | null | null |
|
GHSA-j29p-hg69-484g | Buffer overflow in the make_table function in the LHZ component in gzip 1.3.5 allows context-dependent attackers to execute arbitrary code via a crafted decoding table in a GZIP archive. | [] | null | null | null | null |
|
GHSA-fpp3-7h58-vv6g | A vulnerability was found in code-projects Responsive Hotel Site 1.0. It has been classified as critical. Affected is an unknown function of the file index.php. The manipulation of the argument name/phone/email leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. | [] | 6.9 | 7.3 | null | null |
|
CVE-2000-1098 | The web server for the SonicWALL SOHO firewall allows remote attackers to cause a denial of service via an empty GET or POST request. | [
"cpe:2.3:h:sonicwall:soho_firewall:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:soho_firewall:5.0.0:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-g5p8-cf4v-r88p | Unspecified vulnerability in the Java Embedding Plugin (JEP) in Mozilla Firefox before 3.5.19 and 3.6.x before 3.6.17, and SeaMonkey before 2.0.14, on Mac OS X allows remote attackers to bypass intended access restrictions via unknown vectors. | [] | null | null | null | null |
|
GHSA-9xgw-72w6-j5wc | Cross-site scripting (XSS) vulnerability in ProjectForum 4.7.0 and earlier allows remote attackers to inject arbitrary web script or HTML via the (1) fwd parameter in admin/adminsignin.html and (2) originalpageid parameter in admin/newpage.html associated with a group. | [] | null | null | null | null |
|
CVE-2012-1121 | MantisBT before 1.2.9 does not properly check permissions, which allows remote authenticated users with manager privileges to (1) modify or (2) delete global categories. | [
"cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:0.18.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:0.19.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:0.19.0:a1:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:0.19.0:a2:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:0.19.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:0.19.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:0.19.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:0.19.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:0.19.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:0.19.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.0.0:a1:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.0.0:a2:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.0.0:a3:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc4:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc5:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.1.0:a1:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.1.0:a2:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.1.0:a3:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.1.0:a4:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.1.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.1.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.1.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.2.0:alpha1:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.2.0:alpha2:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.2.0:alpha3:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.2.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.2.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.2.7:*:*:*:*:*:*:*"
] | null | null | null | 4.9 |
|
CVE-2015-1216 | Use-after-free vulnerability in the V8Window::namedPropertyGetterCustom function in bindings/core/v8/custom/V8WindowCustom.cpp in the V8 bindings in Blink, as used in Google Chrome before 41.0.2272.76, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger a frame detachment. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.6.z:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
RHSA-2013:0758 | Red Hat Security Advisory: java-1.6.0-sun security update | OpenJDK: sun.awt.datatransfer.ClassLoaderObjectInputStream class may incorrectly invoke the system class loader (CanSecWest 2013, AWT, 8009305) JDK: unspecified sanbox bypass (CanSecWest 2013, 2D) OpenJDK: JAXP missing security restrictions (JAXP, 6657673) OpenJDK: remote code loading enabled by default (RMI, 8001040) JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment) OpenJDK: LogStream.setDefaultStream() missing security restrictions (RMI, 8001329) OpenJDK: java.beans.ThreadGroupContext missing restrictions (Beans, 7200507) JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Install) ICU: Layout Engine font layout and glyph table errors (JDK 2D, 8004994) ICU: Layout Engine font layout and glyph table errors (JDK 2D, 8004986) ICU: Layout Engine font layout and glyph table errors (JDK 2D, 8004987) JDK: unspecified vulnerability fixed in 7u21 and 6u45 (2D) OpenJDK: Network InetAddress serialization information disclosure (Networking, 8000724) JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment) ICU: Layout Engine font processing errors (JDK 2D, 8001031) OpenJDK: image processing vulnerability (2D, 8007617) OpenJDK: MethodUtil trampoline class incorrect restrictions (Libraries, 8009857) OpenJDK: MBeanInstantiator insufficient class access checks (JMX, 8006435) OpenJDK: JPEGImageWriter state corruption (ImageIO, 8007918) OpenJDK: JPEGImageReader state corruption (ImageIO, 8007667) JDK: unspecified vulnerability fixed in 7u21 and 6u45 (2D) JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment) JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment) JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Install) JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment) | [
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
GHSA-wfff-769x-fr8w | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in NotFound Menus Plus+ allows SQL Injection. This issue affects Menus Plus+: from n/a through 1.9.6. | [] | null | 8.5 | null | null |
|
GHSA-54pv-jxwv-8cvv | A SQL injection vulnerability in the height and width parameter in NdkAdvancedCustomizationFields v3.5.0 allows unauthenticated attackers to exfiltrate database data. | [] | null | 7.5 | null | null |
|
GHSA-h3cv-3fjg-8h4x | The Gallery Metabox for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the gallery_remove function in versions up to, and including, 1.5. This makes it possible for subscriber-level attackers to modify galleries attached to posts and pages with this plugin. | [] | null | 4.3 | null | null |
|
CVE-2024-37553 | WordPress Testimonials Widget plugin <= 4.0.4 - Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Axelerant Testimonials Widget allows Stored XSS.This issue affects Testimonials Widget: from n/a through 4.0.4. | [
"cpe:2.3:a:axelerant:testimonials_widget:*:*:*:*:*:wordpress:*:*"
] | null | 6.5 | null | null |
CVE-2024-29128 | WordPress POST SMTP Mailer plugin <= 2.8.6 - Reflected Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Post SMTP POST SMTP allows Reflected XSS.This issue affects POST SMTP: from n/a through 2.8.6.
