id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
139k
cpes
sequencelengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
GHSA-m6h2-jx9v-58w6
Missing Authorization in Apache Airflow
If remote logging is not used, the worker (in the case of CeleryExecutor) or the scheduler (in the case of LocalExecutor) runs a Flask logging server and is listening on a specific port and also binds on 0.0.0.0 by default. This logging server had no authentication and allows reading log files of DAG jobs. This issue affects Apache Airflow < 2.1.2.
[]
5.3
5.3
null
null
CVE-2012-4429
Vino 2.28, 2.32, 3.4.2, and earlier allows remote attackers to read clipboard activity by listening on TCP port 5900.
[ "cpe:2.3:a:david_king:vino:*:*:*:*:*:*:*:*", "cpe:2.3:a:david_king:vino:0.12:*:*:*:*:*:*:*", "cpe:2.3:a:david_king:vino:0.14:*:*:*:*:*:*:*", "cpe:2.3:a:david_king:vino:2.7:*:*:*:*:*:*:*", "cpe:2.3:a:david_king:vino:2.7.3:*:*:*:*:*:*:*", "cpe:2.3:a:david_king:vino:2.7.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:david_king:vino:2.7.4:*:*:*:*:*:*:*", "cpe:2.3:a:david_king:vino:2.7.90:*:*:*:*:*:*:*", "cpe:2.3:a:david_king:vino:2.7.91:*:*:*:*:*:*:*", "cpe:2.3:a:david_king:vino:2.7.92:*:*:*:*:*:*:*", "cpe:2.3:a:david_king:vino:2.8:*:*:*:*:*:*:*", "cpe:2.3:a:david_king:vino:2.8.0:*:*:*:*:*:*:*", "cpe:2.3:a:david_king:vino:2.8.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:david_king:vino:2.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:david_king:vino:2.9:*:*:*:*:*:*:*", "cpe:2.3:a:david_king:vino:2.9.2:*:*:*:*:*:*:*", "cpe:2.3:a:david_king:vino:2.10:*:*:*:*:*:*:*", "cpe:2.3:a:david_king:vino:2.11:*:*:*:*:*:*:*", "cpe:2.3:a:david_king:vino:2.11.1:*:*:*:*:*:*:*", "cpe:2.3:a:david_king:vino:2.11.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:david_king:vino:2.11.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:david_king:vino:2.11.90:*:*:*:*:*:*:*", "cpe:2.3:a:david_king:vino:2.11.92:*:*:*:*:*:*:*", "cpe:2.3:a:david_king:vino:2.12:*:*:*:*:*:*:*", "cpe:2.3:a:david_king:vino:2.13:*:*:*:*:*:*:*", "cpe:2.3:a:david_king:vino:2.13.5:*:*:*:*:*:*:*", "cpe:2.3:a:david_king:vino:2.14:*:*:*:*:*:*:*", "cpe:2.3:a:david_king:vino:2.15:*:*:*:*:*:*:*", "cpe:2.3:a:david_king:vino:2.16:*:*:*:*:*:*:*", "cpe:2.3:a:david_king:vino:2.17:*:*:*:*:*:*:*", "cpe:2.3:a:david_king:vino:2.17.2:*:*:*:*:*:*:*", "cpe:2.3:a:david_king:vino:2.17.4:*:*:*:*:*:*:*", "cpe:2.3:a:david_king:vino:2.17.5:*:*:*:*:*:*:*", "cpe:2.3:a:david_king:vino:2.17.92:*:*:*:*:*:*:*", "cpe:2.3:a:david_king:vino:2.18:*:*:*:*:*:*:*", "cpe:2.3:a:david_king:vino:2.18.1:*:*:*:*:*:*:*", "cpe:2.3:a:david_king:vino:2.19:*:*:*:*:*:*:*", "cpe:2.3:a:david_king:vino:2.19.5:*:*:*:*:*:*:*", "cpe:2.3:a:david_king:vino:2.19.90:*:*:*:*:*:*:*", "cpe:2.3:a:david_king:vino:2.19.92:*:*:*:*:*:*:*", "cpe:2.3:a:david_king:vino:2.20:*:*:*:*:*:*:*", "cpe:2.3:a:david_king:vino:2.20.1:*:*:*:*:*:*:*", "cpe:2.3:a:david_king:vino:2.21:*:*:*:*:*:*:*", "cpe:2.3:a:david_king:vino:2.21.1:*:*:*:*:*:*:*", "cpe:2.3:a:david_king:vino:2.21.2:*:*:*:*:*:*:*", "cpe:2.3:a:david_king:vino:2.21.3:*:*:*:*:*:*:*", "cpe:2.3:a:david_king:vino:2.21.90:*:*:*:*:*:*:*", "cpe:2.3:a:david_king:vino:2.21.91:*:*:*:*:*:*:*", "cpe:2.3:a:david_king:vino:2.21.92:*:*:*:*:*:*:*", "cpe:2.3:a:david_king:vino:2.22:*:*:*:*:*:*:*", "cpe:2.3:a:david_king:vino:2.22.1:*:*:*:*:*:*:*", "cpe:2.3:a:david_king:vino:2.22.2:*:*:*:*:*:*:*", "cpe:2.3:a:david_king:vino:2.23:*:*:*:*:*:*:*", "cpe:2.3:a:david_king:vino:2.23.5:*:*:*:*:*:*:*", "cpe:2.3:a:david_king:vino:2.23.90:*:*:*:*:*:*:*", "cpe:2.3:a:david_king:vino:2.23.91:*:*:*:*:*:*:*", "cpe:2.3:a:david_king:vino:2.23.92:*:*:*:*:*:*:*", "cpe:2.3:a:david_king:vino:2.24:*:*:*:*:*:*:*", "cpe:2.3:a:david_king:vino:2.24.1:*:*:*:*:*:*:*", "cpe:2.3:a:david_king:vino:2.25:*:*:*:*:*:*:*", "cpe:2.3:a:david_king:vino:2.25.3:*:*:*:*:*:*:*", "cpe:2.3:a:david_king:vino:2.25.4:*:*:*:*:*:*:*", "cpe:2.3:a:david_king:vino:2.25.5:*:*:*:*:*:*:*", "cpe:2.3:a:david_king:vino:2.25.90:*:*:*:*:*:*:*", "cpe:2.3:a:david_king:vino:2.25.91:*:*:*:*:*:*:*", "cpe:2.3:a:david_king:vino:2.25.92:*:*:*:*:*:*:*", "cpe:2.3:a:david_king:vino:2.26:*:*:*:*:*:*:*", "cpe:2.3:a:david_king:vino:2.26.1:*:*:*:*:*:*:*", "cpe:2.3:a:david_king:vino:2.26.2:*:*:*:*:*:*:*", "cpe:2.3:a:david_king:vino:2.27:*:*:*:*:*:*:*", "cpe:2.3:a:david_king:vino:2.27.5:*:*:*:*:*:*:*", "cpe:2.3:a:david_king:vino:2.27.90:*:*:*:*:*:*:*", "cpe:2.3:a:david_king:vino:2.27.91:*:*:*:*:*:*:*", "cpe:2.3:a:david_king:vino:2.27.92:*:*:*:*:*:*:*", "cpe:2.3:a:david_king:vino:2.28:*:*:*:*:*:*:*", "cpe:2.3:a:david_king:vino:2.28.3:*:*:*:*:*:*:*", "cpe:2.3:a:david_king:vino:2.31.4:*:*:*:*:*:*:*", "cpe:2.3:a:david_king:vino:2.31.91:*:*:*:*:*:*:*", "cpe:2.3:a:david_king:vino:2.32.0:*:*:*:*:*:*:*", "cpe:2.3:a:david_king:vino:2.32.2:*:*:*:*:*:*:*", "cpe:2.3:a:david_king:vino:2.99.0:*:*:*:*:*:*:*", "cpe:2.3:a:david_king:vino:2.99.1:*:*:*:*:*:*:*", "cpe:2.3:a:david_king:vino:2.99.2:*:*:*:*:*:*:*", "cpe:2.3:a:david_king:vino:2.99.3:*:*:*:*:*:*:*", "cpe:2.3:a:david_king:vino:2.99.4:*:*:*:*:*:*:*", "cpe:2.3:a:david_king:vino:2.99.5:*:*:*:*:*:*:*", "cpe:2.3:a:david_king:vino:3.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:david_king:vino:3.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:david_king:vino:3.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:david_king:vino:3.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:david_king:vino:3.1:*:*:*:*:*:*:*", "cpe:2.3:a:david_king:vino:3.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:david_king:vino:3.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:david_king:vino:3.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:david_king:vino:3.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:david_king:vino:3.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:david_king:vino:3.1.90:*:*:*:*:*:*:*", "cpe:2.3:a:david_king:vino:3.1.91:*:*:*:*:*:*:*", "cpe:2.3:a:david_king:vino:3.1.92:*:*:*:*:*:*:*", "cpe:2.3:a:david_king:vino:3.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:david_king:vino:3.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:david_king:vino:3.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:david_king:vino:3.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:david_king:vino:3.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:david_king:vino:3.3.92:*:*:*:*:*:*:*", "cpe:2.3:a:david_king:vino:3.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:david_king:vino:3.4.1:*:*:*:*:*:*:*" ]
null
null
null
5
GHSA-5v8m-5pfx-jrmx
Windows Bluetooth Driver Information Disclosure Vulnerability.
