id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2023-21048 | In handleEvent of nan.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-259304053References: N/A | [
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] | null | 4.4 | null | null |
|
CVE-2005-3824 | The uploads module in vTiger CRM 4.2 and earlier allows remote attackers to upload arbitrary files, such as PHP files, via the add2db action. | [
"cpe:2.3:a:vtiger:vtiger_crm:*:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2020-21643 | Cross Site Scripting (XSS) vulnerability in HongCMS 3.0 allows attackers to run arbitrary code via the callback parameter to /ajax/myshop. | [
"cpe:2.3:a:hongcms_project:hongcms:3.0.0:*:*:*:*:*:*:*"
] | null | 6.1 | null | null |
|
GHSA-fwqw-4jph-2hqq | Finjan SurfinGate 7.0SP2 and SP3 allows remote attackers to download blocked files via hex-encoded characters in a filename, as demonstrated using "%2e". | [] | null | null | null | null |
|
GHSA-8j2w-h5fm-c76w | Improper buffer restrictions in the Intel(R) Unite Client for Windows* before version 4.2.13064 may allow an authenticated user to potentially enable information disclosure via local access. | [] | null | null | null | null |
|
GHSA-hmcx-64xh-rm3g | In jit_memory_region.cc, there is a possible bypass of memory restrictions due to a logic error in the code. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12Android ID: A-200284993 | [] | null | 7.8 | null | null |
|
CVE-2015-6631 | libstagefright in Android before 5.1.1 LMY48Z and 6.0 before 2015-12-01 allows remote attackers to obtain sensitive information, and consequently bypass an unspecified protection mechanism, via unknown vectors, as demonstrated by obtaining Signature or SignatureOrSystem access, aka internal bug 24623447. | [
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-cf44-r485-c599 | ieee80211_input.c in MadWifi before 0.9.3 does not properly process Channel Switch Announcement Information Elements (CSA IEs), which allows remote attackers to cause a denial of service (loss of communication) via a Channel Switch Count less than or equal to one, triggering a channel change. | [] | null | null | null | null |
|
CVE-2001-1355 | Buffer overflows in NetWin Authentication Module (NWAuth) 3.0b and earlier, as implemented in DMail, SurgeFTP, and possibly other packages, could allow attackers to execute arbitrary code via long arguments to (1) the -del command or (2) the -lookup command. | [
"cpe:2.3:a:netwin:dmail:2.5d:*:*:*:*:*:*:*",
"cpe:2.3:a:netwin:dmail:2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:netwin:dmail:2.7q:*:*:*:*:*:*:*",
"cpe:2.3:a:netwin:dmail:2.7r:*:*:*:*:*:*:*",
"cpe:2.3:a:netwin:dmail:2.8e:*:*:*:*:*:*:*",
"cpe:2.3:a:netwin:dmail:2.8f:*:*:*:*:*:*:*",
"cpe:2.3:a:netwin:dmail:2.8g:*:*:*:*:*:*:*",
"cpe:2.3:a:netwin:dmail:2.8h:*:*:*:*:*:*:*",
"cpe:2.3:a:netwin:dmail:2.8i:*:*:*:*:*:*:*",
"cpe:2.3:a:netwin:surgeftp:1.0b:*:*:*:*:*:*:*",
"cpe:2.3:a:netwin:surgeftp:2.0a:*:*:*:*:*:*:*",
"cpe:2.3:a:netwin:surgeftp:2.0b:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
CVE-2006-0678 | PostgreSQL 7.3.x before 7.3.14, 7.4.x before 7.4.12, 8.0.x before 8.0.7, and 8.1.x before 8.1.3, when compiled with Asserts enabled, allows local users to cause a denial of service (server crash) via a crafted SET SESSION AUTHORIZATION command, a different vulnerability than CVE-2006-0553. | [
"cpe:2.3:a:postgresql:postgresql:7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.3.8:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.3.9:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.3.10:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.3.11:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.3.12:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.3.13:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.9:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.10:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.11:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.1.2:*:*:*:*:*:*:*"
] | null | null | null | 1.5 |
|
GHSA-82mc-w667-c9g9 | Mozilla developers Andrew McCreight, Nicolas B. Pierron, and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 100 and Firefox ESR 91.9. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird < 91.10, Firefox < 101, and Firefox ESR < 91.10. | [] | null | 9.8 | null | null |
|
CVE-2014-6319 | Outlook Web App (OWA) in Microsoft Exchange Server 2007 SP3, 2010 SP3, and 2013 SP1 and Cumulative Update 6 does not properly validate tokens in requests, which allows remote attackers to spoof the origin of e-mail messages via unspecified vectors, aka "Outlook Web App Token Spoofing Vulnerability." | [
"cpe:2.3:a:microsoft:exchange_server:2007:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:exchange_server:2010:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:exchange_server:2013:cumulative_update_6:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:exchange_server:2013:sp1:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-jfgw-v3p5-42qh | URL Redirection to Untrusted Site ('Open Redirect') vulnerability in Payara Platform Payara Server (REST Management Interface modules) allows Session Hijacking.This issue affects Payara Server: from 6.0.0 before 6.18.0, from 6.2022.1 before 6.2024.9, from 5.2020.2 before 5.2022.5, from 5.20.0 before 5.67.0, from 4.1.2.191.0 before 4.1.2.191.50. | [] | 7 | 6.1 | null | null |
|
CVE-2015-0355 | Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0347, CVE-2015-0350, CVE-2015-0352, CVE-2015-0353, CVE-2015-0354, CVE-2015-0360, CVE-2015-3038, CVE-2015-3041, CVE-2015-3042, and CVE-2015-3043. | [
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux_enterprise_desktop:11.0:sp3:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux_enterprise_desktop:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux_workstation_extension:12.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:14.0.0.125:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:14.0.0.145:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:14.0.0.176:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:14.0.0.179:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.152:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.167:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.189:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.223:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.239:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.246:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:16.0.0.235:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:16.0.0.257:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:16.0.0.287:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:16.0.0.296:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:17.0.0.134:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_supplementary:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.6.z:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
GHSA-fm6v-5q4c-8xxp | An issue was discovered in Observium Professional, Enterprise & Community 20.8.10631. It is vulnerable to SQL Injection due to the fact that it is possible to inject malicious SQL statements in malformed parameter types. Sending the improper variable type Array allows a bypass of core SQL Injection sanitization. Users are able to inject malicious statements in multiple functions. This vulnerability leads to full authentication bypass: any unauthorized user with access to the application is able to exploit this vulnerability. This can occur via the Cookie header to the default URI, within includes/authenticate.inc.php. | [] | null | null | null | null |
|
CVE-2017-2110 | The Access CX App for Android prior to 2.0.0.1 and for iOS prior to 2.0.2 does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [
"cpe:2.3:a:nissan_securities:access_cx:*:*:*:*:*:android:*:*",
"cpe:2.3:a:nissan_securities:access_cx:*:*:*:*:*:iphone_os:*:*"
] | null | null | 5.9 | 4.3 |
|
GHSA-823r-7qpj-pwjj | A cross-site scripting (XSS) vulnerability in /admin/add-fee.php of Web-Based Student Clearance System v1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the cmddept parameter. | [] | null | 4.8 | null | null |
|
CVE-2015-7727 | Multiple SQL injection vulnerabilities in the Web-based Development Workbench in SAP HANA DB 1.00.73.00.389160 (NewDB100_REL) allow remote authenticated users to execute arbitrary SQL commands via unspecified vectors in the (1) trace configuration page or (2) getSqlTraceConfiguration function, aka SAP Security Note 2153898. | [
"cpe:2.3:a:sap:hana:1.00.73.00.389160:*:*:*:*:*:*:*"
] | null | null | null | 6.5 |
|
CVE-2024-41692 | Incorrect Access Control Vulnerability | This vulnerability exists in SyroTech SY-GPON-1110-WDONT Router due to presence of root terminal access on a serial interface without proper access control. An attacker with physical access could exploit this by accessing the root shell on the vulnerable system.
