id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
139k
cpes
sequencelengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
CVE-2008-0817
SQL injection vulnerability in the com_filebase component for Joomla! and Mambo allows remote attackers to execute arbitrary SQL commands via the filecatid parameter in a selectfolder action.
[ "cpe:2.3:a:joomla:com_filebase_component:*:*:*:*:*:*:*:*", "cpe:2.3:a:mambo:com_filebase_component:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-vxhx-gmhm-623c
Improper Access Control in moodle
Users' enrollment capabilities were not being sufficiently checked in Moodle when they are restored into an existing course. This could lead to them unenrolling users without having permission to do so. Versions affected: 3.5 to 3.5.14, 3.7 to 3.7.8, 3.8 to 3.8.5, 3.9 to 3.9.2 and earlier unsupported versions. Fixed in 3.9.3, 3.8.6, 3.7.9, 3.5.15, and 3.10.
[]
null
7.5
null
null
GHSA-c3h8-f8h6-m66m
Integer overflow in the kvm_dev_ioctl_get_supported_cpuid function in arch/x86/kvm/x86.c in the KVM subsystem in the Linux kernel before 2.6.31.4 allows local users to have an unspecified impact via a KVM_GET_SUPPORTED_CPUID request to the kvm_arch_dev_ioctl function.
[]
null
null
null
null
GHSA-cw94-3r54-76v4
IBM BigFix Compliance 1.7 through 1.9.91 (TEMA SUAv1 SCA SCM) is vulnerable to HTML injection. A remote attacker could inject malicious HTML code, which when viewed, would be executed in the victim's Web browser within the security context of the hosting site. IBM X-Force ID: 123677.
[]
null
null
5.4
null
CVE-2005-4533
Argument injection vulnerability in scponlyc in scponly 4.1 and earlier, when both scp and rsync compatibility are enabled, allows local users to execute arbitrary applications via "getopt" style argument specifications, which are not filtered.
[ "cpe:2.3:a:scponly:scponly:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:scponly:scponly:2.1:*:*:*:*:*:*:*", "cpe:2.3:a:scponly:scponly:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:scponly:scponly:3.5:*:*:*:*:*:*:*", "cpe:2.3:a:scponly:scponly:3.8:*:*:*:*:*:*:*", "cpe:2.3:a:scponly:scponly:3.9:*:*:*:*:*:*:*", "cpe:2.3:a:scponly:scponly:3.11:*:*:*:*:*:*:*", "cpe:2.3:a:scponly:scponly:4.1:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-rpc6-h455-3rx5
Celery local privilege escalation vulnerability
Celery 2.1 and 2.2 before 2.2.8, 2.3 before 2.3.4, and 2.4 before 2.4.4 changes the effective id but not the real id during processing of the --uid and --gid arguments to celerybeat, celeryd_detach, celeryd-multi, and celeryev, which allows local users to gain privileges via vectors involving crafted code that is executed by the worker process.
[]
null
null
null
null
CVE-2004-0308
Unknown vulnerability in Cisco ONS 15327 before 4.1(3), ONS 15454 before 4.6(1), ONS 15454 SD before 4.1(3), and Cisco ONS15600 before 1.3(0) allows a superuser whose account is locked out, disabled, or suspended to gain unauthorized access via a Telnet connection to the VxWorks shell.
[ "cpe:2.3:a:cisco:optical_networking_systems_software:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:optical_networking_systems_software:4.0\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:optical_networking_systems_software:4.0\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:optical_networking_systems_software:4.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:optical_networking_systems_software:4.1\\(0\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:optical_networking_systems_software:4.1\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:optical_networking_systems_software:4.1\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:optical_networking_systems_software:4.1\\(3\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:optical_networking_systems_software:4.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:optical_networking_systems_software:4.5:*:*:*:*:*:*:*" ]
null
null
null
10
GHSA-642r-hg97-vwpm
Katy Whitton RankEm stores sensitive information under the web root with insufficient access control, which allows remote attackers to download a database containing credentials via a direct request for database/topsites.mdb.
