id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2024-54133 | Possible Content Security Policy bypass in Action Dispatch | Action Pack is a framework for handling and responding to web requests. There is a possible Cross Site Scripting (XSS) vulnerability in the `content_security_policy` helper starting in version 5.2.0 of Action Pack and prior to versions 7.0.8.7, 7.1.5.1, 7.2.2.1, and 8.0.0.1. Applications which set Content-Security-Policy (CSP) headers dynamically from untrusted user input may be vulnerable to carefully crafted inputs being able to inject new directives into the CSP. This could lead to a bypass of the CSP and its protection against XSS and other attacks. Versions 7.0.8.7, 7.1.5.1, 7.2.2.1, and 8.0.0.1 contain a fix. As a workaround, applications can avoid setting CSP headers dynamically from untrusted input, or can validate/sanitize that input. | [] | 2.3 | null | null | null |
GHSA-7g8v-p8gp-3mff | A vulnerability, which was classified as critical, has been found in SourceCodester Computer Laboratory Management System 1.0. Affected by this issue is the function save_users of the file /classes/Users.php?f=save. The manipulation of the argument id leads to improper authorization. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-258914 is the identifier assigned to this vulnerability. | [] | null | 5.4 | null | null |
|
CVE-2023-47793 | WordPress Acme Fix Images plugin <= 1.0.0 - Broken Access Control vulnerability | Missing Authorization vulnerability in acmethemes Acme Fix Images allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Acme Fix Images: from n/a through 1.0.0. | [] | null | 4.3 | null | null |
CVE-2016-0737 | OpenStack Object Storage (Swift) before 2.4.0 does not properly close client connections, which allows remote attackers to cause a denial of service (proxy-server resource consumption) via a series of interrupted requests to a Large Object URL. | [
"cpe:2.3:a:openstack:swift:*:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
GHSA-8chj-8rr6-cxcq | Cross-site scripting (XSS) vulnerability in acWEB 1.8 and 1.14 allows remote attackers to insert arbitrary HTML and web script via a URL, possibly via a "%db" request in a URL. | [] | null | null | null | null |
|
CVE-2024-47328 | WordPress Recover WooCommerce Cart Abandonment, Newsletter, Email Marketing, Marketing Automation By FunnelKit plugin <= 3.1.2 - SQL Injection vulnerability | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in FunnelKit Automation By Autonami allows SQL Injection.This issue affects Automation By Autonami: from n/a through 3.1.2. | [
"cpe:2.3:a:funnelkit:funnelkit_automations:*:*:*:*:*:wordpress:*:*"
] | null | 7.6 | null | null |
CVE-2024-6086 | Improper Access Control in lunary-ai/lunary | In version 1.2.7 of lunary-ai/lunary, any authenticated user, regardless of their role, can change the name of an organization due to improper access control. The function checkAccess() is not implemented, allowing users with the lowest privileges, such as the 'Prompt Editor' role, to modify organization attributes without proper authorization. | [
"cpe:2.3:a:lunary-ai:lunary:1.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:lunary:lunary:1.2.7:*:*:*:*:*:*:*"
] | null | null | 5.3 | null |
CVE-2022-20506 | In onCreate of WifiDialogActivity.java, there is a missing permission check. This could lead to local escalation of privilege from a guest user with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-226133034 | [
"cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
|
CVE-2017-9933 | Improper cache invalidation in Joomla! CMS 1.7.3 through 3.7.2 leads to disclosure of form contents. | [
"cpe:2.3:a:joomla:joomla\\!:1.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:1.7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:1.7.5:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:2.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:2.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:2.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:2.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:2.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:2.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:2.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:2.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:2.5.8:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:2.5.9:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:2.5.10:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:2.5.11:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:2.5.12:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:2.5.13:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:2.5.14:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:2.5.15:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:2.5.16:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:2.5.17:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:2.5.18:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:2.5.19:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:2.5.20:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:2.5.21:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:2.5.22:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:2.5.23:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:2.5.24:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:2.5.25:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:2.5.26:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:2.5.27:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:2.5.28:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.4.0:alpha:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.4.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.4.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.4.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.4.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.4.1:rc1:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.4.1:rc2:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.4.2:rc1:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.4.8:rc:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.5.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.5.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.5.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.5.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.5.0:beta5:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.5.0:rc:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.5.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.5.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.5.0:rc4:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.5.1:rc:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.6.0:alpha:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.6.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.6.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.6.0:rc:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.6.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.6.1:rc1:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.6.1:rc2:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.6.3:rc1:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.6.3:rc2:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.6.3:rc3:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.7.0:alpha_1:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.7.0:alpha_2:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.7.0:beta_1:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.7.0:beta_2:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.7.0:beta_3:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.7.0:beta_4:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.7.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.7.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.7.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.7.0:rc4:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.7.1:rc1:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.7.1:rc2:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
GHSA-r243-xrwf-w499 | The Data::Validate::IP module through 0.29 for Perl does not properly consider extraneous zero characters at the beginning of an IP address string, which (in some situations) allows attackers to bypass access control that is based on IP addresses. | [] | null | 7.5 | null | null |
|
GHSA-2r3v-q9x3-7g46 | Link injection in SimpleSAMLphp | BackgroundSeveral scripts part of SimpleSAMLphp display a web page with links obtained from the request parameters. This allows us to enhance usability, as the users are presented with links they can follow after completing a certain action, like logging out.DescriptionThe following scripts were not checking the URLs obtained via the HTTP request before displaying them as the target of links that the user may click on:`www/logout.php``modules/core/www/no_cookie.php`The issue allowed attackers to display links targeting a malicious website inside a trusted site running SimpleSAMLphp, due to the lack of security checks involving the `link_href` and `retryURL` HTTP parameters, respectively. The issue was resolved by including a verification of the URLs received in the request against a white list of websites specified in the `trusted.url.domains` configuration option.Affected versionsAll SimpleSAMLphp versions prior to 1.14.4.ImpactA remote attacker could craft a link pointing to a trusted website running SimpleSAMLphp, including a parameter pointing to a malicious website, and try to fool the victim into visiting that website by clicking on a link in the page presented by SimpleSAMLphp.ResolutionUpgrade to the latest version.CreditThis security issue was discovered and reported by John Page (hyp3rlinx). | [] | null | 3.7 | null | null |
GHSA-frpg-52qc-h9c8 | An issue in symphony v.3.6.3 and before allows a remote attacker to execute arbitrary code via the log4j component. | [] | null | 9.8 | null | null |
|
CVE-2024-30457 | WordPress MDTF plugin <= 1.3.3.1 - Cross Site Request Forgery (CSRF) vulnerability | Cross-Site Request Forgery (CSRF) vulnerability in realmag777 WordPress Meta Data and Taxonomies Filter (MDTF).This issue affects WordPress Meta Data and Taxonomies Filter (MDTF): from n/a through 1.3.3.1.
