id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
139k
cpes
sequencelengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
CVE-2024-10695
Futurio Extra <= 2.0.13 - Authenticated (Contributor+) Post Disclosure
The Futurio Extra plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 2.0.13 via the 'elementor-template' shortcode due to insufficient restrictions on which posts can be included. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract data from private or draft posts that they should not have access to.
[ "cpe:2.3:a:futuriowp:futurio_extra:*:*:*:*:*:wordpress:*:*" ]
null
4.3
null
null
CVE-2008-1177
SQL injection vulnerability in shop/detail.php in Affiliate Market (affmarket) 0.1 BETA allows remote attackers to execute arbitrary SQL commands via the id parameter.
[ "cpe:2.3:a:affiliate_market:affiliate_market:0.1_beta:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-2vrf-hg2g-ppc5
An issue was discovered in certain Apple products. macOS before 10.12.1 is affected. The issue involves the "ImageIO" component. It allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds write and application crash) via a crafted PDF file.
[]
null
null
7.8
null
CVE-2006-3461
Heap-based buffer overflow in the PixarLog decoder in the TIFF library (libtiff) before 3.8.2 might allow context-dependent attackers to execute arbitrary code via unknown vectors.
[ "cpe:2.3:a:libtiff:libtiff:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-j5xw-gh42-g53c
An Improper Check for Unusual or Exceptional Conditions vulnerability in the Packet Forwarding Engine (pfe) of Juniper Networks Junos OS on MX Series allows a unauthenticated network-based attacker to cause an infinite loop, resulting in a Denial of Service (DoS).An attacker who sends malformed TCP traffic via an interface configured with PPPoE, causes an infinite loop on the respective PFE. This results in consuming all resources and a manual restart is needed to recover.This issue affects interfaces with PPPoE configured and tcp-mss enabled.This issue affects Juniper Networks Junos OSAll versions prior to 20.4R3-S7;21.1 version 21.1R1 and later versions;21.2 versions prior to 21.2R3-S6;21.3 versions prior to 21.3R3-S5;21.4 versions prior to 21.4R3-S3;22.1 versions prior to 22.1R3-S4;22.2 versions prior to 22.2R3;22.3 versions prior to 22.3R2-S2;22.4 versions prior to 22.4R2;
[]
null
7.5
null
null
CVE-2009-4978
Directory traversal vulnerability in down.php in MyBackup 1.4.0 allows remote attackers to read arbitrary files via a .. (dot dot) in the filename parameter.
[ "cpe:2.3:a:tufat:mybackup:1.4.0:*:*:*:*:*:*:*" ]
null
null
null
5
ICSA-21-068-07
Siemens TCP Stack of SIMATIC MV400
The underlying TCP stack of the affected products does not correctly validate the sequence number for incoming TCP RST packages. An attacker could exploit this to terminate arbitrary TCP sessions. ISN generator is initialized with a constant value and has constant increments. An attacker could predict and hijack TCP sessions.
[]
null
7.5
null
null
CVE-2010-1903
Microsoft Office Word 2002 SP3 and 2003 SP3, and Office Word Viewer, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a malformed record in a Word file, aka "Word HTML Linked Objects Memory Corruption Vulnerability."
[ "cpe:2.3:a:microsoft:word:2002:sp3:*:*:*:*:*:*", "cpe:2.3:a:microsoft:word:2003:sp3:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office_word_viewer:*:*:*:*:*:*:*:*" ]
null
null
null
9.3
RHSA-2023:3614
Red Hat Security Advisory: OpenShift Container Platform 4.13.4 bug fix and security update
golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding
[ "cpe:/a:redhat:openshift:4.13::el8", "cpe:/a:redhat:openshift:4.13::el9" ]
null
7.5
null
null
CVE-2015-4331
Cisco Prime Infrastructure (PI) 1.4(0.45) and earlier, when AAA authentication is used, allows remote authenticated users to bypass intended access restrictions via a username with a modified composition of lowercase and uppercase characters, aka Bug ID CSum59958.
[ "cpe:2.3:a:cisco:prime_infrastructure:*:*:*:*:*:*:*:*" ]
null
null
null
3.5
CVE-2017-3225
Das U-Boot's AES-CBC encryption feature uses a zero (0) initialization vector that may allow attacks against the underlying cryptographic implementation and allow an attacker to decrypt the data
Das U-Boot is a device bootloader that can read its configuration from an AES encrypted file. For devices utilizing this environment encryption mode, U-Boot's use of a zero initialization vector may allow attacks against the underlying cryptographic implementation and allow an attacker to decrypt the data. Das U-Boot's AES-CBC encryption feature uses a zero (0) initialization vector. This allows an attacker to perform dictionary attacks on encrypted data produced by Das U-Boot to learn information about the encrypted data.
[ "cpe:2.3:a:denx:u-boot:*:*:*:*:*:*:*:*" ]
null
null
4.6
2.1
GHSA-9cvx-cr48-6ghq
The X-Frame-Options header in Rockwell Automation MicroLogix 1100/1400 Versions 21.007 and prior is not configured in the HTTP response, which could allow clickjacking attacks.
[]
null
6.5
null
null
GHSA-34vg-2vxp-rvgw
Cross-Site Request Forgery (CSRF) vulnerability in 10up ElasticPress.This issue affects ElasticPress: from n/a through 5.1.0.
[]
null
4.3
null
null
GHSA-7774-p5v6-hf2q
The TaxoPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Suggest Terms Title field in versions up to, and including, 3.6.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with Editor+ permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
5.5
null
null
CVE-2022-28582
It is found that there is a command injection vulnerability in the setWiFiSignalCfg interface in TOTOlink A7100RU (v7.4cu.2313_b20191024) router, which allows an attacker to execute arbitrary commands through a carefully constructed payload.
