id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
GHSA-h74p-5crf-72xc | The lookupProviders function in providerMgr.c in sblim-sfcb 1.3.4 and 1.3.18 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an empty className in a packet. | [] | null | null | null | null |
|
CVE-2024-5396 | itsourcecode Online Student Enrollment System newfaculty.php sql injection | A vulnerability classified as critical has been found in itsourcecode Online Student Enrollment System 1.0. Affected is an unknown function of the file newfaculty.php. The manipulation of the argument name leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-266310 is the identifier assigned to this vulnerability. | [
"cpe:2.3:a:itsourcecode:online_student_enrollment_system:1.0:*:*:*:*:*:*:*"
] | 5.3 | 6.3 | 6.3 | 6.5 |
GHSA-5q9f-4pxq-x2gv | This issue was addressed with improved redaction of sensitive information. This issue is fixed in watchOS 9.5, macOS Ventura 13.4, tvOS 16.5, iOS 16.5 and iPadOS 16.5, macOS Big Sur 11.7.7, macOS Monterey 12.6.6. An app may be able to bypass Privacy preferences | [] | null | 5.5 | null | null |
|
CVE-2024-56711 | drm/panel: himax-hx83102: Add a check to prevent NULL pointer dereference | In the Linux kernel, the following vulnerability has been resolved:
drm/panel: himax-hx83102: Add a check to prevent NULL pointer dereference
drm_mode_duplicate() could return NULL due to lack of memory,
which will then call NULL pointer dereference. Add a check to
prevent it. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.13:rc3:*:*:*:*:*:*"
] | null | 5.5 | null | null |
CVE-2021-24400 | Display users <= 2.0.0 - Authenticated SQL Injection | The Edit Role functionality in the Display Users WordPress plugin through 2.0.0 had an `id` parameter which is not sanitised, escaped or validated before inserting to a SQL statement, leading to SQL injection. | [
"cpe:2.3:a:wp-display-users_project:wp-display-users:*:*:*:*:*:wordpress:*:*"
] | null | 7.2 | null | 6.5 |
RHSA-2020:3519 | Red Hat Security Advisory: OpenShift Container Platform 4.5.7 jenkins and openshift packages security update | jenkins: Stored XSS vulnerability in job build time trend jenkins: Stored XSS vulnerability in upstream cause jenkins: Stored XSS vulnerability in 'keep forever' badge icons jenkins: Stored XSS vulnerability in console links kubernetes: Node disk DOS by writing to container /etc/hosts | [
"cpe:/a:redhat:openshift:4.5::el7",
"cpe:/a:redhat:openshift:4.5::el8"
] | null | 5.5 | null | null |
GHSA-4jjh-fj8q-cr9r | Cross-site scripting (XSS) vulnerability in index.php in sabros.us 1.7 allows remote attackers to inject arbitrary web script or HTML via the tag parameter. | [] | null | null | null | null |
|
CVE-2023-23804 | WordPress HT Feed Plugin <= 1.2.7 is vulnerable to Cross Site Request Forgery (CSRF) | Cross-Site Request Forgery (CSRF) vulnerability in HasThemes HT Feed plugin <= 1.2.7 versions. | [
"cpe:2.3:a:hasthemes:ht_feed:*:*:*:*:*:wordpress:*:*"
] | null | 4.3 | null | null |
cisco-sa-cucm-imp-dos-49GL7rzT | Cisco Unified Communications Manager IM & Presence Service Denial of Service Vulnerability | A vulnerability in the XCP Authentication Service of the Cisco Unified Communications Manager IM & Presence Service (Unified CM IM&P) could allow an unauthenticated, remote attacker to cause a temporary service outage for all Cisco Unified CM IM&P users who are attempting to authenticate to the service, resulting in a denial of service (DoS) condition.
This vulnerability is due to improper validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted login message to the affected device. A successful exploit could allow the attacker to cause an unexpected restart of the authentication service, preventing new users from successfully authenticating. Exploitation of this vulnerability does not impact Cisco Unified CM IM&P users who were authenticated prior to an attack.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
| [] | null | 7.5 | null | null |
CVE-2018-8641 | An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory, aka "Win32k Elevation of Privilege Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2019, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-8639. | [
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
] | null | null | 7.8 | 7.2 |
|
GHSA-qxhg-cm25-fj25 | Adobe Acrobat and Reader versions 2019.008.20081 and earlier, 2019.008.20080 and earlier, 2019.008.20081 and earlier, 2017.011.30106 and earlier version, 2017.011.30105 and earlier version, 2015.006.30457 and earlier, and 2015.006.30456 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. | [] | null | null | 6.5 | null |
|
CVE-2012-5606 | Multiple cross-site scripting (XSS) vulnerabilities in ownCloud before 4.0.9 and 4.5.0 allow remote attackers to inject arbitrary web script or HTML via the (1) file name to apps/files_versions/js/versions.js or (2) apps/files/js/filelist.js; or (3) event title to 3rdparty/fullcalendar/js/fullcalendar.js. | [
