id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
GHSA-27vg-v28w-gqgh | A reflected XSS issue was discovered in DAViCal through 1.1.8. It echoes the action parameter without encoding. If a user visits an attacker-supplied link, the attacker can view all data the attacked user can view, as well as perform all actions in the name of the user. If the user is an administrator, the attacker can for example add a new admin user to gain full access to the application. | [] | null | 9.3 | null | null |
|
CVE-2025-26372 | A CWE-862 "Missing Authorization" in maxprofile/user-groups/routes.lua in Q-Free MaxTime less than or equal to version 2.11.0 allows an authenticated (low-privileged) attacker to remove users from groups via crafted HTTP requests. | [] | null | 7.1 | null | null |
|
GHSA-3w6h-pp32-qhj8 | Directory Traversal vulnerability in McAfee ePolicy Orchestrator (ePO) 5.3.2, 5.3.1, 5.3.0 and 5.9.0 allows administrators to use Windows alternate data streams, which could be used to bypass the file extensions, via not properly validating the path when exporting a particular XML file. | [] | null | null | 4.9 | null |
|
CVE-2018-13104 | OX App Suite 7.8.4 and earlier allows XSS. Internal reference: 58742 (Bug ID) | [
"cpe:2.3:a:open-xchange:open-xchange_appsuite:*:*:*:*:*:*:*:*"
] | null | null | 5.4 | 3.5 |
|
CVE-2016-6809 | Apache Tika before 1.14 allows Java code execution for serialized objects embedded in MATLAB files. The issue exists because Tika invokes JMatIO to do native deserialization. | [
"cpe:2.3:a:apache:nutch:2.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tika:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
|
GHSA-w798-8q87-fgc4 | Denial of service in BOOT when partition size for a particular partition is requested due to integer overflow when blocks are calculated in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables | [] | null | 4.6 | null | null |
|
GHSA-j7vw-8r54-mfcg | Microsoft Defender for Endpoint Protection Elevation of Privilege Vulnerability | [] | null | 7.8 | null | null |
|
CVE-2020-29548 | An issue was discovered in SmarterTools SmarterMail through 100.0.7537. Meddler-in-the-middle attackers can pipeline commands after a POP3 STLS command, injecting plaintext commands into an encrypted user session. | [
"cpe:2.3:a:smartertools:smartermail:*:*:*:*:*:*:*:*"
] | null | 8.1 | null | 6.8 |
|
CVE-2023-52812 | drm/amd: check num of link levels when update pcie param | In the Linux kernel, the following vulnerability has been resolved:
drm/amd: check num of link levels when update pcie param
In SR-IOV environment, the value of pcie_table->num_of_link_levels will
be 0, and num_of_levels - 1 will cause array index out of bounds | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
GHSA-3r9h-5xmh-8j4q | Missing thread synchronization primitives could have led to a data race on members of the PlaybackParams structure. This vulnerability affects Firefox < 133 and Thunderbird < 133. | [] | null | 6.5 | null | null |
|
RHSA-2016:2702 | Red Hat Security Advisory: policycoreutils security update | policycoreutils: SELinux sandbox escape via TIOCSTI ioctl | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 8.6 | null |
GHSA-f6mg-hq7f-jw2j | SSRF in Apache HTTP Server on Windows with mod_rewrite in server/vhost context, allows to potentially leak NTML hashes to a malicious server via SSRF and malicious requests.Users are recommended to upgrade to version 2.4.62 which fixes this issue. | [] | null | 9.1 | null | null |
|
GHSA-fv4r-5qcq-xxm7 | SQL injection vulnerability in the Subscription (mf_subscription) extension 0.2.2 for TYPO3 allows remote attackers to execute arbitrary SQL commands via unknown vectors. | [] | null | null | null | null |
|
CVE-2013-3175 | Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT allow remote attackers to execute arbitrary code via a malformed asynchronous RPC request, aka "Remote Procedure Call Vulnerability." | [
"cpe:2.3:o:microsoft:windows_7:*:sp1:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:*:sp1:x86:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8:-:-:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8:-:-:x86:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x86:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp2:professional:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*"
] | null | null | null | 10 |
|
CVE-2011-2238 | Unspecified vulnerability in the Database Vault component in Oracle Database Server 10.2.0.3, 10.2.0.4, 10.2.0.5, 11.1.0.7, and 11.2.0.1 allows remote authenticated users to affect integrity, related to DBMS_SYS_SQL. | [
"cpe:2.3:a:oracle:database_server:10.2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_server:10.2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_server:10.2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_server:11.1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_server:11.2.0.1:*:*:*:*:*:*:*"
] | null | null | null | 4 |
|
CVE-2004-0015 | vbox3 0.1.8 and earlier does not properly drop privileges before executing a user-provided TCL script, which allows local users to gain privileges. | [
"cpe:2.3:a:vbox3:vbox3:*:*:*:*:*:*:*:*"
] | null | null | null | 7.2 |
|