[ "cpe:2.3:o:totolink:a7100ru_firmware:7.4cu.2313_b20191024:*:*:*:*:*:*:*", "cpe:2.3:h:totolink:a7100ru:-:*:*:*:*:*:*:*" ]
null
9.8
null
10
GHSA-8mg7-32mm-38xq
Web Access in Lotus Domino 6.5.1 allows remote attackers to cause a denial of service (server crash) via a large e-mail message, as demonstrated using a large image attachment.
[]
null
null
null
null
GHSA-hfrj-92vg-95r3
Firefox Sage extension 1.3.8 and earlier allows remote attackers to execute arbitrary Javascript in the local context via an RSS feed with an img tag containing the script followed by an extra trailing ">", which Sage modifies to close the img element before the malicious script.
[]
null
null
null
null
CVE-2020-13658
In Lansweeper 8.0.130.17, the web console is vulnerable to a CSRF attack that would allow a low-level Lansweeper user to elevate their privileges within the application.
[ "cpe:2.3:a:lansweeper:lansweeper:8.0.130.17:*:*:*:*:*:*:*" ]
null
8
null
6
GHSA-mr55-pxwp-33rp
Multiple code execution vulnerabilities exists in the Nef polygon-parsing functionality of CGAL libcgal CGAL-5.1.1. A specially crafted malformed file can lead to an out-of-bounds read and type confusion, which could lead to code execution. An attacker can provide malicious input to trigger any of these vulnerabilities. An oob read vulnerability exists in Nef_S2/SNC_io_parser.h SNC_io_parser<EW>::read_vertex() vh->sfaces_last().
[]
null
8.8
null
null
GHSA-45jj-f42x-jm68
HAProxy before 1.9.7 mishandles a reload with rotated keys, which triggers use of uninitialized, and very predictable, HMAC keys. This is related to an include/types/ssl_sock.h error.
[]
null
5.9
null
null
CVE-2018-7219
application/admin/controller/Admin.php in NoneCms 1.3.0 has CSRF, as demonstrated by changing an admin password or adding an account via a public/index.php/admin/admin/edit.html request.
[ "cpe:2.3:a:5none:nonecms:1.3.0:*:*:*:*:*:*:*" ]
null
null
8.8
6.8
CVE-2024-54330
WordPress Hurrakify plugin <= 2.4 - Server Side Request Forgery (SSRF) vulnerability
Server-Side Request Forgery (SSRF) vulnerability in Hep Hep Hurra (HHH) Hurrakify allows Server Side Request Forgery.This issue affects Hurrakify: from n/a through 2.4.
[]
null
7.2
null
null
CVE-2023-30570
pluto in Libreswan before 4.11 allows a denial of service (responder SPI mishandling and daemon crash) via unauthenticated IKEv1 Aggressive Mode packets. The earliest affected version is 3.28.
[ "cpe:2.3:a:libreswan:libreswan:*:*:*:*:*:*:*:*" ]
null
7.5
null
null
GHSA-fcw9-f4mv-hhcg
Vulnerability in the Oracle Financial Services Analytical Applications Infrastructure product of Oracle Financial Services Applications (component: Infrastructure). Supported versions that are affected are 8.0.6 - 8.0.9. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Financial Services Analytical Applications Infrastructure. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Financial Services Analytical Applications Infrastructure accessible data as well as unauthorized read access to a subset of Oracle Financial Services Analytical Applications Infrastructure accessible data. CVSS 3.0 Base Score 7.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N).
[]
null
null
null
null
GHSA-m528-9cvr-fx99
Double memory free while closing TEE SE API Session management in Snapdragon Mobile in version SD 425, SD 430, SD 450, SD 625, SD 650/52, SD 820.
[]
null
null
7.8
null
CVE-2019-0610
A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0590, CVE-2019-0591, CVE-2019-0593, CVE-2019-0605, CVE-2019-0607, CVE-2019-0640, CVE-2019-0642, CVE-2019-0644, CVE-2019-0651, CVE-2019-0652, CVE-2019-0655.
[ "cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:chakracore:*:*:*:*:*:*:*:*" ]
null
null
7.5
7.6
GHSA-vpwc-qjh8-q22p
A Null Pointer Dereference vulnerability exists in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.34, in scan_unit_for_symbols, as demonstrated in addr2line, that can cause a denial of service via a crafted file.
[]
null
5.5
null
null
RHSA-2016:0514
Red Hat Security Advisory: java-1.8.0-openjdk security update
OpenJDK: missing type safety checks for MethodHandle calls across class loaders, incorrect CVE-2013-5838 fix (Hotspot, 8151666)
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
CVE-2023-39745
TP-Link TL-WR940N V2, TP-Link TL-WR941ND V5 and TP-Link TL-WR841N V8 were discovered to contain a buffer overflow via the component /userRpm/AccessCtrlAccessRulesRpm. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted GET request.
[ "cpe:2.3:h:tp-link:tl-wr941nd_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:tl-wr941nd:v5:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:tl-wr841n:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:tl-wr940n_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:tl-wr940n_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:tl-wr941nd_v5_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:tl-wr941nd_v5:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:tl-wr841n_v8_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:tl-wr841n_v8:-:*:*:*:*:*:*:*" ]
null
7.5
null
null
CVE-2024-27198
In JetBrains TeamCity before 2023.11.4 authentication bypass allowing to perform admin actions was possible
[ "cpe:2.3:a:jetbrains:teamcity:*:*:*:*:*:*:*:*" ]
null
9.8
null
null
CVE-2006-5574
Unspecified vulnerability in the Brazilian Portuguese Grammar Checker in Microsoft Office 2003 and the Multilingual Interface for Office 2003, Project 2003, and Visio 2003 allows user-assisted remote attackers to execute arbitrary code via crafted text that is not properly parsed.
[ "cpe:2.3:a:microsoft:office:2003:sp2:*:pt:*:*:*:*", "cpe:2.3:a:microsoft:office_multilingual_user_interface_pack:2003:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office_proofing_tools:2003:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:project_multilingual_user_interface_pack:2003:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:visio:2003:sp2:multilingual_user_interface_pack:*:*:*:*:*" ]
null
null
null
9.3
CVE-2015-5111
Use-after-free vulnerability in Adobe Reader and Acrobat 10.x before 10.1.15 and 11.x before 11.0.12, Acrobat and Acrobat Reader DC Classic before 2015.006.30060, and Acrobat and Acrobat Reader DC Continuous before 2015.008.20082 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-4448, CVE-2015-5095, CVE-2015-5099, CVE-2015-5101, CVE-2015-5113, and CVE-2015-5114.