| [] | null | 7.1 | null | null |
CVE-2025-31582 | WordPress Contact Form vCard Generator plugin <= 2.4 - Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Ashish Ajani Contact Form vCard Generator allows Stored XSS. This issue affects Contact Form vCard Generator: from n/a through 2.4. | [] | null | 7.1 | null | null |
GHSA-69pr-78gv-7c6h | Mattermost Improper Validation of Specified Type of Input vulnerability | Mattermost versions 10.1.x <= 10.1.2, 10.0.x <= 10.0.2, 9.11.x <= 9.11.4, 9.5.x <= 9.5.12 fail to properly validate the type of callProps which allows a user to cause a client side (webapp and mobile) DoS to users of particular channels, by sending a specially crafted post. | [] | null | 6.5 | null | null |
GHSA-p8fv-37q7-2pr7 | An open redirect vulnerability exists in the /preauth Servlet in Zimbra Collaboration Suite through 9.0 and 8.8.15. To exploit the vulnerability, an attacker would need to have obtained a valid zimbra auth token or a valid preauth token. Once the token is obtained, an attacker could redirect a user to any URL if url sanitisation is bypassed in incoming requests. NOTE: this is similar, but not identical, to CVE-2021-34807. | [] | null | 6.1 | null | null |
|
GHSA-6m3q-62rm-rrw9 | Stack-based buffer overflow in the ID_X.apl plugin in ACDSee 9.0 Build 108, Pro 8.1 Build 99, and Photo Editor 4.0 Build 195 allows user-assisted remote attackers to execute arbitrary code via a crafted XPM file with a long section string. NOTE: some of these details are obtained from third party information. | [] | null | null | null | null |
|
GHSA-h3vw-j3r5-fjqq | A Code Execution Vulnerability exists in OpenX Ad Server 2.8.10 due to a backdoor in flowplayer-3.1.1.min.js library, which could let a remote malicious user execute arbitrary PHP code | [] | null | 9.8 | null | null |
|
GHSA-f5v8-cx94-qh2x | phpRank 1.8 does not properly check the return codes for MySQL operations when authenticating users, which could allow remote attackers to authenticate using a NULL password when database errors occur or if the database is unavailable. | [] | null | null | null | null |
|
GHSA-xmv9-mx7p-4jr3 | Windows MSHTML Platform Security Feature Bypass Vulnerability | [] | null | 6.5 | null | null |
|
GHSA-vccg-x753-gj7q | Multiple cross-site scripting (XSS) vulnerabilities in Quali CloudShell before 8 allow remote authenticated users to inject arbitrary web script or HTML via the (1) Name or (2) Description parameter to RM/Reservation/ReserveNew; the (3) Description parameter to RM/Topology/Update; the (4) Name, (5) Description, (6) ExecutionBatches[0].Name, (7) ExecutionBatches[0].Description, or (8) Labels parameter to SnQ/JobTemplate/Edit; or (9) Alias or (10) Description parameter to RM/AbstractTemplate/AddOrUpdateAbstractTemplate. | [] | null | null | 5.4 | null |
|
GHSA-9ffq-j2xg-26w9 | In Intland codeBeamer ALM 9.5 and earlier, there is stored XSS via the Trackers Title parameter. | [] | null | 4.8 | null | null |
|
CVE-2011-4578 | event.c in acpid (aka acpid2) before 2.0.11 does not have an appropriate umask setting during execution of event-handler scripts, which might allow local users to (1) perform write operations within directories created by a script, or (2) read files created by a script, via standard filesystem system calls. | [
"cpe:2.3:a:tedfelix:acpid2:*:*:*:*:*:*:*:*",
"cpe:2.3:a:tedfelix:acpid2:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tedfelix:acpid2:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tedfelix:acpid2:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:tedfelix:acpid2:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:tedfelix:acpid2:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:tedfelix:acpid2:2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:tedfelix:acpid2:2.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:tedfelix:acpid2:2.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:tedfelix:acpid2:2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:tedfelix:acpid2:2.0.9:*:*:*:*:*:*:*"
] | null | null | null | 4.6 |
|