GHSA-v3ph-2q5q-cg88 | @haxtheweb/haxcms-nodejs Iframe Phishing vulnerability | SummaryIn the HAX site editor, users can create a website block to load another site in an iframe. The application allows users to supply a target URL in the website block. When the HAX site is visited, the client's browser will query the supplied URL.Affected Resources[Operations.php:868](https://github.com/haxtheweb/haxcms-php/blob/master/system/backend/php/lib/Operations.php#L868)`https://<site>/<user>/system/api/saveNode`PoCSet the URL in an iframe pointing to an attacker-controlled server running ResponderOnce another user visits the site, they are prompted to sign in.If a user inputs credentials, the username and password hash are outputted in Responder.ImpactAn authenticated attacker can create a HAX site with a website block pointing at an attacker-controlled server running Responder or a similar tool. The attacker can then conduct a phishing attack by convincing another user to visit their malicious HAX site to harvest credentials. | [] | null | 5.3 | null | null |
CVE-2018-16666 | An issue was discovered in Contiki-NG through 4.1. There is a stack-based buffer overflow in next_string in os/storage/antelope/aql-lexer.c while parsing AQL (parsing next string). | [
"cpe:2.3:o:contiki-ng:contiki-ng.:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | 4.6 |
|
GHSA-hw7v-x4gj-9m6p | SQL injection vulnerability in wuzhicms v.4.1.0 allows a remote attacker to execute arbitrary code via the Database Backup Functionality in the coreframe/app/database/admin/index.php component. | [] | null | 9.8 | null | null |
|
CVE-2016-8451 | An elevation of privilege vulnerability in the Synaptics touchscreen driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.4. Android ID: A-32178033. | [
"cpe:2.3:o:linux:linux_kernel:3.4:*:*:*:*:*:*:*"
] | null | null | 7 | 7.6 |
|
GHSA-64vq-wgg6-6rp5 | Vignette StoryServer 5 and Vignette V/6 allows remote attackers to execute arbitrary TCL code via (1) an HTTP query or cookie which is processed in the NEEDS command, or (2) an HTTP Referrer that is processed in the VALID_PATHS command. | [] | null | null | null | null |
|
CVE-2020-18392 | Stack overflow vulnerability in parse_array Cesanta MJS 1.20.1, allows remote attackers to cause a Denial of Service (DoS) via a crafted file. | [
"cpe:2.3:a:cesanta:mjs:1.20.1:*:*:*:*:*:*:*"
] | null | 5.5 | null | 4.3 |
|
GHSA-v6rf-3vh3-4jf3 | The Visual Basic macros in Microsoft Office 2007 SP3, 2010 SP2, 2013 SP1, and 2016 export a certificate-store private key during a document-save operation, which allows attackers to obtain sensitive information via unspecified vectors, aka "Microsoft Information Disclosure Vulnerability." | [] | null | null | 6.5 | null |
|
RHSA-2015:1980 | Red Hat Security Advisory: nss and nspr security update | nss: use-after-poison in sec_asn1d_parse_leaf() (MFSA 2015-133) nss: ASN.1 decoder heap overflow when decoding constructed OCTET STRING that mixes indefinite and definite length encodings (MFSA 2015-133) nspr: heap-buffer overflow in PL_ARENA_ALLOCATE (MFSA 2015-133) | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
GHSA-8rhg-98vw-7qqh | A vulnerability was found in Dreamer CMS up to 4.1.3. It has been classified as problematic. Affected is an unknown function of the file /upload/ueditorConfig?action=config. The manipulation leads to files or directories accessible. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-238632. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | [] | null | null | 3.1 | null |
|
GHSA-8p89-chvh-f3mw | curl and libcurl 7.27.0 through 7.35.0, when using the SecureTransport/Darwinssl backend, as used in in Apple OS X 10.9.x before 10.9.2, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate when accessing a URL that uses a numerical IP address, which allows man-in-the-middle attackers to spoof servers via an arbitrary valid certificate. | [] | null | null | null | null |
|
CVE-2019-13747 | Uninitialized data in rendering in Google Chrome on Android prior to 79.0.3945.79 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:x64:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:x86:*",
"cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:6.0:*:*:*:*:*:x64:*",
"cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:6.0:*:*:*:*:*:x86:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:x64:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:x86:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:x64:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:x86:*"
] | null | 8.8 | null | 6.8 |
|
GHSA-49xq-2wjp-3765 | Cross-Site Request Forgery (CSRF) vulnerability in BoLiQuan WP Clean Up plugin <= 1.2.3 versions. | [] | null | 4.3 | null | null |
|
CVE-2018-6392 | The filter_slice function in libavfilter/vf_transpose.c in FFmpeg through 3.4.1 allows remote attackers to cause a denial of service (out-of-array access) via a crafted MP4 file. | [
"cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] | null | null | 6.5 | 4.3 |
|
CVE-2023-2256 | Product Addons & Fields for WooCommerce < 32.0.7 - Reflected Cross-Site Scripting | The Product Addons & Fields for WooCommerce WordPress plugin before 32.0.7 does not sanitize and escape some URL parameters, leading to Reflected Cross-Site Scripting. | [
"cpe:2.3:a:themeisle:product_addons_\\&_fields_for_woocommerce:*:*:*:*:*:wordpress:*:*"
] | null | 6.1 | null | null |
CVE-2021-1747 | An out-of-bounds write was addressed with improved input validation. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, watchOS 7.3, tvOS 14.4, iOS 14.4 and iPadOS 14.4. Processing maliciously crafted web content may lead to code execution. | [
