id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
4.89k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
GHSA-wfwf-ggr2-rpjf | A vulnerability has been found in GNU ncurses up to 6.5-20250322 and classified as problematic. This vulnerability affects the function postprocess_termcap of the file tinfo/parse_entry.c. The manipulation leads to stack-based buffer overflow. The attack needs to be approached locally. Upgrading to version 6.5-20250329 is able to address this issue. It is recommended to upgrade the affected component. | []
| 4.8 | 3.3 | null | null |
|
GHSA-mprp-f34x-hghq | User Interface (UI) Misrepresentation of Critical Information vulnerability in the address bar of UCWeb's UC Browser allows an attacker to obfuscate the true source of data as presented in the browser. This issue affects UCWeb's UC Browser version 13.0.8 and prior versions. | []
| null | null | null | null |
|
CVE-2021-4318 | Object corruption in Blink in Google Chrome prior to 94.0.4606.54 allowed a remote attacker to potentially exploit object corruption via a crafted HTML page. (Chromium security severity: High) | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
]
| null | 8.8 | null | null |
|
CVE-2007-4253 | SQL injection vulnerability in the News module in modules.php in Envolution 1.1.0 and earlier allows remote attackers to execute arbitrary SQL commands via the topic parameter, a different vector than CVE-2005-4263. | [
"cpe:2.3:a:envolution:envolution:*:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
RHSA-2019:0265 | Red Hat Security Advisory: Red Hat Gluster Storage Web Administration security update | django: Catastrophic backtracking in regular expressions via 'urlize' and 'urlizetrunc' django: Catastrophic backtracking in regular expressions via 'truncatechars_html' and 'truncatewords_html' django: Open redirect possibility in CommonMiddleware | [
"cpe:/a:redhat:storage:3.4:na:el7",
"cpe:/a:redhat:storage:3.4:wa:el7"
]
| null | null | 4.7 | null |
CVE-2021-34737 | Cisco IOS XR Software DHCP Version 4 Server Denial of Service Vulnerability | A vulnerability in the DHCP version 4 (DHCPv4) server feature of Cisco IOS XR Software could allow an unauthenticated, remote attacker to trigger a crash of the dhcpd process, resulting in a denial of service (DoS) condition. This vulnerability exists because certain DHCPv4 messages are improperly validated when they are processed by an affected device. An attacker could exploit this vulnerability by sending a malformed DHCPv4 message to an affected device. A successful exploit could allow the attacker to cause a NULL pointer dereference, resulting in a crash of the dhcpd process. While the dhcpd process is restarting, which may take up to approximately two minutes, DHCPv4 server services are unavailable on the affected device. This could temporarily prevent network access to clients that join the network during that time period. Note: Only the dhcpd process crashes and eventually restarts automatically. The router does not reload. | [
"cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_9000v-v2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_9001:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_9006:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_9010:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_9901:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_9902:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_9903:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_9904:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_9906:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_9910:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_9912:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_9922:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ios_xrv_9000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ncs540-12z20g-sys-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ncs540-12z20g-sys-d:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ncs540-24z8q2c-m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ncs540-24z8q2c-sys:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ncs540-28z4c-sys-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ncs540-28z4c-sys-d:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ncs540-acc-sys:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ncs540x-12z16g-sys-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ncs540x-12z16g-sys-d:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ncs540x-16z4g8q2c-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ncs540x-16z4g8q2c-d:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ncs540x-acc-sys:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ncs_5001:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ncs_5002:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ncs_5011:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ncs_560-4:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ncs_560-7:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ncs_5501:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ncs_5501-se:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ncs_5502:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ncs_5502-se:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ncs_5508:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ncs_5516:-:*:*:*:*:*:*:*"
]
| null | 5.8 | null | null |
CVE-2005-3856 | The Popular URL capability (popularurls.cpp) in Krusader 1.60.0 and 1.70.0-beta1 saves passwords in cleartext in the krusaderrc file when the user enters URLs containing passwords in the panel URL field, which might allow attackers to access other sites. | [
"cpe:2.3:a:krusader:krusader:1.60.0:*:*:*:*:*:*:*",
"cpe:2.3:a:krusader:krusader:1.70.0_beta1:*:*:*:*:*:*:*"
]
| null | null | null | 4 |
|
CVE-2019-19960 | In wolfSSL before 4.3.0, wc_ecc_mulmod_ex does not properly resist side-channel attacks. | [
