id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2015-1215 | The filters implementation in Skia, as used in Google Chrome before 41.0.2272.76, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger an out-of-bounds write operation. | [
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.6.z:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2012-0938 | Multiple SQL injection vulnerabilities in TestLink 1.9.3, 1.8.5b, and earlier allow remote authenticated users with certain permissions to execute arbitrary SQL commands via the root_node parameter in the display_children function to (1) getrequirementnodes.php or (2) gettprojectnodes.php in lib/ajax/; the (3) cfield_id parameter in an edit action to lib/cfields/cfieldsEdit.php; the (4) id parameter in an edit action or (5) plan_id parameter in a create action to lib/plan/planMilestonesEdit.php; or the req_spec_id parameter to (6) reqImport.php or (7) in a create action to reqEdit.php in lib/requirements/. NOTE: some of these details are obtained from third party information. | [
"cpe:2.3:a:testlink:testlink:1.8.5b:*:*:*:*:*:*:*",
"cpe:2.3:a:testlink:testlink:1.9.3:*:*:*:*:*:*:*"
] | null | null | null | 6.5 |
|
CVE-2018-4201 | An issue was discovered in certain Apple products. iOS before 11.4 is affected. Safari before 11.1.1 is affected. iCloud before 7.5 on Windows is affected. iTunes before 12.7.5 on Windows is affected. tvOS before 11.4 is affected. watchOS before 4.3.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site. | [
"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.8 |
|
CVE-2025-0428 | AI Power: Complete AI Pack <= 1.8.96 - Authenticated (Admin+) PHP Object Injection via wpaicg_export_prompts | The "AI Power: Complete AI Pack" plugin for WordPress is vulnerable to PHP Object Injection in versions up to, and including, 1.8.96 via deserialization of untrusted input from the $form['post_content'] variable through the wpaicg_export_prompts function. This allows authenticated attackers, with administrative privileges, to inject a PHP Object. No POP chain is present in the vulnerable plugin. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code. | [] | null | 7.2 | null | null |
GHSA-vpgx-838j-hqq6 | Racom's MIDGE Firmware 4.4.40.105 contains an issue that allows for cross-site request forgeries. | [] | null | null | null | null |
|
GHSA-8c7w-228p-48xg | In ImageMagick 7.0.6-6 and GraphicsMagick 1.3.26, a heap-based buffer over-read was found in the function SFWScan in coders/sfw.c, which allows attackers to cause a denial of service via a crafted file. | [] | null | null | 6.5 | null |
|
GHSA-7x6x-63cg-vwxm | Adobe Experience Manager versions 6.5.21 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | [] | null | 5.4 | null | null |
|
RHSA-2023:1978 | Red Hat Security Advisory: haproxy security update | haproxy: segfault DoS haproxy: request smuggling attack in HTTP/1 header parsing | [
"cpe:/a:redhat:rhel_eus:9.0::appstream"
] | null | 8.2 | null | null |
GHSA-6grm-385j-c2m8 | A SQL injection vulnerability exists in Rocket.Chat <v3.18.6, <v4.4.4 and <v4.7.3 which can allow an attacker to retrieve a reset password token through or a 2fa secret. | [] | null | 8.8 | null | null |
|
GHSA-vcrg-x2hw-fh4w | Windows Remote Access Connection Manager Elevation of Privilege Vulnerability | [] | null | 7.8 | null | null |
|
CVE-2016-0424 | Unspecified vulnerability in the JD Edwards EnterpriseOne Tools component in Oracle JD Edwards Products 9.1 and 9.2 allows remote attackers to affect availability via vectors related to Enterprise Infrastructure SEC, a different vulnerability than CVE-2016-0422. | [
"cpe:2.3:a:oracle:jd_edwards_products:9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jd_edwards_products:9.2:*:*:*:*:*:*:*"
] | null | null | null | 7.1 |
|
GHSA-fwr7-9543-4584 | Gitlab Enterprise Edition version 10.1.0 is vulnerable to an insufficiently protected credential issue in the project service integration API endpoint resulting in an information disclosure of plaintext password. | [] | null | null | 7.2 | null |
|
CVE-2023-33335 | Cross Site Scripting (XSS) in Sophos Sophos iView (The EOL was December 31st 2020) in grpname parameter that allows arbitrary script to be executed. | [
"cpe:2.3:a:sophos:iview:-:*:*:*:*:*:*:*"
] | null | 6.1 | null | null |
|
GHSA-cc93-84wc-xxg5 | libpthread in Apple iOS before 8.4.1 and OS X before 10.10.5 allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via an app that uses a crafted syscall to interfere with locking. | [] | null | null | null | null |
|
