id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
PYSEC-2022-43169 | null | The Togglee package in PyPI version v0.0.8 was discovered to contain a code execution backdoor. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges. | [] | null | 9.8 | null | null |
GHSA-5v4j-2xcw-cv26 | ** DISPUTED ** Buffer overflow in the Windows NT Message Compiler (MC) 1.00.5239 on Microsoft Windows XP allows local users to gain privileges via a long MC-filename. NOTE: this issue has been disputed by a reliable third party who states that the compiler is not a privileged program, so privilege boundaries cannot be crossed. | [] | null | null | null | null |
|
GHSA-w27q-896q-p423 | Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability | [] | null | 7.8 | null | null |
|
CVE-2009-1662 | Multiple SQL injection vulnerabilities in admin/login.php in Wright Way Services Recipe Script 5 allow remote attackers to execute arbitrary SQL commands via the (1) username and (2) Password fields, as reachable from admin/index.php. | [
"cpe:2.3:a:recipescript:recipe_script:5:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2021-29976 | Mozilla developers reported memory safety bugs present in code shared between Firefox and Thunderbird. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird < 78.12, Firefox ESR < 78.12, and Firefox < 90. | [
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.8 |
|
CVE-2023-2174 | The BadgeOS plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the delete_badgeos_log_entries function in versions up to, and including, 3.7.1.6. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to delete the plugin's log entries. | [
"cpe:2.3:a:badgeos:badgeos:*:*:*:*:*:wordpress:*:*"
] | null | 4.3 | null | null |
|
CVE-2023-49822 | WordPress Ultimate Dashboard plugin <= 3.7.10 - Secret Login Page Location Disclosure on Multisites vulnerability | Exposure of Sensitive Information to an Unauthorized Actor vulnerability in David Vongries Ultimate Dashboard allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Ultimate Dashboard: from n/a through 3.7.10. | [] | null | 3.7 | null | null |
CVE-2015-2721 | Mozilla Network Security Services (NSS) before 3.19, as used in Mozilla Firefox before 39.0, Firefox ESR 31.x before 31.8 and 38.x before 38.1, Thunderbird before 38.1, and other products, does not properly determine state transitions for the TLS state machine, which allows man-in-the-middle attackers to defeat cryptographic protection mechanisms by blocking messages, as demonstrated by removing a forward-secrecy property by blocking a ServerKeyExchange message, aka a "SMACK SKIP-TLS" issue. | [
"cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:novell:suse_linux_enterprise_server:11:sp4:*:*:*:*:*:*",
"cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:network_security_services:3.19:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:31.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:31.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:31.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:31.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:31.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:31.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:31.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:31.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:31.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:31.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:31.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:31.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:vm_server:3.2:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2024-22034 | Crafted projects can overwrite special files in the .osc config directory | Attackers could put the special files in .osc into the actual package sources (e.g. _apiurl). This allows the attacker to change the configuration of osc for the victim | [] | null | 5.5 | null | null |
GHSA-qwgc-rr35-h4x9 | External Secrets Operator vulnerable to privilege escalation | DetailsThe external-secrets has a deployment called default-external-secrets-cert-controller, which is bound with a same-name ClusterRole. This ClusterRole has "get/list" verbs of secrets resources(https://github.com/external-secrets/external-secrets/blob/main/deploy/charts/external-secrets/templates/cert-controller-rbac.yaml#L49). It also has path/update verb of validatingwebhookconfigurations resources(https://github.com/external-secrets/external-secrets/blob/main/deploy/charts/external-secrets/templates/cert-controller-rbac.yaml#L27). As a result, if a malicious user can access the worker node which has this deployment. he/she can:For the "get/list secrets" permission, he/she can abuse the SA token of this deployment to retrieve or get ALL secrets in the whole cluster, including the cluster-admin secret if created. After that, he/she can abuse the cluster-admin secret to do whatever he/she likes to the whole cluster, resulting in a cluster-level privilege escalation.For the patch/update verb of validatingwebhookconfigurations, the malicious user can abuse these permissions to get sensitive data or lanuch DoS attacks:For the privilege escalation attack, by updating/patching a Webhook to make it listen to Secret update operations, the attacker can capture and log all data from requests attempting to update Secrets. More specifically, when a Secret is updated, this Webhook sends the request data to the logging-service, which can then log the content of the Secret. This way, an attacker could indirectly gain access to the full contents of the Secret.For the DoS attack, by updating/patching a Webhook, and making it deny all Pod create and update requests, the attacker can prevent any new Pods from being created or existing Pods from being updated, resulting in a Denial of Service (DoS) attack.PoCPlease see the "Details" sectionImpactPrivilege escalation | [] | 8.3 | 8.3 | null | null |
CVE-2016-9677 | Citrix Provisioning Services before 7.12 allows attackers to obtain sensitive kernel address information via unspecified vectors. | [