[ "cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
null
null
6.8
CVE-2024-47347
WordPress Chartify plugin <= 2.7.6 - Reflected Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Chart Builder Team Chartify allows Reflected XSS.This issue affects Chartify: from n/a through 2.7.6.
[]
null
7.1
null
null
CVE-2016-0693
Unspecified vulnerability in Oracle Sun Solaris 10 and 11.3 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to the PAM LDAP module.
[ "cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*", "cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*" ]
null
null
9.8
10
CVE-2024-11381
Control horas <= 1.0.1 - Authenticated (Contributor+) Stored Cross-Site Scripting
The Control horas plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'ch_registro' shortcode in all versions up to, and including, 1.0.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
6.4
null
null
ICSA-21-056-03
Rockwell Automation Logix Controllers (Update A)
Studio 5000 Logix Designer uses a key to verify Logix controllers are communicating with the affected Rockwell Automation products. The product is vulnerable because an unauthenticated attacker could bypass this verification mechanism and authenticate with Logix controllers.CVE-2021-22681 has been assigned to this vulnerability. A CVSS v3 base score of 10.0 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H).
[]
null
null
10
null
CVE-2021-22753
A CWE-125: Out-of-bounds read vulnerability exists inIGSS Definition (Def.exe) V15.0.0.21140 and prior that could result in loss of data or remote code execution due to missing length checks, when a malicious WSP file is being parsed by IGSS Definition.
[ "cpe:2.3:a:schneider-electric:interactive_graphical_scada_system:*:*:*:*:*:*:*:*" ]
null
7.8
null
6.8
GHSA-qhc4-w742-6vxx
Cross-site scripting (XSS) vulnerability in pmlite.php in XOOPS 2.3.1 and 2.3.2a allows remote attackers to inject arbitrary web script or HTML via a STYLE attribute in a URL BBcode tag in a private message.
[]
null
null
null
null
GHSA-9c96-4prf-rxpm
Audio in Apple OS X before 10.11.6 allows local users to obtain sensitive kernel memory-layout information or cause a denial of service (out-of-bounds read) via unspecified vectors.
[]
null
null
5.5
null
GHSA-xv5f-2997-qhrq
Craft CMS XSS Vulnerability
Craft CMS before 2.6.2974 allows XSS attacks.
[]
null
null
6.1
null
GHSA-jc6w-8r7f-vmp5
An issue was discovered in Mattermost Server before 4.5.0, 4.4.5, 4.3.4, and 4.2.2. It allows attackers to cause a denial of service (application crash) via an @ character before a JavaScript field name.
[]
null
null
null
null
RHSA-2020:2522
Red Hat Security Advisory: kernel security and bug fix update
kernel: double free may be caused by the function allocate_trace_buffer in the file kernel/trace/trace.c kernel: denial of service via ioctl call in network tun handling kernel: usb: missing size check in the __usb_get_extra_descriptor() leading to DoS kernel: perf_event_open() and execve() race in setuid programs allows a data leak kernel: brcmfmac frame validation bypass Kernel: net: using kernel space address bits to derive IP ID may potentially break KASLR kernel: unchecked kstrdup of fwstr in drm_load_edid_firmware leads to denial of service kernel: use-after-free in arch/x86/lib/insn-eval.c kernel: integer overflow and OOB read in drivers/block/floppy.c kernel: memory leak in register_queue_kobjects() in net/core/net-sysfs.c leads to denial of service kernel: use-after-free in __blk_add_trace in kernel/trace/blktrace.c Kernel: NetLabel: null pointer dereference while receiving CIPSO packet with null category may cause kernel panic
[ "cpe:/o:redhat:rhel_eus:7.7::computenode", "cpe:/o:redhat:rhel_eus:7.7::server" ]
null
5.9
5.5
null
GHSA-xx8f-qf9f-5fgw
Remote code execution in zendframework and laminas-http
Laminas Project laminas-http before 2.14.2, and Zend Framework 3.0.0, has a deserialization vulnerability that can lead to remote code execution if the content is controllable, related to the __destruct method of the Zend\Http\Response\Stream class in Stream.php. NOTE: Zend Framework is no longer supported by the maintainer. NOTE: the laminas-http vendor considers this a "vulnerability in the PHP language itself" but has added certain type checking as a way to prevent exploitation in (unrecommended) use cases where attacker-supplied data can be deserialized.
[]
null
9.8
null
null
GHSA-439f-fqrh-gmv2
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in National Keep Cyber Security Services CyberMath allows Stored XSS.This issue affects CyberMath: from v1.4 before v1.5.
[]
null
5.4
null
null
GHSA-5jjp-qvmw-c36p
Microsoft Internet Explorer 5.01 through 6 allows remote attackers to conduct phishing attacks by spoofing the address bar and other parts of the trust UI via unknown methods that allow "window content to persist" after the user has navigated to another site, aka the "Address Bar Spoofing Vulnerability." NOTE: this is a different vulnerability than CVE-2006-1626.
[]
null
null
null
null
RHSA-2022:0146
Red Hat Security Advisory: EAP XP 2 security update to CVE fixes in the EAP 7.3.x base
undertow: potential security issue in flow control over HTTP/2 may lead to DOS wildfly-elytron: possible timing attack in ScramServer wildfly: incorrect JBOSS_LOCAL_USER challenge location may lead to giving access to all the local users resteasy: Error message exposes endpoint class information jsoup: Crafted input may cause the jsoup HTML and XML parser to get stuck xml-security: XPath Transform abuse allows for information disclosure
[ "cpe:/a:redhat:jbosseapxp" ]
null
7.5
null
null
GHSA-7qxc-h259-mgcx
In Jiangmin Antivirus 16.0.0.100, the driver file (KrnlCall.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x99008020.