CVE-2022-4033 | The Quiz and Survey Master plugin for WordPress is vulnerable to input validation bypass via the 'question[id]' parameter in versions up to, and including, 8.0.4 due to insufficient input validation that allows attackers to inject content other than the specified value (i.e. a number, file path, etc..). This makes it possible attackers to submit values other than the intended input type. | [
"cpe:2.3:a:expresstech:quiz_and_survey_master:*:*:*:*:*:wordpress:*:*"
] | null | 5.3 | null | null |
|
GHSA-wq4c-r2c3-fv9c | LibTIFF 4.4.0 has an out-of-bounds write in tiffcrop in tools/tiffcrop.c:3609, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 33aee127. | [] | null | 5.5 | null | null |
|
GHSA-h6h3-r62m-p923 | In Telephony, there is a possible leak of ICCID and EID due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-221431393 | [] | null | 5.5 | null | null |
|
GHSA-f54r-7cc6-9xfj | Unspecified vulnerability in Oracle Sun Solaris 10 allows local users to affect integrity via unknown vectors related to Branded Zone. | [] | null | null | null | null |
|
GHSA-qh2w-vp8r-w5jg | SQL injection vulnerability in the Volunteer Management System (com_volunteer) module 2.0 for Joomla! allows remote attackers to execute arbitrary SQL commands via the job_id parameter in a jobshow action to index.php. | [] | null | null | null | null |
|
GHSA-5ww9-9qp2-x524 | Improper handling of double quotes in file name in Diffy in Windows environment | The function that calls the diff tool in versions of Diffy prior to 3.4.1 does not properly handle double quotes in a filename when run in a Windows environment. This allows attackers to execute arbitrary commands via a crafted string. | [] | null | 9.8 | null | null |
CVE-2013-4185 | Algorithmic complexity vulnerability in OpenStack Compute (Nova) before 2013.1.3 and Havana before havana-3 does not properly handle network source security group policy updates, which allows remote authenticated users to cause a denial of service (nova-network consumption) via a large number of server-creation operations, which triggers a large number of update requests. | [
"cpe:2.3:a:openstack:compute:*:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openstack:3.0:*:*:*:*:*:*:*"
] | null | null | null | 4 |
|
CVE-2025-47557 | WordPress MapSVG plugin <= 8.5.31 - Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in RomanCode MapSVG allows Stored XSS. This issue affects MapSVG: from n/a through 8.5.31. | [] | null | 6.5 | null | null |
CVE-2024-1831 | SourceCodester Complete File Management System Login Form index.php sql injection | A vulnerability, which was classified as critical, was found in SourceCodester Complete File Management System 1.0. Affected is an unknown function of the file users/index.php of the component Login Form. The manipulation of the argument username with the input torada%27+or+%271%27+%3D+%271%27+--+- leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-254622 is the identifier assigned to this vulnerability. | [
"cpe:2.3:a:nelzkie15:complete_file_management_system:1.0:*:*:*:*:*:*:*"
] | null | 7.3 | 7.3 | 7.5 |
GHSA-r2gr-fhmr-66c5 | "Arbitrary code execution in socket.io-file" | "The socket.io-file package through 2.0.31 for Node.js relies on client-side validation of file types, which allows remote attackers to execute arbitrary code by uploading an executable file via a modified JSON name field. NOTE: This vulnerability only affects products that are no longer supported by the maintainer." | [] | null | 7.8 | null | null |
CVE-2015-8067 | Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK & Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454. | [
"cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:19.0.0.245:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
GHSA-8f5f-8xpp-8qfr | Cross Site Scripting vulnerability in Automatic Systems Maintenance SlimLane 29565_d74ecce0c1081d50546db573a499941b10799fb7 allows a remote attacker to escalate privileges via the FtpConfig.php component. | [] | null | 6.1 | null | null |
|
GHSA-hv98-7354-pr7h | SQL injection vulnerability in index.php in the Freshlinks 1.0 RC1 module for PHP-Fusion allows remote attackers to execute arbitrary SQL commands via the linkid parameter. | [] | null | null | null | null |
|
GHSA-g3q8-xr3c-hrx7 | This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader 8.3.1.21155. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of Image filters. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the current process. Was ZDI-CAN-5079. | [] | null | null | 6.5 | null |
