id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
GHSA-jq2p-9w9x-5vq6 | Microsoft SharePoint Server Remote Code Execution Vulnerability | [] | null | 6.1 | null | null |
|
CVE-2019-18844 | The Device Model in ACRN before 2019w25.5-140000p relies on assert calls in devicemodel/hw/pci/core.c and devicemodel/include/pci_core.h (instead of other mechanisms for propagating error information or diagnostic information), which might allow attackers to cause a denial of service (assertion failure) within pci core. This is fixed in 1.2. 6199e653418e is a mitigation for pre-1.1 versions, whereas 2b3dedfb9ba1 is a mitigation for 1.1. | [
"cpe:2.3:o:linux:acrn:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
CVE-2008-6144 | Multiple cross-site scripting (XSS) vulnerabilities in the WEC Discussion Forum (wec_discussion) extension 1.7.0 and earlier for TYPO3 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different issue than CVE-2008-3029. | [
"cpe:2.3:a:typo3:wec_discussion_forum:*:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:wec_discussion_forum:1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:wec_discussion_forum:1.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:wec_discussion_forum:1.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:wec_discussion_forum:1.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:wec_discussion_forum:1.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2025-40657 | SQL injection vulnerability in DM Corporative CMS | A SQL injection vulnerability has been found in DM Corporative CMS. This vulnerability allows an attacker to retrieve, create, update and delete databases through the codform parameter in /modules/forms/collectform.asp. | [] | 9.3 | null | null | null |
GHSA-9943-x539-vrhj | This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit Studio Photo 3.6.6.916. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of PSD files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated structure. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the current process. Was ZDI-CAN-9626. | [] | null | null | null | null |
|
CVE-2025-4895 | SourceCodester Doctors Appointment System delete-session.php sql injection | A vulnerability, which was classified as critical, has been found in SourceCodester Doctors Appointment System 1.0. This issue affects some unknown processing of the file /admin/delete-session.php. The manipulation of the argument ID leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. | [] | 6.9 | 7.3 | 7.3 | 7.5 |
GHSA-h22x-6jwr-59gf | NmConsole/utility/RenderMap.asp in Ipswitch WhatsUp Professional 2006 and WhatsUp Professional 2006 Premium allows remote attackers to obtain sensitive information about network nodes via a modified nDeviceGroupID parameter. | [] | null | null | null | null |
|
CVE-2020-8949 | Gocloud S2A_WL 4.2.7.16471, S2A 4.2.7.17278, S2A 4.3.0.15815, S2A 4.3.0.17193, S3A K2P MTK 4.2.7.16528, S3A 4.3.0.16572, and ISP3000 4.3.0.17190 devices allows remote attackers to execute arbitrary OS commands via shell metacharacters in a ping operation, as demonstrated by the cgi-bin/webui/admin/tools/app_ping/diag_ping/; substring. | [
"cpe:2.3:o:gocloud:s2a_wl_firmware:4.2.7.16471:*:*:*:*:*:*:*",
"cpe:2.3:h:gocloud:s2a_wl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gocloud:s2a_firmware:4.2.7.17278:*:*:*:*:*:*:*",
"cpe:2.3:o:gocloud:s2a_firmware:4.3.0.15815:*:*:*:*:*:*:*",
"cpe:2.3:o:gocloud:s2a_firmware:4.3.0.17193:*:*:*:*:*:*:*",
"cpe:2.3:h:gocloud:s2a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gocloud:s3a_k2p_mtk_firmware:4.2.7.16528:*:*:*:*:*:*:*",
"cpe:2.3:h:gocloud:s3a_k2p_mtk:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gocloud:s3a_firmware:4.3.0.16572:*:*:*:*:*:*:*",
"cpe:2.3:h:gocloud:s3a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gocloud:isp3000_firmware:4.3.0.17190:*:*:*:*:*:*:*",
"cpe:2.3:h:gocloud:isp3000:-:*:*:*:*:*:*:*"
] | null | 8.8 | null | 9 |
|
GHSA-cmvc-pmvw-gjx4 | CSZ CMS 1.2.9 has a Time and Boolean-based Blind SQL Injection vulnerability in the endpoint /admin/export/getcsv/article_db, via the fieldS[] and orderby parameters. | [] | null | 6.5 | null | null |
|
GHSA-w56p-h676-566f | The pr_data_xfer function in ProFTPD before 1.3.2rc3 allows remote authenticated users to cause a denial of service (CPU consumption) via an ABOR command during a data transfer. | [] | null | null | null | null |
|
CVE-2025-39520 | WordPress Checkout Files Upload for WooCommerce <= 2.2.0 - Cross Site Scripting (XSS) Vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WP Wham Checkout Files Upload for WooCommerce allows Stored XSS. This issue affects Checkout Files Upload for WooCommerce: from n/a through 2.2.0. | [] | null | 6.5 | null | null |
