id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
4.89k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
GHSA-8grp-f8hg-jmhh | A vulnerability in Cisco Aironet Access Points (APs) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) on an affected device. The vulnerability is due to improper resource management while processing specific packets. An attacker could exploit this vulnerability by sending a series of crafted UDP packets to a specific port on an affected device. A successful exploit could either allow the attacker to tear down the connection between the AP and the wireless LAN controller, resulting in the affected device not being able to process client traffic, or cause the vulnerable device to reload, triggering a DoS condition. After the attack, the affected device should automatically recover its normal functions without manual intervention. | []
| null | null | null | null |
|
CVE-2025-32869 | A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected application is vulnerable to SQL injection through the internally used 'ImportCertificate' method. This could allow an authenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with "NT AUTHORITY\NetworkService" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on. | []
| 8.7 | 8.8 | null | null |
|
RHSA-2023:0839 | Red Hat Security Advisory: kpatch-patch security update | kernel: mm/mremap.c use-after-free vulnerability kernel: nfsd buffer overflow by RPC message over TCP with garbage data | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
]
| null | 7.5 | null | null |
CVE-2013-7040 | Python 2.7 before 3.4 only uses the last eight bits of the prefix to randomize hash values, which causes it to compute hash values without restricting the ability to trigger hash collisions predictably and makes it easier for context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-1150. | [
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:a:python:python:2.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:python:python:2.7.1:rc1:*:*:*:*:*:*",
"cpe:2.3:a:python:python:2.7.2:rc1:*:*:*:*:*:*",
"cpe:2.3:a:python:python:2.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:python:python:2.7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:python:python:2.7.5:*:*:*:*:*:*:*",
"cpe:2.3:a:python:python:2.7.6:*:*:*:*:*:*:*",
"cpe:2.3:a:python:python:2.7.7:*:*:*:*:*:*:*",
"cpe:2.3:a:python:python:2.7.1150:*:*:*:*:*:*:*",
"cpe:2.3:a:python:python:2.7.2150:*:*:*:*:*:*:*",
"cpe:2.3:a:python:python:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:python:python:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:python:python:3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:python:python:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:python:python:3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:python:python:3.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:python:python:3.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:python:python:3.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:python:python:3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:python:python:3.2:alpha:*:*:*:*:*:*",
"cpe:2.3:a:python:python:3.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:python:python:3.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:python:python:3.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:python:python:3.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:python:python:3.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:python:python:3.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:python:python:3.2.2150:*:*:*:*:*:*:*",
"cpe:2.3:a:python:python:3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:python:python:3.3:beta2:*:*:*:*:*:*",
"cpe:2.3:a:python:python:3.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:python:python:3.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:python:python:3.3.1:rc1:*:*:*:*:*:*",
"cpe:2.3:a:python:python:3.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:python:python:3.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:python:python:3.3.3:rc1:*:*:*:*:*:*",
"cpe:2.3:a:python:python:3.3.3:rc2:*:*:*:*:*:*",
"cpe:2.3:a:python:python:3.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:python:python:3.3.4:rc1:*:*:*:*:*:*",
"cpe:2.3:a:python:python:3.3.5:-:*:*:*:*:*:*",
"cpe:2.3:a:python:python:3.3.5:rc1:*:*:*:*:*:*",
"cpe:2.3:a:python:python:3.3.5:rc2:*:*:*:*:*:*"
]
| null | null | null | 4.3 |
|
GHSA-p69w-87mw-fx52 | The context implementation in WebKit, as used in Google Chrome before 10.0.648.127, allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that lead to a "stale pointer." | []
| null | null | null | null |
|
GHSA-x2f8-m2rr-7xq9 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Habibur Rahman Razib Control Listings allows Reflected XSS. This issue affects Control Listings: from n/a through 1.0.4.1. | []
| null | 7.1 | null | null |
|
GHSA-2fm6-mv57-p2qh | Apache Dolphinscheduler Code Injection vulnerability | Exposure of Remote Code Execution in Apache Dolphinscheduler.This issue affects Apache DolphinScheduler: before 3.2.2.We recommend users to upgrade Apache DolphinScheduler to version 3.2.2, which fixes the issue. | []
| 9.3 | 9.8 | null | null |
RHSA-2024:4623 | Red Hat Security Advisory: qt5-qtbase security update | qtbase: qtbase: Delay any communication until encrypted() can be responded to | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
]
| null | 7.5 | null | null |
CVE-2016-0549 | Unspecified vulnerability in the Oracle E-Business Intelligence component in Oracle E-Business Suite 11.5.10.2 allows remote attackers to affect confidentiality and integrity via unknown vectors related to Common Components, a different vulnerability than CVE-2016-0511, CVE-2016-0547, and CVE-2016-0548. | [
"cpe:2.3:a:oracle:e-business_intelligence:11.5.10.2:*:*:*:*:*:*:*"
]
| null | null | null | 6.4 |
|
CVE-2023-0925 | Software AG webMethods OneData Deserialization Vulnerability | Version 10.11 of webMethods OneData runs an embedded instance of Azul Zulu Java 11.0.15 which hosts a Java RMI registry (listening on TCP port 2099 by default) and two RMI interfaces (listening on a single, dynamically assigned TCP high port).