"cpe:2.3:a:owncloud:owncloud:*:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:4.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:4.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:4.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:4.5.0:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-cq38-jh5f-37mq | sigstore-go has an unbounded loop over untrusted input can lead to endless data attack | Impactsigstore-go is susceptible to a denial of service attack when a verifier is provided a maliciously crafted Sigstore Bundle containing large amounts of verifiable data, in the form of signed transparency log entries, RFC 3161 timestamps, and attestation subjects. The verification of these data structures is computationally expensive. This can be used to consume excessive CPU resources, leading to a denial of service attack. TUF's security model labels this type of vulnerability an "Endless data attack," and can lead to verification failing to complete and disrupting services that rely on sigstore-go for verification.The vulnerable loops are in the verification functions in the package `github.com/sigstore/sigstore-go/pkg/verify`. The first is the DSSE envelope verification loop in `verifyEnvelopeWithArtifact`, which decodes all the digests in an attestation can be found here:https://github.com/sigstore/sigstore-go/blob/725e508ed4933e6f5b5206e32af4bbe76f587b54/pkg/verify/signature.go#L183-L193The next loop is in the `VerifyArtifactTransparencyLog` function, which verifies all the signed entries in a bundle:https://github.com/sigstore/sigstore-go/blob/725e508ed4933e6f5b5206e32af4bbe76f587b54/pkg/verify/tlog.go#L74-L178The next loop is the `VerifyTimestampAuthority` function, which verifies all the RFC 3161 timestamps in a bundle:https://github.com/sigstore/sigstore-go/blob/725e508ed4933e6f5b5206e32af4bbe76f587b54/pkg/verify/tsa.go#L59-L68PatchesThis vulnerability is addressed with sigstore-go 0.6.1, which adds hard limits to the number of verifiable data structures that can be processed in a bundle. Verification will fail if a bundle has data that exceeds these limits. The limits are:32 signed transparency log entries32 RFC 3161 timestamps1024 attestation subjects32 digests per attestation subjectThese limits are intended to be high enough to accommodate the vast majority of use cases, while preventing the verification of maliciously crafted bundles that contain large amounts of verifiable data.WorkaroundsThe best way to mitigate the risk is to upgrade to sigstore-go 0.6.1 or later. Users who are vulnerable but unable to quickly upgrade may consider adding manual bundle validation to enforce limits similar to those in the referenced patch prior to calling sigstore-go's verification functions. | [] | 2.3 | 3.1 | null | null |
GHSA-3rq9-p85x-qfcj | Cross-site scripting (XSS) vulnerability in test-plugin.php in the Swipe Checkout for eShop plugin 3.7.0 and earlier for WordPress allows remote attackers to inject arbitrary web script or HTML via the api_url parameter. | [] | null | null | null | null |
|
GHSA-32jr-8q2g-wwf3 | Multiple directory traversal vulnerabilities in the View Log Files component in Axigen Free Mail Server allow remote attackers to read or delete arbitrary files via a .. (dot dot) in (1) the fileName parameter in a download action to source/loggin/page_log_dwn_file.hsp, or the fileName parameter in (2) an edit action or (3) a delete action to the default URI. | [] | null | null | null | null |
|
GHSA-jxr5-qf7m-8vh9 | rejucms 2.1 has XSS via the ucenter/cms_user_add.php u_name parameter. | [] | null | null | 6.1 | null |
|
CVE-2024-45751 | tgt (aka Linux target framework) before 1.0.93 attempts to achieve entropy by calling rand without srand. The PRNG seed is always 1, and thus the sequence of challenges is always identical. | [] | null | 5.9 | null | null |
|
CVE-2006-4246 | Usermin before 1.220 (20060629) allows remote attackers to read arbitrary files, possibly related to chfn/save.cgi not properly handling an empty shell parameter, which results in changing root's shell instead of the shell of a specified user. | [
"cpe:2.3:a:usermin:usermin:*:*:*:*:*:*:*:*",
"cpe:2.3:a:usermin:usermin:0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:usermin:usermin:0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:usermin:usermin:0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:usermin:usermin:0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:usermin:usermin:0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:usermin:usermin:0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:usermin:usermin:0.91:*:*:*:*:*:*:*",
"cpe:2.3:a:usermin:usermin:0.92:*:*:*:*:*:*:*",
"cpe:2.3:a:usermin:usermin:0.93:*:*:*:*:*:*:*",
"cpe:2.3:a:usermin:usermin:0.94:*:*:*:*:*:*:*",
"cpe:2.3:a:usermin:usermin:0.95:*:*:*:*:*:*:*",
"cpe:2.3:a:usermin:usermin:0.96:*:*:*:*:*:*:*",
"cpe:2.3:a:usermin:usermin:0.97:*:*:*:*:*:*:*",
"cpe:2.3:a:usermin:usermin:0.98:*:*:*:*:*:*:*",
"cpe:2.3:a:usermin:usermin:0.99:*:*:*:*:*:*:*",
"cpe:2.3:a:usermin:usermin:1.000:*:*:*:*:*:*:*",
"cpe:2.3:a:usermin:usermin:1.010:*:*:*:*:*:*:*",
"cpe:2.3:a:usermin:usermin:1.020:*:*:*:*:*:*:*",
"cpe:2.3:a:usermin:usermin:1.030:*:*:*:*:*:*:*",
"cpe:2.3:a:usermin:usermin:1.040:*:*:*:*:*:*:*",