CVE-2025-42602 | Improper Authentication Vulnerability in Meon KYC solutions | This vulnerability exists in Meon KYC solutions due to improper handling of access and refresh tokens in certain API endpoints of authentication process. A remote attacker could exploit this vulnerability by intercepting and manipulating the responses through API request body leading to unauthorized access of other user accounts. | [] | 8.2 | null | null | null |
CVE-2017-11424 | In PyJWT 1.5.0 and below the `invalid_strings` check in `HMACAlgorithm.prepare_key` does not account for all PEM encoded public keys. Specifically, the PKCS1 PEM encoded format would be allowed because it is prefaced with the string `-----BEGIN RSA PUBLIC KEY-----` which is not accounted for. This enables symmetric/asymmetric key confusion attacks against users using the PKCS1 PEM encoded public keys, which would allow an attacker to craft JWTs from scratch. | [
"cpe:2.3:a:pyjwt_project:pyjwt:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
RHSA-2012:1225 | Red Hat Security Advisory: java-1.7.0-oracle security update | OpenJDK: AWT hardening fixes (AWT, 7163201) OpenJDK: beans ClassFinder insufficient permission checks (beans, 7162476) OpenJDK: beans MethodElementHandler insufficient permission checks (beans, 7194567) OpenJDK: beans insufficient permission checks, Java 7 0day (beans, 7162473) | [
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
GHSA-pp7q-6j3f-74vj | silverstripe/framework has Cross-site Scripting vulnerability in RedirectorPage | RedirectorPage will allow users to specify a non-url malicious script as the redirection path without validation. Users which follow this url may allow this script to execute within their browser. | [] | null | 6.1 | null | null |
GHSA-j3hh-v5j4-grcf | Multiple cross-site scripting (XSS) vulnerabilities in cPanel WebHost Manager (WHM) 3.1.0 allow remote authenticated users to inject arbitrary web script or HTML via the (1) email parameter to (a) scripts2/dochangeemail, the (2) supporturl parameter to (b) cgi/addon_configsupport.cgi, the (3) pkg parameter to (c) scripts/editpkg, the (4) domain parameter to (d) scripts2/domts2 and (e) scripts/editzone, the (5) feature parameter to (g) scripts2/dofeaturemanager, and the (6) ndomain parameter to (h) scripts/park. | [] | null | null | null | null |
|
CVE-2022-1487 | Use after free in Ozone in Google Chrome prior to 101.0.4951.41 allowed a remote attacker to potentially exploit heap corruption via running a Wayland test. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
|
GHSA-79r3-3rmc-6vjr | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WPeka WP AdCenter allows Stored XSS. This issue affects WP AdCenter: from n/a through 2.5.9. | [] | null | 6.5 | null | null |
|
CVE-2023-28277 | Windows DNS Server Information Disclosure Vulnerability | Windows DNS Server Information Disclosure Vulnerability | [
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*"
] | null | 4.9 | null | null |
GHSA-4rmr-hqg4-q666 | Huawei Document Security Management (DSM) with software before V100R002C05SPC661 does not clear the clipboard when closing a secure file, which allows local users to obtain sensitive information by pasting the contents to another file. | [] | null | null | 4 | null |
|
CVE-2024-1906 | The Categorify plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.7.4. This is due to missing or incorrect nonce validation on the categorifyAjaxAddCategory function. This makes it possible for unauthenticated attackers to add categories via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | [
"cpe:2.3:a:frenify:categorify:*:*:*:*:*:wordpress:*:*"
] | null | 4.3 | null | null |
|
GHSA-67j2-frvf-p57m | Certain models of ASUS routers have an arbitrary firmware upload vulnerability. An unauthenticated remote attacker can exploit this vulnerability to execute arbitrary system commands on the device. | [] | null | 9.8 | null | null |
|
GHSA-8jp5-hgp9-g2jh | The issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13.6.8, macOS Sonoma 14.5, macOS Monterey 12.7.6, watchOS 10.5, visionOS 1.3, tvOS 17.5, iOS 17.5 and iPadOS 17.5. An app may be able to execute arbitrary code with kernel privileges. | [] | null | 7.8 | null | null |
