id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
197k
cpes
sequencelengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
RHSA-2016:2995
Red Hat Security Advisory: Red Hat Ceph Storage 1.3 security and bug fix update
ceph: Object Gateway server DoS by sending invalid cross-origin HTTP request
[ "cpe:/a:redhat:ceph_storage:1.3::ubuntu:14.04" ]
null
null
6.5
null
GHSA-4q9c-h5m8-8ffp
The export_data function of the Simple 301 Redirects by BetterLinks WordPress plugin before 2.0.4 had no capability or nonce checks making it possible for unauthenticated users to export a site's redirects.
[]
null
8.8
null
null
CVE-2011-2283
Unspecified vulnerability in the PeopleSoft Enterprise FMS component in Oracle PeopleSoft Products 9.0 Bundle #36 and 9.1 Bundle #13 allows remote authenticated users to affect confidentiality and integrity via unknown vectors related to Payables.
[ "cpe:2.3:a:oracle:peoplesoft_enterprise_fms:9.0:bundle36:*:*:*:*:*:*", "cpe:2.3:a:oracle:peoplesoft_enterprise_fms:9.1:bundle13:*:*:*:*:*:*", "cpe:2.3:a:oracle:peoplesoft_products:9.0:bundle36:*:*:*:*:*:*", "cpe:2.3:a:oracle:peoplesoft_products:9.1:bundle13:*:*:*:*:*:*" ]
null
null
null
5.5
GHSA-9cf2-jgqc-9fx3
Rejected reason: Not used
[]
null
null
null
null
GHSA-9v5q-r3g6-cjvx
Missing Authorization vulnerability in CodePeople, paypaldev CP Contact Form with Paypal allows Functionality Misuse.This issue affects CP Contact Form with Paypal: from n/a through 1.3.34.
[]
null
4.3
null
null
GHSA-pr5x-m96q-w2jh
Vulnerability in the Database Filesystem component of Oracle Database Server. Supported versions that are affected are 11.2.0.4, 12.1.0.2 and 12.2.0.1. Easily exploitable vulnerability allows high privileged attacker having Resource, Create Table, Create View, Create Procedure, Dbfs_role privilege with network access via Oracle Net to compromise Database Filesystem. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Database Filesystem. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
[]
null
null
null
null
GHSA-fvcj-q933-vff3
Missing Authorization vulnerability in WP Royal Ashe Extra allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Ashe Extra: from n/a through 1.2.9.
[]
null
5.4
null
null
CVE-2024-40959
xfrm6: check ip6_dst_idev() return value in xfrm6_get_saddr()
In the Linux kernel, the following vulnerability has been resolved: xfrm6: check ip6_dst_idev() return value in xfrm6_get_saddr() ip6_dst_idev() can return NULL, xfrm6_get_saddr() must act accordingly. syzbot reported: Oops: general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN PTI KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007] CPU: 1 PID: 12 Comm: kworker/u8:1 Not tainted 6.10.0-rc2-syzkaller-00383-gb8481381d4e2 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 Workqueue: wg-kex-wg1 wg_packet_handshake_send_worker RIP: 0010:xfrm6_get_saddr+0x93/0x130 net/ipv6/xfrm6_policy.c:64 Code: df 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 97 00 00 00 4c 8b ab d8 00 00 00 48 b8 00 00 00 00 00 fc ff df 4c 89 ea 48 c1 ea 03 <80> 3c 02 00 0f 85 86 00 00 00 4d 8b 6d 00 e8 ca 13 47 01 48 b8 00 RSP: 0018:ffffc90000117378 EFLAGS: 00010246 RAX: dffffc0000000000 RBX: ffff88807b079dc0 RCX: ffffffff89a0d6d7 RDX: 0000000000000000 RSI: ffffffff89a0d6e9 RDI: ffff88807b079e98 RBP: ffff88807ad73248 R08: 0000000000000007 R09: fffffffffffff000 R10: ffff88807b079dc0 R11: 0000000000000007 R12: ffffc90000117480 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 FS: 0000000000000000(0000) GS:ffff8880b9300000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f4586d00440 CR3: 0000000079042000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: <TASK> xfrm_get_saddr net/xfrm/xfrm_policy.c:2452 [inline] xfrm_tmpl_resolve_one net/xfrm/xfrm_policy.c:2481 [inline] xfrm_tmpl_resolve+0xa26/0xf10 net/xfrm/xfrm_policy.c:2541 xfrm_resolve_and_create_bundle+0x140/0x2570 net/xfrm/xfrm_policy.c:2835 xfrm_bundle_lookup net/xfrm/xfrm_policy.c:3070 [inline] xfrm_lookup_with_ifid+0x4d1/0x1e60 net/xfrm/xfrm_policy.c:3201 xfrm_lookup net/xfrm/xfrm_policy.c:3298 [inline] xfrm_lookup_route+0x3b/0x200 net/xfrm/xfrm_policy.c:3309 ip6_dst_lookup_flow+0x15c/0x1d0 net/ipv6/ip6_output.c:1256 send6+0x611/0xd20 drivers/net/wireguard/socket.c:139 wg_socket_send_skb_to_peer+0xf9/0x220 drivers/net/wireguard/socket.c:178 wg_socket_send_buffer_to_peer+0x12b/0x190 drivers/net/wireguard/socket.c:200 wg_packet_send_handshake_initiation+0x227/0x360 drivers/net/wireguard/send.c:40 wg_packet_handshake_send_worker+0x1c/0x30 drivers/net/wireguard/send.c:51 process_one_work+0x9fb/0x1b60 kernel/workqueue.c:3231 process_scheduled_works kernel/workqueue.c:3312 [inline] worker_thread+0x6c8/0xf70 kernel/workqueue.c:3393 kthread+0x2c1/0x3a0 kernel/kthread.c:389 ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.10:rc4:*:*:*:*:*:*" ]
null
5.5
null
null
CVE-2006-1443
Integer underflow in CoreFoundation in Apple Mac OS X 10.3.9 and 10.4.6 allows context-dependent attackers to execute arbitrary code via unspecified vectors involving conversions from string to file system representation within (1) CFStringGetFileSystemRepresentation or (2) getFileSystemRepresentation:maxLength:withPath in NSFileManager, and possibly other similar API functions.
