id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2023-5482 | Insufficient data validation in USB in Google Chrome prior to 119.0.6045.105 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High) | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
|
GHSA-vgxc-rq2p-x5qw | The address-management feature in xt:Commerce 5.1 to 6.2.2 allows remote authenticated users to zero out other user's stored addresses by manipulating an id field in the POST request for altering an address. | [] | null | 4.3 | null | null |
|
RHSA-2025:0782 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.5 Container Release Update | django: potential denial-of-service vulnerability in IPv6 validation | [
"cpe:/a:redhat:ansible_automation_platform:2.5::el8",
"cpe:/a:redhat:ansible_automation_platform:2.5::el9",
"cpe:/a:redhat:ansible_automation_platform_cloud_billing:2.5::el8"
] | null | 5.8 | null | null |
GHSA-mjjj-6p6j-chqm | An issue found in DERICIA Co. Ltd, DELICIA v.13.6.1 allows a remote attacker to gain access to sensitive information via the channel access token in the miniapp DELICIA function. | [] | null | 7.5 | null | null |
|
CVE-2022-39867 | Improper access control vulnerability in cloudNotificationManager.java SmartThings prior to version 1.7.89.0 allows attackers to access sensitive information via SHOW_PERSISTENT_BANNER broadcast. | [
"cpe:2.3:a:samsung:smartthings:*:*:*:*:*:android:*:*"
] | null | 4 | null | null |
|
GHSA-5wph-qqfg-2px4 | Info Touch Surfnet kiosk allows local users to deposit extra time into Internet kiosk accounts via repeated authentication attempts. | [] | null | null | null | null |
|
GHSA-cmjm-2wxx-774f | Double free vulnerability in the get_vrFilter function in servers/slapd/filter.c in OpenLDAP 2.4.40 allows remote attackers to cause a denial of service (crash) via a crafted search query with a matched values control. | [] | null | null | null | null |
|
GHSA-5479-gqqr-f9gj | Typo3 Vulnerable to Cache Poisoning | **Problem Description:** A request URL with arbitrary arguments, but still pointing to the home page of a TYPO3 installation can be cached if the configuration option `config.prefixLocalAnchors` is used with the values "all" or "cached". The impact of this vulnerability is that unfamiliar looking links to the home page can end up in the cache, which leads to a reload of the page in the browser when section links are followed by web page visitors, instead of just directly jumping to the requested section of the page. TYPO3 versions 4.6.x and higher are only affected if the homepage is not a shortcut to a different page.**Solution:** Removing the configuration options `config.prefixLocalAnchors` (and optionally also config.baseUrl) in favor of `config.absRefPrefix`**Credits:** Thanks to Gernot Leitgab who discovered and reported the vulnerability. | [] | null | null | null | null |
CVE-2002-2186 | Macromedia JRun 3.0, 3.1, and 4.0 allow remote attackers to view the source code of .JSP files via Unicode encoded character values in a URL. | [
"cpe:2.3:a:macromedia:jrun:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:macromedia:jrun:3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:macromedia:jrun:4.0:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-hcq6-h8v2-r5wm | Server-Side Request Forgery in node-pdf-generator | This affects all versions of package node-pdf-generator up to and including 0.0.6. Due to lack of user input validation and sanitization done to the content given to node-pdf-generator, it is possible for an attacker to craft a url that will be passed to an external server allowing an SSRF attack. | [] | null | 8.2 | null | null |
GHSA-279q-3xp7-xvgp | CommuniLink Internet Limited CLink Office v2.0 was discovered to contain multiple SQL injection vulnerabilities via the username and password parameters. | [] | null | 7.5 | null | null |
|
GHSA-886q-77w5-r3hf | In the Accounts package, there is a possible crash due to improper input validation. This could lead to permanent local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-129287265 | [] | null | 5.5 | null | null |
|
GHSA-qjrh-4wfq-mwgp | The mp4ff_read_stsd function in common/mp4ff/mp4atom.c in Freeware Advanced Audio Decoder 2 (FAAD2) 2.7 allows remote attackers to cause a denial of service (large loop and CPU consumption) via a crafted mp4 file. | [] | null | null | 5.5 | null |
|
GHSA-4grm-pvj3-cgcc | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Stored Procedure). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | [] | null | null | null | null |
|
CVE-2023-32825 | In bluethooth service, there is a possible out of bounds reads due to improper input validation. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07884130; Issue ID: ALPS07884130. | [
"cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt2713:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt7921:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8390:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
|
CVE-2019-0557 | A cross-site-scripting (XSS) vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server, aka "Microsoft Office SharePoint XSS Vulnerability." This affects Microsoft SharePoint. This CVE ID is unique from CVE-2019-0556, CVE-2019-0558. | [
"cpe:2.3:a:microsoft:sharepoint_server:2016:*:*:*:enterprise:*:*:*"
] | null | 5.4 | 5.4 | 3.5 |
|