"cpe:2.3:a:citrix:provisioning_services:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:citrix:provisioning_services:7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:citrix:provisioning_services:7.6:*:*:*:*:*:*:*",
"cpe:2.3:a:citrix:provisioning_services:7.7:*:*:*:*:*:*:*",
"cpe:2.3:a:citrix:provisioning_services:7.8:*:*:*:*:*:*:*",
"cpe:2.3:a:citrix:provisioning_services:7.9:*:*:*:*:*:*:*",
"cpe:2.3:a:citrix:provisioning_services:7.11:*:*:*:*:*:*:*"
] | null | null | 5.3 | 5 |
|
GHSA-8hc3-f29r-w7pm | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | [] | null | null | null | null |
|
CVE-2020-14328 | A flaw was found in Ansible Tower in versions before 3.7.2. A Server Side Request Forgery flaw can be abused by supplying a URL which could lead to the server processing it connecting to internal services or exposing additional internal services and more particularly retrieving full details in case of error. The highest threat from this vulnerability is to data confidentiality. | [
"cpe:2.3:a:redhat:ansible_tower:*:*:*:*:*:*:*:*"
] | null | 3.3 | null | 2.1 |
|
CVE-2021-29204 | A remote xss vulnerability was discovered in HPE Integrated Lights-Out 4 (iLO 4); HPE SimpliVity 380 Gen9; HPE Integrated Lights-Out 5 (iLO 5) for HPE Gen10 Servers; HPE SimpliVity 380 Gen10; HPE SimpliVity 2600; HPE SimpliVity 380 Gen10 G; HPE SimpliVity 325; HPE SimpliVity 380 Gen10 H version(s): Prior to version 2.78. | [
"cpe:2.3:o:hp:integrated_lights-out_4:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:simplivity_380_gen9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:integrated_lights-out_5:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proliant_bl460c_gen10_server_blade:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proliant_dl120_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proliant_dl160_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proliant_dl180_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proliant_dl20_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proliant_dl325_gen10_plus_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proliant_dl325_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proliant_dl360_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proliant_dl380_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proliant_dl385_gen10_plus_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proliant_dl385_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proliant_dl560_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proliant_dl580_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proliant_ml110_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proliant_ml30_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proliant_ml350_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proliant_xl170r_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proliant_xl190r_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proliant_xl230k_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proliant_xl270d_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proliant_xl450_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:simplivity_2600:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:simplivity_325:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:simplivity_380_gen10:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:simplivity_380_gen10_g:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:simplivity_380_gen10_h:-:*:*:*:*:*:*:*"
] | null | 4.8 | null | 3.5 |
|
GHSA-9523-474x-5h36 | Cross site scripting in Jenkins Mission Control Plugin | Jenkins Mission Control Plugin 0.9.16 and earlier does not escape job display names and build names shown on its view, resulting in a stored XSS vulnerability exploitable by attackers able to change these properties. | [] | null | 5.4 | null | null |
GHSA-38xc-6gxr-fgf5 | Unspecified vulnerability in the Server component in Oracle MySQL 5.1.66 and earlier, and 5.5.28 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Information Schema. | [] | null | null | null | null |
|
CVE-2022-31627 | Heap buffer overflow in finfo_buffer | In PHP versions 8.1.x below 8.1.8, when fileinfo functions, such as finfo_buffer, due to incorrect patch applied to the third party code from libmagic, incorrect function may be used to free allocated memory, which may lead to heap corruption. | [
"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*"
] | null | 7.7 | null | null |
GHSA-j579-gjpv-mwhp | Microarchitectural Fill Buffer Data Sampling (MFBDS): Fill buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf | [] | null | null | 5.6 | null |
|
GHSA-26jh-5x6v-w7cm | A vulnerability in the web-based interface of Cisco Unified Communications Manager and Cisco Unified Communications Manager Session Management Edition (SME) could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based interface. The vulnerability is due to insufficient validation of user-supplied input by the web-based interface of the affected software. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive browser-based information. | [] | null | 6.1 | null | null |
|
CVE-2023-3114 | Terraform Enterprise Agent Pool Controls Allowed Unauthorized Workspaces To Target an Agent Pool | Terraform Enterprise since v202207-1 did not properly implement authorization rules for agent pools, allowing the workspace to be targeted by unauthorized agents. This authorization flaw could potentially allow a workspace to access resources from a separate, higher-privileged workspace in the same organization that targeted an agent pool. This vulnerability, CVE-2023-3114, is fixed in Terraform Enterprise v202306-1. | [
"cpe:2.3:a:hashicorp:terraform_enterprise:*:*:*:*:*:*:*:*"
] | null | 5 | null | null |
CVE-2002-1024 | Cisco IOS 12.0 through 12.2, when supporting SSH, allows remote attackers to cause a denial of service (CPU consumption) via a large packet that was designed to exploit the SSH CRC32 attack detection overflow (CVE-2001-0144). | [