[ "cpe:2.3:o:apple:mac_os_x:10.3.9:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.4.6:*:*:*:*:*:*:*" ]
null
null
null
6.5
CVE-2024-9672
Reflected XSS in PaperCut MF
A reflected cross-site scripting (XSS) vulnerability exists in PaperCut NG/MF. This issue can be used to execute specially created JavaScript payloads in the browser. A user must click on a malicious link for this issue to occur.
[]
6.3
null
null
null
CVE-2016-5774
The HTTPS server in Blue Coat PacketShaper S-Series 11.5.x before 11.5.3.2 might allow remote attackers to obtain sensitive credentials and other information via unspecified vectors, related to use of insecure cryptographic parameters.
[ "cpe:2.3:a:blue_coat:packetshaper_s-series:11.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:blue_coat:packetshaper_s-series:11.5.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:blue_coat:packetshaper_s-series:11.5.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:blue_coat:packetshaper_s-series:11.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:blue_coat:packetshaper_s-series:11.5.3:*:*:*:*:*:*:*" ]
null
null
8.1
4.3
GHSA-m5qp-25mc-53xj
Cross-Site Request Forgery (CSRF) vulnerability in Get Push Monkey LLC Push Monkey Pro – Web Push Notifications and WooCommerce Abandoned Cart allows Cross Site Request Forgery.This issue affects Push Monkey Pro – Web Push Notifications and WooCommerce Abandoned Cart: from n/a through 3.9.
[]
null
7.1
null
null
CVE-2017-7043
An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
[ "cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*" ]
null
null
8.8
6.8
CVE-2020-36608
Tribal Systems Zenario CMS Error Log Module admin_organizer.js cross site scripting
A vulnerability, which was classified as problematic, has been found in Tribal Systems Zenario CMS. Affected by this issue is some unknown functionality of the file admin_organizer.js of the component Error Log Module. The manipulation leads to cross site scripting. The attack may be launched remotely. The name of the patch is dfd0afacb26c3682a847bea7b49ea440b63f3baa. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-212816.
[ "cpe:2.3:a:tribalsystems:zenario:*:*:*:*:*:*:*:*" ]
null
3.5
null
null
GHSA-xq2q-8hxc-7jr2
XXE vulnerability in Jenkins Valgrind Plugin
Valgrind Plugin 0.28 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.This allows a user able to control the input files for the Valgrind plugin parser to have Jenkins parse a crafted file that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery.
[]
null
7.1
null
null
CVE-2017-3349
Vulnerability in the Oracle Marketing component of Oracle E-Business Suite (subcomponent: User Interface). Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5 and 12.2.6. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Marketing. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Marketing, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Marketing accessible data as well as unauthorized update, insert or delete access to some of Oracle Marketing accessible data. CVSS v3.0 Base Score 8.2 (Confidentiality and Integrity impacts).
[ "cpe:2.3:a:oracle:marketing:12.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:marketing:12.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:marketing:12.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:marketing:12.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:marketing:12.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:marketing:12.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:marketing:12.2.6:*:*:*:*:*:*:*" ]
null
null
8.2
5.8
RHSA-2015:1037
Red Hat Security Advisory: Red Hat Satellite Proxy 5 - End Of Life Notice
This is the final notification of the End Of Life (EOL) plans for the following versions of Red Hat Satellite Proxy 5: * Red Hat Satellite Proxy 5.2 * Red Hat Satellite Proxy 5.3 * Red Hat Satellite Proxy 5.4 * Red Hat Satellite Proxy 5.5
[ "cpe:/a:redhat:network_proxy:5.2::el5", "cpe:/a:redhat:network_proxy:5.3::el5", "cpe:/a:redhat:network_proxy:5.4::el5", "cpe:/a:redhat:network_proxy:5.4::el6", "cpe:/a:redhat:network_proxy:5.5::el5", "cpe:/a:redhat:network_proxy:5.5::el6" ]
null
null
null
null
CVE-2019-10721
BlogEngine.NET 3.3.7.0 allows a Client Side URL Redirect via the ReturnUrl parameter, related to BlogEngine/BlogEngine.Core/Services/Security/Security.cs, login.aspx, and register.aspx.
[ "cpe:2.3:a:dotnetblogengine:blogengine.net:3.3.7.0:*:*:*:*:*:*:*" ]
null
null
6.1
5.8
cisco-sa-20190306-nexus-fbr-dos
Cisco Nexus 5600 and 6000 Series Switches Fibre Channel over Ethernet Denial of Service Vulnerability
A vulnerability in the Fibre Channel over Ethernet (FCoE) protocol implementation in Cisco NX-OS Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to an incorrect allocation of an internal interface index. An adjacent attacker with the ability to submit a crafted FCoE packet that crosses affected interfaces could trigger this vulnerability. A successful exploit could allow the attacker to cause a packet loop and high throughput on the affected interfaces, resulting in a DoS condition. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nexus-fbr-dos ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nexus-fbr-dos"]
[]
null
null
7.4
null
GHSA-5cv8-848m-hmm2
A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory, aka "Windows VBScript Engine Remote Code Execution Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.