CVE-2024-8177 | Inefficient Algorithmic Complexity in GitLab | An issue was discovered in GitLab CE/EE affecting all versions starting from 15.6 prior to 17.4.5, starting from 17.5 prior to 17.5.3, starting from 17.6 prior to 17.6.1 which could cause Denial of Service via integrating a malicious harbor registry. | [
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*",
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:17.6.0:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:17.6.0:*:*:*:enterprise:*:*:*"
] | null | 5.3 | null | null |
GHSA-75hh-g59c-jqx3 | Unspecified vulnerability in the info request mechanism in LAN Messenger before 1.5.1.2 allows remote attackers to cause a denial of service (application crash) or transmit spam via unspecified vectors. | [] | null | null | null | null |
|
RHSA-2014:0312 | Red Hat Security Advisory: php security update | array index error in dtoa implementation of many products | [
"cpe:/o:redhat:rhel_eus:5.9",
"cpe:/o:redhat:rhel_mission_critical:5.3",
"cpe:/o:redhat:rhel_mission_critical:5.6"
] | null | null | null | null |
RHSA-2021:4104 | Red Hat Security Advisory: OpenShift Virtualization 4.9.0 Images security and bug fix update | gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header golang: net: lookup functions may return invalid host names golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents golang: crypto/tls: certificate of wrong type is causing TLS client to panic | [
"cpe:/a:redhat:container_native_virtualization:4.9::el8"
] | null | 6.5 | null | null |
GHSA-v6v2-2688-9vmw | Untrusted search path vulnerability in WinImage 8.50 allows local users to gain privileges via a Trojan horse wnaspi32.dll file in the current working directory, as demonstrated by a directory that contains a .imz file. NOTE: some of these details are obtained from third party information. | [] | null | null | null | null |
|
GHSA-gcr9-32r6-7cx2 | GNU Parallel before 20150422, when using (1) --pipe, (2) --tmux, (3) --cat, (4) --fifo, or (5) --compress, allows local users to write to arbitrary files via a symlink attack on a temporary file. | [] | null | null | null | null |
|
GHSA-fppq-f2m6-xv5c | Improper Authorization vulnerability in Magento and Adobe Commerce | Adobe Commerce versions 2.4.8-beta1, 2.4.7-p3, 2.4.6-p8, 2.4.5-p10, 2.4.4-p11 and earlier are affected by an Improper Authorization vulnerability that could result in Privilege escalation. An attacker could leverage this vulnerability to bypass security measures and gain unauthorized access. Exploitation of this issue does not require user interaction. A successful attacker can abuse this to achieve session takeover, increasing the confidentiality and integrity impact as high. | [] | null | 9.1 | null | null |
CVE-2019-20837 | An issue was discovered in Foxit Reader and PhantomPDF before 9.5. It allows signature validation bypass via a modified file or a file with non-standard signatures. | [
"cpe:2.3:a:foxitsoftware:phantompdf:*:*:*:*:*:*:*:*",
"cpe:2.3:a:foxitsoftware:reader:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
GHSA-jgpx-8fg9-hh7j | In the Linux kernel, the following vulnerability has been resolved:perf/aux: Fix AUX buffer serializationOle reported that event->mmap_mutex is strictly insufficient to
serialize the AUX buffer, add a per RB mutex to fully serialize it.Note that in the lock order comment the perf_event::mmap_mutex order
was already wrong, that is, it nesting under mmap_lock is not new with
this patch. | [] | null | null | null | null |
|
CVE-2017-18642 | Syska Smart Bulb devices through 2017-08-06 receive RGB parameters over cleartext Bluetooth Low Energy (BLE), leading to sniffing, reverse engineering, and replay attacks. | [
"cpe:2.3:o:syska:smartlight_rainbow_led_smart_bulb_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:syska:smartlight_rainbow_led_smart_bulb:-:*:*:*:*:*:*:*"
] | null | 6.5 | null | 3.3 |
|
GHSA-522h-49x4-xq7r | A low privileged remote attacker may modify the configuration of the CODESYS V3 service through a missing authentication vulnerability which could lead to full system access and/or DoS. | [] | null | 8.8 | null | null |
|
CVE-2023-50959 | IBM Cloud Pak for Business Automation information disclosure | IBM Cloud Pak for Business Automation 18.0.0, 18.0.1, 18.0.2,19.0.1, 19.0.2, 19.0.3,20.0.1, 20.0.2, 20.0.3, 21.0.1, 21.0.2, 21.0.3, 22.0.1,2 2.0.2, 23.0.1, and 23.0.2 may allow end users to query more documents than expected from a connected Enterprise Content Management system when configured to use a system account. IBM X-Force ID: 275938. | [
"cpe:2.3:a:ibm:cloud_pak_for_business_automation:18.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:cloud_pak_for_business_automation:18.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:cloud_pak_for_business_automation:18.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:cloud_pak_for_business_automation:19.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:cloud_pak_for_business_automation:19.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:cloud_pak_for_business_automation:19.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:cloud_pak_for_business_automation:20.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:cloud_pak_for_business_automation:20.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:cloud_pak_for_business_automation:20.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.1:-:*:*:*:*:*:*",
"cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.2:-:*:*:*:*:*:*",
"cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:-:*:*:*:*:*:*",