| [
"cpe:2.3:a:pluginus:wordpress_meta_data_and_taxonomies_filter:*:*:*:*:*:wordpress:*:*"
] | null | 4.3 | null | null |
RHSA-2010:0396 | Red Hat Security Advisory: httpd and httpd22 security and enhancement update | httpd: mod_proxy_ajp remote temporary DoS httpd: request header information leak | [
"cpe:/a:redhat:jboss_enterprise_web_server:1::el4",
"cpe:/a:redhat:jboss_enterprise_web_server:1::el5"
] | null | null | null | null |
GHSA-f56r-hm9p-96h7 | SWFTools commit 772e55a2 was discovered to contain a stack overflow via ImageStream::getPixel(unsigned char*) at /xpdf/Stream.cc. | [] | null | 5.5 | null | null |
|
GHSA-7g57-8pfv-q7q8 | Cross-Site Request Forgery (CSRF) vulnerability in Marios Alexandrou Republish Old Posts.This issue affects Republish Old Posts: from n/a through 1.21. | [] | null | 4.3 | null | null |
|
CVE-2006-6824 | Multiple cross-site scripting (XSS) vulnerabilities in Jim Hu and Chad Little PHP iCalendar 2.23 rc1 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) getdate parameter in (a) day.php, (b) month.php, (c) year.php, (d) week.php, (e) search.php, (f) rss/index.php, (g) print.php, and (h) preferences.php; the (2) cpath parameter in (i) day.php, (j) month.php, (k) year.php, (l) week.php, and (m) search.php; the (3) query parameter in search.php; and possibly the cpath, (4) unset, and (5) set parameters in a setcookie action in preferences.php; different vectors than CVE-2006-3319. NOTE: it was later reported that vectors b, c, and d also affect 2.24. | [
"cpe:2.3:a:php_icalendar:php_icalendar:*:*:*:*:*:*:*:*",
"cpe:2.3:a:php_icalendar:php_icalendar:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php_icalendar:php_icalendar:2.2_beta:*:*:*:*:*:*:*",
"cpe:2.3:a:php_icalendar:php_icalendar:2.22:*:*:*:*:*:*:*",
"cpe:2.3:a:php_icalendar:php_icalendar:2.24:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-xx6v-23gw-w7gq | A remote arbitrary file read vulnerability was discovered in some Aruba Instant Access Point (IAP) products in version(s): Aruba Instant 6.5.x: 6.5.4.18 and below; Aruba Instant 8.3.x: 8.3.0.14 and below; Aruba Instant 8.5.x: 8.5.0.11 and below; Aruba Instant 8.6.x: 8.6.0.7 and below; Aruba Instant 8.7.x: 8.7.1.1 and below. Aruba has released patches for Aruba Instant that address this security vulnerability. | [] | null | 5.9 | null | null |
|
GHSA-xp92-74fm-xffq | Winamp 5.666 Build 3516(x86) might allow attackers to execute arbitrary code or cause a denial of service via a crafted .flv file, related to "Error Code (0xe06d7363) starting at wow64!Wow64NotifyDebugger+0x000000000000001d." | [] | null | null | 7.8 | null |
|
CVE-2023-41873 | WordPress SAML Single Sign On – SSO Login plugin <= 5.0.4 - Broken Access Control vulnerability | Missing Authorization vulnerability in miniOrange SAML SP Single Sign On allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects SAML SP Single Sign On: from n/a through 5.0.4. | [] | null | 4.3 | null | null |
RHSA-2017:2473 | Red Hat Security Advisory: kernel security and bug fix update | kernel: a race between inotify_handle_event() and sys_rename() | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.8 | null |
CVE-2019-2146 | In libxaac, there is a possible out of bounds read due to a missing bounds check. This could lead to information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-112859714 | [
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4.3 |
|
RHSA-2023:6837 | Red Hat Security Advisory: OpenShift Container Platform 4.14.2 bug fix and security update | golang.org/x/net/html: Cross site scripting golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) | [
"cpe:/a:redhat:openshift:4.14::el8",
"cpe:/a:redhat:openshift:4.14::el9"
] | null | 7.5 | null | null |
GHSA-f3h9-c3qf-pc2f | Jamf Pro before 10.28.0 allows XSS related to inventory history, aka PI-009376. | [] | null | null | null | null |
|
CVE-2018-11271 | Improper authentication can happen on Remote command handling due to inappropriate handling of events in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Wearables in MDM9206, MDM9607, MDM9650, MSM8909W, MSM8996AU, QCS605, Qualcomm 215, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 615/16/SD 415, SD 625, SD 632, SD 636, SD 650/52, SD 675, SD 712 / SD 710 / SD 670, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SDA660, SDM439, SDM630, SDM660, SM7150, Snapdragon_High_Med_2016, SXR1130 | [
"cpe:2.3:o:qualcomm:mdm9206_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9206:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9607_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9607:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9650:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8909w_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8909w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8996au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs605_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs605:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qm215_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qm215:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_210_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_210:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_212_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_212:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_205_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_205:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_425_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_425:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_427_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_427:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_430_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_430:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_435_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_435:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_439_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_439:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_429_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_429:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_450_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_450:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_615_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_615:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_616_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_616:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_415_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_415:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_625_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_625:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_632_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_632:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_636_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_636:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_650_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_650:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_652_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_652:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_675_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_675:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_712_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_712:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_710_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_710:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_670_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_670:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_820_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_820:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_820a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_820a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_835_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_835:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_845_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_845:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_850_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_850:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd855_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd855:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sda660_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sda660:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm439_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm439:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm630_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm630:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm660_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm660:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm7150_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm7150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_high_med_2016_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_high_med_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sxr1130_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sxr1130:-:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 |
|
CVE-2021-44335 | David Brackeen ok-file-formats 203defd is vulnerable to Buffer Overflow. When the function of the ok-file-formats project is used, a heap-buffer-overflow occurs in function ok_png_transform_scanline() in "/ok_png.c:533". | [
"cpe:2.3:a:ok-file-formats_project:ok-file-formats:2021-06-05:*:*:*:*:*:*:*"
] | null | 7.8 | null | 6.8 |
|
GHSA-j8hx-xmv6-rgjh | SQL injection vulnerability in profil.php in Mafya Oyun Scrpti (aka Mafia Game Script) allows remote attackers to execute arbitrary SQL commands via the id parameter. | [] | null | null | null | null |