GHSA-8m6j-x8hv-vfpr | Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 12.2.1.4.0 and 14.1.1.0.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via T3, IIOP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.1 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H). | [] | null | 8.1 | null | null |
|
GHSA-vvj2-x9vm-r47f | NULL Pointer Access in function imagetopnm of convert.c(jp2):1289 in OpenJPEG 2.1.2. Impact is Denial of Service. Someone must open a crafted j2k file. | [] | null | null | 6.5 | null |
|
CVE-2016-2482 | The mm-video-v4l2 vdec component in mediaserver in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-06-01 mishandles a buffer count, which allows attackers to gain privileges via a crafted application, as demonstrated by obtaining Signature or SignatureOrSystem access, aka internal bug 27661749. | [
"cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*"
] | null | null | 7.8 | 9.3 |
|
GHSA-c327-jq99-89qx | The LTL Freight Quotes – ABF Freight Edition plugin for WordPress is vulnerable to SQL Injection via the 'edit_id' and 'dropship_edit_id' parameters in all versions up to, and including, 3.3.7 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. | [] | null | 7.5 | null | null |
|
CVE-2023-27514 | OS command injection vulnerability in the download page of SolarView Compact SV-CPT-MC310 versions prior to Ver.8.10 and SV-CPT-MC310F versions prior to Ver.8.10 allows a remote authenticated attacker to execute an arbitrary OS command. | [
"cpe:2.3:o:contec:sv-cpt-mc310f_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:contec:sv-cpt-mc310f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:contec:sv-cpt-mc310_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:contec:sv-cpt-mc310:-:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
|
GHSA-gggj-c5p3-c3rp | The Workbench Email module 7.x-3.x before 7.x-3.4 for Drupal allows remote authenticated users with certain permissions to bypass node and field validation by saving a node. | [] | null | null | null | null |
|
GHSA-qwrg-2m8j-ppj3 | The Linux kernel before 2.6.39 does not properly create transparent huge pages in response to a MAP_PRIVATE mmap system call on /dev/zero, which allows local users to cause a denial of service (system crash) via a crafted application. | [] | null | 5.5 | null | null |
|
RHSA-2009:1672 | Red Hat Security Advisory: kernel security and bug fix update | kernel: SELinux and mmap_min_addr kernel: fs: pipe.c null pointer dereference | [
"cpe:/o:redhat:rhel_eus:5.2"
] | null | null | null | null |
GHSA-wpvm-wqr4-p7cw | Inclusion of Functionality from Untrusted Control Sphere in CKEditor 4 | It was possible to execute a ReDoS-type attack inside CKEditor 4 before 4.16 by persuading a victim to paste crafted URL-like text into the editor, and then press Enter or Space (in the Autolink plugin). | [] | null | 6.5 | null | null |
CVE-2019-4058 | IBM BigFix Platform 9.2 and 9.5 could allow a low-privilege user to manipulate the UI into exposing interface elements and information normally restricted to administrators. IBM X-Force ID: 156570. | [
"cpe:2.3:a:ibm:bigfix_platform:*:*:*:*:*:*:*:*"
] | null | null | 6.5 | null |
|
GHSA-m425-mq94-257g | gRPC-Go HTTP/2 Rapid Reset vulnerability | ImpactIn affected releases of gRPC-Go, it is possible for an attacker to send HTTP/2 requests, cancel them, and send subsequent requests, which is valid by the HTTP/2 protocol, but would cause the gRPC-Go server to launch more concurrent method handlers than the configured maximum stream limit.PatchesThis vulnerability was addressed by #6703 and has been included in patch releases: 1.56.3, 1.57.1, 1.58.3. It is also included in the latest release, 1.59.0.Along with applying the patch, users should also ensure they are using the `grpc.MaxConcurrentStreams` server option to apply a limit to the server's resources used for any single connection.WorkaroundsNone.References#6703 | [] | null | 7.5 | null | null |
GHSA-9hv8-pfv2-wqfp | Sewio’s Real-Time Location System (RTLS) Studio version 2.0.0 up to and including version 2.6.2 is vulnerable to cross-site scripting in its backup services. An attacker could take advantage of this vulnerability to execute arbitrary commands. | [] | null | 9.6 | null | null |
|
GHSA-cfxm-vc39-rjf6 | ECOA BAS controller has a Cross-Site Request Forgery vulnerability, thus authenticated attacker can remotely place a forged request at a malicious web page and execute CRUD commands (GET, POST, PUT, DELETE) to perform arbitrary operations in the system. | [] | null | null | null | null |
|
cisco-sa-20200219-esa-dos | Cisco Email Security Appliance Denial of Service Vulnerability | A vulnerability in the email message filtering feature of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to cause the CPU utilization to increase to 100 percent, causing a denial of service (DoS) condition on an affected device.