"cpe:2.3:a:ibm:cloud_pak_for_business_automation:22.0.1:-:*:*:*:*:*:*",
"cpe:2.3:a:ibm:cloud_pak_for_business_automation:22.0.2:-:*:*:*:*:*:*",
"cpe:2.3:a:ibm:cloud_pak_for_business_automation:23.0.1:-:*:*:*:*:*:*",
"cpe:2.3:a:ibm:cloud_pak_for_business_automation:23.0.2:-:*:*:*:*:*:*"
] | null | 5.3 | null | null |
CVE-2024-2633 | Multiple vulnerabilities on Meta4 HR from Cegid | A Cross-Site Scripting Vulnerability has been found on Meta4 HR affecting version 819.001.022 and earlier. The endpoint '/sitetest/english/dumpenv.jsp' is vulnerable to XSS attack by 'lang' query, i.e. '/sitetest/english/dumpenv.jsp?snoop=yes&lang=%27%3Cimg%20src/onerror=alert(1)%3E¶ms'. | [] | null | 6.1 | null | null |
GHSA-wxwv-4j63-2fjm | D-Link DIR-823G A1V1.0.2B05 was discovered to contain a buffer overflow via the GuardInt parameter in the SetWLanRadioSettings function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input. | [] | null | 7.5 | null | null |
|
CVE-2024-37267 | WordPress Striking theme <= 2.3.4 - Reflected Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in kaptinlin Striking allows Reflected XSS.This issue affects Striking: from n/a through 2.3.4. | [
"cpe:2.3:a:kaptinlin:striking:*:*:*:*:*:wordpress:*:*"
] | null | 7.1 | null | null |
CVE-2019-1697 | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Lightweight Directory Access Protocol Denial of Service Vulnerability | A vulnerability in the implementation of the Lightweight Directory Access Protocol (LDAP) feature in Cisco Adaptive Security Appliance (ASA) Software and Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerabilities are due to the improper parsing of LDAP packets sent to an affected device. An attacker could exploit these vulnerabilities by sending a crafted LDAP packet, using Basic Encoding Rules (BER), to be processed by an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. | [
"cpe:2.3:a:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asa_5505:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asa_5510:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asa_5512-x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asa_5515-x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asa_5520:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asa_5525-x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asa_5540:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asa_5545-x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asa_5550:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asa_5555-x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asa_5580:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asa_5585-x:-:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*"
] | null | null | 6.8 | null |
CVE-2010-4913 | Cross-site scripting (XSS) vulnerability in the search feature in ColdGen ColdUserGroup 1.06 allows remote attackers to inject arbitrary web script or HTML via the Keywords parameter. NOTE: some of these details are obtained from third party information. | [
"cpe:2.3:a:coldgen:coldusergroup:1.06:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2018-5434 | XML eXternal Entity Expansion Vulnerabilities with TIBCO Runtime Agent | The TIBCO Designer component of TIBCO Software Inc.'s TIBCO Runtime Agent, and TIBCO Runtime Agent for z/Linux contains vulnerabilities wherein a malicious user could perform XML external entity expansion (XXE) attacks to disclose host machine information. Affected releases are TIBCO Software Inc.'s TIBCO Runtime Agent: versions up to and including 5.10.0, and TIBCO Runtime Agent for z/Linux: versions up to and including 5.9.1. | [
"cpe:2.3:a:tibco:runtime_agent:*:*:*:*:*:linux_kernel:*:*",
"cpe:2.3:a:tibco:runtime_agent:*:*:*:*:*:*:*:*"
] | null | null | 5.8 | null |
GHSA-56hh-w43q-4v74 | A Security Bypass vulnerability exists in Zavio IP Cameras through 1.6.3 because the RTSP protocol authentication is disabled by default, which could let a malicious user obtain unauthorized access to the live video stream. | [] | null | null | null | null |
|
CVE-2020-0308 | In Window Manager, there is a possible permission bypass due to an unsafe PendingIntent. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-153654357 | [
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*"
] | null | 5.5 | null | 2.1 |
|
CVE-2007-4861 | SAXON 5.4, with display_errors enabled, allows remote attackers to obtain sensitive information via (1) a direct request for news.php, (2) an invalid use of a newsid array parameter to admin/edit-item.php, and possibly unspecified vectors related to additional scripts in (3) admin/, (4) rss/, and (5) the root directory of the installation, which reveal the path in various error messages. | [
"cpe:2.3:a:quirm:saxon:5.4:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-jr37-6xf9-g2x4 | Sensitive information disclosure due to missing authorization. The following products are affected: Acronis Agent (Linux, macOS, Windows) before build 36119. | [] | null | null | 3.3 | null |
|
GHSA-ww88-jw5q-2479 | A vulnerability was found in SourceCodester Laundry Management System 1.0 and classified as critical. This issue affects the function laporan_filter of the file /application/controller/Pelanggan.php. The manipulation of the argument jeniskelamin leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-259745 was assigned to this vulnerability. | [] | null | 6.3 | null | null |
|