[]
null
5.5
null
null
CVE-2020-9807
A memory corruption issue was addressed with improved state management. This issue is fixed in iOS 13.5 and iPadOS 13.5, tvOS 13.4.5, watchOS 6.2.5, Safari 13.1.1, iTunes 12.10.7 for Windows, iCloud for Windows 11.2, iCloud for Windows 7.19. Processing maliciously crafted web content may lead to arbitrary code execution.
[ "cpe:2.3:a:apple:icloud:*:*:*:*:*:windows:*:*", "cpe:2.3:a:apple:itunes:*:*:*:*:*:windows:*:*", "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*" ]
null
8.8
null
6.8
GHSA-v3gq-vrpv-476w
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Micah Blu RSVP ME allows SQL Injection.This issue affects RSVP ME: from n/a through 1.9.9.
[]
null
9.3
null
null
CVE-2025-23901
WordPress GravatarLocalCache plugin <= 1.1.2 - CSRF to Stored XSS vulnerability
Cross-Site Request Forgery (CSRF) vulnerability in Oliver Schaal GravatarLocalCache allows Cross Site Request Forgery.This issue affects GravatarLocalCache: from n/a through 1.1.2.
[]
null
7.1
null
null
GHSA-f7pg-xgpm-7pv6
SQL injection vulnerability in Welcart e-Commerce prior to 2.11.2 allows an attacker who can login to the product to obtain or alter the information stored in the database.
[]
null
8.8
null
null
CVE-2019-18463
An issue was discovered in GitLab Community and Enterprise Edition through 12.4. It has Insecure Permissions (issue 4 of 4).
[ "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*" ]
null
4.3
null
4
CVE-2022-41240
Jenkins Walti Plugin 1.0.1 and earlier does not escape the information provided by the Walti API, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to provide malicious API responses from Walti.
[ "cpe:2.3:a:jenkins:walti:*:*:*:*:*:jenkins:*:*" ]
null
5.4
null
null
GHSA-4c6m-4p4p-3j5f
Insufficient input validation in the SMU may enable a privileged attacker to write beyond the intended bounds of a shared memory buffer potentially leading to a loss of integrity.
[]
null
7.5
null
null
RHSA-2015:1647
Red Hat Security Advisory: mariadb55-mariadb security update
mysql: unspecified vulnerability related to Server:InnoDB:DML (CPU April 2015) mysql: unspecified vulnerability related to Server:Security:Encryption (CPU April 2015) mysql: unspecified vulnerability related to Server:Federated (CPU April 2015) mysql: unspecified vulnerability related to Server:Compiling (CPU April 2015) mysql: unspecified vulnerability related to Server:DDL (CPU April 2015) mysql: unspecified vulnerability related to Server:Security:Privileges (CPU April 2015) mysql: unspecified vulnerability related to Server:Optimizer (CPU April 2015) mysql: unspecified vulnerability related to Server:DDL (CPU April 2015) mysql: unspecified vulnerability related to Server:GIS (CPU July 2015) mysql: unspecified vulnerability related to Server:Security:Privileges (CPU July 2015) mysql: unspecified vulnerability related to Server:Optimizer (CPU July 2015) mysql: unspecified vulnerability related to Server:DML (CPU July 2015) mysql: use of SSL/TLS can not be enforced in mysql client library (oCERT-2015-003, BACKRONYM) mysql: unspecified vulnerability related to Server:Pluggable Auth (CPU July 2015) mysql: unspecified vulnerability related to Server:I_S (CPU July 2015) mysql: unspecified vulnerability related to Server:Optimizer (CPU July 2015) mysql: unspecified vulnerability related to Server:Security:Privileges (CPU October 2015)
[ "cpe:/a:redhat:rhel_software_collections:2::el6", "cpe:/a:redhat:rhel_software_collections:2::el7" ]
null
null
null
null
CVE-2024-47150
Some Honor products are affected by information leak vulnerability, successful exploitation could cause the information leak.