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:-:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-004:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-005:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-006:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-007:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-001:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-002:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-003:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-004:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-005:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-006:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-007:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:supplemental_update:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:supplemental_update_2:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:supplemental_update:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | 6.8 |
|
GHSA-448c-jjx7-6xg4 | Thread start can cause invalid memory writes to arbitrary memory location since the argument is passed by user to kernel in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile in MDM9205, MDM9640, MSM8996AU, QCA6574, QCS605, Qualcomm 215, SD 425, SD 427, SD 435, SD 439 / SD 429, SD 450, SD 625, SD 636, SD 665, SD 675, SD 712 / SD 710 / SD 670, SD 730, SD 820, SD 835, SD 845 / SD 850, SD 855, SD 8CX, SDA660, SDM439, SDM630, SDM660, SDX24, Snapdragon_High_Med_2016, SXR1130 | [] | null | null | null | null |
|
CVE-2023-32564 | An unrestricted upload of file with dangerous type vulnerability exists in Avalanche versions 6.4.1 and below that could allow an attacker to achieve a remove code execution. | [
"cpe:2.3:a:ivanti:avalanche:*:*:*:*:*:*:*:*"
] | null | null | 6.8 | null |
|
CVE-2020-17090 | Microsoft Defender for Endpoint Security Feature Bypass Vulnerability | Microsoft Defender for Endpoint Security Feature Bypass Vulnerability | [
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_2004:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_20h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1803:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1803:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_server_1909:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_1903:*:*:*:*:*:*:*:*"
] | null | 5.3 | null | null |
CVE-2010-0388 | Format string vulnerability in the WebDAV implementation in webservd in Sun Java System Web Server 7.0 Update 6 allows remote attackers to cause a denial of service (daemon crash) and possibly have unspecified other impact via format string specifiers in the encoding attribute of the XML declaration in a PROPFIND request. | [
"cpe:2.3:a:sun:java_system_web_server:7.0:update_6:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-pp27-442h-qhx9 | QEMU (aka Quick Emulator) built with the TPR optimization for 32-bit Windows guests support is vulnerable to a null pointer dereference flaw. It occurs while doing I/O port write operations via hmp interface. In that, 'current_cpu' remains null, which leads to the null pointer dereference. A user or process could use this flaw to crash the QEMU instance, resulting in DoS issue. | [] | null | 5.5 | null | null |
|
RHSA-2019:2476 | Red Hat Security Advisory: kernel security update | kernel: Missing check in fs/inode.c:inode_init_owner() does not clear SGID bit on non-directories for non-members kernel: hw: Spectre SWAPGS gadget vulnerability | [
"cpe:/o:redhat:rhel_aus:6.6::server"
] | null | null | 5.9 | null |
GHSA-7fgx-pmw9-49h5 | A flaw allowing arbitrary code execution was discovered in Kibana. An attacker with access to ML and Alerting connector features, as well as write access to internal ML indices can trigger a prototype pollution vulnerability, ultimately leading to arbitrary code execution. | [] | null | 9.1 | null | null |
|
GHSA-38pv-jq7m-mrw3 | Code injection in Ivanti Connect Secure before version 22.7R2.4 and Ivanti Policy Secure before version 22.7R1.3 allows a remote authenticated attacker with admin privileges to achieve remote code execution. | [] | null | 9.1 | null | null |
|
GHSA-94rr-f3c7-jj57 | Mozilla Firefox before 3.6.18, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 do not distinguish between cookies for two domain names that differ only in a trailing dot, which allows remote web servers to bypass the Same Origin Policy via Set-Cookie headers. | [] | null | null | null | null |
|
CVE-2011-0020 | Heap-based buffer overflow in the pango_ft2_font_render_box_glyph function in pango/pangoft2-render.c in libpango in Pango 1.28.3 and earlier, when the FreeType2 backend is enabled, allows user-assisted remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file, related to the glyph box for an FT_Bitmap object. | [
"cpe:2.3:a:gnome:pango:*:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:pango:1.28.0:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:pango:1.28.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:pango:1.28.2:*:*:*:*:*:*:*",
"cpe:2.3:a:pango:pango:0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:pango:pango:0.21:*:*:*:*:*:*:*",
"cpe:2.3:a:pango:pango:0.22:*:*:*:*:*:*:*",
"cpe:2.3:a:pango:pango:0.23:*:*:*:*:*:*:*",
"cpe:2.3:a:pango:pango:0.24:*:*:*:*:*:*:*",
"cpe:2.3:a:pango:pango:0.25:*:*:*:*:*:*:*",
"cpe:2.3:a:pango:pango:0.26:*:*:*:*:*:*:*",
"cpe:2.3:a:pango:pango:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:pango:pango:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:pango:pango:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:pango:pango:1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:pango:pango:1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:pango:pango:1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:pango:pango:1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:pango:pango:1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:pango:pango:1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:pango:pango:1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:pango:pango:1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:pango:pango:1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:pango:pango:1.12:*:*:*:*:*:*:*",
