id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
GHSA-f6px-rq7f-xv6v | Unspecified vulnerability in kdebase allows local users to cause a denial of service (KDM login inaccessible, or resource consumption) via unknown vectors. | [] | null | null | null | null |
|
GHSA-mv96-4gm9-mjhw | OpenStack Identity (Keystone) before 2013.2.4, 2014.x before 2014.1.2, and Juno before Juno-2 allows remote authenticated trustees to gain access to an unauthorized project for which the trustor has certain roles via the project ID in a V2 API trust token request. | [] | null | null | null | null |
|
GHSA-2fxj-84g8-m9vw | A vulnerability has been identified in RUGGEDCOM RMC30 (All versions < V4.3.10), RUGGEDCOM RMC30NC (All versions < V4.3.10), RUGGEDCOM RP110 (All versions < V4.3.10), RUGGEDCOM RP110NC (All versions < V4.3.10), RUGGEDCOM RS400 (All versions < V4.3.10), RUGGEDCOM RS400NC (All versions < V4.3.10), RUGGEDCOM RS401 (All versions < V4.3.10), RUGGEDCOM RS401NC (All versions < V4.3.10), RUGGEDCOM RS416 (All versions < V4.3.10), RUGGEDCOM RS416NC (All versions < V4.3.10), RUGGEDCOM RS416NCv2 V4.X (All versions < V4.3.10), RUGGEDCOM RS416NCv2 V5.X (All versions < V5.9.0), RUGGEDCOM RS416P (All versions < V4.3.10), RUGGEDCOM RS416PNC (All versions < V4.3.10), RUGGEDCOM RS416PNCv2 V4.X (All versions < V4.3.10), RUGGEDCOM RS416PNCv2 V5.X (All versions < V5.9.0), RUGGEDCOM RS416Pv2 V4.X (All versions < V4.3.10), RUGGEDCOM RS416Pv2 V5.X (All versions < V5.9.0), RUGGEDCOM RS416v2 V4.X (All versions < V4.3.10), RUGGEDCOM RS416v2 V5.X (All versions < V5.9.0), RUGGEDCOM RS910 (All versions < V4.3.10), RUGGEDCOM RS910L (All versions), RUGGEDCOM RS910LNC (All versions), RUGGEDCOM RS910NC (All versions < V4.3.10), RUGGEDCOM RS910W (All versions < V4.3.10), RUGGEDCOM RS920L (All versions), RUGGEDCOM RS920LNC (All versions), RUGGEDCOM RS920W (All versions). In some configurations the affected products wrongly enable the Modbus service in non-managed VLANS. Only serial devices are affected by this vulnerability. | [] | 8.7 | 8.8 | null | null |
|
CVE-2006-6581 | PHP remote file inclusion vulnerability in tests/debug_test.php in Vernet Loic PHP_Debug 1.1.0 allows remote attackers to execute arbitrary PHP code via a URL in the debugClassLocation parameter. | [
"cpe:2.3:a:vernet_loic:php_debug:1.1.0:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-4hgf-cx4c-6c53 | Microsoft SharePoint Server Remote Code Execution Vulnerability | [] | null | 7.2 | null | null |
|
GHSA-3wqh-x63v-54mj | XnView Classic for Windows Version 2.40 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted .fpx file, related to "Data from Faulting Address controls Branch Selection starting at ntdll_77df0000!RtlpLowFragHeapFree+0x000000000000001f." | [] | null | null | 7.8 | null |
|
GHSA-qx72-mv8x-mf4c | An issue found in Marui Co Marui Official app v.13.6.1 allows a remote attacker to gain access to sensitive information via the channel access token in the miniapp Marui Official Store function. | [] | null | 7.5 | null | null |
|
CVE-2016-7161 | Heap-based buffer overflow in the .receive callback of xlnx.xps-ethernetlite in QEMU (aka Quick Emulator) allows attackers to execute arbitrary code on the QEMU host via a large ethlite packet. | [
"cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:2.7.0:rc0:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:2.7.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:2.7.0:rc2:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | 10 |
|
CVE-2017-11124 | libxar.so in xar 1.6.1 has a NULL pointer dereference in the xar_unserialize function in archive.c. | [
"cpe:2.3:a:xar_project:xar:1.6.1:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 |
|
GHSA-p78h-m8pv-g9gm | Apereo CAS vulnerable to credential leaks for LDAP authentication | Apereo CAS is an open source multilingual single sign-on solution for the web. Apereo CAS can be configured to use authentication based on client X509 certificates. These certificates can be provided via TLS handshake or a special HTTP header, such as “ssl_client_cert”. When checking the validity of the provided client certificate, X509CredentialsAuthenticationHandler performs check that this certificate is not revoked. To do so, it fetches URLs provided in the “CRL Distribution Points” extension of the certificate, which are taken from the certificate itself and therefore can be controlled by a malicious user. If the CAS server is configured to use an LDAP server for x509 authentication with a password, for example by setting a “cas.authn.x509.ldap.ldap-url” and “cas.authn.x509.ldap.bind-credential” properties, X509CredentialsAuthenticationHandler fetches revocation URLs from the certificate, which can be LDAP urls. When making requests to this LDAP urls, Apereo CAS uses the same password as for initially configured LDAP server, which can lead to a password leak. An unauthenticated user can leak the password used to LDAP connection configured on server. This issue has been addressed in version 6.6.6. Users are advised to upgrade. There are no known workarounds for this vulnerability. | [] | 6.3 | 4 | null | null |
GHSA-p385-g496-fwgj | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Clinked Clinked Client Portal allows Reflected XSS. This issue affects Clinked Client Portal: from n/a through 1.10. | [] | null | 7.1 | null | null |
|
GHSA-q676-r7fv-jgcc | The Online Payments – Get Paid with PayPal, Square & Stripe plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcodes in all versions up to, and including, 3.20.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] | null | 6.4 | null | null |
|