[]
null
3.3
null
null
GHSA-mjh4-pvvj-rg94
A vulnerability was discovered in the Arctera InfoScale 7.0 through 8.0.2 where a .NET remoting endpoint can be exploited due to the insecure deserialization of potentially untrusted messages. The vulnerability is present in the Windows Plugin_Host service, which runs on all the servers where InfoScale is installed. The service is used only when applications are configured for Disaster Recovery (DR) using the DR wizard. Disabling the Plugin_Host service manually will eliminate the vulnerability.
[]
null
9.8
null
null
GHSA-x8r2-m2x5-4qcf
Unspecified vulnerability in the Hyperion Enterprise Performance Management Architect component in Oracle Hyperion 11.1.2.2 and 11.1.2.3 allows remote authenticated users to affect integrity via unknown vectors related to Security, a different vulnerability than CVE-2015-2592.
[]
null
null
null
null
GHSA-7w4r-5rhr-622x
Format string vulnerability in Inkscape before 0.45.1 allows user-assisted remote attackers to execute arbitrary code via format string specifiers in a URI, which is not properly handled by certain dialogs.
[]
null
null
null
null
GHSA-224v-6x99-6pp7
In Progress MOVEit Transfer 10.2 before 10.2.6 (2018.3), 11.0 before 11.0.4 (2019.0.4), and 11.1 before 11.1.3 (2019.1.3), multiple SQL Injection vulnerabilities have been found in the REST API that could allow an unauthenticated attacker to gain unauthorized access to the database. Depending on the database engine being used (MySQL, Microsoft SQL Server, or Azure SQL), an attacker may be able to infer information about the structure and contents of the database or may be able to alter the database.
[]
null
9.8
null
null
GHSA-pvm2-jp69-rx5f
An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory, aka 'Windows GDI Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2019-1252.
[]
null
null
null
null
GHSA-f9pv-7pxf-272g
This vulnerability allows remote attackers to execute arbitrary code on affected installations of OpenText Brava! Desktop 16.6.3.84. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of DWF files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-12711.
[]
null
7.8
null
null
CVE-2023-31941
File Upload vulnerability found in Online Travel Agency System v.1.0 allows a remote attacker to execute arbitrary code via a crafted PHP file to the employee_insert.php.
[ "cpe:2.3:a:online_travel_agency_system_project:online_travel_agency_system:1.0:*:*:*:*:*:*:*" ]
null
7.2
null
null
CVE-2020-25272
In SourceCodester Online Bus Booking System 1.0, there is XSS through the name parameter in book_now.php.
[ "cpe:2.3:a:online_bus_booking_system_project:online_bus_booking_system:1.0:*:*:*:*:*:*:*" ]
null
6.1
null
4.3
CVE-2020-15391
The UI in DevSpace 4.13.0 allows web sites to execute actions on pods (on behalf of a victim) because of a lack of authentication for the WebSocket protocol. This leads to remote code execution.
[ "cpe:2.3:a:devspace:devspace:4.13.0:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
CVE-2024-45527
REDCap 14.7.0 allows HTML injection via the project title of a New Project action. This can lead to resultant logout CSRF via index.php?logout=1, and can also be used to insert a link to an external phishing website.
[ "cpe:2.3:a:redcap:redcap:14.7.0:*:*:*:*:*:*:*" ]
null
6.1
null
null
GHSA-w67g-6gjv-c599
Powerline Gitstatus vulnerable to arbitrary code execution
powerline-gitstatus (aka Powerline Gitstatus) before 1.3.2 allows arbitrary code execution. git repositories can contain per-repository configuration that changes the behavior of git, including running arbitrary commands. When using powerline-gitstatus, changing to a directory automatically runs git commands in order to display information about the current repository in the prompt. If an attacker can convince a user to change their current directory to one controlled by the attacker, such as in a shared filesystem or extracted archive, powerline-gitstatus will run arbitrary commands under the attacker's control. NOTE: this is similar to CVE-2022-20001.
[]
null
7.8
null
null
CVE-2023-5533
The AI ChatBot plugin for WordPress is vulnerable to unauthorized use of AJAX actions due to missing capability checks on the corresponding functions in versions up to, and including, 4.8.9 as well as 4.9.2. This makes it possible for unauthenticated attackers to perform some of those actions that were intended for higher privileged users.
