id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
197k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
GHSA-f6px-rq7f-xv6v
Unspecified vulnerability in kdebase allows local users to cause a denial of service (KDM login inaccessible, or resource consumption) via unknown vectors.
[]
null
null
null
null
GHSA-mv96-4gm9-mjhw
OpenStack Identity (Keystone) before 2013.2.4, 2014.x before 2014.1.2, and Juno before Juno-2 allows remote authenticated trustees to gain access to an unauthorized project for which the trustor has certain roles via the project ID in a V2 API trust token request.
[]
null
null
null
null
GHSA-2fxj-84g8-m9vw
A vulnerability has been identified in RUGGEDCOM RMC30 (All versions < V4.3.10), RUGGEDCOM RMC30NC (All versions < V4.3.10), RUGGEDCOM RP110 (All versions < V4.3.10), RUGGEDCOM RP110NC (All versions < V4.3.10), RUGGEDCOM RS400 (All versions < V4.3.10), RUGGEDCOM RS400NC (All versions < V4.3.10), RUGGEDCOM RS401 (All versions < V4.3.10), RUGGEDCOM RS401NC (All versions < V4.3.10), RUGGEDCOM RS416 (All versions < V4.3.10), RUGGEDCOM RS416NC (All versions < V4.3.10), RUGGEDCOM RS416NCv2 V4.X (All versions < V4.3.10), RUGGEDCOM RS416NCv2 V5.X (All versions < V5.9.0), RUGGEDCOM RS416P (All versions < V4.3.10), RUGGEDCOM RS416PNC (All versions < V4.3.10), RUGGEDCOM RS416PNCv2 V4.X (All versions < V4.3.10), RUGGEDCOM RS416PNCv2 V5.X (All versions < V5.9.0), RUGGEDCOM RS416Pv2 V4.X (All versions < V4.3.10), RUGGEDCOM RS416Pv2 V5.X (All versions < V5.9.0), RUGGEDCOM RS416v2 V4.X (All versions < V4.3.10), RUGGEDCOM RS416v2 V5.X (All versions < V5.9.0), RUGGEDCOM RS910 (All versions < V4.3.10), RUGGEDCOM RS910L (All versions), RUGGEDCOM RS910LNC (All versions), RUGGEDCOM RS910NC (All versions < V4.3.10), RUGGEDCOM RS910W (All versions < V4.3.10), RUGGEDCOM RS920L (All versions), RUGGEDCOM RS920LNC (All versions), RUGGEDCOM RS920W (All versions). In some configurations the affected products wrongly enable the Modbus service in non-managed VLANS. Only serial devices are affected by this vulnerability.
[]
8.7
8.8
null
null
CVE-2006-6581
PHP remote file inclusion vulnerability in tests/debug_test.php in Vernet Loic PHP_Debug 1.1.0 allows remote attackers to execute arbitrary PHP code via a URL in the debugClassLocation parameter.
[ "cpe:2.3:a:vernet_loic:php_debug:1.1.0:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-4hgf-cx4c-6c53
Microsoft SharePoint Server Remote Code Execution Vulnerability
[]
null
7.2
null
null
GHSA-3wqh-x63v-54mj
XnView Classic for Windows Version 2.40 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted .fpx file, related to "Data from Faulting Address controls Branch Selection starting at ntdll_77df0000!RtlpLowFragHeapFree+0x000000000000001f."
[]
null
null
7.8
null
GHSA-qx72-mv8x-mf4c
An issue found in Marui Co Marui Official app v.13.6.1 allows a remote attacker to gain access to sensitive information via the channel access token in the miniapp Marui Official Store function.
[]
null
7.5
null
null
CVE-2016-7161
Heap-based buffer overflow in the .receive callback of xlnx.xps-ethernetlite in QEMU (aka Quick Emulator) allows attackers to execute arbitrary code on the QEMU host via a large ethlite packet.
[ "cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:2.7.0:rc0:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:2.7.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:2.7.0:rc2:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" ]
null
9.8
null
10
CVE-2017-11124
libxar.so in xar 1.6.1 has a NULL pointer dereference in the xar_unserialize function in archive.c.
[ "cpe:2.3:a:xar_project:xar:1.6.1:*:*:*:*:*:*:*" ]
null
null
9.8
7.5
GHSA-p78h-m8pv-g9gm
Apereo CAS vulnerable to credential leaks for LDAP authentication
Apereo CAS is an open source multilingual single sign-on solution for the web. Apereo CAS can be configured to use authentication based on client X509 certificates. These certificates can be provided via TLS handshake or a special HTTP header, such as “ssl_client_cert”. When checking the validity of the provided client certificate, X509CredentialsAuthenticationHandler performs check that this certificate is not revoked. To do so, it fetches URLs provided in the “CRL Distribution Points” extension of the certificate, which are taken from the certificate itself and therefore can be controlled by a malicious user. If the CAS server is configured to use an LDAP server for x509 authentication with a password, for example by setting a “cas.authn.x509.ldap.ldap-url” and “cas.authn.x509.ldap.bind-credential” properties, X509CredentialsAuthenticationHandler fetches revocation URLs from the certificate, which can be LDAP urls. When making requests to this LDAP urls, Apereo CAS uses the same password as for initially configured LDAP server, which can lead to a password leak. An unauthenticated user can leak the password used to LDAP connection configured on server. This issue has been addressed in version 6.6.6. Users are advised to upgrade. There are no known workarounds for this vulnerability.
[]
6.3
4
null
null
GHSA-p385-g496-fwgj
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Clinked Clinked Client Portal allows Reflected XSS. This issue affects Clinked Client Portal: from n/a through 1.10.