Successful exploitation of this vulnerability could allow the attacker to execute arbitrary commands with root privileges on the targeted system. | [
"cpe:2.3:o:syrotech:sy-gpon-1110-wdont_firmware:3.1.02-231102:*:*:*:*:*:*:*"
] | 8.6 | null | null | null |
GHSA-rjgc-mwc5-8g7j | There is an Out-of-bounds read vulnerability in V-Server (v4.0.19.0 and earlier) and V-Server Lite (v4.0.19.0 and earlier). If a user opens a specially crafted file, information may be disclosed and/or arbitrary code may be executed. | [] | null | 7.8 | null | null |
|
RHSA-2010:0893 | Red Hat Security Advisory: kernel security and bug fix update | kernel: nfsd4: bug in read_buf | [
"cpe:/o:redhat:rhel_eus:5.3"
] | null | null | null | null |
GHSA-pgm5-cr62-prxq | Moodle Arbitrary file read when importing lesson questions | The vulnerability was found in Moodle, occurs due to input validation error when importing lesson questions. This insufficient path checks results in arbitrary file read risk. This vulnerability allows a remote attacker to perform directory traversal attacks. The capability to access this feature is only available to teachers, managers and admins by default. | [] | null | 7.5 | null | null |
CVE-2018-15606 | An XSS issue was discovered in SalesAgility SuiteCRM 7.x before 7.8.21 and 7.10.x before 7.10.8, related to phishing an error message. | [
"cpe:2.3:a:salesagility:suitecrm:*:*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 |
|
GHSA-4jm2-c9jr-6prf | Moodle allows attackers to bypass a messaging-disabled setting | message/externallib.php in Moodle through 2.5.9, 2.6.x before 2.6.7, 2.7.x before 2.7.4, and 2.8.x before 2.8.2 allows remote authenticated users to bypass a messaging-disabled setting via a web-services request, as demonstrated by a people-search request. | [] | null | null | null | null |
CVE-2022-0687 | Amelia < 1.0.46 - Manager+ RCE | The Amelia WordPress plugin before 1.0.47 stores image blobs into actual files whose extension is controlled by the user, which may lead to PHP backdoors being uploaded onto the site. This vulnerability can be exploited by logged-in users with the custom "Amelia Manager" role. | [
"cpe:2.3:a:tms-outsource:amelia:*:*:*:*:*:wordpress:*:*"
] | null | 8.8 | null | 6.5 |
CVE-2024-1789 | The WP SMTP plugin for WordPress is vulnerable to SQL Injection via the 'search' parameter in versions 1.2 to 1.2.6 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. | [
"cpe:2.3:a:jack-kitterhing:wp_smtp:1.2:*:*:*:*:*:*:*"
] | null | 7.2 | null | null |
|
GHSA-3gxw-m9pv-89hq | Improper input validation in firmware for some Intel(R) PROSet/Wireless WiFi in multiple operating systems and some Killer(TM) WiFi in Windows 10 may allow an unauthenticated user to potentially enable denial of service via adjacent access. | [] | null | null | null | null |
|
GHSA-fqgg-p436-r4xf | A NULL pointer dereference vulnerability exists in GPAC v1.1.0 via the function gf_sg_destroy_routes () at scenegraph/vrml_route.c. This vulnerability can lead to a Denial of Service (DoS). | [] | null | null | null | null |
|
GHSA-p76j-8v8h-xfgw | This issue is fixed in macOS Mojave 10.14. A memory corruption issue was addressed with improved input validation. | [] | null | null | null | null |
|
GHSA-j3cr-j9jx-mf4p | Downloads Resources over HTTP in redis-srvr | Affected versions of `redis-srvr` insecurely download an executable over an unencrypted HTTP connection.In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `redis-srvr`.RecommendationNo patch is currently available for this vulnerability, and the package has not seen an update since 2014.The best mitigation is currently to avoid using this package, using a different package if available.Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees. | [] | null | null | null | null |
CVE-2011-3450 | CoreUI in Apple Mac OS X 10.7.x before 10.7.3 does not properly restrict the allocation of stack memory, which allows remote attackers to execute arbitrary code or cause a denial of service (memory consumption and application crash) via a long URL. | [
"cpe:2.3:o:apple:mac_os_x:10.7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.7.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.7.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.7.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.7.2:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
RHSA-2024:2631 | Red Hat Security Advisory: Red Hat Ceph Storage 6.1 security and bug fix update | go-git: Maliciously crafted Git server replies can lead to path traversal and RCE on go-git clients | [
"cpe:/a:redhat:ceph_storage:6.1::el8",
"cpe:/a:redhat:ceph_storage:6.1::el9"
] | null | 8.1 | null | null |
CVE-2015-6246 | The dissect_wa_payload function in epan/dissectors/packet-waveagent.c in the WaveAgent dissector in Wireshark 1.12.x before 1.12.7 mishandles large tag values, which allows remote attackers to cause a denial of service (application crash) via a crafted packet. | [
"cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.12.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.12.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.12.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.12.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.12.4:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.12.5:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.12.6:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2024-0245 | Task Hijacking in hamza417/inure | A misconfiguration in the AndroidManifest.xml file in hamza417/inure before build97 allows for task hijacking. This vulnerability permits malicious applications to inherit permissions of the vulnerable app, potentially leading to the exposure of sensitive information. An attacker can create a malicious app that hijacks the legitimate Inure app, intercepting and stealing sensitive information when installed on the victim's device. This issue affects all Android versions before Android 11. | [] | null | null | 5.5 | null |