|
GHSA-7fj7-39wj-c64f | SwiftNIO vulnerable to Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Response Splitting') | `NIOHTTP1` and projects using it for generating HTTP responses, including SwiftNIO, can be subject to a HTTP Response Injection attack. This occurs when a HTTP/1.1 server accepts user generated input from an incoming request and reflects it into a HTTP/1.1 response header in some form. A malicious user can add newlines to their input (usually in encoded form) and "inject" those newlines into the returned HTTP response.This capability allows users to work around security headers and HTTP/1.1 framing headers by injecting entirely false responses or other new headers. The injected false responses may also be treated as the response to subsequent requests, which can lead to XSS, cache poisoning, and a number of other flaws.This issue was resolved by adding a default channel handler that polices outbound headers. This channel handler is added by default to channel pipelines, but can be removed by users if they are doing this validation themselves. | [] | null | 5.3 | null | null |
GHSA-hg3r-h4ch-mc2m | Session fixation vulnerability in Falcon WisePoint 4.1.19.7 and earlier allows remote attackers to hijack web sessions via unspecified vectors. | [] | null | null | null | null |
|
GHSA-hg7v-c244-59q7 | SQL injection vulnerability in wp-load.php in the BuddyPress plugin 1.5.x before 1.5.5 of WordPress allows remote attackers to execute arbitrary SQL commands via the page parameter in an activity_widget_filter action. | [] | null | null | null | null |
|
GHSA-93cp-72p2-5f74 | SolarWinds Serv-U is vulnerable to a directory traversal vulnerability where remote code execution is possible depending on privileges given to the authenticated user. This issue requires a user to be authenticated and this is present when software environment variables are abused. Authentication is required for this vulnerability | [] | null | 7.5 | null | null |
|
GHSA-3wwj-m72m-pxmg | The mintToken function of a smart contract implementation for GMile, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value. | [] | null | null | 7.5 | null |
|
GHSA-mx5w-mv9g-2f46 | The Chien Binh Bakugan 2 LongTieng (aka com.htv.chien.binh.bakugan.ii.hanh.trinh.moi.long.tieng) application 2.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [] | null | null | null | null |
|
CVE-2023-45288 | HTTP/2 CONTINUATION flood in net/http | An attacker may cause an HTTP/2 endpoint to read arbitrary amounts of header data by sending an excessive number of CONTINUATION frames. Maintaining HPACK state requires parsing and processing all HEADERS and CONTINUATION frames on a connection. When a request's headers exceed MaxHeaderBytes, no memory is allocated to store the excess headers, but they are still parsed. This permits an attacker to cause an HTTP/2 endpoint to read arbitrary amounts of header data, all associated with a request which is going to be rejected. These headers can include Huffman-encoded data which is significantly more expensive for the receiver to decode than for an attacker to send. The fix sets a limit on the amount of excess header frames we will process before closing a connection. | [
"cpe:2.3:a:go_standard_library:net\\/http:*:*:*:*:*:*:*:*",
"cpe:2.3:a:golang:http2:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
CVE-2020-4975 | IBM Engineering products are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 192435. | [
"cpe:2.3:a:ibm:doors_next:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:doors_next:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:doors_next:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:engineering_lifecycle_management:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:engineering_lifecycle_management:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:engineering_lifecycle_management:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:engineering_requirements_quality_assistant_on-premises:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:engineering_test_management:7.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:engineering_test_management:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:engineering_test_management:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:engineering_workflow_management:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:engineering_workflow_management:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:engineering_workflow_management:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:global_configuration_management:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_doors_next_generation:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_doors_next_generation:6.