[]
null
null
7.5
null
CVE-2020-7517
A CWE-312: Cleartext Storage of Sensitive Information vulnerability exists in Easergy Builder (Version 1.4.7.2 and older) which could allow an attacker to read user credentials.
[ "cpe:2.3:a:schneider-electric:easergy_builder:*:*:*:*:*:*:*:*" ]
null
5.5
null
2.1
CVE-2024-28294
Limbas up to v5.2.14 was discovered to contain a SQL injection vulnerability via the ftid parameter.
[ "cpe:2.3:a:limbas:limbas:*:*:*:*:*:*:*:*" ]
null
6.5
null
null
GHSA-958r-mfgf-8525
The (1) Admin/frmEmailReportSettings.aspx, (2) Admin/frmGeneralSettings.aspx, (3) Admin/frmSite.aspx, (4) Client/frmUser.aspx, and (5) Login.aspx components in the SmarterTools SmarterStats 6.0 web server accept cleartext passwords, which makes it easier for remote attackers to obtain sensitive information by sniffing the network.
[]
null
null
null
null
GHSA-4j73-jx76-fgw8
An issue has recently been discovered in Arista EOS where, under certain conditions, the service ACL configured for OpenConfig gNOI and OpenConfig RESTCONF might be bypassed, which results in the denied requests being forwarded to the agent.
[]
null
7.1
null
null
CVE-2022-4368
WP CSV <= 1.8.0.0 - Reflected XSS via CSV Import
The WP CSV WordPress plugin through 1.8.0.0 does not sanitize and escape a parameter before outputting it back in the page when importing a CSV, and doe snot have CSRF checks in place as well, leading to a Reflected Cross-Site Scripting.
[ "cpe:2.3:a:cpkwebsolutions:wp_csv:*:*:*:*:*:wordpress:*:*" ]
null
6.1
null
null
GHSA-9h6f-343x-p726
An issue discovered in sub_4117F8 function in TOTOLINK X6000R V9.4.0cu.852_B20230719 allows attackers to run arbitrary commands via the 'lang' parameter.
[]
null
9.8
null
null
GHSA-cpwr-x5r8-x3w6
An issue in the sqlo_union_scope component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
[]
null
7.5
null
null
CVE-2024-37360
Hitachi Vantara Pentaho Business Analytics Server - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Hitachi Vantara Pentaho Business Analytics Server - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')   The software does not neutralize or incorrectly neutralize user-controllable input before it is placed in output that is used as a web page that is served to other users. (CWE-79)   Hitachi Vantara Pentaho Business Analytics Server prior to versions 10.2.0.0 and 9.3.0.9, including 8.3.x, allow a malicious URL to inject content into the Analyzer plugin interface.   Once the malicious script is injected, the attacker can perform a variety of malicious activities. The attacker could transfer private information, such as cookies that may include session information, from the victim's machine to the attacker. The attacker could send malicious requests to a web site on behalf of the victim, which could be especially dangerous to the site if the victim has administrator privileges to manage that site.
[]
null
4.4
null
null
GHSA-257m-2f66-mc6x
The WordPress Infinite Scroll – Ajax Load More plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ajax_load_more shortcode in versions up to, and including, 7.1.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
6.4
null
null
CVE-2024-27459
The interactive service in OpenVPN 2.6.9 and earlier allows an attacker to send data causing a stack overflow which can be used to execute arbitrary code with more privileges.
[ "cpe:2.3:a:openvpn:openvpn_gui:*:*:*:*:*:*:*:*", "cpe:2.3:a:openvpn:openvpn:*:*:*:*:community:*:*:*" ]
null
7.2
null
null
CVE-2006-6477
FRAgent.exe in Mandiant First Response (MFR) before 1.1.1, when run in daemon mode and configured to use only HTTP, allows local users to modify requests and responses between a client and an agent by hijacking an HTTP FRAgent daemon and conducting a man-in-the-middle (MITM) attack.
[ "cpe:2.3:a:mandiant:first_response:*:*:*:*:*:*:*:*" ]
null
null
null
2.4
GHSA-23gf-hmcg-fp4m
Cookie Dump Servlet stored XSS vulnerability in jetty though 6.1.20.
[]
null
null
null
null
RHSA-2020:2483
Red Hat Security Advisory: Red Hat JBoss Web Server 3.1 Service Pack 9 security update
tomcat: deserialization flaw in session persistence storage leading to RCE
[ "cpe:/a:redhat:jboss_enterprise_web_server:3.1::el6", "cpe:/a:redhat:jboss_enterprise_web_server:3.1::el7" ]
null
7
null
null
GHSA-grfq-486p-2f5m
The Radius configuration function in ASUS BMC’s firmware Web management page does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service.
[]
null
null
null
null
GHSA-hh2j-g84c-6hvv
Memory corruption while processing a data structure, when an iterator is accessed after it has been removed, potential failures occur.
[]
null
7.8
null
null
CVE-2020-28648
Improper input validation in the Auto-Discovery component of Nagios XI before 5.7.5 allows an authenticated attacker to execute remote code.
