id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
GHSA-mphf-mf2v-25ff | IBM UrbanCode Deploy (UCD) 6.2.7.15, 7.0.5.10, 7.1.2.6, and 7.2.2.1 stores user credentials in plain clear text which can be read by a local user. IBM X-Force ID: 22106. | []
| null | 4.4 | null | null |
|
GHSA-4xf9-4r44-86rc | ImpressPages CMS RCE | ImpressPages CMS v1.0.12 has Unspecified Remote Code Execution (fixed in v1.0.13) | []
| null | 9.8 | null | null |
CVE-2020-10177 | Pillow before 7.1.0 has multiple out-of-bounds reads in libImaging/FliDecode.c. | [
"cpe:2.3:a:python:pillow:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*"
]
| null | 5.5 | null | 4.3 |
|
GHSA-8g6p-5f49-wrw9 | IBM QRadar SIEM 7.3.0 to 7.3.3 Patch 8 and 7.4.0 to 7.4.3 GA uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 194448. | []
| null | 7.5 | null | null |
|
RHSA-2024:10803 | Red Hat Security Advisory: bzip2 security update | bzip2: bzip2: Data integrity error when decompressing (with data integrity tests fail). | [
"cpe:/a:redhat:rhel_eus:9.4::appstream",
"cpe:/o:redhat:rhel_eus:9.4::baseos"
]
| null | 4.4 | null | null |
CVE-2001-1323 | Buffer overflow in MIT Kerberos 5 (krb5) 1.2.2 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code via base-64 encoded data, which is not properly handled when the radix_encode function processes file glob output from the ftpglob function. | [
"cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
CVE-2016-4806 | Web2py versions 2.14.5 and below was affected by Local File Inclusion vulnerability, which allows a malicious intended user to read/access web server sensitive files. | [
"cpe:2.3:a:web2py:web2py:*:*:*:*:*:*:*:*"
]
| null | null | 7.5 | 5 |
|
GHSA-33v3-g49w-9c79 | Adobe Experience Manager versions 6.5.22 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | []
| null | 5.4 | null | null |
|
GHSA-v889-jqhm-9wff | SAP NetWeaver Application Server for ABAP and ABAP Platform - versions 700, 701, 702, 731, 740, 750, 751, 752, 753, 754, 755, 756, 757, 791, has multiple vulnerabilities in a class for test purposes in which an attacker authenticated as a non-administrative user can craft a request with certain parameters, which will consume the server's resources sufficiently to make it unavailable. There is no ability to view or modify any information. | []
| null | 6.5 | null | null |
|
GHSA-8gvv-wqgx-pmc5 | A vulnerability, which was classified as problematic, was found in EyouCMS up to 1.5.4. This affects an unknown part of the file login.php. The manipulation of the argument tag_tag leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-224751. | []
| null | 5.4 | null | null |
|
GHSA-gm92-2372-834c | A vulnerability in the HTTP traffic server component of Cisco Expressway could allow an unauthenticated, remote attacker to initiate TCP connections to arbitrary hosts. This does not allow for full traffic proxy through the Expressway. Affected Products: This vulnerability affects Cisco Expressway Series Software and Cisco TelePresence Video Communication Server (VCS). More Information: CSCvc10834. Known Affected Releases: X8.7.2 X8.8.3. Known Fixed Releases: X8.9. | []
| null | null | 6.5 | null |
|
CVE-2015-9408 | The xpinner-lite plugin through 2.2 for WordPress has wp-admin/options-general.php CSRF with resultant XSS. | [
"cpe:2.3:a:cyberseo:xpinner_lite:*:*:*:*:*:wordpress:*:*"
]
| null | 6.5 | null | 4.3 |
|
GHSA-p2jr-rvqv-mrgw | Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2014-1769, CVE-2014-1782, CVE-2014-1785, CVE-2014-2755, CVE-2014-2760, CVE-2014-2761, CVE-2014-2772, and CVE-2014-2776. | []
| null | null | null | null |
|
GHSA-74cw-gq4c-qfqj | SQL injection vulnerability in calendar.php in MyBB (aka MyBulletinBoard) 1.2.5 and earlier allows remote attackers to execute arbitrary SQL commands via the day parameter in a dayview action. | []
| null | null | null | null |
|
CVE-2014-9173 | SQL injection vulnerability in view.php in the Google Doc Embedder plugin before 2.5.15 for WordPress allows remote attackers to execute arbitrary SQL commands via the gpid parameter. | [
"cpe:2.3:a:google_doc_embedder_project:google_doc_embedder:*:*:*:*:*:wordpress:*:*"
]
| null | null | null | 7.5 |
|
GHSA-vjgw-3ffm-c33h | An issue in Beijing Digital China Yunke Information Technology Co.Ltd v.7.2.6.120 allows a remote attacker to execute arbitrary code via the code/function/dpi/web_auth/customizable.php file | []
| null | 8.8 | null | null |
|
CVE-2015-8264 | Untrusted search path vulnerability in F-Secure Online Scanner allows remote attackers to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse DLL that is located in the same folder as F-SecureOnlineScanner.exe. | [
"cpe:2.3:a:f-secure:f-secure_online_scanner:-:*:*:*:*:*:*:*"
]
| null | null | 7.8 | 6.8 |
|
CVE-2025-29456 | An issue in personal-management-system Personal Management System 1.4.65 allows a remote attacker to obtain sensitive information via the create Notes function. | []