CVE-2001-0599 | Sybase Adaptive Server Anywhere Database Engine 6.0.3.2747 and earlier as included with Symantec Ghost 6.5 allows a remote attacker to create a denial of service by sending large (> 45Kb) amounts of data to port 2638. | [
"cpe:2.3:a:sybase:adaptive_server_anywhere:*:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2009-3571 | Unspecified vulnerability in OpenOffice.org (OOo) has unknown impact and client-side attack vector, as demonstrated by a certain module in VulnDisco Pack Professional 8.8, aka "Client-side exploit." NOTE: as of 20091005, this disclosure has no actionable information. However, because the VulnDisco Pack author is a reliable researcher, the issue is being assigned a CVE identifier for tracking purposes. | [
"cpe:2.3:a:openoffice:openoffice.org:*:*:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
GHSA-hrjj-p4r3-74mg | On cSRX Series devices software permission issues in the container filesystem and stored files combined with storing passwords in a recoverable format in Juniper Networks Junos OS allows a local, low-privileged attacker to elevate their permissions to take control of any instance of a cSRX software deployment. This issue affects Juniper Networks Junos OS 20.2 version 20.2R1 and later versions prior to 21.2R1 on cSRX Series. | [] | null | 7.8 | null | null |
|
GHSA-9qfx-7mxj-67c9 | A vulnerability in the orchestration tasks of Cisco UCS Director could allow an authenticated, remote attacker to perform a path traversal attack on an affected device. The vulnerability is due to insufficient validation of user-supplied input on the web-based management interface. An attacker could exploit this vulnerability by creating a task with specific configuration parameters. A successful exploit could allow the attacker to overwrite arbitrary files in the file system of an affected device. | [] | null | null | null | null |
|
CVE-2001-1180 | FreeBSD 4.3 does not properly clear shared signal handlers when executing a process, which allows local users to gain privileges by calling rfork with a shared signal handler, having the child process execute a setuid program, and sending a signal to the child. | [
"cpe:2.3:o:freebsd:freebsd:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:4.3:*:*:*:*:*:*:*"
] | null | null | null | 7.2 |
|
CVE-2004-0180 | The client for CVS before 1.11 allows a remote malicious CVS server to create arbitrary files using certain RCS diff files that use absolute pathnames during checkouts or updates, a different vulnerability than CVE-2004-0405. | [
"cpe:2.3:a:cvs:cvs:*:*:*:*:*:*:*:*"
] | null | null | null | 2.6 |
|
GHSA-mgh9-rchv-m7c2 | A vulnerability in the single sign-on (SSO) implementation of Cisco BroadWorks Application Delivery Platform and Cisco BroadWorks Xtended Services Platform could allow an unauthenticated, remote attacker to forge the credentials required to access an affected system.This vulnerability is due to the method used to validate SSO tokens. An attacker could exploit this vulnerability by authenticating to the application with forged credentials. A successful exploit could allow the attacker to commit toll fraud or to execute commands at the privilege level of the forged account. If that account is an Administrator account, the attacker would have the ability to view confidential information, modify customer settings, or modify settings for other users. To exploit this vulnerability, the attacker would need a valid user ID that is associated with an affected Cisco BroadWorks system. | [] | null | 10 | null | null |
|
GHSA-82gh-fr9f-867h | An issue was discovered in Squid before 5.0.2. A remote attacker can replay a sniffed Digest Authentication nonce to gain access to resources that are otherwise forbidden. This occurs because the attacker can overflow the nonce reference counter (a short integer). Remote code execution may occur if the pooled token credentials are freed (instead of replayed as valid credentials). | [] | null | null | null | null |
|
CVE-2021-38495 | Mozilla developers reported memory safety bugs present in Thunderbird 78.13.0. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird < 91.1 and Firefox ESR < 91.1. | [
"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.8 |
|
GHSA-9j8m-fmg4-mg36 | Weak permissions on the configuration file in the PAM module in Grommunio Gromox 0.5 through 1.x before 1.28 allow a local unprivileged user in the gromox group to have the PAM stack execute arbitrary code upon loading the Gromox PAM module. | [] | null | 7.8 | null | null |
|
GHSA-m833-jv95-mfjh | Memory safety violation in crayon | An issue was discovered in the crayon crate through 2020-08-31 for Rust. A TOCTOU issue has a resultant memory safety violation via HandleLike. | [] | null | 8.1 | null | null |
GHSA-gv9j-5h8v-w3f7 | Unspecified vulnerability in the Oracle Applications Manager component in Oracle E-Business Suite 12.1.3, 12.2.3, and 12.2.4 allows remote authenticated users to affect integrity via vectors related to OAM Dashboard. | [] | null | null | null | null |
|
RHSA-2014:0009 | Red Hat Security Advisory: samba security update | samba: Heap-based buffer overflow due to incorrect DCE-RPC fragment length field check samba: no access check verification on stream files | [
"cpe:/a:redhat:storage:2.1:server:el6"
] | null | null | null | null |
GHSA-rxwq-x6h5-x525 | Malicious code was discovered in the upstream tarballs of xz, starting with version 5.6.0. The tarballs included extra .m4 files, which contained instructions for building with automake that did not exist in the repository. These instructions, through a series of complex obfuscations, extract a prebuilt object file from one of the test archives, which is then used to modify specific functions in the code while building the liblzma package. This issue results in liblzma being used by additional software, like sshd, to provide functionality that will be interpreted by the modified functions. | [] | null | 10 | null | null |