The vulnerability is due to improper handling of email messages that contain large attachments. An attacker could exploit this vulnerability by sending a malicious email message through the targeted device. A successful exploit could allow the attacker to cause a permanent DoS condition due to high CPU utilization. This vulnerability may require manual intervention to recover the ESA.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200219-esa-dos ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200219-esa-dos"] | [] | null | null | 8.6 | null |
CVE-2019-5131 | An exploitable use-after-free vulnerability exists in the JavaScript engine of Foxit Software's Foxit PDF Reader, version 9.7.0.29435. A specially crafted PDF document can trigger a previously freed object in memory to be reused, resulting in arbitrary code execution. An attacker needs to trick the user to open the malicious file to trigger this vulnerability. If the browser plugin extension is enabled, visiting a malicious site can also trigger the vulnerability. | [
"cpe:2.3:a:foxitsoftware:phantompdf:*:*:*:*:*:*:*:*",
"cpe:2.3:a:foxitsoftware:reader:*:*:*:*:*:*:*:*"
] | null | null | 8.8 | null |
|
CVE-2021-39981 | Chang Lian application has a vulnerability which can be maliciously exploited to hide the calling number.Successful exploitation of this vulnerability allows you to make an anonymous call. | [
"cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*"
] | null | 5.3 | null | 4.3 |
|
RHSA-2021:0694 | Red Hat Security Advisory: bind security update | bind: Buffer overflow in the SPNEGO implementation affecting GSSAPI security policy negotiation | [
"cpe:/o:redhat:rhel_aus:7.2::server"
] | null | 8.1 | null | null |
CVE-2022-36892 | Jenkins rhnpush-plugin Plugin 0.5.1 and earlier does not perform a permission check in a method implementing form validation, allowing attackers with Item/Read permission but without Item/Workspace or Item/Configure permission to check whether attacker-specified file patterns match workspace contents. | [
"cpe:2.3:a:jenkins:rhnpush-plugin:*:*:*:*:*:jenkins:*:*"
] | null | 4.3 | null | null |
|
CVE-2022-26301 | TuziCMS v2.0.6 was discovered to contain a SQL injection vulnerability via the component App\Manage\Controller\ZhuantiController.class.php. | [
"cpe:2.3:a:yejiao:tuzicms:2.0.6:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
|
GHSA-737g-j22h-36hj | Race condition in sandbox before 1.2.11 allows local users to create or overwrite arbitrary files via symlink attack on sandboxpids.tmp. | [] | null | null | null | null |
|
CVE-2022-25826 | Information Exposure vulnerability in Galaxy S3 Plugin prior to version 2.2.03.22012751 allows attacker to access password information of connected WiFiAp in the log | [
"cpe:2.3:a:samsung:galaxy_watch_3_plugin:*:*:*:*:*:android:*:*"
] | null | 1.9 | null | null |
|
CVE-1999-0797 | NIS finger allows an attacker to conduct a denial of service via a large number of finger requests, resulting in a large number of NIS queries. | [
"cpe:2.3:o:sun:sunos:*:*:*:*:*:*:*:*"
] | null | null | null | 2.6 |
|
RHSA-2019:0436 | Red Hat Security Advisory: java-11-openjdk security update | OpenJDK: memory disclosure in FileChannelImpl (Libraries, 8206290) | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 3.1 | null |
CVE-2015-3625 | The NVIDIA GPU driver for FreeBSD R352 before 352.09, 346 before 346.72, R349 before 349.16, R343 before 343.36, R340 before 340.76, R337 before 337.25, R334 before 334.21, R331 before 331.113, and R304 before 304.125 allows local users with certain permissions to read or write arbitrary kernel memory via unspecified vectors that trigger an untrusted pointer dereference. | [
"cpe:2.3:a:nvidia:gpu_driver:*:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*"
] | null | null | null | 7.2 |
|
RHSA-2022:5471 | Red Hat Security Advisory: php:7.4 security update | php: password of excessive length triggers buffer overflow leading to RCE | [
"cpe:/a:redhat:rhel_eus:8.4::appstream"
] | null | 8.8 | null | null |
GHSA-442m-4j9q-hhm9 | WorldClient webmail in Alt-N MDaemon 8.1.3 allows remote attackers to prevent arbitrary users from accessing their inboxes via script tags in the Subject header of an e-mail message, which prevents the user from being able to access the Inbox folder, possibly due to a cross-site scripting (XSS) vulnerability. | [] | null | null | null | null |
|
CVE-2006-3593 | The command line interface (CLI) in Cisco Unified CallManager (CUCM) 5.0(1) through 5.0(3a) allows local users to overwrite arbitrary files by redirecting a command's output to a file or folder, aka bug CSCse31704. | [
"cpe:2.3:a:cisco:unified_callmanager:5.0\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_callmanager:5.0\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_callmanager:5.0\\(3\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_callmanager:5.0\\(3a\\):*:*:*:*:*:*:*"
] | null | null | null | 4 |
|
CVE-2013-4926 | epan/dissectors/packet-dcom-sysact.c in the DCOM ISystemActivator dissector in Wireshark 1.10.x before 1.10.1 does not properly determine whether there is remaining packet data to process, which allows remote attackers to cause a denial of service (application crash) via a crafted packet. | [