[]
null
null
7.8
null
CVE-2023-23535
The issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13.3, iOS 16.4 and iPadOS 16.4, macOS Big Sur 11.7.5, iOS 15.7.4 and iPadOS 15.7.4, macOS Monterey 12.6.6, tvOS 16.4, watchOS 9.4. Processing a maliciously crafted image may result in disclosure of process memory.
[ "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*" ]
null
5.5
null
null
CVE-2021-47479
staging: rtl8712: fix use-after-free in rtl8712_dl_fw
In the Linux kernel, the following vulnerability has been resolved: staging: rtl8712: fix use-after-free in rtl8712_dl_fw Syzbot reported use-after-free in rtl8712_dl_fw(). The problem was in race condition between r871xu_dev_remove() ->ndo_open() callback. It's easy to see from crash log, that driver accesses released firmware in ->ndo_open() callback. It may happen, since driver was releasing firmware _before_ unregistering netdev. Fix it by moving unregister_netdev() before cleaning up resources. Call Trace: ... rtl871x_open_fw drivers/staging/rtl8712/hal_init.c:83 [inline] rtl8712_dl_fw+0xd95/0xe10 drivers/staging/rtl8712/hal_init.c:170 rtl8712_hal_init drivers/staging/rtl8712/hal_init.c:330 [inline] rtl871x_hal_init+0xae/0x180 drivers/staging/rtl8712/hal_init.c:394 netdev_open+0xe6/0x6c0 drivers/staging/rtl8712/os_intfs.c:380 __dev_open+0x2bc/0x4d0 net/core/dev.c:1484 Freed by task 1306: ... release_firmware+0x1b/0x30 drivers/base/firmware_loader/main.c:1053 r871xu_dev_remove+0xcc/0x2c0 drivers/staging/rtl8712/usb_intf.c:599 usb_unbind_interface+0x1d8/0x8d0 drivers/usb/core/driver.c:458
[]
null
null
null
null
CVE-2023-28684
Jenkins remote-jobs-view-plugin Plugin 0.0.3 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
[ "cpe:2.3:a:jenkins:remote-jobs-view:*:*:*:*:*:jenkins:*:*" ]
null
6.5
null
null
GHSA-pm7j-3492-hq9m
The do_mremap function for the mremap system call in Linux 2.2 to 2.2.25, 2.4 to 2.4.24, and 2.6 to 2.6.2, does not properly check the return value from the do_munmap function when the maximum number of VMA descriptors is exceeded, which allows local users to gain root privileges, a different vulnerability than CAN-2003-0985.
[]
null
null
null
null
CVE-2021-38731
SEMCMS SHOP v 1.1 is vulnerable to SQL Injection via Ant_Zekou.php.
[ "cpe:2.3:a:sem-cms:semcms:1.1:*:*:*:*:*:*:*" ]
null
9.8
null
null
RHSA-2020:2513
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update
mojarra: Path traversal in ResourceManager.java:getLocalePrefix() via the loc parameter thrift: Endless loop when feed with specific input data thrift: Out-of-bounds read related to TJSONProtocol or TSimpleJSONProtocol jackson-mapper-asl: XML external entity similar to CVE-2016-3720 cxf: OpenId Connect token service does not properly validate the clientId wildfly: The 'enabled-protocols' value in legacy security is not respected if OpenSSL security provider is in use cxf: reflected XSS in the services listing page resteasy: Improper validation of response header in MediaTypeHeaderDelegate.java class Wildfly: EJBContext principal is not popped back after invoking another EJB using a different Security Domain SmallRye: SecuritySupport class is incorrectly public and contains a static method to access the current threads context class loader undertow: AJP File Read/Inclusion Vulnerability undertow: servletPath is normalized incorrectly leading to dangerous application mapping which could result in security bypass Mojarra: Path traversal via either the loc parameter or the con parameter, incomplete fix of CVE-2018-14371 cryptacular: excessive memory allocation during a decode operation jackson-databind: Lacks certain xbean-reflect/JNDI blocking jackson-databind: Serialization gadgets in shaded-hikari-config jackson-databind: Serialization gadgets in ibatis-sqlmap jackson-databind: Serialization gadgets in anteros-core RESTEasy: RESTEASY003870 exception in RESTEasy can lead to a reflected XSS attack undertow: Memory exhaustion issue in HttpReadListener via "Expect: 100-continue" header undertow: invalid HTTP request with large chunk size
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el8" ]
null
6.5
8.1
null
GHSA-v589-jqpw-96mw
Akuvox E11 contains a function that encrypts messages which are then forwarded. The IV vector and the key are static, and this may allow an attacker to decrypt messages.
[]
null
7.5
null
null
CVE-2011-2883
The NSEPA.NsepaCtrl.1 ActiveX control in nsepa.ocx in Citrix Access Gateway Enterprise Edition 8.1 before 8.1-67.7, 9.0 before 9.0-70.5, and 9.1 before 9.1-96.4 attempts to validate signed DLLs by checking the certificate subject, not the signature, which allows man-in-the-middle attackers to execute arbitrary code via HTTP header data referencing a DLL that was signed with a crafted certificate.
[ "cpe:2.3:a:citrix:access_gateway:8.1:*:enterprise:*:*:*:*:*", "cpe:2.3:a:citrix:access_gateway:9.0:*:enterprise:*:*:*:*:*", "cpe:2.3:a:citrix:access_gateway:9.1:*:enterprise:*:*:*:*:*" ]
null
null
null
9.3
CVE-2019-19912
In Intland codeBeamer ALM 9.5 and earlier, a cross-site scripting (XSS) vulnerability in the Upload Flash File feature allows authenticated remote attackers to inject arbitrary scripts via an active script embedded in an SWF file.