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_doors_next_generation:6.0.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_quality_manager:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_quality_manager:6.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_quality_manager:6.0.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_team_concert:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_team_concert:6.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_team_concert:6.0.6.1:*:*:*:*:*:*:*"
] | null | null | 5.4 | null |
|
GHSA-m9mf-786v-p6mh | Heap-based buffer overflow in the JBIG2 filter in Adobe Reader 7 and Acrobat 7 before 7.1.3, Adobe Reader 8 and Acrobat 8 before 8.1.6, and Adobe Reader 9 and Acrobat 9 before 9.1.2 might allow remote attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2009-0510, CVE-2009-0512, CVE-2009-0888, and CVE-2009-0889. | [] | null | null | null | null |
|
GHSA-8q59-68wh-w68x | An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.32. There is a heap-based buffer over-read in _bfd_doprnt in bfd.c because elf_object_p in elfcode.h mishandles an e_shstrndx section of type SHT_GROUP by omitting a trailing '\0' character. | [] | null | 5.5 | null | null |
|
CVE-2024-47519 | Backup uploads to ETM subject to man-in-the-middle interception | Backup uploads to ETM subject to man-in-the-middle interception | [] | null | 8.3 | null | null |
CVE-2023-47257 | ConnectWise ScreenConnect through 23.8.4 allows man-in-the-middle attackers to achieve remote code execution via crafted messages. | [
"cpe:2.3:a:connectwise:automate:-:*:*:*:*:*:*:*",
"cpe:2.3:a:connectwise:screenconnect:*:*:*:*:*:*:*:*"
] | null | 8.1 | null | null |
|
GHSA-v2j3-f5j8-8jrp | Redmi router RB03 v1.0.57 is vulnerable to forged ICMP redirect message attacks. An attacker in the same WLAN as the victim can hijack the traffic between the victim and any remote server by sending out forged ICMP redirect messages. | [] | null | 0 | null | null |
|
CVE-2022-25114 | Event Management v1.0 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the full_name parameter under register.php. | [
"cpe:2.3:a:event_management_project:event_management:1.0:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 |
|
RHBA-2024:3840 | Red Hat Bug Fix Advisory: golang bug fix update | golang: net: malformed DNS message can cause infinite loop | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
CVE-2023-32443 | An out-of-bounds read was addressed with improved input validation. This issue is fixed in macOS Monterey 12.6.8, macOS Ventura 13.5, macOS Big Sur 11.7.9. Processing a file may lead to a denial-of-service or potentially disclose memory contents. | [
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*"
] | null | 8.1 | null | null |
|
CVE-2025-23051 | Authenticated Remote Code Execution in AOS Web-based Management Interface | An authenticated parameter injection vulnerability exists in the web-based management interface of the AOS-8 and AOS-10 Operating Systems. Successful exploitation could allow an authenticated user to leverage parameter injection to overwrite arbitrary system files. | [] | null | 7.2 | null | null |
GHSA-5w36-wp44-4494 | Multiple directory traversal vulnerabilities in ShowOff! 1.5.4 allow remote attackers to read arbitrary files via ".." sequences in arguments to the (1) ShowAlbum, (2) ShowVideo, or (3) ShowGraphic scripts. | [] | null | null | null | null |
|
CVE-2024-21784 | Uncontrolled search path for some Intel(R) IPP Cryptography software before version 2021.11 may allow an authenticated user to potentially enable escalation of privilege via local access. | [
"cpe:2.3:a:intel:ipp_cryptography:*:*:*:*:*:*:*:*"
] | 5.4 | 6.7 | null | null |
|
GHSA-jx7q-9m4v-jj44 | A flaw was found in Ansible Tower, versions 3.6.x before 3.6.2, where files in '/var/backup/tower' are left world-readable. These files include both the SECRET_KEY and the database backup. Any user with access to the Tower server, and knowledge of when a backup is run, could retrieve every credential stored in Tower. Access to data is the highest threat with this vulnerability. | [] | null | 5.5 | null | null |
|
GHSA-6rx2-v6x4-xrvh | IBM AIX 7.1, 7.2, and VIOS 3.1 could allow a non-privileged local user to exploit a vulnerability in EFS to expose sensitive information. IBM X-Force ID: 206085. | [] | null | 6.2 | null | null |
|