[]
null
null
null
null
CVE-2012-2692
MantisBT before 1.2.11 does not check the delete_attachments_threshold permission when form_security_validation is set to OFF, which allows remote authenticated users with certain privileges to bypass intended access restrictions and delete arbitrary attachments.
[ "cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:0.18.0:*:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:0.19.0:*:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:0.19.0:a1:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:0.19.0:a2:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:0.19.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:0.19.1:*:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:0.19.2:*:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:0.19.3:*:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:0.19.4:*:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:0.19.5:*:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.0.0:a1:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.0.0:a2:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.0.0:a3:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc4:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc5:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.1.8:*:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.2.0:alpha1:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.2.0:alpha2:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.2.7:*:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.2.8:*:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.2.9:*:*:*:*:*:*:*" ]
null
null
null
3.6
CVE-2021-25863
Open5GS 2.1.3 listens on 0.0.0.0:3000 and has a default password of 1423 for the admin account.
[ "cpe:2.3:a:open5gs:open5gs:2.1.3:*:*:*:*:*:*:*" ]
null
8.8
null
8.3
CVE-2013-6629
The get_sos function in jdmarker.c in (1) libjpeg 6b and (2) libjpeg-turbo through 1.3.0, as used in Google Chrome before 31.0.1650.48, Ghostscript, and other products, does not check for certain duplications of component data during the reading of segments that follow Start Of Scan (SOS) JPEG markers, which allows remote attackers to obtain sensitive information from uninitialized memory locations via a crafted JPEG image.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*", "cpe:2.3:a:artifex:gpl_ghostscript:*:*:*:*:*:*:*:*", "cpe:2.3:a:libjpeg-turbo:libjpeg-turbo:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:18:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*" ]
null
null
null
5
GHSA-fq9r-p3cq-895q
An Improper Restriction of Rendered UI Layers or Frames in the Schweitzer Engineering Laboratories SEL-411L could allow an unauthenticated attacker to perform clickjacking based attacks against an authenticated and authorized user.See product Instruction Manual Appendix A dated 20230830 for more details.
[]
null
4.3
null
null
CVE-2009-4417
The shutdown function in the Zend_Log_Writer_Mail class in Zend Framework (ZF) allows context-dependent attackers to send arbitrary e-mail messages to any recipient address via vectors related to "events not yet mailed."
[ "cpe:2.3:a:zend:framework:*:*:*:*:*:*:*:*", "cpe:2.3:a:zend:framework:0.1.3:preview:*:*:*:*:*:*", "cpe:2.3:a:zend:framework:0.1.4:preview:*:*:*:*:*:*", "cpe:2.3:a:zend:framework:0.1.5:preview:*:*:*:*:*:*", "cpe:2.3:a:zend:framework:0.2.0:preview:*:*:*:*:*:*", "cpe:2.3:a:zend:framework:0.6.0:preview:*:*:*:*:*:*", "cpe:2.3:a:zend:framework:0.7.0:preview:*:*:*:*:*:*", "cpe:2.3:a:zend:framework:0.8.0:preview:*:*:*:*:*:*", "cpe:2.3:a:zend:framework:0.9.0:beta:*:*:*:*:*:*", "cpe:2.3:a:zend:framework:0.9.1:beta:*:*:*:*:*:*", "cpe:2.3:a:zend:framework:0.9.2:beta:*:*:*:*:*:*", "cpe:2.3:a:zend:framework:0.9.3:beta:*:*:*:*:*:*", "cpe:2.3:a:zend:framework:1.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:zend:framework:1.0.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:zend:framework:1.0.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:zend:framework:1.0.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:zend:framework:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:zend:framework:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:zend:framework:1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:zend:framework:1.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:zend:framework:1.