[ "cpe:2.3:a:intland:codebeamer:*:*:*:*:*:*:*:*" ]
null
4.8
null
3.5
GHSA-7wwv-vh3v-89cq
ReDOS vulnerabities: multiple grammars
Impact: Potential ReDOS vulnerabilities (exponential and polynomial RegEx backtracking)[oswasp](https://owasp.org/www-community/attacks/Regular_expression_Denial_of_Service_-_ReDoS):The Regular expression Denial of Service (ReDoS) is a Denial of Service attack, that exploits the fact that most Regular Expression implementations may reach extreme situations that cause them to work very slowly (exponentially related to input size). An attacker can then cause a program using a Regular Expression to enter these extreme situations and then hang for a very long time.If are you are using Highlight.js to highlight user-provided data you are possibly vulnerable. On the client-side (in a browser or Electron environment) risks could include lengthy freezes or crashes... On the server-side infinite freezes could occur... effectively preventing users from accessing your app or service (ie, Denial of Service).This is an issue with grammars shipped with the parser (and potentially 3rd party grammars also), not the parser itself. If you are using Highlight.js with any of the following grammars you are vulnerable. If you are using `highlightAuto` to detect the language (and have any of these grammars registered) you are vulnerable. Exponential grammars (C, Perl, JavaScript) are auto-registered when using the common grammar subset/library `require('highlight.js/lib/common')` as of 10.4.0 - see https://cdn.jsdelivr.net/gh/highlightjs/[email protected]/build/highlight.jsAll versions prior to 10.4.1 are vulnerable, including version 9.18.5.**Grammars with exponential backtracking issues:**c-like (c, cpp, arduino)handlebars (htmlbars)gamsperljboss-clirerlang-replpowershellrouteroslivescript (10.4.0 and 9.18.5 included this fix)javascript & typescript (10.4.0 included partial fixes)And of course any aliases of those languages have the same issue. ie: `hpp` is no safer than `cpp`.**Grammars with polynomial backtracking issues:**kotlingcodedaspectjmoonscriptcoffeescript/livescriptcsharpscilabcrystalelixirbasicebnfrubyfortran/irpf90livecodeserveryamlx86asmdsconfigmarkdownruleslanguagexquerysqfAnd again: any aliases of those languages have the same issue. ie: `ruby` and `rb` share the same ruby issues.PatchesVersion 10.4.1 resolves these vulnerabilities. Please upgrade.Workarounds / MitigationsDiscontinue use the affected grammars. (or perhaps use only those with poly vs exponential issues)Attempt cherry-picking the grammar fixes into older versions...Attempt using newer CDN versions of any affected languages. (ie using an older CDN version of the library with newer CDN grammars). Your mileage may vary.Referenceshttps://owasp.org/www-community/attacks/Regular_expression_Denial_of_Service_-_ReDoSFor more informationIf you have any questions or comments about this advisory:Open an issue: https://github.com/highlightjs/highlight.js/issuesEmail us at [[email protected]](mailto:[email protected])
[]
null
null
null
null
GHSA-46w7-8prr-7wv8
SQL injection vulnerability in the HotBrackets Tournament Brackets (com_hotbrackets) component for Joomla! allows remote attackers to execute arbitrary SQL commands via the id parameter to index.php.
[]
null
null
null
null
GHSA-x97f-34rv-cq75
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Marvell QConvergeConsole 5.5.0.64. Authentication is not required to exploit this vulnerability. The specific flaw exists within the getFileUploadBytes method of the FlashValidatorServiceImpl class. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise. Was ZDI-CAN-10497.
[]
null
null
null
null
GHSA-ch22-x2v3-v6vq
OTF-001: Improper Input Sanitation: The path parameter of the requested URL is not sanitized before being passed to the QT frontend
Between September 26, 2021 and October 8, 2021, [Radically Open Security](https://www.radicallyopensecurity.com/) conducted a penetration test of OnionShare 2.4, funded by the Open Technology Fund's [Red Team lab](https://www.opentech.fund/labs/red-team-lab/). This is an issue from that penetration test.Vulnerability ID: OTF-001Vulnerability type: Improper Input SanitizationThreat level: ElevatedDescription:The `path` parameter of the requested URL is not sanitized before being passed to the QT frontend.Technical description:The `path` parameter is not sanitized before being passed to the constructor of the `QLabel`.https://github.com/onionshare/onionshare/blob/d08d5f0f32f755f504494d80794886f346fbafdb/desktop/src/onionshare/tab/mode/__init__.py#L499-L509https://github.com/onionshare/onionshare/blob/d08d5f0f32f755f504494d80794886f346fbafdb/desktop/src/onionshare/tab/mode/history.py#L456-L483https://doc.qt.io/qt-5/qlabel.html#detailsWarning: When passing a QString to the constructor or calling setText(), make sure to sanitize your input, as QLabel tries to guess whether it displays the text as plain text or as rich text, a subset of HTML 4 markup. You may want to call setTextFormat() explicitly, e.g. in case you expect the text to be in plain format but cannot control the text source (for instance when displaying data loaded from the Web).This path is used in all components for displaying the server access history. This leads to a rendered HTML4 Subset (QT RichText editor) in the Onionshare frontend.In the following example an adversary injects a crafted image file into an Onionshare instance with receive mode and renders it in the history component of the Onionshare application.The only requirement is another visit to the shared site with the following parameter attached to the path of the URL:This will be rendered as a green square in the history tab where the path value is supposed to be (the value itself is shown at the bottom of the page).![otf-001](https://user-images.githubusercontent.com/156128/140665358-ab9e5990-3e13-4e50-85fd-b8a6e323d299.png)Possible scenarios where this could lead to remote code execution would be a 0-day in libpng or other internal image rendering (OTF-014 (page 12)) of the QT framework.The QT documentation indicates that external files could be rendered, but we were unable to find a QT code path allowing for it.Impact:An adversary with knowledge of the Onion service address in public mode or with authentication in private mode can render arbitrary HTML (QT-HTML4 Subset) in the server desktop application. This requires the desktop application with rendered history, therefore the impact is only elevated.Recommendation:Manually define the text format of the QLabel via `setTextFormat()`
[]
6.3
8.7
null
null
GHSA-xcr6-53hx-vmwq
HUAWEI P30 smartphones with versions earlier than 10.1.0.160(C00E160R2P11) have a denial of service vulnerability. A module does not deal with mal-crafted messages and it leads to memory leak. Attackers can exploit this vulnerability to make the device denial of service.Affected product versions include: HUAWEI P30 versions Versions earlier than 10.1.0.160(C00E160R2P11).