"cpe:2.3:a:wolfssl:wolfssl:*:*:*:*:*:*:*:*"
]
| null | 5.3 | null | 4.3 |
|
CVE-2020-12105 | OpenConnect through 8.08 mishandles negative return values from X509_check_ function calls, which might assist attackers in performing man-in-the-middle attacks. | [
"cpe:2.3:a:infradead:openconnect:*:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"
]
| null | 5.9 | null | 4.3 |
|
CVE-2020-16884 | Internet Explorer Browser Helper Object (BHO) Memory Corruption Vulnerability | <p>A remote code execution vulnerability exists in the way that the IEToEdge Browser Helper Object (BHO) plugin on Internet Explorer handles objects in memory. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user.</p>
<p>In a web-based attack scenario, an attacker could host a specially crafted website that is designed to exploit this vulnerability and then convince a user to view the website. An attacker would have no way to force users to view the attacker-controlled content. Instead, an attacker would have to convince users to take action, typically by getting them to click a link in an email message or in an Instant Messenger message that takes users to the attacker's website, or by opening an attachment sent through email. If the current user is logged on with administrative user rights, an attacker who successfully exploited the vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.</p>
<p>The security update addresses the vulnerability by modifying how the IEToEdge BHO plug-in handles objects in memory.</p>
| [
"cpe:2.3:a:microsoft:edge_chromium:*:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*"
]
| null | 4.2 | null | null |
RHSA-2024:5453 | Red Hat Security Advisory: Fence Agents Remediation 0.4.1 - Security update | fence-agents-remediation: Fence Agent Command Line Options Leads to Remote Code Execution | [
"cpe:/a:redhat:workload_availability_fence_agents_remediation:0.4::el8"
]
| null | 8.8 | null | null |
GHSA-h874-8cgj-mc28 | Microsoft SharePoint Server Remote Code Execution Vulnerability. | []
| null | 8.8 | null | null |
|
CVE-2022-20569 | In thermal_cooling_device_stats_update of thermal_sysfs.c, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege in the kernel with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-229258234References: N/A | [
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
]
| null | 6.7 | null | null |
|
CVE-2007-5105 | Cross-site scripting (XSS) vulnerability in wp-register.php in WordPress 2.0 and 2.0.1 allows remote attackers to inject arbitrary web script or HTML via the user_email parameter. | [
"cpe:2.3:a:wordpress:wordpress:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.0.1:*:*:*:*:*:*:*"
]
| null | null | null | 4.3 |
|
GHSA-c3vj-q3f8-r9c3 | editproducts.cgi in Bugzilla 2.14.x before 2.14.4, and 2.16.x before 2.16.1, when the "usebuggroups" feature is enabled and more than 47 groups are specified, does not properly calculate bit values for large numbers, which grants extra permissions to users via known features of Perl math that set multiple bits. | []
| null | null | null | null |
|
GHSA-429q-ccqc-32wq | Improper link resolution before file access ('link following') in Windows Update Stack allows an authorized attacker to elevate privileges locally. | []
| null | 7.8 | null | null |
|
GHSA-j7hw-9rwh-r263 | Unspecified vulnerability in Sun Java System Identity Manager (aka IdM) 8.1.0.5 and 8.1.0.6, when Sun Java System Access Manager, OpenSSO Enterprise 8.0, or IBM Tivoli Access Manager is used, allows remote attackers to obtain administrative access via unknown vectors. | []
| null | null | null | null |
|
GHSA-8h36-wvg6-2pj9 | Wowza Streaming Engine through 4.8.5 (in a default installation) has incorrect file permissions of configuration files in the conf/ directory. A regular local user is able to read and write to all the configuration files, e.g., modify the application server configuration. | []
| null | null | null | null |
|
CVE-2018-4097 | An issue was discovered in certain Apple products. macOS before 10.13.3 is affected. The issue involves the "Kernel" component. It allows attackers to execute arbitrary code in a privileged context via a crafted app. | [
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
]
| null | null | 7.8 | 9.3 |
|
GHSA-482g-pf4j-cwfc | TrueStack Direct Connect 1.4.7 has Incorrect Access Control. | []
| null | 9.8 | null | null |
|
GHSA-pqq6-6c9f-5mpm | A buffer overflow vulnerability exist in the web-based GUI of Schneider Electric's Pelco Sarix Professional in all firmware versions prior to 3.29.67 which could allow an unauthenticated, remote attacker to execute arbitrary code. | []
| null | 9.8 | null | null |
|
GHSA-4244-mrv4-7597 | Multiple cross-site request forgery (CSRF) vulnerabilities in password.php in PHPmotion 2.1 and earlier allow remote attackers to hijack the authentication of arbitrary users for requests that modify an account via the (1) password or (2) email_address parameter. | []
| null | null | null | null |
|
GHSA-275w-m9g6-w2cc | The JavaScript engine in Mozilla Firefox before 3.0.9, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.16 allows remote attackers to cause a denial of service (application crash) and possibly trigger memory corruption via vectors involving JSOP_DEFVAR and properties that lack the JSPROP_PERMANENT attribute. | []
| null | null | null | null |
|
GHSA-wv2m-x4pc-hcv2 | A vulnerability, which was classified as critical, has been found in itsourcecode Vehicle Management System 1.0. This issue affects some unknown processing of the file driverprofile.php. The manipulation of the argument driverid leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-269165 was assigned to this vulnerability. | []
| 6.9 | 7.3 | null | null |
|
CVE-2022-40960 | Concurrent use of the URL parser with non-UTF-8 data was not thread-safe. This could lead to a use-after-free causing a potentially exploitable crash. This vulnerability affects Firefox ESR < 102.3, Thunderbird < 102.3, and Firefox < 105. | [