"cpe:2.3:a:wireshark:wireshark:1.10.0:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2024-51692 | WordPress Bing Search API Integration plugin <= 0.3.3 - Reflected Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Askew Brook Bing Search API Integration allows Reflected XSS.This issue affects Bing Search API Integration: from n/a through 0.3.3. | [] | null | 7.1 | null | null |
GHSA-j5x9-r222-8r2p | Ovarro TBox proprietary Modbus file access functions allow attackers to read, alter, or delete the configuration file. | [] | null | 9.8 | null | null |
|
GHSA-868q-37w2-4c3c | Cross-Site Request Forgery (CSRF) vulnerability in Mahbubur Rahman Post Meta allows Reflected XSS. This issue affects Post Meta: from n/a through 1.0.9. | [] | null | 7.1 | null | null |
|
GHSA-6634-h7jm-9fm9 | SQL injection vulnerability in the Mannschaftsliste (kiddog_playerlist) 1.0.3 and earlier extension for TYPO3 allows remote attackers to execute arbitrary SQL commands via unspecified vectors. | [] | null | null | null | null |
|
RHSA-2003:113 | Red Hat Security Advisory: : Updated mod_auth_any packages available | security flaw | [
"cpe:/o:redhat:linux:7.2",
"cpe:/o:redhat:linux:7.3"
] | null | null | null | null |
GHSA-wwxq-2m47-f76v | The calendar program in bsdmainutils 6.0 through 6.0.14 does not drop root privileges when executed with the -a flag, which allows attackers to execute arbitrary commands via a calendar event file. | [] | null | null | null | null |
|
CVE-2008-5331 | Adobe Acrobat 9 uses more efficient encryption than previous versions, which makes it easier for attackers to guess a document's password via a brute-force attack. | [
"cpe:2.3:a:adobe:acrobat:9:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.0:*:professional:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.0:*:standard:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-vqf7-7684-3mjq | Henschen & Associates court document management software does not sufficiently randomize file names of cached documents, allowing a remote, unauthenticated attacker to access restricted documents. | [] | null | 5.3 | null | null |
|
RHSA-2011:0511 | Red Hat Security Advisory: flash-plugin security update | flash-plugin: crash and potential arbitrary code execution (APSB11-12) flash-plugin: crash and potential arbitrary code execution (APSB11-12) flash-plugin: crash and potential arbitrary code execution (APSB11-12) flash-plugin: crash and potential arbitrary code execution (APSB11-12) flash-plugin: crash and potential arbitrary code execution (APSB11-12) flash-plugin: crash and potential arbitrary code execution (APSB11-12) flash-plugin: crash and potential arbitrary code execution (APSB11-12) flash-plugin: crash and potential arbitrary code execution (APSB11-12) flash-plugin: crash and potential arbitrary code execution (APSB11-12) flash-plugin: crash and potential arbitrary code execution (APSB11-12) flash-plugin: crash and potential arbitrary code execution (APSB11-12) flash-plugin: crash and potential arbitrary code execution (APSB11-12) | [
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
CVE-2022-2992 | A vulnerability in GitLab CE/EE affecting all versions from 11.10 prior to 15.1.6, 15.2 to 15.2.4, 15.3 to 15.3.2 allows an authenticated user to achieve remote code execution via the Import from GitHub API endpoint. | [
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*"
] | null | 9.9 | null | null |
|
GHSA-vcp8-pwx3-jhj4 | Vulnerability in the Oracle Financial Services Liquidity Risk Management component of Oracle Financial Services Applications (subcomponent: User Interface). The supported version that is affected is 8.0.x. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Financial Services Liquidity Risk Management. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Financial Services Liquidity Risk Management, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Financial Services Liquidity Risk Management accessible data as well as unauthorized read access to a subset of Oracle Financial Services Liquidity Risk Management accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N). | [] | null | null | 6.1 | null |
|
CVE-2023-26560 | Northern.tech CFEngine Enterprise before 3.21.1 allows a subset of authenticated users to leverage the Scheduled Reports feature to read arbitrary files and potentially discover credentials. | [
"cpe:2.3:a:northern.tech:cfengine:*:*:*:*:enterprise:*:*:*"
] | null | 6.5 | null | null |
|
GHSA-36xr-52f8-hmpq | Gadu-Gadu build 155 and earlier allows remote attackers to cause a denial of service (infinite loop) via a message that contains an image whose filename does not start with restricted characters. | [] | null | null | null | null |
|
GHSA-894m-4vhx-v3vw | In the Linux kernel, the following vulnerability has been resolved:drm/meson: encoder_cvbs: Fix refcount leak in meson_encoder_cvbs_initof_graph_get_remote_node() returns remote device nodepointer with
refcount incremented, we should use of_node_put() on it when done.