CVE-2014-9976 | In all Qualcomm products with Android releases from CAF using the Linux kernel, a buffer overflow vulnerability exists in 1x call processing. | [
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*"
] | null | null | 9.8 | 10 |
|
GHSA-jw33-rh5j-73mm | Use After Free in GitHub repository gpac/gpac prior to 2.3-DEV. | [] | null | null | 5.3 | null |
|
GHSA-p6cv-q8p6-3vx5 | ftpd in IBM AIX 7.1.1 before SP10 and 7.1.2 before SP5, when a Workload Partition (aka WPAR) for AIX 5.2 or 5.3 is used, allows remote authenticated users to bypass intended permission settings and modify arbitrary files via FTP commands. | [] | null | null | null | null |
|
CVE-2019-25088 | ytti Oxidized Web conf_search.haml cross site scripting | A vulnerability was found in ytti Oxidized Web. It has been classified as problematic. Affected is an unknown function of the file lib/oxidized/web/views/conf_search.haml. The manipulation of the argument to_research leads to cross site scripting. It is possible to launch the attack remotely. The name of the patch is 55ab9bdc68b03ebce9280b8746ef31d7fdedcc45. It is recommended to apply a patch to fix this issue. VDB-216870 is the identifier assigned to this vulnerability. | [
"cpe:2.3:a:oxidized_web_project:oxidized_web:*:*:*:*:*:oxidized:*:*"
] | null | 3.5 | 3.5 | null |
GHSA-46v9-cj82-m562 | Adobe Flash Player before 18.0.0.241 and 19.x before 19.0.0.185 on Windows and OS X and before 11.2.202.521 on Linux, Adobe AIR before 19.0.0.190, Adobe AIR SDK before 19.0.0.190, and Adobe AIR SDK & Compiler before 19.0.0.190 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-5575, CVE-2015-5578, CVE-2015-5580, CVE-2015-5582, CVE-2015-5588, and CVE-2015-6677. | [] | null | null | null | null |
|
GHSA-27rx-wrqr-qj3v | WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1. | [] | null | null | null | null |
|
GHSA-wc4r-2r4r-4q4j | The CFNetwork Proxies subsystem in Apple iOS before 9.3.2, OS X before 10.11.5, and tvOS before 9.2.1 mishandles URLs in http and https requests, which allows remote attackers to obtain sensitive information via unspecified vectors. | [] | null | null | 7.5 | null |
|
GHSA-685w-vc84-wxcx | Doorkeeper vulnerable to Cross-site Request Forgery | Cross-site request forgery (CSRF) vulnerability in doorkeeper before 1.4.1 allows remote attackers to hijack the authentication of unspecified victims for requests that read a user OAuth authorization code via unknown vectors. | [] | null | null | null | null |
GHSA-29p2-p4jq-qf4p | An issue was discovered in the Linux kernel through 4.17.10. There is a NULL pointer dereference in fscrypt_do_page_crypto() in fs/crypto/crypto.c when operating on a file in a corrupted f2fs image. | [] | null | null | 5.5 | null |
|
CVE-2006-2102 | Directory traversal vulnerability in PowerISO 2.9 allows remote attackers to write arbitrary files via a .. (dot dot) in a filename in an ISO image. | [
"cpe:2.3:a:poweriso:poweriso:2.9:*:*:*:*:*:*:*"
] | null | null | null | 7.8 |
|
CVE-2016-10033 | The mailSend function in the isMail transport in PHPMailer before 5.2.18 might allow remote attackers to pass extra parameters to the mail command and consequently execute arbitrary code via a \" (backslash double quote) in a crafted Sender property. | [
"cpe:2.3:a:phpmailer_project:phpmailer:*:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
|
GHSA-fj2m-w3wv-x9pr | Apache Calcite before 1.32.0 vulnerable to potential XML External Entity (XXE) attack | In Apache Calcite prior to version 1.32.0 the SQL operators EXISTS_NODE, EXTRACT_XML, XML_TRANSFORM and EXTRACT_VALUE do not restrict XML External Entity references in their configuration, which makes them vulnerable to a potential XML External Entity (XXE) attack. Therefore any client exposing these operators, typically by using Oracle dialect (the first three) or MySQL dialect (the last one), is affected by this vulnerability (the extent of it will depend on the user under which the application is running). From Apache Calcite 1.32.0 onwards, Document Type Declarations and XML External Entity resolution are disabled on the impacted operators. | [] | null | 9.8 | null | null |
cisco-sa-ise-priv-esc-fNZX8hHj | Cisco Identity Services Engine Privilege Escalation Vulnerability | A vulnerability in the Microsoft Active Directory integration of Cisco Identity Services Engine (ISE) could allow an authenticated, local attacker to elevate privileges on an affected device. To exploit this vulnerability, an attacker would need to have a valid administrator account on an affected device.