"cpe:2.3:o:cisco:ios:12.0s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.0sp:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.0st:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.0xb:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.0xm:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.0xv:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1\\(1\\)ex:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1\\(5c\\)ex:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1\\(8a\\)ex:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1\\(9\\)ex:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1ec:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1t:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1xb:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1xc:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1xf:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1xg:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1xh:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1xi:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1xj:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1xl:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1xm:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1xp:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1xq:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1xt:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1xu:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1yb:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1yc:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1yd:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1ye:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1yf:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1yi:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2b:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2bc:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2da:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2dd:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2t:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2xa:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2xb:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2xd:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2xe:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2xf:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2xg:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2xh:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2xi:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2xj:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2xk:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2xl:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2xm:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2xn:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2xq:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2xr:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2xs:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2xt:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2xw:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2ya:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2yb:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2yc:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2yd:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2yf:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2yg:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2yh:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:pix_firewall_software:5.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:pix_firewall_software:5.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:pix_firewall_software:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:pix_firewall_software:6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:pix_firewall_software:6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:css11000_content_services_switch:*:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:catos:5.3\\(1\\)csx:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:catos:5.3\\(1a\\)csx:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:catos:5.3\\(2\\)csx:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:catos:5.3\\(3\\)csx:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:catos:5.3\\(4\\)csx:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:catos:5.3\\(5\\)csx:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:catos:5.3\\(5a\\)csx:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:catos:5.3\\(6\\)csx:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:catos:5.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:catos:5.4\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:catos:5.4\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:catos:5.4\\(3\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:catos:5.4\\(4\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:catos:5.5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:catos:5.5\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:catos:5.5\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:catos:5.5\\(3\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:catos:5.5\\(4\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:catos:5.5\\(4a\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:catos:5.5\\(4b\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:catos:5.5\\(13\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:catos:6.1\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:catos:6.1\\(1a\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:catos:6.1\\(1b\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:catos:6.1\\(1c\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:catos:6.1\\(2.13\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:catos:6.2\\(0.110\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:catos:6.2\\(0.111\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:catos:6.3\\(0.7\\)pan:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:catos:6.3\\(4\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:catos:7.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:catos:7.1\\(2\\):*:*:*:*:*:*:*"
] | null | null | null | 7.1 |
|
GHSA-qfp9-57pm-rg3f | fexsrv in F*EX (aka Frams' Fast File EXchange) before fex-20160919_2 allows eval injection (for unauthenticated remote code execution). | [] | null | 9.8 | null | null |
|