|
GHSA-78vc-rw83-8p6r | A flaw was found in the hugetlb_mcopy_atomic_pte function in mm/hugetlb.c in the Linux kernel before 4.13.12. A lack of size check could cause a denial of service (BUG). | [] | null | null | 5.5 | null |
|
ICSA-17-241-02 | Advantech WebAccess | By submitting a specially crafted parameter, it is possible to inject arbitrary SQL statements that could allow an attacker to obtain sensitive information.CVE-2017-12710 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N). Researchers have identified multiple vulnerabilities that allow invalid locations to be referenced for the memory buffer, which may allow an attacker to execute arbitrary code or cause the system to crash.CVE-2017-12708 has been assigned to this vulnerability. A CVSS v3 base score of 6.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L). Researchers have identified multiple vulnerabilities where there is a lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer, which could allow an attacker to execute arbitrary code under the context of the process.CVE-2017-12706 has been assigned to this vulnerability. A CVSS v3 base score of 6.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L). Researchers have identified multiple vulnerabilities where there is a lack of proper validation of the length of user-supplied data prior to copying it to the heap-based buffer, which could allow an attacker to execute arbitrary code under the context of the process.CVE-2017-12704 has been assigned to this vulnerability. A CVSS v3 base score of 6.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L). String format specifiers based on user provided input are not properly validated, which could allow an attacker to execute arbitrary code.CVE-2017-12702 has been assigned to this vulnerability. A CVSS v3 base score of 6.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L). Specially crafted requests allow a possible authentication bypass that could allow remote code execution.CVE-2017-12698 has been assigned to this vulnerability. A CVSS v3 base score of 7.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L). Multiple files and folders with ACLs that affect other users are allowed to be modified by non-administrator accounts.CVE-2017-12713 has been assigned to this vulnerability.A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). A built-in user account has been granted a sensitive privilege that may allow a user to elevate to administrative privileges.CVE-2017-12711 has been assigned to this vulnerability.A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). A maliciously crafted dll file placed earlier in the search path may allow an attacker to execute code within the context of the application.CVE-2017-12717 has been assigned to this vulnerability. A CVSS v3 base score of 4.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L). | [] | null | null | 4.8 | null |
CVE-2020-23054 | A cross-site scripting (XSS) vulnerability in NSK User Agent String Switcher Service v0.3.5 allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the user agent input field. | [
"cpe:2.3:a:user-agent_switcher_and_manager_project:user-agent_switcher_and_manager:0.3.5:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 |
|
CVE-2015-4865 | Unspecified vulnerability in the Oracle Applications Framework component in Oracle E-Business Suite 12.1.3, 12.2.3, and 12.2.4 allows remote authenticated users to affect confidentiality via vectors related to Business Objects - BC4J. | [
"cpe:2.3:a:oracle:e-business_suite:12.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:e-business_suite:12.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:e-business_suite:12.2.4:*:*:*:*:*:*:*"
] | null | null | null | 2.1 |
|
CVE-2018-0898 | The Windows kernel in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and 1709, Windows Server 2016 and Windows Server, version 1709 allows an information disclosure vulnerability due to the way memory addresses are handled, aka "Windows Kernel Information Disclosure Vulnerability". This CVE is unique from CVE-2018-0811, CVE-2018-0813, CVE-2018-0814, CVE-2018-0894, CVE-2018-0895, CVE-2018-0896, CVE-2018-0897, CVE-2018-0899, CVE-2018-0900, CVE-2018-0901 and CVE-2018-0926. | [