"cpe:2.3:a:usermin:usermin:1.051:*:*:*:*:*:*:*",
"cpe:2.3:a:usermin:usermin:1.060:*:*:*:*:*:*:*",
"cpe:2.3:a:usermin:usermin:1.070:*:*:*:*:*:*:*",
"cpe:2.3:a:usermin:usermin:1.080:*:*:*:*:*:*:*",
"cpe:2.3:a:usermin:usermin:1.090:*:*:*:*:*:*:*",
"cpe:2.3:a:usermin:usermin:1.100:*:*:*:*:*:*:*",
"cpe:2.3:a:usermin:usermin:1.110:*:*:*:*:*:*:*",
"cpe:2.3:a:usermin:usermin:1.120:*:*:*:*:*:*:*",
"cpe:2.3:a:usermin:usermin:1.130:*:*:*:*:*:*:*",
"cpe:2.3:a:usermin:usermin:1.140:*:*:*:*:*:*:*",
"cpe:2.3:a:usermin:usermin:1.150:*:*:*:*:*:*:*"
] | null | null | null | 3.6 |
|
GHSA-hjjc-xj45-xrrg | The Login using WordPress Users ( WP as SAML IDP ) WordPress plugin before 1.13.4 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks when the unfiltered_html capability is disallowed (for example in multisite setup) | [] | null | 4.8 | null | null |
|
GHSA-9mqj-rmc8-938f | Password Manager for IIS 2.0 has a cross-site scripting (XSS) vulnerability via the /isapi/PasswordManager.dll ResultURL parameter. | [] | null | 6.1 | null | null |
|
CVE-2013-1406 | The Virtual Machine Communication Interface (VMCI) implementation in vmci.sys in VMware Workstation 8.x before 8.0.5 and 9.x before 9.0.1 on Windows, VMware Fusion 4.1 before 4.1.4 and 5.0 before 5.0.2, VMware View 4.x before 4.6.2 and 5.x before 5.1.2 on Windows, VMware ESXi 4.0 through 5.1, and VMware ESX 4.0 and 4.1 does not properly restrict memory allocation by control code, which allows local users to gain privileges via unspecified vectors. | [
"cpe:2.3:a:vmware:workstation:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workstation:8.0.0.18997:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workstation:8.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workstation:8.0.1.27038:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workstation:8.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workstation:8.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workstation:8.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workstation:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:fusion:4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:fusion:4.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:fusion:4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:fusion:4.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:fusion:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:fusion:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:view:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:view:4.0.0:u2:*:*:*:*:*:*",
"cpe:2.3:a:vmware:view:4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:view:4.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:view:4.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:view:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:view:5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:view:5.0.0:u2:*:*:*:*:*:*",
"cpe:2.3:a:vmware:view:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:view:5.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:view:5.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:4.0:1:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:4.0:2:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:4.0:3:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:4.0:4:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:4.1:1:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:4.1:2:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.0:1:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.0:2:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esx:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esx:4.1:*:*:*:*:*:*:*"
] | null | null | null | 7.2 |
|
GHSA-hf55-2mfj-2hrg | An issue was discovered in FusionPBX before 4.5.30. The fax_post_size may have risky characters (it is not constrained to preset values). | [] | null | null | null | null |
|
GHSA-9qwg-ch53-9rxw | A flaw was found in libsoup. A vulnerability in the sniff_unknown() function may lead to heap buffer over-read. | [] | null | 6.5 | null | null |
|
GHSA-w65f-4h2f-cpj2 | TruDesk Help Desk/Ticketing Solution v1.1.11 is vulnerable to a Cross-Site Request Forgery (CSRF) attack which would allow an attacker to restart the server, causing a DoS attack. The attacker must craft a webpage that would perform a GET request to the /api/v1/admin/restart endpoint, then the victim (who has sufficient privileges), would visit the page and the server restart would begin. The attacker must know the full URL that TruDesk is on in order to craft the webpage. | [] | null | 6.5 | null | null |
|
GHSA-5f2r-qp73-37mr | `CHECK`-failures during Grappler's `SafeToRemoveIdentity` in Tensorflow | ImpactThe Grappler optimizer in TensorFlow can be used to cause a denial of service by altering a `SavedModel` such that [`SafeToRemoveIdentity`](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/optimizers/dependency_optimizer.cc#L59-L98) would trigger `CHECK` failures.PatchesWe have patched the issue in GitHub commit [92dba16749fae36c246bec3f9ba474d9ddeb7662](https://github.com/tensorflow/tensorflow/commit/92dba16749fae36c246bec3f9ba474d9ddeb7662).