[ "cpe:2.3:a:nagios:nagios_xi:*:*:*:*:*:*:*:*" ]
null
8.8
null
9
GHSA-xxgx-gq2c-x92j
A remote code execution (RCE) vulnerability in /root/run/adm.php?admin-ediy&part=exdiy of imcat v5.1 allows authenticated attackers to execute arbitrary code.
[]
null
8.8
null
null
RHSA-2023:0633
Red Hat Security Advisory: Red Hat OpenShift (Logging Subsystem) security update
Logging Subsystem 5.5.7 - Red Hat OpenShift
[ "cpe:/a:redhat:logging:5.5::el8" ]
null
null
null
null
CVE-2022-3933
Essential Real Estate < 3.9.6 - Reflected Cross-Site-Scripting
The Essential Real Estate WordPress plugin before 3.9.6 does not sanitize and escapes some parameters, which could allow users with a role as low as Admin to perform Cross-Site Scripting attacks.
[ "cpe:2.3:a:g5theme:essential_real_estate:*:*:*:*:*:wordpress:*:*" ]
null
5.4
null
null
GHSA-wx9w-mg64-m22c
Missing Authorization vulnerability in Porthas Inc. Contact Form, Survey & Form Builder – MightyForms allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Contact Form, Survey & Form Builder – MightyForms: from n/a through 1.3.9.
[]
null
6.4
null
null
GHSA-pr2m-px7j-xg65
aiosmtpd vulnerable to SMTP smuggling
Summaryaiosmtpd is vulnerable to inbound SMTP smuggling. SMTP smuggling is a novel vulnerability based on not so novel interpretation differences of the SMTP protocol. By exploiting SMTP smuggling, an attacker may send smuggle/spoof e-mails with fake sender addresses, allowing advanced phishing attacks. This issue also existed in other SMTP software like Postfix (https://www.postfix.org/smtp-smuggling.html).DetailsDetailed information on SMTP smuggling can be found in the full blog post (https://sec-consult.com/blog/detail/smtp-smuggling-spoofing-e-mails-worldwide/) or on the Postfix homepage (https://www.postfix.org/smtp-smuggling.html). (and soon on the official website https://smtpsmuggling.com/)ImpactWith the right SMTP server constellation, an attacker can send spoofed e-mails to inbound/receiving aiosmtpd instances.
[]
null
5.3
null
null
GHSA-4fg3-3f6v-rq8c
SAP 3D Visual Enterprise Viewer, version - 9, allows a user to open manipulated PCX file received from untrusted sources which results in crashing of the application and becoming temporarily unavailable until the user restarts the application, this is caused due to Improper Input Validation.
[]
null
null
null
null
CVE-2018-16987
Squash TM through 1.18.0 presents the cleartext passwords of external services in the administration panel, as demonstrated by a ta-server-password field in the HTML source code.
[ "cpe:2.3:a:squashtest:squash_tm:*:*:*:*:*:*:*:*" ]
null
null
7.2
4
CVE-2022-4203
X.509 Name Constraints Read Buffer Overflow
A read buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed the malicious certificate or for the application to continue certificate verification despite failure to construct a path to a trusted issuer. The read buffer overrun might result in a crash which could lead to a denial of service attack. In theory it could also result in the disclosure of private memory contents (such as private keys, or sensitive plaintext) although we are not aware of any working exploit leading to memory contents disclosure as of the time of release of this advisory. In a TLS client, this can be triggered by connecting to a malicious server. In a TLS server, this can be triggered if the server requests client authentication and a malicious client connects.
[ "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*" ]
null
4.9
null
null
CVE-2005-1098
GetDataBack for NTFS 2.31 stores the username and license key in plaintext in the Name value in the License registry key, which may allow local users to obtain sensitive information.
[ "cpe:2.3:a:runtime_software:getdataback_for_ntfs:2.31:*:*:*:*:*:*:*" ]
null
null
null
2.1
CVE-2024-41760
IBM Common Cryptographic Architecture information disclosure
IBM Common Cryptographic Architecture 7.0.0 through 7.5.51 could allow an attacker to obtain sensitive information due to a timing attack during certain RSA operations.
[ "cpe:2.3:h:ibm:4769:-:*:*:*:*:*:*:*" ]
null
3.7
null
null
GHSA-qm5v-ggqm-6gpg
EzViz Studio v2.2.0 is vulnerable to DLL hijacking.
[]
null
7.8
null
null
GHSA-3hv4-r3g6-p2wr
A stack-based buffer overflow vulnerability exists in the boa formDnsv6 functionality of Realtek rtl819x Jungle SDK v3.4.11. A specially crafted series of network requests can lead to arbitrary code execution. An attacker can send a sequence of requests to trigger this vulnerability.
[]
null
7.2
null
null
CVE-2021-34316
A vulnerability has been identified in JT2Go (All versions < V13.2), Teamcenter Visualization (All versions < V13.2). The DL180CoolType.dll library in affected applications lacks proper validation of user-supplied data when parsing PDF files. This could result in an out of bounds write past the end of an allocated structure. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-13380)
[ "cpe:2.3:a:siemens:jt2go:*:*:*:*:*:*:*:*", "cpe:2.3:a:siemens:teamcenter_visualization:*:*:*:*:*:*:*:*" ]
null
7.8
null
6.8
RHSA-2009:1102
Red Hat Security Advisory: cscope security update
cscope: multiple buffer overflows cscope: multiple buffer overflows
[ "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
CVE-2019-7660
An issue was discovered in PHPMyWind 5.5. The username parameter of the /install/index.php page has a stored Cross-site Scripting (XSS) vulnerability, as demonstrated by admin/login.php.