|
GHSA-7qgq-w6fc-rgcq | Multiple cross-site scripting (XSS) vulnerabilities in index.php in the Bluemoon PopnupBLOG module 3.20 and 3.30 for XOOPS allow remote attackers to inject arbitrary web script or HTML via the (1) param, (2) cat_id, and (3) view parameters. | [] | null | null | null | null |
|
CVE-2019-9015 | A Path Traversal vulnerability was discovered in MOPCMS through 2018-11-30, leading to deletion of unexpected critical files. The exploitation point is in the "column management" function. The path added to the column is not verified. When a column is deleted by an attacker, the corresponding directory is deleted, as demonstrated by ./ to delete the entire web site. | [
"cpe:2.3:a:mopcms:mopcms:*:*:*:*:*:*:*:*"
] | null | null | 9.1 | 6.4 |
|
GHSA-gf2p-m82q-57j4 | A vulnerability in the component /languages/index.php of WBCE CMS v1.5.2 allows attackers to execute arbitrary code via a crafted PHP file. | [] | null | null | null | null |
|
CVE-2008-0628 | The XML parsing code in Sun Java Runtime Environment JDK and JRE 6 Update 3 and earlier processes external entity references even when the "external general entities" property is false, which allows remote attackers to conduct XML external entity (XXE) attacks and cause a denial of service or access restricted resources. | [
"cpe:2.3:a:sun:jdk:1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:*:update3:*:*:*:*:*:*"
] | null | null | null | 7.8 |
|
CVE-2021-34821 | Cross Site Scripting (XSS) vulnerability exists in AAT Novus Management System through 1.51.2. The WebUI has wrong HTTP 404 error handling implemented. A remote, unauthenticated attacker may be able to exploit the issue by sending malicious HTTP requests to non-existing URIs. The value of the URL path filename is copied into the HTML document as plain text tags. | [
"cpe:2.3:a:aat:novus_management_system:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 |
|
RHSA-2022:1851 | Red Hat Security Advisory: pki-core:10.6 security and bug fix update | JSS: memory leak in TLS connection leads to OOM | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
CVE-2020-3997 | VMware Horizon Server (7.x prior to 7.10.3 or 7.13.0) contains a Cross Site Scripting (XSS) vulnerability. Successful exploitation of this issue may allow an attacker to inject malicious script which will be executed. | [
"cpe:2.3:a:vmware:horizon:*:*:*:*:*:*:*:*"
] | null | 5.4 | null | 3.5 |
|
CVE-2021-36665 | An issue was discovered in Druva 6.9.0 for macOS, allows attackers to gain escalated local privileges via the inSyncUpgradeDaemon. | [
"cpe:2.3:a:druva:insync_client:*:*:*:*:*:macos:*:*",
"cpe:2.3:a:druva:insync_client:*:*:*:*:*:windows:*:*"
] | null | 7.8 | null | 7.2 |
|
CVE-2011-1843 | Integer overflow in conf.c in Tinyproxy before 1.8.3 might allow remote attackers to bypass intended access restrictions in opportunistic circumstances via a TCP connection, related to improper handling of invalid port numbers. | [
"cpe:2.3:a:banu:tinyproxy:*:*:*:*:*:*:*:*",
"cpe:2.3:a:banu:tinyproxy:1.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:banu:tinyproxy:1.5.0:pre1:*:*:*:*:*:*",
"cpe:2.3:a:banu:tinyproxy:1.5.0:pre2:*:*:*:*:*:*",
"cpe:2.3:a:banu:tinyproxy:1.5.0:pre3:*:*:*:*:*:*",
"cpe:2.3:a:banu:tinyproxy:1.5.0:pre4:*:*:*:*:*:*",
"cpe:2.3:a:banu:tinyproxy:1.5.0:pre5:*:*:*:*:*:*",
"cpe:2.3:a:banu:tinyproxy:1.5.0:pre6:*:*:*:*:*:*",
"cpe:2.3:a:banu:tinyproxy:1.5.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:banu:tinyproxy:1.5.0:rc10:*:*:*:*:*:*",
"cpe:2.3:a:banu:tinyproxy:1.5.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:banu:tinyproxy:1.5.0:rc4:*:*:*:*:*:*",
"cpe:2.3:a:banu:tinyproxy:1.5.0:rc5:*:*:*:*:*:*",
"cpe:2.3:a:banu:tinyproxy:1.5.0:rc6:*:*:*:*:*:*",
"cpe:2.3:a:banu:tinyproxy:1.5.0:rc7:*:*:*:*:*:*",
"cpe:2.3:a:banu:tinyproxy:1.5.0:rc8:*:*:*:*:*:*",
"cpe:2.3:a:banu:tinyproxy:1.5.0:rc9:*:*:*:*:*:*",
"cpe:2.3:a:banu:tinyproxy:1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:banu:tinyproxy:1.5.1:pre1:*:*:*:*:*:*",
"cpe:2.3:a:banu:tinyproxy:1.5.1:pre2:*:*:*:*:*:*",
"cpe:2.3:a:banu:tinyproxy:1.5.1:pre3:*:*:*:*:*:*",
"cpe:2.3:a:banu:tinyproxy:1.5.1:pre4:*:*:*:*:*:*",
"cpe:2.3:a:banu:tinyproxy:1.5.1:pre5:*:*:*:*:*:*",
"cpe:2.3:a:banu:tinyproxy:1.5.1:pre6:*:*:*:*:*:*",
"cpe:2.3:a:banu:tinyproxy:1.5.1:rc1:*:*:*:*:*:*",
"cpe:2.3:a:banu:tinyproxy:1.5.1:rc2:*:*:*:*:*:*",
"cpe:2.3:a:banu:tinyproxy:1.5.1:rc3:*:*:*:*:*:*",
"cpe:2.3:a:banu:tinyproxy:1.5.1:rc4:*:*:*:*:*:*",
"cpe:2.3:a:banu:tinyproxy:1.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:banu:tinyproxy:1.5.2:rc1:*:*:*:*:*:*",
"cpe:2.3:a:banu:tinyproxy:1.5.2:rc2:*:*:*:*:*:*",
"cpe:2.3:a:banu:tinyproxy:1.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:banu:tinyproxy:1.5.3:rc1:*:*:*:*:*:*",
"cpe:2.3:a:banu:tinyproxy:1.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:banu:tinyproxy:1.6.0:a:*:*:*:*:*:*",
"cpe:2.3:a:banu:tinyproxy:1.6.0:pre1:*:*:*:*:*:*",
"cpe:2.3:a:banu:tinyproxy:1.6.0:pre2:*:*:*:*:*:*",
"cpe:2.3:a:banu:tinyproxy:1.6.0:pre3:*:*:*:*:*:*",
"cpe:2.3:a:banu:tinyproxy:1.6.0:pre4:*:*:*:*:*:*",
"cpe:2.3:a:banu:tinyproxy:1.6.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:banu:tinyproxy:1.6.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:banu:tinyproxy:1.6.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:banu:tinyproxy:1.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:banu:tinyproxy:1.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:banu:tinyproxy:1.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:banu:tinyproxy:1.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:banu:tinyproxy:1.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:banu:tinyproxy:1.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:banu:tinyproxy:1.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:banu:tinyproxy:1.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:banu:tinyproxy:1.8.1:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