CVE-2024-37831 | Itsourcecode Payroll Management System 1.0 is vulnerable to SQL Injection in payroll_items.php via the ID parameter. | [
"cpe:2.3:a:itsourcecode:payroll_management_system:1.0:*:*:*:*:*:*:*"
] | null | 9.1 | null | null |
|
GHSA-c399-mchw-www5 | Unspecified vulnerability on HP ProLiant DL and ML 100 Series G5, G5p, and G6 servers with ProLiant Onboard Administrator Powered by LO100i (formerly Lights Out 100) 3.07 and earlier allows remote attackers to cause a denial of service via unknown vectors. | [] | null | null | null | null |
|
GHSA-9qgh-3x6p-9934 | A buffer overflow issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13.3. An app may be able to cause unexpected system termination or write kernel memory. | [] | null | 7.8 | null | null |
|
CVE-2019-12752 | The Symantec SONAR component, prior to 12.0.2, may be susceptible to a tamper protection bypass vulnerability which could potentially allow an attacker to circumvent the existing tamper protection in use on the resident system. | [
"cpe:2.3:a:symantec:sonar:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.1 |
|
CVE-2018-4194 | In iOS before 11.4, iCloud for Windows before 7.5, watchOS before 4.3.1, iTunes before 12.7.5 for Windows, and macOS High Sierra before 10.13.5, an out-of-bounds read was addressed with improved input validation. | [
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.8 |
|
CVE-2012-2036 | Integer overflow in Adobe Flash Player before 10.3.183.20 and 11.x before 11.3.300.257 on Windows and Mac OS X; before 10.3.183.20 and 11.x before 11.2.202.236 on Linux; before 11.1.111.10 on Android 2.x and 3.x; and before 11.1.115.9 on Android 4.x, and Adobe AIR before 3.3.0.3610, allows attackers to execute arbitrary code via unspecified vectors. | [
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:6.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:6.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
CVE-2021-23046 | On all versions of Guided Configuration before 8.0.0, when a configuration that contains secure properties is created and deployed from Access Guided Configuration (AGC), secure properties are logged in restnoded logs. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. | [
"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_guided_configuration:*:*:*:*:*:*:*:*"
] | null | 4.9 | null | 3.5 |
|
GHSA-5cj8-fmg6-wrfp | bfd/vms-alpha.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file in the _bfd_vms_get_value and _bfd_vms_slurp_etir functions during "objdump -D" execution. | [] | null | null | 7.8 | null |
|
GHSA-3cm9-2f69-3m66 | Vulnerability in the Oracle Solaris product of Oracle Systems (component: Common Desktop Environment). Supported versions that are affected are 10 and 11. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Solaris executes to compromise Oracle Solaris. While the vulnerability is in Oracle Solaris, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle Solaris. CVSS 3.0 Base Score 7.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H). | [] | null | null | null | null |
|
GHSA-29mc-g84r-w9hv | Cross-site scripting vulnerability in web administration interface for NetGear RT314 and RT311 Gateway Routers allows remote attackers to execute arbitrary script on another client via a URL that contains the script. | [] | null | null | null | null |
|
GHSA-cxv9-jpfc-6237 | RuvarOA v6.01 and v12.01 were discovered to contain a SQL injection vulnerability via the PageID parameter at /WebUtility/SearchCondiction.aspx. | [] | null | 9.8 | null | null |
|
GHSA-c4h6-qhg3-q3wv | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in JC Development Team WooCommerce JazzCash Gateway Plugin plugin <= 2.0 versions. | [] | null | 7.1 | null | null |
|
CVE-2014-2191 | Cross-site scripting (XSS) vulnerability in the web framework in Cisco Broadcast Access Center for Telco and Wireless (aka BAC-TW) allows remote attackers to inject arbitrary web script or HTML via an unspecified parameter, aka Bug ID CSCun91113. | [
"cpe:2.3:a:cisco:broadband_access_center_telco_wireless_software:-:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-479f-xfrj-xvx9 | Unspecified vulnerability in the PEF input file loader in Hex-Rays IDA Pro 5.7 and 6.0 has unknown impact and attack vectors. | [] | null | null | null | null |
|
CVE-2022-3585 | SourceCodester Simple Cold Storage Management System Contact Us cross-site request forgery | A vulnerability classified as problematic has been found in SourceCodester Simple Cold Storage Management System 1.0. Affected is an unknown function of the file /csms/?page=contact_us of the component Contact Us. The manipulation leads to cross-site request forgery. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-211194 is the identifier assigned to this vulnerability. | [
"cpe:2.3:a:oretnom23:simple_cold_storage_management_system:1.0:*:*:*:*:*:*:*"
] | null | 4.3 | null | null |
cisco-sa-ise-xss-ubfHG75C | Cisco Identity Services Engine Stored Cross-Site Scripting Vulnerability | A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device.
This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected device. An attacker could exploit this vulnerability by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script in the context of the affected interface or access sensitive, browser-based information.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
| [] | null | 6.1 | null | null |
GHSA-qm78-gh66-mx93 | ExaGrid appliances with firmware before 4.8 P26 have a default password of (1) inflection for the root shell account and (2) support for the support account in the web interface, which allows remote attackers to obtain administrative access via an SSH or HTTP session. | [] | null | null | 9.8 | null |
|
CVE-2010-1599 | SQL injection vulnerability in loadorder.php in NKInFoWeb 2.5 and 5.2.2.0 allows remote attackers to execute arbitrary SQL commands via the id_sp parameter. | [
"cpe:2.3:a:nkinfoweb:nkinfoweb:2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:nkinfoweb:nkinfoweb:5.2.2.0:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2008-1992 | Acidcat CMS 3.4.1 does not properly restrict access to (1) default_mail_aspemail.asp, (2) default_mail_cdosys.asp or (3) default_mail_jmail.asp, which allows remote attackers to bypass restrictions and relay email messages with modified From, FromName, and To fields. | [