GHSA-wx7v-5vj2-rh4g | Memory leak in the CRYPTO_ASSOC function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (memory consumption). | [] | null | 7.5 | null | null |
|
GHSA-3hh5-h95j-2cw7 | In BIND 9.10.0 -> 9.11.21, 9.12.0 -> 9.16.5, 9.17.0 -> 9.17.3, also affects 9.10.5-S1 -> 9.11.21-S1 of the BIND 9 Supported Preview Edition, An attacker that can reach a vulnerable system with a specially crafted query packet can trigger a crash. To be vulnerable, the system must: * be running BIND that was built with "--enable-native-pkcs11" * be signing one or more zones with an RSA key * be able to receive queries from a possible attacker | [] | null | 7.5 | null | null |
|
GHSA-whcc-jgf3-q7pm | The OptinMonster WordPress plugin is vulnerable to sensitive information disclosure and unauthorized setting updates due to insufficient authorization validation via the logged_in_or_has_api_key function in the ~/OMAPI/RestApi.php file that can used to exploit inject malicious web scripts on sites with the plugin installed. This affects versions up to, and including, 2.6.4. | [] | null | 8.2 | null | null |
|
GHSA-m5gr-96cr-6qvm | In the Linux kernel, the following vulnerability has been resolved:netfilter: iptables: Fix potential null-ptr-deref in ip6table_nat_table_init().ip6table_nat_table_init() accesses net->gen->ptr[ip6table_nat_net_ops.id],
but the function is exposed to user space before the entry is allocated
via register_pernet_subsys().Let's call register_pernet_subsys() before xt_register_template(). | [] | null | 5.5 | null | null |
|
GHSA-r9xh-hgrh-2c88 | SQL injection vulnerability in admin_login.asp in ISP of Egypt SiteMan allows remote attackers to execute arbitrary SQL commands via the pass parameter. | [] | null | null | null | null |
|
CVE-2015-4295 | The Prime Collaboration Deployment component in Cisco Unified Communications Manager 10.5(3.10000.9) allows remote authenticated users to discover root credentials via a direct request to an unspecified URL, aka Bug ID CSCuv21819. | [
"cpe:2.3:a:cisco:unified_communications_manager:10.5\\(3.10000.9\\):*:*:*:*:*:*:*"
] | null | null | null | 4 |
|
CVE-2021-24506 | Slider Hero < 8.2.7 - Contributor+ SQL Injection | The Slider Hero with Animation, Video Background & Intro Maker WordPress plugin before 8.2.7 does not sanitise or escape the id attribute of its hero-button shortcode before using it in a SQL statement, allowing users with a role as low as Contributor to perform SQL injection. | [
"cpe:2.3:a:quantumcloud:slider_hero:*:*:*:*:*:wordpress:*:*"
] | null | 8.8 | null | 6.5 |
GHSA-3pwr-226w-jqr2 | Google Chrome before 27.0.1453.110 does not properly handle SSL sockets, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors. | [] | null | null | null | null |
|
CVE-2015-2806 | Stack-based buffer overflow in asn1_der_decoding in libtasn1 before 4.4 allows remote attackers to have unspecified impact via unknown vectors. | [
"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:libtasn1:*:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
CVE-2020-3936 | Unisoon UltraLog Express - SQL Injection | UltraLog Express device management interface does not properly filter user inputted string in some specific parameters, attackers can inject arbitrary SQL command. | [
"cpe:2.3:o:unisoon:ultralog_express_firmware:1.4.0:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoon:ultralog_express:-:*:*:*:*:*:*:*"
] | null | 10 | null | null |
CVE-2021-31549 | An issue was discovered in the AbuseFilter extension for MediaWiki through 1.35.2. The Special:AbuseFilter/examine form allowed for the disclosure of suppressed MediaWiki usernames to unprivileged users. | [
"cpe:2.3:a:mediawiki:mediawiki:*:*:*:*:*:*:*:*"
] | null | 4.3 | null | 4 |
|
GHSA-r3h7-q69r-j2c6 | Zulip Server before 2.1.5 allows reverse tabnapping via a topic header link. | [] | null | null | null | null |
|
GHSA-f8fm-hvxr-8735 | "A vulnerability in the TLS protocol implementation of the Domino server could allow an unauthenticated, remote attacker to access sensitive information, aka a Return of Bleichenbacher's Oracle Threat (ROBOT) attack. An attacker could iteratively query a server running a vulnerable TLS stack implementation to perform cryptanalytic operations that may allow decryption of previously captured TLS sessions." | [] | null | null | null | null |
|
CVE-2002-1217 | Cross-Frame scripting vulnerability in the WebBrowser control as used in Internet Explorer 5.5 and 6.0 allows remote attackers to execute arbitrary code, read arbitrary files, or conduct other unauthorized activities via script that accesses the Document property, which bypasses <frame> and <iframe> domain restrictions. | [
"cpe:2.3:a:microsoft:internet_explorer:5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:5.5:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:5.5:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:6.0:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-4jf5-rp58-78fp | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Johannes van Poelgeest Admin Options Pages allows Reflected XSS. This issue affects Admin Options Pages: from n/a through 0.9.7. | [] | null | 7.1 | null | null |
|
CVE-2024-20462 | Cisco ATA 190 Series Analog Telephone Adapter Muliplatform Firmware Information Disclosure Vulnerability | A vulnerability in the web-based management interface of Cisco ATA 190 Series Multiplatform Analog Telephone Adapter firmware could allow an authenticated, local attacker with low privileges to view passwords on an affected device.