CVE-2020-4066 | Command Injection in Limdu trainBatch function | In Limdu before 0.95, the trainBatch function has a command injection vulnerability. Clients of the Limdu library are unlikely to be aware of this, so they might unwittingly write code that contains a vulnerability. This has been patched in 0.95. | [
"cpe:2.3:a:limdu_project:limdu:*:*:*:*:*:*:*:*"
] | null | 3.8 | null | null |
GHSA-8v4g-x6m4-p3qj | Products for macOS enables a user logged on to the system to perform a denial-of-service attack, which could be misused to disable the protection of the ESET security product and cause general system slow-down. | [] | 6.8 | null | null | null |
|
RHSA-2024:4003 | Red Hat Security Advisory: thunderbird security update | Mozilla: Use-after-free in JavaScript object transplant Mozilla: External protocol handlers leaked by timing attack Mozilla: Sandboxed iframes were able to bypass sandbox restrictions to open a new window Mozilla: Cross-Origin Image leak via Offscreen Canvas Mozilla: Memory Corruption in Text Fragments Mozilla: Memory safety bugs fixed in Firefox 127, Firefox ESR 115.12, and Thunderbird 115.12 Mozilla: Use-after-free in networking | [
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 7.5 | null | null |
GHSA-3ff6-3j6w-48qf | Unspecified vulnerability in Oracle Solaris 8, 9, and 10 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to libc. | [] | null | null | null | null |
|
GHSA-h86q-v7x4-qx4x | Off-by-one error in the flask_security_avc_cachestats function in xsm/flask/flask_op.c in Xen 4.2.x and 4.3.x, when the maximum number of physical CPUs are in use, allows local users to cause a denial of service (host crash) or obtain sensitive information from hypervisor memory by leveraging a FLASK_AVC_CACHESTAT hypercall, which triggers a buffer over-read. | [] | null | null | null | null |
|
CVE-2024-48542 | Incorrect access control in the firmware update and download processes of Yamaha Headphones Controller v1.6.7 allows attackers to access sensitive information by analyzing the code and data within the APK file. | [
"cpe:2.3:o:yamaha:headphones_controller_firmware:1.6.7:*:*:*:*:*:*:*"
] | null | 8.4 | null | null |
|
GHSA-w24p-x5ww-2qf7 | Gaim 1.1.3 on Windows systems allows remote attackers to cause a denial of service (client crash) via a file transfer in which the filename contains "(" or ")" (parenthesis) characters. | [] | null | null | null | null |
|
GHSA-58m6-rf87-63fp | Linux foundation ONOS 1.9 is vulnerable to XSS in the device. registration | [] | null | 6.1 | null | null |
|
RHEA-2015:1771 | Red Hat Enhancement Advisory: Red Hat JBoss Web Server 3.0.1 enhancement update | tomcat: non-persistent DoS attack by feeding data by aborting an upload mod_jk: information leak due to incorrect JkMount/JkUnmount directives processing openssl: X509_to_X509_REQ NULL pointer dereference | [
"cpe:/a:redhat:jboss_enterprise_web_server:3.0::el6"
] | null | null | null | null |
RHSA-2021:0717 | Red Hat Security Advisory: java-1.8.0-ibm security update | OpenJDK: Unexpected exceptions raised by DOMKeyInfoFactory and DOMXMLSignatureFactory (Security, 8231415) OpenJDK: Credentials sent over unencrypted LDAP connection (JNDI, 8237990) OpenJDK: Certificate blacklist bypass via alternate certificate encodings (Libraries, 8237995) OpenJDK: Race condition in NIO Buffer boundary checks (Libraries, 8244136) JDK: Stack-based buffer overflow when converting from UTF-8 characters to platform encoding | [
"cpe:/a:redhat:rhel_extras:7"
] | null | 9.8 | null | null |
CVE-2008-0231 | Multiple directory traversal vulnerabilities in index.php in Tuned Studios (1) Subwoofer, (2) Freeze Theme, (3) Orange Cutout, (4) Lonely Maple, (5) Endless, (6) Classic Theme, and (7) Music Theme webpage templates allow remote attackers to include and execute arbitrary files via ".." sequences in the page parameter. NOTE: this can be leveraged for remote file inclusion when running in some PHP 5 environments. | [
"cpe:2.3:a:tuned_studios:classic_theme:*:*:*:*:*:*:*:*",
"cpe:2.3:a:tuned_studios:endless:*:*:*:*:*:*:*:*",
"cpe:2.3:a:tuned_studios:freeze_theme:*:*:*:*:*:*:*:*",
"cpe:2.3:a:tuned_studios:lonely_maple:*:*:*:*:*:*:*:*",
"cpe:2.3:a:tuned_studios:music_theme:*:*:*:*:*:*:*:*",
"cpe:2.3:a:tuned_studios:orange_cutout:*:*:*:*:*:*:*:*",
"cpe:2.3:a:tuned_studios:subwoofer:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-cjx9-rgqh-q7cc | A certificate parsing issue was addressed with improved checks. This issue is fixed in tvOS 15.5, iOS 15.5 and iPadOS 15.5, Security Update 2022-004 Catalina, watchOS 8.6, macOS Big Sur 11.6.6, macOS Monterey 12.4. A malicious app may be able to bypass signature validation. | [] | null | 5.5 | null | null |
|
GHSA-p2p9-3jf4-23jr | IBM OPENBMC OP910 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 212049. | [] | null | null | null | null |
|
CVE-2004-2457 | Unspecified vulnerability in 3Com OfficeConnect ADSL 11g Router allows remote attackers to cause a denial of service (crash) via a large amount of UDP traffic. | [
"cpe:2.3:h:3com:3crwe754g72-a:1.13:*:*:*:*:*:*:*",
"cpe:2.3:h:3com:3crwe754g72-a:1.23:*:*:*:*:*:*:*",
"cpe:2.3:h:3com:3crwe754g72-a:1.24:*:*:*:*:*:*:*",
"cpe:2.3:h:3com:3crwe754g72-a:1.27:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2009-0668 | Unspecified vulnerability in Zope Object Database (ZODB) before 3.8.2, when certain Zope Enterprise Objects (ZEO) database sharing is enabled, allows remote attackers to execute arbitrary Python code via vectors involving the ZEO network protocol. | [
"cpe:2.3:a:zope:zodb:*:*:*:*:*:*:*:*",
"cpe:2.3:a:zope:zodb:2.8.11:*:*:*:*:*:*:*",