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*"
] | null | null | 4.7 | 1.9 |
|
CVE-2024-39787 | Multiple directory traversal vulnerabilities exist in the nas.cgi add_dir() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to permission bypass. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.A directory traversal vulnerability exists within the `disk_part` POST parameter. | [] | null | 9.1 | null | null |
|
GHSA-584j-wcxv-phqw | Unspecified vulnerability in Oracle Solaris 9 allows local users to affect confidentiality and integrity via unknown vectors related to XScreenSaver. | [] | null | null | null | null |
|
GHSA-grvj-w989-52pr | Cross-Site Request Forgery (CSRF) vulnerability in InfoD74 WP Open Street Map plugin <= 1.25 versions. | [] | null | 5.4 | null | null |
|
CVE-2019-11218 | Improper handling of extra parameters in the AccountController (User Profile edit) in Jakub Chodounsky Bonobo Git Server before 6.5.0 allows authenticated users to gain application administrator privileges via additional form parameter submissions. | [
"cpe:2.3:a:bonobogitserver:bonobo_git_server:*:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.5 |
|
GHSA-j5wg-qj63-7qpc | An issue was discovered in libmatio.a in matio (aka MAT File I/O Library) 1.5.13. There is a stack-based buffer over-read in Mat_VarReadNextInfo5() in mat5.c. | [] | null | null | 9.1 | null |
|
GHSA-jpp6-jhf5-8fqg | WebKit before r53525, as used in Google Chrome before 4.0.249.89, allows remote attackers to execute arbitrary code in the Chrome sandbox via a malformed RUBY element, as demonstrated by a <ruby>><table><rt> sequence. | [] | null | null | null | null |
|
GHSA-4cwh-h77q-9rqx | The scheduler in HTCondor before 8.2.6 allows remote authenticated users to execute arbitrary code. | [] | null | null | null | null |
|
GHSA-vgg6-7477-g5qv | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in metaphorcreations Metaphor Widgets allows Stored XSS. This issue affects Metaphor Widgets: from n/a through 2.4. | [] | null | 6.5 | null | null |
|
CVE-2018-16658 | An issue was discovered in the Linux kernel before 4.18.6. An information leak in cdrom_ioctl_drive_status in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] | null | null | 6.1 | 3.6 |
|
CVE-2007-1099 | dbclient in Dropbear SSH client before 0.49 does not sufficiently warn the user when it detects a hostkey mismatch, which might allow remote attackers to conduct man-in-the-middle attacks. | [
"cpe:2.3:a:dropbear_ssh_project:dropbear_ssh:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-w67j-pm6m-f39v | Multiple cross-site scripting (XSS) vulnerabilities in index.php in TomatoCMS before 2.0.5 allow remote authenticated users, with "Add new article" privileges, to inject arbitrary web script or HTML via the (1) title, (2) subTitle, and (3) author parameters in conjunction with a /admin/news/article/add PATH_INFO. | [] | null | null | null | null |
|
GHSA-r5q6-3ggj-5g3c | In JetBrains YouTrack before 2024.3.52635 potential ReDoS was possible due to vulnerable RegExp in Ruby syntax detector | [] | null | 4.3 | null | null |
|
GHSA-hgxx-42w2-h2hx | The camera driver of MTK platform in Huawei smart phones with software of versions earlier than Nice-AL00C00B155 has a buffer overflow vulnerability.Due to the insufficient input verification, an attacker tricks a user into installing a malicious application which has special privilege and sends a specific parameter to the driver of the smart phone, causing privilege escalation. | [] | null | null | 7.8 | null |
|
CVE-2017-9192 | libautotrace.a in AutoTrace 0.31.1 has a heap-based buffer overflow in the ReadImage function in input-tga.c:528:7. | [
"cpe:2.3:a:autotrace_project:autotrace:0.31.1:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 |
|
CVE-2011-1375 | IBM AIX 6.1 and 7.1 does not restrict the wpar_limits_config and wpar_limits_modify system calls, which allows local users to cause a denial of service (system crash) via a crafted call. | [