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:zend:framework:1.5.0:preview:*:*:*:*:*:*", "cpe:2.3:a:zend:framework:1.5.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:zend:framework:1.5.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:zend:framework:1.5.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:zend:framework:1.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:zend:framework:1.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:zend:framework:1.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:zend:framework:1.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:zend:framework:1.6.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:zend:framework:1.6.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:zend:framework:1.6.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:zend:framework:1.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:zend:framework:1.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:zend:framework:1.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:zend:framework:1.7.0:preview:*:*:*:*:*:*", "cpe:2.3:a:zend:framework:1.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:zend:framework:1.7.2:*:*:*:*:*:*:*", "cpe:2.3:a:zend:framework:1.7.3:*:*:*:*:*:*:*", "cpe:2.3:a:zend:framework:1.7.4:*:*:*:*:*:*:*", "cpe:2.3:a:zend:framework:1.7.5:*:*:*:*:*:*:*", "cpe:2.3:a:zend:framework:1.7.6:*:*:*:*:*:*:*", "cpe:2.3:a:zend:framework:1.7.7:*:*:*:*:*:*:*", "cpe:2.3:a:zend:framework:1.7.8:*:*:*:*:*:*:*", "cpe:2.3:a:zend:framework:1.8.0:*:*:*:*:*:*:*", "cpe:2.3:a:zend:framework:1.8.0:alpha_1:*:*:*:*:*:*", "cpe:2.3:a:zend:framework:1.8.0:beta_1:*:*:*:*:*:*", "cpe:2.3:a:zend:framework:1.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:zend:framework:1.8.2:*:*:*:*:*:*:*", "cpe:2.3:a:zend:framework:1.8.3:*:*:*:*:*:*:*", "cpe:2.3:a:zend:framework:1.8.4:*:*:*:*:*:*:*", "cpe:2.3:a:zend:framework:1.9:*:*:*:*:*:*:*", "cpe:2.3:a:zend:framework:1.9.0:*:*:*:*:*:*:*", "cpe:2.3:a:zend:framework:1.9.0:alpha_1:*:*:*:*:*:*", "cpe:2.3:a:zend:framework:1.9.0:beta_1:*:*:*:*:*:*", "cpe:2.3:a:zend:framework:1.9.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:zend:framework:1.9.1:*:*:*:*:*:*:*", "cpe:2.3:a:zend:framework:1.9.2:*:*:*:*:*:*:*", "cpe:2.3:a:zend:framework:1.9.3:*:*:*:*:*:*:*", "cpe:2.3:a:zend:framework:1.9.4:*:*:*:*:*:*:*", "cpe:2.3:a:zend:framework:1.9.5:*:*:*:*:*:*:*" ]
null
null
null
5
CVE-2014-6544
Unspecified vulnerability in the JDBC component in Oracle Database Server 11.1.0.7, 11.2.0.3, 11.2.0.4, and 12.1.0.1 allows remote authenticated users to affect confidentiality and integrity via unknown vectors, a different vulnerability than CVE-2014-4289.
[ "cpe:2.3:a:oracle:database_server:11.1.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:database_server:11.2.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:database_server:11.2.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:database_server:12.1.0.1:*:*:*:*:*:*:*" ]
null
null
null
3.6
CVE-2019-10115
An Insecure Permissions issue (issue 2 of 3) was discovered in GitLab Community and Enterprise Edition before 11.7.8, 11.8.x before 11.8.4, and 11.9.x before 11.9.2. The GitLab Releases feature could allow guest users access to private information like release details and code information.
[ "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*" ]
null
null
6.5
4
GHSA-4f5c-56m7-ww92
Windows Bluetooth Service Remote Code Execution Vulnerability.
[]
null
7.5
null
null
GHSA-7xh6-c3pp-j98r
Online Diagnostic Lab Management System v1.0 was discovered to contain an arbitrary file upload vulnerability via the component /php_action/createOrder.php. This vulnerability allows attackers to execute arbitrary code via a crafted PHP file.
[]
null
7.2
null
null
GHSA-xc39-v86c-vh9g
Vulnerability of improper authentication in the ANS system service module Impact: Successful exploitation of this vulnerability may cause features to perform abnormally.
[]
null
6.5
null
null
GHSA-r25p-8mfp-2hwq
drivers/scsi/mpt2sas/mpt2sas_ctl.c in the Linux kernel 2.6.38 and earlier does not validate (1) length and (2) offset values before performing memory copy operations, which might allow local users to gain privileges, cause a denial of service (memory corruption), or obtain sensitive information from kernel memory via a crafted ioctl call, related to the _ctl_do_mpt_command and _ctl_diag_read_buffer functions.
