id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
GHSA-p94w-3g52-47j8 | Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Steven A. Zahm Connections Business Directory plugin <= 10.4.36 versions. | [] | null | 6.5 | null | null |
|
GHSA-jp5x-ww6g-hm8x | Integer overflow in Mail in Apple Mac OS X 10.3.9 and 10.4.6 allows remote attackers to execute arbitrary code via a crafted MacMIME encapsulated attachment. | [] | null | null | null | null |
|
GHSA-jv62-6xvc-ccwh | Jenkins elOyente Plugin has Insufficiently Protected Credentials | elOyente Plugin stores a password unencrypted in its global configuration file `com.technicolor.eloyente.ElOyente.xm`l on the Jenkins controller. This password can be viewed by users with access to the Jenkins controller file system.As of publication of this advisory, there is no fix. | [] | null | null | 3.3 | null |
CVE-2022-4149 | Local privilege escalation using log file | The Netskope client service (prior to R96) on Windows runs as NT AUTHORITY\SYSTEM which writes log files to a writable directory (C:\Users\Public\netSkope) for a standard user. The files are created and written with a SYSTEM account except one file (logplaceholder) which inherits permission giving all users full access control list. Netskope client restricts access to this file by allowing only read permissions as a standard user. Whenever the Netskope client service restarts, it deletes the logplaceholder and recreates, creating a race condition, which can be exploited by a malicious local user to create the file and set ACL permissions on the file. Once the file is created by a malicious user with proper ACL permissions, all files within C:\Users\Public\netSkope\ becomes modifiable by the unprivileged user. By using Windows pseudo-symlink, these files can be pointed to other places in the system and thus malicious users will be able to elevate privileges.
| [
"cpe:2.3:a:netskope:netskope:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 7 | null | null |
GHSA-8wvw-rfjc-4vm5 | Acrobat Reader DC version 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [] | null | 5.5 | null | null |
|
GHSA-v6gc-wjh2-q2wq | The ReadTGAImage function in coders\tga.c in ImageMagick 7.0.5-6 has a memory leak vulnerability that can cause memory exhaustion via invalid colors data in the header of a TGA or VST file. | [] | null | null | 8.8 | null |
|
RHBA-2023:2451 | Red Hat Bug Fix Advisory: virtio-win bug fix and enhancement update | QEMU: local privilege escalation via the QEMU Guest Agent on Windows | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.8 | null | null |
CVE-2013-2877 | parser.c in libxml2 before 2.9.0, as used in Google Chrome before 28.0.1500.71 and other products, allows remote attackers to cause a denial of service (out-of-bounds read) via a document that ends abruptly, related to the lack of certain checks for the XML_PARSER_EOF state. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:28.0.1500.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:28.0.1500.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:28.0.1500.3:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:28.0.1500.4:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:28.0.1500.5:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:28.0.1500.6:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:28.0.1500.8:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:28.0.1500.9:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:28.0.1500.10:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:28.0.1500.11:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:28.0.1500.12:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:28.0.1500.13:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:28.0.1500.14:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:28.0.1500.15:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:28.0.1500.16:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:28.0.1500.17:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:28.0.1500.18:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:28.0.1500.19:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:28.0.1500.20:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:28.0.1500.21:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:28.0.1500.22:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:28.0.1500.23:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:28.0.1500.24:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:28.0.1500.25:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:28.0.1500.26:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:28.0.1500.27:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:28.0.1500.28:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:28.0.1500.29:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:28.0.1500.31:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:28.0.1500.32:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:28.0.1500.33:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:28.0.1500.34:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:28.0.1500.35:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:28.0.1500.36:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:28.0.1500.37:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:28.0.1500.38:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:28.0.1500.39:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:28.0.1500.40:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:28.0.1500.41:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:28.0.1500.42:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:28.0.1500.43:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:28.0.1500.44:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:28.0.1500.45:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:28.0.1500.46:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:28.0.1500.47:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:28.0.1500.48:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:28.0.1500.49:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:28.0.1500.50:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:28.0.1500.51:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:28.0.1500.52:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:28.0.1500.53:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:28.0.1500.54:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:28.0.1500.56:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:28.0.1500.58:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:28.0.1500.59:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:28.0.1500.60:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:28.0.1500.61:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:28.0.1500.62:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:28.0.1500.63:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:28.0.1500.64:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:28.0.1500.66:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:28.0.1500.68:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:*:rc1:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:1.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:1.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:1.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:1.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:1.7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:1.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:1.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:1.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:1.8.3:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:1.8.4:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:1.8.5:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:1.8.6:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:1.8.7:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:1.8.9:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:1.8.10:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:1.8.13:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:1.8.14:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:1.8.16:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.2.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.2.11:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.3.8:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.3.9:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.3.10:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.3.11:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.3.12:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.3.13:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.3.14:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.4.9:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.4.10:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.4.11:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.4.12:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.4.13:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.4.14:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.4.15:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.4.16:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.4.17:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.4.18:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.4.19:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.4.20:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.4.21:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.4.22:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.4.23:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.4.24:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.4.25:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.4.26:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.4.27:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.4.28:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.4.29:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.4.30:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.5.8:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.5.10:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.5.11:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.6.7:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.6.8:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.6.9:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.6.11:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.6.12:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.6.13:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.6.14:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.6.16:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.6.17:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.6.18:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.6.20:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.6.21:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.6.22:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.6.23:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.6.24:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.6.25:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.6.26:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.6.27:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.6.28:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.6.29:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.6.30:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.6.31:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.6.32:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.7.5:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.7.6:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.7.7:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.7.8:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.8.0:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2020-19952 | Cross Site Scripting (XSS) vulnerability in Rendering Engine in jbt Markdown Editor thru commit 2252418c27dffbb35147acd8ed324822b8919477, allows remote attackers to execute arbirary code via crafted payload or opening malicious .md file. | [
"cpe:2.3:a:jbt:live_\\(github-flavored\\)_markdown_editor:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | null |
|
GHSA-gmfm-xrwm-phqh | A race condition vulnerability Palo Alto Networks GlobalProtect app on Windows allows a local limited Windows user to execute programs with SYSTEM privileges. This issue can be exploited only while performing a GlobalProtect app upgrade. This issue affects: GlobalProtect app 5.0 versions earlier than GlobalProtect app 5.0.10 on Windows; GlobalProtect app 5.1 versions earlier than GlobalProtect app 5.1.4 on Windows. | [] | null | null | null | null |
|
GHSA-f5x2-xv93-4p23 | Access of Resource Using Incompatible Type in Facebook Hermes | A type confusion vulnerability when resolving properties of JavaScript objects with specially-crafted prototype chains in Facebook Hermes prior to commit fe52854cdf6725c2eaa9e125995da76e6ceb27da allows attackers to potentially execute arbitrary code via crafted JavaScript. Note that this is only exploitable if the application using Hermes permits evaluation of untrusted JavaScript. Hence, most React Native applications are not affected. | [] | null | 9.8 | null | null |
CVE-2000-0680 | The CVS 1.10.8 server does not properly restrict users from creating arbitrary Checkin.prog or Update.prog programs, which allows remote CVS committers to modify or create Trojan horse programs with the Checkin.prog or Update.prog names, then performing a CVS commit action. | [
"cpe:2.3:a:cvs:cvs:1.10.8:*:*:*:*:*:*:*"
] | null | null | null | 7.2 |
|
GHSA-hj7q-vpxf-qv3v | TikiWiki before 1.8.5 does not properly validate files that have been uploaded to the temp directory, which could allow remote attackers to upload and execute arbitrary PHP scripts, a different vulnerability than CVE-2004-1386. | [] | null | null | null | null |
|
CVE-2018-6079 | Inappropriate sharing of TEXTURE_2D_ARRAY/TEXTURE_3D data between tabs in WebGL in Google Chrome prior to 65.0.3325.146 allowed a remote attacker to leak cross-origin data via a crafted HTML page. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] | null | null | 6.5 | 4.3 |
|
GHSA-f483-r579-gvcq | SQL injection vulnerability in the InLinks plugin through 1.1 for WordPress allows authenticated users to execute arbitrary SQL commands via the "keyword" parameter to /wp-admin/options-general.php?page=inlinks/inlinks.php. | [] | null | null | 8.8 | null |
|
CVE-2023-47627 | Request smuggling in aiohttp | aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. The HTTP parser in AIOHTTP has numerous problems with header parsing, which could lead to request smuggling. This parser is only used when AIOHTTP_NO_EXTENSIONS is enabled (or not using a prebuilt wheel). These bugs have been addressed in commit `d5c12ba89` which has been included in release version 3.8.6. Users are advised to upgrade. There are no known workarounds for these issues. | [
"cpe:2.3:a:aiohttp:aiohttp:*:*:*:*:*:*:*:*"
] | null | 5.3 | null | null |
GHSA-jg5r-v2h9-wfxx | A Server-Side Request Forgery (SSRF) vulnerability was identified in the Requests utility of significant-gravitas/autogpt versions prior to v0.4.0. The vulnerability arises due to a hostname confusion between the `urlparse` function from the `urllib.parse` library and the `requests` library. A malicious user can exploit this by submitting a specially crafted URL, such as `http://localhost:\@google.com/../`, to bypass the SSRF check and perform an SSRF attack. | [] | null | null | 7.5 | null |
|
CVE-2022-40425 | The d8s-html for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-networking package. The affected version is 0.1.0. | [
"cpe:2.3:a:d8s-html_project:d8s-html:0.1.0:*:*:*:*:python:*:*"
] | null | 9.8 | null | null |
|
GHSA-p6pr-8hcj-hmv4 | IBM WebSphere Application Server 8.5 and 9.0 could allow a remote authenticated attacker, who has authorized access to the administrative console, to execute arbitrary code. Using specially crafted input, the attacker could exploit this vulnerability to execute arbitrary code on the system. IBM X-Force ID: 292641. | [] | null | 7.2 | null | null |
|
GHSA-qcpw-4x74-jfpp | Unspecified vulnerability in the decode_dds1 function in libavcodec/dfa.c in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.4, has unknown impact and attack vectors, related to an "out of array write." | [] | null | null | null | null |
|
GHSA-537h-9xcq-rw7q | CyberGhost 6.5.0.3180 for Windows suffers from a SYSTEM privilege escalation vulnerability through the "CG6Service" service. This service establishes a NetNamedPipe endpoint that allows arbitrary installed applications to connect and call publicly exposed methods. The "ConnectToVpnServer" method accepts a "connectionParams" argument that provides attacker control of the OpenVPN command line. An attacker can specify a dynamic library plugin that should run for every new VPN connection attempt. This plugin will execute code in the context of the SYSTEM user. | [] | null | null | 7.8 | null |
|
GHSA-4x54-5wgw-wc8c | The process_as_req function in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.10.x before 1.10.3 does not initialize a certain structure member, which allows remote attackers to cause a denial of service (uninitialized pointer dereference and daemon crash) or possibly execute arbitrary code via a malformed AS-REQ request. | [] | null | null | null | null |
|
PYSEC-2022-297 | null | Weak Password Requirements in GitHub repository ikus060/rdiffweb prior to 2.4.9. | [] | null | null | null | null |
GHSA-w8fp-3787-pwgj | LOYTEC electronics GmbH LINX-212 6.2.4 and LINX-151 7.2.4 are vulnerable to Insecure Permissions via dpal_config.zml file. This vulnerability allows remote attackers to disclose smtp client account credentials and bypass email authentication. | [] | null | 7.5 | null | null |
|
RHSA-2014:0564 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.2.3 update | JBossSX/PicketBox: World readable audit.log file | [
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el5"
] | null | null | null | null |
GHSA-r3g2-wgg9-9346 | Edger8r tool in the Intel SGX SDK before version 2.1.2 (Linux) and 1.9.6 (Windows) may generate code that is susceptible to a side channel potentially allowing a local user to access unauthorized information. | [] | null | null | 4.7 | null |
|
CVE-2014-6932 | The All Navalny (aka com.all.navalny) application 1.10 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [
"cpe:2.3:a:all_navalny_project:all_navalny:1.1:*:*:*:*:android:*:*"
] | null | null | null | 5.4 |
|
CVE-2024-46088 | An arbitrary file upload vulnerability in the ProductAction.entphone interface of Zhejiang University Entersoft Customer Resource Management System v2002 to v2024 allows attackers to execute arbitrary code via uploading a crafted file. | [
"cpe:2.3:a:zhejiang_university:entersoft_customer_resource_management:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
CVE-2021-24143 | AccessPress Social Icons < 1.8.1 - Authenticated SQL Injection | Unvalidated input in the AccessPress Social Icons plugin, versions before 1.8.1, did not sanitise its widget attribute, allowing accounts with post permission, such as author, to perform SQL injections. | [
"cpe:2.3:a:accesspressthemes:accesspress_social_icons:*:*:*:*:*:wordpress:*:*"
] | null | 8.8 | null | 6.5 |
GHSA-gq3f-cc5w-p8w5 | Skype for Business and Lync Spoofing Vulnerability. | [] | null | 5.3 | null | null |
|
GHSA-gxh9-cf3g-3v7f | A vulnerability in multiple Cisco Unified Communications and Contact Center Solutions products could allow an unauthenticated, remote attacker to execute arbitrary code on an affected device. This vulnerability is due to the improper processing of user-provided data that is being read into memory. An attacker could exploit this vulnerability by sending a crafted message to a listening port of an affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with the privileges of the web services user. With access to the underlying operating system, the attacker could also establish root access on the affected device. | [] | null | 9.9 | null | null |
|
GHSA-h42c-p46c-32vf | Windows Telephony Service Remote Code Execution Vulnerability | [] | null | 8.8 | null | null |
|
CVE-2025-21820 | tty: xilinx_uartps: split sysrq handling | In the Linux kernel, the following vulnerability has been resolved:
tty: xilinx_uartps: split sysrq handling
lockdep detects the following circular locking dependency:
CPU 0 CPU 1
========================== ============================
cdns_uart_isr() printk()
uart_port_lock(port) console_lock()
cdns_uart_console_write()
if (!port->sysrq)
uart_port_lock(port)
uart_handle_break()
port->sysrq = ...