"cpe:2.3:a:zope:zodb:2.9.11:*:*:*:*:*:*:*",
"cpe:2.3:a:zope:zodb:2.10.9:*:*:*:*:*:*:*",
"cpe:2.3:a:zope:zodb:2.11.4:*:*:*:*:*:*:*",
"cpe:2.3:a:zope:zodb:3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:zope:zodb:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:zope:zodb:3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:zope:zodb:3.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:zope:zodb:3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:zope:zodb:3.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:zope:zodb:3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:zope:zodb:3.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:zope:zodb:3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:zope:zodb:3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:zope:zodb:3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:zope:zodb:3.8.0:*:*:*:*:*:*:*"
] | null | null | null | 6.5 |
|
CVE-2017-1000509 | Dolibarr version 6.0.2 contains a Cross Site Scripting (XSS) vulnerability in Product details that can result in execution of javascript code. | [
"cpe:2.3:a:dolibarr:dolibarr_erp\\/crm:6.0.2:*:*:*:*:*:*:*"
] | null | null | 5.4 | 3.5 |
|
GHSA-mvg2-v68x-4r2x | BaiCloud-cms v2.5.7 was discovered to contain multiple SQL injection vulnerabilities via the tongji and baidu_map parameters in /user/ztconfig.php. | [] | null | null | null | null |
|
GHSA-2567-843w-hp69 | A vulnerability, which was classified as problematic, has been found in Portabilis i-Educar 2.9.0. Affected by this issue is some unknown functionality of the file /intranet/educar_aluno_beneficio_lst.php of the component Student Benefits Registration. The manipulation of the argument Benefício leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | [] | 2 | 3.5 | null | null |
|
GHSA-x5wc-772j-qv7j | In vow, there is a possible memory corruption due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is needed for exploitation. Product: Android; Versions: Android-10, Android-11; Patch ID: ALPS05418265. | [] | null | null | null | null |
|
CVE-2009-5025 | A backdoor (aka BMSA-2009-07) was found in PyForum v1.0.3 where an attacker who knows a valid user email could force a password reset on behalf of that user. | [
"cpe:2.3:a:pyforum_project:pyforum:1.0.3:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
GHSA-gvx5-h8g7-3fhv | In isSlotMarkedSuccessful of BootControl.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. | [] | 10 | null | null | null |
|
GHSA-9mq3-v894-gjm6 | The SMB client in Microsoft Windows Server 2003 SP2, Vista Gold, SP1, and SP2, and Windows Server 2008 Gold and SP2 allows remote SMB servers and man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and reboot) via a crafted SMB transaction response that uses (1) SMBv1 or (2) SMBv2, aka "SMB Client Response Parsing Vulnerability." | [] | null | null | null | null |
|
CVE-2024-34423 | WordPress Forty Four – 404 Plugin for WordPress plugin <= 1.4 - Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in phpbits Forty Four – 404 Plugin for WordPress allows Stored XSS.This issue affects Forty Four – 404 Plugin for WordPress: from n/a through 1.4.
| [] | null | 5.9 | null | null |
GHSA-wj9c-jq33-m9v5 | AOL AOLserver 3.4.2 Win32 allows remote attackers to bypass authentication and read password-protected files via a URL that directly references the file. | [] | null | null | null | null |
|
GHSA-m82f-r4r7-5qph | Vulnerability in the Oracle Common Applications Calendar product of Oracle E-Business Suite (component: Tasks). Supported versions that are affected are 12.1.1-12.1.3 and 12.2.3-12.2.10. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Common Applications Calendar. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Common Applications Calendar, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Common Applications Calendar accessible data as well as unauthorized update, insert or delete access to some of Oracle Common Applications Calendar accessible data. CVSS 3.1 Base Score 7.6 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N). | [] | null | null | null | null |
|
CVE-2018-14793 | DeltaV Versions 11.3.1, 12.3.1, 13.3.0, 13.3.1, and R5 is vulnerable to a buffer overflow exploit through an open communication port to allow arbitrary code execution. | [
"cpe:2.3:a:emerson:deltav:11.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:emerson:deltav:12.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:emerson:deltav:13.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:emerson:deltav:13.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:emerson:deltav:r5:*:*:*:*:*:*:*"
] | null | null | 8.8 | 5.8 |
|
CVE-2013-0701 | SQL injection vulnerability in Cybozu Garoon 2.5.0 through 3.5.3 allows remote authenticated users to execute arbitrary SQL commands by leveraging a logging privilege. | [
"cpe:2.3:a:cybozu:garoon:2.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:3.5.3:*:*:*:*:*:*:*"
] | null | null | null | 6 |
|
CVE-2024-10214 | Incorrect Session Creation with Desktop SSO | Mattermost versions 9.11.X <= 9.11.1, 9.5.x <= 9.5.9 icorrectly issues two sessions when using desktop SSO - one in the browser and one in desktop with incorrect settings. | [
"cpe:2.3:a:mattermost:mattermost:*:*:*:*:*:*:*:*"
] | null | 3.5 | null | null |
GHSA-9mhq-xcrq-xc75 | An authentication bypass vulnerability exists in Avalanche versions 6.3.x and below that could allow an attacker to gain access by exploiting the SetUser method or can exploit the Race Condition in the authentication message. | [] | null | 5.9 | null | null |
|