Add missing of_node_put() to avoid refcount leak. | [] | null | null | null | null |
|
GHSA-24gw-9fv3-3c2w | ** DISPUTED ** EMC VMware Player allows user-assisted attackers to cause a denial of service (unrecoverable application failure) via a long value of the ide1:0.fileName parameter in the .vmx file of a virtual machine. NOTE: third parties have disputed this issue, saying that write access to the .vmx file enables other ways of stopping the virtual machine, so no privilege boundaries are crossed. | [] | null | 5.5 | null | null |
|
RHSA-2016:1272 | Red Hat Security Advisory: python-django-horizon security, bug fix, and enhancement update | python-django-horizon: XSS in client side template | [
"cpe:/a:redhat:openstack:7::el7"
] | null | null | null | null |
CVE-1999-1379 | DNS allows remote attackers to use DNS name servers as traffic amplifiers via a UDP DNS query with a spoofed source address, which produces more traffic to the victim than was sent by the attacker. | [
"cpe:2.3:a:dnstools_software:dnstools:*:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-q9h5-9c8r-cw9f | TOTOLINK N600R V4.3.0cu.7647_B20210106 was discovered to contain a stack overflow via the File parameter in the function FUN_0041309c. | [] | null | 9.8 | null | null |
|
GHSA-q9x6-pv9g-wxxx | IBM Security Access Manager Appliance 8.0.0 and 9.0.0 specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors. IBM X-Force ID: 128378. | [] | null | null | 4.2 | null |
|
GHSA-q4w4-f94p-rpp4 | The WooCommerce Cart Count Shortcode WordPress plugin before 1.1.0 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks. | [] | null | 5.4 | null | null |
|
GHSA-34m8-5x3c-2ccr | IBM Cloud Pak for Business Automation 18.0.0, 18.0.1, 18.0.2,19.0.1, 19.0.2, 19.0.3,20.0.1, 20.0.2, 20.0.3, 21.0.1, 21.0.2, 21.0.3, 22.0.1,2 2.0.2, 23.0.1, and 23.0.2 may allow end users to query more documents than expected from a connected Enterprise Content Management system when configured to use a system account. IBM X-Force ID: 275938. | [] | null | 5.3 | null | null |
|
CVE-2022-23283 | Windows ALPC Elevation of Privilege Vulnerability | Windows ALPC Elevation of Privilege Vulnerability | [
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server:2022:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
] | null | 7 | null | null |
CVE-2017-2134 | Cross-site scripting vulnerability in ASSETBASE 8.0 and earlier allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | [
"cpe:2.3:a:uchida:assetbase:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 |
|
GHSA-gr6c-cqvp-8v33 | A vulnerability classified as problematic has been found in Netgear SRX5308 up to 4.3.5-3. Affected is an unknown function of the file scgi-bin/platform.cgi?page=firewall_logs_email.htm of the component Web Management Interface. The manipulation of the argument smtpServer.toAddr leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-227664. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | [] | null | null | 2.4 | null |
|
GHSA-qqx6-4h7m-w6xv | Cross-site scripting (XSS) vulnerability in mobile/php/translation/index.php in LiveZilla before 5.1.1.0 allows remote attackers to inject arbitrary web script or HTML via the g_language parameter. | [] | null | null | null | null |
|
CVE-2023-44997 | WordPress WP Forms Puzzle Captcha Plugin <= 4.1 is vulnerable to Cross Site Request Forgery (CSRF) | Cross-Site Request Forgery (CSRF) vulnerability in Nitin Rathod WP Forms Puzzle Captcha plugin <= 4.1 versions. | [
"cpe:2.3:a:nitinrathod:wp_forms_puzzle_captcha:*:*:*:*:*:wordpress:*:*"
] | null | 5.4 | null | null |
GHSA-mh5r-j3qx-g2vw | Cross-site scripting (XSS) vulnerability in Microsoft SharePoint Foundation 2010 SP2 allows remote authenticated users to inject arbitrary web script or HTML via a modified list, aka "SharePoint Elevation of Privilege Vulnerability." | [] | null | null | null | null |
|
CVE-2024-9414 | Cross-site Scripting vulnerability in LCDS LAquis SCADA | In LAquis SCADA version 4.7.1.511, a cross-site scripting vulnerability could allow an attacker to inject arbitrary code into a web page. This could allow an attacker to steal cookies, redirect users, or perform unauthorized actions. | [] | 7 | null | null | null |
CVE-2019-17655 | A cleartext storage in a file or on disk (CWE-313) vulnerability in FortiOS SSL VPN 6.2.0 through 6.2.2, 6.0.9 and earlier and FortiProxy 2.0.0, 1.2.9 and earlier may allow an attacker to retrieve a logged-in SSL VPN user's credentials should that attacker be able to read the session file stored on the targeted device's system. | [
"cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*"
] | null | 5.3 | null | null |
|
GHSA-rfpq-wmg2-4ww7 | In the Linux kernel, the following vulnerability has been resolved:ASoC: Intel: sof-nau8825: fix module alias overflowThe maximum name length for a platform_device_id entry is 20 characters
including the trailing NUL byte. The sof_nau8825.c file exceeds that,
which causes an obscure error message:sound/soc/intel/boards/snd-soc-sof_nau8825.mod.c:35:45: error: illegal character encoding in string literal [-Werror,-Winvalid-source-encoding]
MODULE_ALIAS("platform:adl_max98373_nau8825<U+0018><AA>");
^~~~
include/linux/module.h:168:49: note: expanded from macro 'MODULE_ALIAS'
^~~~~~
include/linux/module.h:165:56: note: expanded from macro 'MODULE_INFO'
^~~~
include/linux/moduleparam.h:26:47: note: expanded from macro '__MODULE_INFO'
= __MODULE_INFO_PREFIX __stringify(tag) "=" infoI could not figure out how to make the module handling robust enough
to handle this better, but as a quick fix, using slightly shorter
names that are still unique avoids the build issue. | [] | null | 5.5 | null | null |
|
GHSA-x4gp-983j-q9p3 | Improper access control in some Intel(R) Ethernet Controller Administrative Tools software before version 28.3 may allow an authenticated user to potentially enable escalation of privilege via local access. | [] | null | 6.7 | null | null |
|
CVE-2024-27993 | WordPress Calendarista Basic Edition plugin <= 3.0.2 - Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Typps Calendarista Basic Edition.This issue affects Calendarista Basic Edition: from n/a through 3.0.2.
| [] | null | 7.1 | null | null |
CVE-2012-6136 | tuned 2.10.0 creates its PID file with insecure permissions which allows local users to kill arbitrary processes. | [
"cpe:2.3:a:redhat:tuned:2.10.0:-:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:17:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
] | null | 5.5 | null | 4.9 |
|
CVE-2024-29733 | Apache Airflow FTP Provider: FTP_TLS instance with unverified SSL context | Improper Certificate Validation vulnerability in Apache Airflow FTP Provider.
The FTP hook lacks complete certificate validation in FTP_TLS connections, which can potentially be leveraged. Implementing proper certificate validation by passing context=ssl.create_default_context() during FTP_TLS instantiation is used as mitigation to validate the certificates properly.
This issue affects Apache Airflow FTP Provider: before 3.7.0.
Users are recommended to upgrade to version 3.7.0, which fixes the issue. | [
"cpe:2.3:a:apache:airflow:3.7.0:*:*:*:*:*:*:*"
] | null | 2.7 | null | null |
GHSA-4x7c-cx64-49w8 | Regular Expression Denial of Service in is-my-json-valid | Withdrawn: Duplicate of GHSA-f522-ffg8-j8r6 | [] | null | null | null | null |
GHSA-fj5c-r5jw-5wp8 | The frame iterator could get stuck in a loop when encountering certain wasm frames leading to incorrect stack traces. This vulnerability affects Firefox < 128. | [] | null | 5.5 | null | null |
|
GHSA-4pvw-p74p-pc99 | IOBit Advanced SystemCare Free 13.5.0.263 allows local users to gain privileges for file deletion by manipulating the Clean & Optimize feature with an NTFS junction and an Object Manager symbolic link. | [] | null | null | null | null |
|
GHSA-97qx-33fc-6rj2 | The kernel in Apple Mac OS X before 10.6.2 does not properly handle task state segments, which allows local users to gain privileges, cause a denial of service (system crash), or obtain sensitive information via unspecified vectors. | [] | null | null | null | null |
|
CVE-2006-4513 | Multiple integer overflows in the WV library in wvWare (formerly mswordview) before 1.2.3, as used by AbiWord, KWord, and possibly other products, allow user-assisted remote attackers to execute arbitrary code via a crafted Microsoft Word (DOC) file that produces (1) large LFO clfolvl values in the wvGetLFO_records function or (2) a large LFO nolfo value in the wvGetFLO_PLF function. | [
"cpe:2.3:a:wvware:wvware:*:*:*:*:*:*:*:*"
] | null | null | null | 5.1 |
|
CVE-2020-26178 | In tangro Business Workflow before 1.18.1, knowing an attachment ID, it is possible to download workitem attachments without being authenticated. | [
"cpe:2.3:a:tangro:business_workflow:*:*:*:*:*:*:*:*"
] | null | 5.3 | null | null |
|
CVE-2014-8582 | FortiNet FortiADC-E with firmware 3.1.1 before 4.0.5 and Coyote Point Equalizer with firmware 10.2.0a allows remote attackers to obtain access to arbitrary subnets via unspecified vectors. | [
"cpe:2.3:o:fortinet:coyote_point_equalizer_firmware:10.2.0a:*:*:*:*:*:*:*",