This vulnerability is due to incorrect sanitization of HTML content from an affected device. A successful exploit could allow the attacker to view passwords that belong to other users. | [
"cpe:2.3:o:cisco:ata_191_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ata_191:-:*:*:*:on-premises:*:*:*",
"cpe:2.3:h:cisco:ata_191:-:*:*:*:multiplatform:*:*:*",
"cpe:2.3:o:cisco:ata_192_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ata_192:-:*:*:*:multiplatform:*:*:*"
] | null | 5.5 | null | null |
CVE-2022-2694 | SourceCodester Company Website CMS unrestricted upload | A vulnerability was found in SourceCodester Company Website CMS and classified as critical. This issue affects some unknown processing. The manipulation leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-205817 was assigned to this vulnerability. | [
"cpe:2.3:a:company_website_cms_project:company_website_cms:-:*:*:*:*:*:*:*"
] | null | 6.3 | null | null |
GHSA-wpj3-h9mh-37xr | The amr ical events lists WordPress plugin through 6.6 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) | [] | null | 4.8 | null | null |
|
GHSA-7p6w-859w-82fp | The Stop Registration Spam plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.23. This is due to missing or incorrect nonce validation. This makes it possible for unauthenticated attackers to inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | [] | null | 6.1 | null | null |
|
GHSA-r4gq-hv2r-mrf5 | Cross-site Scripting in librenms/librenms | Cross-site Scripting (XSS) - Stored in GitHub repository librenms/librenms prior to 22.10.0. | [] | null | 6.1 | null | null |
CVE-2022-38490 | An issue was discovered in EasyVista 2020.2.125.3 and 2022.1.109.0.03. Some parameters allow SQL injection. Version 2022.1.110.1.02 corrects this issue. | [
"cpe:2.3:a:easyvista:service_manager:2020.2.125.3:*:*:*:*:*:*:*",
"cpe:2.3:a:easyvista:service_manager:2022.1.109.0.03:*:*:*:*:*:*:*"
] | null | 9.6 | null | null |
|
CVE-2016-0167 | The kernel-mode driver in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 allows local users to gain privileges via a crafted application, aka "Win32k Elevation of Privilege Vulnerability," a different vulnerability than CVE-2016-0143 and CVE-2016-0165. | [
"cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1511:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*"
] | null | 7.8 | null | 7.2 |
|
GHSA-w66m-7qj6-9pv2 | In Cacti through 1.2.6, authenticated users may bypass authorization checks (for viewing a graph) via a direct graph_json.php request with a modified local_graph_id parameter. | [] | null | null | null | null |
|
GHSA-cpxg-749c-f5cf | Insufficiently Protected Credentials vulnerability exists in EcoStruxure Control Expert (all versions prior to V15.0 SP1, including all versions of Unity Pro), EcoStruxure Process Expert (all versions, including all versions of EcoStruxure Hybrid DCS), and SCADAPack RemoteConnect for x70, all versions, that could cause protected derived function blocks to be read or modified by unauthorized users when accessing a project file. | [] | null | null | null | null |
|
GHSA-xjfv-2mvv-4jqx | The rate-limit feature in the 802.11 protocol implementation on Cisco Aironet 1800, 2800, and 3800 devices with software before 8.2.121.0 and 8.3.x before 8.3.102.0 allows remote attackers to cause a denial of service (device reload) via crafted 802.11 frames, aka Bug ID CSCva06192. | [] | null | null | 6.5 | null |
|
CVE-2009-3028 | The Altiris eXpress NS SC Download ActiveX control in AeXNSPkgDLLib.dll, as used in Symantec Altiris Deployment Solution 6.9.x, Notification Server 6.0.x, and Symantec Management Platform 7.0.x exposes an unsafe method, which allows remote attackers to force the download of arbitrary files and possibly execute arbitrary code via the DownloadAndInstall method. | [
"cpe:2.3:a:symantec:altiris_deployment_solution:6.9:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:altiris_deployment_solution:6.9:sp1:*:*:*:*:*:*",
"cpe:2.3:a:symantec:altiris_deployment_solution:6.9:sp2:*:*:*:*:*:*",
"cpe:2.3:a:symantec:altiris_deployment_solution:6.9:sp3:*:*:*:*:*:*",
"cpe:2.3:a:symantec:altiris_deployment_solution:6.9:sp4:*:*:*:*:*:*",
"cpe:2.3:a:symantec:altiris_notification_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:altiris_notification_server:6.0:sp1:*:*:*:*:*:*",
"cpe:2.3:a:symantec:altiris_notification_server:6.0:sp1_hf12:*:*:*:*:*:*",
"cpe:2.3:a:symantec:altiris_notification_server:6.0:sp2:*:*:*:*:*:*",
"cpe:2.3:a:symantec:altiris_notification_server:6.0:sp3:*:*:*:*:*:*",
"cpe:2.3:a:symantec:altiris_notification_server:6.0:sp3_r1:*:*:*:*:*:*",
"cpe:2.3:a:symantec:altiris_notification_server:6.0:sp3_r10:*:*:*:*:*:*",
"cpe:2.3:a:symantec:altiris_notification_server:6.0:sp3_r11:*:*:*:*:*:*",
"cpe:2.3:a:symantec:altiris_notification_server:6.0:sp3_r12:*:*:*:*:*:*",
"cpe:2.3:a:symantec:altiris_notification_server:6.0:sp3_r13:*:*:*:*:*:*",
"cpe:2.3:a:symantec:altiris_notification_server:6.0:sp3_r2:*:*:*:*:*:*",
"cpe:2.3:a:symantec:altiris_notification_server:6.0:sp3_r3:*:*:*:*:*:*",
"cpe:2.3:a:symantec:altiris_notification_server:6.0:sp3_r4:*:*:*:*:*:*",
"cpe:2.3:a:symantec:altiris_notification_server:6.0:sp3_r5:*:*:*:*:*:*",