CVE-2014-9947 | In TrustZone in all Android releases from CAF using the Linux kernel, an Information Exposure vulnerability could potentially exist. | [
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] | null | null | 5.5 | 4.3 |
|
GHSA-5rj4-8v42-m26x | Tenda F1202 V1.2.0.9 and FH1202 V1.2.0.9 were discovered to contain a stack overflow via the mit_ssid parameter in the formWrlsafeset function. | [] | null | 9.8 | null | null |
|
GHSA-fxff-28gh-86mj | In Factor (App Framework & Headless CMS) forum plugin, versions 1.3.5 to 1.8.30, are vulnerable to reflected Cross-Site Scripting (XSS) at the “search” parameter in the URL. An unauthenticated attacker can execute malicious JavaScript code and steal the session cookies. | [] | null | null | null | null |
|
CVE-2016-1582 | LXD before 2.0.2 does not properly set permissions when switching an unprivileged container into privileged mode, which allows local users to access arbitrary world readable paths in the container directory via unspecified vectors. | [
"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:a:canonical:lxd:2.0.1:*:*:*:*:*:*:*"
] | null | null | 5.5 | 2.1 |
|
GHSA-8vph-24qm-4xg2 | AudioCodes 440HD and 450HD devices 3.1.2.89 and earlier allows man-in-the-middle attackers to obtain sensitive credential information by leveraging failure to validate X.509 certificates when used with an on-premise installation with Skype for Business. | [] | null | null | 5.9 | null |
|
GHSA-wgxr-73ph-q4xr | Improper preservation of permissions in Nextcloud Server 14.0.3 causes the event details to be leaked when sharing a non-public event. | [] | null | null | null | null |
|
RHSA-2003:187 | Red Hat Security Advisory: : Updated 2.4 kernel fixes vulnerabilities and driver bugs | security flaw security flaw security flaw | [
"cpe:/o:redhat:linux:7.1",
"cpe:/o:redhat:linux:7.2",
"cpe:/o:redhat:linux:7.3",
"cpe:/o:redhat:linux:8.0",
"cpe:/o:redhat:linux:9"
] | null | null | null | null |
GHSA-4x48-mfm4-j87r | Stampit Web uses guessable id values for online stamp purchases, which allows remote attackers to cause a denial of service (stamp invalidation) via a SOAP request with an id value for a stamp that has not yet been printed. | [] | null | null | null | null |
|
GHSA-crv6-7mf9-4r5c | Multiple cross-site request forgery (CSRF) vulnerabilities in administrator.php in Epignosis eFront Open Source Edition before 3.6.15.3 build 18022 allow remote attackers to hijack the authentication of administrators for requests that (1) delete modules via the delete_module parameter, (2) deactivate modules via the deactivate_module parameter, (3) activate modules via the activate_module parameter, (4) delete users via the delete_user parameter, (5) deactivate users via the deactivate_user parameter, (6) activate users via the activate_user parameter, (7) activate themes via the set_theme parameter, (8) deactivate themes via the set_theme parameter, (9) delete themes via the delete parameter, (10) deactivate events (user registration or email activation) via the deactivate_notification parameter, (11) activate events via the activate_notification parameter, (12) delete events via the delete_notification parameter, (13) deactivate language settings via the deactivate_language parameter, (14) activate language settings via the activate_language parameter, (15) delete language settings via the delete_language parameter, or (16) activate or deactivate the autologin feature for a user via a crafted maintenance request. | [] | null | null | null | null |
|
RHSA-2013:1459 | Red Hat Security Advisory: gnupg2 security update | GnuPG: read_block() corrupt key input validation gnupg: treats no-usage-permitted keys as all-usages-permitted GnuPG: infinite recursion in the compressed packet parser DoS | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
CVE-2020-13493 | A heap overflow vulnerability exists in Pixar OpenUSD 20.05 when the software parses compressed sections in binary USD files. A specially crafted USDC file format path jumps decompression heap overflow in a way path jumps are processed. To trigger this vulnerability, the victim needs to open an attacker-provided malformed file. | [
"cpe:2.3:a:pixar:openusd:20.05:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*"
] | null | null | 8.8 | null |
|
GHSA-3vvm-w3xq-2xq2 | The Star Girl: Colors of Spring (aka com.animoca.google.starGirlSpring) application 3.4.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [] | null | null | null | null |
|
PYSEC-2022-43067 | null | A flaw was found in ansible-runner where the default temporary files configuration in ansible-2.0.0 are written to world R/W locations. This flaw allows an attacker to pre-create the directory, resulting in reading private information or forcing ansible-runner to write files as the legitimate user in a place they did not expect. The highest threat from this vulnerability is to confidentiality and integrity. | [] | null | 6.6 | null | null |
CVE-2024-26995 | usb: typec: tcpm: Correct the PDO counting in pd_set | In the Linux kernel, the following vulnerability has been resolved:
usb: typec: tcpm: Correct the PDO counting in pd_set
Off-by-one errors happen because nr_snk_pdo and nr_src_pdo are
incorrectly added one. The index of the loop is equal to the number of
PDOs to be updated when leaving the loop and it doesn't need to be added
one.
When doing the power negotiation, TCPM relies on the "nr_snk_pdo" as
the size of the local sink PDO array to match the Source capabilities
of the partner port. If the off-by-one overflow occurs, a wrong RDO
might be sent and unexpected power transfer might happen such as over
voltage or over current (than expected).