The vulnerability is due to incorrect privilege assignment. An attacker could exploit this vulnerability by logging in to the system with a crafted Active Directory account. A successful exploit could allow the attacker to obtain root privileges on an affected device.
Note: Only devices that have the CLI configured to support Active Directory authentication are affected by this vulnerability. CLI support for Active Directory authentication is disabled by default. All other uses of Active Directory Domain Services or Active Directory Certificate Services within ISE are not affected.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-priv-esc-fNZX8hHj ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-priv-esc-fNZX8hHj"] | [] | null | null | 4.4 | null |
CVE-2023-42726 | In TeleService, there is a possible out of bounds read due to a missing bounds check. This could lead to local denial of service with System execution privileges needed | [
"cpe:2.3:o:google:android:11.0:-:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t310:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*"
] | null | 4.4 | null | null |
|
CVE-2021-24955 | ProfilePress < 3.2.3 - Reflected Cross-Site Scripting | The User Registration, Login Form, User Profile & Membership WordPress plugin before 3.2.3 does not escape the data parameter of the pp_get_forms_by_builder_type AJAX action before outputting it back in an attribute, leading to a Reflected Cross-Site Scripting issue | [
"cpe:2.3:a:profilepress:user_registration\\,_login_form\\,_user_profile_\\&_membership:*:*:*:*:*:wordpress:*:*"
] | null | 6.1 | null | 4.3 |
CVE-2024-8260 | OPA SMB Force-Authentication | A SMB force-authentication vulnerability exists in all versions of OPA for Windows prior to v0.68.0. The vulnerability exists because of improper input validation, allowing a user to pass an arbitrary SMB share instead of a Rego file as an argument to OPA CLI or to one of the OPA Go library’s functions. | [
"cpe:2.3:a:openpolicyagent:open_policy_agent:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 6.1 | null | null |
GHSA-p9jm-mj56-jwpj | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Enguerran Weiss Related Post Shortcode allows Stored XSS. This issue affects Related Post Shortcode: from n/a through 1.2. | [] | null | 5.9 | null | null |
|
GHSA-w66w-cmgq-cc2j | In Emby Server 4.6.7.0, the playlist name field is vulnerable to XSS stored where it is possible to steal the administrator access token and flip or steal the media server administrator account. | [] | null | 6.1 | null | null |
|
GHSA-7f6f-mqg7-656v | An issue was discovered on FiberHome HG6245D devices through RP2613. A hardcoded GEPON password for root is defined inside /etc/init.d/system-config.sh. | [] | null | null | null | null |
|
GHSA-5526-v5x9-76x6 | tinyexr 0.9.5 has a integer overflow over-write in tinyexr::DecodePixelData in tinyexr.h, related to OpenEXR code. | [] | null | null | null | null |
|
CVE-2025-22230 | Authentication bypass vulnerability | VMware Tools for Windows contains an authentication bypass vulnerability due to improper access control. A malicious actor with non-administrative privileges on a guest VM may gain ability to perform certain high privilege operations within that VM. | [] | null | 7.8 | null | null |
CVE-2024-13922 | Order Export & Order Import for WooCommerce <= 2.6.0 - Directory Traversal to Authenticated (Administrator+) Limited Arbitrary File Deletion via admin_log_page Function | The Order Export & Order Import for WooCommerce plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the admin_log_page() function in all versions up to, and including, 2.6.0. This makes it possible for authenticated attackers, with Administrator-level access and above, to delete arbitrary log files on the server. | [] | null | 2.7 | null | null |
CVE-2002-1076 | Buffer overflow in the Web Messaging daemon for Ipswitch IMail before 7.12 allows remote attackers to execute arbitrary code via a long HTTP GET request for HTTP/1.0. | [
"cpe:2.3:a:ipswitch:imail:6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ipswitch:imail:6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ipswitch:imail:6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ipswitch:imail:6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ipswitch:imail:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ipswitch:imail:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ipswitch:imail:7.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ipswitch:imail:7.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ipswitch:imail:7.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ipswitch:imail:7.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ipswitch:imail:7.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ipswitch:imail:7.1:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2022-33150 | An OS command injection vulnerability exists in the js_package install functionality of Robustel R1510 3.1.16. A specially-crafted network request can lead to arbitrary command execution. An attacker can send a sequence of requests to trigger this vulnerability. | [