"cpe:2.3:a:symantec:altiris_notification_server:6.0:sp3_r6:*:*:*:*:*:*",
"cpe:2.3:a:symantec:altiris_notification_server:6.0:sp3_r7:*:*:*:*:*:*",
"cpe:2.3:a:symantec:altiris_notification_server:6.0:sp3_r8:*:*:*:*:*:*",
"cpe:2.3:a:symantec:altiris_notification_server:6.0:sp3_r9:*:*:*:*:*:*",
"cpe:2.3:a:symantec:management_platform:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:management_platform:7.0:rc5:*:*:*:*:*:*",
"cpe:2.3:a:symantec:management_platform:7.0:sp1:*:*:*:*:*:*",
"cpe:2.3:a:symantec:management_platform:7.0:sp2:*:*:*:*:*:*",
"cpe:2.3:a:symantec:management_platform:7.0:sp3:*:*:*:*:*:*",
"cpe:2.3:a:symantec:management_platform:7.0:sp4:*:*:*:*:*:*",
"cpe:2.3:a:symantec:management_platform:7.0:sp5:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
GHSA-mj4j-gqww-vvww | The Mail Server in Websense TRITON AP-EMAIL and V-Series appliances before 8.0.0 uses plaintext credentials, which allows remote attackers to obtain sensitive information via unspecified vectors. | [] | null | null | null | null |
|
RHSA-2025:0693 | Red Hat Security Advisory: redis security update | redis: heap overflow in the lua cjson and cmsgpack libraries redis: possible bypass of Unix socket permissions on startup redis: Denial-of-service due to unbounded pattern matching in Redis redis: Lua library commands may lead to stack overflow and RCE in Redis redis: Redis' Lua library commands may lead to remote code execution | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7 | null | null |
GHSA-vh3x-qhh3-9frg | A improper permission configuration vulnerability in Xiaomi Content Center APP. This vulnerability is caused by the lack of correct permission verification in the Xiaomi content center APP, and attackers can use this vulnerability to invoke the sensitive component functions of the Xiaomi content center APP. | [] | null | 5.3 | null | null |
|
CVE-2021-3619 | Rapid7 Velociraptor Notebooks Authenticated Persistent XSS | Rapid7 Velociraptor 0.5.9 and prior is vulnerable to a post-authentication persistent cross-site scripting (XSS) issue, where an authenticated user could abuse MIME filetype sniffing to embed executable code on a malicious upload. This issue was fixed in version 0.6.0. Note that login rights to Velociraptor is nearly always reserved for trusted and verified users with IT security backgrounds. | [
"cpe:2.3:a:rapid7:velociraptor:*:*:*:*:*:*:*:*"
] | null | 3.5 | null | null |
CVE-2020-14813 | Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: PIA Grids). Supported versions that are affected are 8.56, 8.57 and 8.58. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in PeopleSoft Enterprise PeopleTools, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise PeopleTools accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N). | [
"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.56:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.57:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.58:*:*:*:*:*:*:*"
] | null | 6.1 | null | null |
|
CVE-2024-40702 | IBM Cognos Controller improper certificate validation | IBM Cognos Controller 11.0.0 through 11.0.1 and IBM Controller 11.1.0 could allow an unauthorized user to obtain valid tokens to gain access to protected resources due to improper certificate validation. | [
"cpe:2.3:a:ibm:controller:11.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:cognos_controller:11.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:cognos_controller:11.0.1:*:*:*:*:*:*:*"
] | null | 8.2 | null | null |
CVE-2022-37099 | H3C H200 H200V100R004 was discovered to contain a stack overflow via the function UpdateSnat. | [
"cpe:2.3:o:h3c:h200_firmware:h200v100r004:*:*:*:*:*:*:*",
"cpe:2.3:h:h3c:h200:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
RHSA-2019:4074 | Red Hat Security Advisory: OpenShift Container Platform 4.2 runc security update | runc: AppArmor/SELinux bypass with malicious image that specifies a volume at /proc | [
"cpe:/a:redhat:openshift:4.2::el8"
] | null | null | 6.5 | null |
CVE-2019-19319 | In the Linux kernel before 5.2, a setxattr operation, after a mount of a crafted ext4 image, can cause a slab-out-of-bounds write access because of an ext4_xattr_set_entry use-after-free in fs/ext4/xattr.c when a large old_size value is used in a memset call, aka CID-345c0dbf3a30. | [
"cpe:2.3:o:linux:linux_kernel:5.0.21:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4.4 |
|
GHSA-378p-935f-rmpw | Stack-based buffer overflow in the (1) sid_parse and (2) dom_sid_parse functions in Samba before 3.5.5 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted Windows Security ID (SID) on a file share. | [] | null | null | null | null |
|
GHSA-m8hv-hvcc-x5wj | The ibon (aka tw.net.pic.mobi) application 3.2.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [] | null | null | null | null |
|
GHSA-qm5m-qmr4-7xjp | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in sonalsinha21 SKT Addons for Elementor allows Stored XSS. This issue affects SKT Addons for Elementor: from n/a through 3.5. | [] | null | 6.5 | null | null |
|
GHSA-78pc-4xg6-x467 | Multiple Lenze products of the cabinet series skip the password verification upon second login. After a user has been logged on to the device once, a remote attacker can get full access without knowledge of the password. | [] | null | 9.8 | null | null |