"cpe:2.3:a:pango:pango:1.13:*:*:*:*:*:*:*",
"cpe:2.3:a:pango:pango:1.14:*:*:*:*:*:*:*",
"cpe:2.3:a:pango:pango:1.15:*:*:*:*:*:*:*",
"cpe:2.3:a:pango:pango:1.16:*:*:*:*:*:*:*",
"cpe:2.3:a:pango:pango:1.17:*:*:*:*:*:*:*",
"cpe:2.3:a:pango:pango:1.18:*:*:*:*:*:*:*",
"cpe:2.3:a:pango:pango:1.19:*:*:*:*:*:*:*",
"cpe:2.3:a:pango:pango:1.20:*:*:*:*:*:*:*",
"cpe:2.3:a:pango:pango:1.21:*:*:*:*:*:*:*",
"cpe:2.3:a:pango:pango:1.22:*:*:*:*:*:*:*",
"cpe:2.3:a:pango:pango:1.23:*:*:*:*:*:*:*",
"cpe:2.3:a:pango:pango:1.24:*:*:*:*:*:*:*",
"cpe:2.3:a:pango:pango:1.25:*:*:*:*:*:*:*",
"cpe:2.3:a:pango:pango:1.26:*:*:*:*:*:*:*",
"cpe:2.3:a:pango:pango:1.27:*:*:*:*:*:*:*"
] | null | null | null | 7.6 |
|
CVE-2024-58128 | In MISP before 2.4.193, menu_custom_right_link parameters can be set via the UI (i.e., without using the CLI) and thus attackers with admin privileges can conduct XSS attacks via a global menu link. | [] | null | 5.5 | null | null |
|
CVE-2007-1820 | Nortel Networks CallPilot and Meridian Mail voicemail systems, when a mailbox has auto logon enabled, allow remote attackers to retrieve or remove messages, or reconfigure the mailbox, by spoofing Calling Number Identification (CNID, aka Caller ID). | [
"cpe:2.3:a:nortel:callpilot:*:*:*:*:*:*:*:*",
"cpe:2.3:a:nortel:meridian_mail:*:*:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
CVE-2020-35705 | Daybyday 2.1.0 allows stored XSS via the Name parameter to the New User screen. | [
"cpe:2.3:a:daybydaycrm:daybyday:2.1.0:*:*:*:*:*:*:*"
] | null | 5.4 | null | 3.5 |
|
GHSA-6h6q-fm45-w3hv | mupdf v1.23.9 was discovered to contain a memory leak via the menuEntry variable in the glutAddMenuEntry function. | [] | null | 7.5 | null | null |
|
CVE-2025-22146 | Improper authentication on SAML SSO process allows user impersonation in sentry | Sentry is a developer-first error tracking and performance monitoring tool. A critical vulnerability was discovered in the SAML SSO implementation of Sentry. It was reported to us via our private bug bounty program. The vulnerability allows an attacker to take over any user account by using a malicious SAML Identity Provider and another organization on the same Sentry instance. The victim email address must be known in order to exploit this vulnerability. The Sentry SaaS fix was deployed on Jan 14, 2025. For self hosted users; if only a single organization is allowed `(SENTRY_SINGLE_ORGANIZATION = True)`, then no action is needed. Otherwise, users should upgrade to version 25.1.0 or higher. There are no known workarounds for this vulnerability. | [] | null | 9.1 | null | null |
CVE-2024-30529 | WordPress Tainacan plugin <= 0.20.7 - Broken Access Control vulnerability | Missing Authorization vulnerability in Tainacan.Org Tainacan.This issue affects Tainacan: from n/a through 0.20.7. | [
"cpe:2.3:a:tainacan:tainacan:*:*:*:*:*:wordpress:*:*"
] | null | 5.3 | null | null |
CVE-2023-44142 | WordPress Inactive Logout plugin <= 3.2.2 - Broken Access Control vulnerability | Missing Authorization vulnerability in Inactive Logout Inactive Logout allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Inactive Logout: from n/a through 3.2.2. | [] | null | 5.4 | null | null |
CVE-2018-16487 | A prototype pollution vulnerability was found in lodash <4.17.11 where the functions merge, mergeWith, and defaultsDeep can be tricked into adding or modifying properties of Object.prototype. | [
"cpe:2.3:a:lodash:lodash:*:*:*:*:*:node.js:*:*"
] | null | 5.6 | null | 6.8 |
|
RHSA-2021:0161 | Red Hat Security Advisory: postgresql:10 security update | postgresql: Reconnection can downgrade connection security settings postgresql: Multiple features escape "security restricted operation" sandbox postgresql: psql's \gset allows overwriting specially treated variables | [
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 7.5 | null | null |
GHSA-26q8-whgc-65w9 | gpu/blink/webgraphicscontext3d_impl.cc in the WebGL implementation in Google Chrome before 42.0.2311.90 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted WebGL program that triggers a state inconsistency. | [] | null | null | null | null |
|
GHSA-2hhh-gxpg-w8vr | The DNS server in Microsoft Windows Server 2003 SP2 and Windows Server 2008 SP2, R2, and R2 SP1 does not properly initialize memory, which allows remote attackers to cause a denial of service (service outage) via a query for a nonexistent domain, aka "DNS Uninitialized Memory Corruption Vulnerability." | [] | null | null | null | null |
|
CVE-2006-3363 | PHP remote file inclusion vulnerability in index.php in the Glossaire module 1.7 for Xoops allows remote attackers to execute arbitrary PHP code via a URL in the pa parameter. | [
"cpe:2.3:a:xoops:xoops_glossaire_module:1.7:*:*:*:*:*:*:*"
] | null | null | null | 5.1 |
|
CVE-2024-30370 | RARLAB WinRAR Mark-Of-The-Web Bypass Vulnerability | RARLAB WinRAR Mark-Of-The-Web Bypass Vulnerability. This vulnerability allows remote attackers to bypass the Mark-Of-The-Web protection mechanism on affected installations of RARLAB WinRAR. User interaction is required to exploit this vulnerability in that the target must perform a specific action on a malicious page.