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*"
]
| null | 6.5 | null | null |
|
RHSA-2022:0266 | Red Hat Security Advisory: polkit security update | polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector | [
"cpe:/o:redhat:rhel_eus:8.4::baseos"
]
| null | 7.8 | null | null |
GHSA-rmxw-c48h-2vf5 | XWiki Platform privilege escalation from script right to programming right through title displayer | ImpactIn XWiki Platform, it's possible for a user to write a script in which any velocity content is executed with the right of any other document content author.To reproduce:As a user with script but not programming right, create a document with the following content:Since this API require programming right and the user does not have it, the expected result is `$doc.document.authors.contentAuthor` (not executed script), unfortunately with the security vulnerability we get `XWiki.superadmin` which shows that the title was executed with the right of the unmodified document.PatchesThis has been patched in XWiki 14.10.7 and 15.2-RC-1.WorkaroundsThere are no known workarounds for it.Referenceshttps://jira.xwiki.org/browse/XWIKI-20624https://github.com/xwiki/xwiki-platform/commit/11a9170dfe63e59f4066db67f84dbfce4ed619c6https://jira.xwiki.org/browse/XWIKI-20625https://github.com/xwiki/xwiki-platform/commit/41d7dca2d30084966ca6a7ee537f39ee8354a7e3For more informationIf you have any questions or comments about this advisory:Open an issue in [Jira XWiki.org](https://jira.xwiki.org/)Email us at [Security Mailing List](mailto:[email protected]) | []
| null | 9.1 | null | null |
CVE-2006-6730 | OpenBSD and NetBSD permit usermode code to kill the display server and write to the X.Org /dev/xf86 device, which allows local users with root privileges to reduce securelevel by replacing the System Management Mode (SMM) handler via a write to an SMRAM address within /dev/xf86 (aka the video card memory-mapped I/O range), and then launching the new handler via a System Management Interrupt (SMI), as demonstrated by a write to Programmed I/O port 0xB2. | [
"cpe:2.3:o:netbsd:netbsd:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:openbsd:openbsd:*:*:*:*:*:*:*:*"
]
| null | null | null | 6.6 |
|
RHSA-2021:0019 | Red Hat Security Advisory: kernel security and bug fix update | kernel: race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c leads to use-after-free kernel: use-after-free in drivers/bluetooth/hci_ldisc.c kernel: out-of-bounds write via crafted keycode table | [
"cpe:/o:redhat:rhel_eus:7.7::computenode",
"cpe:/o:redhat:rhel_eus:7.7::server"
]
| null | 6.7 | null | null |
RHSA-2021:3639 | Red Hat Security Advisory: nodejs:12 security and bug fix update | c-ares: Missing input validation of host names may lead to domain hijacking libuv: out-of-bounds read in uv__idna_toascii() can lead to information disclosures or crashes nodejs: Use-after-free on close http2 on stream canceling nodejs: Improper handling of untypical characters in domain names nodejs: Incomplete validation of tls rejectUnauthorized parameter nodejs: Use-after-free on close http2 on stream canceling nodejs-path-parse: ReDoS via splitDeviceRe, splitTailRe and splitPathRe nodejs-hosted-git-info: Regular Expression denial of service via shortcutMatch in fromUrl() nodejs-ssri: Regular expression DoS (ReDoS) when parsing malicious SRI in strict mode nodejs-tar: Insufficient symlink protection allowing arbitrary file creation and overwrite nodejs-tar: Insufficient absolute path sanitization allowing arbitrary file creation and overwrite | [
"cpe:/a:redhat:rhel_eus:8.1::appstream"
]
| null | 8.1 | null | null |
CVE-2025-28910 | WordPress WP Hide Admin Bar plugin <= 2.0 - Cross Site Request Forgery (CSRF) vulnerability | Cross-Site Request Forgery (CSRF) vulnerability in Ravinder Khurana WP Hide Admin Bar allows Cross Site Request Forgery. This issue affects WP Hide Admin Bar: from n/a through 2.0. | []
| null | 4.3 | null | null |
GHSA-j47p-2qwf-vg8r | Multiple vulnerabilities in the CLI of Cisco IOS XE SD-WAN Software could allow an authenticated, local attacker to access the underlying operating system with root privileges. These vulnerabilities are due to insufficient input validation of certain CLI commands. An attacker could exploit these vulnerabilities by authenticating to the device and submitting crafted input to the CLI. The attacker must be authenticated as an administrative user to execute the affected commands. A successful exploit could allow the attacker to access the underlying operating system with root privileges. | []
| null | null | null | null |
|
CVE-2023-48909 | An issue was discovered in Jave2 version 3.3.1, allows attackers to execute arbitrary code via the FFmpeg function. | [
"cpe:2.3:a:aarboard:jave2:3.3.1:*:*:*:*:*:*:*"
]
| null | 8.8 | null | null |
|
GHSA-2cqh-qv2p-63f8 | Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are Prior to 5.2.32 and prior to 6.0.10. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H). | []
| null | null | null | null |
|
GHSA-qg26-364g-r67q | Cross-site scripting (XSS) vulnerability in the Dashboard in Splunk Enterprise 6.2.x before 6.2.4 and Splunk Light 6.2.x before 6.2.4 allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors. | []
| null | null | null | null |
|
CVE-2021-46903 | An issue was discovered in LTOS-Web-Interface in Meinberg LANTIME-Firmware before 6.24.029 MBGID-9343 and 7 before 7.04.008 MBGID-6303. An admin can delete required user accounts (in violation of expected access control). | [
"cpe:2.3:o:meinbergglobal:lantime_firmware:*:*:*:*:*:*:*:*"
]
| null | 6.5 | null | null |
|
CVE-2025-0478 | GPU DDK - PMMETA_PROTECT PMR can be exported as dma-buf file / GEM object | Software installed and run as a non-privileged user may conduct improper GPU system calls to issue reads and writes to arbitrary physical memory pages.