[]
null
7.1
null
null
GHSA-q676-r7fv-jgcc
The Online Payments – Get Paid with PayPal, Square & Stripe plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcodes in all versions up to, and including, 3.20.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
6.4
null
null
CVE-2020-4066
Command Injection in Limdu trainBatch function
In Limdu before 0.95, the trainBatch function has a command injection vulnerability. Clients of the Limdu library are unlikely to be aware of this, so they might unwittingly write code that contains a vulnerability. This has been patched in 0.95.
[ "cpe:2.3:a:limdu_project:limdu:*:*:*:*:*:*:*:*" ]
null
3.8
null
null
GHSA-8v4g-x6m4-p3qj
Products for macOS enables a user logged on to the system to perform a denial-of-service attack, which could be misused to disable the protection of the ESET security product and cause general system slow-down.
[]
6.8
null
null
null
RHSA-2024:4003
Red Hat Security Advisory: thunderbird security update
Mozilla: Use-after-free in JavaScript object transplant Mozilla: External protocol handlers leaked by timing attack Mozilla: Sandboxed iframes were able to bypass sandbox restrictions to open a new window Mozilla: Cross-Origin Image leak via Offscreen Canvas Mozilla: Memory Corruption in Text Fragments Mozilla: Memory safety bugs fixed in Firefox 127, Firefox ESR 115.12, and Thunderbird 115.12 Mozilla: Use-after-free in networking
[ "cpe:/a:redhat:rhel_aus:8.4::appstream", "cpe:/a:redhat:rhel_e4s:8.4::appstream", "cpe:/a:redhat:rhel_tus:8.4::appstream" ]
null
7.5
null
null
GHSA-3ff6-3j6w-48qf
Unspecified vulnerability in Oracle Solaris 8, 9, and 10 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to libc.
[]
null
null
null
null
GHSA-h86q-v7x4-qx4x
Off-by-one error in the flask_security_avc_cachestats function in xsm/flask/flask_op.c in Xen 4.2.x and 4.3.x, when the maximum number of physical CPUs are in use, allows local users to cause a denial of service (host crash) or obtain sensitive information from hypervisor memory by leveraging a FLASK_AVC_CACHESTAT hypercall, which triggers a buffer over-read.
[]
null
null
null
null
CVE-2024-48542
Incorrect access control in the firmware update and download processes of Yamaha Headphones Controller v1.6.7 allows attackers to access sensitive information by analyzing the code and data within the APK file.
[ "cpe:2.3:o:yamaha:headphones_controller_firmware:1.6.7:*:*:*:*:*:*:*" ]
null
8.4
null
null
GHSA-w24p-x5ww-2qf7
Gaim 1.1.3 on Windows systems allows remote attackers to cause a denial of service (client crash) via a file transfer in which the filename contains "(" or ")" (parenthesis) characters.
[]
null
null
null
null
GHSA-58m6-rf87-63fp
Linux foundation ONOS 1.9 is vulnerable to XSS in the device. registration
[]
null
6.1
null
null
RHEA-2015:1771
Red Hat Enhancement Advisory: Red Hat JBoss Web Server 3.0.1 enhancement update
tomcat: non-persistent DoS attack by feeding data by aborting an upload mod_jk: information leak due to incorrect JkMount/JkUnmount directives processing openssl: X509_to_X509_REQ NULL pointer dereference
[ "cpe:/a:redhat:jboss_enterprise_web_server:3.0::el6" ]
null
null
null
null
RHSA-2021:0717
Red Hat Security Advisory: java-1.8.0-ibm security update
OpenJDK: Unexpected exceptions raised by DOMKeyInfoFactory and DOMXMLSignatureFactory (Security, 8231415) OpenJDK: Credentials sent over unencrypted LDAP connection (JNDI, 8237990) OpenJDK: Certificate blacklist bypass via alternate certificate encodings (Libraries, 8237995) OpenJDK: Race condition in NIO Buffer boundary checks (Libraries, 8244136) JDK: Stack-based buffer overflow when converting from UTF-8 characters to platform encoding
[ "cpe:/a:redhat:rhel_extras:7" ]
null
9.8
null
null
CVE-2008-0231
Multiple directory traversal vulnerabilities in index.php in Tuned Studios (1) Subwoofer, (2) Freeze Theme, (3) Orange Cutout, (4) Lonely Maple, (5) Endless, (6) Classic Theme, and (7) Music Theme webpage templates allow remote attackers to include and execute arbitrary files via ".." sequences in the page parameter. NOTE: this can be leveraged for remote file inclusion when running in some PHP 5 environments.
[ "cpe:2.3:a:tuned_studios:classic_theme:*:*:*:*:*:*:*:*", "cpe:2.3:a:tuned_studios:endless:*:*:*:*:*:*:*:*", "cpe:2.3:a:tuned_studios:freeze_theme:*:*:*:*:*:*:*:*", "cpe:2.3:a:tuned_studios:lonely_maple:*:*:*:*:*:*:*:*", "cpe:2.3:a:tuned_studios:music_theme:*:*:*:*:*:*:*:*", "cpe:2.3:a:tuned_studios:orange_cutout:*:*:*:*:*:*:*:*", "cpe:2.3:a:tuned_studios:subwoofer:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-cjx9-rgqh-q7cc
A certificate parsing issue was addressed with improved checks. This issue is fixed in tvOS 15.5, iOS 15.5 and iPadOS 15.5, Security Update 2022-004 Catalina, watchOS 8.6, macOS Big Sur 11.6.6, macOS Monterey 12.4. A malicious app may be able to bypass signature validation.
[]
null
5.5
null
null
GHSA-p2p9-3jf4-23jr
IBM OPENBMC OP910 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 212049.
[]
null
null
null
null
CVE-2004-2457
Unspecified vulnerability in 3Com OfficeConnect ADSL 11g Router allows remote attackers to cause a denial of service (crash) via a large amount of UDP traffic.