[ "cpe:2.3:a:quantumcloud:ai_chatbot:*:*:*:*:*:wordpress:*:*", "cpe:2.3:a:quantumcloud:ai_chatbot:4.9.2:*:*:*:*:wordpress:*:*" ]
null
5.3
null
null
CVE-2009-4677
Cross-site scripting (XSS) vulnerability in search.php in phpFK PHP Forum ohne 7.0.4 allows remote attackers to inject arbitrary web script or HTML via the search parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
[ "cpe:2.3:a:frank-karau:phpfk_php_forum:7.0.4:*:*:*:*:*:*:*" ]
null
null
null
4.3
GHSA-gcfc-j66c-qv36
In asn1_p256_int of crypto/asn1.c, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-223492713References: N/A
[]
null
4.4
null
null
ICSA-18-296-02
GAIN Electronic Co. Ltd SAGA1-L Series
This product is vulnerable to a replay attack and command forgery.CVE-2018-17903 has been assigned to this vulnerability. A CVSS v3 base score of 8.3 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H). This vulnerability may allow an attacker to force-pair the device without human interaction.CVE-2018-17921 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H). An attacker with physical access to the product may able to reprogram it.CVE-2018-17923 has been assigned to this vulnerability. A CVSS v3 base score of 6.1 has been calculated; the CVSS vector string is (AV:P/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H).
[]
null
null
6.1
null
GHSA-2vgg-c8q8-87vg
An arbitrary file upload vulnerability in the Upload Photos module of Wedding Management System v1.0 allows attackers to execute arbitrary code via a crafted PHP file.
[]
null
7.2
null
null
GHSA-w39x-q2hf-mc75
There is a Permission verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect the device performance.
[]
null
null
null
null
CVE-2025-21788
net: ethernet: ti: am65-cpsw: fix memleak in certain XDP cases
In the Linux kernel, the following vulnerability has been resolved: net: ethernet: ti: am65-cpsw: fix memleak in certain XDP cases If the XDP program doesn't result in XDP_PASS then we leak the memory allocated by am65_cpsw_build_skb(). It is pointless to allocate SKB memory before running the XDP program as we would be wasting CPU cycles for cases other than XDP_PASS. Move the SKB allocation after evaluating the XDP program result. This fixes the memleak. A performance boost is seen for XDP_DROP test. XDP_DROP test: Before: 460256 rx/s 0 err/s After: 784130 rx/s 0 err/s
[]
null
null
null
null
CVE-2009-0656
Asus SmartLogon 1.0.0005 allows physically proximate attackers to bypass "security functions" by presenting an image with a modified viewpoint that matches the posture of a stored image of the authorized notebook user.
[ "cpe:2.3:a:asus:smartlogon:1.0.0005:*:*:*:*:*:*:*" ]
null
null
null
6.9
CVE-2007-3800
Unspecified vulnerability in the Real-time scanner (RTVScan) component in Symantec AntiVirus Corporate Edition 9.0 through 10.1 and Client Security 2.0 through 3.1, when the Notification Message window is enabled, allows local users to gain privileges via crafted code.
[ "cpe:2.3:a:symantec:client_security:*:*:*:*:*:*:*:*", "cpe:2.3:a:symantec:client_security:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:symantec:client_security:2.1:*:*:*:*:*:*:*", "cpe:2.3:a:symantec:norton_antivirus:*:*:corporate:*:*:*:*:*", "cpe:2.3:a:symantec:norton_antivirus:9.0:*:corporate:*:*:*:*:*", "cpe:2.3:a:symantec:norton_antivirus:10.0:*:corporate:*:*:*:*:*" ]
null
null
null
6
RHSA-2022:6753
Red Hat Security Advisory: httpd24-httpd security and bug fix update
httpd: Request splitting via HTTP/2 method injection and mod_proxy httpd: NULL pointer dereference via malformed requests httpd: mod_proxy_uwsgi: out-of-bounds read via a crafted request uri-path httpd: Out-of-bounds write in ap_escape_quotes() via malicious input httpd: possible NULL dereference or SSRF in forward proxy configurations httpd: mod_lua: Use of uninitialized value of in r:parsebody httpd: core: Possible buffer overflow with very large or unlimited LimitXMLRequestBody httpd: mod_sed: Read/write beyond bounds httpd: mod_proxy_ajp: Possible request smuggling httpd: Out-of-bounds read via ap_rwrite() httpd: Out-of-bounds read in ap_strcmp_match() httpd: mod_lua: DoS in r:parsebody httpd: mod_sed: DoS vulnerability httpd: mod_lua: Information disclosure with websockets httpd: mod_proxy: X-Forwarded-For dropped by hop-by-hop mechanism
[ "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
7.3
null
null
CVE-2024-42994
VTiger CRM <= 8.1.0 does not properly sanitize user input before using it in a SQL statement, leading to a SQL Injection in the "CompanyDetails" operation of the "MailManager" module.