"cpe:2.3:a:acidcat:acidcat_cms:3.4.1:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-2w6r-5vhj-25r3 | Buffer overflow in the Window.External function in the JScript Scripting Engine in Internet Explorer 4.01 SP1 and earlier allows remote attackers to execute arbitrary commands via a malicious web page. | [] | null | null | null | null |
|
RHSA-2023:0602 | Red Hat Security Advisory: thunderbird security update | Mozilla: Revocation status of S/Mime signature certificates was not checked | [
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
] | null | 7.5 | null | null |
GHSA-g9rm-5r89-23xg | Verbatim Corporate Secure and Corporate Secure FIPS Edition USB flash drives do not prevent password replay attacks, which allows physically proximate attackers to access the cleartext drive contents by providing a key that was captured in a USB data stream at an earlier time. | [] | null | null | null | null |
|
CVE-2023-3543 | GZ Scripts Availability Booking Calendar PHP HTTP POST Request load.php cross site scripting | A vulnerability was found in GZ Scripts Availability Booking Calendar PHP 1.8. It has been classified as problematic. This affects an unknown part of the file load.php of the component HTTP POST Request Handler. The manipulation of the argument cid/first_name/second_name/address_1/country leads to cross site scripting. It is possible to initiate the attack remotely. The associated identifier of this vulnerability is VDB-233295. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | [
"cpe:2.3:a:gzscripts:availability_booking_calendar_php:1.8:*:*:*:*:*:*:*"
] | null | 3.5 | 3.5 | 4 |
CVE-2023-43770 | Roundcube before 1.4.14, 1.5.x before 1.5.4, and 1.6.x before 1.6.3 allows XSS via text/plain e-mail messages with crafted links because of program/lib/Roundcube/rcube_string_replacer.php behavior. | [
"cpe:2.3:a:roundcube:webmail:*:*:*:*:*:*:*:*",
"cpe:2.3:a:roundcube:webmail:1.5.0:-:*:*:*:*:*:*",
"cpe:2.3:a:roundcube:webmail:1.6.0:-:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
] | null | 6.1 | null | null |
|
GHSA-jfgw-vvcr-pv6q | Multiple Cisco products are affected by a vulnerability in local file management for certain system log files of Cisco collaboration products that could allow an unauthenticated, remote attacker to cause high disk utilization, resulting in a denial of service (DoS) condition. The vulnerability occurs because a certain system log file does not have a maximum size restriction. Therefore, the file is allowed to consume the majority of available disk space on the appliance. An attacker could exploit this vulnerability by sending crafted remote connection requests to the appliance. Successful exploitation could allow the attacker to increase the size of a system log file so that it consumes most of the disk space. The lack of available disk space could lead to a DoS condition in which the application functions could operate abnormally, making the appliance unstable. This vulnerability affects the following Cisco Voice Operating System (VOS)-based products: Emergency Responder, Finesse, Hosted Collaboration Mediation Fulfillment, MediaSense, Prime License Manager, SocialMiner, Unified Communications Manager (UCM), Unified Communications Manager IM and Presence Service (IM&P - earlier releases were known as Cisco Unified Presence), Unified Communication Manager Session Management Edition (SME), Unified Contact Center Express (UCCx), Unified Intelligence Center (UIC), Unity Connection, Virtualized Voice Browser. This vulnerability also affects Prime Collaboration Assurance and Prime Collaboration Provisioning. Cisco Bug IDs: CSCvd10872, CSCvf64322, CSCvf64332, CSCvi29538, CSCvi29543, CSCvi29544, CSCvi29546, CSCvi29556, CSCvi29571, CSCvi31738, CSCvi31741, CSCvi31762, CSCvi31807, CSCvi31818, CSCvi31823. | [] | null | null | 7.5 | null |
|
GHSA-532m-842f-wrr5 | Cross-Site Request Forgery (CSRF) vulnerability in Feedbucket Feedbucket – Website Feedback Tool allows Cross Site Request Forgery. This issue affects Feedbucket – Website Feedback Tool: from n/a through 1.0.6. | [] | null | 5.4 | null | null |
|
CVE-2019-12942 | TTLock devices do not properly block guest access in certain situations where the network connection to the cloud is unavailable. | [
"cpe:2.3:a:ttlock:ttlock:-:*:*:*:*:*:*:*"
] | null | 6.5 | null | 3.3 |
|
GHSA-w2p3-j7fr-c39q | An issue was discovered in certain Apple products. macOS before 10.12.2 is affected. The issue involves the "xar" component, which allows remote attackers to execute arbitrary code via a crafted archive that triggers use of uninitialized memory locations. | [] | null | null | 7.8 | null |
|
RHSA-2020:3643 | Red Hat Security Advisory: thunderbird security update | Mozilla: Attacker-induced prompt for extension installation Mozilla: Use-After-Free when aborting an operation | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | 8.8 | null | null |
CVE-2020-1043 | A remote code execution vulnerability exists when Hyper-V RemoteFX vGPU on a host server fails to properly validate input from an authenticated user on a guest operating system, aka 'Hyper-V RemoteFX vGPU Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1032, CVE-2020-1036, CVE-2020-1040, CVE-2020-1041, CVE-2020-1042. | [
"cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*"
] | null | 9 | null | 7.7 |
|