[ "cpe:2.3:a:phpmywind:phpmywind:*:*:*:*:*:*:*:*" ]
null
null
6.1
4.3
GHSA-qjcg-gr4j-p5wc
beroNet VoIP Gateways before 3.0.16 have a PHP script that allows downloading arbitrary files, including ones with credentials.
[]
null
null
null
null
GHSA-h7h3-hmx5-3w4r
List of arbitrary files on Web host via nph-test-cgi script.
[]
null
null
null
null
GHSA-q7g6-f64x-77fj
In the Linux kernel, the following vulnerability has been resolved:ice: Fix increasing MSI-X on VFIncreasing MSI-X value on a VF leads to invalid memory operations. This is caused by not reallocating some arrays.Reproducer: modprobe ice echo 0 > /sys/bus/pci/devices/$PF_PCI/sriov_drivers_autoprobe echo 1 > /sys/bus/pci/devices/$PF_PCI/sriov_numvfs echo 17 > /sys/bus/pci/devices/$VF0_PCI/sriov_vf_msix_countDefault MSI-X is 16, so 17 and above triggers this issue.KASAN reports:BUG: KASAN: slab-out-of-bounds in ice_vsi_alloc_ring_stats+0x38d/0x4b0 [ice] Read of size 8 at addr ffff8888b937d180 by task bash/28433 (...)Call Trace: (...) ? ice_vsi_alloc_ring_stats+0x38d/0x4b0 [ice] kasan_report+0xed/0x120 ? ice_vsi_alloc_ring_stats+0x38d/0x4b0 [ice] ice_vsi_alloc_ring_stats+0x38d/0x4b0 [ice] ice_vsi_cfg_def+0x3360/0x4770 [ice] ? mutex_unlock+0x83/0xd0 ? __pfx_ice_vsi_cfg_def+0x10/0x10 [ice] ? __pfx_ice_remove_vsi_lkup_fltr+0x10/0x10 [ice] ice_vsi_cfg+0x7f/0x3b0 [ice] ice_vf_reconfig_vsi+0x114/0x210 [ice] ice_sriov_set_msix_vec_count+0x3d0/0x960 [ice] sriov_vf_msix_count_store+0x21c/0x300 (...)Allocated by task 28201: (...) ice_vsi_cfg_def+0x1c8e/0x4770 [ice] ice_vsi_cfg+0x7f/0x3b0 [ice] ice_vsi_setup+0x179/0xa30 [ice] ice_sriov_configure+0xcaa/0x1520 [ice] sriov_numvfs_store+0x212/0x390 (...)To fix it, use ice_vsi_rebuild() instead of ice_vf_reconfig_vsi(). This causes the required arrays to be reallocated taking the new queue count into account (ice_vsi_realloc_stat_arrays()). Set req_txq and req_rxq before ice_vsi_rebuild(), so that realloc uses the newly set queue count.Additionally, ice_vsi_rebuild() does not remove VSI filters (ice_fltr_remove_all()), so ice_vf_init_host_cfg() is no longer necessary.
[]
null
7.1
null
null
GHSA-5qq3-8r6f-c9v3
The cloudlabeling package in PyPI v0.0.1 was discovered to contain a code execution backdoor via the request package. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges.
[]
null
9.8
null
null
GHSA-35hv-j72m-jmfm
In linkturbonative service, there is a possible command injection due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed.
[]
null
6.5
null
null
cisco-sa-20190206-tms-xss
Cisco TelePresence Management Suite Cross-Site Scripting Vulnerability
A vulnerability in the web-based management interface of Cisco TelePresence Management Suite (TMS) software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by persuading a user of the interface to click a malicious link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or allow the attacker to access sensitive browser-based information. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190206-tms-xss ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190206-tms-xss"]
[]
null
null
6.1
null
GHSA-pqj5-37xf-x5gc
blinksocks has weak encryption algorithms
An issue was discovered in blinksocks version 3.3.8, allows remote attackers to obtain sensitive information via weak encryption algorithms in the component `/presets/ssr-auth-chain.js`.
[]
null
null
null
null
CVE-2005-3440
Unspecified vulnerability in Database Scheduler in Oracle Database Server 10g up to 10.1.0.3 has unknown impact and attack vectors, aka Oracle Vuln# DB08.
[ "cpe:2.3:a:oracle:database_server:10.1.0.3:*:*:*:*:*:*:*" ]
null
null
null
10
CVE-2022-44730
Apache XML Graphics Batik: Information disclosure vulnerability
Server-Side Request Forgery (SSRF) vulnerability in Apache Software Foundation Apache XML Graphics Batik.This issue affects Apache XML Graphics Batik: 1.16. A malicious SVG can probe user profile / data and send it directly as parameter to a URL.
[ "cpe:2.3:a:apache:xml_graphics_batik:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*" ]
null
4.4
null
null
GHSA-fhgv-9f93-wpvr
In the Linux kernel, the following vulnerability has been resolved:can: dev: can_put_echo_skb(): don't crash kernel if can_priv::echo_skb is accessed out of boundsIf the "struct can_priv::echoo_skb" is accessed out of bounds, this would cause a kernel crash. Instead, issue a meaningful warning message and return with an error.