Under certain circumstances this exploit could be used to corrupt data pages not allocated by the GPU driver but memory pages in use by the kernel and drivers running on the platform, altering their behaviour. | []
| null | 7.8 | null | null |
GHSA-cjxj-mgrm-h6pj | IBM CICS Transaction Gateway for Multiplatforms 9.2 and 9.3 transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval. IBM X-Force ID: 273612. | []
| null | 4.9 | null | null |
|
GHSA-cxvp-82cq-57h2 | blurhash panics on parsing crafted inputs | ImpactThe blurhash parsing code may panic due to multiple panic-guarded out-of-bounds accesses on untrusted input.In a typical deployment, this may get triggered by feeding a maliciously crafted blurhashes over the network. These may include:UTF-8 compliant strings containing multi-byte UTF-8 charactersPatchesThe patches will be released under version 0.2.0, which requires user intervention because of slight API churn.Workaroundsn.a.Referencesn.a. | []
| null | 8.6 | null | null |
GHSA-vjh7-4pq5-g5fg | The Windows kernel component on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an information disclosure vulnerability when it improperly handles objects in memory, aka "Windows Kernel Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-8708, CVE-2017-8709, and CVE-2017-8719. | []
| null | null | 5.5 | null |
|
GHSA-w54m-96qg-mxgp | An issue was discovered in the rollback feature of Elastic Endpoint Security for Windows, which could allow unprivileged users to elevate their privileges to those of the LocalSystem account. | []
| null | 7.8 | null | null |
|
GHSA-fwcj-3qh9-2r6v | Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability | []
| null | 6.5 | null | null |
|
GHSA-cqf6-jq4c-f554 | The DeBounce Email Validator plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'from', 'to', and 'key' parameters in all versions up to, and including, 5.6.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. | []
| null | 6.1 | null | null |
|
GHSA-vqcr-x37r-x4j8 | Vulnerability in the Oracle Banking Treasury Management product of Oracle Financial Services Applications (component: Infrastructure). The supported version that is affected is 14.5. Difficult to exploit vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Banking Treasury Management. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Banking Treasury Management accessible data as well as unauthorized read access to a subset of Oracle Banking Treasury Management accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Banking Treasury Management. CVSS 3.1 Base Score 5.9 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:H/A:L). | []
| null | 5.9 | null | null |
|
CVE-2021-39145 | XStream is vulnerable to an Arbitrary Code Execution attack | XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose. | [
"cpe:2.3:a:xstream_project:xstream:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*",
"cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*",
"cpe:2.3:a:oracle:business_activity_monitoring:12.2.1.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:commerce_guided_search:11.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_billing_and_revenue_management_elastic_charging_engine:11.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_billing_and_revenue_management_elastic_charging_engine:12.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:1.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:1.10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_cloud_native_core_policy:1.14.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_unified_inventory_management:7.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_unified_inventory_management:7.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:retail_xstore_point_of_service:16.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:retail_xstore_point_of_service:17.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:retail_xstore_point_of_service:18.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:retail_xstore_point_of_service:19.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:retail_xstore_point_of_service:20.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:utilities_framework:4.2.0.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:utilities_framework:4.2.0.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:utilities_framework:4.3.0.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:utilities_framework:4.3.0.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:utilities_framework:4.4.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:utilities_framework:4.4.0.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:utilities_framework:4.4.0.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:utilities_testing_accelerator:6.0.0.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:webcenter_portal:12.2.1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:webcenter_portal:12.2.1.4.0:*:*:*:*:*:*:*"
]
| null | 8.5 | null | null |
GHSA-c246-pm63-mr5c | addnetpr in IRIX 5.3 and 6.2 allows local users to overwrite arbitrary files and possibly gain root privileges via a symlink attack on the printers temporary file. | []
| null | null | null | null |
|
CVE-2013-0714 | IPSSH (aka the SSH server) in Wind River VxWorks 6.5 through 6.9 allows remote attackers to execute arbitrary code or cause a denial of service (daemon hang) via a crafted public-key authentication request. | [
"cpe:2.3:o:windriver:vxworks:6.5:*:*:*:*:*:*:*",
"cpe:2.3:o:windriver:vxworks:6.6:*:*:*:*:*:*:*",
"cpe:2.3:o:windriver:vxworks:6.7:*:*:*:*:*:*:*",
"cpe:2.3:o:windriver:vxworks:6.8:*:*:*:*:*:*:*",
"cpe:2.3:o:windriver:vxworks:6.9:*:*:*:*:*:*:*"
]
| null | null | null | 10 |
|
CVE-2008-4401 | ActionScript in Adobe Flash Player 9.0.124.0 and earlier does not require user interaction in conjunction with (1) the FileReference.browse operation in the FileReference upload API or (2) the FileReference.download operation in the FileReference download API, which allows remote attackers to create a browse dialog box, and possibly have unspecified other impact, via an SWF file. | [
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.25:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.63:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.69.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.70.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0_r67:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:8.0.24.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:8.0.34.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:8.0.35.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:8.0.39.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.112.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*"
]
| null | null | null | 10 |
|
PYSEC-2021-477 | null | TensorFlow is an end-to-end open source platform for machine learning. An attacker can cause a runtime division by zero error and denial of service in `tf.raw_ops.QuantizedBatchNormWithGlobalNormalization`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/6f26b3f3418201479c264f2a02000880d8df151c/tensorflow/core/kernels/quantized_add_op.cc#L289-L295) computes a modulo operation without validating that the divisor is not zero. Since `vector_num_elements` is determined based on input shapes(https://github.com/tensorflow/tensorflow/blob/6f26b3f3418201479c264f2a02000880d8df151c/tensorflow/core/kernels/quantized_add_op.cc#L522-L544), a user can trigger scenarios where this quantity is 0. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. | []
| null | null | null | null |
RHSA-2024:1786 | Red Hat Security Advisory: httpd:2.4/mod_http2 security update | httpd: CONTINUATION frames DoS | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
]
| null | 7.5 | null | null |
GHSA-jj4v-f22v-8gx6 | Format string vulnerability in panoFileOutputNamesCreate() in libpano13 2.9.20~rc2+dfsg-3 and earlier can lead to read and write arbitrary memory values. | []