The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.For more informationPlease consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. | [] | null | 6.5 | null | null |
RHSA-2011:0858 | Red Hat Security Advisory: xerces-j2 security update | JDK: XML parsing Denial-Of-Service (6845701) | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
CVE-2023-3657 | SourceCodester AC Repair and Services System HTTP POST Request sql injection | A vulnerability, which was classified as critical, has been found in SourceCodester AC Repair and Services System 1.0. This issue affects some unknown processing of the file Master.php?f=save_book of the component HTTP POST Request Handler. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The associated identifier of this vulnerability is VDB-234011. | [
"cpe:2.3:a:oretnom23:ac_repair_and_services_system:1.0:*:*:*:*:*:*:*"
] | null | 6.3 | 6.3 | 6.5 |
CVE-2011-0653 | Cross-site scripting (XSS) vulnerability in Microsoft Office SharePoint Server 2010 Gold and SP1, and SharePoint Foundation 2010, allows remote attackers to inject arbitrary web script or HTML via the URI, aka "XSS in SharePoint Calendar Vulnerability." | [
"cpe:2.3:a:microsoft:sharepoint_foundation:2010:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_server:2010:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_server:2010:sp1:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-xmmx-7jpf-fx42 | Moby (Docker Engine) is vulnerable to Ambiguous OCI manifest parsing | ImpactIn the OCI Distribution Specification version 1.0.0 and prior and in the OCI Image Specification version 1.0.1 and prior, manifest and index documents are ambiguous without an accompanying Content-Type HTTP header. Versions of Moby (Docker Engine) prior to 20.10.11 treat the Content-Type header as trusted and deserialize the document according to that header. If the Content-Type header changed between pulls of the same ambiguous document (with the same digest), the document may be interpreted differently, meaning that the digest alone is insufficient to unambiguously identify the content of the image.PatchesThis issue has been fixed in Moby (Docker Engine) 20.10.11. Image pulls for manifests that contain a “manifests” field or indices which contain a “layers” field are rejected.WorkaroundsEnsure you only pull images from trusted sources.Referenceshttps://github.com/opencontainers/distribution-spec/security/advisories/GHSA-mc8v-mgrf-8f4m
https://github.com/opencontainers/image-spec/security/advisories/GHSA-77vh-xpmg-72qhFor more informationIf you have any questions or comments about this advisory:[Open an issue in](https://github.com/moby/moby/issues/new)Email us at [[email protected]](mailto:[email protected]) | [] | null | null | null | null |
GHSA-j34w-447c-w9jw | IBM Emptoris Contract Management 10.0.0 and 10.1.3.0 could disclose sensitive information from detailed information from error messages. IBM X-Force ID: 153657. | [] | null | null | 5.3 | null |
|
GHSA-2h73-vgw2-r579 | Improper handling of pending navigation entries in Navigation in Google Chrome on iOS prior to 66.0.3359.117 allowed a remote attacker to perform domain spoofing via a crafted HTML page. | [] | null | null | 6.5 | null |
|
GHSA-fcw4-qcmw-m499 | Multiple unrestricted file upload vulnerabilities in the WP Symposium plugin before 11.12.24 for WordPress allow remote attackers to execute arbitrary code by uploading a file with an executable extension using (1) uploadify/upload_admin_avatar.php or (2) uploadify/upload_profile_avatar.php, then accessing it via a direct request to the file in an unspecified directory inside the webroot. | [] | null | null | null | null |
|
CVE-2022-29359 | A stored cross-site scripting (XSS) vulnerability in /scas/?page=clubs/application_form&id=7 of School Club Application System v0.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the firstname parameter. | [
"cpe:2.3:a:school_club_application_system_project:school_club_application_system:1.0:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 |
|
GHSA-8chj-vfwh-89pj | The WP Table Builder WordPress plugin through 1.5.0 does not sanitise and escape some of its Table data, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) | [] | null | 4.8 | null | null |
|
RHSA-2011:1089 | Red Hat Security Advisory: systemtap security update | systemtap: signed module loading race condition | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
GHSA-wwjw-r3gj-39fq | Insufficient Session Expiration in TYPO3's Admin Tool | MetaCVSS: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:L/E:F/RL:O/RC:C` (5.6)ProblemAdmin Tool sessions initiated via the TYPO3 backend user interface have not been revoked even if the corresponding user account was degraded to lower permissions or disabled completely. This way, sessions in the admin tool theoretically could have been prolonged without any limit.SolutionUpdate to TYPO3 versions 9.5.35 ELTS, 10.4.29, 11.5.11 that fix the problem described above.CreditsThanks to Kien Hoang who reported this issue and to TYPO3 framework merger Ralf Zimmermann and TYPO3 security member Oliver Hader who fixed the issue.References[TYPO3-CORE-SA-2022-005](https://typo3.org/security/advisory/typo3-core-sa-2022-005) | [] | null | 6 | null | null |
GHSA-3wpm-h778-w432 | PHP Scripts Mall Online Lottery PHP Readymade Script 1.7.0 has Reflected Cross-site Scripting (XSS) via the err value in a .ico picture upload. | [] | null | null | 5.4 | null |
|
CVE-2022-39022 | e-Excellence Inc. U-Office Force - Path Traversal | U-Office Force Download function has a path traversal vulnerability. A remote attacker with general user privilege can exploit this vulnerability to download arbitrary system file. | [
"cpe:2.3:a:edetw:u-office_force:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | null |
RHSA-2017:0457 | Red Hat Security Advisory: Red Hat JBoss Web Server security and enhancement update | tomcat: timing attack in Realm implementation tomcat: unsafe chown of catalina.log in tomcat init script allows privilege escalation tomcat: Usage of vulnerable FileUpload package can result in denial of service tomcat: security manager bypass via IntrospectHelper utility function tomcat: tomcat writable config files allow privilege escalation tomcat: system property disclosure tomcat: security manager bypass via JSP Servlet config parameters tomcat: unrestricted access to global resources tomcat: HTTP Request smuggling vulnerability due to permitting invalid character in HTTP requests tomcat: Remote code execution vulnerability in JmxRemoteLifecycleListener tomcat: information disclosure due to incorrect Processor sharing | [
"cpe:/a:redhat:jboss_enterprise_web_server:3.1"
] | null | null | 7.5 | null |
CVE-2022-40118 | Online Banking System v1.0 was discovered to contain a SQL injection vulnerability via the cust_id parameter at /net-banking/send_funds_action.php. | [
"cpe:2.3:a:online_banking_system_project:online_banking_system:1.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
GHSA-xf73-8777-6w59 | Student Information System v1.0 is vulnerable to multiple Authenticated SQL Injection vulnerabilities. The 'coursecode' parameter of the marks.php resource does not validate the characters received and they are sent unfiltered to the database. | [] | null | 9.8 | null | null |
|
CVE-2022-34094 | Portal do Software Publico Brasileiro i3geo v7.0.5 was discovered to contain a cross-site scripting (XSS) vulnerability via request_token.php. | [
"cpe:2.3:a:softwarepublico:i3geo:7.0.5:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 |
|
CVE-2025-26486 | Broken or Risky Cryptographic Algorithm, Use of Password Hash
With Insufficient Computational Effort, Use of Weak Hash, Use of a
One-Way Hash with a Predictable Salt vulnerabilities in Beta80 "Life 1st Identity Manager"
enable an attacker with access to
password hashes
to bruteforce user passwords or find a collision to ultimately while attempting to gain access to a target application that uses "Life 1st Identity Manager" as a service for authentication.