uart_handle_sysrq_char()
printk()
console_lock()
The fixed commit attempts to avoid this situation by only taking the
port lock in cdns_uart_console_write if port->sysrq unset. However, if
(as shown above) cdns_uart_console_write runs before port->sysrq is set,
then it will try to take the port lock anyway. This may result in a
deadlock.
Fix this by splitting sysrq handling into two parts. We use the prepare
helper under the port lock and defer handling until we release the lock. | [] | null | 5.5 | null | null |
CVE-2020-3238 | Cisco IOx Application Framework Arbitrary File Creation Vulnerability | A vulnerability in the Cisco Application Framework component of the Cisco IOx application environment could allow an authenticated, remote attacker to write or modify arbitrary files in the virtual instance that is running on the affected device. The vulnerability is due to insufficient input validation of user-supplied application packages. An attacker who can upload a malicious package within Cisco IOx could exploit the vulnerability to modify arbitrary files. The impacts of a successful exploit are limited to the scope of the virtual instance and do not affect the device that is hosting Cisco IOx. | [
"cpe:2.3:a:cisco:iox:*:*:*:*:*:*:*:*"
] | null | null | 8.1 | null |
GHSA-hvp5-54cx-25q6 | An exploitable integer overflow vulnerability exists within the MPEG-4 decoding functionality of the GPAC Project on Advanced Content library v1.0.1. A specially crafted MPEG-4 input can cause an integer overflow when the library encounters an atom using the “trun” FOURCC code due to unchecked arithmetic resulting in a heap-based buffer overflow that causes memory corruption. An attacker can convince a user to open a video to trigger this vulnerability. | [] | null | 8.8 | null | null |
|
GHSA-r74c-v46j-w38f | JFS (JFS3.1 and OnlineJFS) in HP-UX 10.20, 11.00, and 11.04 does not properly implement the sticky bit functionality, which could allow attackers to bypass intended restrictions on filesystems. | [] | null | null | null | null |
|
GHSA-5m36-5rvg-3hmj | A buffer overflow vulnerability in mj_color_correct() in contrib/japanese/gdevmjc.c of Artifex Software GhostScript v9.50 allows a remote attacker to cause a denial of service via a crafted PDF file. This is fixed in v9.51. | [] | null | 5.5 | null | null |
|
GHSA-hgxr-h254-rmg5 | XnView Classic for Windows Version 2.43 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .dwg file, related to "Data from Faulting Address may be used as a return value starting at CADImage+0x0000000000285e9d." | [] | null | null | 7.8 | null |
|
CVE-2022-22464 | IBM Security Access Manager Appliance 10.0.0.0, 10.0.1.0, 10.0.2.0, and 10.0.3.0 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 225081. | [
"cpe:2.3:a:ibm:security_verify_access:10.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_verify_access:10.0.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_verify_access:10.0.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_verify_access:10.0.3.0:*:*:*:*:*:*:*"
] | null | null | 5.9 | null |
|
CVE-2006-4489 | Multiple PHP remote file inclusion vulnerabilities in MiniBill 2006-07-14 (1.2.2) allow remote attackers to execute arbitrary PHP code via (1) a URL in the config[include_dir] parameter in actions/ipn.php or (2) an FTP path in the config[plugin_dir] parameter in include/initPlugins.php. | [
"cpe:2.3:a:ultrize:minibill:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2020-7193 | A ictexpertcsvdownload expression language injection remote code execution vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07). | [
"cpe:2.3:a:hp:intelligent_management_center:*:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:-:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0501:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0503:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0503p02:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0504:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0504p02:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0504p04:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0504p2:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0504p4:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0506:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0506p02:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0506p03:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0506p07:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0506p09:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0605:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0605h02:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0605h05:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0605h07:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0605h08:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0605h09:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0605p04:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0605p06:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0701:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0702:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0703:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0703h01:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0705:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0705p02:*:*:*:*:*:*"
] | null | 8.8 | null | 9 |
|
RHSA-2014:1051 | Red Hat Security Advisory: flash-plugin security update | flash-plugin: multiple code execution or security bypass flaws (APSB14-18) flash-plugin: multiple code execution or security bypass flaws (APSB14-18) flash-plugin: multiple code execution or security bypass flaws (APSB14-18) flash-plugin: multiple code execution or security bypass flaws (APSB14-18) flash-plugin: multiple code execution or security bypass flaws (APSB14-18) flash-plugin: multiple code execution or security bypass flaws (APSB14-18) flash-plugin: multiple code execution or security bypass flaws (APSB14-18) flash-plugin: multiple code execution or security bypass flaws (APSB14-18) | [
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
CVE-2015-4997 | IBM WebSphere Portal 8.5.0 before CF08 allows remote attackers to bypass intended access restrictions via a crafted request. | [
"cpe:2.3:a:ibm:websphere_portal:8.5.0.0:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
CVE-2018-7489 | FasterXML jackson-databind before 2.7.9.3, 2.8.x before 2.8.11.1 and 2.9.x before 2.9.5 allows unauthenticated remote code execution because of an incomplete fix for the CVE-2017-7525 deserialization flaw. This is exploitable by sending maliciously crafted JSON input to the readValue method of the ObjectMapper, bypassing a blacklist that is ineffective if the c3p0 libraries are available in the classpath. | [
"cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_billing_and_revenue_management:7.5:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_billing_and_revenue_management:12.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_instant_messaging_server:10.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.4.19:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.1.2:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 |
|
GHSA-w825-9fqw-x7vm | ** DISPUTED ** main/streams/plain_wrapper.c in PHP 5.3.x before 5.3.1 does not recognize the safe_mode_include_dir directive, which allows context-dependent attackers to have an unknown impact by triggering the failure of PHP scripts that perform include or require operations, as demonstrated by a script that attempts to perform a require_once on a file in a standard library directory. NOTE: a reliable third party reports that this is not a vulnerability, because it results in a more restrictive security policy. | [] | null | null | null | null |
|
CVE-2024-48845 | Weak Password Rules/Strength | Weak Password Reset Rules vulnerabilities where found providing a potiential for the storage of weak passwords that could facilitate unauthorized admin/application access.