| null | 9.8 | null | null |
|
CVE-2024-25898 | A XSS vulnerability was found in the ChurchCRM v.5.5.0 functionality, edit your event, where malicious JS or HTML code can be inserted in the Event Sermon field in EventEditor.php. | []
| null | 6.1 | null | null |
|
GHSA-p4v2-w6qq-pp7v | Multiple vulnerabilities in the web UI of Cisco Smart Software Manager Satellite could allow an unauthenticated, remote attacker to execute arbitrary commands on the underlying operating system. For more information about these vulnerabilities, see the Details section of this advisory. | []
| null | 8.8 | null | null |
|
CVE-2019-7715 | An issue was discovered in the Interpeak IPCOMShell TELNET server on Green Hills INTEGRITY RTOS 5.0.4. The main shell handler function uses the value of the environment variable ipcom.shell.greeting as the first argument to printf(). Setting this variable using the sysvar command results in a user-controlled format string during login, resulting in an information leak of memory addresses. | [
"cpe:2.3:o:ghs:integrity_rtos:5.0.4:*:*:*:*:*:*:*"
]
| null | null | 7.5 | 5 |
|
CVE-2014-3470 | The ssl3_send_client_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h, when an anonymous ECDH cipher suite is used, allows remote attackers to cause a denial of service (NULL pointer dereference and client crash) by triggering a NULL certificate value. | [
"cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:storage:2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:*:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:5:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:*:*:*:*:*:*:*"
]
| null | null | null | 4.3 |
|
GHSA-47h2-cvf5-94gh | Metasys? ADS/ADX servers and NAE/NIE/NCE engines prior to 9.0 make use of a shared RSA key pair for certain encryption operations involving the Site Management Portal (SMP). | []
| null | null | 9.1 | null |
|
CVE-2018-10747 | An issue was discovered on D-Link DSL-3782 EU 1.01 devices. An authenticated user can pass a long buffer as an 'unset' parameter to the '/userfs/bin/tcapi' binary (in the Diagnostics component) using the 'unset <node_name>' function and cause memory corruption. Furthermore, it is possible to redirect the flow of the program and execute arbitrary code. | [
"cpe:2.3:o:d-link:dsl-3782_firmware:1.01:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dsl-3782:-:*:*:*:*:*:*:*"
]
| null | null | 8.8 | 9 |
|
GHSA-2mgj-mwvf-mpg5 | Missing permission checks in Jenkins Proxmox Plugin | Jenkins Proxmox Plugin 0.7.0 and earlier does not perform a permission check in several HTTP endpoints, allowing attackers with Overall/Read permission to connect to an attacker-specified host using attacker-specified username and password (perform a connection test), disable SSL/TLS validation for the entire Jenkins controller JVM as part of the connection test (see CVE-2022-28142), and test a rollback with attacker-specified parameters. | []
| null | 6.5 | null | null |
GHSA-h92f-vrw9-38g7 | Vulnerability in the Oracle Retail Open Commerce Platform component of Oracle Retail Applications (subcomponent: Website). Supported versions that are affected are 5.0, 5.1, 5.2, 5.3, 6.0, 6.1, 15.0 and 15.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Retail Open Commerce Platform. While the vulnerability is in Oracle Retail Open Commerce Platform, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Retail Open Commerce Platform accessible data. CVSS 3.0 Base Score 5.8 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N). | []
| null | null | 5.8 | null |
|
GHSA-phwj-5f67-567g | Cross-site scripting (XSS) vulnerability in bios.php in PHP Scripts Now President Bios allows remote attackers to inject arbitrary web script or HTML via the rank parameter. | []
| null | null | null | null |
|
CVE-2023-45005 | WordPress Seriously Simple Stats Plugin <= 1.5.1 is vulnerable to Cross Site Scripting (XSS) | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Castos Seriously Simple Stats plugin <= 1.5.1 versions. | [
"cpe:2.3:a:castos:seriously_simple_stats:*:*:*:*:*:wordpress:*:*"
]
| null | 7.1 | null | null |
GHSA-r5gm-4p5w-pq2p | Remote code execution in verot/class.upload.php | class.upload.php in verot.net class.upload before 1.0.3 and 2.x before 2.0.4, as used in the K2 extension for Joomla! and other products, omits .phar from the set of dangerous file extensions. | []
| null | 9.8 | null | null |
CVE-2023-1854 | SourceCodester Online Graduate Tracer System session expiration | A vulnerability, which was classified as problematic, was found in SourceCodester Online Graduate Tracer System 1.0. Affected is an unknown function of the file admin/. The manipulation leads to session expiration. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-224994 is the identifier assigned to this vulnerability. | [
"cpe:2.3:a:online_graduate_tracer_system_project:online_graduate_tracer_system:1.0:*:*:*:*:*:*:*"
]
| null | 4.7 | 4.7 | 5.8 |
GHSA-558h-95cj-fx2w | WebKit, as used in Apple Safari before 6.2.4, 7.x before 7.1.4, and 8.x before 8.0.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other CVEs listed in APPLE-SA-2015-03-17-1. | []
| null | null | null | null |
|
CVE-2022-23597 | Remote program execution with user interaction | Element Desktop is a Matrix client for desktop platforms with Element Web at its core. Element Desktop before 1.9.7 is vulnerable to a remote program execution bug with user interaction. The exploit is non-trivial and requires clicking on a malicious link, followed by another button click. To the best of our knowledge, the vulnerability has never been exploited in the wild. If you are using Element Desktop < 1.9.7, we recommend upgrading at your earliest convenience. If successfully exploited, the vulnerability allows an attacker to specify a file path of a binary on the victim's computer which then gets executed. Notably, the attacker does *not* have the ability to specify program arguments. However, in certain unspecified configurations, the attacker may be able to specify an URI instead of a file path which then gets handled using standard platform mechanisms. These may allow exploiting further vulnerabilities in those mechanisms, potentially leading to arbitrary code execution. | [
"cpe:2.3:a:element:desktop:*:*:*:*:*:node.js:*:*"
]
| null | 8.3 | null | null |
GHSA-m37c-6f53-22x7 | Cross-site scripting (XSS) vulnerability in index.php in Cescripts Realty Home Rent allows remote attackers to inject arbitrary web script or HTML via the sel_menu parameter. NOTE: the vendor notified CVE on 20060823 that "All issues concerning this script and others at cescripts.com have been addressed and fixed." | []
| null | null | null | null |
|
CVE-2017-14944 | Inedo ProGet before 4.7.14 does not properly address dangerous package IDs during package addition, aka PG-1060. | [
"cpe:2.3:a:inedo:proget:*:*:*:*:*:*:*:*"
]
| null | null | 7.5 | 5 |
|
CVE-2023-38187 | Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability | Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability | [
"cpe:2.3:a:microsoft:edge_chromium:*:*:*:*:*:*:*:*"
]
| null | 6.5 | null | null |
CVE-2024-39473 | ASoC: SOF: ipc4-topology: Fix input format query of process modules without base extension | In the Linux kernel, the following vulnerability has been resolved:
ASoC: SOF: ipc4-topology: Fix input format query of process modules without base extension
If a process module does not have base config extension then the same
format applies to all of it's inputs and the process->base_config_ext is
NULL, causing NULL dereference when specifically crafted topology and
sequences used. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.10.0:rc1:*:*:*:*:*:*"
]
| null | 5.5 | null | null |