"cpe:2.3:o:robustel:r1510_firmware:3.1.16:*:*:*:*:*:*:*",
"cpe:2.3:o:robustel:r1510_firmware:3.3.0:*:*:*:*:*:*:*",
"cpe:2.3:h:robustel:r1510:-:*:*:*:*:*:*:*"
] | null | null | 9.1 | null |
|
RHSA-2018:2557 | Red Hat Security Advisory: postgresql security update | postgresql: Certain host connection parameters defeat client-side security defenses | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 8.5 | null |
GHSA-h553-c26c-rcj5 | The WP Statistics plugin through 12.6.2 for WordPress has XSS, allowing a remote attacker to inject arbitrary web script or HTML via the Referer header of a GET request. | [] | null | null | 6.1 | null |
|
CVE-2020-4383 | IBM Spectrum Scale for IBM Elastic Storage Server 5.3.0 through 5.3.5 could allow an authenticated user to cause a denial of service during deployment while configuring some of the network services. IBM X-Force ID: 179165. | [
"cpe:2.3:a:ibm:elastic_storage_server:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"
] | null | null | 5.3 | null |
|
CVE-2008-0808 | Cross-site scripting (XSS) vulnerability in the meta plugin in Ikiwiki before 1.1.47 allows remote attackers to inject arbitrary web script or HTML via meta tags. | [
"cpe:2.3:a:ikiwiki:ikiwiki:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ikiwiki:ikiwiki:1.33.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ikiwiki:ikiwiki:2.31:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-r72x-34hh-p96r | Hospital's Patient Records Management System v1.0 is vulnerable to SQL Injection via /hprms/classes/Master.php?f=delete_room_type. | [] | null | 7.2 | null | null |
|
GHSA-xqj5-wxw2-5ww9 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Saturday Drive Ninja Forms allows Stored XSS.This issue affects Ninja Forms: from n/a through 3.8.16. | [] | null | 5.9 | null | null |
|
CVE-2017-10817 | MaLion for Windows and Mac 5.0.0 to 5.2.1 allows remote attackers to bypass authentication to alter settings in Relay Service Server. | [
"cpe:2.3:a:intercom:malion:*:*:*:*:*:macos:*:*",
"cpe:2.3:a:intercom:malion:*:*:*:*:*:windows:*:*"
] | null | 9.8 | null | 7.5 |
|
GHSA-qf84-3fjj-8852 | sshd in OpenSSH before 6.6 does not properly support wildcards on AcceptEnv lines in sshd_config, which allows remote attackers to bypass intended environment restrictions by using a substring located before a wildcard character. | [] | null | null | 4.9 | null |
|
GHSA-jx4w-rr49-wxxx | Improper neutralization in the Intel(R) EMA software before version 1.8.1.0 may allow a privileged user to potentially enable escalation of privilege via network access. | [] | null | 5.3 | null | null |
|
CVE-2022-25689 | Denial of service in Modem due to reachable assertion in Snapdragon Mobile | [
"cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ar8035:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca8081:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca8337_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca8337:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn6024_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn6024:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn9024_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn9024:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx65_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx65:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6855_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6855:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6856_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6856:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
|
GHSA-jjvr-cr6v-6j24 | Polycom RealPresence Resource Manager (aka RPRM) before 8.4 allows local users with access to the plcm account to gain privileges via a script in /var/polycom/cma/upgrade/scripts, related to a sudo misconfiguration. | [] | null | null | 7 | null |
|
CVE-2022-44215 | There is an open redirect vulnerability in Titan FTP server 19.0 and below. Users are redirected to any target URL. | [
"cpe:2.3:a:southrivertech:titan_ftp_server:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | null |
|
RHSA-2023:5749 | Red Hat Security Advisory: .NET 7.0 security update | HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 7.5 | null | null |