|
GHSA-48p9-7jxv-9qm6 | An elevation of privilege vulnerability in the Synaptics touchscreen driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-31968442. | [] | null | null | 7 | null |
|
CVE-2020-1461 | An elevation of privilege vulnerability exists when the MpSigStub.exe for Defender allows file deletion in arbitrary locations.To exploit the vulnerability, an attacker would first have to log on to the system, aka 'Microsoft Defender Elevation of Privilege Vulnerability'. | [
"cpe:2.3:a:microsoft:windows_defender:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:itanium:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:forefront_endpoint_protection_2010:-:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:security_essentials:-:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:system_center_endpoint_protection:-:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:system_center_endpoint_protection:2012:-:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:system_center_endpoint_protection:2012:r2:*:*:*:*:*:*"
] | null | 7.1 | null | 3.6 |
|
CVE-2020-1211 | An elevation of privilege vulnerability exists in the way that the Connected Devices Platform Service handles objects in memory, aka 'Connected Devices Platform Service Elevation of Privilege Vulnerability'. | [
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | 6.8 |
|
GHSA-8wmr-2wmx-86gh | Unspecified vulnerability in "edit submission handling" for MediaWiki 1.4.x before 1.4.10 and 1.3.x before 1.3.16 allows remote attackers to cause a denial of service (corruption of the previous submission) via a crafted URL. | [] | null | null | null | null |
|
CVE-2023-38622 | Multiple integer overflow vulnerabilities exist in the VZT facgeometry parsing functionality of GTKWave 3.3.115. A specially crafted .vzt file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the integer overflow when allocating the `len` array. | [
"cpe:2.3:a:tonybybell:gtkwave:3.3.115:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
|
CVE-2022-29496 | A stack-based buffer overflow vulnerability exists in the BlynkConsole.h runCommand functionality of Blynk -Library v1.0.1. A specially-crafted network request can lead to command execution. An attacker can send a network request to trigger this vulnerability. | [
"cpe:2.3:a:blynk:blynk-library:1.0.1:*:*:*:*:*:*:*"
] | null | null | 9 | null |
|
GHSA-2vj4-82m3-c6h5 | Buffer overflow in efax 0.9 and earlier, when installed setuid root, allows local users to execute arbitrary code via a long -x argument. | [] | null | null | null | null |
|
CVE-2017-14634 | In libsndfile 1.0.28, a divide-by-zero error exists in the function double64_init() in double64.c, which may lead to DoS when playing a crafted audio file. | [
"cpe:2.3:a:libsndfile_project:libsndfile:1.0.28:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
] | null | null | 6.5 | 4.3 |
|
CVE-2006-0055 | The ispell_op function in ee on FreeBSD 4.10 to 6.0 uses predictable filenames and does not confirm which file is being written, which allows local users to overwrite arbitrary files via a symlink attack when ee invokes ispell. | [
"cpe:2.3:o:freebsd:freebsd:4.10:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:4.10:release:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:4.10:release_p8:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:4.10:releng:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:4.11:release_p3:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:4.11:releng:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:4.11:stable:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:5.0:alpha:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:5.0:release_p14:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:5.0:releng:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:5.1:alpha:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:5.1:release:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:5.1:release_p5:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:5.1:releng:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:5.2:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:5.2.1:release:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:5.2.1:releng:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:5.3:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:5.3:release:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:5.3:releng:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:5.3:stable:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:5.4:pre-release:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:5.4:release:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:5.4:releng:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:6.0:release:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:6.0:stable:*:*:*:*:*:*"
] | null | null | null | 2.1 |
|
CVE-2024-9292 | Bridge Core <= 3.2.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode | The Bridge Core plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'formforall' shortcode in versions up to, and including, 3.2.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] | null | 6.4 | null | null |
ICSMA-21-012-01 | SOOIL Dana Diabecare RS Products | A hard-coded physician PIN in the physician menu of the insulin pump allows attackers with physical access to change insulin therapy settings.CVE-2020-27256 has been assigned to this vulnerability. A CVSS v3 base score of 4.6 has been calculated; the CVSS vector string is (AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N). An information disclosure vulnerability in the communication protocol of the insulin pump and its AnyDana-i and AnyDana-A mobile applications allows unauthenticated attackers to extract the pump 's keypad lock PIN via Bluetooth Low Energy.CVE-2020-27258 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N). The communication protocol of the insulin pump and its AnyDana-i and AnyDana-A mobile applications use deterministic keys, which allows unauthenticated, physically proximate attackers to brute-force the keys via Bluetooth Low Energy.CVE-2020-27264 has been assigned to this vulnerability. A CVSS v3 base score of 7.6 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L). A client-side control vulnerability in the insulin pump and its AnyDana-i and AnyDana-A mobile applications allows physically proximate attackers to bypass user authentication checks via Bluetooth Low Energy.CVE-2020-27266 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N). A client-side control vulnerability in the insulin pump and its AnyDana-i and AnyDana-A mobile applications allows physically proximate attackers to bypass checks for default PINs via Bluetooth Low Energy.CVE-2020-27268 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N). The communication protocol of the insulin pump and its AnyDana-i and AnyDana-A mobile applications lacks replay protection measures, which allows unauthenticated, physically proximate attackers to replay communication sequences via Bluetooth Low Energy.CVE-2020-27269 has been assigned to this vulnerability. A CVSS v3 base score of 5.4 has been calculated; the CVSS vector string is (AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N). The communication protocol of the insulin pump and its AnyDana-i and AnyDana-A mobile applications does not use adequate measures to protect encryption keys in transit, which allows unauthenticated, physically proximate attackers to sniff the keys via Bluetooth Low Energy.CVE-2020-27270 has been assigned to this vulnerability. A CVSS v3 base score of 5.7 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N). The communication protocol of the insulin pump and its AnyDana-i and AnyDana-A mobile applications does not use adequate measures to authenticate the pump before exchanging keys, which allows unauthenticated, physically proximate attackers to eavesdrop the keys and spoof the pump via Bluetooth Low Energy.CVE-2020-27272 has been assigned to this vulnerability. A CVSS v3 base score of 5.7 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N). The communication protocol of the insulin pump and its AnyDana-i and AnyDana-A mobile applications does not use adequate measures to authenticate the communicating entities before exchanging keys, which allows unauthenticated, physically proximate attackers to eavesdrop the authentication sequence via Bluetooth Low Energy.CVE-2020-27276 has been assigned to this vulnerability. A CVSS v3 base score of 5.7 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N). | [] | null | null | 5.7 | null |
GHSA-47rr-8vrp-9283 | Arbitrary file read vulnerability in Jenkins File System SCM Plugin | An arbitrary file read vulnerability in Jenkins File System SCM Plugin 2.1 and earlier allows attackers able to configure jobs in Jenkins to obtain the contents of any file on the Jenkins master. | [] | null | 6.5 | null | null |
PYSEC-2022-237 | null | In mistune through 2.0.2, support of inline markup is implemented by using regular expressions that can involve a high amount of backtracking on certain edge cases. This behavior is commonly named catastrophic backtracking. | [] | null | null | null | null |
CVE-2019-15522 | An issue was discovered in LINBIT csync2 through 2.0. csync_daemon_session in daemon.c neglects to force a failure of a hello command when the configuration requires use of SSL. | [
"cpe:2.3:a:linbit:csync2:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
|
cisco-sa-ssl-client-dos-cCrQPkA | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software SSL/TLS Client Denial of Service Vulnerability | A vulnerability in the SSL/TLS client of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.