|
CVE-2020-29189 | Incorrect Access Control vulnerability in TerraMaster TOS <= 4.2.06 allows remote authenticated attackers to bypass read-only restriction and obtain full access to any folder within the NAS | [
"cpe:2.3:o:terra-master:tos:*:*:*:*:*:*:*:*"
] | null | 8.1 | null | 5.5 |
|
GHSA-4fr6-rgq9-hcp4 | P4Webs.exe in Perforce P4Web 2006.2 and earlier, when running on Windows, allows remote attackers to cause a denial of service (CPU consumption) via an HTTP request with an empty body and a Content-Length greater than 0. | [] | null | null | null | null |
|
CVE-2019-15711 | A privilege escalation vulnerability in FortiClient for Linux 6.2.1 and below may allow an user with low privilege to run system commands under root privilege via injecting specially crafted "ExportLogs" type IPC client requests to the fctsched process. | [
"cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:linux:*:*"
] | null | 7.8 | null | 7.2 |
|
CVE-2018-18907 | An issue was discovered on D-Link DIR-850L 1.21WW devices. A partially completed WPA handshake is sufficient for obtaining full access to the wireless network. A client can access the network by sending packets on Data Frames to the AP without encryption. | [
"cpe:2.3:o:dlink:dir-850l_firmare:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dir-850l:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
GHSA-jc6v-5cmr-j9pj | A vulnerability has been found in SourceCodester PHP Task Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file task-details.php. The manipulation of the argument task_id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-259069 was assigned to this vulnerability. | [] | null | 6.3 | null | null |
|
CVE-2019-5701 | NVIDIA GeForce Experience, all versions prior to 3.20.0.118, contains a vulnerability when GameStream is enabled in which an attacker with local system access can load the Intel graphics driver DLLs without validating the path or signature (also known as a binary planting or DLL preloading attack), which may lead to denial of service, information disclosure, or escalation of privileges through code execution. | [
"cpe:2.3:a:nvidia:geforce_experience:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | 6.2 |
|
GHSA-42p2-q66q-8hx8 | Missing authentication in Network Isolation of Ivanti EPM before 2022 SU6, or the 2024 September update allows a remote unauthenticated attacker to isolate managed devices from the network. | [] | null | 5.8 | null | null |
|
GHSA-2p3x-w5wm-64vh | Multiple SQL injection vulnerabilities in Cybozu Garoon 2.1.0 for Windows allow remote authenticated users to execute arbitrary SQL commands via the (1) tid parameter in the (a) todo/view (aka TODO List View), (b) todo/modify (aka TODO List Modify), or (c) todo/delete functionality; the (2) pid parameter in the (d) workflow/view or (e) workflow/print functionality; the (3) uid parameter in the (f) schedule/user_view, (g) phonemessage/add, (h) phonemessage/history, or (i) schedule/view functionality; the (4) cid parameter in (j) todo/index; the (5) iid parameter in the (k) memo/view or (l) memo/print functionality; or the (6) event parameter in the (m) schedule/view functionality. | [] | null | null | null | null |
|
RHSA-2019:1208 | Red Hat Security Advisory: rhvm-appliance security update | hardware: Microarchitectural Store Buffer Data Sampling (MSBDS) hardware: Micro-architectural Load Port Data Sampling - Information Leak (MLPDS) hardware: Microarchitectural Fill Buffer Data Sampling (MFBDS) hardware: Microarchitectural Data Sampling Uncacheable Memory (MDSUM) | [
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | null | 3.8 | null |
CVE-2007-2662 | SQL injection vulnerability in EfesTECH Haber 5.0 allows remote attackers to execute arbitrary SQL commands via the id parameter to the top-level URI. | [
"cpe:2.3:a:efestech_haber:efestech_haber:5.0:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
RHSA-2018:2147 | Red Hat Security Advisory: rh-git29-git security update | git: path sanity check in is_ntfs_dotgit() can read arbitrary memory git: arbitrary code execution when recursively cloning a malicious repository | [
"cpe:/a:redhat:rhel_software_collections:3::el6",
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | null | 8.8 | null |
GHSA-qf57-h7jv-39w7 | Tenda AX3 v16.03.12.10_CN was discovered to contain a stack overflow in the function form_fast_setting_wifi_set. This vulnerability allows attackers to cause a Denial of Service (DoS) via the timeZone parameter. | [] | null | null | null | null |
|
GHSA-gcqf-gvjg-mhm8 | Multiple vulnerabilities in libtiff before 3.8.1 allow context-dependent attackers to cause a denial of service via a TIFF image that triggers errors in (1) the TIFFFetchAnyArray function in (a) tif_dirread.c; (2) certain "codec cleanup methods" in (b) tif_lzw.c, (c) tif_pixarlog.c, and (d) tif_zip.c; (3) and improper restoration of setfield and getfield methods in cleanup functions within (e) tif_jpeg.c, tif_pixarlog.c, (f) tif_fax3.c, and tif_zip.c. | [] | null | null | null | null |
|