[ "cpe:2.3:h:3com:3crwe754g72-a:1.13:*:*:*:*:*:*:*", "cpe:2.3:h:3com:3crwe754g72-a:1.23:*:*:*:*:*:*:*", "cpe:2.3:h:3com:3crwe754g72-a:1.24:*:*:*:*:*:*:*", "cpe:2.3:h:3com:3crwe754g72-a:1.27:*:*:*:*:*:*:*" ]
null
null
null
5
CVE-2009-0668
Unspecified vulnerability in Zope Object Database (ZODB) before 3.8.2, when certain Zope Enterprise Objects (ZEO) database sharing is enabled, allows remote attackers to execute arbitrary Python code via vectors involving the ZEO network protocol.
[ "cpe:2.3:a:zope:zodb:*:*:*:*:*:*:*:*", "cpe:2.3:a:zope:zodb:2.8.11:*:*:*:*:*:*:*", "cpe:2.3:a:zope:zodb:2.9.11:*:*:*:*:*:*:*", "cpe:2.3:a:zope:zodb:2.10.9:*:*:*:*:*:*:*", "cpe:2.3:a:zope:zodb:2.11.4:*:*:*:*:*:*:*", "cpe:2.3:a:zope:zodb:3.1:*:*:*:*:*:*:*", "cpe:2.3:a:zope:zodb:3.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:zope:zodb:3.2:*:*:*:*:*:*:*", "cpe:2.3:a:zope:zodb:3.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:zope:zodb:3.3:*:*:*:*:*:*:*", "cpe:2.3:a:zope:zodb:3.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:zope:zodb:3.4:*:*:*:*:*:*:*", "cpe:2.3:a:zope:zodb:3.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:zope:zodb:3.5:*:*:*:*:*:*:*", "cpe:2.3:a:zope:zodb:3.6:*:*:*:*:*:*:*", "cpe:2.3:a:zope:zodb:3.7:*:*:*:*:*:*:*", "cpe:2.3:a:zope:zodb:3.8.0:*:*:*:*:*:*:*" ]
null
null
null
6.5
CVE-2017-1000509
Dolibarr version 6.0.2 contains a Cross Site Scripting (XSS) vulnerability in Product details that can result in execution of javascript code.
[ "cpe:2.3:a:dolibarr:dolibarr_erp\\/crm:6.0.2:*:*:*:*:*:*:*" ]
null
null
5.4
3.5
GHSA-mvg2-v68x-4r2x
BaiCloud-cms v2.5.7 was discovered to contain multiple SQL injection vulnerabilities via the tongji and baidu_map parameters in /user/ztconfig.php.
[]
null
null
null
null
GHSA-2567-843w-hp69
A vulnerability, which was classified as problematic, has been found in Portabilis i-Educar 2.9.0. Affected by this issue is some unknown functionality of the file /intranet/educar_aluno_beneficio_lst.php of the component Student Benefits Registration. The manipulation of the argument Benefício leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
[]
2
3.5
null
null
GHSA-x5wc-772j-qv7j
In vow, there is a possible memory corruption due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is needed for exploitation. Product: Android; Versions: Android-10, Android-11; Patch ID: ALPS05418265.
[]
null
null
null
null
CVE-2009-5025
A backdoor (aka BMSA-2009-07) was found in PyForum v1.0.3 where an attacker who knows a valid user email could force a password reset on behalf of that user.
[ "cpe:2.3:a:pyforum_project:pyforum:1.0.3:*:*:*:*:*:*:*" ]
null
7.5
null
5
GHSA-gvx5-h8g7-3fhv
In isSlotMarkedSuccessful of BootControl.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local  information disclosure with no additional execution privileges needed. User  interaction is not needed for exploitation.
[]
10
null
null
null
GHSA-9mq3-v894-gjm6
The SMB client in Microsoft Windows Server 2003 SP2, Vista Gold, SP1, and SP2, and Windows Server 2008 Gold and SP2 allows remote SMB servers and man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and reboot) via a crafted SMB transaction response that uses (1) SMBv1 or (2) SMBv2, aka "SMB Client Response Parsing Vulnerability."
[]
null
null
null
null
CVE-2024-34423
WordPress Forty Four – 404 Plugin for WordPress plugin <= 1.4 - Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in phpbits Forty Four – 404 Plugin for WordPress allows Stored XSS.This issue affects Forty Four – 404 Plugin for WordPress: from n/a through 1.4.
[]
null
5.9
null
null
GHSA-wj9c-jq33-m9v5
AOL AOLserver 3.4.2 Win32 allows remote attackers to bypass authentication and read password-protected files via a URL that directly references the file.
[]
null
null
null
null
GHSA-m82f-r4r7-5qph
Vulnerability in the Oracle Common Applications Calendar product of Oracle E-Business Suite (component: Tasks). Supported versions that are affected are 12.1.1-12.1.3 and 12.2.3-12.2.10. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Common Applications Calendar. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Common Applications Calendar, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Common Applications Calendar accessible data as well as unauthorized update, insert or delete access to some of Oracle Common Applications Calendar accessible data. CVSS 3.1 Base Score 7.6 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N).
[]
null
null
null
null
CVE-2018-14793
DeltaV Versions 11.3.1, 12.3.1, 13.3.0, 13.3.1, and R5 is vulnerable to a buffer overflow exploit through an open communication port to allow arbitrary code execution.
[ "cpe:2.3:a:emerson:deltav:11.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:emerson:deltav:12.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:emerson:deltav:13.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:emerson:deltav:13.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:emerson:deltav:r5:*:*:*:*:*:*:*" ]
null
null
8.8
5.8
CVE-2013-0701
SQL injection vulnerability in Cybozu Garoon 2.5.0 through 3.5.3 allows remote authenticated users to execute arbitrary SQL commands by leveraging a logging privilege.