"nr_src_pdo" is used to set the Rp level when the port is in Source
role. It is also the array size of the local Source capabilities when
filling up the buffer which will be sent as the Source PDOs (such as
in Power Negotiation). If the off-by-one overflow occurs, a wrong Rp
level might be set and wrong Source PDOs will be sent to the partner
port. This could potentially cause over current or port resets. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.9:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.9:rc4:*:*:*:*:*:*"
] | null | 7.8 | null | null |
GHSA-6p92-pcf6-32pp | ExpressionEngine before 5.4.2 and 6.x before 6.0.3 allows PHP Code Injection by certain authenticated users who can leverage Translate::save() to write to an _lang.php file under the system/user/language directory. | [] | null | 8.8 | null | null |
|
GHSA-55pj-wqw7-9gpq | Cross-site scripting (XSS) vulnerability in mail/manage.html in BoxTrapper in cPanel 11 allows remote attackers to inject arbitrary web script or HTML via the account parameter. | [] | null | null | null | null |
|
GHSA-9chq-jm55-398j | In the Linux kernel, the following vulnerability has been resolved:video: fbdev: amba-clcd: Fix refcount leak bugsIn clcdfb_of_init_display(), we should call of_node_put() for the
references returned by of_graph_get_next_endpoint() and
of_graph_get_remote_port_parent() which have increased the refcount.Besides, we should call of_node_put() both in fail path or when
the references are not used anymore. | [] | null | null | null | null |
|
GHSA-2gc2-cm86-3pjx | In the function sbusfb_ioctl_helper() in drivers/video/fbdev/sbuslib.c in the Linux kernel through 4.15, an integer signedness error allows arbitrary information leakage for the FBIOPUTCMAP_SPARC and FBIOGETCMAP_SPARC commands. | [] | null | null | 7.5 | null |
|
GHSA-v98h-rv7j-hf6j | Jenkins Google Compute Engine Plugin Missing Authorization vulnerability | Missing permission checks in various API endpoints in Jenkins Google Compute Engine Plugin 4.1.1 and earlier allow attackers with Overall/Read permission to obtain limited information about the plugin configuration and environment. Google Compute Engine Plugin 4.2.0 requires the appropriate Job/Configure permission to view these metadata. | [] | null | null | 4.3 | null |
CVE-2019-5454 | SQL Injection in the Nextcloud Android app prior to version 3.0.0 allows to destroy a local cache when a harmful query is executed requiring to resetup the account. | [
"cpe:2.3:a:nextcloud:nextcloud:1.0.0:*:*:*:*:android:*:*",
"cpe:2.3:a:nextcloud:nextcloud:1.0.1:*:*:*:*:android:*:*",
"cpe:2.3:a:nextcloud:nextcloud:1.1.0:-:*:*:*:android:*:*",
"cpe:2.3:a:nextcloud:nextcloud:1.1.0:rc1:*:*:*:android:*:*",
"cpe:2.3:a:nextcloud:nextcloud:1.1.0:rc2:*:*:*:android:*:*",
"cpe:2.3:a:nextcloud:nextcloud:1.2.0:-:*:*:*:android:*:*",
"cpe:2.3:a:nextcloud:nextcloud:1.2.0:rc1:*:*:*:android:*:*",
"cpe:2.3:a:nextcloud:nextcloud:1.2.0:rc2:*:*:*:android:*:*",
"cpe:2.3:a:nextcloud:nextcloud:1.3.0:-:*:*:*:android:*:*",
"cpe:2.3:a:nextcloud:nextcloud:1.3.0:rc1:*:*:*:android:*:*",
"cpe:2.3:a:nextcloud:nextcloud:1.3.0:rc2:*:*:*:android:*:*",
"cpe:2.3:a:nextcloud:nextcloud:1.3.1:*:*:*:*:android:*:*",
"cpe:2.3:a:nextcloud:nextcloud:1.4.0:-:*:*:*:android:*:*",
"cpe:2.3:a:nextcloud:nextcloud:1.4.0:rc1:*:*:*:android:*:*",
"cpe:2.3:a:nextcloud:nextcloud:1.4.0:rc2:*:*:*:android:*:*",
"cpe:2.3:a:nextcloud:nextcloud:1.4.0:rc3:*:*:*:android:*:*",
"cpe:2.3:a:nextcloud:nextcloud:1.4.0:rc4:*:*:*:android:*:*",
"cpe:2.3:a:nextcloud:nextcloud:1.4.1:-:*:*:*:android:*:*",
"cpe:2.3:a:nextcloud:nextcloud:1.4.1:rc1:*:*:*:android:*:*",
"cpe:2.3:a:nextcloud:nextcloud:1.4.1:rc2:*:*:*:android:*:*",
"cpe:2.3:a:nextcloud:nextcloud:1.4.1:rc3:*:*:*:android:*:*",
"cpe:2.3:a:nextcloud:nextcloud:1.4.1:rc4:*:*:*:android:*:*",
"cpe:2.3:a:nextcloud:nextcloud:1.4.2:-:*:*:*:android:*:*",
"cpe:2.3:a:nextcloud:nextcloud:1.4.2:rc1:*:*:*:android:*:*",
"cpe:2.3:a:nextcloud:nextcloud:1.4.2:rc2:*:*:*:android:*:*",
"cpe:2.3:a:nextcloud:nextcloud:1.4.2:rc3:*:*:*:android:*:*",
"cpe:2.3:a:nextcloud:nextcloud:1.4.2:rc4:*:*:*:android:*:*",
"cpe:2.3:a:nextcloud:nextcloud:1.4.3:*:*:*:*:android:*:*",
"cpe:2.3:a:nextcloud:nextcloud:2.0.0:-:*:*:*:android:*:*",
"cpe:2.3:a:nextcloud:nextcloud:2.0.0:rc1:*:*:*:android:*:*",
"cpe:2.3:a:nextcloud:nextcloud:2.0.0:rc2:*:*:*:android:*:*",
"cpe:2.3:a:nextcloud:nextcloud:2.0.0:rc3:*:*:*:android:*:*",
"cpe:2.3:a:nextcloud:nextcloud:2.0.0:rc4:*:*:*:android:*:*",
"cpe:2.3:a:nextcloud:nextcloud:2.0.0:rc5:*:*:*:android:*:*",
"cpe:2.3:a:nextcloud:nextcloud:2.0.0:rc6:*:*:*:android:*:*",
"cpe:2.3:a:nextcloud:nextcloud:2.0.0:rc7:*:*:*:android:*:*",
"cpe:2.3:a:nextcloud:nextcloud:2.0.0:rc8:*:*:*:android:*:*",
"cpe:2.3:a:nextcloud:nextcloud:2.0.0:rc9:*:*:*:android:*:*",
"cpe:2.3:a:nextcloud:nextcloud:2.0.1:*:*:*:*:android:*:*",
"cpe:2.3:a:nextcloud:nextcloud:3.0.0:rc1:*:*:*:android:*:*",
"cpe:2.3:a:nextcloud:nextcloud:3.0.0:rc2:*:*:*:android:*:*",
"cpe:2.3:a:nextcloud:nextcloud:3.0.0:rc3:*:*:*:android:*:*"
] | null | 9.8 | null | 7.5 |
|
CVE-2024-32020 | Cloning local Git repository by untrusted user allows the untrusted user to modify objects in the cloned repository at will | Git is a revision control system. Prior to versions 2.45.1, 2.44.1, 2.43.4, 2.42.2, 2.41.1, 2.40.2, and 2.39.4, local clones may end up hardlinking files into the target repository's object database when source and target repository reside on the same disk. If the source repository is owned by a different user, then those hardlinked files may be rewritten at any point in time by the untrusted user. Cloning local repositories will cause Git to either copy or hardlink files of the source repository into the target repository. This significantly speeds up such local clones compared to doing a "proper" clone and saves both disk space and compute time. When cloning a repository located on the same disk that is owned by a different user than the current user we also end up creating such hardlinks. These files will continue to be owned and controlled by the potentially-untrusted user and can be rewritten by them at will in the future. The problem has been patched in versions 2.45.1, 2.44.1, 2.43.4, 2.42.2, 2.41.1, 2.40.2, and 2.39.4. | [