Affected products:
ABB ASPECT - Enterprise v3.07.02;
NEXUS Series v3.07.02;
MATRIX Series v3.07.02 | [
"cpe:2.3:a:abb:aspect_enterprise:*:*:*:*:*:*:*:*",
"cpe:2.3:a:abb:nexus_series:*:*:*:*:*:*:*:*",
"cpe:2.3:a:abb:matrix_series:*:*:*:*:*:*:*:*"
] | 9.3 | 9.4 | null | null |
CVE-2015-0593 | The Zone-Based Firewall implementation in Cisco IOS 12.4(122)T and earlier does not properly manage session-object structures, which allows remote attackers to cause a denial of service (device reload) via crafted network traffic, aka Bug ID CSCul65003. | [
"cpe:2.3:o:cisco:ios:15.4\\(1.12\\)t:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(1.19\\)t:*:*:*:*:*:*:*"
] | null | null | null | 7.1 |
|
CVE-2021-30744 | Description: A cross-origin issue with iframe elements was addressed with improved tracking of security origins. This issue is fixed in tvOS 14.6, iOS 14.6 and iPadOS 14.6, Safari 14.1.1, macOS Big Sur 11.4, watchOS 7.5. Processing maliciously crafted web content may lead to universal cross site scripting. | [
"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 |
|
GHSA-v528-vhc9-x7fv | Adobe Commerce versions 2.4.8, 2.4.7-p5, 2.4.6-p10, 2.4.5-p12, 2.4.4-p13 and earlier are affected by an Improper Access Control vulnerability that could result in privilege escalation. A low privileged attacker could leverage this vulnerability to bypass security measures and gain unauthorized read access. Exploitation of this issue does not require user interaction. | [] | null | 6.5 | null | null |
|
CVE-2025-1104 | D-Link DHP-W310AV authentication spoofing | A vulnerability has been found in D-Link DHP-W310AV 1.04 and classified as critical. This vulnerability affects unknown code. The manipulation leads to authentication bypass by spoofing. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. | [] | 6.9 | 7.3 | 7.3 | 7.5 |
RHSA-2020:5663 | Red Hat Security Advisory: mariadb:10.3 security, bug fix, and enhancement update | mysql: InnoDB unspecified vulnerability (CPU Jan 2019) mysql: Server: DDL unspecified vulnerability (CPU Jan 2019) mysql: Server: Replication unspecified vulnerability (CPU Apr 2019) mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2019) mysql: InnoDB unspecified vulnerability (CPU Apr 2019) mysql: Server: Pluggable Auth unspecified vulnerability (CPU Jul 2019) mysql: Server: Security: Privileges unspecified vulnerability (CPU Jul 2019) mysql: Server: XML unspecified vulnerability (CPU Jul 2019) mysql: InnoDB unspecified vulnerability (CPU Jul 2019) mysql: Server: Parser unspecified vulnerability (CPU Jul 2019) mysql: InnoDB unspecified vulnerability (CPU Oct 2019) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2019) mysql: C API unspecified vulnerability (CPU Jan 2020) mysql: C API unspecified vulnerability (CPU Apr 2020) mysql: InnoDB unspecified vulnerability (CPU Apr 2020) mysql: Server: DML unspecified vulnerability (CPU Apr 2020) mysql: Server: Stored Procedure unspecified vulnerability (CPU Apr 2020) mysql: InnoDB unspecified vulnerability (CPU Apr 2020) mysql: C API unspecified vulnerability (CPU Apr 2020) mariadb-connector-c: Improper validation of content in a OK packet received from server mysql: Server: FTS unspecified vulnerability (CPU Oct 2020) mysql: InnoDB unspecified vulnerability (CPU Oct 2020) mysql: Server: FTS unspecified vulnerability (CPU Oct 2020) mysql: Server: Locking unspecified vulnerability (CPU Oct 2020) mariadb: Insufficient SST method name check leading to code injection in mysql-wsrep mysql: C API unspecified vulnerability (CPU Jan 2021) mysql: InnoDB unspecified vulnerability (CPU Jan 2021) mysql: Server: Parser unspecified vulnerability (CPU Apr 2021) mysql: InnoDB unspecified vulnerability (CPU Apr 2021) | [
"cpe:/a:redhat:rhel_e4s:8.0::appstream"
] | null | 4.9 | 3.7 | null |
GHSA-qch4-jmf8-xvp7 | Cross-site Scripting in librenms/librenms | Cross-site Scripting (XSS) - Stored in GitHub repository librenms/librenms prior to 22.10.0. | [] | null | 5.4 | null | null |
CVE-2007-2207 | SQL injection vulnerability in contact/index.php in Ripe Website Manager 0.8.4 and earlier allows remote attackers to execute arbitrary SQL commands via the ripeformpost parameter. | [
"cpe:2.3:a:ripe_website_manager:ripe_website_manager:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-v62q-cm8m-9jhx | In the Linux kernel, the following vulnerability has been resolved:accel/ivpu: Fix PM related deadlocks in MS IOCTLsPrevent runtime resume/suspend while MS IOCTLs are in progress.