GHSA-3244-8mff-w398 | Reflected XSS in Gotify's /docs via import of outdated Swagger UI | ImpactGotify exposes an outdated instance of the [Swagger UI](https://swagger.io/tools/swagger-ui/) API documentation frontend at `/docs` which is susceptible to reflected XSS attacks when loading external Swagger config files.Specifically, the DOMPurify version included with this version of Swagger UI is vulnerable to a [rendering XSS](https://www.vidocsecurity.com/blog/hacking-swagger-ui-from-xss-to-account-takeovers/) incorporating the mutation payload detailed in [CVE-2020-26870](https://research.securitum.com/mutation-xss-via-mathml-mutation-dompurify-2-0-17-bypass/) which was patched in 2021. This is further tracked in the GitHub Advisory Database as GHSA-QRMM-W75W-3WPX.An attacker can execute arbitrary JavaScript and potentially take over the account of the user that clicked the link. Keep in mind, the Gotify UI won't natively expose such a malicious link, so an attacker has to get the user to open the malicious link in a context outside of Gotify.PatchesThe vulnerability has been fixed in version 2.2.3.Referenceshttps://github.com/gotify/server/pull/541 | [] | null | null | null | null |
CVE-2008-0124 | Cross-site scripting (XSS) vulnerability in Serendipity (S9Y) before 1.3-beta1 allows remote authenticated users to inject arbitrary web script or HTML via (1) the "Real name" field in Personal Settings, which is presented to readers of articles; or (2) a file upload, as demonstrated by a .htm, .html, or .js file. | [
"cpe:2.3:a:s9y:serendipity:0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:s9y:serendipity:0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:s9y:serendipity:0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:s9y:serendipity:0.5_pl1:*:*:*:*:*:*:*",
"cpe:2.3:a:s9y:serendipity:0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:s9y:serendipity:0.6_pl1:*:*:*:*:*:*:*",
"cpe:2.3:a:s9y:serendipity:0.6_pl2:*:*:*:*:*:*:*",
"cpe:2.3:a:s9y:serendipity:0.6_pl3:*:*:*:*:*:*:*",
"cpe:2.3:a:s9y:serendipity:0.6_rc1:*:*:*:*:*:*:*",
"cpe:2.3:a:s9y:serendipity:0.6_rc2:*:*:*:*:*:*:*",
"cpe:2.3:a:s9y:serendipity:0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:s9y:serendipity:0.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:s9y:serendipity:0.7_beta1:*:*:*:*:*:*:*",
"cpe:2.3:a:s9y:serendipity:0.7_beta2:*:*:*:*:*:*:*",
"cpe:2.3:a:s9y:serendipity:0.7_beta3:*:*:*:*:*:*:*",
"cpe:2.3:a:s9y:serendipity:0.7_beta4:*:*:*:*:*:*:*",
"cpe:2.3:a:s9y:serendipity:0.7_rc1:*:*:*:*:*:*:*",
"cpe:2.3:a:s9y:serendipity:0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:s9y:serendipity:0.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:s9y:serendipity:0.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:s9y:serendipity:0.8_beta_6_snapshot:*:*:*:*:*:*:*",
"cpe:2.3:a:s9y:serendipity:0.8_beta5:*:*:*:*:*:*:*",
"cpe:2.3:a:s9y:serendipity:0.8_beta6:*:*:*:*:*:*:*",
"cpe:2.3:a:s9y:serendipity:0.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:s9y:serendipity:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:s9y:serendipity:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:s9y:serendipity:1.0_beta2:*:*:*:*:*:*:*",
"cpe:2.3:a:s9y:serendipity:1.0_beta3:*:*:*:*:*:*:*",
"cpe:2.3:a:s9y:serendipity:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:s9y:serendipity:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:s9y:serendipity:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:s9y:serendipity:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:s9y:serendipity:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:s9y:serendipity:1.2__beta5:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-qp39-c68g-7r9p | Solidus <= 4.3.4 is affected by a Stored Cross-Site Scripting vulnerability in the order tracking URL. | [] | null | 5.7 | null | null |
|
CVE-2014-0739 | Race condition in the Phone Proxy component in Cisco Adaptive Security Appliance (ASA) Software 9.1(.3) and earlier allows remote attackers to bypass sec_db authentication and provide certain pass-through services to untrusted devices via a crafted configuration-file TFTP request, aka Bug ID CSCuj66766. | [
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1\\(3\\):*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
RHSA-2023:0198 | Red Hat Security Advisory: java-11-openjdk security update | OpenJDK: handshake DoS attack against DTLS connections (JSSE, 8287411) OpenJDK: soundbank URL remote loading (Sound, 8293742) | [
"cpe:/a:redhat:rhel_eus:8.4::appstream",
"cpe:/a:redhat:rhel_eus:8.4::crb"
] | null | 3.7 | null | null |
CVE-2023-47047 | ZDI-CAN-21685: Adobe Audition MP4 File Parsing Uninitialized Variable Remote Code Execution Vulnerability | Adobe Audition version 24.0 (and earlier) and 23.6.1 (and earlier) are affected by an Access of Uninitialized Pointer vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [
"cpe:2.3:a:adobe:audition:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:audition:24.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
GHSA-xv6r-2m8v-f893 | In the Linux kernel, the following vulnerability has been resolved:ext4: fix memory leak in ext4_fill_superBuffer head references must be released before calling kill_bdev();
otherwise the buffer head (and its page referenced by b_data) will not
be freed by kill_bdev, and subsequently that bh will be leaked.If blocksizes differ, sb_set_blocksize() will kill current buffers and
page cache by using kill_bdev(). And then super block will be reread
again but using correct blocksize this time. sb_set_blocksize() didn't
fully free superblock page and buffer head, and being busy, they were
not freed and instead leaked.This can easily be reproduced by calling an infinite loop of:systemctl start <ext4_on_lvm>.mount, and