The specific flaw exists within the archive extraction functionality. A crafted archive entry can cause the creation of an arbitrary file without the Mark-Of-The-Web. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current user. Was ZDI-CAN-23156. | [] | null | null | 4.3 | null |
RHSA-2018:2254 | Red Hat Security Advisory: java-1.7.0-oracle security update | JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (Libraries) JDK: unspecified vulnerability fixed in 7u191, 8u181, and 10.0.2 (JavaFX) OpenJDK: insufficient index validation in PatternSyntaxException getMessage() (Concurrency, 8199547) JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (JSSE) | [
"cpe:/a:redhat:rhel_extras_oracle_java:7"
] | null | null | 5.9 | null |
CVE-2022-24774 | Improper Input Validation leading to Path Traversal in CycloneDX BOM Repository Server | CycloneDX BOM Repository Server is a bill of materials (BOM) repository server for distributing CycloneDX BOMs. CycloneDX BOM Repository Server before version 2.0.1 has an improper input validation vulnerability leading to path traversal. A malicious user may potentially exploit this vulnerability to create arbitrary directories or a denial of service by deleting arbitrary directories. The vulnerability is resolved in version 2.0.1. The vulnerability is not exploitable with the default configuration with the post and delete methods disabled. This can be configured by modifying the `appsettings.json` file, or alternatively, setting the environment variables `ALLOWEDMETHODS__POST` and `ALLOWEDMETHODS__DELETE` to `false`. | [
"cpe:2.3:a:cyclonedx:bill_of_materials_repository_server:*:*:*:*:*:*:*:*"
] | null | 7.1 | null | null |
GHSA-fwfw-h895-p52r | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Marian Dietz TeleAdmin allows Reflected XSS.This issue affects TeleAdmin: from n/a through 1.0.0. | [] | null | 7.1 | null | null |
|
CVE-2024-51631 | WordPress Sticky Social Bar plugin <= 2.0 - CSRF to Stored Cross Site Scripting (XSS) vulnerability | Cross-Site Request Forgery (CSRF) vulnerability in Eftakhairul Islam Sticky Social Bar allows Cross Site Request Forgery.This issue affects Sticky Social Bar: from n/a through 2.0. | [] | null | 7.1 | null | null |
GHSA-77gc-fj98-665h | Go JOSE Signature Validation Bypass | Go JOSE before 1.1.0 suffers from multiple signatures exploitation. The go-jose library supports messages with multiple signatures. However, when validating a signed message the API did not indicate which signature was valid, which could potentially lead to confusion. For example, users of the library might mistakenly read protected header values from an attached signature that was different from the one originally validated | [] | null | 7.5 | null | null |
GHSA-ww33-893m-mc6r | Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.6.13 and earlier allows remote authenticated users to affect availability via vectors related to FTS. | [] | null | null | null | null |
|
CVE-2023-34257 | An issue was discovered in BMC Patrol through 23.1.00. The agent's configuration can be remotely modified (and, by default, authentication is not required). Some configuration fields related to SNMP (e.g., masterAgentName or masterAgentStartLine) result in code execution when the agent is restarted. NOTE: the vendor's perspective is "These are not vulnerabilities for us as we have provided the option to implement the authentication." | [
"cpe:2.3:a:bmc:patrol_agent:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
CVE-2015-1335 | lxc-start in lxc before 1.0.8 and 1.1.x before 1.1.4 allows local container administrators to escape AppArmor confinement via a symlink attack on a (1) mount target or (2) bind mount source. | [
"cpe:2.3:a:linuxcontainers:lxc:*:*:*:*:*:*:*:*",
"cpe:2.3:a:linuxcontainers:lxc:1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:linuxcontainers:lxc:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:linuxcontainers:lxc:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:linuxcontainers:lxc:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*"
] | null | null | null | 7.2 |
|
CVE-2022-31990 | Badminton Center Management System v1.0 is vulnerable to SQL Injection via bcms/classes/Master.php?f=delete_product. | [
"cpe:2.3:a:badminton_center_management_system_project:badminton_center_management_system:1.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
|
CVE-2016-5365 | Stack-based buffer overflow in Huawei Honor WS851 routers with software 1.1.21.1 and earlier allows remote attackers to execute arbitrary commands with root privileges via unspecified vectors, aka HWPSIRT-2016-05051. | [
"cpe:2.3:h:huawei:honor_ws851:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:honor_ws851_firmware:*:*:*:*:*:*:*:*"
] | null | null | 9.8 | 10 |
|
CVE-2020-15478 | The Journal theme before 3.1.0 for OpenCart allows exposure of sensitive data via SQL errors. | [
"cpe:2.3:a:journal-theme:journal:*:*:*:*:*:opencart:*:*"
] | null | 7.5 | null | 5 |
|