This vulnerability is due to improper memory management when a device initiates SSL/TLS connections. An attacker could exploit this vulnerability by ensuring that the device will connect to an SSL/TLS server that is using specific encryption parameters. A successful exploit could allow the attacker to cause the affected device to unexpectedly reload, resulting in a DoS condition.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is part of the November 2022 release of the Cisco ASA, FTD, and FMC Security Advisory Bundled publication. For a complete list of the advisories and links to them, see Cisco Event Response: November 2022 Semiannual Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication ["https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-74838"]. | [] | null | 7.7 | null | null |
GHSA-5f37-gxvh-23v6 | Remote code execution in PHPMailer | ImpactThe `mailSend` function in the default `isMail` transport in PHPMailer before 5.2.18 might allow remote attackers to pass extra parameters to the mail command and consequently execute arbitrary code via a \" (backslash double quote) in a crafted `Sender` property.PatchesFixed in 5.2.18WorkaroundsFilter and validate user input before passing it to internal functions.Referenceshttps://nvd.nist.gov/vuln/detail/CVE-2016-10033
Related to a follow-on issue in https://nvd.nist.gov/vuln/detail/CVE-2016-10045For more informationIf you have any questions or comments about this advisory:Open a private issue in [the PHPMailer project](https://github.com/PHPMailer/PHPMailer) | [] | null | 9.8 | null | null |
GHSA-9mf2-hpj4-rw3r | TablePress Plugin vulnerable to Cross-site Scripting | A cross-site scripting vulnerability was found in an unknown function of the component Table Import Handler. The manipulation of the argument Import data leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. | [] | null | 4.8 | null | null |
CVE-2007-1190 | Unspecified vulnerability in the EmbeddedWB Web Browser ActiveX control allows remote attackers to execute arbitrary code via unspecified vectors. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | [
"cpe:2.3:a:bsalsa:embeddedwb_web_browser:*:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
GHSA-f2qv-vx92-pq7c | IBM Aspera Faspex 5.0.0 through 5.0.7 could allow a local user to obtain sensitive information due to improper encryption of certain data. | [] | null | 2.5 | null | null |
|
GHSA-cggr-42mf-4mqj | Multiple cross-site scripting (XSS) vulnerabilities in the Internationalization module 6.x before 6.x-1.4 for Drupal allow remote authenticated users, with translate interface or administer blocks privileges, to inject arbitrary web script or HTML via (1) strings used in block translation or (2) the untranslated input. | [] | null | null | null | null |
|
CVE-2005-4724 | SQL injection vulnerability in post.php in PhpTagCool 1.0.3 allows remote attackers to execute arbitrary SQL commands via the X-Forwarded-For field in an HTTP header. | [
"cpe:2.3:a:phptagcool:phptagcool:1.0.3:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-66jg-p3fh-9w8p | Multiple unspecified vulnerabilities in the Intuit QuickBooks Online Edition ActiveX control before 10 allow remote attackers to create or overwrite arbitrary files via unspecified arguments to the (1) httpGETToFile, (2) httpPOSTFromFile, and possibly other methods, probably involving path traversal vulnerabilities in exposed dangerous methods. NOTE: this can be leveraged for code execution by writing to a Startup folder. | [] | null | null | null | null |
|
CVE-2015-3877 | Skia, as used in Android before 5.1.1 LMY48T, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file, aka internal bug 20723696. | [
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
GHSA-p9vw-hw52-76qx | A vulnerability classified as critical was found in SourceCodester Gas Agency Management System. Affected by this vulnerability is an unknown functionality of the file /gasmark/assets/myimages/oneWord.php. The manipulation of the argument shell leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-206173 was assigned to this vulnerability. | [] | null | 9.8 | null | null |
|
RHSA-2015:2518 | Red Hat Security Advisory: java-1.5.0-ibm security update | OpenJDK: missing checks for proper initialization in ObjectStreamClass (Serialization, 8103671) OpenJDK: HttpURLConnection header restriction bypass (Libraries, 8130193) OpenJDK: java.nio Buffers integer overflow issues (Libraries, 8130891) ICU: missing boundary checks in layout engine (OpenJDK 2D, 8132042) OpenJDK: incorrect access control context used in DGCImpl (RMI, 8080688) OpenJDK: incomplete constraints enforcement by AlgorithmChecker (Security, 8131291) OpenJDK: incorrect access control context used in DGCClient (RMI, 8076413) JDK: unspecified vulnerability fixed in 6u105, 7u91 and 8u65 (Deployment) OpenJDK: insufficient proxy class checks in RemoteObjectInvocationHandler (RMI, 8076339) | [
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
GHSA-qjrj-cvjq-fxjr | Multiple cross-site scripting (XSS) vulnerabilities in WordPress 2.3.2 allow remote attackers to inject arbitrary web script or HTML via the (1) inviteemail parameter in an invite action to wp-admin/users.php and the (2) to parameter in a sent action to wp-admin/invites.php. | [] | null | null | null | null |
|
CVE-2019-19259 | GitLab Enterprise Edition (EE) 11.3 and later through 12.5 allows an Insecure Direct Object Reference (IDOR). | [
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*"
] | null | 4.3 | null | 4 |
|
CVE-2009-1911 | Directory traversal vulnerability in .include/init.php (aka admin/_include/init.php) in QuiXplorer 2.3.2 and earlier, as used in TinyWebGallery (TWG) 1.7.6 and earlier, allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the lang parameter to admin/index.php. | [
"cpe:2.3:a:tinywebgallery:tinywebgallery:*:*:*:*:*:*:*:*",
"cpe:2.3:a:tinywebgallery:tinywebgallery:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tinywebgallery:tinywebgallery:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tinywebgallery:tinywebgallery:1.01:*:*:*:*:*:*:*",
"cpe:2.3:a:tinywebgallery:tinywebgallery:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tinywebgallery:tinywebgallery:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:tinywebgallery:tinywebgallery:1.02:*:*:*:*:*:*:*",
"cpe:2.3:a:tinywebgallery:tinywebgallery:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:tinywebgallery:tinywebgallery:1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:tinywebgallery:tinywebgallery:1.03:*:*:*:*:*:*:*",
"cpe:2.3:a:tinywebgallery:tinywebgallery:1.3a:*:*:*:*:*:*:*",
"cpe:2.3:a:tinywebgallery:tinywebgallery:1.3b:*:*:*:*:*:*:*",