systemctl stop <ext4_on_lvm>.mount... since systemd creates a cgroup for each slice which it mounts, and
the bh leak get amplified by a dying memory cgroup that also never
gets freed, and memory consumption is much more easily noticed. | [] | null | 5.5 | null | null |
|
GHSA-9wgg-m99q-hhfc | Expired tokens can be renewed without validating the account password | ImpactIn versions of the proxy from `2022-09-05` onwards (since 8c874c2ff3d503ac20c7d32f46e08547fcb9e23f), expired OAuth 2.0 client credentials grant (CCG) flow authorisation tokens could be renewed automatically without checking their validity against the original account configuration (i.e., the password that was set up when first creating an account in the proxy).An attacker with knowledge of valid account addresses and careful timing (specifically, attempting to log in during a period from 10 minutes prior to the token expiry time, but before a genuine login request is received) could use this issue to gain access to an account.This issue is only a security concern if you use the proxy with the CCG flow and no additional account secret encryption (see below). If this is the case, it is particularly important to update if you use the proxy in a publicly-accessible setting (i.e., it is available from the internet or across a network). To fix the issue you should switch to version [`2023-12-19`](https://github.com/simonrob/email-oauth2-proxy/releases/tag/2023-12-19) or later of the proxy immediately.If you use this flow, but have also set `encrypt_client_secret_on_first_use = True` *and* removed the original `client_secret` value from the proxy's configuration file then this issue is not a concern.For all other use-cases (e.g., a normal interactive account authentication, or the ROPCG flow), this issue is also not a concern. However, it is always recommended as best practice to keep the proxy up-to-date.Patches[Email OAuth 2.0 Proxy version `2023-12-19`](https://github.com/simonrob/email-oauth2-proxy/releases/tag/2023-12-19) (commit eaaa1a2e7a132bf0958dd2f99a749ad98e3212aa) fixes this issue.Issue detailsBecause it was originally designed for use as an interactive, local-only service on a single device, the proxy automatically resets account access tokens if incorrect IMAP/POP/SMTP login details are provided. For public-facing deployments, the `delete_account_token_on_password_error` option is provided, and can be set to `False` to disable this behaviour, which would normally be only a nuisance, rather than a security risk.Regardless of this option's value, the proxy encrypts locally-stored tokens, and requires interactive re-authentication (or, with the resource owner password credentials grant (ROPCG) flow, the correct remote account password) to renew tokens if they expire or are reset. The proxy's token retrieval implementation was created with this interactive process in mind.The CCG flow is an administrator-level method that grants broad access without user knowledge or consent – no user interaction (or remote account password) is ever required. From 8c874c2ff3d503ac20c7d32f46e08547fcb9e23f until the fix in eaaa1a2e7a132bf0958dd2f99a749ad98e3212aa, when CCG tokens neared their expiry date (or had already expired), and the original unencrypted `client_secret` value was available they were automatically reset, renewed and encrypted with the given login password, but without checking whether that password was actually able to decrypt the _existing_ token.Detecting unauthorised accessIf you do not use the OAuth 2.0 CCG flow (which is currently only known to be supported by O365), unauthorised account access was not possible.[^1] Attempts to exploit this flaw will be revealed in the same way as any other malicious access: an unexpected reauthorisation prompt from the proxy when trying to log in with the legitimate account details.When using the CCG flow, if you have set `delete_account_token_on_password_error = False`, unauthorised access will be revealed by the presence of an unexpected login failure from the proxy when attempting to log in with the correct password.It you have not set this value, it is not possible to detect unauthorised access in O365 CCG mode except via AAD/Entra or other external logs. However, it is also worth reiterating that the CCG flow should never be used in a publicly-accessible context due to the significant and potentially dangerous account control it provides.[^1]: If you are using a provider that does not provide an OAuth 2.0 refresh token (or have configured your account's scope so that this is not present), it is possible to trigger the line of code that caused this issue, but there is no way to use it for account access because interactive authentication is still required. | [] | null | 8.1 | null | null |
CVE-2021-23994 | A WebGL framebuffer was not initialized early enough, resulting in memory corruption and an out of bound write. This vulnerability affects Firefox ESR < 78.10, Thunderbird < 78.10, and Firefox < 88. | [
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.8 |
|
GHSA-g76p-f67h-39xx | Pointer corruption in system firmware for Intel(R) NUC Kit may allow a privileged user to potentially enable escalation of privilege, denial of service and/or information disclosure via local access. | [] | null | null | 6.7 | null |
|
CVE-2023-3456 | Vulnerability of kernel raw address leakage in the hang detector module. Successful exploitation of this vulnerability may affect service confidentiality. | [
"cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*"
] | null | 5.3 | null | null |
|
GHSA-fw3p-gjrx-f8v9 | PrestaShop 1.6.x before 1.6.1.23 and 1.7.x before 1.7.4.4 allows remote attackers to delete an image directory. | [] | null | null | 7.5 | null |
|
ICSA-22-132-11 | Siemens SIMATIC CP 44x-1 RNA | The affected devices improperly handles excessive ARP broadcast requests.