| null | 6.5 | null | null |
|
CVE-2015-0794 | modules.d/90crypt/module-setup.sh in the dracut package before 037-17.30.1 in openSUSE 13.2 allows local users to have unspecified impact via a symlink attack on /tmp/dracut_block_uuid.map. | [
"cpe:2.3:a:dracut_project:dracut:*:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*"
]
| null | null | null | 3.6 |
|
GHSA-wrg7-24rr-rgcq | A logic issue was addressed with improved state management. This issue is fixed in macOS Big Sur 11.4, Security Update 2021-003 Catalina, Security Update 2021-004 Mojave. A malicious application may bypass Gatekeeper checks. | []
| null | null | null | null |
|
CVE-2013-6787 | SQL injection vulnerability in the check_user_password function in main/auth/profile.php in Chamilo LMS 1.9.6 and earlier, when using the non-encrypted passwords mode set at installation, allows remote authenticated users to execute arbitrary SQL commands via the "password0" parameter. | [
"cpe:2.3:a:chamilo:chamilo_lms:*:*:*:*:*:*:*:*",
"cpe:2.3:a:chamilo:chamilo_lms:1.8.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:chamilo:chamilo_lms:1.8.7:*:*:*:*:*:*:*",
"cpe:2.3:a:chamilo:chamilo_lms:1.8.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:chamilo:chamilo_lms:1.8.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:chamilo:chamilo_lms:1.8.8.4:*:*:*:*:*:*:*",
"cpe:2.3:a:chamilo:chamilo_lms:1.8.8.6:*:*:*:*:*:*:*",
"cpe:2.3:a:chamilo:chamilo_lms:1.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:chamilo:chamilo_lms:1.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:chamilo:chamilo_lms:1.9.4:*:*:*:*:*:*:*"
]
| null | null | null | 6 |
|
GHSA-p728-xw8r-5f6m | VMware vRealize Log Insight (8.x prior to 8.6) contains a CSV(Comma Separated Value) injection vulnerability in interactive analytics export function. An authenticated malicious actor with non-administrative privileges may be able to embed untrusted data prior to exporting a CSV sheet through Log Insight which could be executed in user's environment. | []
| null | null | null | null |
|
GHSA-v846-wcv6-j9fr | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Webriderz Wr Age Verification allows SQL Injection.This issue affects Wr Age Verification: from n/a through 2.0.0. | []
| null | 9.3 | null | null |
|
GHSA-h6pv-hpfp-q558 | An issue was discovered in Exynos Mobile Processor, Automotive Processor and Modem for Exynos Modem 5123, Exynos Modem 5300, Exynos 980, Exynos 1080, Exynos 9110, and Exynos Auto T5123. Memory corruption can occur due to insufficient parameter validation while decoding an SIP Min-SE header. | []
| null | 6.8 | null | null |
|
GHSA-c356-hw8h-3hhp | The Common Controls Replacement Project (CCRP) FolderTreeview (FTV) ActiveX control (ccrpftv6.ocx) allows remote attackers to cause a denial of service (Internet Explorer 7 crash) via a long CCRP.RootFolder property value. | []
| null | null | null | null |
|
GHSA-qqrg-2fcm-mwrq | Cross-site scripting vulnerability in LuxCal Web Calendar prior to 5.2.3M (MySQL version) and LuxCal Web Calendar prior to 5.2.3L (SQLite version) allows a remote unauthenticated attacker to execute an arbitrary script on the web browser of the user who is using the product. | []
| null | 6.1 | null | null |
|
CVE-2017-2533 | An issue was discovered in certain Apple products. macOS before 10.12.5 is affected. The issue involves the "DiskArbitration" component. A race condition allows attackers to execute arbitrary code in a privileged context via a crafted app. | [
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
]
| null | null | 7 | 7.6 |
|
GHSA-fh9j-4vj3-cpc4 | PHP remote file inclusion vulnerability in funzioni/lib/show_hlp.php in klinza professional cms 5.0.1 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the appl[APPL] parameter. | []
| null | null | null | null |
|
GHSA-2p45-c9hc-p9hf | Cross-site scripting (XSS) vulnerability in the Hierarchical Select module 5.x before 5.x-3.2 and 6.x before 6.x-3.2 for Drupal allows remote authenticated users, with administer taxonomy permissions, to inject arbitrary web script or HTML via unspecified vectors in the hierarchical_select form. | []
| null | null | null | null |
|
CVE-2023-26522 | WordPress WP Repost plugin <= 0.1 - Broken Access Control vulnerability | Missing Authorization vulnerability in OneWebsite WP Repost allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP Repost: from n/a through 0.1. | [
"cpe:2.3:a:onewebsite:wp_repost:*:*:*:*:*:wordpress:*:*"
]
| null | 6.5 | null | null |
cisco-sa-20191002-asa-dos | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software FTP Inspection Denial of Service Vulnerability | A vulnerability in the FTP inspection engine of Cisco Adaptive Security (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.