CVE-2013-2043 | apps/calendar/ajax/events.php in ownCloud before 4.5.11 and 5.x before 5.0.6 does not properly check the ownership of a calendar, which allows remote authenticated users to download arbitrary calendars via the calendar_id parameter. | [
"cpe:2.3:a:owncloud:owncloud:*:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:4.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:4.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:4.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:4.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:4.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:4.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:4.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:4.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:4.5.8:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:4.5.9:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:5.0.5:*:*:*:*:*:*:*"
] | null | null | null | 4 |
|
CVE-2025-44886 | FW-WGS-804HPT v1.305b241111 was discovered to contain a stack overflow via the byruleEditName parameter in the web_acl_mgmt_Rules_Edit_postcontains function. | [] | null | 9.8 | null | null |
|
GHSA-qq4j-h75v-549m | Cross-Site Request Forgery (CSRF) vulnerability in Think201 Mins To Read allows Stored XSS.This issue affects Mins To Read: from n/a through 1.2.2. | [] | null | 7.1 | null | null |
|
GHSA-vrwx-q9pj-x488 | Liferay Portal and Liferay DXP Bypass via Double Encoded URL | In Liferay Portal before 7.3.1, com.liferay.portal:com.liferay.portal.impl before 7.1.3 and 7.4.0, Liferay Portal 6.2 EE, and Liferay DXP 7.2, DXP 7.1 and DXP 7.0, the property 'portlet.resource.id.banned.paths.regexp' can be bypassed with doubled encoded URLs. | [] | null | 5.3 | null | null |
GHSA-9cx2-wh5f-rgrj | In NDEF_MsgValidate of ndef_utils in Android 7.1.1, 7.1.2, 8.0, 8.1 and 9, there is a possible out of bounds read due to an integer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. | [] | null | null | null | null |
|
GHSA-3h7j-gprx-76w7 | Multiple SQL injection vulnerabilities in JBlog 1.0 allow (1) remote attackers to execute arbitrary SQL commands via the id parameter to index.php, and allow (2) remote authenticated administrators to execute arbitrary SQL commands via the id parameter to admin/modifpost.php. | [] | null | null | null | null |
|
GHSA-9r4v-xvm9-5c6m | Foxit PDF Editor Caret Annotation Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the handling of Annotation objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14364. | [] | null | null | 7.8 | null |
|
GHSA-626r-cj47-p49g | Centreon insertGraphTemplate SQL Injection Remote Code Execution Vulnerability | Centreon insertGraphTemplate SQL Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Centreon. Authentication is required to exploit this vulnerability.The specific flaw exists within the insertGraphTemplate function. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to execute code in the context of the service account. Was ZDI-CAN-22339. | [] | null | null | 8.8 | null |
CVE-2020-7363 | UCWeb UC Browser Address Bar Spooofing | User Interface (UI) Misrepresentation of Critical Information vulnerability in the address bar of UCWeb's UC Browser allows an attacker to obfuscate the true source of data as presented in the browser. This issue affects UCWeb's UC Browser version 13.0.8 and prior versions. | [
"cpe:2.3:a:ucweb:uc_browser:*:*:*:*:*:android:*:*"
] | null | 4.3 | null | null |
RHSA-2017:1664 | Red Hat Security Advisory: Red Hat Enterprise Linux 6.2 Advanced Mission Critical 6-Month Notice | This is the six-month notification for the retirement of Red Hat Enterprise Linux 6.2 Advanced Mission Critical (AMC). This notification applies only to those customers subscribed to the Advanced Mission Critical (AMC) channel for Red Hat Enterprise Linux 6.2. | [
"cpe:/o:redhat:rhel_mission_critical:6.2::server"
] | null | null | null | null |
CVE-2020-1714 | A flaw was found in Keycloak before version 11.0.0, where the code base contains usages of ObjectInputStream without type checks. This flaw allows an attacker to inject arbitrarily serialized Java Objects, which would then get deserialized in a privileged context and potentially lead to remote code execution. | [
"cpe:2.3:a:redhat:keycloak:*:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openshift_application_runtimes:-:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:quarkus:quarkus:*:*:*:*:*:*:*:*"
] | null | null | 7.5 | null |
|
CVE-2017-14649 | ReadOneJNGImage in coders/png.c in GraphicsMagick version 1.3.26 does not properly validate JNG data, leading to a denial of service (assertion failure in magick/pixel_cache.c, and application crash). | [
"cpe:2.3:a:graphicsmagick:graphicsmagick:1.3.26:*:*:*:*:*:*:*"
] | null | null | 5.5 | 4.3 |
|
GHSA-ghqp-4375-rwc7 | Driver module in Intel Smart Sound Technology before version 9.21.00.3541 potentially allows a local attacker to execute arbitrary code as administrator via a non-paged pool overflow. | [] | null | null | 8.8 | null |