"cpe:2.3:h:fortinet:coyote_point_equalizer:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortiadc_firmware:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortiadc_firmware:3.2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortiadc_firmware:3.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortiadc_firmware:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:h:fortinet:fortiadc-1000e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:fortinet:fortiadc-300e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:fortinet:fortiadc-400e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:fortinet:fortiadc-600e:-:*:*:*:*:*:*:*"
] | null | null | null | 6.4 |
|
GHSA-ppmw-wjmq-4fr9 | SQL injection vulnerability in index.php in BlogPHP 1.0, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary SQL commands and bypass authentication via the username parameter in a login action. | [] | null | null | null | null |
|
GHSA-f4qv-92x7-9234 | McAfee Data Loss Prevention Endpoint (DLPe) before 9.3.400 allows local users to write to arbitrary memory locations, and consequently gain privileges, via a crafted (1) 0x00224014 or (2) 0x0022c018 IOCTL call. | [] | null | null | null | null |
|
CVE-2008-6027 | Multiple cross-site scripting (XSS) vulnerabilities in index.php in BLUEPAGE CMS 2.5 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) whl, (2) var_1, and (3) search parameters. | [
"cpe:2.3:a:bluepage:bluepage_cms:*:*:*:*:*:*:*:*",
"cpe:2.3:a:bluepage:bluepage_cms:2.4.0:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-2fh4-99wm-m59g | Incorrect authorization in kperfmon prior to SMR Sep-2024 Release 1 allows local attackers to access information related to performance including app usage. | [] | null | 4 | null | null |
|
GHSA-g4ph-3r63-c5p9 | Certain NETGEAR devices are affected by denial of service. This affects D3600 before 1.0.0.75, D6000 before 1.0.0.75, D7800 before 1.0.1.44, EX2700 before 1.0.1.52, EX6200v2 before 1.0.1.74, EX8000 before 1.0.1.180, R7500v2 before 1.0.3.38, R7800 before 1.0.2.58, RBK20 before 2.3.0.28, RBR20 before 2.3.0.28, RBS20 before 2.3.0.28, RBK50 before 2.3.0.32, RBR50 before 2.3.0.32, RBS50 before 2.3.0.32, RBS40 before 2.3.0.28, SRK60 before 2.2.1.210, SRR60 before 2.2.1.210, SRS60 before 2.2.1.210, WN2000RPTv3 before 1.0.1.34, WN3000RPv2 before 1.0.0.68, WN3000RPv3 before 1.0.2.70, WN3100RPv2 before 1.0.0.60, WNDR4300v2 before 1.0.0.58, and WNDR4500v3 before 1.0.0.58. | [] | null | null | null | null |
|
GHSA-hrq5-cg78-8924 | An issue was discovered on Samsung mobile devices with KK(4.4), L(5.0/5.1), M(6.0), and N(7.x) software. Attackers can crash system processes via a broadcast to AdaptiveDisplayColorService. The Samsung ID is SVE-2017-8290 (July 2017). | [] | null | null | null | null |
|
GHSA-73g5-48xw-f45p | Cross-site scripting (XSS) vulnerability in index.php in TML CMS 0.5 allows remote attackers to inject arbitrary web script or HTML via the form parameter. | [] | null | null | null | null |
|
CVE-2014-3873 | The ktrace utility in the FreeBSD kernel 8.4 before p11, 9.1 before p14, 9.2 before p7, and 9.3-BETA1 before p1 uses an incorrect page fault kernel trace entry size, which allows local users to obtain sensitive information from kernel memory via a kernel process trace. | [
"cpe:2.3:o:freebsd:freebsd:8.4:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:9.1:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:9.2:-:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:9.3:beta1:*:*:*:*:*:*"
] | null | null | null | 2.1 |
|
CVE-2021-36395 | In Moodle, the file repository's URL parsing required additional recursion handling to mitigate the risk of recursion denial of service. | [
"cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
|
GHSA-pf4c-5rqp-wmc9 | Qihoo 360 (https://www.360.cn/) Qihoo 360 Safeguard (https://www.360.cn/) Qihoo 360 Chrome (https://browser.360.cn/ee/) is affected by: Buffer Overflow. The impact is: execute arbitrary code (remote). The component is: This is a set of vulnerabilities affecting popular software, and the installation packages correspond to versions "360 Safeguard(12.1.0.1004,12.1.0.1005,13.1.0.1001)" , "360 Total Security(10.8.0.1060,10.8.0.1213)", "360 Safe Browser & 360 Chrome(12. The attack vector is: On the browser vulnerability, just open a link to complete the vulnerability exploitation remotely; on the client software, you need to locally execute the vulnerability exploitation program, which of course can be achieved with the full chain of browser vulnerability. ¶¶ This is a set of the most serious vulnerabilities that exist on Qihoo 360's PC client