Failed suspend will call ivpu_ms_cleanup() that would try to acquire
file_priv->ms_lock, which is already held by the IOCTLs. | [] | null | null | null | null |
|
GHSA-6fww-8m5w-mh7h | An issue was discovered in JIZHI CMS 1.9.4. There is a CSRF vulnerability that can add an admin account via index, /admin.php/Admin/adminadd.html | [] | null | 8.8 | null | null |
|
GHSA-xxf2-85hh-x424 | Cross-site scripting (XSS) vulnerability in the Search Site in CMScout 2.09, and possibly other versions, allows remote attackers to inject arbitrary web script or HTML via the search parameter. NOTE: some of these details are obtained from third party information. | [] | null | null | null | null |
|
GHSA-chrm-v6g8-h3f6 | The ReadVICARImage function in coders/vicar.c in ImageMagick 6.x before 6.9.0-5 Beta allows remote attackers to cause a denial of service (infinite loop) via a crafted VICAR file. | [] | null | 6.5 | null | null |
|
CVE-2017-14105 | HiveManager Classic through 8.1r1 allows arbitrary JSP code execution by modifying a backup archive before a restore, because the restore feature does not validate pathnames within the archive. An authenticated, local attacker - even restricted as a tenant - can add a jsp at HiveManager/tomcat/webapps/hm/domains/$yourtenant/maps (it will be exposed at the web interface). | [
"cpe:2.3:a:aerohive:hivemanager_classic:8.0r1:*:*:*:*:*:*:*",
"cpe:2.3:a:aerohive:hivemanager_classic:8.1r1:*:*:*:*:*:*:*"
] | null | null | 7.8 | 7.2 |
|
CVE-2017-13020 | The VTP parser in tcpdump before 4.9.2 has a buffer over-read in print-vtp.c:vtp_print(). | [
"cpe:2.3:a:tcpdump:tcpdump:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
|
GHSA-vqf5-2xx6-9wfm | GitHub PAT written to debug artifacts | Impact summaryIn some circumstances, debug artifacts uploaded by the CodeQL Action after a failed code scanning workflow run may contain the environment variables from the workflow run, including any secrets that were exposed as environment variables to the workflow. Users with read access to the repository would be able to access this artifact, containing any secrets from the environment.For some affected workflow runs, the exposed environment variables in the debug artifacts included a valid `GITHUB_TOKEN` for the workflow run, which has access to the repository in which the workflow ran, and all the permissions specified in the workflow or job. The `GITHUB_TOKEN` is valid until the job completes or 24 hours has elapsed, whichever comes first.Environment variables are exposed only from workflow runs that satisfy all of the following conditions:Code scanning workflow configured to scan the Java/Kotlin languages.Running in a repository containing Kotlin source code.Running with [debug artifacts enabled](https://docs.github.com/en/code-security/code-scanning/troubleshooting-code-scanning/logs-not-detailed-enough).Using CodeQL Action versions <= 3.28.2, and CodeQL CLI versions >= 2.9.2 (May 2022) and <= 2.20.2.The workflow run fails before the CodeQL database is finalized within the `github/codeql-action/analyze` step.Running in any GitHub environment: GitHub.com, GitHub Enterprise Cloud, and GitHub Enterprise Server. (Note: artifacts are only accessible to users within the same GitHub environment with access to the scanned repo.)The `GITHUB_TOKEN` exposed in this way would only have been valid for workflow runs that satisfy all of the following conditions, in addition to the conditions above:Using CodeQL Action versions >= 3.26.11 (October 2024) and <= 3.28.2, or >= 2.26.11 and < 3.Running in GitHub.com or GitHub Enterprise Cloud only (not valid on GitHub Enterprise Server).In rare cases during advanced setup, logging of environment variables may also occur during database creation of Java, Swift, and C/C++. Please read the corresponding CodeQL CLI advisory [GHSA-gqh3-9prg-j95m](https://github.com/github/codeql-cli-binaries/security/advisories/GHSA-gqh3-9prg-j95m) for more details.Impact detailsIn CodeQL CLI versions >= 2.9.2 and <= 2.20.2, the CodeQL Kotlin extractor logs all environment variables by default into an intermediate file during the process of creating a CodeQL database for Kotlin code.
This is a part of the CodeQL CLI and is invoked by the CodeQL Action for analyzing Kotlin repositories.
On Actions, the environment variables logged include GITHUB_TOKEN, which grants permissions to the repository being scanned.The intermediate file containing environment variables is deleted when finalizing the database, so it is not included in a successfully created database. It is, however, included in the debug artifact that is uploaded on a failed analysis run if the CodeQL Action was invoked in debug mode.Therefore, under these specific circumstances (incomplete database creation using the CodeQL Action in debug mode) an attacker with access to the debug artifact would gain unauthorized access to repository secrets from the environment, including both the `GITHUB_TOKEN` and any user-configured secrets made available via environment variables.The impact of the `GITHUB_TOKEN` leaked in this environment is limited:For workflows on GitHub.com and GitHub Enterprise Cloud using CodeQL Action versions >= 3.26.11 and <= 3.28.2, or >= 2.26.11 and < 3, which in turn use the `actions/artifacts v4` library, the debug artifact is uploaded before the workflow job completes. During this time the `GITHUB_TOKEN` is still valid, providing an opportunity for attackers to gain access to the repository.For all other workflows, the debug artifact is uploaded after the workflow job completes, at which point the leaked `GITHUB_TOKEN` has been revoked and cannot be used to access the repository.MitigationsUpdate to CodeQL Action version 3.28.3 or later, or CodeQL CLI version 2.20.3 or later.PatchesThis vulnerability has been fixed in CodeQL Action version 3.28.3, which no longer uploads database artifacts in debug mode.