GHSA-8fmj-33gw-g7pw | Denial of service of Minder Server from maliciously crafted GitHub attestations | Minder is vulnerable to a denial-of-service (DoS) attack which could allow an attacker to crash the Minder server and deny other users access to it.The root cause of the vulnerability is that Minders sigstore verifier reads an untrusted response entirely into memory without enforcing a limit on the response body. An attacker can exploit this by making Minder make a request to an attacker-controlled endpoint which returns a response with a large body which will crash the Minder server.Specifically, the point of failure is where Minder parses the response from the GitHub attestations endpoint in `getAttestationReply`. Here, Minder makes a request to the `orgs/$owner/attestations/$checksumref` GitHub endpoint (line 285) and then parses the response into the `AttestationReply` (line 295):https://github.com/stacklok/minder/blob/daccbc12e364e2d407d56b87a13f7bb24cbdb074/internal/verifier/sigstore/container/container.go#L271-L300The way Minder parses the response on line 295 makes it prone to DoS if the response is large enough. Essentially, the response needs to be larger than the machine has available memory.To demonstrate this in an isolated way, consider the following example:This example mimics the behavior of Minders `getAttestationReply` and how a malicious response body passed to `getAttestationReply’s` parsing of the response will cause DoS.When running this script locally on my system, Go incrementally increases memory consumption up to above 90%, freezes the machine and then performs a sigkill.Attack vectorThe content that is hosted at the `orgs/$owner/attestations/$checksumref` GitHub attestation endpoint is controlled by users including unauthenticated users to Minders threat model. However, a user will need to configure their own Minder settings to cause Minder to make Minder send a request to fetch the attestations. The user would need to know of a package whose attestations were configured in such a way that they would return a large response when fetching them. As such, the steps needed to carry out this attack would look as such:The attacker adds a package to ghcr.io with attestations that can be fetched via the `orgs/$owner/attestations/$checksumref` GitHub endpoint.The attacker registers on Minder and makes Minder fetch the attestations.Minder fetches attestations and crashes thereby being denied of service. | []
| null | 5.3 | null | null |
CVE-2023-22581 | White Rabbit Switch - Unauthenticated remote code execution | White Rabbit Switch contains a vulnerability which makes it possible for an attacker to perform system commands under the context of the web application (the default installation makes the webserver run as the root user). | [
"cpe:2.3:o:home.cern:white_rabbit_switch_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:home.cern:white_rabbit_switch:-:*:*:*:*:*:*:*"
]
| null | 9.8 | null | null |
CVE-2024-44100 | Android before 2024-10-05 on Google Pixel devices allows information disclosure in the modem component, A-299774545. | [
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*",
"cpe:2.3:h:google:pixel:-:*:*:*:*:*:*:*",
"cpe:2.3:h:google:pixel_2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:google:pixel_2_xl:-:*:*:*:*:*:*:*",
"cpe:2.3:h:google:pixel_3:-:*:*:*:*:*:*:*",
"cpe:2.3:h:google:pixel_3_xl:-:*:*:*:*:*:*:*",
"cpe:2.3:h:google:pixel_3a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:google:pixel_3a_xl:-:*:*:*:*:*:*:*",
"cpe:2.3:h:google:pixel_4:-:*:*:*:*:*:*:*",
"cpe:2.3:h:google:pixel_4_xl:-:*:*:*:*:*:*:*",
"cpe:2.3:h:google:pixel_4a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:google:pixel_4a_5g:-:*:*:*:*:*:*:*",
"cpe:2.3:h:google:pixel_5:-:*:*:*:*:*:*:*",
"cpe:2.3:h:google:pixel_5a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:google:pixel_6:-:*:*:*:*:*:*:*",
"cpe:2.3:h:google:pixel_6_pro:-:*:*:*:*:*:*:*",
"cpe:2.3:h:google:pixel_6a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:google:pixel_7:-:*:*:*:*:*:*:*",
"cpe:2.3:h:google:pixel_7_pro:-:*:*:*:*:*:*:*",
"cpe:2.3:h:google:pixel_7a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:google:pixel_8:-:*:*:*:*:*:*:*",
"cpe:2.3:h:google:pixel_8_pro:-:*:*:*:*:*:*:*",
"cpe:2.3:h:google:pixel_8a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:google:pixel_9:-:*:*:*:*:*:*:*",
"cpe:2.3:h:google:pixel_9_pro:-:*:*:*:*:*:*:*",
"cpe:2.3:h:google:pixel_9_pro_fold:-:*:*:*:*:*:*:*",
"cpe:2.3:h:google:pixel_c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:google:pixel_fold:-:*:*:*:*:*:*:*",
"cpe:2.3:h:google:pixel_pro_xl:-:*:*:*:*:*:*:*",
"cpe:2.3:h:google:pixel_slate:-:*:*:*:*:*:*:*",
"cpe:2.3:h:google:pixel_tablet:-:*:*:*:*:*:*:*",
"cpe:2.3:h:google:pixel_xl:-:*:*:*:*:*:*:*"
]
| null | 7.5 | null | null |
|
CVE-2017-9346 | In Wireshark 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the SoulSeek dissector could go into an infinite loop. This was addressed in epan/dissectors/packet-slsk.c by making loop bounds more explicit. | [
"cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*"
]
| null | null | 7.5 | 7.8 |
|
CVE-2018-15193 | A CSRF vulnerability in the admin panel in Gogs through 0.11.53 allows remote attackers to execute admin operations via a crafted issue / link. | [
"cpe:2.3:a:gogs:gogs:0.11.53:*:*:*:*:*:*:*"
]
| null | null | 8.8 | 6.8 |
|
CVE-2023-21445 | Improper access control vulnerability in MyFiles prior to versions 12.2.09 in Android R(11), 13.1.03.501 in Android S(12) and 14.1.00.422 in Android T(13) allows local attacker to write file with MyFiles privilege via implicit intent. | [
"cpe:2.3:o:samsung:android:11.0:-:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-apr-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-apr-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-apr-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-aug-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-aug-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-aug-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-dec-2020-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-dec-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-dec-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-dec-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-feb-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-feb-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-feb-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-jan-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-jan-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-jul-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-jul-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-jul-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-jun-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-jun-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-jun-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-mar-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-mar-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-mar-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-may-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-may-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-may-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-nov-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-nov-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-nov-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-oct-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-oct-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-oct-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-sep-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-sep-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-sep-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:-:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-apr-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-apr-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-aug-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-aug-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-dec-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-dec