[]
null
null
null
null
RHSA-2023:1791
Red Hat Security Advisory: firefox security update
Mozilla: Memory Corruption in Safe Browsing Code Mozilla: libwebp: Double-free in libwebp Mozilla: Fullscreen notification obscured Mozilla: Potential Memory Corruption following Garbage Collector compaction Mozilla: Invalid free from JavaScript code Mozilla: Content-Disposition filename truncation leads to Reflected File Download Mozilla: Files with malicious extensions could have been downloaded unsafely on Linux Mozilla: Incorrect optimization result on ARM64 Mozilla: Memory safety bugs fixed in Firefox 112 and Firefox ESR 102.10
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
8.8
null
null
CVE-2006-1705
Oracle Database 9.2.0.0 to 10.2.0.3 allows local users with "SELECT" privileges for a base table to insert, update, or delete data by creating a crafted view then performing the operations on that view.
[ "cpe:2.3:a:oracle:oracle10g:enterprise_10.1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:oracle10g:enterprise_10.1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:oracle10g:enterprise_10.1.0.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:oracle10g:enterprise_10.1.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:oracle10g:enterprise_10.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:oracle10g:personal_10.1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:oracle10g:personal_10.1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:oracle10g:personal_10.1.0.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:oracle10g:personal_10.1.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:oracle10g:personal_10.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:oracle10g:standard_10.1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:oracle10g:standard_10.1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:oracle10g:standard_10.1.0.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:oracle10g:standard_10.1.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:oracle10g:standard_10.1.0.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:oracle10g:standard_10.1.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:oracle10g:standard_10.2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:oracle10g:standard_10.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:oracle9i:enterprise_9.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:oracle9i:enterprise_9.2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:oracle9i:enterprise_9.2.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:oracle9i:enterprise_9.2.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:oracle9i:enterprise_9.2.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:oracle9i:enterprise_9.2.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:oracle9i:personal_9.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:oracle9i:personal_9.2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:oracle9i:personal_9.2.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:oracle9i:personal_9.2.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:oracle9i:personal_9.2.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:oracle9i:personal_9.2.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:oracle9i:standard_9.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:oracle9i:standard_9.2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:oracle9i:standard_9.2.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:oracle9i:standard_9.2.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:oracle9i:standard_9.2.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:oracle9i:standard_9.2.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:oracle9i:standard_9.2.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:oracle9i:standard_9.2.3:*:*:*:*:*:*:*" ]
null
null
null
2.1
RHSA-2020:4766
Red Hat Security Advisory: libexif security, bug fix, and enhancement update
libexif: out of bounds write in exif-data.c libexif: out of bounds read due to a missing bounds check in exif_data_save_data_entry function in exif-data.c libexif: integer overflow in exif_data_load_data_thumbnail function in exif-data.c libexif: out of bounds read due to a missing bounds check in exif_entry_get_value function in exif-entry.c libexif: integer overflow in exif_data_load_data_content function in exif-data.c libexif: divide-by-zero in exif_entry_get_value function in exif-entry.c libexif: use of uninitialized memory in EXIF Makernote handling can lead to crashes and use-after-free libexif: unrestricted size in handling Canon EXIF MakerNote data can lead to consumption of large amounts of compute time
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
7.5
null
null
GHSA-q5x7-3hhh-4gg3
Vulnerability in the Sun ZFS Storage Appliance Kit (AK) component of Oracle Sun Systems Products Suite (subcomponent: IPC Frameworks). The supported version that is affected is AK 2013. Easily "exploitable" vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Sun ZFS Storage Appliance Kit (AK). Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Sun ZFS Storage Appliance Kit (AK). CVSS 3.0 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
[]
null
null
7.5
null
GHSA-m2qq-52hm-x335
Adobe Acrobat and Reader versions 2019.010.20064 and earlier, 2019.010.20064 and earlier, 2017.011.30110 and earlier version, and 2015.006.30461 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution.
[]
null
null
8.8
null
RHSA-2020:2849
Red Hat Security Advisory: nodejs:10 security update
nodejs-minimist: prototype pollution allows adding or modifying properties of Object.prototype using a constructor or __proto__ payload nodejs: memory corruption in napi_get_value_string_* functions nghttp2: overly large SETTINGS frames can lead to DoS
[ "cpe:/a:redhat:rhel_eus:8.1::appstream" ]
null
7.5
null
null
CVE-2006-3241
Cross-site scripting (XSS) vulnerability in messages.php in XennoBB 1.0.5 and earlier allows remote attackers to inject arbitrary web script or HTML via the tid parameter.
[ "cpe:2.3:a:xennobb:xennobb:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:xennobb:xennobb:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:xennobb:xennobb:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:xennobb:xennobb:1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:xennobb:xennobb:1.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:xennobb:xennobb:1.0.5:*:*:*:*:*:*:*" ]
null
null
null
2.6
GHSA-4jf5-prwh-5c2c
The IMAP Client for Outlook Express 6.00.2800.1106 allows remote malicious IMAP servers to cause a denial of service (crash) via certain large literal size values that cause either integer signedness errors or integer overflow errors.
[]
null
null
null
null
GHSA-fqw7-8v6m-2f86
Malicious Package in hulp
All versions of `hulp` contain malicious code as a preinstall script. When installed, the package calls home to a Command and Control server to execute arbitrary commands.RecommendationAny computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
[]
null
9.8
null
null
GHSA-j72j-hjpx-v29v
ProjectSend before r1070 writes user passwords to the server logs.