[ "cpe:2.3:a:cybozu:garoon:2.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:cybozu:garoon:3.5.3:*:*:*:*:*:*:*" ]
null
null
null
6
CVE-2024-10214
Incorrect Session Creation with Desktop SSO
Mattermost versions 9.11.X <= 9.11.1, 9.5.x <= 9.5.9 icorrectly issues two sessions when using desktop SSO - one in the browser and one in desktop with incorrect settings.
[ "cpe:2.3:a:mattermost:mattermost:*:*:*:*:*:*:*:*" ]
null
3.5
null
null
GHSA-9mhq-xcrq-xc75
An authentication bypass vulnerability exists in Avalanche versions 6.3.x and below that could allow an attacker to gain access by exploiting the SetUser method or can exploit the Race Condition in the authentication message.
[]
null
5.9
null
null
CVE-2014-9947
In TrustZone in all Android releases from CAF using the Linux kernel, an Information Exposure vulnerability could potentially exist.
[ "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*" ]
null
null
5.5
4.3
GHSA-5rj4-8v42-m26x
Tenda F1202 V1.2.0.9 and FH1202 V1.2.0.9 were discovered to contain a stack overflow via the mit_ssid parameter in the formWrlsafeset function.
[]
null
9.8
null
null
GHSA-fxff-28gh-86mj
In Factor (App Framework & Headless CMS) forum plugin, versions 1.3.5 to 1.8.30, are vulnerable to reflected Cross-Site Scripting (XSS) at the “search” parameter in the URL. An unauthenticated attacker can execute malicious JavaScript code and steal the session cookies.
[]
null
null
null
null
CVE-2016-1582
LXD before 2.0.2 does not properly set permissions when switching an unprivileged container into privileged mode, which allows local users to access arbitrary world readable paths in the container directory via unspecified vectors.
[ "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "cpe:2.3:a:canonical:lxd:2.0.1:*:*:*:*:*:*:*" ]
null
null
5.5
2.1
GHSA-8vph-24qm-4xg2
AudioCodes 440HD and 450HD devices 3.1.2.89 and earlier allows man-in-the-middle attackers to obtain sensitive credential information by leveraging failure to validate X.509 certificates when used with an on-premise installation with Skype for Business.
[]
null
null
5.9
null
GHSA-wgxr-73ph-q4xr
Improper preservation of permissions in Nextcloud Server 14.0.3 causes the event details to be leaked when sharing a non-public event.
[]
null
null
null
null
RHSA-2003:187
Red Hat Security Advisory: : Updated 2.4 kernel fixes vulnerabilities and driver bugs
security flaw security flaw security flaw
[ "cpe:/o:redhat:linux:7.1", "cpe:/o:redhat:linux:7.2", "cpe:/o:redhat:linux:7.3", "cpe:/o:redhat:linux:8.0", "cpe:/o:redhat:linux:9" ]
null
null
null
null
GHSA-4x48-mfm4-j87r
Stampit Web uses guessable id values for online stamp purchases, which allows remote attackers to cause a denial of service (stamp invalidation) via a SOAP request with an id value for a stamp that has not yet been printed.
[]
null
null
null
null
GHSA-crv6-7mf9-4r5c
Multiple cross-site request forgery (CSRF) vulnerabilities in administrator.php in Epignosis eFront Open Source Edition before 3.6.15.3 build 18022 allow remote attackers to hijack the authentication of administrators for requests that (1) delete modules via the delete_module parameter, (2) deactivate modules via the deactivate_module parameter, (3) activate modules via the activate_module parameter, (4) delete users via the delete_user parameter, (5) deactivate users via the deactivate_user parameter, (6) activate users via the activate_user parameter, (7) activate themes via the set_theme parameter, (8) deactivate themes via the set_theme parameter, (9) delete themes via the delete parameter, (10) deactivate events (user registration or email activation) via the deactivate_notification parameter, (11) activate events via the activate_notification parameter, (12) delete events via the delete_notification parameter, (13) deactivate language settings via the deactivate_language parameter, (14) activate language settings via the activate_language parameter, (15) delete language settings via the delete_language parameter, or (16) activate or deactivate the autologin feature for a user via a crafted maintenance request.
[]
null
null
null
null
RHSA-2013:1459
Red Hat Security Advisory: gnupg2 security update
GnuPG: read_block() corrupt key input validation gnupg: treats no-usage-permitted keys as all-usages-permitted GnuPG: infinite recursion in the compressed packet parser DoS
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
CVE-2020-13493
A heap overflow vulnerability exists in Pixar OpenUSD 20.05 when the software parses compressed sections in binary USD files. A specially crafted USDC file format path jumps decompression heap overflow in a way path jumps are processed. To trigger this vulnerability, the victim needs to open an attacker-provided malformed file.
[ "cpe:2.3:a:pixar:openusd:20.05:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*" ]
null
null
8.8
null
GHSA-3vvm-w3xq-2xq2
The Star Girl: Colors of Spring (aka com.animoca.google.starGirlSpring) application 3.4.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[]
null
null
null
null
PYSEC-2022-43067
null
A flaw was found in ansible-runner where the default temporary files configuration in ansible-2.0.0 are written to world R/W locations. This flaw allows an attacker to pre-create the directory, resulting in reading private information or forcing ansible-runner to write files as the legitimate user in a place they did not expect. The highest threat from this vulnerability is to confidentiality and integrity.