multiple popular software, remote vulnerabilities can be accomplished by opening a link to arbitrary code execution on both security browsers, in conjunction with the exploitation of local vulnerabilities that allow spyware to persist without being scanned to permanently reside on the target PC computer (because local vulnerabilities target Qihoo 360 company's antivirus software kernel flaws); this set of remote and local vulnerabilities in perfect coordination, to achieve an information security fallacy, on Qihoo 360's antivirus software vulnerability, not only can not be scanned out of the virus, but will help the virus persistently control the target computer, while Qihoo 360 claims to be a secure browser, which exists in the kernel vulnerability but help the composition of the remote vulnerability.(Security expert "Memory Corruptor" have reported this set of vulnerabilities to the corresponding vendor, all vulnerabilities have been fixed and the vendor rewarded thousands of dollars to this security expert) | [] | null | 8.8 | null | null |
|
GHSA-qpjq-w25x-3v84 | view.php in YaPiG 0.92b, 0.93u and 0.94u allows remote attackers to obtain sensitive information via a phid parameter that is not an integer, which reveals the path in an error message. | [] | null | null | null | null |
|
GHSA-fw34-2587-pprf | Microsoft introduced a new feature in Windows 10 known as Cloud Clipboard which, if enabled, will record data copied to the clipboard to the cloud, and make it available on other computers in certain scenarios. Applications that wish to prevent copied data from being recorded in Cloud History must use specific clipboard formats; and Firefox before versions 94 and ESR 91.3 did not implement them. This could have caused sensitive data to be recorded to a user's Microsoft account. *This bug only affects Firefox for Windows 10+ with Cloud Clipboard enabled. Other operating systems are unaffected.*. This vulnerability affects Firefox < 94, Thunderbird < 91.3, and Firefox ESR < 91.3. | [] | null | null | null | null |
|
GHSA-fmf8-f8cv-gwh7 | Due to lack of proper memory management, when a victim opens manipulated Wavefront Object (.obj, ObjTranslator.exe) file received from untrusted sources in SAP 3D Visual Enterprise Viewer - version 9, it is possible for the application to crash and becomes temporarily unavailable to the user until restart of the application. | [] | null | 7.8 | null | null |
|
GHSA-5f7g-9m8m-qhpv | Integer signedness error in libc/string/arm/memset.S in uClibc and uClibc-ng before 1.0.16 allows context-dependent attackers to cause a denial of service (crash) via a negative length value to the memset function. | [] | null | 7.5 | null | null |
|
GHSA-9rcm-4wjg-wvhc | Cross-site scripting (XSS) vulnerability in Mahara before 1.3.6 allows remote authenticated users to inject arbitrary web script or HTML via vectors associated with HTML e-mail messages, related to artefact/comment/lib.php and interaction/forum/lib.php. | [] | null | null | null | null |
|
CVE-2018-19493 | An issue was discovered in GitLab Community and Enterprise Edition 11.x before 11.3.11, 11.4.x before 11.4.8, and 11.5.x before 11.5.1. There is a persistent XSS vulnerability in the environment pages due to a lack of input validation and output encoding. | [
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*"
] | null | null | 6.1 | 4.3 |
|
GHSA-2428-22pj-prpw | The Owned smart contract implementation for Aurora DAO (AURA), an Ethereum ERC20 token, allows attackers to acquire contract ownership because the setOwner function is declared as public. An attacker can then conduct a lockBalances() denial of service attack. | [] | null | null | 7.5 | null |
|
CVE-2017-9187 | libautotrace.a in AutoTrace 0.31.1 has a "cannot be represented in type int" issue in input-bmp.c:486:7. | [
"cpe:2.3:a:autotrace_project:autotrace:0.31.1:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 |
|
GHSA-7qm4-x2fh-jx7w | Directory traversal vulnerability in the web server in Certec atvise webMI2ADS (aka webMI) before 2.0.2 allows remote attackers to read arbitrary files via a crafted HTTP request. | [] | null | null | null | null |
|
CVE-2023-48470 | Adobe Experience Manager | Cross-site Scripting (DOM-based XSS) (CWE-79) | Adobe Experience Manager versions 6.5.18 and earlier are affected by a Cross-site Scripting (DOM-based XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser. | [
"cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:experience_manager_cloud_service:*:*:*:*:*:*:*:*"
] | null | 5.4 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.