GHSA-jc57-fhf9-9rff | In WCDMA in all Android releases from CAF using the Linux kernel, a Use of Out-of-range Pointer Offset vulnerability could potentially exist. | [] | null | null | 7.8 | null |
|
GHSA-7rq3-6hvw-rrqj | Buffer overflow in the ABWOutputDev::endWord function in poppler/ABWOutputDev.cc in Poppler (aka libpoppler) 0.10.6, 0.12.0, and possibly other versions, as used by the Abiword pdftoabw utility, allows user-assisted remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted PDF file. | [] | null | null | null | null |
|
GHSA-x87f-mqc8-m3q3 | The Blog Filter plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'vivafbcomment' shortcode in versions up to, and including, 1.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] | null | 6.4 | null | null |
|
CVE-2020-12870 | RainbowFish PacsOne Server 6.8.4 allows SQL injection on the username parameter in the signup page. | [
"cpe:2.3:a:rainbowfishsoftware:pacsone_server:6.8.4:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
|
CVE-2021-3536 | A flaw was found in Wildfly in versions before 23.0.2.Final while creating a new role in domain mode via the admin console, it is possible to add a payload in the name field, leading to XSS. This affects Confidentiality and Integrity. | [
"cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:data_grid:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:descision_manager:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:integration_camel_quarkus:-:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:wildfly:*:*:*:*:*:*:*:*"
] | null | 4.8 | null | 3.5 |
|
CVE-2020-10552 | An issue was discovered in Psyprax before 3.2.2. The Firebird database is accessible with the default user sysdba and password masterke after installation. This allows any user to access it and read and modify the contents, including passwords. Local database files can be accessed directly as well. | [
"cpe:2.3:a:psyprax:psyprax:*:*:*:*:*:*:*:*"
] | null | 8.1 | null | 5.5 |
|
GHSA-rq9w-r6f6-gfvr | Entrepreneur Job Portal Script 2.0.6 has SQL Injection via the jobsearch_all.php rid1 parameter. | [] | null | null | 9.8 | null |
|
GHSA-234j-gj4m-9pxf | IBM API Connect 5.0.0.0 through 5.0.8.6 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 159944. | [] | null | 7.5 | null | null |
|
GHSA-5pv7-p9r3-2cwx | IBM Predictive Solutions Foundation (formerly PMQ) could allow a remote attacker to include arbitrary files. A remote attacker could send a specially-crafted URL to specify a file from the local system, which could allow the attacker to obtain sensitive information. IBM X-Force ID: 119618. | [] | null | null | 5.3 | null |
|
CVE-2020-7490 | A CWE-426: Untrusted Search Path vulnerability exists in Vijeo Designer Basic (V1.1 HotFix 15 and prior) and Vijeo Designer (V6.9 SP9 and prior), which could cause arbitrary code execution on the system running Vijeo Basic when a malicious DLL library is loaded by the Product. | [
"cpe:2.3:a:schneider-electric:vijeo_designer:*:*:*:*:basic:*:*:*",
"cpe:2.3:a:schneider-electric:vijeo_designer:*:*:*:*:-:*:*:*",
"cpe:2.3:a:schneider-electric:vijeo_designer:1.1:-:*:*:basic:*:*:*",
"cpe:2.3:a:schneider-electric:vijeo_designer:1.1:hotfix_15:*:*:basic:*:*:*",
"cpe:2.3:a:schneider-electric:vijeo_designer:6.9:-:*:*:-:*:*:*",
"cpe:2.3:a:schneider-electric:vijeo_designer:6.9:sp9:*:*:-:*:*:*"
] | null | 7.8 | null | 6.9 |
|
GHSA-cjvx-45vc-gv4r | The page cache feature in Mozilla Firefox before 1.5.0.10 and 2.x before 2.0.0.2, and SeaMonkey before 1.0.8 can generate hash collisions that cause page data to be appended to the wrong page cache, which allows remote attackers to obtain sensitive information or enable further attack vectors when the target page is reloaded from the cache. | [] | null | null | null | null |
|
GHSA-mpwf-4gcq-qc4r | Microsoft Internet Explorer 11 and Microsoft Edge allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Microsoft Browser Memory Corruption Vulnerability." | [] | null | null | 8.8 | null |
|
GHSA-666r-6mfg-455c | An issue was discovered in Apport before 2.20.4. A malicious Apport crash file can contain a restart command in `RespawnCommand` or `ProcCmdline` fields. This command will be executed if a user clicks the Relaunch button on the Apport prompt from the malicious crash file. The fix is to only show the Relaunch button on Apport crash files generated by local systems. The Relaunch button will be hidden when crash files are opened directly in Apport-GTK. | [] | null | null | 6.5 | null |
|
GHSA-rj62-3vmp-2f6j | It was discovered that Kibana was not validating a user supplied path, which would load .pbf files. Because of this, a malicious user could arbitrarily traverse the Kibana host to load internal files ending in the .pbf extension. | [] | null | 3.1 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.