Port 2099 serves as a Java Remote Method Invocation (RMI) registry which allows for remotely loading and processing data via RMI interfaces. An unauthenticated attacker with network connectivity to the RMI registry and RMI interface ports can abuse this functionality to instruct the webMethods OneData application to load a malicious serialized Java object as a parameter to one of the available Java methods presented by the RMI interface. Once deserialized on the vulnerable server, the malicious code runs as whichever operating system account is used to run the software, which in most cases is the local System account on Windows. | [
"cpe:2.3:a:softwareag:webmethods:10.11:*:*:*:*:*:*:*",
"cpe:2.3:a:azul:zulu:11.0.15:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
]
| null | 9.8 | null | null |
CVE-2018-1000050 | Sean Barrett stb_vorbis version 1.12 and earlier contains a Buffer Overflow vulnerability in All vorbis decoding paths. that can result in memory corruption, denial of service, comprised execution of host program. This attack appear to be exploitable via Victim must open a specially crafted Ogg Vorbis file. This vulnerability appears to have been fixed in 1.13. | [
"cpe:2.3:a:stb_vorbis_project:stb_vorbis:*:*:*:*:*:*:*:*"
]
| null | null | 8.8 | 6.8 |
|
CVE-2024-27095 | Decidim cross-site scripting (XSS) in the admin panel | Decidim is a participatory democracy framework. The admin panel is subject to potential XSS attach in case the attacker manages to modify some records being uploaded to the server. This vulnerability is fixed in 0.27.6 and 0.28.1. | [
"cpe:2.3:a:decidim:decidim:*:*:*:*:*:ruby:*:*",
"cpe:2.3:a:decidim:decidim:0.28.0:-:*:*:*:ruby:*:*",
"cpe:2.3:a:decidim:decidim:0.28.0:rc1:*:*:*:ruby:*:*",
"cpe:2.3:a:decidim:decidim:0.28.0:rc2:*:*:*:ruby:*:*",
"cpe:2.3:a:decidim:decidim:0.28.0:rc3:*:*:*:ruby:*:*",
"cpe:2.3:a:decidim:decidim:0.28.0:rc4:*:*:*:ruby:*:*",
"cpe:2.3:a:decidim:decidim:0.28.0:rc5:*:*:*:ruby:*:*"
]
| null | 5.4 | null | null |
GHSA-2w55-9hqf-xw99 | TOTOLINK X2000R before V1.0.0-B20231213.1013 is vulnerable to Cross Site Scripting (XSS) via the VPN Page. | []
| null | 5.4 | null | null |
|
CVE-2025-30681 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Replication). Supported versions that are affected are 8.0.0-8.0.41, 8.4.0-8.4.4 and 9.0.0-9.2.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.1 Base Score 2.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L). | []
| null | 2.7 | null | null |
|
CVE-2017-0156 | An elevation of privilege vulnerability exists in Windows 7, Windows 8.1, Windows RT 8.1, Windows 10, Windows Server 2008 R2, Windows Server 2012, Windows Server 2012 R2, and Windows Server 2016 when the Microsoft Graphics Component fails to properly handle objects in memory, aka "Windows Graphics Component Elevation of Privilege Vulnerability." | [
"cpe:2.3:o:microsoft:windows_10:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*"
]
| null | null | 7 | 6.9 |
|
CVE-2009-2685 | Stack-based buffer overflow in the login form in the management web server in HP Power Manager allows remote attackers to execute arbitrary code via the Login variable. | [
"cpe:2.3:a:hp:power_manager:*:*:*:*:*:*:*:*"
]
| null | null | null | 10 |
|
GHSA-6jw3-xmj9-qvcw | The first S0 encryption key is generated with an uninitialized PRNG in Z/IP Gateway products running Silicon Labs Z/IP Gateway SDK v7.18.3 and earlier. This makes the first S0 key generated at startup predictable, potentially allowing network key prediction and unauthorized S0 network access. | []
| null | 6.4 | null | null |
|
CVE-2014-3249 | Puppet Enterprise 2.8.x before 2.8.7 allows remote attackers to obtain sensitive information via vectors involving hiding and unhiding nodes. | [
"cpe:2.3:a:puppet:puppet_enterprise:2.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet_enterprise:2.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet_enterprise:2.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet_enterprise:2.8.3:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet_enterprise:2.8.4:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet_enterprise:2.8.5:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet_enterprise:2.8.6:*:*:*:*:*:*:*"
]
| null | null | null | 5 |
|
GHSA-q89f-4fm5-5x46 | Adobe Digital Editions 4.5.11.187646 (and earlier) are affected by a privilege escalation vulnerability in the Digital Editions installer. An authenticated attacker could leverage this vulnerability to escalate privileges. User interaction is required before product installation to abuse this vulnerability. | []
| null | null | null | null |
|
GHSA-xr32-vwr8-2rgc | An information disclosure vulnerability in the NVIDIA libwilhelm. Product: Android. Versions: Android kernel. Android ID A-64339309. References: N-CVE-2017-13175. | []
| null | null | 7.5 | null |
|
CVE-2024-10268 | MP3 Audio Player – Music Player, Podcast Player & Radio by Sonaar <= 5.8 - Authenticated (Contributor+) Stored Cross-Site Scripting via sonaar_audioplayer Shortcode | The MP3 Audio Player – Music Player, Podcast Player & Radio by Sonaar plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's sonaar_audioplayer shortcode in all versions up to, and including, 5.8 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | []
| null | 6.4 | null | null |
GHSA-hjmg-3wv2-r885 | VISAM VBASE version 11.6.0.6 is vulnerable to improper access control via the web-remote endpoint, which may allow an unauthenticated user viewing access to folders and files in the directory listing. | []
| null | 7.5 | null | null |
|
GHSA-6j86-2hqg-263p | The twitter-cards-meta plugin before 2.5.0 for WordPress has XSS. | []
| null | null | 6.1 | null |
|
GHSA-mwv7-mvh3-683p | there is a possible way to bypass cryptographic assurances due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | []
| null | 7.8 | null | null |
|
CVE-2023-35814 | DevExpress before 23.1.3 does not properly protect XtraReport serialized data in ASP.NET web forms. | []
| null | 3.5 | null | null |
|
CVE-2021-37541 | In JetBrains Hub before 2021.1.13402, HTML injection in the password reset email was possible. | [
"cpe:2.3:a:jetbrains:hub:*:*:*:*:*:*:*:*"
]
| null | 6.1 | null | 4.3 |
|
RHSA-2018:2552 | Red Hat Security Advisory: Red Hat OpenShift Application Runtimes Node.js 8.11.4 security update | openssl: Malicious server can send large prime to client during DH(E) TLS handshake causing the client to hang nodejs: Out of bounds (OOB) write via UCS-2 encoding | [
"cpe:/a:redhat:openshift_application_runtimes:1.0::el7"
]
| null | null | 8.1 | null |
GHSA-44q9-g282-869g | Jerryscript 3.0.0(commit 1a2c047) was discovered to contain a heap-buffer-overflow via the component lexer_compare_identifier_to_chars at /jerry-core/parser/js/js-lexer.c. | []
| null | 7.8 | null | null |
|
GHSA-jj69-rwgw-8vmj | Unspecified vulnerability in Oracle Java SE 5.0u55, 6u65, and 7u45; Java SE Embedded 7u45; and OpenJDK 7 allows remote attackers to affect integrity via vectors related to JAAS. NOTE: the previous information is from the January 2014 CPU. Oracle has not commented on third-party claims that the issue is related to how principals are set for the Subject class, which allows attackers to escape the sandbox using deserialization of a crafted Subject instance. | []
| null | null | null | null |
|
GHSA-h34j-f5r2-pcx7 | An issue was discovered in Zoho ManageEngine Remote Access Plus 10.0.447. The service to test the mail-server configuration suffers from an authorization issue allowing a user with the Guest role (read-only access) to use and abuse it. One of the abuses allows performing network and port scan operations of the localhost or the hosts on the same network segment, aka SSRF. | []
| null | null | null | null |
|
GHSA-5qmh-c322-6w4x | Format string vulnerability in xv before 3.10a allows remote attackers to execute arbitrary code via format string specifiers in a filename. | []
| null | null | null | null |
|
CVE-2024-25344 | Cross Site Scripting vulnerability in ITFlow.org before commit v.432488eca3998c5be6b6b9e8f8ba01f54bc12378 allows a remtoe attacker to execute arbitrary code and obtain sensitive information via the settings.php, settings+company.php, settings_defaults.php,settings_integrations.php, settings_invoice.php, settings_localization.php, settings_mail.php components. | [
"cpe:2.3:a:itflow:itflow:*:*:*:*:*:*:*:*"
]
| null | 6.1 | null | null |
|
GHSA-fgf7-9g3w-445r | ** DISPUTED ** In OpenResty through 1.13.6.1, URI parameters are obtained using the ngx.req.get_uri_args and ngx.req.get_post_args functions that ignore parameters beyond the hundredth one, which might allow remote attackers to bypass intended access restrictions or interfere with certain Web Application Firewall (ngx_lua_waf or X-WAF) products. NOTE: the vendor has reported that 100 parameters is an intentional default setting, but is adjustable within the API. The vendor's position is that a security-relevant misuse of the API by a WAF product is a vulnerability in the WAF product, not a vulnerability in OpenResty. | []
| null | null | 9.8 | null |
|
CVE-2015-4785 | Unspecified vulnerability in the Data Store component in Oracle Berkeley DB 11.2.5.1.29, 11.2.5.2.42, 11.2.5.3.28, and 12.1.6.0.35 allows local users to affect confidentiality, integrity, and availability via unknown vectors, a different vulnerability than CVE-2015-2583, CVE-2015-2624, CVE-2015-2626, CVE-2015-2640, CVE-2015-2654, CVE-2015-2656, CVE-2015-4754, CVE-2015-4764, CVE-2015-4775, CVE-2015-4776, CVE-2015-4777, CVE-2015-4778, CVE-2015-4780, CVE-2015-4781, CVE-2015-4782, CVE-2015-4783, CVE-2015-4784, CVE-2015-4786, CVE-2015-4787, CVE-2015-4789, and CVE-2015-4790. | [
"cpe:2.3:a:oracle:berkeley_db:11.2.5.1.29:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:berkeley_db:11.2.5.2.42:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:berkeley_db:11.2.5.3.28:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:berkeley_db:12.1.6.0.35:*:*:*:*:*:*:*"
]
| null | null | null | 6.9 |
|
GHSA-m9fp-rcw9-gvfw | Server-Side Request Forgery (SSRF) in GitHub repository owncast/owncast prior to 0.1.0. | []
| null | null | 8.3 | null |
|