"cpe:2.3:a:tinywebgallery:tinywebgallery:1.3c:*:*:*:*:*:*:*",
"cpe:2.3:a:tinywebgallery:tinywebgallery:1.04:*:*:*:*:*:*:*",
"cpe:2.3:a:tinywebgallery:tinywebgallery:1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:tinywebgallery:tinywebgallery:1.4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tinywebgallery:tinywebgallery:1.4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:tinywebgallery:tinywebgallery:1.4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:tinywebgallery:tinywebgallery:1.4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:tinywebgallery:tinywebgallery:1.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tinywebgallery:tinywebgallery:1.4.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tinywebgallery:tinywebgallery:1.4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:tinywebgallery:tinywebgallery:1.4.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:tinywebgallery:tinywebgallery:1.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:tinywebgallery:tinywebgallery:1.05:*:*:*:*:*:*:*",
"cpe:2.3:a:tinywebgallery:tinywebgallery:1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:tinywebgallery:tinywebgallery:1.5.0.1_15.08.2006:*:*:*:*:*:*:*",
"cpe:2.3:a:tinywebgallery:tinywebgallery:1.5.0.2_17.08.2006:*:*:*:*:*:*:*",
"cpe:2.3:a:tinywebgallery:tinywebgallery:1.5.1_03.09.2006:*:*:*:*:*:*:*",
"cpe:2.3:a:tinywebgallery:tinywebgallery:1.5.2.1_20.09.2006_1000:*:*:*:*:*:*:*",
"cpe:2.3:a:tinywebgallery:tinywebgallery:1.5.2.2_21.09.2006_1000:*:*:*:*:*:*:*",
"cpe:2.3:a:tinywebgallery:tinywebgallery:1.5.2_17.09.2006_1000:*:*:*:*:*:*:*",
"cpe:2.3:a:tinywebgallery:tinywebgallery:1.5.3.1_11.10.2006_1000:*:*:*:*:*:*:*",
"cpe:2.3:a:tinywebgallery:tinywebgallery:1.5.3.2_12.10.2006_1000:*:*:*:*:*:*:*",
"cpe:2.3:a:tinywebgallery:tinywebgallery:1.5.3_08.10.2006_1000:*:*:*:*:*:*:*",
"cpe:2.3:a:tinywebgallery:tinywebgallery:1.5.4_13.10.2006:*:*:*:*:*:*:*",
"cpe:2.3:a:tinywebgallery:tinywebgallery:1.5.5_30.10.2006_2200:*:*:*:*:*:*:*",
"cpe:2.3:a:tinywebgallery:tinywebgallery:1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:tinywebgallery:tinywebgallery:1.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tinywebgallery:tinywebgallery:1.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:tinywebgallery:tinywebgallery:1.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:tinywebgallery:tinywebgallery:1.6.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:tinywebgallery:tinywebgallery:1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:tinywebgallery:tinywebgallery:1.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tinywebgallery:tinywebgallery:1.7.2-18.04.2008:*:*:*:*:*:*:*",
"cpe:2.3:a:tinywebgallery:tinywebgallery:1.7.3-12.05.2008:*:*:*:*:*:*:*",
"cpe:2.3:a:tinywebgallery:tinywebgallery:1.7.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tinywebgallery:tinywebgallery:1.7.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:tinywebgallery:tinywebgallery:1.7.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:tinywebgallery:tinywebgallery:1.7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:tinywebgallery:tinywebgallery:1.7.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tinywebgallery:tinywebgallery:1.7.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:tinywebgallery:tinywebgallery:1.7.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:tinywebgallery:tinywebgallery:1.7.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:tinywebgallery:tinywebgallery:1.7.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:tinywebgallery:tinywebgallery:1.7.5:*:*:*:*:*:*:*",
"cpe:2.3:a:tinywebgallery:tinywebgallery:1.7.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:claudio_klingler:quixplorer:*:*:*:*:*:*:*:*",
"cpe:2.3:a:claudio_klingler:quixplorer:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:claudio_klingler:quixplorer:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:claudio_klingler:quixplorer:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:claudio_klingler:quixplorer:1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:claudio_klingler:quixplorer:1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:claudio_klingler:quixplorer:1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:claudio_klingler:quixplorer:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:claudio_klingler:quixplorer:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:claudio_klingler:quixplorer:2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:claudio_klingler:quixplorer:2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:claudio_klingler:quixplorer:2.3.1:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
CVE-2023-32647 | Improper access control in some Intel(R) XTU software before version 7.12.0.29 may allow an authenticated user to potentially enable escalation of privilege via local access. | [
"cpe:2.3:a:intel:extreme_tuning_utility:*:*:*:*:*:*:*:*"
] | null | 6.8 | null | null |
|
GHSA-qhxw-jx34-g2pf | There is a vulnerability of unstrict input parameter verification in the audio assembly.Successful exploitation of this vulnerability may cause out-of-bounds access. | [] | null | 9.8 | null | null |
|
GHSA-5pv5-vwqw-425f | A vulnerability in Juniper Networks Junos OS Evolved may allow an attacker to cause a Denial of Service (DoS) by sending a high rate of specific packets to the device, resulting in a pfemand process crash. The pfemand process is responsible for packet forwarding on the device. By continuously sending the packet flood, an attacker can repeatedly crash the pfemand process causing a sustained Denial of Service. This issue can only be triggered by traffic sent to the device. Transit traffic does not cause this issue. This issue affects all version of Junos OS Evolved prior to 19.1R1-EVO. | [] | null | null | null | null |
|
CVE-2024-20672 | .NET Denial of Service Vulnerability | .NET Denial of Service Vulnerability | [
"cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
GHSA-j8ph-gjhc-23q8 | Denial of service in "poll" in OpenBSD. | [] | null | null | null | null |
|
GHSA-x4m4-rgq3-wf3x | A CWE-522: Insufficiently Protected Credentials vulnerability exists that could result in unwanted access to a DCE instance when performed over a network by a malicious third-party. This CVE is unique from CVE-2022-32520. Affected Products: Data Center Expert (Versions prior to V7.9.0) | [] | null | 9.8 | null | null |
|
CVE-2024-25526 | RuvarOA v6.01 and v12.01 were discovered to contain a SQL injection vulnerability via the project_id parameter at /ProjectManage/pm_gatt_inc.aspx. | [
"cpe:2.3:a:ruvar:ruvaroa:-:*:*:*:*:*:*:*"
] | null | 8.1 | null | null |
|