GHSA-qvpj-w7xj-r6w9 | Password confirmation stored in plain text via registration form in statamic/cms | Users registering via the `user:register_form` tag will have their password confirmation stored in plain text in their user file.ImpactThis only affects sites matching **all** of the following conditions:Running Statamic versions between 5.3.0 and 5.6.1. (This version range represents only one calendar week)Using the `user:register_form` tag.Using file-based user accounts. (Does not affect users stored in a database.)Has users that have registered during that time period. (Existing users are not affected.)The password is only visible to users that have access to read user yaml files, typically developers of the application itself.PatchesThe issue has been patched in 5.6.2, however any users registered during that time period and using the affected version range will still have the the `password_confirmation` value in their yaml files.We recommend that affected users have their password reset. The following query can be entered into `php artisan tinker` and will output a list of affected emails:The following can be entered into `tinker` and will clear both password_confirmation as well as their existing password. They will be required to reset their password before their next login attempt.ReferencesIf you are committing user files to a public git repo, you may consider clearing the sensitive data from the git history. You can use the following links for details.https://docs.github.com/en/authentication/keeping-your-account-and-data-secure/removing-sensitive-data-from-a-repositoryhttps://dev.to/balogh08/cleaning-your-git-history-safely-removing-sensitive-data-10i5 | [] | null | 1.8 | null | null |
GHSA-hw4x-hf25-fgp2 | Cross-site scripting (XSS) vulnerability in the CookieDump.java sample application in Mort Bay Jetty 6.1.19 and 6.1.20 allows remote attackers to inject arbitrary web script or HTML via the Value parameter in a GET request to cookie/. | [] | null | null | null | null |
|
GHSA-wcjg-965f-9jwr | question_image.ts in SurveyJS Form Library before 1.10.4 allows contentMode=youtube XSS via the imageLink property. | [] | null | 6.1 | null | null |
|
GHSA-8434-v7xw-8m9x | Improper Neutralization of Argument Delimiters in a Decompiling Package Process in APKLeaks | APKLeaks prior to v2.0.4 allows remote authenticated attackers to execute arbitrary OS commands via package name inside the application manifest.ImpactAn authenticated attacker could include arguments that allow unintended commands or code to be executed, allow sensitive data to be read or modified, or could cause other unintended behavior through malicious package names.Referencesa966e781499ff6fd4eea66876d7532301b13a382For more informationIf you have any questions or comments about this advisory:Email me at [[email protected]](mailto:[email protected]) | [] | null | 9.3 | null | null |
GHSA-7h35-9873-jvrx | Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20, when running on Firefox, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment. | [] | null | null | null | null |
|
GHSA-h6gm-f98p-r6x3 | Cisco Wireless LAN Controller (WLC) software, possibly 4.2 through 6.0, allows remote authenticated users to bypass intended access restrictions and modify the configuration, and possibly obtain administrative privileges, via unspecified vectors, a different vulnerability than CVE-2010-2842 and CVE-2010-2843. | [] | null | null | null | null |
|
RHSA-2024:7430 | Red Hat Security Advisory: kpatch-patch-4_18_0-477_43_1 and kpatch-patch-4_18_0-477_67_1 security update | kernel: wifi: mac80211: Avoid address calculations via out of bounds array indexing | [
"cpe:/o:redhat:rhel_eus:8.8::baseos"
] | null | 7.8 | null | null |
RHSA-2023:6916 | Red Hat Security Advisory: xorg-x11-server security and bug fix update | xorg-x11-server: X.Org Server Overlay Window Use-After-Free Local Privilege Escalation Vulnerability | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 7.8 | null | null |
CVE-2022-29383 | NETGEAR ProSafe SSL VPN firmware FVS336Gv2 and FVS336Gv3 was discovered to contain a SQL injection vulnerability via USERDBDomains.Domainname at cgi-bin/platform.cgi. | [
"cpe:2.3:o:netgear:ssl312_firmware:fvs336gv2:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:ssl312_firmware:fvs336gv3:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:ssl312:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
|
RHSA-2018:0592 | Red Hat Security Advisory: slf4j security update | slf4j: Deserialisation vulnerability in EventData constructor can allow for arbitrary code execution | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 8.1 | null |
GHSA-hcxx-gj94-jr34 | An out-of-bounds read issue existed that led to the disclosure of kernel memory. This was addressed with improved input validation. This issue is fixed in iOS 16. An app may be able to disclose kernel memory. | [] | null | 5.5 | null | null |
|
GHSA-vm5c-8wmm-qf2p | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in theasys Theasys allows Stored XSS. This issue affects Theasys: from n/a through 1.0.1. | [] | null | 7.1 | null | null |
|
GHSA-7qhf-c82c-mpmm | Untrusted search path vulnerability in Cisco Unified Communications Manager (CUCM) 7.1(x) through 9.1(1a) allows local users to gain privileges by leveraging unspecified file-permission and environment-variable issues for privileged programs, aka Bug ID CSCui02276. | [] | null | null | null | null |
|
GHSA-xcjp-mj7m-5f57 | An issue was discovered in Xen through 4.13.x, allowing x86 Intel HVM guest OS users to cause a host OS denial of service or possibly gain privileges because of insufficient cache write-back under VT-d. When page tables are shared between IOMMU and CPU, changes to them require flushing of both TLBs. Furthermore, IOMMUs may be non-coherent, and hence prior to flushing IOMMU TLBs, a CPU cache also needs writing back to memory after changes were made. Such writing back of cached data was missing in particular when splitting large page mappings into smaller granularity ones. A malicious guest may be able to retain read/write DMA access to frames returned to Xen's free pool, and later reused for another purpose. Host crashes (leading to a Denial of Service) and privilege escalation cannot be ruled out. Xen versions from at least 3.2 onwards are affected. Only x86 Intel systems are affected. x86 AMD as well as Arm systems are not affected. Only x86 HVM guests using hardware assisted paging (HAP), having a passed through PCI device assigned, and having page table sharing enabled can leverage the vulnerability. Note that page table sharing will be enabled (by default) only if Xen considers IOMMU and CPU large page size support compatible. | [] | null | 8.8 | null | null |
|