ICSA-17-103-01 | Wecon Technologies LEVI Studio HMI Editor | This vulnerability causes a buffer overflow when a maliciously crafted project file is run by the system.CVE-2017-6037 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). This vulnerability causes a buffer overflow, which could result in denial of service when a malicious project file is run on the system.CVE-2017-6035 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). | []
| null | null | 8.8 | null |
CVE-2003-0683 | NFS in SGI 6.5.21m and 6.5.21f does not perform access checks in certain configurations when an /etc/exports entry uses wildcards without any hostnames or groups, which could allow attackers to bypass intended restrictions. | [
"cpe:2.3:o:sgi:irix:6.5.21f:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.21m:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
GHSA-58fh-j5p6-579m | A User Mode Write AV in Editor+0x5cd7 of WildBit Viewer v6.6 allows attackers to cause a denial of service (DoS) via a crafted tiff file. | []
| null | null | null | null |
|
RHSA-2025:0847 | Red Hat Security Advisory: libsoup security update | libsoup: buffer overflow via UTF-8 conversion in soup_header_parse_param_list_strict | [
"cpe:/a:redhat:rhel_eus:9.2::appstream"
]
| null | 9 | null | null |
CVE-2014-5596 | The Homerun Battle 2 (aka com.com2us.homerunbattle2.normal.freefull.google.global.android.common) application 1.2.2.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [
"cpe:2.3:a:withhive:homerun_battle_2:1.2.2.0:*:*:*:*:android:*:*"
]
| null | null | null | 5.4 |
|
CVE-2015-2346 | XML external entity (XXE) vulnerability in Huawei SEQ Analyst before V200R002C03LG0001CP0022 allows remote authenticated users to read arbitrary files via the req parameter. | [
"cpe:2.3:a:huawei:seq_analyst:*:*:*:*:*:*:*:*"
]
| null | null | null | 4 |
|
CVE-2022-38880 | The d8s-urls for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The affected version is 0.1.0. | [
"cpe:2.3:a:democritus_urls_project:democritus_urls:0.1.0:*:*:*:*:python:*:*"
]
| null | 9.8 | null | null |
|
GHSA-fqgj-2fx4-9h5g | This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley MicroStation CONNECT 10.16.0.80. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of BMP images. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-15399. | []
| null | null | null | null |
|
CVE-2008-4105 | JRequest in Joomla! 1.5 before 1.5.7 does not sanitize variables that were set with JRequest::setVar, which allows remote attackers to conduct "variable injection" attacks and have unspecified other impact. | [
"cpe:2.3:a:joomla:joomla:1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla:1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla:1.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla:1.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla:1.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla:1.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla:1.5.6:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
GHSA-r37j-gcqw-x2qg | Adobe Experience Manager versions 6.5.20 and earlier Answer: are affected by a DOM-based Cross-Site Scripting (XSS) vulnerability. This vulnerability could allow an attacker to execute arbitrary JavaScript code in the context of the victim's browser session. Exploitation of this issue requires user interaction, such as convincing a victim to click on a specially crafted link or to submit a form that triggers the vulnerability. | []
| null | 5.4 | null | null |
|
GHSA-mw39-wc97-cvhf | A vulnerability has been identified in Tecnomatix Plant Simulation V2302 (All versions < V2302.0018), Tecnomatix Plant Simulation V2404 (All versions < V2404.0007). The affected applications contain an out of bounds write vulnerability when parsing a specially crafted WRL file.
This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-24260) | []
| 7.3 | 7.8 | null | null |
|
CVE-2004-1213 | Cross-site scripting (XSS) vulnerability in index.php in Advanced Guestbook 2.3.1, 2.2, and possibly other versions allows remote attackers to inject arbitrary web script or HTML via the entry parameter. | [
"cpe:2.3:a:advanced_guestbook:advanced_guestbook:2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:advanced_guestbook:advanced_guestbook:2.3.1:*:*:*:*:*:*:*"
]
| null | null | null | 6.8 |
|
CVE-2016-6276 | Citrix Linux Virtual Delivery Agent (aka VDA, formerly Linux Virtual Desktop) before 1.4.0 allows local users to gain root privileges via unspecified vectors. | [
"cpe:2.3:o:citrix:linux_virtual_delivery_agent:*:*:*:*:*:*:*:*"
]
| null | null | 7.8 | 7.2 |
|
GHSA-v968-jc69-vxr8 | The Motors WordPress plugin before 1.4.4 does not properly validate uploaded files for dangerous file types (such as .php) in an AJAX action, allowing an attacker to sign up on a victim's WordPress instance, upload a malicious PHP file and attempt to launch a brute-force attack to discover the uploaded payload. | []
| null | 8.8 | null | null |
|
CVE-2022-49317 | f2fs: avoid infinite loop to flush node pages | In the Linux kernel, the following vulnerability has been resolved:
f2fs: avoid infinite loop to flush node pages
xfstests/generic/475 can give EIO all the time which give an infinite loop
to flush node page like below. Let's avoid it.