-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-dec-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-feb-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-feb-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-jan-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-jul-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-jul-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-jun-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-jun-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-mar-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-mar-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-may-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-may-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-nov-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-nov-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-nov-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-oct-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-oct-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-sep-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-sep-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:-:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-apr-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-aug-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-dec-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-dec-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-feb-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-jul-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-jun-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-mar-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-may-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-nov-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-nov-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-oct-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-oct-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-sep-2023-r1:*:*:*:*:*:*"
]
| null | 5.5 | null | null |
|
CVE-2019-3727 | OS command injection vulnerability | Dell EMC RecoverPoint versions prior to 5.1.3 and RecoverPoint for VMs versions prior to 5.2.0.2 contain an OS command injection vulnerability in the installation feature of Boxmgmt CLI. A malicious boxmgmt user may potentially be able to execute arbitrary commands as root. | [
"cpe:2.3:a:dell:emc_recoverpoint:*:*:*:*:*:*:*:*",
"cpe:2.3:a:dell:recoverpoint_for_virtual_machines:*:*:*:*:*:*:*:*"
]
| null | null | 6.4 | null |
GHSA-rgw8-cw3p-qv66 | In the Linux kernel, the following vulnerability has been resolved:x86/CPU/AMD: Clear virtualized VMLOAD/VMSAVE on Zen4 clientA number of Zen4 client SoCs advertise the ability to use virtualized
VMLOAD/VMSAVE, but using these instructions is reported to be a cause
of a random host reboot.These instructions aren't intended to be advertised on Zen4 client
so clear the capability. | []
| null | 5.5 | null | null |
|
CVE-2009-1096 | Buffer overflow in unpack200 in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier, and 6 Update 12 and earlier, allows remote attackers to access files or execute arbitrary code via a JAR file with crafted Pack200 headers. | [
"cpe:2.3:a:sun:jdk:*:update17:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update1:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update10:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update11:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update11_b03:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update12:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update13:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update14:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update15:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update16:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update2:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update3:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update4:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update5:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update6:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update7:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update7_b03:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update8:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update9:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:*:update17:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update1:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update10:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update11:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update12:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update13:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update14:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update15:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update16:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update2:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update3:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update4:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update5:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update6:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update7:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update8:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update9:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:*:update_12:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update1:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update1_b06:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:*:update_12:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*"
]
| null | null | null | 10 |
|
GHSA-9mjv-243x-3w2q | When EXIF extension is parsing EXIF information from an image, e.g. via exif_read_data() function, in versions 7.1.x below 7.1.30, 7.2.x below 7.2.19 and 7.3.x below 7.3.6 it is possible to supply it with data what will cause it to read past the allocated buffer. This may lead to information disclosure or crash. | []
| null | 9.1 | null | null |
|
GHSA-8g8g-9f4q-f275 | The decompress function in compress42.c in (1) ncompress 4.2.4 and (2) liblzw allows remote attackers to cause a denial of service (crash), and possibly execute arbitrary code, via crafted data that leads to a buffer underflow. | []
| null | null | null | null |
|
CVE-2021-27622 | SAP Internet Graphics Service, versions - 7.20,7.20EXT,7.53,7.20_EX2,7.81, allows an unauthenticated attacker after retrieving an existing system state value can submit a malicious IGS request over a network which due to insufficient input validation in method CDrawRaster::LoadImageFromMemory() which will trigger an internal memory corruption error in the system causing the system to crash and rendering it unavailable. In this attack, no data in the system can be viewed or modified. | [
"cpe:2.3:a:sap:netweaver_as_internet_graphics_server:7.20:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_as_internet_graphics_server:7.20ex2:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_as_internet_graphics_server:7.20ext:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_as_internet_graphics_server:7.53:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_as_internet_graphics_server:7.81:*:*:*:*:*:*:*"
]
| null | null | 5.9 | null |
|
RHSA-2020:3185 | Red Hat Security Advisory: python-pillow security update | python-pillow: out-of-bounds read in ImagingFliDecode when loading FLI images python-pillow: out-of-bounds reads/writes in the parsing of SGI image files in expandrow/expandrow2 | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
]
| null | 8.1 | null | null |