[]
null
null
null
null
CVE-2021-36065
Adobe Photoshop Heap-Based Buffer Overflow Could Lead To Arbitrary Code Execution
Adobe Photoshop versions 21.2.10 (and earlier) and 22.4.3 (and earlier) are affected by a heap-based buffer overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[ "cpe:2.3:a:adobe:photoshop:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
7.8
null
null
GHSA-6w7r-f23m-5rvh
A Host header injection vulnerability in Agile-Board 1.0 allows attackers to obtain the password reset token via user interaction with a crafted password reset link.
[]
null
8.1
null
null
GHSA-3w9m-rh5f-x696
Internet Anywhere POP3 Mail Server allows local users to cause a denial of service via a malformed RETR command.
[]
null
null
null
null
GHSA-5jpf-pj32-xx53
Authorization header is not sanitized in an error object in auth0
OverviewVersions before and including `2.27.0` use a block list of specific keys that should be sanitized from the request object contained in the error object. When a request to Auth0 management API fails, the key for `Authorization` header is not sanitized and the `Authorization` header value can be logged exposing a bearer token.Am I affected?You are affected by this vulnerability if all of the following conditions apply:You are using `auth0` npm packageYou are using a Machine to Machine application authorized to use Auth0's management API https://auth0.com/docs/flows/concepts/client-credentialsHow to fix that?Upgrade to version `2.27.1`Will this update impact my users?The fix provided in patch will not affect your users.Credithttp://github.com/osdiab
[]
null
7.7
null
null
GHSA-52mr-8m35-2m6v
In Directus 7 API before 2.2.1, uploading of PHP files is not blocked, leading to uploads/_/originals remote code execution.
[]
null
null
8.8
null
CVE-2017-11719
The dnxhd_decode_header function in libavcodec/dnxhddec.c in FFmpeg 3.0 through 3.3.2 allows remote attackers to cause a denial of service (out-of-array access) or possibly have unspecified other impact via a crafted DNxHD file.
[ "cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*" ]
null
null
7.8
6.8
CVE-2015-6785
The CSPSource::hostMatches function in WebKit/Source/core/frame/csp/CSPSource.cpp in the Content Security Policy (CSP) implementation in Google Chrome before 47.0.2526.73 accepts an x.y hostname as a match for a *.x.y pattern, which might allow remote attackers to bypass intended access restrictions in opportunistic circumstances by leveraging a policy that was intended to be specific to subdomains.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" ]
null
null
null
4.3
GHSA-89q4-gfxm-xg78
If exploited an attacker could traverse the file system to access files or directories that would otherwise be inaccessible
[]
null
null
null
null
CVE-2020-4196
IBM Tivoli Netcool/OMNIbus_GUI 8.1.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 174907.
[ "cpe:2.3:a:ibm:tivoli_netcool\\/omnibus:8.1.0:*:*:*:*:*:*:*" ]
null
null
5.4
null
CVE-2014-9878
drivers/mmc/card/mmc_block_test.c in the Qualcomm components in Android before 2016-08-05 on Nexus 5 devices does not reject kernel-space buffer addresses, which allows attackers to gain privileges via a crafted application, aka Android internal bug 28769208 and Qualcomm internal bug CR547479.
[ "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*" ]
null
null
7.8
6.8
GHSA-3jrp-hwqh-j247
Aruba Networks ClearPass Policy Manager 6.1.x, 6.2.x before 6.2.5.61640 and 6.3.x before 6.3.0.61712, when configured to use tunneled and non-tunneled EAP methods in a single policy construct, allows remote authenticated users to gain privileges by advertising independent inner and outer identities within a tunneled EAP method.
[]
null
null
7.1
null
CVE-2023-22306
An OS command injection vulnerability exists in the libzebra.so bridge_group functionality of Milesight UR32L v32.3.0.5. A specially crafted network packet can lead to command execution. An attacker can send a sequence of requests to trigger this vulnerability.