[16418.518551] Call Trace:
[16418.518553] ? dm_submit_bio+0x48/0x400
[16418.518574] ? submit_bio_checks+0x1ac/0x5a0
[16418.525207] __submit_bio+0x1a9/0x230
[16418.525210] ? kmem_cache_alloc+0x29e/0x3c0
[16418.525223] submit_bio_noacct+0xa8/0x2b0
[16418.525226] submit_bio+0x4d/0x130
[16418.525238] __submit_bio+0x49/0x310 [f2fs]
[16418.525339] ? bio_add_page+0x6a/0x90
[16418.525344] f2fs_submit_page_bio+0x134/0x1f0 [f2fs]
[16418.525365] read_node_page+0x125/0x1b0 [f2fs]
[16418.525388] __get_node_page.part.0+0x58/0x3f0 [f2fs]
[16418.525409] __get_node_page+0x2f/0x60 [f2fs]
[16418.525431] f2fs_get_dnode_of_data+0x423/0x860 [f2fs]
[16418.525452] ? asm_sysvec_apic_timer_interrupt+0x12/0x20
[16418.525458] ? __mod_memcg_state.part.0+0x2a/0x30
[16418.525465] ? __mod_memcg_lruvec_state+0x27/0x40
[16418.525467] ? __xa_set_mark+0x57/0x70
[16418.525472] f2fs_do_write_data_page+0x10e/0x7b0 [f2fs]
[16418.525493] f2fs_write_single_data_page+0x555/0x830 [f2fs]
[16418.525514] ? sysvec_apic_timer_interrupt+0x4e/0x90
[16418.525518] ? asm_sysvec_apic_timer_interrupt+0x12/0x20
[16418.525523] f2fs_write_cache_pages+0x303/0x880 [f2fs]
[16418.525545] ? blk_flush_plug_list+0x47/0x100
[16418.525548] f2fs_write_data_pages+0xfd/0x320 [f2fs]
[16418.525569] do_writepages+0xd5/0x210
[16418.525648] filemap_fdatawrite_wbc+0x7d/0xc0
[16418.525655] filemap_fdatawrite+0x50/0x70
[16418.525658] f2fs_sync_dirty_inodes+0xa4/0x230 [f2fs]
[16418.525679] f2fs_write_checkpoint+0x16d/0x1720 [f2fs]
[16418.525699] ? ttwu_do_wakeup+0x1c/0x160
[16418.525709] ? ttwu_do_activate+0x6d/0xd0
[16418.525711] ? __wait_for_common+0x11d/0x150
[16418.525715] kill_f2fs_super+0xca/0x100 [f2fs]
[16418.525733] deactivate_locked_super+0x3b/0xb0
[16418.525739] deactivate_super+0x40/0x50
[16418.525741] cleanup_mnt+0x139/0x190
[16418.525747] __cleanup_mnt+0x12/0x20
[16418.525749] task_work_run+0x6d/0xa0
[16418.525765] exit_to_user_mode_prepare+0x1ad/0x1b0
[16418.525771] syscall_exit_to_user_mode+0x27/0x50
[16418.525774] do_syscall_64+0x48/0xc0
[16418.525776] entry_SYSCALL_64_after_hwframe+0x44/0xae | []
| null | 5.5 | null | null |
GHSA-5fwq-26jx-xp73 | The encoder_contexte_ajax function in ecrire/inc/filtres.php in SPIP 2.x before 2.1.19, 3.0.x before 3.0.22, and 3.1.x before 3.1.1 allows remote attackers to conduct PHP object injection attacks and execute arbitrary PHP code via a crafted serialized object. | []
| null | null | 9.8 | null |
|
GHSA-gmwh-gwqv-v933 | latex2man in texlive-extra-utils 2011.20120322, and possibly other versions or packages, when used with the H or T option, allows local users to overwrite arbitrary files via a symlink attack on a temporary file. | []
| null | null | null | null |
|
CVE-2022-20129 | In registerPhoneAccount of PhoneAccountRegistrar.java, there is a possible way to prevent the user from selecting a phone account due to improper input validation. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-217934478 | [
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*"
]
| null | 5.5 | null | 4.9 |
|
CVE-2021-35538 | Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.28. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. Note: This vulnerability does not apply to Windows systems. CVSS 3.1 Base Score 7.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). | [
"cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:solaris:-:*:*:*:*:*:-:*"
]
| null | 7.8 | null | null |
|
GHSA-8m34-ghfg-xxc2 | A vulnerability in the REST API of Cisco Meeting Management could allow a remote, authenticated attacker with low privileges to elevate privileges to administrator on an affected device.This vulnerability exists because proper authorization is not enforced upon REST API users. An attacker could exploit this vulnerability by sending API requests to a specific endpoint. A successful exploit could allow the attacker to gain administrator-level control over edge nodes that are managed by Cisco Meeting Management. | []
| null | 9.9 | null | null |
|
CVE-2016-0771 | The internal DNS server in Samba 4.x before 4.1.23, 4.2.x before 4.2.9, 4.3.x before 4.3.6, and 4.4.x before 4.4.0rc4, when an AD DC is configured, allows remote authenticated users to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from process memory by uploading a crafted DNS TXT record. | [
"cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.0.21:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.0.22:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.0.23:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.0.24:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.1.12:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.1.13:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.1.14:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.1.15:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.1.16:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.1.17:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.1.18:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.1.19:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.1.20:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.1.21:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.1.22:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.2.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.2.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.2.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.2.0:rc4:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.4.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.4.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.4.0:rc3:*:*:*:*:*:*"
]
| null | null | 5.9 | 4.9 |
|
GHSA-m9q5-2qrh-wq37 | Unauthenticated SQL injection in the GetAssignmentsDue method in IDAttend’s IDWeb application 3.1.052 and earlier allows extraction or modification of all data by unauthenticated attackers. | []
| null | 9.8 | null | null |
|