This issue affects Life 1st: 1.5.2.14234. | [] | null | 6 | null | null |
|
GHSA-j9xx-xhxp-xr79 | Pepperl+Fuchs Comtrol IO-Link Master in Version 1.5.48 and below is prone to an authenticated blind OS Command Injection. | [] | null | null | null | null |
|
GHSA-m7cw-wqhh-5pr9 | COMFAST CF-WR630AX v2.7.0.2 was discovered to contain a hardcoded password vulnerability in /etc/shadow, which allows attackers to log in as root. | [] | null | 9.8 | null | null |
|
GHSA-r6h8-vrh6-m65f | Uncontrolled search path for some Intel(R) Chipset Software Installation Utility before version 10.1.19867.8574 may allow an authenticated user to potentially enable escalation of privilege via local access. | [] | 5.4 | 6.7 | null | null |
|
GHSA-3r8p-382h-8p7p | Oracle Database Server 10g Release 2 allows local users to execute arbitrary SQL queries via the GET_DOMAIN_INDEX_METADATA function in the DBMS_EXPORT_EXTENSION package. NOTE: this issue was originally linked to DB05 (CVE-2006-1870), but a reliable third party has claimed that it is not the same issue. Based on details of the problem, the primary issue appears to be insecure privileges that facilitate the introduction of SQL in a way that is not related to special characters, so this is not "SQL injection" per se. | [] | null | null | null | null |
|
GHSA-3w44-mqq2-q3wr | Kofax Power PDF JP2 File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Kofax Power PDF. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of JP2 files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-20485. | [] | null | null | 7.8 | null |
|
CVE-2019-0586 | A remote code execution vulnerability exists in Microsoft Exchange software when the software fails to properly handle objects in memory, aka "Microsoft Exchange Memory Corruption Vulnerability." This affects Microsoft Exchange Server. | [
"cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_10:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_11:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:exchange_server:2019:-:*:*:*:*:*:*"
] | null | 9.8 | null | 10 |
|
CVE-2015-3795 | libxpc in Apple iOS before 8.4.1 and OS X before 10.10.5 allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app that sends a malformed XPC message. | [
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
CVE-2025-23665 | WordPress RSV GMaps plugin <= 1.5 - CSRF to Stored XSS vulnerability | Cross-Site Request Forgery (CSRF) vulnerability in Rapid Sort RSV GMaps allows Stored XSS.This issue affects RSV GMaps: from n/a through 1.5. | [] | null | 7.1 | null | null |
CVE-2008-2503 | Buffer overflow in Uploadlist in eMule X-Ray before 1.4 has unknown impact and remote attack vectors. | [
"cpe:2.3:a:sourceforge:emule_x-ray:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:sourceforge:emule_x-ray:1.3:*:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
GHSA-hr6r-r632-pjw9 | The Drag and Drop Multiple File Upload WordPress plugin before 1.3.6.3 allows SVG files to be uploaded by default via the dnd_codedropz_upload AJAX action, which could lead to Stored Cross-Site Scripting issue | [] | null | 5.4 | null | null |
|
CVE-2002-1928 | 602Pro LAN SUITE 2002 allows remote attackers to view the directory tree via an HTTP GET request with a trailing "~" (tilde) or ".bak" extension. | [
"cpe:2.3:a:software602:602pro_lan_suite:2002:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2023-52876 | clk: mediatek: clk-mt7629-eth: Add check for mtk_alloc_clk_data | In the Linux kernel, the following vulnerability has been resolved:
clk: mediatek: clk-mt7629-eth: Add check for mtk_alloc_clk_data
Add the check for the return value of mtk_alloc_clk_data() in order to
avoid NULL pointer dereference. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
GHSA-rhqc-pf5h-2p72 | Dragonfly in Opera before 11.60 allows remote attackers to cause a denial of service (application crash) via unspecified content on a web page, as demonstrated by forbes.com. | [] | null | null | null | null |
|
CVE-2015-8034 | The state.sls function in Salt before 2015.8.3 uses weak permissions on the cache data, which allows local users to obtain sensitive information by reading the file. | [
"cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:*"
] | null | null | 3.3 | 2.1 |
|
GHSA-6w59-822p-m435 | An issue was discovered in Mattermost Server before 5.7, 5.6.3, 5.5.2, and 4.10.5. It mishandles permissions for user-access token creation. | [] | null | null | null | null |
|
GHSA-4c85-h2g3-r272 | Stack-based buffer overflow in Vortex Light Alloy before 4.7.4 allows remote attackers to execute arbitrary code via a long URL in a .m3u file. | [] | null | null | null | null |
|
RHSA-2015:1920 | Red Hat Security Advisory: java-1.7.0-openjdk security update | OpenJDK: kerberos realm name leak (JGSS, 8048030) OpenJDK: inefficient use of hash tables and lists during XML parsing (JAXP, 8068842) OpenJDK: missing checks for proper initialization in ObjectStreamClass (Serialization, 8103671) OpenJDK: HttpURLConnection header restriction bypass (Libraries, 8130193) OpenJDK: insufficient permission checks in StubGenerator (CORBA, 8076383) OpenJDK: OOB access in CMS code (2D, 8086092) OpenJDK: leak of user.dir location (JAXP, 8078427) OpenJDK: java.nio Buffers integer overflow issues (Libraries, 8130891) ICU: missing boundary checks in layout engine (OpenJDK 2D, 8132042) OpenJDK: incorrect access control context used in DGCImpl (RMI, 8080688) OpenJDK: incomplete constraints enforcement by AlgorithmChecker (Security, 8131291) OpenJDK: missing type checks in IIOPInputStream (CORBA, 8076392) OpenJDK: incorrect String object deserialization in IIOPInputStream (CORBA, 8076387) OpenJDK: incorrect access control context used in DGCClient (RMI, 8076413) OpenJDK: incomplete MaxXMLNameLimit enforcement (JAXP, 8086733) OpenJDK: insufficient proxy class checks in RemoteObjectInvocationHandler (RMI, 8076339) OpenJDK: incomplete supportDTD enforcement (JAXP, 8130078) | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