[]
null
6.6
null
null
CVE-2024-26995
usb: typec: tcpm: Correct the PDO counting in pd_set
In the Linux kernel, the following vulnerability has been resolved: usb: typec: tcpm: Correct the PDO counting in pd_set Off-by-one errors happen because nr_snk_pdo and nr_src_pdo are incorrectly added one. The index of the loop is equal to the number of PDOs to be updated when leaving the loop and it doesn't need to be added one. When doing the power negotiation, TCPM relies on the "nr_snk_pdo" as the size of the local sink PDO array to match the Source capabilities of the partner port. If the off-by-one overflow occurs, a wrong RDO might be sent and unexpected power transfer might happen such as over voltage or over current (than expected). "nr_src_pdo" is used to set the Rp level when the port is in Source role. It is also the array size of the local Source capabilities when filling up the buffer which will be sent as the Source PDOs (such as in Power Negotiation). If the off-by-one overflow occurs, a wrong Rp level might be set and wrong Source PDOs will be sent to the partner port. This could potentially cause over current or port resets.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.9:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.9:rc4:*:*:*:*:*:*" ]
null
7.8
null
null
GHSA-6p92-pcf6-32pp
ExpressionEngine before 5.4.2 and 6.x before 6.0.3 allows PHP Code Injection by certain authenticated users who can leverage Translate::save() to write to an _lang.php file under the system/user/language directory.
[]
null
8.8
null
null
GHSA-55pj-wqw7-9gpq
Cross-site scripting (XSS) vulnerability in mail/manage.html in BoxTrapper in cPanel 11 allows remote attackers to inject arbitrary web script or HTML via the account parameter.
[]
null
null
null
null
GHSA-9chq-jm55-398j
In the Linux kernel, the following vulnerability has been resolved:video: fbdev: amba-clcd: Fix refcount leak bugsIn clcdfb_of_init_display(), we should call of_node_put() for the references returned by of_graph_get_next_endpoint() and of_graph_get_remote_port_parent() which have increased the refcount.Besides, we should call of_node_put() both in fail path or when the references are not used anymore.
[]
null
null
null
null
GHSA-2gc2-cm86-3pjx
In the function sbusfb_ioctl_helper() in drivers/video/fbdev/sbuslib.c in the Linux kernel through 4.15, an integer signedness error allows arbitrary information leakage for the FBIOPUTCMAP_SPARC and FBIOGETCMAP_SPARC commands.
[]
null
null
7.5
null
GHSA-v98h-rv7j-hf6j
Jenkins Google Compute Engine Plugin Missing Authorization vulnerability
Missing permission checks in various API endpoints in Jenkins Google Compute Engine Plugin 4.1.1 and earlier allow attackers with Overall/Read permission to obtain limited information about the plugin configuration and environment. Google Compute Engine Plugin 4.2.0 requires the appropriate Job/Configure permission to view these metadata.
[]
null
null
4.3
null
CVE-2019-5454
SQL Injection in the Nextcloud Android app prior to version 3.0.0 allows to destroy a local cache when a harmful query is executed requiring to resetup the account.
[ "cpe:2.3:a:nextcloud:nextcloud:1.0.0:*:*:*:*:android:*:*", "cpe:2.3:a:nextcloud:nextcloud:1.0.1:*:*:*:*:android:*:*", "cpe:2.3:a:nextcloud:nextcloud:1.1.0:-:*:*:*:android:*:*", "cpe:2.3:a:nextcloud:nextcloud:1.1.0:rc1:*:*:*:android:*:*", "cpe:2.3:a:nextcloud:nextcloud:1.1.0:rc2:*:*:*:android:*:*", "cpe:2.3:a:nextcloud:nextcloud:1.2.0:-:*:*:*:android:*:*", "cpe:2.3:a:nextcloud:nextcloud:1.2.0:rc1:*:*:*:android:*:*", "cpe:2.3:a:nextcloud:nextcloud:1.2.0:rc2:*:*:*:android:*:*", "cpe:2.3:a:nextcloud:nextcloud:1.3.0:-:*:*:*:android:*:*", "cpe:2.3:a:nextcloud:nextcloud:1.3.0:rc1:*:*:*:android:*:*", "cpe:2.3:a:nextcloud:nextcloud:1.3.0:rc2:*:*:*:android:*:*", "cpe:2.3:a:nextcloud:nextcloud:1.3.1:*:*:*:*:android:*:*", "cpe:2.3:a:nextcloud:nextcloud:1.4.0:-:*:*:*:android:*:*", "cpe:2.3:a:nextcloud:nextcloud:1.4.0:rc1:*:*:*:android:*:*", "cpe:2.3:a:nextcloud:nextcloud:1.4.0:rc2:*:*:*:android:*:*", "cpe:2.3:a:nextcloud:nextcloud:1.4.0:rc3:*:*:*:android:*:*", "cpe:2.3:a:nextcloud:nextcloud:1.4.0:rc4:*:*:*:android:*:*", "cpe:2.3:a:nextcloud:nextcloud:1.4.1:-:*:*:*:android:*:*", "cpe:2.3:a:nextcloud:nextcloud:1.4.1:rc1:*:*:*:android:*:*", "cpe:2.3:a:nextcloud:nextcloud:1.4.1:rc2:*:*:*:android:*:*", "cpe:2.3:a:nextcloud:nextcloud:1.4.1:rc3:*:*:*:android:*:*", "cpe:2.3:a:nextcloud:nextcloud:1.4.1:rc4:*:*:*:android:*:*", "cpe:2.3:a:nextcloud:nextcloud:1.4.2:-:*:*:*:android:*:*", "cpe:2.3:a:nextcloud:nextcloud:1.4.2:rc1:*:*:*:android:*:*", "cpe:2.3:a:nextcloud:nextcloud:1.4.2:rc2:*:*:*:android:*:*", "cpe:2.3:a:nextcloud:nextcloud:1.4.2:rc3:*:*:*:android:*:*", "cpe:2.3:a:nextcloud:nextcloud:1.4.2:rc4:*:*:*:android:*:*", "cpe:2.3:a:nextcloud:nextcloud:1.4.3:*:*:*:*:android:*:*", "cpe:2.3:a:nextcloud:nextcloud:2.0.0:-:*:*:*:android:*:*", "cpe:2.3:a:nextcloud:nextcloud:2.0.0:rc1:*:*:*:android:*:*", "cpe:2.3:a:nextcloud:nextcloud:2.0.0:rc2:*:*:*:android:*:*", "cpe:2.3:a:nextcloud:nextcloud:2.0.0:rc3:*:*:*:android:*:*", "cpe:2.3:a:nextcloud:nextcloud:2.0.0:rc4:*:*:*:android:*:*", "cpe:2.3:a:nextcloud:nextcloud:2.0.0:rc5:*:*:*:android:*:*", "cpe:2.3:a:nextcloud:nextcloud:2.0.0:rc6:*:*:*:android:*:*", "cpe:2.3:a:nextcloud:nextcloud:2.0.0:rc7:*:*:*:android:*:*", "cpe:2.3:a:nextcloud:nextcloud:2.0.0:rc8:*:*:*:android:*:*", "cpe:2.3:a:nextcloud:nextcloud:2.0.0:rc9:*:*:*:android:*:*", "cpe:2.3:a:nextcloud:nextcloud:2.0.1:*:*:*:*:android:*:*", "cpe:2.3:a:nextcloud:nextcloud:3.0.0:rc1:*:*:*:android:*:*", "cpe:2.3:a:nextcloud:nextcloud:3.0.0:rc2:*:*:*:android:*:*", "cpe:2.3:a:nextcloud:nextcloud:3.0.0:rc3:*:*:*:android:*:*" ]