CVE-2023-39842 | Missing encryption in the RFID tag of Digoo DG-HAMB Smart Home Security System v1.0 allows attackers to create a cloned tag via brief physical proximity to the original device. | [
"cpe:2.3:o:mydigoo:dg-hamb_smart_home_security_system_firmware:1.0:*:*:*:*:*:*:*",
"cpe:2.3:h:mydigoo:dg-hamb_smart_home_security_system:-:*:*:*:*:*:*:*"
]
| null | 2.4 | null | null |
|
GHSA-5qx9-9ffj-5r8f | Mattermost fails to fully validate role changes | Mattermost versions 9.6.0, 9.5.x before 9.5.3, and 8.1.x before 8.1.12 fail to fully validate role changes which allows an attacker authenticated as team admin to demote users to guest via crafted HTTP requests. | []
| null | 2.7 | null | null |
GHSA-8449-7gc2-pwrp | HashiCorp Consul Template could reveal Vault secret contents in error messages | In HashiCorp Consul Template through version 0.29.1, invalid templates could inadvertently reveal the contents of Vault secret in errors returned by the `*template.Template.Execute 5` method, when given a template using Vault secret contents incorrectly. This method has been updated to redact Vault secrets when creating an error string, making it safe to log the error.. This issue was fixed in version 0.29.2. | []
| null | 7.5 | null | null |
PYSEC-2021-869 | null | archivy is vulnerable to Cross-Site Request Forgery (CSRF) | []
| null | null | null | null |
CVE-2008-5075 | Multiple SQL injection vulnerabilities in E-Uploader Pro 1.0 (aka Uploader PRO), when magic_quotes_gpc is disabled, allow remote attackers to execute arbitrary SQL commands via the (1) id parameter to (a) img.php, (b) file.php, (c) mail.php, (d) thumb.php, (e) zip.php, and (f) zipit.php, and (2) the view parameter to (g) browser.php. | [
"cpe:2.3:a:scriptsfrenzy:e-uploader_pro:1.0:*:*:*:*:*:*:*"
]
| null | null | null | 6.8 |
|
GHSA-67qg-pjv2-pg9v | Improper Authorization vulnerability in OTRS AG OTRS 8 (Websocket API backend) allows any as Agent authenticated attacker to track user behaviour and to gain live insight into overall system usage. User IDs can easily be correlated with real names e. g. via
ticket histories by any user. (Fuzzing for garnering other adjacent user/sensitive data). Subscribing to all possible push events could also lead to performance implications on the server side, depending on the size of the installation
and the number of active users. (Flooding)This issue affects OTRS: from 8.0.X before 8.0.32. | []
| null | 7.6 | null | null |
|
GHSA-55xj-wwj5-fpc9 | Remote Procedure Call Runtime Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-28327, CVE-2021-28329, CVE-2021-28330, CVE-2021-28331, CVE-2021-28332, CVE-2021-28333, CVE-2021-28334, CVE-2021-28335, CVE-2021-28336, CVE-2021-28337, CVE-2021-28338, CVE-2021-28339, CVE-2021-28340, CVE-2021-28341, CVE-2021-28342, CVE-2021-28343, CVE-2021-28344, CVE-2021-28345, CVE-2021-28346, CVE-2021-28353, CVE-2021-28354, CVE-2021-28355, CVE-2021-28356, CVE-2021-28357, CVE-2021-28358, CVE-2021-28434. | []
| null | 8.8 | null | null |
|
CVE-2021-38859 | IBM Security Verify Privilege information disclosure |
IBM Security Verify Privilege On-Premises 11.5 could allow a user to obtain version number information using a specially crafted HTTP request that could be used in further attacks against the system. IBM X-Force ID: 207899.
| [
"cpe:2.3:a:ibm:security_verify_privilege_on-premises:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
]
| null | 4.3 | null | null |
RHSA-2010:0332 | Red Hat Security Advisory: firefox security update | Mozilla crashes with evidence of memory corruption Mozilla remote code execution with use-after-free in nsTreeSelection Mozilla Dangling pointer vulnerability in nsTreeContentView Mozilla Dangling pointer vulnerability in nsPluginArray Firefox Chrome privilege escalation via forced URL drag and drop Firefox Arbitrary code execution with Firebug XMLHttpRequestSpy | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
]
| null | null | null | null |
RHSA-2011:1250 | Red Hat Security Advisory: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement update | cumin: broker username/password appears in the log file | [
"cpe:/a:redhat:enterprise_mrg:2:computenode:el6",
"cpe:/a:redhat:enterprise_mrg:2:server:el6"
]
| null | null | null | null |
GHSA-5rg7-hgww-7chr | Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26412, CVE-2021-26854, CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, CVE-2021-27065. | []
| null | 9.1 | null | null |
|
CVE-2007-6282 | The IPsec implementation in Linux kernel before 2.6.25 allows remote routers to cause a denial of service (crash) via a fragmented ESP packet in which the first fragment does not contain the entire ESP header and IV. | [
"cpe:2.3:o:redhat:enterprise_linux:as_4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:es_4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:ws_4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:4:*:*:*:*:*:*:*"
]
| null | null | null | 7.1 |
|
CVE-2024-50329 | Path traversal in Ivanti Endpoint Manager before 2024 November Security Update or 2022 SU6 November Security Update allows a remote unauthenticated attacker to achieve remote code execution. User interaction is required. | [
"cpe:2.3:a:ivanti:endpoint_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:endpoint_manager:2022:-:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:endpoint_manager:2022:su1:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:endpoint_manager:2022:su2:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:endpoint_manager:2022:su3:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:endpoint_manager:2022:su4:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:endpoint_manager:2022:su5:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:endpoint_manager:2024:-:*:*:*:*:*:*"
]
| null | 8.8 | null | null |
|