"cpe:2.3:a:git:git:*:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:2.45.0:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:2.44.0:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:2.43:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:2.42.0:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:2.41.0:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:2.40.0:*:*:*:*:*:*:*"
] | null | 3.9 | null | null |
GHSA-w484-2gxp-43x9 | An improper access control vulnerability [CWE-284] in FortiManager versions 6.4.4 and 6.4.5 may allow an authenticated attacker with a restricted user profile to modify the VPN tunnel status of other VDOMs using VPN Manager. | [] | null | 4.3 | null | null |
|
GHSA-p267-mjqj-h6m3 | An improper access control vulnerability in Trend Micro Smart Protection Server (Standalone) versions 3.2 and below could allow an attacker to decrypt contents of a database with information that could be used to access a vulnerable system. | [] | null | null | 9.8 | null |
|
CVE-2023-36422 | Microsoft Windows Defender Elevation of Privilege Vulnerability | Microsoft Windows Defender Elevation of Privilege Vulnerability | [
"cpe:2.3:a:microsoft:windows_defender:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
CVE-2025-1490 | Smart Maintenance Mode <= 1.5.2 - Reflected Cross-Site Scripting via setstatus Parameter | The Smart Maintenance Mode plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘setstatus’ parameter in all versions up to, and including, 1.5.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. | [] | null | 6.1 | null | null |
GHSA-7wrx-5725-4868 | A remote disclosure of sensitive information vulnerability was discovered in Aruba ClearPass Policy Manager version(s): ClearPass Policy Manager 6.10.x prior to 6.10.2 - - ClearPass Policy Manager 6.9.x prior to 6.9.7-HF1 - - ClearPass Policy Manager 6.8.x prior to 6.8.9-HF1. Aruba has released patches for ClearPass Policy Manager that address this security vulnerability. | [] | null | 6.5 | null | null |
|
CVE-2010-5199 | Untrusted search path vulnerability in PhotoImpact X3 13.00.0000.0 allows local users to gain privileges via a Trojan horse bwsconst.dll file in the current working directory, as demonstrated by a directory that contains a .ufp or .ufo file. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | [
"cpe:2.3:a:novadevelopement:photoimpact_x3:13.00.0000.0:*:*:*:*:*:*:*"
] | null | null | null | 6.9 |
|
CVE-2022-20334 | In Bluetooth, there are possible process crashes due to dereferencing a null pointer. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-178800552 | [
"cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*"
] | null | 6.5 | null | null |
|
GHSA-952x-v9p9-3683 | Windows Internet Key Exchange (IKE) Extension Denial of Service Vulnerability | [] | null | 7.5 | null | null |
|
GHSA-v5p5-6f2r-8xw8 | The mintToken function of a smart contract implementation for R Time Token v3 (RS) (Contract Name: RTokenMain), an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value. | [] | null | null | 7.5 | null |
|
CVE-2014-9190 | Stack-based buffer overflow in Schneider Electric Wonderware InTouch Access Anywhere Server 10.6 and 11.0 allows remote attackers to execute arbitrary code via a request for a filename that does not exist. | [
"cpe:2.3:a:schneider-electric:wonderware_intouch_access_anywhere_server:10.6:*:*:*:*:*:*:*",
"cpe:2.3:a:schneider-electric:wonderware_intouch_access_anywhere_server:11.0:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
RHSA-2023:4208 | Red Hat Security Advisory: OpenJDK security update | OpenJDK: HTTP client insufficient file name validation (8302475) OpenJDK: ZIP file parsing infinite loop (8302483) OpenJDK: weakness in AES implementation (8308682) OpenJDK: array indexing integer overflow issue (8304468) OpenJDK: improper handling of slash characters in URI-to-path conversion (8305312) harfbuzz: allows attackers to trigger O(n^2) growth via consecutive marks | [
"cpe:/a:redhat:openjdk:11"
] | null | 7.5 | null | null |
CVE-2023-22497 | Netdata is vulnerable to improper authentication | Netdata is an open source option for real-time infrastructure monitoring and troubleshooting. Each Netdata Agent has an automatically generated MACHINE GUID. It is generated when the agent first starts and it is saved to disk, so that it will persist across restarts and reboots. Anyone who has access to a Netdata Agent has access to its MACHINE_GUID. Streaming is a feature that allows a Netdata Agent to act as parent for other Netdata Agents (children), offloading children from various functions (increased data retention, ML, health monitoring, etc) that can now be handled by the parent Agent. Configuration is done via `stream.conf`. On the parent side, users configure in `stream.conf` an API key (any random UUID can do) to provide common configuration for all children using this API key and per MACHINE GUID configuration to customize the configuration for each child. The way this was implemented, allowed an attacker to use a valid MACHINE_GUID as an API key. This affects all users who expose their Netdata Agents (children) to non-trusted users and they also expose to the same users Netdata Agent parents that aggregate data from all these children. The problem has been fixed in: Netdata agent v1.37 (stable) and Netdata agent v1.36.0-409 (nightly). As a workaround, do not enable streaming by default. If you have previously enabled this, it can be disabled. Limiting access to the port on the recipient Agent to trusted child connections may mitigate the impact of this vulnerability. | [