The vulnerability is due to insufficient validation of FTP data. An attacker could exploit this vulnerability by sending malicious FTP traffic through an affected device. A successful exploit could allow the attacker to cause a DoS condition on the affected device.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is part of the October 2019 Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication, which includes 10 Cisco Security Advisories that describe 18 vulnerabilities. For a complete list of the advisories and links to them, see Cisco Event Response: October 2019 Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication ["https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-72541"]. | []
| null | null | 8.6 | null |
GHSA-6m48-jxwx-76q7 | Improper Authentication in Apache Tomcat | java/org/apache/catalina/authenticator/FormAuthenticator.java in the form authentication feature in Apache Tomcat 6.0.21 through 6.0.36 and 7.x before 7.0.33 does not properly handle the relationships between authentication requirements and sessions, which allows remote attackers to inject a request into a session by sending this request during completion of the login form, a variant of a session fixation attack. | []
| null | null | null | null |
CVE-2024-12930 | code-projects Simple Admin Panel addCatController.php cross site scripting | A vulnerability was found in code-projects Simple Admin Panel 1.0 and classified as problematic. This issue affects some unknown processing of the file addCatController.php. The manipulation of the argument c_name leads to cross site scripting. The attack may be initiated remotely. | []
| 5.3 | 3.5 | 3.5 | 4 |
CVE-2021-38328 | Notices <= 6.1 Reflected Cross-Site Scripting | The Notices WordPress plugin is vulnerable to Reflected Cross-Site Scripting due to a reflected $_SERVER["PHP_SELF"] value in the ~/notices.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 6.1. | [
"cpe:2.3:a:notices_project:notices:*:*:*:*:*:wordpress:*:*"
]
| null | 6.1 | null | null |
CVE-2018-9186 | A cross-site scripting (XSS) vulnerability in Fortinet FortiAuthenticator in versions 4.0.0 to before 5.3.0 "CSRF validation failure" page allows attacker to execute unauthorized script code via inject malicious scripts in HTTP referer header. | [
"cpe:2.3:a:fortinet:fortiauthenticator:*:*:*:*:*:*:*:*"
]
| null | null | 6.1 | 4.3 |
|
CVE-2019-2543 | Vulnerability in the Oracle Solaris component of Oracle Sun Systems Products Suite (subcomponent: Kernel). Supported versions that are affected are 10 and 11. Easily exploitable vulnerability allows unauthenticated attacker with network access via KSSL to compromise Oracle Solaris. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Solaris accessible data. CVSS 3.0 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N). | [
"cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:solaris:11:*:*:*:*:*:*:*"
]
| null | null | 5.3 | 5 |
|
GHSA-wxff-hq7w-p8h7 | Java Web Start in Sun JDK and JRE 6 Update 2 and earlier does not properly enforce access restrictions for untrusted applications, which allows user-assisted remote attackers to read and modify local files via an untrusted application, aka "two vulnerabilities." | []
| null | null | null | null |
|
RHSA-2024:4716 | Red Hat Security Advisory: openssh security update | openssh: Possible remote code execution due to a race condition in signal handling affecting Red Hat Enterprise Linux 9 | [
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/o:redhat:rhel_eus:9.2::baseos"
]
| null | 7 | null | null |
CVE-2024-41243 | An Incorrect Access Control vulnerability was found in /smsa/view_marks.php in Kashipara Responsive School Management System v3.2.0, which allows remote unauthenticated attackers to view MARKS details. | [
"cpe:2.3:a:lopalopa:responsive_school_management_system:3.2.0:*:*:*:*:*:*:*"
]
| null | 5.3 | null | null |
|
CVE-2016-10954 | The Neosense theme before 1.8 for WordPress has qquploader unrestricted file upload. | [
"cpe:2.3:a:dynamicpress:neosense:*:*:*:*:*:wordpress:*:*"
]
| null | 9.8 | null | 7.5 |
|
CVE-2019-6488 | The string component in the GNU C Library (aka glibc or libc6) through 2.28, when running on the x32 architecture, incorrectly attempts to use a 64-bit register for size_t in assembly codes, which can lead to a segmentation fault or possibly unspecified other impact, as demonstrated by a crash in __memmove_avx_unaligned_erms in sysdeps/x86_64/multiarch/memmove-vec-unaligned-erms.S during a memcpy. | [
"cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*"
]
| null | null | 7.8 | 4.6 |
|
GHSA-vpg6-87c4-44h8 | This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley MicroStation CONNECT 10.16.0.80. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of PDF files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-15463. | []
| null | null | null | null |
|
CVE-2021-34797 | Apache Geode project log file redaction of sensitive information vulnerability | Apache Geode versions up to 1.12.4 and 1.13.4 are vulnerable to a log file redaction of sensitive information flaw when using values that begin with characters other than letters or numbers for passwords and security properties with the prefix "sysprop-", "javax.net.ssl", or "security-". This issue is fixed by overhauling the log file redaction in Apache Geode versions 1.12.5, 1.13.5, and 1.14.0. | [
"cpe:2.3:a:apache:geode:*:*:*:*:*:*:*:*"
]
| null | 7.5 | null | 5 |
CVE-2009-2226 | Cross-site scripting (XSS) vulnerability in Let's PHP! Tree BBS 2004/11/23 and earlier allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | [
"cpe:2.3:a:php.s3:tree_bbs:*:*:*:*:*:*:*:*"
]
| null | null | null | 4.3 |
|
GHSA-7hq3-96jv-7mpf | In cp_dump driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with System execution privileges needed. | []
| null | 4.4 | null | null |
|
CVE-2022-28348 | Arm Mali GPU Kernel Driver (Midgard r4p0 through r31p0, Bifrost r0p0 through r36p0 before r37p0, and Valhall r19p0 through r36p0 before r37p0) allows improper GPU memory operations to reach a use-after-free situation. | [
"cpe:2.3:a:arm:bifrost_gpu_kernel_driver:*:*:*:*:*:*:*:*",
"cpe:2.3:a:arm:midgard_gpu_kernel_driver:*:*:*:*:*:*:*:*",
"cpe:2.3:a:arm:valhall_gpu_kernel_driver:*:*:*:*:*:*:*:*"
]
| null | 9.8 | null | 10 |
|
GHSA-6gx4-29v9-g9q5 | MoinMoin Multiple vulnerable to directory traversal | Multiple directory traversal vulnerabilities in the (1) twikidraw (`action/twikidraw.py`) and (2) anywikidraw (`action/anywikidraw.py`) actions in MoinMoin before 1.9.6 allow remote authenticated users with write permissions to overwrite arbitrary files via unspecified vectors. NOTE: this can be leveraged with CVE-2012-6081 to execute arbitrary code. | []