|
GHSA-v39j-9cq4-4342 | IBM WebSphere Application Server (WAS) 6.1.0.9, when the JAAS Login functionality is enabled, allows attackers to perform an internal application hashtable login by (1) not providing a password or (2) providing an empty password. | [] | null | null | null | null |
|
GHSA-cpw3-947f-46cc | Microsoft SharePoint Server 2010 SP1 and SP2 and 2013, and Office Web Apps 2013, allows remote attackers to execute arbitrary code via crafted page content, aka "SharePoint Page Content Vulnerabilities." | [] | null | null | null | null |
|
CVE-2014-2520 | EMC Documentum Content Server before 6.7 SP2 P16 and 7.x before 7.1 P07, when Oracle Database is used, does not properly restrict DQL hints, which allows remote authenticated users to conduct DQL injection attacks and read sensitive database content via a crafted request. | [
"cpe:2.3:a:emc:documentum_content_server:*:sp2:*:*:*:*:*:*",
"cpe:2.3:a:emc:documentum_content_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:documentum_content_server:6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:documentum_content_server:6.5:sp1:*:*:*:*:*:*",
"cpe:2.3:a:emc:documentum_content_server:6.5:sp2:*:*:*:*:*:*",
"cpe:2.3:a:emc:documentum_content_server:6.5:sp3:*:*:*:*:*:*",
"cpe:2.3:a:emc:documentum_content_server:6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:documentum_content_server:6.7:-:*:*:*:*:*:*",
"cpe:2.3:a:emc:documentum_content_server:6.7:sp1:*:*:*:*:*:*",
"cpe:2.3:a:emc:documentum_content_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:documentum_content_server:7.1:*:*:*:*:*:*:*"
] | null | null | null | 6.3 |
|
CVE-2021-3243 | Wfilter ICF 5.0.117 contains a cross-site scripting (XSS) vulnerability. An attacker in the same LAN can craft a packet with a malicious User-Agent header to inject a payload in its logs, where an attacker can take over the system by through its plugin-running function. | [
"cpe:2.3:a:wfiltericf:wfilter_internet_content_filter:5.0.117:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 |
|
RHSA-2024:9190 | Red Hat Security Advisory: python3.12 security update | cpython: python: Memory race condition in ssl.SSLContext certificate store methods python: The zipfile module is vulnerable to zip-bombs leading to denial of service python: incorrect IPv4 and IPv6 private ranges python: cpython: Iterating over a malicious ZIP file may lead to Denial of Service | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 5.3 | null | null |
GHSA-wwhc-hp78-qq9x | Cross-site scripting (XSS) vulnerability in 500page.jsp in JIRA Enterprise Edition before 3.12.1 allows remote attackers to inject arbitrary web script or HTML, which is not properly handled when generating error messages, as demonstrated by input originally sent in the URI to secure/CreateIssue. NOTE: some of these details are obtained from third party information. | [] | null | null | null | null |
|
CVE-2002-0073 | The FTP service in Internet Information Server (IIS) 4.0, 5.0 and 5.1 allows attackers who have established an FTP session to cause a denial of service via a specially crafted status request containing glob characters. | [
"cpe:2.3:a:microsoft:internet_information_server:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_information_services:5.0:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2018-7926 | Huawei Watch 2 with versions and earlier than OWDD.180707.001.E1 have an improper authorization vulnerability. Due to improper permission configuration for specific operations, an attacker who obtained the Huawei ID bound to the watch can bypass permission verification to perform specific operations and modify some data on the watch. | [
"cpe:2.3:o:huawei:watch_2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:watch_2:-:*:*:*:*:*:*:*"
] | null | null | 4.6 | 2.1 |
|
GHSA-736f-7686-hp7x | Buffer overflow in BiblioWeb web server 2.0 allows remote attackers to cause a denial of service and possibly execute arbitrary commands via a long HTTP GET request. | [] | null | null | null | null |
|
GHSA-7h9x-q59m-q97v | Unspecified vulnerability in IBM Java SDK 7.0.0 before SR6, 6.0.1 before SR7, 6.0.0 before SR15, and 5.0.0 before SR16 FP4 allows remote attackers to access restricted classes via unspecified vectors related to XML and XSL. | [] | null | null | null | null |
|
GHSA-2cgp-x82p-v5h2 | Cross-Site Request Forgery (CSRF) vulnerability in ninotheme Nino Social Connect allows Stored XSS. This issue affects Nino Social Connect: from n/a through 2.0. | [] | null | 7.1 | null | null |
|
GHSA-w2hf-864c-6hph | IBM InfoSphere Information Server 11.7 is vulnerable to SQL injection. A remote attacker could send specially crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-Force ID: 243163. | [] | null | 6.3 | null | null |
|