null
9.8
null
7.5
CVE-2024-32020
Cloning local Git repository by untrusted user allows the untrusted user to modify objects in the cloned repository at will
Git is a revision control system. Prior to versions 2.45.1, 2.44.1, 2.43.4, 2.42.2, 2.41.1, 2.40.2, and 2.39.4, local clones may end up hardlinking files into the target repository's object database when source and target repository reside on the same disk. If the source repository is owned by a different user, then those hardlinked files may be rewritten at any point in time by the untrusted user. Cloning local repositories will cause Git to either copy or hardlink files of the source repository into the target repository. This significantly speeds up such local clones compared to doing a "proper" clone and saves both disk space and compute time. When cloning a repository located on the same disk that is owned by a different user than the current user we also end up creating such hardlinks. These files will continue to be owned and controlled by the potentially-untrusted user and can be rewritten by them at will in the future. The problem has been patched in versions 2.45.1, 2.44.1, 2.43.4, 2.42.2, 2.41.1, 2.40.2, and 2.39.4.
[ "cpe:2.3:a:git:git:*:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:2.45.0:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:2.44.0:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:2.43:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:2.42.0:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:2.41.0:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:2.40.0:*:*:*:*:*:*:*" ]
null
3.9
null
null
GHSA-w484-2gxp-43x9
An improper access control vulnerability [CWE-284] in FortiManager versions 6.4.4 and 6.4.5 may allow an authenticated attacker with a restricted user profile to modify the VPN tunnel status of other VDOMs using VPN Manager.
[]
null
4.3
null
null
GHSA-p267-mjqj-h6m3
An improper access control vulnerability in Trend Micro Smart Protection Server (Standalone) versions 3.2 and below could allow an attacker to decrypt contents of a database with information that could be used to access a vulnerable system.
[]
null
null
9.8
null
CVE-2023-36422
Microsoft Windows Defender Elevation of Privilege Vulnerability
Microsoft Windows Defender Elevation of Privilege Vulnerability
[ "cpe:2.3:a:microsoft:windows_defender:*:*:*:*:*:*:*:*" ]
null
7.8
null
null
CVE-2025-1490
Smart Maintenance Mode <= 1.5.2 - Reflected Cross-Site Scripting via setstatus Parameter
The Smart Maintenance Mode plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘setstatus’ parameter in all versions up to, and including, 1.5.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
[]
null
6.1
null
null
GHSA-7wrx-5725-4868
A remote disclosure of sensitive information vulnerability was discovered in Aruba ClearPass Policy Manager version(s): ClearPass Policy Manager 6.10.x prior to 6.10.2 - - ClearPass Policy Manager 6.9.x prior to 6.9.7-HF1 - - ClearPass Policy Manager 6.8.x prior to 6.8.9-HF1. Aruba has released patches for ClearPass Policy Manager that address this security vulnerability.
[]
null
6.5
null
null
CVE-2010-5199
Untrusted search path vulnerability in PhotoImpact X3 13.00.0000.0 allows local users to gain privileges via a Trojan horse bwsconst.dll file in the current working directory, as demonstrated by a directory that contains a .ufp or .ufo file. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
[ "cpe:2.3:a:novadevelopement:photoimpact_x3:13.00.0000.0:*:*:*:*:*:*:*" ]
null
null
null
6.9
CVE-2022-20334
In Bluetooth, there are possible process crashes due to dereferencing a null pointer. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-178800552
[ "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*" ]
null
6.5
null
null
GHSA-952x-v9p9-3683
Windows Internet Key Exchange (IKE) Extension Denial of Service Vulnerability
[]
null
7.5
null
null
GHSA-v5p5-6f2r-8xw8
The mintToken function of a smart contract implementation for R Time Token v3 (RS) (Contract Name: RTokenMain), an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value.
[]
null
null
7.5
null
CVE-2014-9190
Stack-based buffer overflow in Schneider Electric Wonderware InTouch Access Anywhere Server 10.6 and 11.0 allows remote attackers to execute arbitrary code via a request for a filename that does not exist.