This vulnerability will be fixed in CodeQL CLI version 2.20.3, in which database creation for all languages no longer logs the complete environment by default.References[Pull request that bundled CodeQL CLI 2.9.2 with Kotlin extractor environment variable logging ](https://github.com/github/codeql-action/pull/1074)[Pull request that introduced the `actions/artifacts v4` library, allowing for `GITHUB_TOKEN` exposure in the CodeQL Action debug artifacts before the token was revoked](https://github.com/github/codeql-action/pull/2482)[Related security advisory for the CodeQL CLI](https://github.com/github/codeql-cli-binaries/security/advisories/GHSA-gqh3-9prg-j95m) | [] | 7.1 | null | null | null |
GHSA-6jpv-gvwg-xgwg | Multiple SQL injection vulnerabilities in the Web-Dorado ECommerce WD (com_ecommercewd) component 1.2.5 for Joomla! allow remote attackers to execute arbitrary SQL commands via the (1) search_category_id, (2) sort_order, or (3) filter_manufacturer_ids in a displayproducts action to index.php. | [] | null | null | null | null |
|
CVE-2023-50102 | JFinalcms 5.0.0 is vulnerable to Cross Site Scripting (XSS). | [
"cpe:2.3:a:jfinalcms_project:jfinalcms:5.0.0:*:*:*:*:*:*:*"
] | null | 5.4 | null | null |
|
GHSA-g8fr-rjp2-vvq5 | FileProtection Express 1.0.1 and earlier allows remote attackers to bypass authentication via a cookie with an Admin value of 1. | [] | null | null | null | null |
|
CVE-2018-17977 | The Linux kernel 4.14.67 mishandles certain interaction among XFRM Netlink messages, IPPROTO_AH packets, and IPPROTO_IP packets, which allows local users to cause a denial of service (memory consumption and system hang) by leveraging root access to execute crafted applications, as demonstrated on CentOS 7. | [
"cpe:2.3:o:linux:linux_kernel:4.14.67:*:*:*:*:*:*:*"
] | null | null | 4.4 | 4.9 |
|
GHSA-5q35-728m-23rm | cPanel before 80.0.5 allows demo accounts to execute arbitrary code via ajax_maketext_syntax_util.pl (SEC-498). | [] | null | null | null | null |
|
GHSA-vqx8-mvcx-mx39 | Cross Site Request Forgery vulnerability in 07FLYCMS v.1.3.9 allows a remote attacker to execute arbitrary code via the id parameter of the del.html component. | [] | null | 9.6 | null | null |
|
GHSA-c87m-qf5q-jcgf | In the Linux kernel, the following vulnerability has been resolved:scsi: ufs: core: Improve SCSI abort handlingThe following has been observed on a test setup:WARNING: CPU: 4 PID: 250 at drivers/scsi/ufs/ufshcd.c:2737 ufshcd_queuecommand+0x468/0x65c
Call trace:
ufshcd_queuecommand+0x468/0x65c
scsi_send_eh_cmnd+0x224/0x6a0
scsi_eh_test_devices+0x248/0x418
scsi_eh_ready_devs+0xc34/0xe58
scsi_error_handler+0x204/0x80c
kthread+0x150/0x1b4
ret_from_fork+0x10/0x30That warning is triggered by the following statement:Fix this warning by clearing lrbp->cmd from the abort handler. | [] | null | null | null | null |
|
GHSA-c2gg-rrhc-fvvg | Magento 2 Community Edition Cryptographic Flaw | A cryptograhic flaw exists in Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2. A weak cryptograhic mechanism is used to generate the intialization vector in multiple security relevant contexts. | [] | null | null | 7.5 | null |
CVE-2011-3246 | CFNetwork in Apple iOS before 5.0.1 and Mac OS X 10.7 before 10.7.2 does not properly parse URLs, which allows remote attackers to trigger visits to unintended web sites, and transmission of cookies to unintended web sites, via a crafted (1) http or (2) https URL. | [
"cpe:2.3:o:apple:mac_os_x:10.7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.7.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.7.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:3.0:-:iphone:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:3.1:-:iphone:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:3.1:-:ipodtouch:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:3.1.2:-:iphone:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:3.1.3:-:iphone:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:3.2:-:iphone:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:3.2:-:ipodtouch:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:3.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:3.2.1:-:ipad:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:3.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.0:-:iphone:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.0:-:ipodtouch:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.0.1:-:iphone:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.0.1:-:ipodtouch:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.2.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.2.8:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.3.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.3.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.3.5:-:ipad:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.3.5:-:ipodtouch:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2020-15799 | A vulnerability has been identified in SCALANCE X-200 switch family (incl. SIPLUS NET variants) (All versions < V5.2.5), SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) (All versions < V5.5.0). The vulnerability could allow an unauthenticated attacker to reboot the device over the network by using special urls from integrated web server of the affected products. | [
"cpe:2.3:o:siemens:scalance_x200-4pirt_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_x200-4pirt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_x201-3pirt_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_x201-3pirt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_x202-2irt_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_x202-2irt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_x202-2pirt_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_x202-2pirt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_x202-2pirt_siplus_net_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_x202-2pirt_siplus_net:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_x204irt_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_x204irt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_x307-3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_x307-3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_x307-3ld_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_x307-3ld:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_x308-2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_x308-2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_x308-2ld_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_x308-2ld:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_x308-2lh_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_x308-2lh:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_x308-2lh\\+_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_x308-2lh\\+:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_x308-2m_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_x308-2m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_x308-2m_ts_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_x308-2m_ts:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_x310_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_x310:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_x310fe_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_x310fe:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_x320-1fe_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_x320-1fe:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_x320-3ldfe_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_x320-3ldfe:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xb205-3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xb205-3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xb205-3ld_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xb205-3ld:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xb208_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xb208:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xb213-3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xb213-3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xb213-3ld_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xb213-3ld:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xb216_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xb216:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xc206-2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xc206-2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xc206-2g_poe__firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xc206-2g_poe_:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xc206-2g_poe_eec_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xc206-2g_poe_eec:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xc206-2sfp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xc206-2sfp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xc206-2sfp_eec_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xc206-2sfp_eec:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xc206-2sfp_g_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xc206-2sfp_g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xc206-2sfp_g_\\(e\\/ip\\)_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xc206-2sfp_g_\\(e\\/ip\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xc206-2sfp_g_eec_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xc206-2sfp_g_eec:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xc208_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xc208:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xc208eec_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xc208eec:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xc208g_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xc208g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xc208g_\\(e\\/ip\\)_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xc208g_\\(e\\/ip\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xc208g_eec_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xc208g_eec:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xc208g_poe_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xc208g_poe:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xc