[]
null
null
7.5
null
RHSA-2007:0845
Red Hat Security Advisory: libvorbis security update
libvorbis array boundary condition Multiple libvorbis flaws (CVE-2007-4066, CVE-2007-4029) Multiple libvorbis flaws (CVE-2007-4066, CVE-2007-4029) Multiple libvorbis flaws (CVE-2007-4066, CVE-2007-4029)
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
GHSA-gg58-4q4g-xvcw
Use after free in Visuals in Google Chrome prior to 124.0.6367.201 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)
[]
null
9.6
null
null
CVE-2016-3698
libndp before 1.6, as used in NetworkManager, does not properly validate the origin of Neighbor Discovery Protocol (NDP) messages, which allows remote attackers to conduct man-in-the-middle attacks or cause a denial of service (network connectivity disruption) by advertising a node as a router from a non-local network.
[ "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:libndp:libndp:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*" ]
null
null
8.1
6.8
CVE-2014-3696
nmevent.c in the Novell GroupWise protocol plugin in libpurple in Pidgin before 2.10.10 allows remote servers to cause a denial of service (application crash) via a crafted server message that triggers a large memory allocation.
[ "cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.10.0:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.10.1:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.10.2:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.10.3:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.10.4:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.10.5:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.10.6:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.10.7:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.10.8:*:*:*:*:*:*:*" ]
null
null
null
5
GHSA-62hp-f6g9-xj9v
Buffer overflow in the data reference atom handling in Apple QuickTime before 7.4.5 allows remote attackers to execute arbitrary code via a crafted movie.
[]
null
null
null
null
RHSA-2024:6785
Red Hat Security Advisory: ruby:3.3 security update
rexml: DoS vulnerability in REXML rexml: rubygem-rexml: DoS when parsing an XML having many specific characters such as whitespace character, >] and ]> rexml: DoS vulnerability in REXML rexml: DoS vulnerability in REXML
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
5.9
null
null
CVE-2023-5807
SQLi in TRtek Software's Education Portal
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in TRtek Software Education Portal allows SQL Injection.This issue affects Education Portal: before 3.2023.29.
[ "cpe:2.3:a:trek_software:education_portal:*:*:*:*:*:*:*:*", "cpe:2.3:a:trteksolutions:education_portal:*:*:*:*:*:*:*:*" ]
null
9.8
null
null
CVE-2016-0315
The Report Builder and Data Collection Component (DCC) in IBM Jazz Reporting Service (JRS) 5.x before 5.0.2 ifix016 and 6.x before 6.0.1 ifix005 maintain session ID validity after a logout action, which allows remote authenticated users to hijack sessions by leveraging an unattended workstation.
[ "cpe:2.3:a:ibm:jazz_reporting_service:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:jazz_reporting_service:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:jazz_reporting_service:5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:jazz_reporting_service:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:jazz_reporting_service:6.0.1:*:*:*:*:*:*:*" ]
null
null
8.8
6.5
GHSA-c34f-6cmx-fcvv
A flaw was found in xorg-x11-server before 1.20.3. An incorrect permission check for -modulepath and -logfile options when starting Xorg. X server allows unprivileged users with the ability to log in to the system via physical console to escalate their privileges and run arbitrary code under root privileges.
[]
null
null
6.6
null
GHSA-6968-rgpc-wprc
Vulnerability in the Oracle Enterprise Repository component of Oracle Fusion Middleware (subcomponent: Web Interface). Supported versions that are affected are 11.1.1.7.0 and 12.1.3.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Enterprise Repository. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Enterprise Repository, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Enterprise Repository accessible data as well as unauthorized update, insert or delete access to some of Oracle Enterprise Repository accessible data. CVSS 3.0 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N).
[]
null
null
8.2
null
GHSA-2cww-fgmg-4jqc
Keycloak's admin API allows low privilege users to use administrative functions
Users with low privileges (just plain users in the realm) are able to utilize administrative functionalities within Keycloak admin interface. This issue presents a significant security risk as it allows unauthorized users to perform actions reserved for administrators, potentially leading to data breaches or system compromise.**Acknowledgements:** Special thanks to Maurizio Agazzini for reporting this issue and helping us improve our project.
[]
null
8.1
null
null
GHSA-q6wf-wh6m-ch8f
PostgreSQL 7.4 before 7.4.29, 8.0 before 8.0.25, 8.1 before 8.1.21, 8.2 before 8.2.17, 8.3 before 8.3.11, and 8.4 before 8.4.4 does not properly check privileges during certain RESET ALL operations, which allows remote authenticated users to remove arbitrary parameter settings via a (1) ALTER USER or (2) ALTER DATABASE statement.
[]
null
null
null
null
GHSA-8fg7-332r-767g
SQL injection vulnerability in the download module in Free Simple Software 1.0 allows remote attackers to execute arbitrary SQL commands via the downloads_id parameter in a download_now action to index.php.
[]
null
null
null
null
GHSA-5m6g-j9qj-3jwh
The Runtastic Road Bike (aka com.runtastic.android.roadbike.lite) application 2.0.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[]
null
null
null
null
CVE-2019-3496
An issue was discovered on Wifi-soft UniBox controller 3.x devices. The tools/controller/diagnostic_tools_controller Diagnostic Tools Controller is vulnerable to Remote Command Execution, allowing an attacker to execute arbitrary system commands on the server with root user privileges. Authentication for accessing this component can be bypassed by using Hard coded credentials.
[ "cpe:2.3:o:indionetworks:unibox_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:indionetworks:unibox:-:*:*:*:*:*:*:*" ]
null
8.8
null
9
CVE-2017-5943
Request Tracker (RT) 4.x before 4.0.25, 4.2.x before 4.2.14, and 4.4.x before 4.4.2 allows remote attackers to obtain sensitive information about cross-site request forgery (CSRF) verification tokens via a crafted URL.