"cpe:2.3:o:ibm:aix:6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:7.1:*:*:*:*:*:*:*"
] | null | null | null | 4.9 |
|
RHSA-2023:2202 | Red Hat Security Advisory: frr security, bug fix, and enhancement update | frr: out-of-bounds read in the BGP daemon may lead to information disclosure or denial of service | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.1 | null | null |
CVE-2018-13745 | The mintToken function of a smart contract implementation for STCToken, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value. | [
"cpe:2.3:a:stctoken_project:stctoken:-:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
GHSA-5r8r-2h6m-393g | Elastic X-Pack Security versions prior to 5.4.1 and 5.3.3 did not always correctly apply Document Level Security to index aliases. This bug could allow a user with restricted permissions to view data they should not have access to when performing certain operations against an index alias. | [] | null | null | 4.3 | null |
|
CVE-2014-6299 | Cross-site request forgery (CSRF) vulnerability in the mm_forum extension before 1.9.3 for TYPO3 allows remote attackers to hijack the authentication of users for requests that create posts via unspecified vectors. | [
"cpe:2.3:a:mm_forum_project:mm_forum:*:*:*:*:*:typo3:*:*",
"cpe:2.3:a:mm_forum_project:mm_forum:0.1.0:*:*:*:*:typo3:*:*",
"cpe:2.3:a:mm_forum_project:mm_forum:0.1.1:*:*:*:*:typo3:*:*",
"cpe:2.3:a:mm_forum_project:mm_forum:0.1.2:*:*:*:*:typo3:*:*",
"cpe:2.3:a:mm_forum_project:mm_forum:0.1.3:*:*:*:*:typo3:*:*",
"cpe:2.3:a:mm_forum_project:mm_forum:0.1.4:*:*:*:*:typo3:*:*",
"cpe:2.3:a:mm_forum_project:mm_forum:0.1.5:*:*:*:*:typo3:*:*",
"cpe:2.3:a:mm_forum_project:mm_forum:0.1.6:*:*:*:*:typo3:*:*",
"cpe:2.3:a:mm_forum_project:mm_forum:0.1.7:*:*:*:*:typo3:*:*",
"cpe:2.3:a:mm_forum_project:mm_forum:0.1.8:*:*:*:*:typo3:*:*",
"cpe:2.3:a:mm_forum_project:mm_forum:1.8.1:*:*:*:*:typo3:*:*",
"cpe:2.3:a:mm_forum_project:mm_forum:1.8.2:*:*:*:*:typo3:*:*",
"cpe:2.3:a:mm_forum_project:mm_forum:1.8.3:*:*:*:*:typo3:*:*",
"cpe:2.3:a:mm_forum_project:mm_forum:1.9.0:*:*:*:*:typo3:*:*",
"cpe:2.3:a:mm_forum_project:mm_forum:1.9.1:*:*:*:*:typo3:*:*"
] | null | null | null | 6.8 |
|
GHSA-9cqc-m6m2-286c | A persistent cross-site scripting vulnerability in Sourcecodester Stock Management System v1.0 allows remote attackers to inject arbitrary web script or HTML via the 'Brand Name.' | [] | null | 6.1 | null | null |
|
GHSA-87gx-4gw3-wvr8 | Use after free in navigation in Google Chrome prior to 90.0.4430.85 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. | [] | null | null | null | null |
|
GHSA-2f5p-xhq6-2f67 | Vulnerability in the Oracle Retail Xstore Office product of Oracle Retail Applications (component: Security). Supported versions that are affected are 19.0.5, 20.0.3, 20.0.4, 22.0.0 and 23.0.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Retail Xstore Office. While the vulnerability is in Oracle Retail Xstore Office, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Retail Xstore Office accessible data. CVSS 3.1 Base Score 8.6 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N). | [] | null | 8.6 | null | null |
|
CVE-2023-51327 | A lack of rate limiting in the 'Forgot Password' feature of PHPJabbers Cleaning Business Software v1.0 allows attackers to send an excessive amount of email for a legitimate user, leading to a possible Denial of Service (DoS) via a large amount of generated e-mail messages. | [] | null | 6.5 | null | null |
|
GHSA-9c6m-f2gj-fh4v | The AutoUpdate process in IBM Security QRadar SIEM 7.2 MR1 and earlier does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers via a crafted certificate. | [] | null | null | null | null |
|
CVE-2023-50186 | GStreamer AV1 Video Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability | GStreamer AV1 Video Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GStreamer. Interaction with this library is required to exploit this vulnerability but attack vectors may vary depending on the implementation.