216_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xc216:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xc216-4c_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xc216-4c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xc216-4c_g_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xc216-4c_g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xc216-4c_g_\\(e\\/ip\\)_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xc216-4c_g_\\(e\\/ip\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xc216-4c_g_eec_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xc216-4c_g_eec:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xc216eec_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xc216eec:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xc224-4c_g__firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xc224-4c_g_:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xc224-4c_g_\\(e\\/ip\\)_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xc224-4c_g_\\(e\\/ip\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xc224-4c_g_eec_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xc224-4c_g_eec:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xc224__firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xc224_:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xf201-3p_irt_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xf201-3p_irt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xf202-2p_irt_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xf202-2p_irt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xf204_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xf204:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xf204-2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xf204-2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xf204-2ba_dna_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xf204-2ba_dna:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xf204-2ba_irt_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xf204-2ba_irt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xf204_dna_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xf204_dna:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xf204irt_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xf204irt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xf206-1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xf206-1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xf208_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xf208:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xp208_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xp208:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xp208_\\(eip\\)_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xp208_\\(eip\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xp208eec_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xp208eec:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xp208poe_eec_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xp208poe_eec:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xp216_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xp216:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xp216_\\(eip\\)_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xp216_\\(eip\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xp216eec_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xp216eec:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xp216poe_eec_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xp216poe_eec:-:*:*:*:*:*:*:*"
] | null | 6.5 | null | 7.1 |
|
GHSA-mwm5-47gq-45p5 | Multiple SQL injection vulnerabilities in search_result.cfm in Jobbex JobSite allow remote attackers to execute arbitrary SQL commands via the (1) jobcountryid and (2) jobstateid parameters. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | [] | null | null | null | null |
|
RHSA-2021:5238 | Red Hat Security Advisory: virt:rhel and virt-devel:rhel security update | QEMU: off-by-one error in mode_sense_page() in hw/scsi/scsi-disk.c QEMU: net: e1000: infinite loop while processing transmit descriptors | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 3.2 | null | null |
GHSA-mv6q-6xx6-cmh5 | Adobe Audition version 24.0 (and earlier) and 23.6.1 (and earlier) are affected by an Access of Uninitialized Pointer vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [] | null | 5.5 | null | null |
|
GHSA-fr6v-xvf6-fpc3 | A buffer overflow vulnerability exists in Delta Electronics Delta Industrial Automation DOPSoft version 2 when parsing the wKPFStringLen field of a DPS file. An anonymous attacker can exploit this vulnerability by enticing a user to open a specially crafted DPS file to achieve code execution. | [] | null | 6.3 | null | null |
|
CVE-2020-9944 | An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in macOS Big Sur 11.0.1, watchOS 7.0, tvOS 14.0, iOS 14.0 and iPadOS 14.0. An application may be able to read restricted memory. | [
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:-:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-001:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-002:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-004:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-005:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-006:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-001:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-002:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-003:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-004:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-005:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-006:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | 4.3 |
|
CVE-2016-10200 | Race condition in the L2TPv3 IP Encapsulation feature in the Linux kernel before 4.8.14 allows local users to gain privileges or cause a denial of service (use-after-free) by making multiple bind system calls without properly ascertaining whether a socket has the SOCK_ZAPPED status, related to net/l2tp/l2tp_ip.c and net/l2tp/l2tp_ip6.c. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*"
] | null | 7 | null | 6.9 |
|
GHSA-wf22-79v6-f4wh | A vulnerability in the web interface of the Cisco Secure Access Control System (ACS) could allow an unauthenticated, remote attacker to disclose sensitive information. More Information: CSCvc04854. Known Affected Releases: 5.8(2.5). | [] | null | null | 7.5 | null |
|
CVE-2014-0146 | The qcow2_open function in the (block/qcow2.c) in QEMU before 1.7.2 and 2.x before 2.0.0 allows local users to cause a denial of service (NULL pointer dereference) via a crafted image which causes an error, related to the initialization of the snapshot_offset and nb_snapshots fields. | [
"cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:2.0.0:rc0:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:2.0.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:2.0.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:2.0.0:rc3:*:*:*:*:*:*"
] | null | null | 5.5 | 1.9 |
|
RHSA-2022:1394 | Red Hat Security Advisory: Red Hat Ceph Storage 3 Security and Bug Fix update | ceph: Unauthorized global_id reuse in cephx | [
"cpe:/a:redhat:ceph_storage:3::el7"
] | null | 8 | null | null |
CVE-2022-48674 | erofs: fix pcluster use-after-free on UP platforms | In the Linux kernel, the following vulnerability has been resolved:
erofs: fix pcluster use-after-free on UP platforms
During stress testing with CONFIG_SMP disabled, KASAN reports as below:
==================================================================
BUG: KASAN: use-after-free in __mutex_lock+0xe5/0xc30
Read of size 8 at addr ffff8881094223f8 by task stress/7789
CPU: 0 PID: 7789 Comm: stress Not tainted 6.0.0-rc1-00002-g0d53d2e882f9 #3
Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011
Call Trace:
<TASK>
..
__mutex_lock+0xe5/0xc30
..
z_erofs_do_read_page+0x8ce/0x1560
..
z_erofs_readahead+0x31c/0x580
..
Freed by task 7787
kasan_save_stack+0x1e/0x40
kasan_set_track+0x20/0x30
kasan_set_free_info+0x20/0x40
__kasan_slab_free+0x10c/0x190
kmem_cache_free+0xed/0x380
rcu_core+0x3d5/0xc90
__do_softirq+0x12d/0x389
Last potentially related work creation:
kasan_save_stack+0x1e/0x40
__kasan_record_aux_stack+0x97/0xb0
call_rcu+0x3d/0x3f0
erofs_shrink_workstation+0x11f/0x210
erofs_shrink_scan+0xdc/0x170
shrink_slab.constprop.0+0x296/0x530
drop_slab+0x1c/0x70
drop_caches_sysctl_handler+0x70/0x80
proc_sys_call_handler+0x20a/0x2f0
vfs_write+0x555/0x6c0
ksys_write+0xbe/0x160
do_syscall_64+0x3b/0x90
The root cause is that erofs_workgroup_unfreeze() doesn't reset to
orig_val thus it causes a race that the pcluster reuses unexpectedly
before freeing.
Since UP platforms are quite rare now, such path becomes unnecessary.
Let's drop such specific-designed path directly instead. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.0:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.0:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.0:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.0:rc4:*:*:*:*:*:*"
] | null | 6.2 | null | null |
RHSA-2024:0798 | Red Hat Security Advisory: Red Hat Single Sign-On 7.6.7 security update on RHEL 7 | guava: insecure temporary directory creation keycloak: reflected XSS via wildcard in OIDC redirect_uri keycloak: redirect_uri validation bypass keycloak: Log Injection during WebAuthn authentication or registration keycloak: open redirect via "form_post.jwt" JARM response mode jetty-server: OutOfMemoryError for large multipart without filename read via request.getParameter() jetty-server: Cookie parsing of quoted values can exfiltrate values from other cookies santuario: Private Key disclosure in debug-log output | [
"cpe:/a:redhat:red_hat_single_sign_on:7.6::el7"
] | null | 6.5 | null | null |
CVE-2023-32144 | D-Link DAP-1360 webproc COMM_MakeCustomMsg Stack-based Buffer Overflow Remote Code Execution Vulnerability | D-Link DAP-1360 webproc COMM_MakeCustomMsg Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DAP-1360 routers. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the handling of requests to the /cgi-bin/webproc endpoint. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root.