[ "cpe:2.3:a:vtiger:vtiger_crm:*:*:*:*:*:*:*:*" ]
null
7.2
null
null
CVE-2021-22658
Advantech iView versions prior to v5.7.03.6112 are vulnerable to a SQL injection, which may allow an attacker to escalate privileges to 'Administrator'.
[ "cpe:2.3:a:advantech:iview:*:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
GHSA-2j54-2x3p-5g5f
SQL injection vulnerability in Advanced Electron Forum (AEF) 1.x, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary SQL commands via the filename in an uploaded attachment. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
[]
null
null
null
null
GHSA-qmfg-mq72-7q5w
Race condition in some Intel(R) PROSet/Wireless WiFi and Killerâ„¢ WiFi software for Windows before version 23.80 may allow an authenticated user to potentially enable denial of service via local access.
[]
5.7
5.6
null
null
CVE-2005-3114
Buffer overflow in the ActiveX control for NateOn Messenger (NateonDownloadManager.ocx) allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long third argument to the GotNate.Excute method.
[ "cpe:2.3:a:nateon:nateon_messenger:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-r3fj-qh7q-9m82
cPanel before 55.9999.141 allows FTP cPHulk bypass via account name munging (SEC-102).
[]
null
null
6.5
null
CVE-2022-36249
Shop Beat Services Vulnerable To Bypass 2FA via APIs
Shop Beat Solutions (Pty) LTD Shop Beat Media Player 2.5.95 up to 3.2.57 is vulnerable to Bypass 2FA via APIs. For Controlpanel Lite. "After login we are directly able to use the bearer token or jsession ID to access the apis instead of entering the 2FA code. Thus, leading to bypass of 2FA on API level.
[ "cpe:2.3:a:shopbeat:shop_beat_media_player:*:*:*:*:*:*:arm:*" ]
null
5.4
null
null
ICSA-18-275-03
Entes EMG 12
The application uses a web interface where it is possible for an attacker to bypass authentication with a specially crafted URL. This could allow for remote code execution. CVE-2018-14826 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). An information exposure through query strings vulnerability in the web interface has been identified, which may allow an attacker to impersonate a legitimate user and execute arbitrary code.CVE-2018-14822 has been assigned to this vulnerability. A CVSS v3 base score of 9.1 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N).
[]
null
null
9.1
null
CVE-2020-3182
Cisco Webex Meetings Client for MacOS Information Disclosure Vulnerability
A vulnerability in the multicast DNS (mDNS) protocol configuration of Cisco Webex Meetings Client for MacOS could allow an unauthenticated adjacent attacker to obtain sensitive information about the device on which the Webex client is running. The vulnerability exists because sensitive information is included in the mDNS reply. An attacker could exploit this vulnerability by doing an mDNS query for a particular service against an affected device. A successful exploit could allow the attacker to gain access to sensitive information.
[ "cpe:2.3:a:cisco:webex_meetings:*:*:*:*:*:macos:*:*" ]
null
null
4.3
null
CVE-2020-10626
In Fazecast jSerialComm, Version 2.2.2 and prior, an uncontrolled search path element vulnerability could allow a malicious DLL file with the same name of any resident DLLs inside the software installation to execute arbitrary code.
[ "cpe:2.3:a:fazecast:jserialcomm:*:*:*:*:*:*:*:*", "cpe:2.3:a:schneider-electric:ecostruxure_it_gateway:*:*:*:*:*:*:*:*", "cpe:2.3:a:schneider-electric:ecostruxure_it_gateway:1.7.0.64:*:*:*:*:*:*:*" ]
null
7.8
null
6.9
GHSA-wvvp-8954-mw4v
Cross-Site Request Forgery (CSRF) vulnerability in Metagauss Download Plugin <= 2.0.4 versions.
[]
null
4.3
null
null
CVE-2014-1969
Directory traversal vulnerability in the apps4u@android SD Card Manager application before 20140224 for Android allows attackers to overwrite or create arbitrary files via a crafted filename.