"cpe:2.3:a:netdata:netdata:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | null |
CVE-2000-0554 | Ceilidh allows remote attackers to obtain the real path of the Ceilidh directory via the translated_path hidden form field. | [
"cpe:2.3:a:lilikoi:ceilidh:2.60:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2023-32025 | Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability | Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability | [
"cpe:2.3:a:microsoft:odbc_driver_for_sql_server:*:*:*:*:*:linux:*:*",
"cpe:2.3:a:microsoft:odbc_driver_for_sql_server:*:*:*:*:*:macos:*:*",
"cpe:2.3:a:microsoft:odbc_driver_for_sql_server:*:*:*:*:*:windows:*:*",
"cpe:2.3:a:microsoft:sql_server:2019:*:*:*:*:*:x64:*",
"cpe:2.3:a:microsoft:sql_server:2022:*:*:*:*:*:x64:*"
] | null | 7.8 | null | null |
GHSA-c5x9-jhg6-m4jp | Panasonic FPWIN Pro 5.x through 7.x before 7.130 accesses an uninitialized pointer, which allows local users to cause a denial of service or possibly have unspecified other impact via unknown vectors. | [] | null | null | 5.5 | null |
|
CVE-2019-7972 | Adobe Photoshop CC versions 19.1.8 and earlier and 20.0.5 and earlier have a type confusion vulnerability. Successful exploitation could lead to arbitrary code execution. | [
"cpe:2.3:a:adobe:photoshop_cc:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | null | 9.8 | 10 |
|
GHSA-7pfm-gg7x-4gr7 | Cisco Secure Access Control System (ACS) does not properly handle requests to read from the TACACS+ socket, which allows remote attackers to cause a denial of service (process crash) via malformed TCP packets, aka Bug ID CSCuh12488. | [] | null | null | null | null |
|
GHSA-j8vp-vwq2-r2x4 | A heap-buffer openSUSE libsolv through 13 Dec 2020 exists in the solver_solve function at src/solver.c: line 3445. | [] | null | null | null | null |
|
CVE-2003-0224 | Buffer overflow in ssinc.dll for Microsoft Internet Information Services (IIS) 5.0 allows local users to execute arbitrary code via a web page with a Server Side Include (SSI) directive with a long filename, aka "Server Side Include Web Pages Buffer Overrun." | [
"cpe:2.3:a:microsoft:internet_information_services:5.0:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
CVE-2023-32809 | In bluetooth driver, there is a possible read and write access to registers due to improper access control of register interface. This could lead to local leak of sensitive information with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07849753; Issue ID: ALPS07849753. | [
"cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt2713:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8781wifi:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8791wifi:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8797wifi:-:*:*:*:*:*:*:*"
] | null | 4.4 | null | null |
|
RHSA-2024:3312 | Red Hat Security Advisory: glibc security update | glibc: Out of bounds write in iconv may lead to remote code execution glibc: stack-based buffer overflow in netgroup cache glibc: null pointer dereferences after failed netgroup cache insertion glibc: netgroup cache may terminate daemon on memory allocation failure glibc: netgroup cache assumes NSS callback uses in-buffer strings | [
"cpe:/a:redhat:rhel_eus:8.8::appstream",
"cpe:/a:redhat:rhel_eus:8.8::crb",
"cpe:/o:redhat:rhel_eus:8.8::baseos"
] | null | 4 | null | null |
CVE-2007-6204 | Multiple stack-based buffer overflows in HP OpenView Network Node Manager (OV NNM) 6.41, 7.01, and 7.51 allow remote attackers to execute arbitrary code via unspecified long arguments to (1) ovlogin.exe, (2) OpenView5.exe, (3) snmpviewer.exe, and (4) webappmon.exe, as demonstrated via a long Action parameter to OpenView5.exe. | [
"cpe:2.3:a:hp:openview_network_node_manager:6.41:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:openview_network_node_manager:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:openview_network_node_manager:7.51:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
ICSA-24-284-07 | Siemens JT2Go | The affected application contains a stack-based buffer overflow vulnerability that could be triggered while parsing specially crafted PDF files. This could allow an attacker to execute code in the context of the current process. | [] | null | 7.8 | null | null |
GHSA-4wh7-wjq8-qr93 | Unspecified vulnerability in HP NonStop NetBatch G06.14 through G06.32.01, H06 through H06.28, and J06 through J06.17.01 allows remote authenticated users to gain privileges for NetBatch job execution via unknown vectors. | [] | null | null | null | null |
|
GHSA-ff5r-mvxr-r3x8 | Out-of-bounds Read vulnerability in Open Networking Foundation (ONF) libfluid (libfluid_msg module). This vulnerability is associated with program routine fluid_msg::of13::Hello::unpack.This issue affects libfluid: 0.1.0. | [] | null | 6.5 | null | null |
|
CVE-2022-20596 | In sendChunk of WirelessCharger.cpp, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-239700400References: N/A | [
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] | null | 6.7 | null | null |
|
CVE-2004-1656 | CRLF injection vulnerability in Comersus Shopping Cart 5.0991 allows remote attackers to perform HTTP Response Splitting attacks to modify expected HTML content from the server via the redirecturl parameter. | [
"cpe:2.3:a:comersus_open_technologies:comersus_cart:5.0.991:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2015-9468 | The broken-link-manager plugin 0.4.5 for WordPress has XSS via the page parameter in a delURL action. | [
"cpe:2.3:a:k-78:broken_link_manager:0.4.5:*:*:*:*:wordpress:*:*"