| 5.3 | 4.3 | null | null |
GHSA-h6g7-m2qw-2j9q | slxweb.dll in SalesLogix 6.1 allows remote attackers to cause a denial service (application crash) via an invalid HTTP request, which might also leak sensitive information in the ErrorLogMsg cookie. | []
| null | null | null | null |
|
CVE-2015-2725 | Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 39.0, Firefox ESR 38.x before 38.1, and Thunderbird before 38.1 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors. | [
"cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:novell:suse_linux_enterprise_server:11:sp4:*:*:*:*:*:*",
"cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:31.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:31.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:31.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:31.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:31.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:31.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:31.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:31.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:31.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:31.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:31.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:31.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*"
]
| null | null | null | 10 |
|
GHSA-2pwx-xq5x-gj68 | Multiple cross-site scripting (XSS) vulnerabilities in Sonatype Nexus Repository Manager (aka NXRM) 3.x before 3.8 allow remote attackers to inject arbitrary web script or HTML via (1) the repoId or (2) format parameter to service/siesta/healthcheck/healthCheckFileDetail/.../index.html; (3) the filename in the "File Upload" functionality of the Staging Upload; (4) the username when creating a new user; or (5) the IQ Server URL field in the IQ Server Connection functionality. | []
| null | null | 6.1 | null |
|
CVE-2021-28649 | An incorrect permission vulnerability in the product installer for Trend Micro HouseCall for Home Networks version 5.3.1179 and below could allow an attacker to escalate privileges by placing arbitrary code on a specified folder and have that code be executed by an Administrator who is running a scan. Please note that an attacker must first obtain the ability to execute low-privileged code on the target system to exploit this vulnerability. | [
"cpe:2.3:a:trendmicro:housecall_for_home_networks:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
]
| null | 7.3 | null | 4.4 |
|
CVE-2016-4192 | Adobe Reader and Acrobat before 11.0.17, Acrobat and Acrobat Reader DC Classic before 15.006.30198, and Acrobat and Acrobat Reader DC Continuous before 15.017.20050 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4191, CVE-2016-4193, CVE-2016-4194, CVE-2016-4195, CVE-2016-4196, CVE-2016-4197, CVE-2016-4198, CVE-2016-4199, CVE-2016-4200, CVE-2016-4201, CVE-2016-4202, CVE-2016-4203, CVE-2016-4204, CVE-2016-4205, CVE-2016-4206, CVE-2016-4207, CVE-2016-4208, CVE-2016-4211, CVE-2016-4212, CVE-2016-4213, CVE-2016-4214, CVE-2016-4250, CVE-2016-4251, CVE-2016-4252, and CVE-2016-4254. | [
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:reader:*:*:*:*:*:*:*:*"
]
| null | null | 9.8 | 10 |
|
CVE-2022-25016 | Home Owners Collection Management System v1.0 was discovered to contain an arbitrary file upload vulnerability via the component /student_attendance/index.php. This vulnerability allows attackers to execute arbitrary code via a crafted PHP file. | [
"cpe:2.3:a:home_owners_collection_management_system_project:home_owners_collection_management_system:1.0:*:*:*:*:*:*:*"
]
| null | 9.8 | null | 7.5 |
|
CVE-2023-31921 | Jerryscript 3.0 (commit 05dbbd1) was discovered to contain an Assertion Failure via the ecma_big_uint_div_mod at jerry-core/ecma/operations/ecma-big-uint.c. | [
"cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*"
]
| null | 5.5 | null | null |
|
CVE-2021-0526 | In memory management driver, there is a possible out of bounds write due to uninitialized data. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android SoCAndroid ID: A-185195264 | [
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
]
| null | 7.8 | null | 4.6 |
|
GHSA-v8w9-2789-6hhr | Deserialization of Untrusted Data in bson | All versions of bson before 1.1.4 are vulnerable to Deserialization of Untrusted Data. The package will ignore an unknown value for an object's _bsontype, leading to cases where an object is serialized as a document rather than the intended BSON type. | []
| null | 9.8 | null | null |
GHSA-prgr-9xf7-v9fw | GNU GRand Unified Bootloader (GRUB) 2 1.97 only compares the submitted portion of a password with the actual password, which makes it easier for physically proximate attackers to conduct brute force attacks and bypass authentication by submitting a password whose length is 1. | []
| null | null | null | null |
|
GHSA-6p6w-jmg5-8cvx | PostgreSQL before 9.1.20, 9.2.x before 9.2.15, 9.3.x before 9.3.11, 9.4.x before 9.4.6, and 9.5.x before 9.5.1 allows remote attackers to cause a denial of service (infinite loop or buffer overflow and crash) via a large Unicode character range in a regular expression. | []
| null | null | 7.5 | null |
|
CVE-2025-1212 | Exposure of Sensitive System Information to an Unauthorized Control Sphere in GitLab | An information disclosure vulnerability in GitLab CE/EE affecting all versions from 8.3 prior to 17.6.5, 17.7 prior to 17.7.4, and 17.8 prior to 17.8.2 allows an attacker to send a crafted request to a backend server to reveal sensitive information. | [
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*"
]
| null | 4.3 | null | null |
RHSA-2013:0609 | Red Hat Security Advisory: qemu-kvm security update | qemu: e1000 driver buffer overflow when processing large packets when SBP and LPE flags are disabled | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
]
| null | null | null | null |
CVE-2024-51595 | WordPress SKSDEV Toolkit plugin <= 1.0.0 - Stored Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in sksdev SKSDEV Toolkit allows Stored XSS.This issue affects SKSDEV Toolkit: from n/a through 1.0.0. | [
"cpe:2.3:a:sksdev:sksdev_toolkit:1.0.0:*:*:*:*:wordpress:*:*"
]
| null | 6.5 | null | null |
CVE-2006-5878 | Cross-site request forgery (CSRF) vulnerability in Edgewall Trac 0.10 and earlier allows remote attackers to perform unauthorized actions as other users via unknown vectors. | [
"cpe:2.3:a:edgewall_software:trac:*:*:*:*:*:*:*:*",