CVE-2008-0919 | Cross-site scripting (XSS) vulnerability in session/login.php in Open Source Security Information Management (OSSIM) 0.9.9 rc5 and earlier allows remote attackers to inject arbitrary web script or HTML via the dest parameter. | [
"cpe:2.3:a:open_source_security_information_management:os-sim:0.1alpha:*:*:*:*:*:*:*",
"cpe:2.3:a:open_source_security_information_management:os-sim:0.2alpha:*:*:*:*:*:*:*",
"cpe:2.3:a:open_source_security_information_management:os-sim:0.3.1alpha:*:*:*:*:*:*:*",
"cpe:2.3:a:open_source_security_information_management:os-sim:0.3alpha:*:*:*:*:*:*:*",
"cpe:2.3:a:open_source_security_information_management:os-sim:0.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:open_source_security_information_management:os-sim:0.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:open_source_security_information_management:os-sim:0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:open_source_security_information_management:os-sim:0.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:open_source_security_information_management:os-sim:0.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:open_source_security_information_management:os-sim:0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:open_source_security_information_management:os-sim:0.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:open_source_security_information_management:os-sim:0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:open_source_security_information_management:os-sim:0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:open_source_security_information_management:os-sim:0.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:open_source_security_information_management:os-sim:0.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:open_source_security_information_management:os-sim:0.9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:open_source_security_information_management:os-sim:0.9.4:*:*:*:*:*:*:*",
"cpe:2.3:a:open_source_security_information_management:os-sim:0.9.5:*:*:*:*:*:*:*",
"cpe:2.3:a:open_source_security_information_management:os-sim:0.9.6:*:*:*:*:*:*:*",
"cpe:2.3:a:open_source_security_information_management:os-sim:0.9.7:*:*:*:*:*:*:*",
"cpe:2.3:a:open_source_security_information_management:os-sim:0.9.8:*:*:*:*:*:*:*",
"cpe:2.3:a:open_source_security_information_management:os-sim:0.9.9_rc1:*:*:*:*:*:*:*",
"cpe:2.3:a:open_source_security_information_management:os-sim:0.9.9_rc2:*:*:*:*:*:*:*",
"cpe:2.3:a:open_source_security_information_management:os-sim:0.9.9_rc3:*:*:*:*:*:*:*",
"cpe:2.3:a:open_source_security_information_management:os-sim:0.9.9_rc4:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-2373-h4hh-88wg | Online Diagnostic Lab Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /odlms/admin/?page=appointments/view_appointment. | [] | null | 7.2 | null | null |
|
CVE-2024-23302 | Couchbase Server before 7.2.4 has a private key leak in goxdcr.log. | [
"cpe:2.3:a:couchbase:couchbase_server:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
|
CVE-2020-5336 | RSA Archer, versions prior to 6.7 P1 (6.7.0.1), contain a URL injection vulnerability. An unauthenticated attacker could potentially exploit this vulnerability by tricking a victim application user to execute malicious JavaScript code on the affected system. | [
"cpe:2.3:a:rsa:archer:*:*:*:*:*:*:*:*"
] | null | 4.6 | null | null |
|
GHSA-r3f3-f3vp-h6w9 | The OSPF implementation on NEC IP38X, IX1000, IX2000, and IX3000 routers does not consider the possibility of duplicate Link State ID values in Link State Advertisement (LSA) packets before performing operations on the LSA database, which allows remote attackers to cause a denial of service (routing disruption) or obtain sensitive packet information via a crafted LSA packet, a related issue to CVE-2013-0149. | [] | null | null | null | null |
|
GHSA-w6wc-j68w-9v9h | Auth. Stored Cross-Site Scripting (XSS) vulnerability in Mr.Vibe vSlider Multi Image Slider for WordPress plugin <= 4.1.2 versions. | [] | null | 5.9 | null | null |
|
CVE-2021-0692 | In sendBroadcastToInstaller of FirstScreenBroadcast.java, there is a possible activity launch due to an unsafe PendingIntent. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-9 Android-10Android ID: A-179289753 | [
"cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*"
] | null | 7.8 | null | 4.6 |
|
RHSA-2013:0504 | Red Hat Security Advisory: dhcp security and bug fix update | dhcp: reduced expiration time of an IPv6 lease may cause dhcpd to crash | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
GHSA-xx3f-8qwx-w9mh | The (1) av-centerd SOAP service and (2) backup command in the ossim-framework service in AlienVault OSSIM before 4.6.0 allows remote attackers to execute arbitrary commands via unspecified vectors. | [] | null | null | null | null |
|
CVE-2020-12259 | rConfig 3.9.4 is vulnerable to reflected XSS. The configDevice.php file improperly validates user input. An attacker can exploit this vulnerability by crafting arbitrary JavaScript in the rid GET parameter of devicemgmnt.php. | [
"cpe:2.3:a:rconfig:rconfig:3.9.4:*:*:*:*:*:*:*"
] | null | 5.4 | null | 3.5 |
|
CVE-2024-24459 | An invalid memory access when handling the ProtocolIE_ID field of S1Setup Request messages in Athonet vEPC MME v11.4.0 allows attackers to cause a Denial of Service (DoS) to the cellular network by repeatedly initiating connections and sending a crafted payload. | [
"cpe:2.3:a:athonet:vepc_mmc:11.4.0:*:*:*:*:*:*:*"
] | null | 5.9 | null | null |
|
GHSA-9vvm-hf5j-x32h | A stack-based buffer overflow exists in Juplink RX4-1500, a WiFi router, in versions 1.0.2 through 1.0.5. An authenticated attacker can exploit this vulnerability to achieve code execution as root. | [] | null | 9 | null | null |
|
GHSA-w732-gjhm-9ghp | Buffer overflow in qwik-smtpd allows remote attackers to use the server as an SMTP spam relay via a long HELO command, which overwrites the adjacent localIP data buffer. | [] | null | null | null | null |
|
CVE-2021-31194 | OLE Automation Remote Code Execution Vulnerability | OLE Automation Remote Code Execution Vulnerability | [