[ "cpe:2.3:a:apps4u\\@android:sd_card_manager:*:*:*:*:*:android:*:*" ]
null
null
null
5.8
GHSA-qg5r-95m4-mjgj
Reflected Cross-site Scripting in yiisoft/yii2 Debug mode
During the internal penetration testing of our product based on Yii2, we discovered an XSS vulnerability within the framework itself. This issue is relevant for the latest version of Yii2 (2.0.49.3).Conditions for vulnerability reproductionThe framework is in debug mode (YII_DEBUG set to true).The php.ini setting zend.exception_ignore_args is set to Off (default value).An attacker induces an exception in the application, leading to a stack trace page being displayed.Vulnerability descriptionThe issue lies in the mechanism for displaying function argument values in the stack trace. The vulnerability manifests when an argument's value exceeds 32 characters. For convenience, argument values exceeding this limit are truncated and displayed with an added "...". The full argument value becomes visible when hovering over it with the mouse, as it is displayed in the title attribute of a span tag. However, the use of a double quote (") allows an attacker to break out of the title attribute's value context and inject their own attributes into the span tag, including malicious JavaScript code through event handlers such as onmousemove.Demonstration example: http://31.184.254.143/about/aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa%22%20onmousemove=alert(1)%20style=%22width:%20100000px;%20height:%20100000px;%20position:%20absolute;%20top:%20-10000px;%20left:%200;%22Impact of the vulnerabilityThis vulnerability allows an attacker to execute arbitrary JavaScript code in the security context of the victim's site via a specially crafted link. This could lead to the theft of cookies (including httpOnly cookies, which are accessible on the page), content substitution, or complete takeover of user accounts.Technical analysis and mitigation suggestionUpon analyzing the framework's source code, it was found that data handling for the title attribute is performed in the file framework/web/ErrorHandler.php. The identified problem is related to changes made in the commit https://github.com/yiisoft/yii2/commit/8cc9aeb2f0b2ffe02fb54a817064e9da75512706 , which led to the disabling of encoding for single and double quotes in the htmlEncode method (https://github.com/yiisoft/yii2/blob/8cc9aeb2f0b2ffe02fb54a817064e9da75512706/framework/web/ErrorHandler.php#L183) due to the addition of the ENT_NOQUOTES flag. To address this issue while preserving the functionality intended by the commit, we suggest modifying the htmlEncode method as follows:This change will effectively prevent the XSS vulnerability while maintaining the targeted functionality of the previous changes.ConclusionBased on the above, we strongly recommend implementing the suggested changes to the project's main code as soon as possible to protect framework users from potential attacks. I am ready to provide further information or assistance, including creating a pull request if necessary.
[]
null
4.2
null
null
GHSA-83jm-4m95-wg4p
Unspecified vulnerability in Oracle Java SE 6u71, 7u51, and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality via unknown vectors related to Deployment.
[]
null
null
null
null
GHSA-99xv-c4pc-cc88
A vulnerability, which was classified as problematic, was found in mooSocial mooStore 3.1.6. Affected is an unknown function of the file /search/index. The manipulation of the argument q leads to cross site scripting. It is possible to launch the attack remotely. The identifier of this vulnerability is VDB-236208.
[]
null
null
3.5
null
GHSA-fw27-96f7-xwpc
SQL injection vulnerability in pics.php in Availscript Photo Album allows remote attackers to execute arbitrary SQL commands via the sid parameter.
[]
null
null
null
null
CVE-2024-38082
Microsoft Edge (Chromium-based) Spoofing Vulnerability
Microsoft Edge (Chromium-based) Spoofing Vulnerability
[ "cpe:2.3:a:microsoft:edge:*:*:*:*:*:*:*:*" ]
null
4.7
null
null
GHSA-2mf7-5579-gcwx
A User Mode Write AV in Editor+0x76af of WildBit Viewer v6.6 allows attackers to cause a denial of service (DoS) via a crafted tiff file.
[]
null
null
null
null
GHSA-g933-c5v6-98jv
Adobe Acrobat and Reader versions 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have a type confusion vulnerability. Successful exploitation could lead to information disclosure.
[]
null
null
null
null
CVE-2024-31259
WordPress SearchIQ plugin <= 4.5 - Sensitive Data Exposure via Log File vulnerability
Insertion of Sensitive Information into Log File vulnerability in Searchiq SearchIQ.This issue affects SearchIQ: from n/a through 4.5.