. Was ZDI-CAN-18454. | [
"cpe:2.3:o:dlink:dap-1360_firmware:-:*:*:*:*:*:*:*"
] | null | null | 8.8 | null |
GHSA-8r2r-g3fq-w4v3 | Covid-19 Travel Pass Management System v1.0 is vulnerable to SQL Injection via /ctpms/admin/applications/update_status.php?id=. | [] | null | 7.2 | null | null |
|
GHSA-9rxg-g79x-598m | The GiveWP – Donation Plugin and Fundraising Platform WordPress plugin before 2.12.0 did not escape the Donation Level setting of its Donation Forms, allowing high privilege users to use Cross-Site Scripting payloads in them. | [] | null | null | null | null |
|
GHSA-m2wv-mhjc-g978 | Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Web Container). Supported versions that are affected are 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle WebLogic Server accessible data as well as unauthorized access to critical data or complete access to all Oracle WebLogic Server accessible data. CVSS 3.1 Base Score 6.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N). | [] | null | null | null | null |
|
GHSA-vq39-q549-g786 | Concrete CMS vulnerable to Cross-site Scripting via multilingual report | Concrete CMS (formerly concrete5) below 8.5.10 and between 9.0.0 and 9.1.2 is vulnerable to Reflected XSS in the multilingual report due to un-sanitized output. Remediate by updating to Concrete CMS 9.1.3+ or 8.5.10+. | [] | null | 6.1 | null | null |
GHSA-72cg-9pgw-xm8h | Incorrect access control in the TransientModel framework in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier allows authenticated attackers to access data in transient records that they do not own by making an RPC call before garbage collection occurs. | [] | null | null | null | null |
|
GHSA-97rv-88gf-phvr | Apache Dubbo: Bypass deny serialize list check in Apache Dubbo | Deserialization of Untrusted Data vulnerability in Apache Dubbo.This issue only affects Apache Dubbo 3.1.5.Users are recommended to upgrade to the latest version, which fixes the issue. | [] | null | 9.8 | null | null |
CVE-2016-2796 | Heap-based buffer overflow in the graphite2::vm::Machine::Code::Code function in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted Graphite smart font. | [
"cpe:2.3:a:sil:graphite2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:38.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:38.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:38.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:38.6.1:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.8 |
|
GHSA-hhwm-5rv2-8r77 | Multiple buffer overflows in the switch_perform_substitution function in switch_regex.c in FreeSWITCH 1.2 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to the index and substituted variables. | [] | null | null | null | null |
|
CVE-2004-0481 | The logging feature in kcms_configure in the KCMS package on Solaris 8 and 9, and possibly other versions, allows local users to corrupt arbitrary files via a symlink attack on the KCS_ClogFile file. | [
"cpe:2.3:o:sun:solaris:8.0:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:9.0:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:9.0:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*"
] | null | null | null | 2.1 |
|
GHSA-457w-p2rx-36qq | The Startklar Elementor Addons plugin for WordPress is vulnerable to arbitrary file deletion in all versions up to, and including, 1.7.13. This is due to the plugin not properly validating the path of an uploaded file prior to deleting it. This makes it possible for unauthenticated attackers to delete arbitrary files, including the wp-config.php file, which can make site takeover and remote code execution possible. | [] | null | 9.1 | null | null |
|
GHSA-p2gx-629f-525f | The Genesis Blocks WordPress plugin through 3.1.3 does not properly escape attributes provided to some of its custom blocks, making it possible for users allowed to write posts (like those with the contributor role) to conduct Stored XSS attacks. | [] | null | 6.1 | null | null |
|
GHSA-gqh9-f35v-5g5x | jitsi-meet-electron (aka Jitsi Meet Electron) before 2.3.0 calls the Electron shell.openExternal function without verifying that the URL is for an http or https resource, in some circumstances. | [] | null | null | null | null |
|
GHSA-pgxq-89jq-23cm | A vulnerability classified as critical was found in SourceCodester Best Employee Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/View_user.php of the component Administrative Endpoint. The manipulation leads to improper access controls. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. | [] | 6.9 | 7.3 | null | null |
|
CVE-2008-2774 | SQL injection vulnerability in item.php in CartKeeper CKGold Shopping Cart 2.5 and 2.7 allows remote attackers to execute arbitrary SQL commands via the category_id parameter, a different vector than CVE-2007-4736. | [
"cpe:2.3:a:cartkeeper:ckgold_shopping_cart:2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:cartkeeper:ckgold_shopping_cart:2.7:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-rvm9-hwx8-hfj8 | The Wicked Folders plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on the ajax_save_state function in versions up to, and including, 2.18.16. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to invoke this function and perform actions intended for administrators such as modifying the view state of the folder structure maintained by the plugin. | [] | null | 4.3 | null | null |
|
GHSA-gq7r-crg9-j93x | An Exposure of Sensitive Information to an Unauthorized Actor vulnerability in the command-line interface (CLI) of Juniper Networks Junos OS on SRX Series devices allows a local, low-privileged user with access to the Junos CLI to view the contents of sensitive files on the file system.Through the execution of either 'show services advanced-anti-malware' or 'show services security-intelligence' command, a user with limited permissions (e.g., a low privilege login class user) can access protected files that should not be accessible to the user. These files may contain sensitive information that can be used to cause further impact to the system.This issue affects Junos OS SRX Series:All versions before 21.4R3-S8,from 22.2 before 22.2R3-S5,from 22.3 before 22.3R3-S3,from 22.4 before 22.4R3-S2,from 23.2 before 23.2R2-S1,from 23.4 before 23.4R2. | [] | 6.8 | 5.5 | null | null |
|
CVE-2016-6449 | A vulnerability in the system management of certain FireAMP system processes in Cisco FireAMP Connector Endpoint software could allow an authenticated, local attacker to stop certain protected FireAMP processes without requiring a password. Stopping certain critical processes could cause a denial of service (DoS) condition, and certain security features could no longer be available. More Information: CSCvb40597. Known Affected Releases: 1. | [
"cpe:2.3:a:cisco:fireamp_connector_endpoint_software:4.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:fireamp_connector_endpoint_software:4.4.2.10200:*:*:*:*:*:*:*"
] | null | null | 7.8 | 4.6 |
|
GHSA-g2wx-83fr-2mf4 | Remote Code Execution vulnerability in GetSimpleCMS before 3.3.16 in admin/upload.php via phar filess. | [] | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.