[ "cpe:2.3:a:schneider-electric:wonderware_intouch_access_anywhere_server:10.6:*:*:*:*:*:*:*", "cpe:2.3:a:schneider-electric:wonderware_intouch_access_anywhere_server:11.0:*:*:*:*:*:*:*" ]
null
null
null
10
RHSA-2023:4208
Red Hat Security Advisory: OpenJDK security update
OpenJDK: HTTP client insufficient file name validation (8302475) OpenJDK: ZIP file parsing infinite loop (8302483) OpenJDK: weakness in AES implementation (8308682) OpenJDK: array indexing integer overflow issue (8304468) OpenJDK: improper handling of slash characters in URI-to-path conversion (8305312) harfbuzz: allows attackers to trigger O(n^2) growth via consecutive marks
[ "cpe:/a:redhat:openjdk:11" ]
null
7.5
null
null
CVE-2023-22497
Netdata is vulnerable to improper authentication
Netdata is an open source option for real-time infrastructure monitoring and troubleshooting. Each Netdata Agent has an automatically generated MACHINE GUID. It is generated when the agent first starts and it is saved to disk, so that it will persist across restarts and reboots. Anyone who has access to a Netdata Agent has access to its MACHINE_GUID. Streaming is a feature that allows a Netdata Agent to act as parent for other Netdata Agents (children), offloading children from various functions (increased data retention, ML, health monitoring, etc) that can now be handled by the parent Agent. Configuration is done via `stream.conf`. On the parent side, users configure in `stream.conf` an API key (any random UUID can do) to provide common configuration for all children using this API key and per MACHINE GUID configuration to customize the configuration for each child. The way this was implemented, allowed an attacker to use a valid MACHINE_GUID as an API key. This affects all users who expose their Netdata Agents (children) to non-trusted users and they also expose to the same users Netdata Agent parents that aggregate data from all these children. The problem has been fixed in: Netdata agent v1.37 (stable) and Netdata agent v1.36.0-409 (nightly). As a workaround, do not enable streaming by default. If you have previously enabled this, it can be disabled. Limiting access to the port on the recipient Agent to trusted child connections may mitigate the impact of this vulnerability.
[ "cpe:2.3:a:netdata:netdata:*:*:*:*:*:*:*:*" ]
null
6.5
null
null
CVE-2000-0554
Ceilidh allows remote attackers to obtain the real path of the Ceilidh directory via the translated_path hidden form field.
[ "cpe:2.3:a:lilikoi:ceilidh:2.60:*:*:*:*:*:*:*" ]
null
null
null
5
CVE-2023-32025
Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
[ "cpe:2.3:a:microsoft:odbc_driver_for_sql_server:*:*:*:*:*:linux:*:*", "cpe:2.3:a:microsoft:odbc_driver_for_sql_server:*:*:*:*:*:macos:*:*", "cpe:2.3:a:microsoft:odbc_driver_for_sql_server:*:*:*:*:*:windows:*:*", "cpe:2.3:a:microsoft:sql_server:2019:*:*:*:*:*:x64:*", "cpe:2.3:a:microsoft:sql_server:2022:*:*:*:*:*:x64:*" ]
null
7.8
null
null
GHSA-c5x9-jhg6-m4jp
Panasonic FPWIN Pro 5.x through 7.x before 7.130 accesses an uninitialized pointer, which allows local users to cause a denial of service or possibly have unspecified other impact via unknown vectors.
[]
null
null
5.5
null
CVE-2019-7972
Adobe Photoshop CC versions 19.1.8 and earlier and 20.0.5 and earlier have a type confusion vulnerability. Successful exploitation could lead to arbitrary code execution.
[ "cpe:2.3:a:adobe:photoshop_cc:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
null
9.8
10
GHSA-7pfm-gg7x-4gr7
Cisco Secure Access Control System (ACS) does not properly handle requests to read from the TACACS+ socket, which allows remote attackers to cause a denial of service (process crash) via malformed TCP packets, aka Bug ID CSCuh12488.
[]
null
null
null
null
GHSA-j8vp-vwq2-r2x4
A heap-buffer openSUSE libsolv through 13 Dec 2020 exists in the solver_solve function at src/solver.c: line 3445.
[]
null
null
null
null
CVE-2003-0224
Buffer overflow in ssinc.dll for Microsoft Internet Information Services (IIS) 5.0 allows local users to execute arbitrary code via a web page with a Server Side Include (SSI) directive with a long filename, aka "Server Side Include Web Pages Buffer Overrun."
[ "cpe:2.3:a:microsoft:internet_information_services:5.0:*:*:*:*:*:*:*" ]
null
null
null
10
CVE-2023-32809
In bluetooth driver, there is a possible read and write access to registers due to improper access control of register interface. This could lead to local leak of sensitive information with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07849753; Issue ID: ALPS07849753.
[ "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt2713:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8781wifi:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8791wifi:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8797wifi:-:*:*:*:*:*:*:*" ]
null
4.4
null
null
RHSA-2024:3312
Red Hat Security Advisory: glibc security update
glibc: Out of bounds write in iconv may lead to remote code execution glibc: stack-based buffer overflow in netgroup cache glibc: null pointer dereferences after failed netgroup cache insertion glibc: netgroup cache may terminate daemon on memory allocation failure glibc: netgroup cache assumes NSS callback uses in-buffer strings
[ "cpe:/a:redhat:rhel_eus:8.8::appstream", "cpe:/a:redhat:rhel_eus:8.8::crb", "cpe:/o:redhat:rhel_eus:8.8::baseos" ]
null
4
null
null
CVE-2007-6204
Multiple stack-based buffer overflows in HP OpenView Network Node Manager (OV NNM) 6.41, 7.01, and 7.51 allow remote attackers to execute arbitrary code via unspecified long arguments to (1) ovlogin.exe, (2) OpenView5.exe, (3) snmpviewer.exe, and (4) webappmon.exe, as demonstrated via a long Action parameter to OpenView5.exe.
[ "cpe:2.3:a:hp:openview_network_node_manager:6.41:*:*:*:*:*:*:*", "cpe:2.3:a:hp:openview_network_node_manager:7.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:hp:openview_network_node_manager:7.51:*:*:*:*:*:*:*" ]
null
null
null
10
ICSA-24-284-07
Siemens JT2Go
The affected application contains a stack-based buffer overflow vulnerability that could be triggered while parsing specially crafted PDF files. This could allow an attacker to execute code in the context of the current process.