[ "cpe:2.3:h:milesight:ur32l:-:*:*:*:*:*:*:*", "cpe:2.3:o:milesight:ur32l_firmware:32.3.0.5:*:*:*:*:*:*:*" ]
null
7.2
null
null
CVE-2024-24784
Comments in display names are incorrectly handled in net/mail
The ParseAddressList function incorrectly handles comments (text within parentheses) within display names. Since this is a misalignment with conforming address parsers, it can result in different trust decisions being made by programs using different parsers.
[ "cpe:2.3:a:go_standard_library:net\\/mail:*:*:*:*:*:*:*:*" ]
null
7.5
null
null
GHSA-85g9-cpf6-gw3r
Unspecified vulnerability in the Oracle BPEL Worklist Application component in Oracle Application Server 10.1.2.2 and 10.1.3.3 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors, aka AS03.
[]
null
null
null
null
ICSA-23-285-02
Siemens SCALANCE W1750D
There are buffer overflow vulnerabilities in multiple underlying services that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's access point management protocol) UDP port (8211). Successful exploitation of these vulnerabilities result in the ability to execute arbitrary code as a privileged user on the underlying operating system. There are buffer overflow vulnerabilities in multiple underlying services that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's access point management protocol) UDP port (8211). Successful exploitation of these vulnerabilities result in the ability to execute arbitrary code as a privileged user on the underlying operating system. There are buffer overflow vulnerabilities in multiple underlying services that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's access point management protocol) UDP port (8211). Successful exploitation of these vulnerabilities result in the ability to execute arbitrary code as a privileged user on the underlying operating system. There are buffer overflow vulnerabilities in multiple underlying services that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's access point management protocol) UDP port (8211). Successful exploitation of these vulnerabilities result in the ability to execute arbitrary code as a privileged user on the underlying operating system. There are buffer overflow vulnerabilities in multiple underlying services that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's access point management protocol) UDP port (8211). Successful exploitation of these vulnerabilities result in the ability to execute arbitrary code as a privileged user on the underlying operating system. There are buffer overflow vulnerabilities in multiple underlying services that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's access point management protocol) UDP port (8211). Successful exploitation of these vulnerabilities result in the ability to execute arbitrary code as a privileged user on the underlying operating system. There are buffer overflow vulnerabilities in multiple underlying services that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's access point management protocol) UDP port (8211). Successful exploitation of these vulnerabilities result in the ability to execute arbitrary code as a privileged user on the underlying operating system. There are buffer overflow vulnerabilities in multiple underlying services that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's access point management protocol) UDP port (8211). Successful exploitation of these vulnerabilities result in the ability to execute arbitrary code as a privileged user on the underlying operating system. An unauthenticated Denial of Service (DoS) vulnerability exists in a service accessed via the PAPI protocol provided by Aruba InstantOS and ArubaOS 10. Successful exploitation of this vulnerability results in the ability to interrupt the normal operation of the affected access point. Multiple authenticated command injection vulnerabilities exist in the Aruba InstantOS and ArubaOS 10 command line interface. Successful exploitation of these vulnerabilities result in the ability to execute arbitrary commands as a privileged user on the underlying operating system. Multiple authenticated command injection vulnerabilities exist in the Aruba InstantOS and ArubaOS 10 command line interface. Successful exploitation of these vulnerabilities result in the ability to execute arbitrary commands as a privileged user on the underlying operating system. Multiple authenticated command injection vulnerabilities exist in the Aruba InstantOS and ArubaOS 10 command line interface. Successful exploitation of these vulnerabilities result in the ability to execute arbitrary commands as a privileged user on the underlying operating system. A vulnerability exists in Aruba InstantOS and ArubaOS 10 where an edge-case combination of network configuration, a specific WLAN environment and an attacker already possessing valid user credentials on that WLAN can lead to sensitive information being disclosed via the WLAN. The scenarios in which this disclosure of potentially sensitive information can occur are complex and depend on factors that are beyond the control of the attacker.
[]
null
5.4
null
null