CVE-2016-10614 | httpsync is a port of libcurl to node.js. httpsync downloads binary resources over HTTP, which leaves it vulnerable to MITM attacks. It may be possible to cause remote code execution (RCE) by swapping out the requested binary with an attacker controlled binary if the attacker is on the network or positioned in between the user and the remote server. | [
"cpe:2.3:a:httpsync_project:httpsync:-:*:*:*:*:node.js:*:*"
] | null | null | 8.1 | 9.3 |
|
GHSA-43h9-35c5-3259 | A vulnerability, which was classified as problematic, has been found in Tsinghua Unigroup Electronic Archives System 3.2.210802(62532). Affected by this issue is the function download of the file /collect/PortV4/downLoad.html. The manipulation of the argument path leads to information disclosure. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. | [] | 5.3 | 4.3 | null | null |
|
CVE-2009-3158 | admin/files.php in simplePHPWeb 0.2 does not require authentication, which allows remote attackers to perform unspecified administrative actions via unknown vectors. NOTE: some of these details are obtained from third party information. | [
"cpe:2.3:a:carsten_wulff:simplephpweb:0.2:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2024-35858 | net: bcmasp: fix memory leak when bringing down interface | In the Linux kernel, the following vulnerability has been resolved:
net: bcmasp: fix memory leak when bringing down interface
When bringing down the TX rings we flush the rings but forget to
reclaimed the flushed packets. This leads to a memory leak since we
do not free the dma mapped buffers. This also leads to tx control
block corruption when bringing down the interface for power
management. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.9:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.9:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.9:rc5:*:*:*:*:*:*"
] | null | 5.5 | null | null |
GHSA-4c6m-8x2x-v3r2 | Sourcecodester Expense Tracker App v1 is vulnerable to Cross Site Scripting (XSS) via add category. | [] | null | 5.4 | null | null |
|
RHSA-2020:0157 | Red Hat Security Advisory: java-1.8.0-openjdk security update | OpenJDK: Incorrect exception processing during deserialization in BeanContextSupport (Serialization, 8224909) OpenJDK: Improper checks of SASL message properties in GssKrb5Base (Security, 8226352) OpenJDK: Incorrect isBuiltinStreamHandler check causing URL normalization issues (Networking, 8228548) OpenJDK: Use of unsafe RSA-MD5 checksum in Kerberos TGS (Security, 8229951) OpenJDK: Serialization filter changes via jdk.serialFilter property modification (Serialization, 8231422) OpenJDK: Excessive memory usage in OID processing in X.509 certificate parsing (Libraries, 8234037) OpenJDK: Incomplete enforcement of maxDatagramSockets limit in DatagramChannelImpl (Networking, 8231795) | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | 3.7 | null | null |
CVE-2015-1517 | SQL injection vulnerability in Piwigo before 2.7.4, when all filters are activated, allows remote authenticated users to execute arbitrary SQL commands via the filter_level parameter in a "Refresh photo set" action in the batch_manager page to admin.php. | [
"cpe:2.3:a:piwigo:piwigo:*:*:*:*:*:*:*:*"
] | null | null | null | 6 |
|
GHSA-95jr-7vvp-xrg6 | A vulnerability, which was classified as problematic, was found in FactoMineR FactoInvestigate up to 1.9. Affected is an unknown function of the component HTML Report Generator. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-251544. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | [] | null | 3.5 | null | null |
|
CVE-2023-43284 | D-Link Wireless MU-MIMO Gigabit AC1200 Router DIR-846 100A53DBR-Retail devices allow an authenticated remote attacker to execute arbitrary code via an unspecified manipulation of the QoS POST parameter. | [
"cpe:2.3:o:dlink:dir-846_firmware:100a53dbr:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dir-846:-:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
|
GHSA-x44j-74qq-8gw8 | IBM Security Secret Server 10.7 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 177514. | [] | null | null | null | null |
|
PYSEC-2022-43163 | null | WMAgent v1.3.3rc2 and 1.3.3rc1, reqmgr 2 1.4.1rc5 and 1.4.0rc2, reqmon 1.4.1rc5, and global-workqueue 1.4.1rc5 allows attackers to execute arbitrary code via a crafted dbs-client package. | [] | null | 9.8 | null | null |
GHSA-cjmv-88gc-55q9 | Watchguard Firebox II prior to 4.6 allows a remote attacker to create a denial of service in the kernel via a large stream (>10,000) of malformed ICMP or TCP packets. | [] | null | null | null | null |
|
GHSA-22pf-6rh7-89gj | A vulnerability exists in NSD570 login panel that does not restrict excessive authentication attempts. If exploited, this could
cause account takeover and unauthorized access to the system
when an attacker conducts brute-force attacks against the
equipment login. Note that the system supports only one concurrent session and implements a delay of more than a second
between failed login attempts making it difficult to automate the
attacks. | [] | null | 5.3 | null | null |
|
GHSA-77jj-r4gx-pj6m | Unspecified vulnerability in Oracle Solaris 10 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Installer. | [] | null | null | null | null |
|
CVE-2016-6045 | IBM Tivoli Storage Manager Operations Center is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. | [
"cpe:2.3:a:ibm:tivoli_storage_manager:6.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:6.4.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:6.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:6.4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:6.4.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:6.4.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:6.4.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.7:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.8 |
|
RHSA-2015:2065 | Red Hat Security Advisory: xen security update | qemu: Heap overflow vulnerability in ne2000_receive() function | [
"cpe:/a:redhat:rhel_virtualization:5::client",
"cpe:/a:redhat:rhel_virtualization:5::server",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