[]
null
null
null
null
RHSA-2006:0726
Red Hat Security Advisory: wireshark security update
security flaw security flaw security flaw security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws", "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
CVE-2017-3117
Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable heap overflow vulnerability in the plugin that handles links within the PDF. Successful exploitation could lead to arbitrary code execution.
[ "cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:reader:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*" ]
null
null
8.8
9.3
GHSA-pm5r-mchq-fp54
Use-after-free vulnerability in Adobe Flash Player before 18.0.0.252 and 19.x before 19.0.0.207 on Windows and OS X and before 11.2.202.535 on Linux, Adobe AIR before 19.0.0.213, Adobe AIR SDK before 19.0.0.213, and Adobe AIR SDK & Compiler before 19.0.0.213 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-7629, CVE-2015-7631, CVE-2015-7635, CVE-2015-7636, CVE-2015-7637, CVE-2015-7639, CVE-2015-7640, CVE-2015-7641, CVE-2015-7642, CVE-2015-7643, and CVE-2015-7644.
[]
null
null
null
null
CVE-2017-8065
crypto/ccm.c in the Linux kernel 4.9.x and 4.10.x through 4.10.12 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page for a DMA scatterlist.
[ "cpe:2.3:o:linux:linux_kernel:4.9:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.9.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.9.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.9.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.9.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.9.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.9.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.9.8:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.9.9:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.9.10:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.9.11:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.9.12:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.9.13:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.9.14:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.9.15:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.9.16:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.9.17:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.9.18:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.9.19:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.10:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.10.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.10.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.10.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.10.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.10.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.10.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.10.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.10.8:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.10.9:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.10.10:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.10.11:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.10.12:*:*:*:*:*:*:*" ]
null
null
7.8
7.2
GHSA-w9xw-rq9v-758p
Mozilla developers and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 108 and Firefox ESR 102.6. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 109, Thunderbird < 102.7, and Firefox ESR < 102.7.
[]
null
8.8
null
null
GHSA-r58v-2qgp-mq8f
IBM Sterling File Gateway 2.2.0.0 through 2.2.6.5 and 6.0.0.0 through 6.0.3.2 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the insecure link and the attacker can then obtain the cookie value by snooping the traffic. IBM X-Force ID: 186280.
[]
null
null
null
null
GHSA-3g3j-w5cc-fqpr
A vulnerability classified as critical has been found in code-projects Online Book Shop 1.0. Affected is an unknown function of the file /search_result.php. The manipulation of the argument s leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
[]
5.3
6.3
null
null
RHSA-2017:3141
Red Hat Security Advisory: rhvm-appliance security, bug fix, and enhancement update
jasypt: Vulnerable to timing attack against the password hash comparison jackson-databind: Deserialization vulnerability via readValue method of ObjectMapper hibernate-validator: Privilege escalation when running under the security manager
[ "cpe:/o:redhat:enterprise_linux:7::hypervisor" ]
null
null
6.3
null
CVE-2006-7067
Oracle 10g R2 and possibly other versions allows remote attackers to trigger internal errors, and possibly have other impacts, via an "alter session set events" command with invalid arguments. NOTE: this issue was originally disputed by a third party, but the dispute was retracted. NOTE: this issue was called an "integer overflow" in the original source, but this might be incorrect.
[ "cpe:2.3:a:oracle:database_server:10.2.1:r2:*:*:*:*:*:*" ]
null
null
null
6
GHSA-q94f-6m7j-664g
Cross-Site Request Forgery (CSRF) vulnerability in Anton Bond Additional Order Filters for WooCommerce allows Stored XSS. This issue affects Additional Order Filters for WooCommerce: from n/a through 1.22.
[]
null
7.1
null
null
CVE-2014-3211
Publify before 8.0.1 is vulnerable to a Denial of Service attack
[ "cpe:2.3:a:publify_project:publify:*:*:*:*:*:*:*:*" ]
null
7.5
null
5
CVE-2024-33700
The LevelOne WBR-6012 router firmware R0.40e6 suffers from an input validation vulnerability within its FTP functionality, enabling attackers to cause a denial of service through a series of malformed FTP commands. This can lead to device reboots and service disruption.
[ "cpe:2.3:a:levelone:wbr-6012:*:*:*:*:*:*:*:*", "cpe:2.3:o:level1:wbr-6012_firmware:r0.40e6:*:*:*:*:*:*:*", "cpe:2.3:h:level1:wbr-6012:-:*:*:*:*:*:*:*" ]
null
7.5
null
null
CVE-2025-21606
Local Privilege Escalation via Exposed XPC Method Due to Client Verification Failure in stats
stats is a macOS system monitor in for the menu bar. The Stats application is vulnerable to a local privilege escalation due to the insecure implementation of its XPC service. The application registers a Mach service under the name `eu.exelban.Stats.SMC.Helper`. The associated binary, eu.exelban.Stats.SMC.Helper, is a privileged helper tool designed to execute actions requiring elevated privileges on behalf of the client, such as setting fan modes, adjusting fan speeds, and executing the `powermetrics` command. The root cause of this vulnerability lies in the `shouldAcceptNewConnection` method, which unconditionally returns YES (or true), allowing any XPC client to connect to the service without any form of verification. As a result, unauthorized clients can establish a connection to the Mach service and invoke methods exposed by the HelperTool interface. An attacker can exploit this vulnerability to modify the hardware settings of the user’s device and execute arbitrary code with root privileges. This issue has been addressed in version 2.11.21 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
[]
8.7
null
null
null
RHBA-2024:7523
Red Hat Bug Fix Advisory: Red Hat Developer Hub 1.3.0 release
golang: net/netip: Unexpected behavior from Is methods for IPv4-mapped IPv6 addresses net/http: Denial of service due to improper 100-continue handling in net/http azure-identity: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/Azure/azure-sdk-for-go/sdk/azidentity urllib3: proxy-authorization request header is not stripped during cross-origin redirects fast-loops: prototype pollution via objectMergeDeep nodejs-async: Regular expression denial of service while parsing function in autoinject
[ "cpe:/a:redhat:rhdh:1.3::el9" ]
null
5.3
null
null
GHSA-5c2c-2562-gwp9
There is a resource management error vulnerability in Jackman-AL00D versions 8.2.0.185(C00R2P1). Local attackers construct malicious application files, causing system applications to run abnormally.
