id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2008-0817 | SQL injection vulnerability in the com_filebase component for Joomla! and Mambo allows remote attackers to execute arbitrary SQL commands via the filecatid parameter in a selectfolder action. | [
"cpe:2.3:a:joomla:com_filebase_component:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mambo:com_filebase_component:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-vxhx-gmhm-623c | Improper Access Control in moodle | Users' enrollment capabilities were not being sufficiently checked in Moodle when they are restored into an existing course. This could lead to them unenrolling users without having permission to do so. Versions affected: 3.5 to 3.5.14, 3.7 to 3.7.8, 3.8 to 3.8.5, 3.9 to 3.9.2 and earlier unsupported versions. Fixed in 3.9.3, 3.8.6, 3.7.9, 3.5.15, and 3.10. | [] | null | 7.5 | null | null |
GHSA-c3h8-f8h6-m66m | Integer overflow in the kvm_dev_ioctl_get_supported_cpuid function in arch/x86/kvm/x86.c in the KVM subsystem in the Linux kernel before 2.6.31.4 allows local users to have an unspecified impact via a KVM_GET_SUPPORTED_CPUID request to the kvm_arch_dev_ioctl function. | [] | null | null | null | null |
|
GHSA-cw94-3r54-76v4 | IBM BigFix Compliance 1.7 through 1.9.91 (TEMA SUAv1 SCA SCM) is vulnerable to HTML injection. A remote attacker could inject malicious HTML code, which when viewed, would be executed in the victim's Web browser within the security context of the hosting site. IBM X-Force ID: 123677. | [] | null | null | 5.4 | null |
|
CVE-2005-4533 | Argument injection vulnerability in scponlyc in scponly 4.1 and earlier, when both scp and rsync compatibility are enabled, allows local users to execute arbitrary applications via "getopt" style argument specifications, which are not filtered. | [
"cpe:2.3:a:scponly:scponly:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:scponly:scponly:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:scponly:scponly:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:scponly:scponly:3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:scponly:scponly:3.8:*:*:*:*:*:*:*",
"cpe:2.3:a:scponly:scponly:3.9:*:*:*:*:*:*:*",
"cpe:2.3:a:scponly:scponly:3.11:*:*:*:*:*:*:*",
"cpe:2.3:a:scponly:scponly:4.1:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-rpc6-h455-3rx5 | Celery local privilege escalation vulnerability | Celery 2.1 and 2.2 before 2.2.8, 2.3 before 2.3.4, and 2.4 before 2.4.4 changes the effective id but not the real id during processing of the --uid and --gid arguments to celerybeat, celeryd_detach, celeryd-multi, and celeryev, which allows local users to gain privileges via vectors involving crafted code that is executed by the worker process. | [] | null | null | null | null |
CVE-2004-0308 | Unknown vulnerability in Cisco ONS 15327 before 4.1(3), ONS 15454 before 4.6(1), ONS 15454 SD before 4.1(3), and Cisco ONS15600 before 1.3(0) allows a superuser whose account is locked out, disabled, or suspended to gain unauthorized access via a Telnet connection to the VxWorks shell. | [
"cpe:2.3:a:cisco:optical_networking_systems_software:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:optical_networking_systems_software:4.0\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:optical_networking_systems_software:4.0\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:optical_networking_systems_software:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:optical_networking_systems_software:4.1\\(0\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:optical_networking_systems_software:4.1\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:optical_networking_systems_software:4.1\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:optical_networking_systems_software:4.1\\(3\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:optical_networking_systems_software:4.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:optical_networking_systems_software:4.5:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
GHSA-642r-hg97-vwpm | Katy Whitton RankEm stores sensitive information under the web root with insufficient access control, which allows remote attackers to download a database containing credentials via a direct request for database/topsites.mdb. | [] | null | null | null | null |
|
CVE-2012-2692 | MantisBT before 1.2.11 does not check the delete_attachments_threshold permission when form_security_validation is set to OFF, which allows remote authenticated users with certain privileges to bypass intended access restrictions and delete arbitrary attachments. | [
"cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:0.18.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:0.19.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:0.19.0:a1:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:0.19.0:a2:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:0.19.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:0.19.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:0.19.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:0.19.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:0.19.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:0.19.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.0.0:a1:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.0.0:a2:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.0.0:a3:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc4:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc5:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.2.0:alpha1:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.2.0:alpha2:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.2.9:*:*:*:*:*:*:*"