The specific flaw exists within the parsing of metadata within AV1 encoded video files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-22300. | [
"cpe:2.3:a:gstreamer_project:gstreamer:*:*:*:*:*:*:*:*"
] | null | null | 7.5 | null |
GHSA-p3j2-h76v-9w9x | In getAllConfigFlags of SettingsProvider.cpp, there is a possible illegal read due to a missing permission check. This could lead to local information disclosure of config flags with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-143299398 | [] | null | null | null | null |
|
CVE-2022-28132 | The T-Soft E-Commerce 4 web application is susceptible to SQL injection (SQLi) attacks when authenticated as an admin or privileged user. This vulnerability allows attackers to access and manipulate the database through crafted requests. By exploiting this flaw, attackers can bypass authentication mechanisms, view sensitive information stored in the database, and potentially exfiltrate data. | [
"cpe:2.3:a:t-soft:e-commerce:*:*:*:*:*:*:*:*"
] | null | 7.2 | null | null |
|
RHSA-2023:4888 | Red Hat Security Advisory: kpatch-patch security update | kernel: use-after-free in l2cap_connect and l2cap_le_connect_req in net/bluetooth/l2cap_core.c kernel: Use-after-free vulnerability in the Linux Kernel traffic control index filter kernel: UAF in nftables when nft_set_lookup_global triggered after handling named and anonymous sets in batch requests kernel: cls_flower: out-of-bounds write in fl_set_geneve_opt() | [
"cpe:/o:redhat:rhel_eus:8.6::baseos"
] | null | 7.8 | null | null |
CVE-2023-0092 | An authenticated user who has read access to the juju controller model, may construct a remote request to download an arbitrary file from the controller's filesystem. | [] | null | 4.9 | null | null |
|
GHSA-5m75-xc7x-rg6m | A flaw was found in the OpenShift web console, where the access token is stored in the browser's local storage. An attacker can use this flaw to get the access token via physical access, or an XSS attack on the victim's browser. This flaw affects openshift/console versions before openshift/console-4. | [] | null | 6.1 | null | null |
|
GHSA-89vx-8j4r-pm86 | In the Linux kernel, the following vulnerability has been resolved:remoteproc: mtk_scp: Fix a potential double free'scp->rproc' is allocated using devm_rproc_alloc(), so there is no need
to free it explicitly in the remove function. | [] | null | 7.8 | null | null |
|
GHSA-cr8j-22q7-88hm | In vcu, there is a possible memory corruption due to type confusion. This could lead to local denial of service with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07519103; Issue ID: ALPS07519121. | [] | null | 4.4 | null | null |
|
GHSA-776p-36w8-q8ww | A Server Side Request Forgery (SSRF) vulnerability in go-camo up to version 1.1.4 allows a remote attacker to perform HTTP requests to internal endpoints. | [] | null | null | 9.8 | null |
|
GHSA-68pg-g9hg-f6c6 | TOTOlink A7100RU V7.4cu.2313_B20191024 was discovered to contain a command injection vulnerability via the pppoeAcName parameter at /setting/setWanIeCfg. | [] | null | 9.8 | null | null |
|
GHSA-6vcf-779f-fqxh | Cross Site Scripting (XSS) exists in NCH Axon PBX v2.22 and earlier via /ipblacklist?errorip= (reflected). | [] | null | null | null | null |
|
CVE-2024-10008 | Masteriyo LMS – eLearning and Online Course Builder for WordPress <= 1.13.3 - Authenticated (Student+) Missing Authorization to Privilege Escalation | The Masteriyo LMS – eLearning and Online Course Builder for WordPress plugin for WordPress is vulnerable to unauthorized user profile modification due to missing authorization checks on the /wp-json/masteriyo/v1/users/$id REST API endpoint in all versions up to, and including, 1.13.3. This makes it possible for authenticated attackers, with student-level access and above, to modify the roles of arbitrary users. As a result, attackers can escalate their privileges to the Administrator and demote existing administrators to students. | [
"cpe:2.3:a:masteriyo:masteriyo:*:*:*:*:*:wordpress:*:*"
] | null | 8.8 | null | null |
CVE-2018-19993 | A reflected cross-site scripting (XSS) vulnerability in Dolibarr 8.0.2 allows remote attackers to inject arbitrary web script or HTML via the transphrase parameter to public/notice.php. | [
"cpe:2.3:a:dolibarr:dolibarr_erp\\/crm:8.0.2:*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 |
|
GHSA-m6h2-634h-jcpj | Designate mDNS DoS through incorrect handling of large RecordSets | Designate 2015.1.0 through 1.0.0.0b1 as packaged in OpenStack Kilo does not enforce RecordSets per domain, and Records per RecordSet quotas when processing an internal zone file transfer, which might allow remote attackers to cause a denial of service (infinite loop) via a crafted resource record set. | [] | 7.1 | null | 6.5 | null |
GHSA-2xgp-3983-29gm | FileMaker Pro 5 Web Companion allows remote attackers to send anonymous or forged email. | [] | null | null | null | null |
|