This could allow an attacker to create a denial of service condition by performing ARP storming attacks, which can cause the device to reboot. | [] | null | 7.4 | null | null |
CVE-2023-5472 | Use after free in Profiles in Google Chrome prior to 118.0.5993.117 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
|
CVE-2019-3815 | A memory leak was discovered in the backport of fixes for CVE-2018-16864 in Red Hat Enterprise Linux. Function dispatch_message_real() in journald-server.c does not free the memory allocated by set_iovec_field_free() to store the `_CMDLINE=` entry. A local attacker may use this flaw to make systemd-journald crash. This issue only affects versions shipped with Red Hat Enterprise since v219-62.2. | [
"cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
] | null | null | 3.3 | null |
|
GHSA-2cc5-887r-g8jc | Hyper-V in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows guest OS users to execute arbitrary code on the host OS via a crafted application, aka "Hyper-V Remote Code Execution Vulnerability." This vulnerability is different from that described in CVE-2017-0075. | [] | null | null | 7.6 | null |
|
GHSA-h9fx-fv39-r42q | SQL injection vulnerability in index.php for MercuryBoard 1.1.4 and earlier allows remote attackers to execute arbitrary SQL commands via the User-Agent HTTP header. | [] | null | null | null | null |
|
CVE-2007-0749 | Multiple stack-based buffer overflows in the is_command function in proxy.c in Apple Darwin Streaming Proxy, when using Darwin Streaming Server before 5.5.5, allow remote attackers to execute arbitrary code via a long (1) cmd or (2) server value in an RTSP request. | [
"cpe:2.3:a:apple:darwin_streaming_server:4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:darwin_streaming_server:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:darwin_streaming_server:5.5.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.2.8:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:darwin_streaming_server:4.1.3:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
CVE-2008-7068 | The dba_replace function in PHP 5.2.6 and 4.x allows context-dependent attackers to cause a denial of service (file truncation) via a key with the NULL byte. NOTE: this might only be a vulnerability in limited circumstances in which the attacker can modify or add database entries but does not have permissions to truncate the file. | [
"cpe:2.3:a:php:php:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0:beta_4_patch1:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0.1:patch1:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0.1:patch2:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0.3:patch1:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0.4:patch1:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0.7:rc1:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0.7:rc2:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0.7:rc3:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0.7:rc4:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.2:*:dev:*:*:*:*:*",
"cpe:2.3:a:php:php:4.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.8:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.9:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.10:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.11:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.4.9:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.6:*:*:*:*:*:*:*"
] | null | null | null | 6.4 |
|
CVE-2024-42412 | Cross-site scripting vulnerability exists in ELECOM wireless access points due to improper processing of input values in menu.cgi. If a user views a malicious web page while logged in to the product, an arbitrary script may be executed on the user's web browser. | [
"cpe:2.3:o:elecom:wab-s1167-ps_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:elecom:wab-s1167-ps:-:*:*:*:*:*:*:*",
"cpe:2.3:o:elecom:wab-i1750-ps_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:elecom:wab-i1750-ps:-:*:*:*:*:*:*:*"
] | null | null | 6.1 | null |
|
GHSA-f4hf-g9qr-gg3p | TOTOLINK-X6000R Firmware-V9.4.0cu.852_B20230719 is vulnerable to Command Execution. | [] | null | 9.8 | null | null |
|
CVE-2008-5793 | Multiple PHP remote file inclusion vulnerabilities in the Clickheat - Heatmap stats (com_clickheat) component 1.0.1 for Joomla! allow remote attackers to execute arbitrary PHP code via a URL in the (1) GLOBALS[mosConfig_absolute_path] parameter to (a) install.clickheat.php, (b) Cache.php and (c) Clickheat_Heatmap.php in Recly/Clickheat/, and (d) Recly/common/GlobalVariables.php; and the (2) mosConfig_absolute_path parameter to (e) _main.php and (f) main.php in includes/heatmap, and (g) includes/overview/main.php. | [
"cpe:2.3:a:recly:clickheat-heatmap:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
GHSA-wrf2-7gmj-mf6g | The HTML5 chat plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'HTML5CHAT' shortcode in all versions up to, and including, 1.04 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] | null | 6.4 | null | null |
|
GHSA-hxjm-95v4-6qjj | lib/ajaxHandlers/ajaxAddTemplate.php in rConfig through 3.94 allows remote attackers to execute arbitrary OS commands via shell metacharacters in the fileName POST parameter. | [] | null | 8.8 | null | null |
|
CVE-2020-3572 | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software SSL/TLS Session Denial of Service Vulnerability | A vulnerability in the SSL/TLS session handler of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to a memory leak when closing SSL/TLS connections in a specific state. An attacker could exploit this vulnerability by establishing several SSL/TLS sessions and ensuring they are closed under certain conditions. A successful exploit could allow the attacker to exhaust memory resources in the affected device, which would prevent it from processing new SSL/TLS connections, resulting in a DoS. Manual intervention is required to recover an affected device. | [
"cpe:2.3:a:cisco:adaptive_security_appliance:*:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*"
] | null | 8.6 | null | null |
GHSA-j4gr-j44w-w9m4 | The Appointment Hour Booking plugin 1.1.44 for WordPress allows XSS via the E-mail field, as demonstrated by email_1. | [] | null | 6.1 | null | null |
|
GHSA-hc53-pc75-x683 | Tollgrade LightHouse SMS before 5.1 patch 3 allows remote authenticated users to bypass an intended administrative-authentication requirement, and read or change parameter values, via a direct request. | [] | null | null | 8.1 | null |
|
GHSA-4mv9-4vrq-h2m3 | The main function in tools/hv/hv_kvp_daemon.c in hypervkvpd, as distributed in the Linux kernel before 3.8-rc1, allows local users to cause a denial of service (daemon exit) via a crafted application that sends a Netlink message. NOTE: this vulnerability exists because of an incorrect fix for CVE-2012-2669. | [] | null | null | null | null |