] | null | 6.1 | null | 4.3 |
|
GHSA-qrwm-8wjp-r8qf | The bdx_ioctl_priv function in the tehuti driver (tehuti.c) in Linux kernel 2.6.x before 2.6.25.1 does not properly check certain information related to register size, which has unspecified impact and local attack vectors, probably related to reading or writing kernel memory. | [] | null | null | null | null |
|
CVE-2017-13794 | An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari before 11.0.1 is affected. iCloud before 7.1 on Windows is affected. iTunes before 12.7.1 on Windows is affected. tvOS before 11.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site. | [
"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:webkit:-:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.8 |
|
GHSA-q6wc-wpm6-pf8j | The Intel express 8100 ISDN router allows remote attackers to cause a denial of service via oversized or fragmented ICMP packets. | [] | null | null | null | null |
|
GHSA-9gjj-qxq7-jvm6 | An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in iOS 13.6 and iPadOS 13.6, macOS Catalina 10.15.6, tvOS 13.4.8, watchOS 6.2.8, iTunes 12.10.8 for Windows, iCloud for Windows 11.3, iCloud for Windows 7.20. Processing a maliciously crafted image may lead to arbitrary code execution. | [] | null | 7.8 | null | null |
|
CVE-2024-6338 | FV Player <= 7.5.46.7212 - Authenticated (Subscriber+) SQL Injection via exclude Parameter | The FV Flowplayer Video Player plugin for WordPress is vulnerable to time-based SQL Injection via the ‘exclude’ parameter in all versions up to, and including, 7.5.46.7212 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. | [
"cpe:2.3:a:foliovision:fv_flowplayer_video_player:*:*:*:*:*:*:*:*",
"cpe:2.3:a:foliovision:fv_flowplayer_video_player:*:*:*:*:*:wordpress:*:*"
] | null | 8.8 | null | null |
GHSA-pmr4-rq5x-jpmj | Missing Authorization vulnerability in miniOrange WordPress Social Login and Register (Discord, Google, Twitter, LinkedIn) allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WordPress Social Login and Register (Discord, Google, Twitter, LinkedIn): from n/a through 7.6.0. | [] | null | 5.3 | null | null |
|
CVE-2024-30535 | WordPress Easy Form Builder plugin <= 3.7.4 - SQL Injection vulnerability | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in WhiteStudio Easy Form Builder.This issue affects Easy Form Builder: from n/a through 3.7.4.
| [] | null | 8.5 | null | null |
CVE-2021-39152 | A Server-Side Forgery Request vulnerability in XStream via HashMap unmarshaling | XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to request data from internal resources that are not publicly available only by manipulating the processed input stream with a Java runtime version 14 to 8. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.18. | [
"cpe:2.3:a:xstream_project:xstream:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*",
"cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*",
"cpe:2.3:a:oracle:business_activity_monitoring:12.2.1.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:commerce_guided_search:11.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_billing_and_revenue_management_elastic_charging_engine:11.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_billing_and_revenue_management_elastic_charging_engine:12.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:1.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:1.10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_cloud_native_core_policy:1.14.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_unified_inventory_management:7.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_unified_inventory_management:7.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:retail_xstore_point_of_service:16.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:retail_xstore_point_of_service:17.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:retail_xstore_point_of_service:18.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:retail_xstore_point_of_service:19.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:retail_xstore_point_of_service:20.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:utilities_framework:4.2.0.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:utilities_framework:4.2.0.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:utilities_framework:4.3.0.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:utilities_framework:4.3.0.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:utilities_framework:4.4.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:utilities_framework:4.4.0.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:utilities_framework:4.4.0.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:utilities_testing_accelerator:6.0.0.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:webcenter_portal:12.2.1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:webcenter_portal:12.2.1.4.0:*:*:*:*:*:*:*"
] | null | 8.5 | null | null |
GHSA-hxhm-3vj9-6cqh | apk-parser2 downloads Resources over HTTP | Affected versions of `apk-parser2` insecurely download an executable over an unencrypted HTTP connection.In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `apk-parser2`.RecommendationNo patch is currently available for this vulnerability, and the package has not been updated since 2014.The best mitigation is currently to avoid using this package, using a different package if available.Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees. | [] | null | null | 8.1 | null |
CVE-2021-0554 | In isBackupServiceActive of BackupManagerService.java, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-158482162 | [
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*"
] | null | 5.5 | null | 2.1 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.