CVE-2015-1703 | Microsoft Internet Explorer 6 through 11 allows remote attackers to gain privileges via a crafted web site, aka "Internet Explorer Elevation of Privilege Vulnerability," a different vulnerability than CVE-2015-1704. | [
"cpe:2.3:a:microsoft:internet_explorer:6:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
CVE-2025-32188 | WordPress Advanced Woo Labels plugin <= 2.14 - Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ILLID Advanced Woo Labels allows Stored XSS. This issue affects Advanced Woo Labels: from n/a through 2.14. | [] | null | 6.5 | null | null |
GHSA-58vj-cv5w-v4v6 | Navidrome has Multiple SQL Injections and ORM Leak | Security Advisory: Multiple Vulnerabilities in NavidromeSummaryNavidrome automatically adds parameters in the URL to SQL queries. This can be exploited to access information by adding parameters like `password=...` in the URL (ORM Leak).Furthermore, the names of the parameters are not properly escaped, leading to SQL Injections.Finally, the username is used in a `LIKE` statement, allowing people to log in with `%` instead of their username.DetailsORM LeakWhen adding parameters to the URL, they are automatically included in an SQL `LIKE` statement (depending on the parameter's name). This allows attackers to potentially retrieve arbitrary information.For example, attackers can use the following request to test whether some encrypted passwords start with `AAA`:This results in an SQL query like `password LIKE 'AAA%'`, allowing attackers to slowly brute-force passwords. (Also, any reason for using encryption instead of hashing?)SQL InjectionsWhen adding parameters to the URL, they are automatically added to an SQL query. The names of the parameters are not properly escaped.This behavior can be used to inject arbitrary SQL code (SQL Injection), for example:This is only an example, but you should see an error message in the logs.Authentication WeaknessWhen retrieving the user for authentication, the following code is used:This relies on a `LIKE` statement and allows users to log in with `%` instead of the legitimate username.Proof of Concept (PoC)See above.ImpactThese vulnerabilities can be used to leak information and dump the contents of the database.CreditLouis Nyffenegger from PentesterLab | [] | 9.4 | 8.8 | null | null |
RHSA-2024:8721 | Red Hat Security Advisory: firefox security update | firefox: thunderbird: Permission leak via embed or object elements firefox: thunderbird: Use-after-free in layout with accessibility firefox: thunderbird: Confusing display of origin for external protocol handler prompt firefox: thunderbird: XSS due to Content-Disposition being ignored in multipart/x-mixed-replace response firefox: thunderbird: Origin of permission prompt could be spoofed by long URL firefox: thunderbird: Cross origin video frame leak firefox: thunderbird: History interface could have been used to cause a Denial of Service condition in the browser firefox: thunderbird: Clipboard "paste" button persisted across tabs firefox: DOM push subscription message could hang Firefox firefox: thunderbird: Memory safety bugs fixed in Firefox 132, Thunderbird 132, Firefox ESR 128.4, and Thunderbird 128.4 | [
"cpe:/a:redhat:rhel_e4s:9.0::appstream"
] | null | 8.8 | null | null |
CVE-2019-11929 | Insufficient boundary checks when formatting numbers in number_format allows read/write access to out-of-bounds memory, potentially leading to remote code execution. This issue affects HHVM versions prior to 3.30.10, all versions between 4.0.0 and 4.8.5, all versions between 4.9.0 and 4.18.2, and versions 4.19.0, 4.19.1, 4.20.0, 4.20.1, 4.20.2, 4.21.0, 4.22.0, 4.23.0. | [
"cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*",
"cpe:2.3:a:facebook:hhvm:4.19.0:*:*:*:*:*:*:*",
"cpe:2.3:a:facebook:hhvm:4.19.1:*:*:*:*:*:*:*",
"cpe:2.3:a:facebook:hhvm:4.20.0:*:*:*:*:*:*:*",
"cpe:2.3:a:facebook:hhvm:4.20.1:*:*:*:*:*:*:*",
"cpe:2.3:a:facebook:hhvm:4.20.2:*:*:*:*:*:*:*",
"cpe:2.3:a:facebook:hhvm:4.21.0:*:*:*:*:*:*:*",
"cpe:2.3:a:facebook:hhvm:4.22.0:*:*:*:*:*:*:*",
"cpe:2.3:a:facebook:hhvm:4.23.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
|
GHSA-96xr-jq73-gwf6 | gaizhenbiao/chuanhuchatgpt project, version <=20240802 is vulnerable to stored Cross-Site Scripting (XSS) in WebSocket session transmission. An attacker can inject malicious content into a WebSocket message. When a victim accesses this session, the malicious JavaScript is executed in the victim's browser. | [] | null | 6.1 | null | null |
|
CVE-2023-38130 | Cross-site request forgery (CSRF) vulnerability in CubeCart prior to 6.5.3 allows a remote unauthenticated attacker to delete data in the system. | [
"cpe:2.3:a:cubecart:cubecart:*:*:*:*:*:*:*:*"
] | null | 8.1 | null | null |
|
CVE-2014-4691 | Session fixation vulnerability in pfSense before 2.1.4 allows remote attackers to hijack web sessions via a firewall login cookie. | [
"cpe:2.3:a:netgate:pfsense:*:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
CVE-2020-12706 | Multiple Cross-site scripting vulnerabilities in PHP-Fusion 9.03.50 allow remote attackers to inject arbitrary web script or HTML via the go parameter to faq/faq_admin.php or shoutbox_panel/shoutbox_admin.php | [
"cpe:2.3:a:php-fusion:php-fusion:9.03.50:*:*:*:*:*:*:*"
] | null | 5.4 | null | 3.5 |
Subsets and Splits