CVE-2013-0221 | The SUSE coreutils-i18n.patch for GNU coreutils allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a long string to the sort command, when using the (1) -d or (2) -M switch, which triggers a stack-based buffer overflow in the alloca function. | [
"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*"
]
| null | null | null | 4.3 |
|
GHSA-cxpf-r354-3v48 | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Talent Software BAP Automation allows Stored XSS.This issue affects BAP Automation: before 30840. | []
| 9.3 | null | null | null |
|
GHSA-9v38-vjvh-5jr4 | A reflected XSS vulnerability was discovered in the Clicky Analytics Dashboard module for Joomla. | []
| null | 6.1 | null | null |
|
GHSA-4fqp-f52h-wwp8 | A reflected cross-site scripting (XSS) vulnerability exists in multiple WSO2 products due to improper input validation. User-supplied data is directly included in server responses from vulnerable service endpoints without proper sanitization or encoding, allowing an attacker to inject malicious JavaScript.Successful exploitation could lead to UI manipulation, redirection to malicious websites, or data exfiltration from the browser. While session-related sensitive cookies are protected with the httpOnly flag, mitigating session hijacking risks, the impact may vary depending on gateway-level service restrictions. | []
| null | 6.1 | null | null |
|
CVE-2024-31261 | WordPress Announcer – Notification & message bars plugin <= 6.0 - Broken Access Control vulnerability | Missing Authorization vulnerability in Aakash Chakravarthy Announcer – Notification & message bars.This issue affects Announcer – Notification & message bars: from n/a through 6.0. | [
"cpe:2.3:a:aakashweb:announcer:*:*:*:*:*:wordpress:*:*"
]
| null | 4.3 | null | null |
GHSA-94cm-j3mf-q873 | A vulnerability was found in Metabase 54.10. It has been classified as problematic. This affects the function parseDataUri of the file frontend/src/metabase/lib/dom.js. The manipulation leads to inefficient regular expression complexity. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The patch is named 4454ebbdc7719016bf80ca0f34859ce5cee9f6b0. It is recommended to apply a patch to fix this issue. | []
| 2.1 | 4.3 | null | null |
|
CVE-2019-17549 | ESET Cyber Security before 6.8.1.0 is vulnerable to a denial-of-service allowing any user to stop (kill) ESET processes. An attacker can abuse this bug to stop the protection from ESET and launch his attack. | [
"cpe:2.3:a:eset:cyber_security:*:*:*:*:-:macos:*:*"
]
| null | 6.5 | null | 4 |
|
CVE-2025-2577 | Bitspecter Suite <= 1.0.0 - Authenticated (Author+) Stored Cross-Site Scripting via SVG File Upload | The Bitspecter Suite plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 1.0.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file. | []
| null | 6.4 | null | null |
GHSA-xxr2-w49x-7xv2 | PDF-XChange Editor EMF File Parsing Use-After-Free Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of EMF files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-20921. | []
| null | null | 3.3 | null |
|
CVE-2021-1077 | NVIDIA GPU Display Driver for Windows and Linux, R450 and R460 driver branch, contains a vulnerability where the software uses a reference count to manage a resource that is incorrectly updated, which may lead to denial of service. | [
"cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:linux:*:*",
"cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:windows:*:*"
]
| null | 6.6 | null | null |
|
GHSA-r223-9cmx-jch2 | Verbatim Corporate Secure and Corporate Secure FIPS Edition USB flash drives validate passwords with a program running on the host computer rather than the device hardware, which allows physically proximate attackers to access the cleartext drive contents via a modified program. | []
| null | null | null | null |
|
GHSA-6qq2-f6xc-778x | A vulnerability in the Zero Touch Provisioning feature of the Cisco SD-WAN Solution could allow an unauthenticated, remote attacker to gain unauthorized access to sensitive data by using an invalid certificate. The vulnerability is due to insufficient certificate validation by the affected software. An attacker could exploit this vulnerability by supplying a crafted certificate to an affected device. A successful exploit could allow the attacker to conduct man-in-the-middle attacks to decrypt confidential information on user connections to the affected software. | []
| null | null | 7.4 | null |
|
CVE-2021-21059 | Acrobat Reader DC Buffer Overflow Vulnerability Could Lead to Arbitrary Code Execution | Acrobat Reader DC versions versions 2020.013.20074 (and earlier), 2020.001.30018 (and earlier) and 2017.011.30188 (and earlier) are affected by a Memory corruption vulnerability when parsing a specially crafted PDF file. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [
"cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
]
| null | null | 7.8 | null |
CVE-2018-12975 | The random() function of the smart contract implementation for CryptoSaga, an Ethereum game, generates a random value with publicly readable variables such as timestamp, the current block's blockhash, and a private variable (which can be read with a getStorageAt call). Therefore, attackers can precompute the random number and manipulate the game (e.g., get powerful characters or get critical damages). | [
"cpe:2.3:a:cryptosaga:cryptosaga:-:*:*:*:*:*:*:*"
]
| null | null | 7.5 | 5 |
|
CVE-2024-28288 | Ruijie RG-NBR700GW 10.3(4b12) router lacks cookie verification when resetting the password, resulting in an administrator password reset vulnerability. An attacker can use this vulnerability to log in to the device and disrupt the business of the enterprise. | [
"cpe:2.3:o:ruijie:rg-nbr700gw_firmware:10.3\\(4b12\\):*:*:*:*:*:*:*"
]
| null | 9.8 | null | null |
|
CVE-2021-39124 | The Cross-Site Request Forgery (CSRF) failure retry feature of Atlassian Jira Server and Data Center before version 8.16.0 allows remote attackers who are able to trick a user into retrying a request to bypass CSRF protection and replay a crafted request. | [