"cpe:2.3:a:edgewall_software:trac:0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:edgewall_software:trac:0.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:edgewall_software:trac:0.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:edgewall_software:trac:0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:edgewall_software:trac:0.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:edgewall_software:trac:0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:edgewall_software:trac:0.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:edgewall_software:trac:0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:edgewall_software:trac:0.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:edgewall_software:trac:0.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:edgewall_software:trac:0.8.3:*:*:*:*:*:*:*",
"cpe:2.3:a:edgewall_software:trac:0.8.4:*:*:*:*:*:*:*",
"cpe:2.3:a:edgewall_software:trac:0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:edgewall_software:trac:0.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:edgewall_software:trac:0.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:edgewall_software:trac:0.9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:edgewall_software:trac:0.9.4:*:*:*:*:*:*:*",
"cpe:2.3:a:edgewall_software:trac:0.9.5:*:*:*:*:*:*:*",
"cpe:2.3:a:edgewall_software:trac:0.9.6:*:*:*:*:*:*:*",
"cpe:2.3:a:edgewall_software:trac:0.9b1:*:*:*:*:*:*:*",
"cpe:2.3:a:edgewall_software:trac:0.9b2:*:*:*:*:*:*:*",
"cpe:2.3:a:edgewall_software:trac:0.50.9:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
GHSA-97pp-8g8q-gxrv | Cross-site scripting (XSS) vulnerability in includes/Sanitizer.php in the variable handler in MediaWiki 1.6.x before r14349 allows remote attackers to inject arbitrary Javascript via unspecified vectors, possibly involving the usage of the | (pipe) character. | []
| null | null | null | null |
|
RHSA-2023:3537 | Red Hat Security Advisory: OpenShift Container Platform 4.13.3 bug fix and security update | golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding containerd: Supplementary groups are not set up properly buildkit: Data disclosure in provenance attestation describing a build | [
"cpe:/a:redhat:openshift:4.13::el8",
"cpe:/a:redhat:openshift:4.13::el9"
]
| null | 6.5 | null | null |
GHSA-x2cf-7hfw-w548 | Symantec Brightmail AntiSpam 6.0 build 1 and 2 allows remote attackers to cause a denial of service (bmserver component termination) via malformed MIME messages. | []
| null | null | null | null |
|
CVE-2019-8756 | Multiple memory corruption issues were addressed with improved input validation. This issue is fixed in macOS Catalina 10.15, iOS 13, iCloud for Windows 7.14, iCloud for Windows 10.7, tvOS 13, macOS Catalina 10.15.1, Security Update 2019-001, and Security Update 2019-006, watchOS 6, iTunes 12.10.1 for Windows. Multiple issues in libxml2. | [
"cpe:2.3:a:apple:icloud:*:*:*:*:*:windows:*:*",
"cpe:2.3:a:apple:itunes:*:*:*:*:*:windows:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
]
| null | 9.8 | null | 7.5 |
|
CVE-2021-35221 | ImportAlert Improper Access Control Tampering Vulnerability | Improper Access Control Tampering Vulnerability using ImportAlert function which can lead to a Remote Code Execution (RCE) from the Alerts Settings page. | [
"cpe:2.3:a:solarwinds:orion_platform:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
]
| null | 6.3 | null | null |
CVE-2024-42850 | An issue in the password change function of Silverpeas v6.4.2 and lower allows for the bypassing of password complexity requirements. | [
"cpe:2.3:a:silverpeas:silverpeas:*:*:*:*:*:*:*:*"
]
| null | 9.8 | null | null |
|
GHSA-53gq-m9jg-f4m3 | An exploitable use-after-free vulnerability exists in the JavaScript engine of Foxit Software's Foxit PDF Reader, version 9.2.0.9297. A specially crafted PDF document can trigger a previously freed object in memory to be reused, resulting in arbitrary code execution. An attacker needs to trick the user to open the malicious file to trigger this vulnerability. If the browser plugin extension is enabled, visiting a malicious site can also trigger the vulnerability. | []
| null | null | 7.8 | null |
|
GHSA-h3vq-5r52-r6hp | Privilege escalation vulnerability in the AMS module
Impact: Successful exploitation of this vulnerability may affect service confidentiality. | []
| null | 7.8 | null | null |
|
GHSA-fx8h-x7h8-p5wp | NETGEAR D7000 devices before 1.0.1.82 are affected by authentication bypass. | []
| null | 9.8 | null | null |
|
GHSA-mc57-hw6g-6hw2 | Ajenti version version 2 contains a Insecure Permissions vulnerability in Plugins download that can result in The download of any plugins as being a normal user. This attack appear to be exploitable via By knowing how the requisition is made, and sending it as a normal user, the server, in response, downloads the plugin. | []
| null | null | 6.5 | null |
|
CVE-2024-7663 | SourceCodester Car Driving School Management System manage_user.php sql injection | A vulnerability was found in SourceCodester Car Driving School Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file manage_user.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. | [
"cpe:2.3:a:sourcecodester:car_driving_school_management_system:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oretnom23:car_driving_school_management_system:1.0:*:*:*:*:*:*:*"
]
| 5.3 | 6.3 | 6.3 | 6.5 |
RHSA-2021:0298 | Red Hat Security Advisory: thunderbird security update | Mozilla: IMAP Response Injection when using STARTTLS Mozilla: HTTPS pages could have been intercepted by a registered service worker when they should not have been Mozilla: Cross-origin information leakage via redirected PDF requests Mozilla: Type confusion when using logical assignment operators in JavaScript switch statements Mozilla: Use-after-poison for incorrectly redeclared JavaScript variables during GC Mozilla: Memory safety bugs fixed in Firefox 85 and Firefox ESR 78.7 | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
]
| null | 8.8 | 6.1 | null |
GHSA-h36c-m3rf-34h9 | Access to Archived Argo Workflows with Fake Token in `client` mode | SummaryWhen using `--auth-mode=client`, Archived Workflows can be retrieved with a fake or spoofed token via the GET Workflow endpoint: `/api/v1/workflows/{namespace}/{name}`When using `--auth-mode=sso`, all Archived Workflows can be retrieved with a valid token via the GET Workflow endpoint: `/api/v1/workflows/{namespace}/{name}`DetailsNo authentication is performed by the Server itself on `client` tokens[^1]. Authentication & authorization is instead delegated to the k8s API server.