] | null | null | null | 3.6 |
|
CVE-2021-25863 | Open5GS 2.1.3 listens on 0.0.0.0:3000 and has a default password of 1423 for the admin account. | [
"cpe:2.3:a:open5gs:open5gs:2.1.3:*:*:*:*:*:*:*"
] | null | 8.8 | null | 8.3 |
|
CVE-2013-6629 | The get_sos function in jdmarker.c in (1) libjpeg 6b and (2) libjpeg-turbo through 1.3.0, as used in Google Chrome before 31.0.1650.48, Ghostscript, and other products, does not check for certain duplications of component data during the reading of segments that follow Start Of Scan (SOS) JPEG markers, which allows remote attackers to obtain sensitive information from uninitialized memory locations via a crafted JPEG image. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*",
"cpe:2.3:a:artifex:gpl_ghostscript:*:*:*:*:*:*:*:*",
"cpe:2.3:a:libjpeg-turbo:libjpeg-turbo:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:18:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-fq9r-p3cq-895q | An Improper Restriction of Rendered UI Layers or Frames in the Schweitzer Engineering Laboratories SEL-411L could allow an unauthenticated attacker to perform clickjacking based attacks against an authenticated and authorized user.See product Instruction Manual Appendix A dated 20230830 for more details. | [] | null | 4.3 | null | null |
|
CVE-2009-4417 | The shutdown function in the Zend_Log_Writer_Mail class in Zend Framework (ZF) allows context-dependent attackers to send arbitrary e-mail messages to any recipient address via vectors related to "events not yet mailed." | [
"cpe:2.3:a:zend:framework:*:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:framework:0.1.3:preview:*:*:*:*:*:*",
"cpe:2.3:a:zend:framework:0.1.4:preview:*:*:*:*:*:*",
"cpe:2.3:a:zend:framework:0.1.5:preview:*:*:*:*:*:*",
"cpe:2.3:a:zend:framework:0.2.0:preview:*:*:*:*:*:*",
"cpe:2.3:a:zend:framework:0.6.0:preview:*:*:*:*:*:*",
"cpe:2.3:a:zend:framework:0.7.0:preview:*:*:*:*:*:*",
"cpe:2.3:a:zend:framework:0.8.0:preview:*:*:*:*:*:*",
"cpe:2.3:a:zend:framework:0.9.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:zend:framework:0.9.1:beta:*:*:*:*:*:*",
"cpe:2.3:a:zend:framework:0.9.2:beta:*:*:*:*:*:*",
"cpe:2.3:a:zend:framework:0.9.3:beta:*:*:*:*:*:*",
"cpe:2.3:a:zend:framework:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:framework:1.0.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:zend:framework:1.0.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:zend:framework:1.0.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:zend:framework:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:framework:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:framework:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:framework:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:framework:1.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:framework:1.5.0:preview:*:*:*:*:*:*",
"cpe:2.3:a:zend:framework:1.5.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:zend:framework:1.5.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:zend:framework:1.5.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:zend:framework:1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:framework:1.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:framework:1.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:framework:1.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:framework:1.6.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:zend:framework:1.6.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:zend:framework:1.6.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:zend:framework:1.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:framework:1.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:framework:1.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:framework:1.7.0:preview:*:*:*:*:*:*",
"cpe:2.3:a:zend:framework:1.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:framework:1.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:framework:1.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:framework:1.7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:framework:1.7.5:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:framework:1.7.6:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:framework:1.7.7:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:framework:1.7.8:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:framework:1.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:framework:1.8.0:alpha_1:*:*:*:*:*:*",
"cpe:2.3:a:zend:framework:1.8.0:beta_1:*:*:*:*:*:*",
"cpe:2.3:a:zend:framework:1.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:framework:1.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:framework:1.8.3:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:framework:1.8.4:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:framework:1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:framework:1.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:framework:1.9.0:alpha_1:*:*:*:*:*:*",
"cpe:2.3:a:zend:framework:1.9.0:beta_1:*:*:*:*:*:*",
"cpe:2.3:a:zend:framework:1.9.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:zend:framework:1.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:framework:1.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:framework:1.9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:framework:1.9.4:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:framework:1.9.5:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2014-6544 | Unspecified vulnerability in the JDBC component in Oracle Database Server 11.1.0.7, 11.2.0.3, 11.2.0.4, and 12.1.0.1 allows remote authenticated users to affect confidentiality and integrity via unknown vectors, a different vulnerability than CVE-2014-4289. | [