|
CVE-2025-31763 | WordPress Cache control by Cacholong Plugin <= 5.4.1 - Cross Site Request Forgery (CSRF) vulnerability | Cross-Site Request Forgery (CSRF) vulnerability in Preliot Cache control by Cacholong allows Cross Site Request Forgery. This issue affects Cache control by Cacholong: from n/a through 5.4.1. | [] | null | 4.3 | null | null |
CVE-2024-13294 | POST File - Critical - Cross Site Scripting, Arbitrary PHP code execution - SA-CONTRIB-2024-060 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Drupal POST File allows Cross-Site Scripting (XSS).This issue affects POST File: from 0.0.0 before 1.0.2. | [] | null | 5.4 | null | null |
GHSA-4gmg-5g4q-8pp3 | The HTMLSourceElement::AfterSetAttr function in Mozilla Firefox before 37.0 does not properly constrain the original data type of a casted value during the setting of a SOURCE element's attributes, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free) via a crafted HTML document. | [] | null | null | null | null |
|
GHSA-97pg-mf6p-74fr | Multiple PHP remote file inclusion vulnerabilities in phpMyAdmin 2.6.1 allow remote attackers to execute arbitrary PHP code by modifying the (1) theme parameter to phpmyadmin.css.php or (2) cfg[Server][extension] parameter to database_interface.lib.php to reference a URL on a remote web server that contains the code. | [] | null | null | null | null |
|
CVE-2023-37997 | WordPress Post List With Featured Image Plugin <= 1.2 is vulnerable to Cross Site Scripting (XSS) | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Dharmesh Patel Post List With Featured Image plugin <= 1.2 versions. | [
"cpe:2.3:a:dharmeshpatel:post_list_with_featured_image:*:*:*:*:*:wordpress:*:*"
] | null | 7.1 | null | null |
GHSA-gv9x-4r58-jfcv | The WordPress Charts plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'wp_charts' shortcode in versions up to, and including, 0.7.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] | null | 6.4 | null | null |
|
CVE-2021-24116 | In wolfSSL through 4.6.0, a side-channel vulnerability in base64 PEM file decoding allows system-level (administrator) attackers to obtain information about secret RSA keys via a controlled-channel and side-channel attack on software running in isolated environments that can be single stepped, especially Intel SGX. | [
"cpe:2.3:a:wolfssl:wolfssl:*:*:*:*:*:*:*:*"
] | null | 4.9 | null | 4 |
|
RHSA-2023:3167 | Red Hat Security Advisory: Red Hat build of Cryostat 2.3.0: new RHEL 8 container images | golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding golang: crypto/tls: large handshake records may cause panics golang: net/http, mime/multipart: denial of service from excessive resource consumption golang: net/http, net/textproto: denial of service from excessive memory allocation golang: net/http, net/textproto, mime/multipart: denial of service from excessive resource consumption golang: go/parser: Infinite loop in parsing | [
"cpe:/a:redhat:cryostat:2::el8"
] | null | 7.5 | null | null |
CVE-2024-46824 | iommufd: Require drivers to supply the cache_invalidate_user ops | In the Linux kernel, the following vulnerability has been resolved:
iommufd: Require drivers to supply the cache_invalidate_user ops
If drivers don't do this then iommufd will oops invalidation ioctls with
something like:
Unable to handle kernel NULL pointer dereference at virtual address 0000000000000000
Mem abort info:
ESR = 0x0000000086000004
EC = 0x21: IABT (current EL), IL = 32 bits
SET = 0, FnV = 0
EA = 0, S1PTW = 0
FSC = 0x04: level 0 translation fault
user pgtable: 4k pages, 48-bit VAs, pgdp=0000000101059000
[0000000000000000] pgd=0000000000000000, p4d=0000000000000000
Internal error: Oops: 0000000086000004 [#1] PREEMPT SMP
Modules linked in:
CPU: 2 PID: 371 Comm: qemu-system-aar Not tainted 6.8.0-rc7-gde77230ac23a #9
Hardware name: linux,dummy-virt (DT)
pstate: 81400809 (Nzcv daif +PAN -UAO -TCO +DIT -SSBS BTYPE=-c)
pc : 0x0
lr : iommufd_hwpt_invalidate+0xa4/0x204
sp : ffff800080f3bcc0
x29: ffff800080f3bcf0 x28: ffff0000c369b300 x27: 0000000000000000
x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000
x23: 0000000000000000 x22: 00000000c1e334a0 x21: ffff0000c1e334a0
x20: ffff800080f3bd38 x19: ffff800080f3bd58 x18: 0000000000000000
x17: 0000000000000000 x16: 0000000000000000 x15: 0000ffff8240d6d8
x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000
x8 : 0000001000000002 x7 : 0000fffeac1ec950 x6 : 0000000000000000
x5 : ffff800080f3bd78 x4 : 0000000000000003 x3 : 0000000000000002
x2 : 0000000000000000 x1 : ffff800080f3bcc8 x0 : ffff0000c6034d80
Call trace:
0x0
iommufd_fops_ioctl+0x154/0x274
__arm64_sys_ioctl+0xac/0xf0
invoke_syscall+0x48/0x110
el0_svc_common.constprop.0+0x40/0xe0
do_el0_svc+0x1c/0x28
el0_svc+0x34/0xb4
el0t_64_sync_handler+0x120/0x12c
el0t_64_sync+0x190/0x194
All existing drivers implement this op for nesting, this is mostly a
bisection aid. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
GHSA-pv2f-qqxf-mjq7 | A Reflected cross-site scripting (XSS) vulnerability in browse.php of Code-projects Jonnys Liquor 1.0 allows remote attackers to inject arbitrary web scripts or HTML via the search parameter. | [] | null | 6.1 | null | null |
|
GHSA-v4cr-28cr-wjhv | Stored cross-site scripting (XSS) issue in Esri Portal for ArcGIS may allow a remote unauthenticated attacker to pass and store malicious strings in the home application. | [] | null | 5.4 | null | null |
|
GHSA-m823-4q9p-vch7 | Cross-Site Request Forgery (CSRF) vulnerability in Palasthotel (in person: Edward Bock) Use Memcached plugin <= 1.0.4 versions. | [] | null | 5.4 | null | null |
|
GHSA-v5qv-jjr8-5wpj | Libsixel prior to v1.8.3 contains a stack buffer overflow in the function gif_process_raster at fromgif.c. | [] | null | 6.5 | null | null |
|
GHSA-9f52-rmc2-c4c7 | Out-of-bounds read vulnerability/issue exists in CX-Programmer Included in CX-One CXONE-AL[][]D-V4 V9.80 and earlier. By having a user open a specially crafted CXP file, information disclosure and/or arbitrary code execution may occur. | [] | null | 7.8 | null | null |
|
GHSA-4952-9rh4-jp43 | Vulnerability in the Oracle iStore component of Oracle E-Business Suite (subcomponent: Address Book). Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5 and 12.2.6. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle iStore. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle iStore, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle iStore accessible data as well as unauthorized update, insert or delete access to some of Oracle iStore accessible data. CVSS v3.0 Base Score 8.2 (Confidentiality and Integrity impacts). | [] | null | null | 8.2 | null |
Subsets and Splits