However, the [Workflow Archive](https://github.com/argoproj/argo-workflows/blob/52cca7e079a4f6d76db303ac550b1876e51b3865/server/workflowarchive/archived_workflow_server.go) does not interact with k8s, and so any token that [_looks_](https://github.com/argoproj/argo-workflows/blob/52cca7e079a4f6d76db303ac550b1876e51b3865/server/auth/mode.go#L37) [valid](https://github.com/argoproj/argo-workflows/blob/52cca7e079a4f6d76db303ac550b1876e51b3865/server/auth/gatekeeper.go#L185) will be considered authenticated, even if it is not a k8s token or even if the token has no RBAC for Argo. To handle the lack of pass-through k8s authN/authZ, the Workflow Archive specifically does [the equivalent of a `kubectl auth can-i`](https://github.com/argoproj/argo-workflows/blob/52cca7e079a4f6d76db303ac550b1876e51b3865/server/workflowarchive/archived_workflow_server.go#L50) check for respective methods.In #12736 / v3.5.7 and #13021 / v3.5.8, the auth check was accidentally removed on the GET Workflow endpoint's fallback to archived workflows on [these lines](https://github.com/argoproj/argo-workflows/pull/13021/files#diff-a5b255abaceddc9cc20bf6da6ae92c3a5d3605d94366af503ed754c079a1171aL668-R715), allowing archived workflows to be retrieved with a fake token.PoCConfigurationController `ConfigMap`:Server: `--auth-mode=client`ReproductionVisit a completed, archived workflow URL with an invalid authorization token, this results in the workflow being displayed.For example, directly query the API and retrieve the workflow data (where `Bearer thisisatest` is not a valid token):ImpactUsers of the Server with `--auth-mode=client` and with `persistence.archive: true` are vulnerable to having Archived Workflows retrieved with a fake or spoofed token.Users of the Server with `--auth-mode=sso` and with `persistence.archive: true` are vulnerable to users being able to access workflows they could not access before archiving.[^1]: `sso` tokens, on the other hand, are [immediately "authorized"](https://github.com/argoproj/argo-workflows/blob/52cca7e079a4f6d76db303ac550b1876e51b3865/server/auth/gatekeeper.go#L207). The naming in the codebase is a bit confusing; it would be more appropriate to say "authenticated" in this case, as authorization is via SSO RBAC / SA matching / k8s API server. In this same section of the codebase, the `client` tokens are not authenticated, they are only validated. Authentication and authorization is done simultaneously for `client` tokens via the k8s API server. | []
| 6.3 | null | null | null |
CVE-2019-3763 | The RSA Identity Governance and Lifecycle software and RSA Via Lifecycle and Governance products prior to 7.1.0 P08 contain an information exposure vulnerability. The Office 365 user password may get logged in a plain text format in the Office 365 connector debug log file. An authenticated malicious local user with access to the debug logs may obtain the exposed password to use in further attacks. | [
"cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.1:-:*:*:*:*:*:*",
"cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.1:p1:*:*:*:*:*:*",
"cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.1:p2_hotfix2:*:*:*:*:*:*",
"cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.1:p3:*:*:*:*:*:*",
"cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.1:p4:*:*:*:*:*:*",
"cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.1:p5:*:*:*:*:*:*",
"cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.1:p5_hotfix2:*:*:*:*:*:*",
"cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.2:-:*:*:*:*:*:*",
"cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.2:p1:*:*:*:*:*:*",
"cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.2:p10:*:*:*:*:*:*",
"cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.2:p11:*:*:*:*:*:*",
"cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.2:p12:*:*:*:*:*:*",
"cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.2:p13:*:*:*:*:*:*",
"cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.2:p14:*:*:*:*:*:*",
"cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.2:p2:*:*:*:*:*:*",
"cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.2:p3:*:*:*:*:*:*",
"cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.2:p4:*:*:*:*:*:*",
"cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.2:p5:*:*:*:*:*:*",
"cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.2:p6:*:*:*:*:*:*",
"cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.2:p7:*:*:*:*:*:*",
"cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.2:p8:*:*:*:*:*:*",
"cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.0.2:p9:*:*:*:*:*:*",
"cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.1.0:-:*:*:*:*:*:*",
"cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.1.0:p01:*:*:*:*:*:*",
"cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.1.0:p02:*:*:*:*:*:*",
"cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.1.0:p03:*:*:*:*:*:*",
"cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.1.0:p04:*:*:*:*:*:*",
"cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.1.0:p05:*:*:*:*:*:*",
"cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.1.0:p06:*:*:*:*:*:*",
"cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.1.0:p07:*:*:*:*:*:*",
"cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.1.1:-:*:*:*:*:*:*",
"cpe:2.3:a:dell:rsa_identity_governance_and_lifecycle:7.1.1:p1:*:*:*:*:*:*",
"cpe:2.3:a:dell:rsa_via_lifecycle_and_governance:7.0.0:-:*:*:*:*:*:*",
"cpe:2.3:a:dell:rsa_via_lifecycle_and_governance:7.0.0:p1:*:*:*:*:*:*",
"cpe:2.3:a:dell:rsa_via_lifecycle_and_governance:7.0.0:p2:*:*:*:*:*:*",
"cpe:2.3:a:dell:rsa_via_lifecycle_and_governance:7.0.0:p3:*:*:*:*:*:*",
"cpe:2.3:a:dell:rsa_via_lifecycle_and_governance:7.0.0:p4:*:*:*:*:*:*",
"cpe:2.3:a:dell:rsa_via_lifecycle_and_governance:7.0.0:p5:*:*:*:*:*:*"
]
| null | 8.8 | null | null |
|
RHSA-2023:7469 | Red Hat Security Advisory: OpenShift Container Platform 4.14.4 security and extras update | golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) opentelemetry: DoS vulnerability in otelhttp | [
"cpe:/a:redhat:openshift:4.14::el8",
"cpe:/a:redhat:openshift:4.14::el9"
]
| null | 7.5 | null | null |
GHSA-f74m-jmww-q4m2 | Use-after-free vulnerability in the nsTreeSelection implementation in Mozilla Firefox before 3.0.19 and 3.5.x before 3.5.9, Thunderbird before 3.0.4, and SeaMonkey before 2.0.4 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via unspecified vectors that trigger a call to the handler for the select event for XUL tree items. | []
| null | null | null | null |
|
CVE-2024-53270 | HTTP/1: sending overload crashes when the request is reset beforehand in envoy | Envoy is a cloud-native high-performance edge/middle/service proxy. In affected versions `sendOverloadError` is going to assume the active request exists when `envoy.load_shed_points.http1_server_abort_dispatch` is configured. If `active_request` is nullptr, only onMessageBeginImpl() is called. However, the `onMessageBeginImpl` will directly return ok status if the stream is already reset leading to the nullptr reference. The downstream reset can actually happen during the H/2 upstream reset. As a result envoy may crash. This issue has been addressed in releases 1.32.3, 1.31.5, 1.30.9, and 1.29.12. Users are advised to upgrade. Users unable to upgrade may disable `http1_server_abort_dispatch` load shed point and/or use a high threshold. | []
| null | 7.5 | null | null |
GHSA-52qp-gwwh-qrg4 | Missing Handler in @scandipwa/magento-scripts | ImpactAfter changing the function from synchronous to asynchronous there wasn't implemented handler in the [start](https://docs.create-magento-app.com/getting-started/available-commands/start), [stop](https://docs.create-magento-app.com/getting-started/available-commands/stop), [exec](https://docs.create-magento-app.com/getting-started/available-commands/exec) and [logs](https://docs.create-magento-app.com/getting-started/available-commands/logs) commands, effectively making them unusable.Patches[Version 1.5.3](https://github.com/scandipwa/create-magento-app/releases/tag/%40scandipwa%2Fmagento-scripts%401.5.3) contains patches for the problems described above.WorkaroundsUpgrade to patched or latest (recommended) version `npm i @scandipwa/[email protected]` or `npm i @scandipwa/magento-scripts@latest`.ReferencesNew releases always available here: https://github.com/scandipwa/create-magento-app/releasesFor more informationIf you have any questions or comments about this advisory:Open an issue in [create-magento-app](https://github.com/scandipwa/create-magento-app/issues) | []
| null | 6.2 | null | null |
RHSA-2020:3971 | Red Hat Security Advisory: hunspell security update | hunspell: out-of-bounds read in SuggestMgr::leftcommonsubstring in suggestmgr.cxx | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
]
| null | null | 5.8 | null |
GHSA-397g-22v6-9m75 | issues with partially successful P2M updates on x86 T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] x86 HVM and PVH guests may be started in populate-on-demand (PoD) mode, to provide a way for them to later easily have more memory assigned. Guests are permitted to control certain P2M aspects of individual pages via hypercalls. These hypercalls may act on ranges of pages specified via page orders (resulting in a power-of-2 number of pages). In some cases the hypervisor carries out the requests by splitting them into smaller chunks. Error handling in certain PoD cases has been insufficient in that in particular partial success of some operations was not properly accounted for. There are two code paths affected - page removal (CVE-2021-28705) and insertion of new pages (CVE-2021-28709). (We provide one patch which combines the fix to both issues.) | []
| null | 7.8 | null | null |
|
CVE-2024-21974 | Improper input validation in the NPU driver could allow an attacker to supply a specially crafted pointer potentially leading to arbitrary code execution. | [
"cpe:2.3:a:amd:ryzen_ai_software:*:*:*:*:*:*:*:*"
]
| null | 8.8 | null | null |
|
GHSA-7677-v8cp-hpxg | views/auth.go in Orange Forum 1.4.0 allows Open Redirection via the next parameter to /login or /signup. | []
| null | null | 6.1 | null |
|