CVE-2008-1311 | The TFTP server in PacketTrap pt360 Tool Suite PRO 2.0.3901.0 and earlier allows remote attackers to cause a denial of service (daemon hang) by uploading a file named (1) '|' (pipe), (2) '"' (quotation mark), or (3) "<>" (less than, greater than); or (4) a file with a long name. NOTE: the issue for vector 4 might exist because of an incomplete fix for CVE-2008-1312. | [
"cpe:2.3:a:packettrap:pt360_tool_suite_pro:*:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2025-24980 | User enumeration in pimcore/admin-ui-classic-bundle | pimcore/admin-ui-classic-bundle provides a Backend UI for Pimcore. In affected versions an error message discloses existing accounts and leads to user enumeration on the target via "Forgot password" function. No generic error message has been implemented. This issue has been addressed in version 1.7.4 and all users are advised to upgrade. There are no known workarounds for this vulnerability. | [] | 6.9 | null | null | null |
GHSA-5v6h-mhqw-hcv5 | Microsoft Internet Explorer 6.0.2900.2180 allows remote attackers to cause a denial of service via a style attribute in an HTML table tag with a width value that is dynamically calculated using JavaScript. | [] | null | null | null | null |
|
GHSA-mmj6-5g2w-6rvq | A SQL injection vulnerability exists in the Take Attendance functionality of OS4Ed's OpenSIS 8.0. allows an attacker to inject their own SQL query. The cp_id_miss_attn parameter from TakeAttendance.php is vulnerable to SQL injection. An attacker can make an authenticated HTTP request as a user with access to "Take Attendance" functionality to trigger this vulnerability. | [] | null | null | null | null |
|
cisco-sa-iosxe-wlc-privesc-RjSMrmPK | Cisco IOS XE Software for Wireless LAN Controllers Privilege Escalation Vulnerability | A vulnerability in the CLI of Cisco IOS XE Software could allow an authenticated, low-privileged, local attacker to access WLAN configuration details including passwords.
This vulnerability is due to improper privilege checks. An attacker could exploit this vulnerability by using the show and show tech wireless CLI commands to access configuration details, including passwords. A successful exploit could allow the attacker to access configuration details that they are not authorized to access.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is part of the March 2024 release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: March 2024 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication ["https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75056"]. | [] | null | 5.5 | null | null |
CVE-2001-1452 | By default, DNS servers on Windows NT 4.0 and Windows 2000 Server cache glue records received from non-delegated name servers, which allows remote attackers to poison the DNS cache via spoofed DNS responses. | [
"cpe:2.3:o:microsoft:windows_2000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
CVE-2025-21636 | sctp: sysctl: plpmtud_probe_interval: avoid using current->nsproxy | In the Linux kernel, the following vulnerability has been resolved:
sctp: sysctl: plpmtud_probe_interval: avoid using current->nsproxy
As mentioned in a previous commit of this series, using the 'net'
structure via 'current' is not recommended for different reasons:
- Inconsistency: getting info from the reader's/writer's netns vs only
from the opener's netns.
- current->nsproxy can be NULL in some cases, resulting in an 'Oops'
(null-ptr-deref), e.g. when the current task is exiting, as spotted by
syzbot [1] using acct(2).
The 'net' structure can be obtained from the table->data using
container_of().
Note that table->data could also be used directly, as this is the only
member needed from the 'net' structure, but that would increase the size
of this fix, to use '*data' everywhere 'net->sctp.probe_interval' is
used. | [] | null | 5.5 | null | null |
GHSA-3c5x-pvpx-3j9q | Dell SupportAssist Client Consumer versions (3.10.4 and versions prior) and Dell SupportAssist Client Commercial versions (3.1.1 and versions prior) contain an arbitrary file deletion/overwrite vulnerability. Authenticated non-admin user could exploit the issue and delete or overwrite arbitrary files on the system. | [] | null | 7.1 | null | null |
|
RHSA-2019:2805 | Red Hat Security Advisory: systemd security update | systemd: Insufficient input validation in bus_process_object() resulting in PID 1 crash | [
"cpe:/o:redhat:rhel_aus:7.3::server",
"cpe:/o:redhat:rhel_e4s:7.3::server",
"cpe:/o:redhat:rhel_tus:7.3::server"
] | null | null | 7 | null |
GHSA-cgcv-5272-97pr | Kubernetes mountable secrets policy bypass | Users may be able to launch containers that bypass the mountable secrets policy enforced by the ServiceAccount admission plugin when using ephemeral containers. The policy ensures pods running with a service account may only reference secrets specified in the service account’s secrets field. Kubernetes clusters are only affected if the ServiceAccount admission plugin and the `kubernetes.io/enforce-mountable-secrets` annotation are used together with ephemeral containers. | [] | null | 6.5 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.