CVE-2022-24820 | Unauthenticated user can list hidden document from multiple velocity templates | XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. A guest user without the right to view pages of the wiki can still list documents by rendering some velocity documents. The problem has been patched in XWiki versions 12.10.11, 13.4.4, and 13.9-rc-1. There is no known workaround for this problem. | [
"cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*",
"cpe:2.3:a:xwiki:xwiki:13.9:-:*:*:*:*:*:*"
] | null | 5.3 | null | null |
GHSA-8648-h559-8h42 | Fluid Components TYPO3 extension vulnerable to Cross-Site Scripting | All versions of Fluid Components before 3.5.0 were susceptible to Cross-Site Scripting. Version 3.5.0 of the extension fixes this issue. Due to the nature of the problem, some changes in your project's Fluid templates might be necessary to prevent unwanted double-escaping of HTML markup. | [] | null | 6.1 | null | null |
CVE-2017-5786 | A local Unauthorized Data Modification vulnerability in HPE OfficeConnect Network Switches version PT.02.01 including PT.01.03 through PT.01.14 | [
"cpe:2.3:o:hp:officeconnect_1820_8g_switch_j9979a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:officeconnect_1820_8g_switch_j9979a_firmware:pt.02.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:officeconnect_1820_8g_switch_j9979a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:officeconnect_1820_24g_poe\\+_\\(185w\\)_switch_j9983a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:officeconnect_1820_24g_poe\\+_\\(185w\\)_switch_j9983a_firmware:pt.02.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:officeconnect_1820_24g_poe\\+_\\(185w\\)_switch_j9983a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:officeconnect_1820_24g_switch_j9980a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:officeconnect_1820_24g_switch_j9980a_firmware:pt.02.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:officeconnect_1820_24g_switch_j9980a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:officeconnect_1820_48g_poe\\+_\\(370w\\)_switch_j9984a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:officeconnect_1820_48g_poe\\+_\\(370w\\)_switch_j9984a_firmware:pt.02.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:officeconnect_1820_48g_poe\\+_\\(370w\\)_switch_j9984a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:officeconnect_1820_48g_switch_j9981a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:officeconnect_1820_48g_switch_j9981a_firmware:pt.02.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:officeconnect_1820_48g_switch_j9981a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:officeconnect_1820_8g_poe\\+_\\(65w\\)_switch_j9982a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:officeconnect_1820_8g_poe\\+_\\(65w\\)_switch_j9982a_firmware:pt.02.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:officeconnect_1820_8g_poe\\+_\\(65w\\)_switch_j9982a:-:*:*:*:*:*:*:*"
] | null | null | 5.5 | 2.1 |
|
CVE-2024-23094 | Flusity-CMS v2.33 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /cover/addons/info_media_gallery/action/edit_addon_post.php | [
"cpe:2.3:a:flusity:cms:v2.33:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
|
GHSA-hvrx-8j5q-54c6 | An exploitable out-of-bounds write vulnerability exists in the ico_read function of the igcore19d.dll library of Accusoft ImageGear 19.6.0. A specially crafted ICO file can cause an out-of-bounds write, resulting in a remote code execution. An attacker needs to provide a malformed file to the victim to trigger the vulnerability. | [] | null | 8.8 | null | null |
|
CVE-2021-28055 | An issue was discovered in Centreon-Web in Centreon Platform 20.10.0. The anti-CSRF token generation is predictable, which might allow CSRF attacks that add an admin user. | [
"cpe:2.3:a:centreon:centreon:20.10.0:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4.3 |
|
GHSA-pgfm-49cm-23cx | An improper access control vulnerability in Trend Micro Deep Security Agent 20 could allow a local attacker to escalate privileges on affected installations.Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. | [] | null | 7.8 | null | null |
|
CVE-2002-0622 | The Office Web Components (OWC) package installer for Microsoft Commerce Server 2000 allows remote attackers to execute commands by passing the commands as input to the OWC package installer, aka "OWC Package Command Execution". | [
"cpe:2.3:a:microsoft:commerce_server:2000:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:commerce_server:2000:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:commerce_server:2000:sp2:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-42vc-w257-pp26 | The Net::IPAddress::Util module before 5.000 for Perl does not properly consider extraneous zero characters in an IP address string, which (in some situations) allows attackers to bypass access control that is based on IP addresses. | [] | null | 6.5 | null | null |