[]
null
7.8
null
null
GHSA-4wh7-wjq8-qr93
Unspecified vulnerability in HP NonStop NetBatch G06.14 through G06.32.01, H06 through H06.28, and J06 through J06.17.01 allows remote authenticated users to gain privileges for NetBatch job execution via unknown vectors.
[]
null
null
null
null
GHSA-ff5r-mvxr-r3x8
Out-of-bounds Read vulnerability in Open Networking Foundation (ONF) libfluid (libfluid_msg module). This vulnerability is associated with program routine fluid_msg::of13::Hello::unpack.This issue affects libfluid: 0.1.0.
[]
null
6.5
null
null
CVE-2022-20596
In sendChunk of WirelessCharger.cpp, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-239700400References: N/A
[ "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*" ]
null
6.7
null
null
CVE-2004-1656
CRLF injection vulnerability in Comersus Shopping Cart 5.0991 allows remote attackers to perform HTTP Response Splitting attacks to modify expected HTML content from the server via the redirecturl parameter.
[ "cpe:2.3:a:comersus_open_technologies:comersus_cart:5.0.991:*:*:*:*:*:*:*" ]
null
null
null
5
CVE-2015-9468
The broken-link-manager plugin 0.4.5 for WordPress has XSS via the page parameter in a delURL action.
[ "cpe:2.3:a:k-78:broken_link_manager:0.4.5:*:*:*:*:wordpress:*:*" ]
null
6.1
null
4.3
GHSA-qrwm-8wjp-r8qf
The bdx_ioctl_priv function in the tehuti driver (tehuti.c) in Linux kernel 2.6.x before 2.6.25.1 does not properly check certain information related to register size, which has unspecified impact and local attack vectors, probably related to reading or writing kernel memory.
[]
null
null
null
null
CVE-2017-13794
An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari before 11.0.1 is affected. iCloud before 7.1 on Windows is affected. iTunes before 12.7.1 on Windows is affected. tvOS before 11.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
[ "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "cpe:2.3:a:apple:webkit:-:*:*:*:*:*:*:*" ]
null
null
8.8
6.8
GHSA-q6wc-wpm6-pf8j
The Intel express 8100 ISDN router allows remote attackers to cause a denial of service via oversized or fragmented ICMP packets.
[]
null
null
null
null
GHSA-9gjj-qxq7-jvm6
An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in iOS 13.6 and iPadOS 13.6, macOS Catalina 10.15.6, tvOS 13.4.8, watchOS 6.2.8, iTunes 12.10.8 for Windows, iCloud for Windows 11.3, iCloud for Windows 7.20. Processing a maliciously crafted image may lead to arbitrary code execution.
[]
null
7.8
null
null
CVE-2024-6338
FV Player <= 7.5.46.7212 - Authenticated (Subscriber+) SQL Injection via exclude Parameter
The FV Flowplayer Video Player plugin for WordPress is vulnerable to time-based SQL Injection via the ‘exclude’ parameter in all versions up to, and including, 7.5.46.7212 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
[ "cpe:2.3:a:foliovision:fv_flowplayer_video_player:*:*:*:*:*:*:*:*", "cpe:2.3:a:foliovision:fv_flowplayer_video_player:*:*:*:*:*:wordpress:*:*" ]
null
8.8
null
null
GHSA-pmr4-rq5x-jpmj
Missing Authorization vulnerability in miniOrange WordPress Social Login and Register (Discord, Google, Twitter, LinkedIn) allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WordPress Social Login and Register (Discord, Google, Twitter, LinkedIn): from n/a through 7.6.0.
[]
null
5.3
null
null
CVE-2024-30535
WordPress Easy Form Builder plugin <= 3.7.4 - SQL Injection vulnerability
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in WhiteStudio Easy Form Builder.This issue affects Easy Form Builder: from n/a through 3.7.4.
[]
null
8.5
null
null
CVE-2021-39152
A Server-Side Forgery Request vulnerability in XStream via HashMap unmarshaling
XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to request data from internal resources that are not publicly available only by manipulating the processed input stream with a Java runtime version 14 to 8. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.18.
[ "cpe:2.3:a:xstream_project:xstream:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*", "cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*", "cpe:2.3:a:oracle:business_activity_monitoring:12.2.1.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:commerce_guided_search:11.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:communications_billing_and_revenue_management_elastic_charging_engine:11.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:communications_billing_and_revenue_management_elastic_charging_engine:12.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:1.9.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:1.10.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:communications_cloud_native_core_policy:1.14.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:communications_unified_inventory_management:7.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:communications_unified_inventory_management:7.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:retail_xstore_point_of_service:16.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:retail_xstore_point_of_service:17.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:retail_xstore_point_of_service:18.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:retail_xstore_point_of_service:19.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:retail_xstore_point_of_service:20.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:utilities_framework:4.2.0.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:utilities_framework:4.2.0.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:utilities_framework:4.3.0.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:utilities_framework:4.3.0.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:utilities_framework:4.4.0.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:utilities_framework:4.4.0.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:utilities_framework:4.4.0.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:utilities_testing_accelerator:6.0.0.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:webcenter_portal:12.2.1.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:webcenter_portal:12.2.1.4.0:*:*:*:*:*:*:*" ]
null
8.5
null
null
GHSA-hxhm-3vj9-6cqh
apk-parser2 downloads Resources over HTTP
Affected versions of `apk-parser2` insecurely download an executable over an unencrypted HTTP connection.In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `apk-parser2`.RecommendationNo patch is currently available for this vulnerability, and the package has not been updated since 2014.The best mitigation is currently to avoid using this package, using a different package if available.Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
[]
null
null
8.1
null
CVE-2021-0554
In isBackupServiceActive of BackupManagerService.java, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-158482162
[ "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*" ]
null
5.5
null
2.1