"cpe:2.3:a:oracle:database_server:11.1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_server:11.2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_server:11.2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_server:12.1.0.1:*:*:*:*:*:*:*"
] | null | null | null | 3.6 |
|
CVE-2019-10115 | An Insecure Permissions issue (issue 2 of 3) was discovered in GitLab Community and Enterprise Edition before 11.7.8, 11.8.x before 11.8.4, and 11.9.x before 11.9.2. The GitLab Releases feature could allow guest users access to private information like release details and code information. | [
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*"
] | null | null | 6.5 | 4 |
|
GHSA-4f5c-56m7-ww92 | Windows Bluetooth Service Remote Code Execution Vulnerability. | [] | null | 7.5 | null | null |
|
GHSA-7xh6-c3pp-j98r | Online Diagnostic Lab Management System v1.0 was discovered to contain an arbitrary file upload vulnerability via the component /php_action/createOrder.php. This vulnerability allows attackers to execute arbitrary code via a crafted PHP file. | [] | null | 7.2 | null | null |
|
GHSA-xc39-v86c-vh9g | Vulnerability of improper authentication in the ANS system service module
Impact: Successful exploitation of this vulnerability may cause features to perform abnormally. | [] | null | 6.5 | null | null |
|
GHSA-r25p-8mfp-2hwq | drivers/scsi/mpt2sas/mpt2sas_ctl.c in the Linux kernel 2.6.38 and earlier does not validate (1) length and (2) offset values before performing memory copy operations, which might allow local users to gain privileges, cause a denial of service (memory corruption), or obtain sensitive information from kernel memory via a crafted ioctl call, related to the _ctl_do_mpt_command and _ctl_diag_read_buffer functions. | [] | null | null | null | null |
|
CVE-2021-36065 | Adobe Photoshop Heap-Based Buffer Overflow Could Lead To Arbitrary Code Execution | Adobe Photoshop versions 21.2.10 (and earlier) and 22.4.3 (and earlier) are affected by a heap-based buffer overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [
"cpe:2.3:a:adobe:photoshop:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
GHSA-6w7r-f23m-5rvh | A Host header injection vulnerability in Agile-Board 1.0 allows attackers to obtain the password reset token via user interaction with a crafted password reset link. | [] | null | 8.1 | null | null |
|
GHSA-3w9m-rh5f-x696 | Internet Anywhere POP3 Mail Server allows local users to cause a denial of service via a malformed RETR command. | [] | null | null | null | null |
|
GHSA-5jpf-pj32-xx53 | Authorization header is not sanitized in an error object in auth0 | OverviewVersions before and including `2.27.0` use a block list of specific keys that should be sanitized from the request object contained in the error object. When a request to Auth0 management API fails, the key for `Authorization` header is not sanitized and the `Authorization` header value can be logged exposing a bearer token.Am I affected?You are affected by this vulnerability if all of the following conditions apply:You are using `auth0` npm packageYou are using a Machine to Machine application authorized to use Auth0's management API https://auth0.com/docs/flows/concepts/client-credentialsHow to fix that?Upgrade to version `2.27.1`Will this update impact my users?The fix provided in patch will not affect your users.Credithttp://github.com/osdiab | [] | null | 7.7 | null | null |
GHSA-52mr-8m35-2m6v | In Directus 7 API before 2.2.1, uploading of PHP files is not blocked, leading to uploads/_/originals remote code execution. | [] | null | null | 8.8 | null |
|
CVE-2017-11719 | The dnxhd_decode_header function in libavcodec/dnxhddec.c in FFmpeg 3.0 through 3.3.2 allows remote attackers to cause a denial of service (out-of-array access) or possibly have unspecified other impact via a crafted DNxHD file. | [
"cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | 6.8 |
|
CVE-2015-6785 | The CSPSource::hostMatches function in WebKit/Source/core/frame/csp/CSPSource.cpp in the Content Security Policy (CSP) implementation in Google Chrome before 47.0.2526.73 accepts an x.y hostname as a match for a *.x.y pattern, which might allow remote attackers to bypass intended access restrictions in opportunistic circumstances by leveraging a policy that was intended to be specific to subdomains. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-89q4-gfxm-xg78 | If exploited an attacker could traverse the file system to access
files or directories that would otherwise be inaccessible | [] | null | null | null | null |
|
CVE-2020-4196 | IBM Tivoli Netcool/OMNIbus_GUI 8.1.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 174907. | [
"cpe:2.3:a:ibm:tivoli_netcool\\/omnibus:8.1.0:*:*:*:*:*:*:*"
] | null | null | 5.4 | null |
|
CVE-2014-9878 | drivers/mmc/card/mmc_block_test.c in the Qualcomm components in Android before 2016-08-05 on Nexus 5 devices does not reject kernel-space buffer addresses, which allows attackers to gain privileges via a crafted application, aka Android internal bug 28769208 and Qualcomm internal bug CR547479. | [
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | 6.8 |
|
GHSA-3jrp-hwqh-j247 | Aruba Networks ClearPass Policy Manager 6.1.x, 6.2.x before 6.2.5.61640 and 6.3.x before 6.3.0.61712, when configured to use tunneled and non-tunneled EAP methods in a single policy construct, allows remote authenticated users to gain privileges by advertising independent inner and outer identities within a tunneled EAP method. | [] | null | null | 7.1 | null |