CVE-2025-24358 | gorilla/csrf CSRF vulnerability due to broken Referer validation | gorilla/csrf provides Cross Site Request Forgery (CSRF) prevention middleware for Go web applications & services. Prior to 1.7.2, gorilla/csrf does not validate the Origin header against an allowlist. Its executes its validation of the Referer header for cross-origin requests only when it believes the request is being served over TLS. It determines this by inspecting the r.URL.Scheme value. However, this value is never populated for "server" requests per the Go spec, and so this check does not run in practice. This vulnerability allows an attacker who has gained XSS on a subdomain or top level domain to perform authenticated form submissions against gorilla/csrf protected targets that share the same top level domain. This vulnerability is fixed in 1.7.2. | []
| 5.4 | null | null | null |
CVE-2019-19371 | A cross-site scripting (XSS) vulnerability in the web conferencing component of Mitel MiCollab AWV before 8.1.2.2 could allow an unauthenticated attacker to conduct a reflected cross-site scripting (XSS) attack due to insufficient validation in the join meeting interface. A successful exploit could allow an attacker to execute arbitrary scripts. | [
"cpe:2.3:a:mitel:micollab_audio\\,_web_\\&_video_conferencing:*:*:*:*:*:*:*:*"
]
| null | 6.1 | null | 4.3 |
|
CVE-2024-32897 | In ProtocolCdmaCallWaitingIndAdapter::GetCwInfo() of protocolsmsadapter.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with baseband firmware compromise required. User interaction is not needed for exploitation. | [
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
]
| null | 5.9 | null | null |
|
RHSA-2008:0207 | Red Hat Security Advisory: firefox security update | Mozilla products XPCNativeWrapper pollution universal XSS using event handlers chrome privilege via wrong principal browser engine crashes javascript crashes Referrer spoofing bug XUL popup spoofing | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
]
| null | null | null | null |
CVE-2021-23126 | [20210301] - Core - Insecure randomness within 2FA secret generation | An issue was discovered in Joomla! 3.2.0 through 3.9.24. Usage of the insecure rand() function within the process of generating the 2FA secret. | [
"cpe:2.3:a:joomla:joomla\\!:*:*:*:*:*:*:*:*"
]
| null | 5.3 | null | 5 |
CVE-2014-1938 | python-rply before 0.7.4 insecurely creates temporary files. | [
"cpe:2.3:a:rply_project:rply:*:*:*:*:*:*:*:*"
]
| null | 5.5 | null | 2.1 |
|
CVE-2014-3838 | ownCloud Server before 5.0.16 and 6.0.x before 6.0.3 does not properly check permissions, which allows remote authenticated users to read the names of files of other users by leveraging access to multiple accounts. | [
"cpe:2.3:a:owncloud:owncloud:*:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:5.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:5.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:5.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:5.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:5.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:5.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:5.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:5.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:5.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:5.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:5.0.14:a:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:6.0.2:*:*:*:*:*:*:*"
]
| null | null | null | 4 |
|
CVE-2022-33987 | The got package before 12.1.0 (also fixed in 11.8.5) for Node.js allows a redirect to a UNIX socket. | [
"cpe:2.3:a:got_project:got:*:*:*:*:*:node.js:*:*"
]
| null | 5.3 | null | 5 |
|
CVE-2024-41344 | A Cross-Site Request Forgery (CSRF) in Codeigniter 3.1.13 allows attackers to arbitrarily change the Administrator password and escalate privileges. | [
"cpe:2.3:a:codeigniter:codeigniter:*:*:*:*:*:*:*:*"
]
| null | 7.5 | null | null |
|
CVE-2022-21531 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.29 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | [
"cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*",
"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*"
]
| null | 4.9 | null | null |
|
CVE-2024-4208 | Gutenberg Blocks by Kadence Blocks – Page Builder Features <= 3.2.37 - Authenticated (Contributor+) Stored Cross-Site Scripting via Typer Effect | The Gutenberg Blocks with AI by Kadence WP – Page Builder Features plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the typer effect in the advanced heading widget in all versions up to, and including, 3.2.37 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | []
| null | 6.4 | null | null |
CVE-2022-25263 | JetBrains TeamCity before 2021.2.3 was vulnerable to OS command injection in the Agent Push feature configuration. | [
"cpe:2.3:a:jetbrains:teamcity:*:*:*:*:*:*:*:*"
]
| null | 9.8 | null | 7.5 |
|
GHSA-2w74-pfgh-pc3f | Vulnerability in the Oracle Mobile Field Service component of Oracle E-Business Suite (subcomponent: Administration). Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6, 12.2.7 and 12.2.8. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Mobile Field Service. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Mobile Field Service, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Mobile Field Service accessible data. CVSS 3.0 Base Score 4.7 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N). | []
| null | null | 4.7 | null |
|
GHSA-48rc-24fj-w8v2 | PlatinumFTP 1.0.18, and possibly earlier versions, allows remote attackers to cause a denial of service (server crash) via multiple connection attempts with a \ (backslash) in the username. | []
| null | null | null | null |
|
CVE-2023-3694 | SourceCodester/projectworlds House Rental and Property Listing index.php sql injection | A vulnerability, which was classified as critical, has been found in SourceCodester/projectworlds House Rental and Property Listing 1.0. This issue affects some unknown processing of the file /index.php. The manipulation of the argument keywords/location leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. | [
"cpe:2.3:a:sourcecodester_house_rental_and_property_listing_project:house_rental_and_property_listing:1.0:*:*:*:*:*:*:*"
]
| 5.3 | 6.3 | 6.3 | 6.5 |
CVE-2024-20264 | Cisco Firepower Management Center Software Cross-Site Scripting Vulnerability | A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface of an affected device. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information. | [
"cpe:2.3:a:cisco:secure_firewall_management_center:-:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:7.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:7.2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:7.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:7.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:7.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:7.2.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:7.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:7.2.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:7.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:7.2.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:7.2.5.2:*:*:*:*:*:*:*"
]
| null | 4.8 | null | null |
CVE-2009-1457 | Cross-site scripting (XSS) vulnerability in player.php in Nuke Evolution Xtreme 2.x allows remote attackers to inject arbitrary web script or HTML via the defaultVisualExt parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | [
"cpe:2.3:a:evolution-extreme:nuke_evolution_xtreme:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:evolution-extreme:nuke_evolution_xtreme:2.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:evolution-extreme:nuke_evolution_xtreme:2.1.0:*:*:*:*:*:*:*"
]
| null | null | null | 4.3 |
|
GHSA-r8g9-x5r3-7rc6 | The IndexedDatabaseManager class in the IndexedDB implementation in Mozilla Firefox before 39.0 and Firefox ESR 31.x before 31.8 and 38.x before 38.1 misinterprets an unspecified IDBDatabase field as a pointer, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via unspecified vectors, related to a "type confusion" issue. | []
| null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.