GHSA-88h7-p773-gw4x | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Roles). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H). | [] | null | 5.5 | null | null |
|
CVE-2023-28221 | Windows Error Reporting Service Elevation of Privilege Vulnerability | Windows Error Reporting Service Elevation of Privilege Vulnerability | [
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*"
] | null | 7 | null | null |
CVE-2021-38697 | SoftVibe SARABAN for INFOMA 1.1 allows Unauthenticated unrestricted File Upload, that allows attackers to upload files with any file extension which can lead to arbitrary code execution. | [
"cpe:2.3:a:softvibe:saraban:1.1:*:*:*:*:infoma:*:*"
] | null | 9.8 | null | 7.5 |
|
GHSA-qx83-927w-w8jp | SAP GUI allows an authenticated attacker to execute scripts in the local network. On successful exploitation, the attacker can gain access to registries which can cause a limited impact on confidentiality and high impact on availability of the application. | [] | null | 6.1 | null | null |
|
RHSA-2023:6621 | Red Hat Security Advisory: protobuf-c security update | protobuf-c: unsigned integer overflow in parse_required_member | [
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 6.2 | null | null |
GHSA-q4j4-vw28-779r | The WP JobSearch WordPress plugin before 1.7.4 did not sanitise or escape multiple of its parameters from the my-resume page before outputting them in the page, allowing low privilege users to use JavaScript payloads in them and leading to a Stored Cross-Site Scripting issue | [] | null | null | null | null |
|
CVE-2014-5599 | The Tiny Farm (aka com.com2us.tinyfarm.normal.freefull.google.global.android.common) application 2.02.00 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [
"cpe:2.3:a:withhive:tiny_farm:2.02.00:*:*:*:*:android:*:*"
] | null | null | null | 5.4 |
|
GHSA-r8wh-xjhh-44p3 | Buffer overflow in a certain Aurigma ActiveX control in ImageUploader4.ocx 4.1.36.0, as used with Piczo (aka Pizco) and possibly other online services, allows remote attackers to execute arbitrary code via unspecified vectors, possibly involving a long Action property, a different CLSID than CVE-2008-0659. | [] | null | null | null | null |
|
GHSA-486g-rgjg-jqcq | An issue was discovered on Neato Botvac Connected 2.2.0 devices. They execute unauthenticated manual drive commands (sent to /bin/webserver on port 8081) if they already have an active session. Commands like forward, back, arc-left, arc-right, pivot-left, and pivot-right are executed even though the web socket replies with { "message" : "invalid authorization header" }. Without an active session, commands are still interpreted, but (except for eco-on and eco-off) have no effect, since without active driving, a driving direction does not change anything. | [] | null | 5.3 | null | null |
|
CVE-2018-10322 | The xfs_dinode_verify function in fs/xfs/libxfs/xfs_inode_buf.c in the Linux kernel through 4.16.3 allows local users to cause a denial of service (xfs_ilock_attr_map_shared invalid pointer dereference) via a crafted xfs image. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
] | null | null | 5.5 | 4.9 |
|
CVE-2022-44559 | The AMS module has a vulnerability of serialization/deserialization mismatch. Successful exploitation of this vulnerability may cause privilege escalation. | [
"cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:12.0.1:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
CVE-2018-4872 | An issue was discovered in Adobe Acrobat Reader 2018.009.20050 and earlier versions, 2017.011.30070 and earlier versions, 2015.006.30394 and earlier versions. This vulnerability is a security bypass vulnerability that leads to a sandbox escape. Specifically, the vulnerability exists in the way a cross call is handled. | [
"cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*"
] | null | null | 10 | 10 |
|
CVE-2024-27345 | Kofax Power PDF PDF File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability | Kofax Power PDF PDF File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Kofax Power PDF. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the handling of PDF files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-22932. | [] | null | null | 3.3 | null |
GHSA-578g-7pcp-xjj4 | A cross-site scripting (xss) vulnerability exists in the footer alerts functionality of WWBN AVideo 11.6 and dev master commit 3f7c0364. A specially-crafted HTTP request can lead to arbitrary Javascript execution. An attacker can get an authenticated user to send a crafted HTTP request to trigger this vulnerability.This vulnerability arrises from the "msg" parameter which is inserted into the document with insufficient sanitization. | [] | null | 6.1 | null | null |
|
CVE-2022-42301 | An issue was discovered in Veritas NetBackup through 10.0.0.1 and related Veritas products. The NetBackup Primary server is vulnerable to an XML External Entity (XXE) injection attack through the nbars process. | [
"cpe:2.3:a:veritas:netbackup:*:*:*:*:*:*:*:*"
] | null | 5.4 | null | null |
|
GHSA-w6vf-jww5-crph | LPAR2RRD ? 4.53 and ? 3.5 has arbitrary command injection on the application server. | [] | null | 9.8 | null | null |
|
GHSA-3g5m-332q-27r3 | An out-of-bounds memory write flaw was found in the Linux kernel's joystick devices subsystem in versions before 5.9-rc1, in the way the user calls ioctl JSIOCSBTNMAP. This flaw allows a local user to crash the system or possibly escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability. | [] | null | 7.8 | null | null |
|
CVE-2024-38619 | usb-storage: alauda: Check whether the media is initialized | In the Linux kernel, the following vulnerability has been resolved:
usb-storage: alauda: Check whether the media is initialized
The member "uzonesize" of struct alauda_info will remain 0
if alauda_init_media() fails, potentially causing divide errors
in alauda_read_data() and alauda_write_lba().
- Add a member "media_initialized" to struct alauda_info.
- Change a condition in alauda_check_media() to ensure the
first initialization.
- Add an error check for the return value of alauda_init_media(). | [] | null | null | null | null |
Subsets and Splits