RHSA-2008:0537 | Red Hat Security Advisory: openoffice.org security update | OpenOffice.org overflow possible on allocation | [
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation"
] | null | null | null | null |
GHSA-wp3v-g7wr-j8jh | In CyberArk Endpoint Privilege Manager (formerly Viewfinity) 10.2.1.603, there is persistent XSS via an account name on the create token screen, the VfManager.asmx SelectAccounts->DisplayName screen, a user's groups in ConfigurationPage, the Dialog Title field, and App Group Name in the Application Group Wizard. | [] | null | null | 5.4 | null |
|
RHSA-2020:0132 | Red Hat Security Advisory: Red Hat Process Automation Manager 7.6.0 Security Update | bootstrap: XSS in the data-target attribute bootstrap: XSS in the tooltip data-viewport attribute bootstrap: XSS in the affix configuration target property Business-central: Encrypted password shown under Object id 7 of errai_security_context | [
"cpe:/a:redhat:jboss_enterprise_bpms_platform:7.6"
] | null | null | 4.6 | null |
GHSA-3pqp-qx7r-vppf | MajorDoMo (aka Major Domestic Module) before 0662e5e allows command execution via thumb.php shell metacharacters. NOTE: this is unrelated to the Majordomo mailing-list manager. | [] | null | 9.8 | null | null |
|
GHSA-qcc7-grh2-48hx | In the Linux kernel, the following vulnerability has been resolved:btrfs: fix removed dentries still existing after log is syncedWhen we move one inode from one directory to another and both the inode
and its previous parent directory were logged before, we are not supposed
to have the dentry for the old parent if we have a power failure after the
log is synced. Only the new dentry is supposed to exist.Generally this works correctly, however there is a scenario where this is
not currently working, because the old parent of the file/directory that
was moved is not authoritative for a range that includes the dir index and
dir item keys of the old dentry. This case is better explained with the
following example and reproducer:The test requires a very specific layout of keys and items in thefs/subvolume btree to trigger the bug. So we want to make sure thaton whatever platform we are, we have the same leaf/node size.Currently in btrfs the node/leaf size can not be smaller than the pagesize (but it can be greater than the page size). So use the largestsupported node/leaf size (64K).$ mkfs.btrfs -f -n 65536 /dev/sdc
$ mount /dev/sdc /mnt"testdir" is inode 257.$ mkdir /mnt/testdir
$ chmod 755 /mnt/testdirCreate several empty files to have the directory "testdir" with itsitems spread over several leaves (7 in this case).$ for ((i = 1; i <= 1200; i++)); do
echo -n > /mnt/testdir/file$i
doneCreate our test directory "dira", inode number 1458, which gets allits items in leaf 7.The BTRFS_DIR_ITEM_KEY item for inode 257 ("testdir") that points tothe entry named "dira" is in leaf 2, while the BTRFS_DIR_INDEX_KEYitem that points to that entry is in leaf 3.For this particular filesystem node size (64K), file count and filenames, we endup with the directory entry items from inode 257 inleaves 2 and 3, as previously mentioned - what matters for triggeringthe bug exercised by this test case is that those items are not placedin leaf 1, they must be placed in a leaf different from the onecontaining the inode item for inode 257.The corresponding BTRFS_DIR_ITEM_KEY and BTRFS_DIR_INDEX_KEY items forthe parent inode (257) are the following:item 460 key (257 DIR_ITEM 3724298081) itemoff 48344 itemsize 34location key (1458 INODE_ITEM 0) type DIRtransid 6 data_len 0 name_len 4name: diraand:item 771 key (257 DIR_INDEX 1202) itemoff 36673 itemsize 34location key (1458 INODE_ITEM 0) type DIRtransid 6 data_len 0 name_len 4name: dira$ mkdir /mnt/testdir/diraMake sure everything done so far is durably persisted.$ syncNow do a change to inode 257 ("testdir") that does not result inCOWing leaves 2 and 3 - the leaves that contain the directory itemspointing to inode 1458 (directory "dira").Changing permissions, the owner/group, updating or adding a xattr,etc, will not change (COW) leaves 2 and 3. So for the sake ofsimplicity change the permissions of inode 257, which results inupdating its inode item and therefore change (COW) only leaf 1.$ chmod 700 /mnt/testdirNow fsync directory inode 257.Since only the first leaf was changed/COWed, we log the inode item ofinode 257 and only the dentries found in the first leaf, all have akey type of BTRFS_DIR_ITEM_KEY, and no keys of typeBTRFS_DIR_INDEX_KEY, because they sort after the former type and noneexist in the first leaf.We also log 3 items that represent ranges for dir items and dirindexes for which the log is authoritative:1) a key of type BTRFS_DIR_LOG_ITEM_KEY, which indicates the log isauthoritative for all BTRFS_DIR_ITEM_KEY keys that have an offsetin the range [0, 2285968570] (the offset here is th---truncated--- | [] | null | 5.5 | null | null |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.