[ "cpe:2.3:a:bestpractical:request_tracker:4.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:request_tracker:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:request_tracker:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:request_tracker:4.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:request_tracker:4.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:request_tracker:4.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:request_tracker:4.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:request_tracker:4.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:request_tracker:4.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:request_tracker:4.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:request_tracker:4.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:request_tracker:4.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:request_tracker:4.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:request_tracker:4.0.13:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:request_tracker:4.0.14:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:request_tracker:4.0.15:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:request_tracker:4.0.16:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:request_tracker:4.0.17:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:request_tracker:4.0.18:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:request_tracker:4.0.19:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:request_tracker:4.0.20:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:request_tracker:4.0.21:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:request_tracker:4.0.22:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:request_tracker:4.0.23:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:request_tracker:4.0.24:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:request_tracker:4.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:request_tracker:4.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:request_tracker:4.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:request_tracker:4.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:request_tracker:4.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:request_tracker:4.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:request_tracker:4.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:request_tracker:4.2.7:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:request_tracker:4.2.8:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:request_tracker:4.2.9:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:request_tracker:4.2.10:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:request_tracker:4.2.11:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:request_tracker:4.2.12:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:request_tracker:4.2.13:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:request_tracker:4.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:request_tracker:4.4.1:*:*:*:*:*:*:*" ]
null
null
8.8
6.8
GHSA-6hmg-mqf6-m38g
RPi-Jukebox-RFID v2.7.0 was discovered to contain a remote code execution (RCE) vulnerability via htdocs\manageFilesFolders.php
[]
null
9.8
null
null
CVE-2022-38208
Unvalidated redirect in Portal for ArcGIS
There is an unvalidated redirect vulnerability in Esri Portal for ArcGIS 11 and below that may allow a remote, unauthenticated attacker to craft a URL that could redirect a victim to an arbitrary website, simplifying phishing attacks.
[ "cpe:2.3:a:esri:portal_for_arcgis:*:*:*:*:*:*:*:*" ]
null
6.1
null
null
GHSA-7f6c-vw35-vwgh
Missing Authorization vulnerability in Metagauss EventPrime.This issue affects EventPrime: from n/a through 3.3.4.
[]
null
8.2
null
null
GHSA-52rx-xv44-hxmv
Buffer overflow in Vixie Cron library up to version 3.0 allows local users to obtain root access via a long environmental variable.
[]
null
null
null
null
CVE-2017-0825
An information disclosure vulnerability in the Broadcom wifi driver. Product: Android. Versions: Android kernel. Android ID: A-37305633. References: B-V2017063002.
[ "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*" ]
null
null
7.5
5
GHSA-jvv3-c5fw-96v6
Off-by-one error in the SSL_get_shared_ciphers function in OpenSSL 0.9.7 up to 0.9.7l, and 0.9.8 up to 0.9.8f, might allow remote attackers to execute arbitrary code via a crafted packet that triggers a one-byte buffer underflow. NOTE: this issue was introduced as a result of a fix for CVE-2006-3738. As of 20071012, it is unknown whether code execution is possible.
[]
null
null
null
null
GHSA-4w9j-m79h-8w8m
An Improper Validation of Array Index vulnerability in the SIP ALG of Juniper Networks Junos OS on SRX 5000 Series allows a network-based, unauthenticated attacker to cause a Denial of Service (DoS). When an attacker sends an SIP packets with a malformed SDP field then the SIP ALG can not process it which will lead to an FPC crash and restart. Continued receipt of these specific packets will lead to a sustained Denial of Service. This issue can only occur when both below mentioned conditions are fulfilled: 1. Call distribution needs to be enabled: [security alg sip enable-call-distribution] 2. The SIP ALG needs to be enabled, either implicitly / by default or by way of configuration. To confirm whether SIP ALG is enabled on SRX, and MX with SPC3 use the following command: user@host> show security alg status | match sip SIP : Enabled This issue affects Juniper Networks Junos OS on SRX 5000 Series: 20.4 versions prior to 20.4R3-S5; 21.1 versions prior to 21.1R3-S4; 21.2 versions prior to 21.2R3-S3; 21.3 versions prior to 21.3R3-S3; 21.4 versions prior to 21.4R3-S2; 22.1 versions prior to 22.1R2-S2, 22.1R3; 22.2 versions prior to 22.2R3; 22.3 versions prior to 22.3R1-S1, 22.3R2. This issue does not affect Juniper Networks Junos OS versions prior to 20.4R1.
[]
null
7.5
null
null
GHSA-pvm3-6x23-6xwp
A reflected cross-site scripting (XSS) vulnerability exists in the iHistorian Data Display of WorkstationST (<v07.09.15) could allow an attacker to compromise a victim's browser. WorkstationST is only deployed in specific, controlled environments rendering attack complexity significantly higher than if the attack were conducted on the software in isolation. WorkstationST v07.09.15 can be found in ControlST v07.09.07 SP8 and greater.
[]
null
6.1
null
null
GHSA-g4j9-xc4c-6pmc
Buffer overflow vulnerability in framework/init.php in qinggan phpok 5.1, allows attackers to execute arbitrary code.
[]
null
null
null
null
GHSA-95ch-55fh-vxfc
Foxit PDF Reader Annotation Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the handling of Annotation objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14729.
[]
null
null
7.8
null
CVE-2003-0044
Multiple cross-site scripting (XSS) vulnerabilities in the (1) examples and (2) ROOT web applications for Jakarta Tomcat 3.x through 3.3.1a allow remote attackers to insert arbitrary web script or HTML.
[ "cpe:2.3:a:apache:tomcat:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:3.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:3.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:3.2:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:3.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:3.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:3.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:3.3:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:3.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:3.3.1a:*:*:*:*:*:*:*" ]
null
null
null
6.8
GHSA-g7xf-8xh4-55vr
In llcp_util_parse_link_params of llcp_util.cc, there is a possible out-of-bound read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-7.0 Android-7.1.1 Android-7.1.2 Android-8.0 Android-8.1 Android-9Android ID: A-114238578
[]
null
null
6.5
null
GHSA-5vgp-5qfx-p7gg
The Simple Pricing Tables For WPBakery Page Builder(Formerly Visual Composer) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'wdo_simple_pricing_table_free' shortcode in all versions up to, and including, 1.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
6.4
null
null