GHSA-7whm-p3g6-xq8q | Cumin before 0.1.5444, as used in Red Hat Enterprise Messaging, Realtime, and Grid (MRG) 2.0, allows remote authenticated users to cause a denial of service (memory consumption) via a large size in an image request. | []
| null | null | null | null |
|
CVE-2024-3786 | Improper Neutralization of Server-Side Includes (SSI) vulnerability in WBSAirback | Vulnerability in WBSAirback 21.02.04, which involves improper neutralisation of Server-Side Includes (SSI), through Device Synchronizations (/admin/DeviceReplication). Exploitation of this vulnerability could allow a remote user to execute arbitrary code. | []
| null | 6.6 | null | null |
RHSA-2024:0629 | Red Hat Security Advisory: tigervnc security update | xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent xorg-x11-server: heap buffer overflow in DisableDevice | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
]
| null | 7.8 | null | null |
GHSA-6wfj-pw33-8cr3 | An issue was discovered in MediaWiki before 1.35.1. Missing users (accounts that don't exist) and hidden users (accounts that have been explicitly hidden due to being abusive, or similar) that the viewer cannot see are handled differently, exposing sensitive information about the hidden status to unprivileged viewers. This exists on various code paths. | []
| null | 5.3 | null | null |
|
CVE-2022-47437 | WordPress WSB Brands Plugin <= 1.1.8 is vulnerable to Cross Site Scripting (XSS) | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Branko Borilovic WSB Brands plugin <= 1.1.8 versions. | [
"cpe:2.3:a:wsb_brands_project:wsb_brands:*:*:*:*:*:wordpress:*:*"
]
| null | 5.9 | null | null |
GHSA-g975-6398-g6r8 | The Trend Micro AntiVirus scan engine before 8.550-1001, as used in Trend Micro PC-Cillin Internet Security 2007, and Tmxpflt.sys 8.320.1004 and 8.500.0.1002, has weak permissions (Everyone:Write) for the \\.\Tmfilter device, which allows local users to send arbitrary content to the device via the IOCTL functionality. NOTE: this can be leveraged for privilege escalation by exploiting a buffer overflow in the handler for IOCTL 0xa0284403. | []
| null | null | null | null |
|
CVE-2023-42441 | Vyper has incorrect re-entrancy lock when key is empty string | Vyper is a Pythonic Smart Contract Language for the Ethereum Virtual Machine (EVM). Starting in version 0.2.9 and prior to version 0.3.10, locks of the type `@nonreentrant("")` or `@nonreentrant('')` do not produce reentrancy checks at runtime. This issue is fixed in version 0.3.10. As a workaround, ensure the lock name is a non-empty string. | [
"cpe:2.3:a:vyperlang:vyper:*:*:*:*:*:python:*:*"
]
| null | 5.3 | null | null |
CVE-2018-1905 | IBM WebSphere Application Server 9.0.0.0 through 9.0.0.9 is vulnerable to a XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 152534. | [
"cpe:2.3:a:ibm:websphere_application_server:*:*:*:*:*:*:*:*"
]
| null | null | 7.1 | null |
|
CVE-2025-48017 | Improper Limitation of a Pathname to a Restricted Directory | Improper limitation of pathname in Circuit Provisioning and File Import applications allows modification and uploading of files | []
| null | 9 | null | null |
GHSA-9q5f-wwvq-qm8h | SugarCRM before 8.0.4 and 9.x before 9.0.2 allows PHP code injection in the Campaigns module by an Admin user. | []
| null | null | null | null |
|
GHSA-3jvf-q93m-2fhw | The wireless router WRTM326 from SECOM does not properly validate a specific parameter. An unauthenticated remote attacker could execute arbitrary system commands by sending crafted requests. | []
| null | 9.8 | null | null |
|
CVE-2018-14668 | In ClickHouse before 1.1.54388, "remote" table function allowed arbitrary symbols in "user", "password" and "default_database" fields which led to Cross Protocol Request Forgery Attacks. | [
"cpe:2.3:a:yandex:clickhouse:*:*:*:*:*:*:*:*"
]
| null | null | 8.8 | 6.8 |
|
GHSA-crg8-w24w-qvmq | Sourcecodester Stock Management System v1.0 is vulnerable to SQL Injection via editCategories.php. | []
| null | 9.8 | null | null |
|
GHSA-753x-9q2q-hv3r | The hesiod_init function in lib/hesiod.c in Hesiod 3.2.1 compares EUID with UID to determine whether to use configurations from environment variables, which allows local users to gain privileges via the (1) HESIOD_CONFIG or (2) HES_DOMAIN environment variable and leveraging certain SUID/SGUID binary. | []
| null | null | 7 | null |
|
CVE-2024-20045 | In audio, there is a possible out of bounds read due to an incorrect calculation of buffer size. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08024748; Issue ID: ALPS08029526. | []
| null | 2.3 | null | null |
|
RHSA-2021:4750 | Red Hat Security Advisory: Red Hat Virtualization Host security and bug fix update [ovirt-4.4.9] 0-day | libssh: NULL pointer dereference in sftpserver.c if ssh_buffer_new returns NULL kernel: out-of-bounds write due to a heap buffer overflow in __hidinput_change_resolution_multipliers() of hid-input.c Ansible: ansible-connection module discloses sensitive info in traceback error message kernel: Insufficient validation of user-supplied sizes for the MSG_CRYPTO message type | [
"cpe:/o:redhat:rhev_hypervisor:4.4::el8"
]
| null | 8.8 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.