[]
null
null
null
null
GHSA-5vp4-fp92-r9c3
In JetBrains TeamCity before 2023.05.1 stored XSS while viewing the build log was possible
[]
null
4.6
null
null
CVE-2009-4971
SQL injection vulnerability in the AJAX Chat (vjchat) extension before 0.3.3 for TYPO3 allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
[ "cpe:2.3:a:vincent_tietz:vjchat:*:*:*:*:*:*:*:*", "cpe:2.3:a:vincent_tietz:vjchat:0.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:vincent_tietz:vjchat:0.2.7:*:*:*:*:*:*:*", "cpe:2.3:a:vincent_tietz:vjchat:0.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:vincent_tietz:vjchat:0.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2023-5483
Inappropriate implementation in Intents in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to bypass content security policy via a crafted HTML page. (Chromium security severity: Medium)
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*" ]
null
6.5
null
null
CVE-2023-41678
A double free in Fortinet FortiOS versions 7.0.0 through 7.0.5, FortiPAM version 1.0.0 through 1.0.3, 1.1.0 through 1.1.1 allows attacker to execute unauthorized code or commands via specifically crafted request.
[ "cpe:2.3:o:fortinet:fortios:7.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortios:7.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortios:7.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortios:7.0.3:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortios:7.0.4:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortios:7.0.5:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortipam:1.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortipam:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortipam:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortipam:1.0.3:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortipam:1.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortipam:1.1.1:*:*:*:*:*:*:*" ]
null
8.3
null
null
GHSA-j89r-q6jr-68pj
In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Mobile MDM9615, MDM9625, MDM9635M, MDM9640, MDM9650, SD 210/SD 212/SD 205, SD 400, SD 425, SD 430, SD 435, SD 617, SD 625, and Snapdragon_High_Med_2016, binary Calibration files under data/misc/audio have 777 permissions.
[]
null
null
9.8
null
CVE-2022-22310
IBM WebSphere Application Server Liberty 21.0.0.10 through 21.0.0.12 could provide weaker than expected security. A remote attacker could exploit this weakness to obtain sensitive information and gain unauthorized access to JAX-WS applications. IBM X-Force ID: 217224.
[ "cpe:2.3:a:ibm:websphere_application_server:*:*:*:*:liberty:*:*:*", "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:hp-ux:-:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:aix:-:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:i:-:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:z\\/os:-:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "cpe:2.3:o:oracle:solaris:-:*:*:*:*:*:-:*" ]
null
null
4.8
null
GHSA-wfj5-2mqr-7jvv
Expression Language Injection in Netflix Conductor
Netflix Conductor uses Java Bean Validation (JSR 380) custom constraint validators. When building custom constraint violation error messages, different types of interpolation are supported, including Java EL expressions. If an attacker can inject arbitrary data in the error message template being passed to ConstraintValidatorContext.buildConstraintViolationWithTemplate() argument, they will be able to run arbitrary Java code.
[]
null
9.8
null
null
CVE-2022-34060
The Togglee package in PyPI version v0.0.8 was discovered to contain a code execution backdoor. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges.
[ "cpe:2.3:a:togglee:togglee:0.0.8:*:*:*:*:pypi:*:*" ]
null
9.8
null
7.5
RHSA-2011:1478
Red Hat Security Advisory: java-1.5.0-ibm security update
JDK: unspecified vulnerability fixed in 6u29 (Sound) OpenJDK: InputStream skip() information leak (Networking/IO, 7000600) OpenJDK: mutable static AWTKeyStroke.ctor (AWT, 7019773) JDK: unspecified vulnerability fixed in 6u29 (Swing) OpenJDK: excessive default UDP socket limit under SecurityManager (Networking, 7032417) OpenJDK: insufficient pack200 JAR files uncompress error checks (Runtime, 7057857) OpenJDK: RMI DGC server remote code execution (RMI, 7077466)
[ "cpe:/a:redhat:rhel_extras:4", "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server", "cpe:/a:redhat:rhel_extras:6" ]
null
null
null
null
CVE-2017-16637
In Vectura Perfect Privacy VPN Manager v1.10.10 and v1.10.11, when resetting the network data via the software client, with a running VPN connection, a critical error occurs which leads to a "FrmAdvancedProtection" crash. Although the mechanism malfunctions and an error occurs during the runtime with the stack trace being issued, the software process is not properly terminated. The software client is still attempting to maintain the connection even though the network connection information is being reset live. In that insecure mode, the "FrmAdvancedProtection" component crashes, but the process continues to run with different errors and process corruptions. This local corruption vulnerability can be exploited by local attackers.