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.17134.2207:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1803:10.0.17134.2207:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1803:10.0.17134.2207:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.1935:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.1935:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.1935:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.1935:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1556:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1556:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.18363.1556:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_1909:10.0.18363.1556:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.19041.982:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2004:10.0.19041.982:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_20h2:10.0.19042.982:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_20h2:10.0.19042.982:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_20h2:10.0.19042.982:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.18931:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.18931:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.4401:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.4401:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.4401:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:6.1.7601.24597:sp1:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_7:6.1.7601.24598:sp1:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_7:6.1.7601.24597:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_7:6.1.7601.24598:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20017:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20017:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:6.3.9600.20017:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21117:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21117:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_server_2008_r2:6.1.7601.24597:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2008_r2:6.1.7601.24598:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23347:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012_r2:6.3.9600.20017:*:*:*:*:*:x64:*"
] | null | 8.8 | null | null |
GHSA-cx72-f838-ppm8 | Race condition in the scan_get_next_rmap_item function in mm/ksm.c in the Linux kernel before 2.6.39.3, when Kernel SamePage Merging (KSM) is enabled, allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a crafted application. | [] | null | null | null | null |
|
CVE-2011-0775 | pivotx/modules/module_image.php in PivotX 2.2.2 allows remote attackers to obtain sensitive information via a non-existent file in the image parameter, which reveals the installation path in an error message. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | [
"cpe:2.3:a:pivotx:pivotx:2.2.2:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-r59g-mrhc-mh44 | Unspecified vulnerability in the Core RDBMS component in Oracle Database Server 11.1.0.7, 11.2.0.3, 11.2.0.4, and 12.1.0.1 allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors related to "Advisor" and "Select Any Dictionary" privileges. | [] | null | null | null | null |
|
CVE-2017-6444 | The MikroTik Router hAP Lite 6.25 has no protection mechanism for unsolicited TCP ACK packets in the case of a fast network connection, which allows remote attackers to cause a denial of service (CPU consumption) by sending many ACK packets. After the attacker stops the exploit, the CPU usage is 100% and the router requires a reboot for normal operation. | [
"cpe:2.3:o:mikrotik:routeros:6.25:*:*:*:*:*:*:*",
"cpe:2.3:h:mikrotik:router_hap_lite:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | 7.8 |
|
GHSA-hfr7-hjgv-x44h | Microsoft Outlook 2002 and 2003 allows user-assisted remote attackers to execute arbitrary code via a malformed VEVENT record in an .iCal meeting request or ICS file. | [] | null | null | null | null |
|
GHSA-gm9v-q76h-x92w | PHP remote file inclusion vulnerability in admin/lib_action_step.php in Hot Open Tickets (HOT) 11012004_ver2f, when register_globals is enabled, allows remote attackers to include arbitrary files via the GLOBALS[CLASS_PATH] parameter. NOTE: this issue might be resultant from a global overwrite vulnerability. | [] | null | null | null | null |
|
CVE-2023-33161 | Microsoft Excel Remote Code Execution Vulnerability | Microsoft Excel Remote Code Execution Vulnerability | [
"cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:x64:*",
"cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:x86:*",
"cpe:2.3:a:microsoft:office:2019:*:*:*:*:macos:*:*",
"cpe:2.3:a:microsoft:office:2021:*:*:*:ltsc:macos:*:*"
] | null | 7.8 | null | null |
RHSA-2020:5622 | Red Hat Security Advisory: thunderbird security update | chromium-browser: Uninitialized Use in V8 Mozilla: Heap buffer overflow in WebGL Mozilla: CSS Sanitizer performed incorrect sanitization Mozilla: Incorrect cast of StyleGenericFlexBasis resulted in a heap use-after-free Mozilla: Internal network hosts could have been probed by a malicious webpage Mozilla: The proxy.onRequest API did not catch view-source URLs Mozilla: Memory safety bugs fixed in Firefox 84 and Firefox ESR 78.6 | [
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 8.8 | 6.1 | null |
CVE-2025-24413 | Adobe Commerce | Cross-site Scripting (Stored XSS) (CWE-79) | Adobe Commerce versions 2.4.8-beta1, 2.4.7-p3, 2.4.6-p8, 2.4.5-p10, 2.4.4-p11 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. A successful attacker can abuse this to achieve session takeover, increasing the confidentiality and integrity impact as high. | [] | null | 8.7 | null | null |
GHSA-mcvc-x6m2-v4xm | Unspecified vulnerability in the Oracle Applications Framework component in Oracle E-Business Suite 11.5.10.2, 12.0.6, 12.1.3, 12.2.2, 12.2.3, and 12.2.4 allows remote attackers to affect integrity via vectors related to LOV, a different vulnerability than CVE-2014-6539. | [] | null | null | null | null |
|
CVE-2018-12914 | A remote code execution issue was discovered in PublicCMS V4.0.20180210. An attacker can upload a ZIP archive that contains a .jsp file with a directory traversal pathname. After an unzip operation, the attacker can execute arbitrary code by visiting a .jsp URI. | [
"cpe:2.3:a:publiccms:publiccms:4.0.20180210:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 |
|
GHSA-3fhf-6939-qg8p | rest-client Gem Vulnerable to Session Fixation | REST client for Ruby (aka rest-client) versions 1.6.1.a until 1.8.0 allow remote attackers to conduct session fixation attacks or obtain sensitive cookie information by leveraging passage of cookies set in a response to a redirect. | [] | null | null | 9.8 | null |
CVE-2025-26618 | SSH SFTP packet size not verified properly in Erlang OTP | Erlang is a programming language and runtime system for building massively scalable soft real-time systems with requirements on high availability. OTP is a set of Erlang libraries, which consists of the Erlang runtime system, a number of ready-to-use components mainly written in Erlang. Packet size is not verified properly for SFTP packets. As a result when multiple SSH packets (conforming to max SSH packet size) are received by ssh, they might be combined into an SFTP packet which will exceed the max allowed packet size and potentially cause large amount of memory to be allocated. Note that situation described above can only happen for successfully authenticated users after completing the SSH handshake. This issue has been patched in OTP versions 27.2.4, 26.2.5.9, and 25.3.2.18. There are no known workarounds for this vulnerability. | [] | 7 | null | null | null |