|
CVE-2022-47213 | Microsoft Office Graphics Remote Code Execution Vulnerability | Microsoft Office Graphics Remote Code Execution Vulnerability | [
"cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:*:*"
] | null | 7.8 | null | null |
RHSA-2020:3280 | Red Hat Security Advisory: nss and nspr security, bug fix, and enhancement update | nss: Use-after-free in sftk_FreeSession due to improper refcounting nss: Check length of inputs for cryptographic primitives nss: TLS 1.3 HelloRetryRequest downgrade request sets client into invalid state nss: Timing attack on DSA signature generation nss: Side channel vulnerabilities during RSA key generation | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 4.4 | 8.1 | null |
GHSA-r2r4-m6fw-2jwh | SQL Injection exists in the Fastball 2.5 component for Joomla! via the season parameter in a view=player action. | [] | null | 9.8 | null | null |
|
GHSA-62pg-hjc9-8wrw | Password Generator (aka Pwgen) before 2.07 generates weak non-tty passwords, which makes it easier for context-dependent attackers to guess the password via a brute-force attack. | [] | null | null | null | null |
|
CVE-2024-9759 | Tungsten Automation Power PDF GIF File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability | Tungsten Automation Power PDF GIF File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Tungsten Automation Power PDF. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of GIF files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-24475. | [
"cpe:2.3:a:tungstenautomation:power_pdf:*:*:*:*:*:*:*:*"
] | null | null | 3.3 | null |
GHSA-fh42-q9qf-98jh | IBM Storage Protect Plus Server 10.1.0 through 10.1.15.2 Admin Console could allow a remote attacker to obtain sensitive information due to improper validation of unsecured endpoints which could be used in further attacks against the system. IBM X-Force ID: 270599. | [] | null | 5.3 | null | null |
|
GHSA-vc68-vpf2-7xq5 | This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley MicroStation CONNECT 10.16.02.34. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of IFC files. Crafted data in an IFC file can trigger a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-16368. | [] | null | 7.8 | null | null |
|
CVE-2025-45487 | Linksys E5600 v1.1.0.26 was discovered to contain a command injection vulnerability in the runtime.InternetConnection function. | [] | null | 6.5 | null | null |
|
GHSA-gvjh-w2gj-wqhg | Multiple memory leaks in the OpenSSL extension in PHP before 5.3.6 might allow remote attackers to cause a denial of service (memory consumption) via (1) plaintext data to the openssl_encrypt function or (2) ciphertext data to the openssl_decrypt function. | [] | null | null | null | null |
|
GHSA-7mq4-q26p-5pj7 | The PDF plugin in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android incorrectly followed redirects, which allowed a remote attacker to bypass the Same Origin Policy via a crafted HTML page. | [] | null | null | 8.8 | null |
|
CVE-2019-8158 | An XPath entity injection vulnerability exists in Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3 or 2.3.2-p1. An attacker can craft a GET request to page cache block rendering module that gets passed to XML data processing engine without validation. The crafted key/value GET request data allows an attacker to limited access to underlying XML data. | [
"cpe:2.3:a:magento:magento:*:*:*:*:commerce:*:*:*",
"cpe:2.3:a:magento:magento:*:*:*:*:open_source:*:*:*",
"cpe:2.3:a:magento:magento:2.3.2:-:*:*:commerce:*:*:*",
"cpe:2.3:a:magento:magento:2.3.2:-:*:*:open_source:*:*:*"
] | null | 9.8 | null | 7.5 |
|
CVE-2010-0478 | Stack-based buffer overflow in nsum.exe in the Windows Media Unicast Service in Media Services for Microsoft Windows 2000 Server SP4 allows remote attackers to execute arbitrary code via crafted packets associated with transport information, aka "Media Services Stack-based Buffer Overflow Vulnerability." | [
"cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
GHSA-84fw-wvq7-7x27 | Nextcloud Server before 11.0.7 and 12.0.5 suffers from an Authorization Bypass Through User-Controlled Key vulnerability. A missing ownership check allowed logged-in users to change the scope of app passwords of other users. Note that the app passwords themselves where neither disclosed nor could the error be misused to identify as another user. | [] | null | null | 5.7 | null |
|
GHSA-7c37-p4gh-wrh2 | Multiple cross-site scripting (XSS) vulnerabilities in the Token module before 4.7.x-1.5, and 5.x before 5.x-1.9, for Drupal; as used by the ASIN Field, e-Commerce, Fullname field for CCK, Invite, Node Relativity, Pathauto, PayPal Node, and Ubercart modules; allow remote authenticated users with a post comments privilege to inject arbitrary web script or HTML via unspecified vectors related to (1) comments, (2) vocabulary names, (3) term names, and (4) usernames. | [] | null | null | null | null |
|
CVE-2023-25753 | Server-Side Request Forgery in Apache ShenYu |
There exists an SSRF (Server-Side Request Forgery) vulnerability located at the /sandbox/proxyGateway endpoint. This vulnerability allows us to manipulate arbitrary requests and retrieve corresponding responses by inputting any URL into the requestUrl parameter.
Of particular concern is our ability to exert control over the HTTP method, cookies, IP address, and headers. This effectively grants us the capability to dispatch complete HTTP requests to hosts of our choosing.