"cpe:2.3:a:atlassian:data_center:*:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:jira:*:*:*:*:*:*:*:*"
]
| null | 4.3 | null | 4.3 |
|
CVE-2019-18363 | In JetBrains TeamCity before 2019.1.2, access could be gained to the history of builds of a deleted build configuration under some circumstances. | [
"cpe:2.3:a:jetbrains:teamcity:*:*:*:*:*:*:*:*"
]
| null | 5.3 | null | 5 |
|
CVE-2023-21867 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.31 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | [
"cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*"
]
| null | 4.9 | null | null |
|
GHSA-v3vw-5ppq-6vr8 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in razvypp Tidy.ro allows Reflected XSS. This issue affects Tidy.ro: from n/a through 1.3. | []
| null | 7.1 | null | null |
|
GHSA-hchq-xm8g-c3w6 | A memory corruption issue was addressed with improved input validation. This issue is fixed in iOS 12.1.3, macOS Mojave 10.14.3, tvOS 12.1.2. A malicious application may be able to execute arbitrary code with kernel privileges. | []
| null | null | 7.8 | null |
|
GHSA-x4wp-6w9q-mrxf | Experience Manager versions 6.5.15.0 (and earlier) are affected by a URL Redirection to Untrusted Site ('Open Redirect') vulnerability. A low-privilege authenticated attacker could leverage this vulnerability to redirect users to malicious websites. Exploitation of this issue requires user interaction. | []
| null | 3.5 | null | null |
|
GHSA-f79v-v4v7-4gjw | RISCV ISA Sim commit ac466a21df442c59962589ba296c702631e041b5 implements the incorrect exception priotrity when accessing memory. | []
| null | 5.5 | null | null |
|
RHSA-2018:1254 | Red Hat Security Advisory: rh-mysql56-mysql security update | mysql: Server: Replication unspecified vulnerability (CPU Apr 2018) mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2018) mysql: Client programs unspecified vulnerability (CPU Apr 2018) mysql: InnoDB unspecified vulnerability (CPU Apr 2018) mysql: Server: Locking unspecified vulnerability (CPU Apr 2018) mysql: pid file can be created in a world-writeable directory (CPU Apr 2018) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2018) mysql: InnoDB unspecified vulnerability (CPU Apr 2018) mysql: InnoDB unspecified vulnerability (CPU Apr 2018) mysql: InnoDB unspecified vulnerability (CPU Apr 2018) mysql: GIS Extension unspecified vulnerability (CPU Apr 2018) mysql: Server: DDL unspecified vulnerability (CPU Apr 2018) mysql: Server: DDL unspecified vulnerability (CPU Apr 2018) mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2018) mysql: InnoDB unspecified vulnerability (CPU Apr 2018) | [
"cpe:/a:redhat:rhel_software_collections:3::el6",
"cpe:/a:redhat:rhel_software_collections:3::el7"
]
| null | null | 6.5 | null |
RHSA-2021:2292 | Red Hat Security Advisory: container-tools:2.0 security update | runc: vulnerable to symlink exchange attack | [
"cpe:/a:redhat:rhel_eus:8.2::appstream"
]
| null | 7.5 | null | null |
CVE-2022-4045 | Authenticated user could send multiple requests containing a parameter which could fetch a large amount of data and can crash a Mattermost server | A denial-of-service vulnerability in the Mattermost allows an authenticated user to crash the server via multiple requests to one of the API endpoints which could fetch a large amount of data.
| [
"cpe:2.3:a:mattermost:mattermost:-:*:*:*:*:*:*:*"
]
| null | 3.1 | null | null |
GHSA-7vm7-9hf9-rqxf | Stack-based buffer overflow in Yokogawa CENTUM CS 1000 R3.08.70 and earlier, CENTUM CS 3000 R3.09.50 and earlier, CENTUM CS 3000 Entry R3.09.50 and earlier, CENTUM VP R5.04.20 and earlier, CENTUM VP Entry R5.04.20 and earlier, ProSafe-RS R3.02.10 and earlier, Exaopc R3.72.00 and earlier, Exaquantum R2.85.00 and earlier, Exaquantum/Batch R2.50.30 and earlier, Exapilot R3.96.10 and earlier, Exaplog R3.40.00 and earlier, Exasmoc R4.03.20 and earlier, Exarqe R4.03.20 and earlier, Field Wireless Device OPC Server R2.01.02 and earlier, PRM R3.12.00 and earlier, STARDOM VDS R7.30.01 and earlier, STARDOM OPC Server for Windows R3.40 and earlier, FAST/TOOLS R10.01 and earlier, B/M9000CS R5.05.01 and earlier, B/M9000 VP R7.03.04 and earlier, and FieldMate R1.01 or R1.02 allows remote attackers to execute arbitrary code via a crafted packet. | []
| null | null | null | null |
|
CVE-2024-43409 | Ghost's improper authentication allows access to member information and actions | Ghost is a Node.js content management system. Improper authentication on some endpoints used for member actions would allow an attacker to perform member-only actions, and read member information. This security vulnerability is present in Ghost v4.46.0-v5.89.4. v5.89.5 contains a fix for this issue. | [
"cpe:2.3:a:ghost:ghost:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ghost:ghost:*:*:*:*:*:node.js:*:*"
]
| null | 6.5 | null | null |
GHSA-rvjg-x555-jh28 | SWFTools commit 772e55a2 was discovered to contain a floating point exception (FPE) via DCTStream::readMCURow() at /xpdf/Stream.cc.ow() | []
| null | 5.5 | null | null |
|
CVE-2008-0975 | Double-Take 5.0.0.2865 and earlier, distributed under the HP StorageWorks Storage Mirroring name and other names, allows remote attackers to cause a denial of service (CPU consumption) via a -1 value in the field that specifies the size of the vector<T> value. | [
"cpe:2.3:a:double-take_software:double-take:4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:double-take_software:double-take:5.0.0.2865:*:*:*:*:*:*:*"
]
| null | null | null | 5 |
|
GHSA-vj9h-mpjg-w7hc | Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier version, 2017.011.30138 and earlier version, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have a use after free vulnerability. Successful exploitation could lead to arbitrary code execution. | []
| null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.