|
CVE-2023-22306 | An OS command injection vulnerability exists in the libzebra.so bridge_group functionality of Milesight UR32L v32.3.0.5. A specially crafted network packet can lead to command execution. An attacker can send a sequence of requests to trigger this vulnerability. | [
"cpe:2.3:h:milesight:ur32l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:milesight:ur32l_firmware:32.3.0.5:*:*:*:*:*:*:*"
] | null | 7.2 | null | null |
|
CVE-2024-24784 | Comments in display names are incorrectly handled in net/mail | The ParseAddressList function incorrectly handles comments (text within parentheses) within display names. Since this is a misalignment with conforming address parsers, it can result in different trust decisions being made by programs using different parsers. | [
"cpe:2.3:a:go_standard_library:net\\/mail:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
GHSA-85g9-cpf6-gw3r | Unspecified vulnerability in the Oracle BPEL Worklist Application component in Oracle Application Server 10.1.2.2 and 10.1.3.3 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors, aka AS03. | [] | null | null | null | null |
|
ICSA-23-285-02 | Siemens SCALANCE W1750D | There are buffer overflow vulnerabilities in multiple underlying services that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's access point management protocol) UDP port (8211). Successful exploitation of these vulnerabilities result in the ability to execute arbitrary code as a privileged user on the underlying operating system. There are buffer overflow vulnerabilities in multiple underlying services that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's access point management protocol) UDP port (8211). Successful exploitation of these vulnerabilities result in the ability to execute arbitrary code as a privileged user on the underlying operating system. There are buffer overflow vulnerabilities in multiple underlying services that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's access point management protocol) UDP port (8211). Successful exploitation of these vulnerabilities result in the ability to execute arbitrary code as a privileged user on the underlying operating system. There are buffer overflow vulnerabilities in multiple underlying services that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's access point management protocol) UDP port (8211). Successful exploitation of these vulnerabilities result in the ability to execute arbitrary code as a privileged user on the underlying operating system. There are buffer overflow vulnerabilities in multiple underlying services that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's access point management protocol) UDP port (8211). Successful exploitation of these vulnerabilities result in the ability to execute arbitrary code as a privileged user on the underlying operating system. There are buffer overflow vulnerabilities in multiple underlying services that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's access point management protocol) UDP port (8211). Successful exploitation of these vulnerabilities result in the ability to execute arbitrary code as a privileged user on the underlying operating system. There are buffer overflow vulnerabilities in multiple underlying services that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's access point management protocol) UDP port (8211). Successful exploitation of these vulnerabilities result in the ability to execute arbitrary code as a privileged user on the underlying operating system. There are buffer overflow vulnerabilities in multiple underlying services that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's access point management protocol) UDP port (8211). Successful exploitation of these vulnerabilities result in the ability to execute arbitrary code as a privileged user on the underlying operating system. An unauthenticated Denial of Service (DoS) vulnerability exists in a service accessed via the PAPI protocol provided by Aruba InstantOS and ArubaOS 10. Successful exploitation of this vulnerability results in the ability to interrupt the normal operation of the affected access point. Multiple authenticated command injection vulnerabilities exist in the Aruba InstantOS and ArubaOS 10 command line interface. Successful exploitation of these vulnerabilities result in the ability to execute arbitrary commands as a privileged user on the underlying operating system. Multiple authenticated command injection vulnerabilities exist in the Aruba InstantOS and ArubaOS 10 command line interface. Successful exploitation of these vulnerabilities result in the ability to execute arbitrary commands as a privileged user on the underlying operating system. Multiple authenticated command injection vulnerabilities exist in the Aruba InstantOS and ArubaOS 10 command line interface. Successful exploitation of these vulnerabilities result in the ability to execute arbitrary commands as a privileged user on the underlying operating system. A vulnerability exists in Aruba InstantOS and ArubaOS 10 where an edge-case combination of network configuration, a specific WLAN environment and an attacker already possessing valid user credentials on that WLAN can lead to sensitive information being disclosed via the WLAN. The scenarios in which this disclosure of potentially sensitive information can occur are complex and depend on factors that are beyond the control of the attacker. | [] | null | 5.4 | null | null |
Subsets and Splits