This issue affects Apache ShenYu: 2.5.1.
Upgrade to Apache ShenYu 2.6.0 or apply patch https://github.com/apache/shenyu/pull/4776 .
| [
"cpe:2.3:a:apache:shenyu:2.5.1:*:*:*:*:*:*:*"
] | null | 6.5 | null | null |
GHSA-c954-w2fm-c62r | SQL injection vulnerability in libs/Wakka.class.php in WikkaWiki (Wikka Wiki) before 1.1.6.3 allows remote attackers to execute arbitrary SQL commands via the limit parameter. NOTE: this issue only applies to a "modified installation." | [] | null | null | null | null |
|
CVE-1999-0578 | A Windows NT system's registry audit policy does not log an event success or failure for security-critical registry keys. | [
"cpe:2.3:o:microsoft:windows_nt:*:*:*:*:*:*:*:*"
] | null | null | null | 4.6 |
|
CVE-2008-4080 | SQL injection vulnerability in Stash 1.0.3, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary SQL commands via the (1) username parameter to admin/library/authenticate.php and the (2) download parameter to downloadmp3.php. NOTE: some of these details are obtained from third party information. | [
"cpe:2.3:a:stash:stash:1.0.3:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
CVE-2024-20076 | In Modem, there is a possible system crash due to incorrect error handling. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01297806; Issue ID: MSV-1481. | [
"cpe:2.3:h:mediatek:mt2731:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6767:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
|
CVE-2019-19734 | _account_move_file_in_folder.ajax.php in MFScripts YetiShare 3.5.2 directly inserts values from the fileIds parameter into a SQL string. This allows an attacker to inject their own SQL and manipulate the query, typically extracting data from the database, aka SQL Injection. | [
"cpe:2.3:a:mfscripts:yetishare:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.5 |
|
CVE-2014-8987 | Cross-site scripting (XSS) vulnerability in the "set configuration" box in the Configuration Report page (adm_config_report.php) in MantisBT 1.2.13 through 1.2.17 allows remote administrators to inject arbitrary web script or HTML via the config_option parameter, a different vulnerability than CVE-2014-8986. | [
"cpe:2.3:a:mantisbt:mantisbt:1.2.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.2.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.2.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.2.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.2.17:*:*:*:*:*:*:*"
] | null | null | null | 3.5 |
|
GHSA-wfpw-hqjg-58ph | CSRF vulnerability in Jenkins Maven Cascade Release Plugin | A cross-site request forgery (CSRF) vulnerability in Jenkins Maven Cascade Release Plugin 1.3.2 and earlier allows attackers to start cascade builds and layout builds, and reconfigure the plugin. | [] | null | 6.5 | null | null |
GHSA-c6hx-6fwx-2855 | In PHP Scripts Mall advanced-real-estate-script 4.0.9, the search-results.php searchtext parameter is vulnerable to XSS. | [] | null | null | null | null |
|
CVE-2022-36712 | Library Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /staff/studentdetails.php. | [
"cpe:2.3:a:library_management_system_project:library_management_system:1.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
RHSA-2022:1455 | Red Hat Security Advisory: kernel security, bug fix, and enhancement update | kernel: fget: check that the fd still exists after getting a ref to it kernel: cgroups v1 release_agent feature may allow privilege escalation kernel: heap out of bounds write in nf_dup_netdev.c | [
"cpe:/a:redhat:rhel_eus:8.4::crb",
"cpe:/o:redhat:rhel_eus:8.4::baseos"
] | null | 7.8 | null | null |
GHSA-v446-8p4r-76m4 | Hongdian H8922 3.0.5 devices allow the unprivileged guest user to read cli.conf (with the administrator password and other sensitive data) via /backup2.cgi. | [] | null | 5.5 | null | null |
|
RHSA-2010:0837 | Red Hat Security Advisory: rhpki security and enhancement update | MD5: MD5 Message-Digest Algorithm is not collision resistant System: unauthenticated user can request SCEP one-time PIN decryption System: SCEP one-time PIN reuse | [
"cpe:/a:redhat:certificate_system:7.3"
] | null | null | null | null |
CVE-2016-1432 | Cisco IOS XE 3.15S and 3.16S on cBR-8 Converged Broadband Router devices allows remote authenticated users to cause a denial of service (NULL pointer dereference and card restart) via a crafted SNMP request, aka Bug ID CSCuu68862. | [
"cpe:2.3:o:cisco:ios_xe:3.15.0s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.15.1s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.16.0s:*:*:*:*:*:*:*"
] | null | null | 6.5 | 6.8 |
|
CVE-2020-7605 | gulp-tape through 1.0.0 allows execution of arbitrary commands. It is possible to inject arbitrary commands as part of 'gulp-tape' options. | [
"cpe:2.3:a:gulp-tape_project:gulp-tape:*:*:*:*:*:node.js:*:*"
] | null | 9.8 | null | 7.5 |
|
CVE-2014-5869 | The CNNMoney Portfolio (aka com.cnn.cnnmoney) application 1.03 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [
"cpe:2.3:a:cnn:cnnmoney_portfolio:1.03:*:*:*:*:android:*:*"
] | null | null | null | 5.4 |
|
GHSA-f596-88pf-rrm5 | Missing Authorization vulnerability in ProfilePress Membership Team ProfilePress allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects ProfilePress: from n/a through 4.13.2. | [] | null | 5.3 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.