CVE-2019-14024 | Possible stack-use-after-scope issue in NFC usecase for card emulation in Snapdragon Auto, Snapdragon Industrial IOT, Snapdragon Mobile in MSM8917, MSM8953, Nicobar, QM215, Rennell, SDM429, SDM439, SDM450, SDM632, SDM670, SDM710, SDM845, SM6150, SM7150, SM8150, SM8250, SXR2130 | [
"cpe:2.3:o:qualcomm:msm8917_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8917:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8953_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8953:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:nicobar_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:nicobar:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qm215_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qm215:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:rennell_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:rennell:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm429_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm429:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm439_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm439:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm450_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm450:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm632_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm632:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm670_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm670:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm710_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm710:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm845_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm845:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm6150_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm6150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm7150_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm7150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm8150_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm8150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm8250_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm8250:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sxr2130_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sxr2130:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | 7.2 |
|
GHSA-4q6r-3f26-q97v | The azx_position_ok function in hda_intel.c in Linux kernel 2.6.33-rc4 and earlier, when running on the AMD780V chip set, allows context-dependent attackers to cause a denial of service (crash) via unknown manipulations that trigger a divide-by-zero error. | [] | null | null | null | null |
|
GHSA-h3c8-6jfp-5p96 | IBM TRIRIGA Application Platform 3.3 before 3.3.2.6, 3.4 before 3.4.2.3, and 3.5 before 3.5.0.1 allows remote authenticated users to obtain sensitive information by reading an error message. IBM X-Force ID: 111784. | [] | null | null | 4.3 | null |
|
CVE-2016-10061 | The ReadGROUP4Image function in coders/tiff.c in ImageMagick before 7.0.1-10 does not check the return value of the fputc function, which allows remote attackers to cause a denial of service (crash) via a crafted image file. | [
"cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4.3 |
|
cisco-sa-20190925-nxos-vman-cmd-inj | Cisco NX-OS Software Virtualization Manager Command Injection Vulnerability | A vulnerability in a CLI command related to the virtualization manager (VMAN) in Cisco NX-OS Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying Linux operating system with root privileges.
The vulnerability is due to insufficient validation of arguments passed to a specific VMAN CLI command on an affected device. An attacker could exploit this vulnerability by including malicious input as the argument of an affected command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying Linux operating system with root privileges, which may lead to complete system compromise. An attacker would need valid administrator credentials to exploit this vulnerability.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190925-nxos-vman-cmd-inj ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190925-nxos-vman-cmd-inj"] | [] | null | null | 6.7 | null |
GHSA-xq3c-8gqm-v648 | async-graphql / async-graphql - @DOS GraphQL Nested Fragments overflow | ImpactExecuting deeply nested queries may cause stack overflow.PatchesUpgrade to `v4.0.6` | [] | null | 7.5 | null | null |
CVE-2008-7254 | Directory traversal vulnerability in includes/template-loader.php in Irmin CMS (formerly Pepsi CMS) 0.5 and 0.6 BETA2, when register_globals is enabled, allows remote attackers to include and execute arbitrary files via a .. (dot dot) in the _Root_Path parameter. NOTE: some of these details are obtained from third party information. | [
"cpe:2.3:a:ermenegildo_fiorito:irmin_cms:0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ermenegildo_fiorito:irmin_cms:0.6:beta2:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
RHSA-2024:6824 | Red Hat Security Advisory: OpenShift Container Platform 4.16.14 security update | containers/image: digest type does not guarantee valid type golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON Bare Metal Operator: BMO can expose particularly named secrets from other namespaces via BMH CRD | [
"cpe:/a:redhat:openshift:4.16::el9"
] | null | 4.9 | null | null |
CVE-2022-46424 | An exploitable firmware modification vulnerability was discovered on the Netgear XWN5001 Powerline 500 WiFi Access Point. An attacker can conduct a MITM (Man-in-the-Middle) attack to modify the user-uploaded firmware image and bypass the CRC check, allowing attackers to execute arbitrary code or cause a Denial of Service (DoS). This affects v0.4.1.1 and earlier. | [
"cpe:2.3:o:netgear:xwn5001_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:xwn5001:-:*:*:*:*:*:*:*"
] | null | 8.1 | null | null |
|
GHSA-3jh2-34x2-mr98 | Unknown "front page vulnerability with Moodle servers" for Moodle before 1.3.2 has unknown impact and attack vectors. | [] | null | null | null | null |
|
GHSA-g89m-fvmx-hp6x | Unspecified vulnerability in the DB Sharding component in Oracle Database Server 12.1.0.2 allows local users to affect integrity via unknown vectors. | [] | null | null | 4.4 | null |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.