[ "cpe:2.3:a:perfect-privacy:vpn_manager:1.10.10:*:*:*:*:*:*:*", "cpe:2.3:a:perfect-privacy:vpn_manager:1.10.11:*:*:*:*:*:*:*" ]
null
null
4.4
2.1
GHSA-grp5-h379-j75x
OpenStack Nova live snapshots use an insecure local directory
OpenStack Compute (Nova) Grizzly 2013.1.4, Havana 2013.2.1, and earlier uses world-writable and world-readable permissions for the temporary directory used to store live snapshots, which allows local users to read and modify live snapshots.
[]
null
null
null
null
CVE-2023-4001
Grub2: bypass the grub password protection feature
An authentication bypass flaw was found in GRUB due to the way that GRUB uses the UUID of a device to search for the configuration file that contains the password hash for the GRUB password protection feature. An attacker capable of attaching an external drive such as a USB stick containing a file system with a duplicate UUID (the same as in the "/boot/" file system) can bypass the GRUB password protection feature on UEFI systems, which enumerate removable drives before non-removable ones. This issue was introduced in a downstream patch in Red Hat's version of grub2 and does not affect the upstream package.
[ "cpe:/o:redhat:enterprise_linux:9::baseos", "cpe:/o:redhat:rhel_eus:9.0::baseos", "cpe:/o:redhat:rhel_eus:9.2::baseos", "cpe:/o:redhat:enterprise_linux:8", "cpe:2.3:a:gnu:grub2:-:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*" ]
null
6.8
null
null
GHSA-7vjf-c5mj-643c
The affected application lacks proper validation of user-supplied data when parsing project files (e.g., CSP). This could lead to a use-after-free vulnerability. An attacker could leverage this vulnerability to execute arbitrary code in the context of the current process.
[]
null
7.8
null
null
GHSA-g78x-gvfp-wx6g
epan/dissectors/packet-qnet6.c in the QNX6 QNET dissector in Wireshark 2.x before 2.0.6 mishandles MAC address data, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet.
[]
null
null
5.9
null
RHSA-2023:5165
Red Hat Security Advisory: Red Hat AMQ Streams 2.5.0 release and security update
netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way SnakeYaml: Constructor Deserialization Remote Code Execution netty: world readable temporary file containing sensitive data scala: deserialization gadget chain RESTEasy: creation of insecure temp files guava: insecure temporary directory creation okio: GzipSource class improper exception handling jetty-server: OutOfMemoryError for large multipart without filename read via request.getParameter() jetty-server: Cookie parsing of quoted values can exfiltrate values from other cookies bouncycastle: potential blind LDAP injection attack using a self-signed certificate snappy-java: Integer overflow in shuffle leads to DoS snappy-java: Integer overflow in compress leads to DoS snappy-java: Unchecked chunk length leads to DoS netty: SniHandler 16MB allocation leads to OOM
[ "cpe:/a:redhat:amq_streams:2" ]
null
6.5
null
null
GHSA-8jj5-5q3h-6f6v
XnView Classic for Windows Version 2.40 allows attackers to execute arbitrary code or cause a denial of service via a crafted .jb2 file, related to "Data from Faulting Address controls subsequent Write Address starting at jbig2dec+0x0000000000008823."
[]
null
null
7.8
null
CVE-2017-12777
Cross-Site Scripting (XSS) exists in NexusPHP version v1.5 via some parameter to usersearch.php.
[ "cpe:2.3:a:nexusphp_project:nexusphp:1.5:*:*:*:*:*:*:*" ]
null
null
6.1
4.3
GHSA-3rv5-pgj2-5frg
A buffer overflow vulnerability exists in Symantec Deployment Solution version 7.9 when parsing UpdateComputer tokens. A remote, anonymous attacker can exploit this vulnerability to achieve remote code execution as SYSTEM.
[]
null
10
null
null
GHSA-f666-7q5v-fcx5
Cisco TelePresence Video Communication Server (VCS) and Expressway Software before X8.1.1 allow remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug IDs CSCum60442 and CSCum60447.
[]
null
null
null
null
CVE-2019-16657
TuziCMS 2.0.6 has XSS via the PATH_INFO to a group URI, as demonstrated by index.php/article/group/id/2/.
[ "cpe:2.3:a:tuzicms:tuzicms:2.0.6:*:*:*:*:*:*:*" ]
null
6.1
null
4.3
CVE-2022-26731
A logic issue was addressed with improved state management. This issue is fixed in macOS Monterey 12.4, iOS 15.5 and iPadOS 15.5. A malicious website may be able to track users in Safari private browsing mode.
[ "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*" ]
null
4.3
null
4.3
CVE-2020-29511
The encoding/xml package in Go (all versions) does not correctly preserve the semantics of element namespace prefixes during tokenization round-trips, which allows an attacker to craft inputs that behave in conflicting ways during different stages of processing in affected downstream applications.
[ "cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:trident:-:*:*:*:*:*:*:*" ]
null
9.8
null
null
RHSA-2007:1020
Red Hat Security Advisory: cups security and bug fix update
cups boundary error
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
GHSA-2m87-9x7m-6v4q
Memory leak in LittleCMS (aka lcms or liblcms) before 1.18beta2, as used in Firefox 3.1beta, OpenJDK, and GIMP, allows context-dependent attackers to cause a denial of service (memory consumption and application crash) via a crafted image file.
[]
null
null
null
null