[ "cpe:2.3:a:searchiq:searchiq:*:*:*:*:*:*:*:*" ]
null
7.5
null
null
GHSA-9f9g-fjv5-h5g7
An incorrect authorization vulnerability was identified in GitHub Enterprise Server that allowed issue comments to be updated with an improperly scoped token. This vulnerability did not allow unauthorized access to any repository content as it also required contents:write and issues:read permissions. This vulnerability affected all versions of GitHub Enterprise Server since 3.7 and was fixed in version 3.17.19, 3.8.12, 3.9.7, 3.10.4, and 3.11.1.
[]
null
4.9
null
null
GHSA-9c2f-jqqj-vj39
Cross-site scripting (XSS) vulnerability in the Spotlight module 7.x-1.x before 7.x-1.5 for Drupal allows remote authenticated users with certain permissions to inject arbitrary web script or HTML via a node title.
[]
null
null
null
null
GHSA-h55x-f7m7-p9jh
Unspecified vulnerability in Oracle Java SE 6u65 and 7u45 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2013-5889, CVE-2013-5902, CVE-2014-0415, CVE-2014-0418, and CVE-2014-0424.
[]
null
null
null
null
CVE-2019-0386
Order processing in SAP ERP Sales (corrected in SAP_APPL 6.0, 6.02, 6.03, 6.04, 6.05, 6.06, 6.16, 6.17, 6.18) and S4HANA Sales (corrected in S4CORE 1.0, 1.01, 1.02, 1.03, 1.04) does not execute the required authorization checks for an authenticated user, which can result in an escalation of privileges.
[ "cpe:2.3:a:sap:erp_sales:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:sap:erp_sales:6.02:*:*:*:*:*:*:*", "cpe:2.3:a:sap:erp_sales:6.03:*:*:*:*:*:*:*", "cpe:2.3:a:sap:erp_sales:6.04:*:*:*:*:*:*:*", "cpe:2.3:a:sap:erp_sales:6.05:*:*:*:*:*:*:*", "cpe:2.3:a:sap:erp_sales:6.06:*:*:*:*:*:*:*", "cpe:2.3:a:sap:erp_sales:6.16:*:*:*:*:*:*:*", "cpe:2.3:a:sap:erp_sales:6.17:*:*:*:*:*:*:*", "cpe:2.3:a:sap:erp_sales:6.18:*:*:*:*:*:*:*", "cpe:2.3:a:sap:s4hana_sales:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:sap:s4hana_sales:1.01:*:*:*:*:*:*:*", "cpe:2.3:a:sap:s4hana_sales:1.02:*:*:*:*:*:*:*", "cpe:2.3:a:sap:s4hana_sales:1.03:*:*:*:*:*:*:*", "cpe:2.3:a:sap:s4hana_sales:1.04:*:*:*:*:*:*:*" ]
null
6.3
null
6.5
GHSA-f32v-f53x-625g
Race condition in Passcode Lock in Apple iOS before 4 on the iPhone and iPod touch allows physically proximate attackers to bypass intended passcode requirements, and pair a locked device with a computer and access arbitrary data, via vectors involving the initial boot.
[]
null
null
null
null
CVE-2018-18924
The image-upload feature in ProjeQtOr 7.2.5 allows remote attackers to execute arbitrary code by uploading a .shtml file with "#exec cmd" because rejected files remain on the server, with predictable filenames, after a "This file is not a valid image" error message.
[ "cpe:2.3:a:projeqtor:projeqtor:*:*:*:*:*:*:*:*" ]
null
null
8.8
6.5
CVE-2000-0104
The Shoptron shopping cart application allows remote users to modify sensitive purchase information via hidden form fields.
[ "cpe:2.3:a:web_express:shoptron:1.2:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2020-29611
An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in tvOS 14.3, macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave, iOS 14.3 and iPadOS 14.3, iCloud for Windows 12.0, watchOS 7.2. Processing a maliciously crafted image may lead to arbitrary code execution.
[ "cpe:2.3:a:apple:icloud:*:*:*:*:*:windows:*:*", "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:-:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-001:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-002:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-006:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-007:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-001:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-002:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-003:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-004:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-005:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-006:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:supplemental_update:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:supplemental_update_2:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:supplemental_update:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*" ]
null
7.8
null
6.8
GHSA-9qpm-p6ch-fh75
Illustrator versions 29.1, 28.7.3 and earlier are affected by an Integer Underflow (Wrap or Wraparound) vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[]
null
7.8
null
null
CVE-2005-2576
CaLogic 1.22, and possibly earlier versions, allows remote attackers to obtain sensitive information via a direct request to (1) doclsqlres.php, (2) clmcpreload.php, (3) viewhistlog.php, (4) mcconfig.php, (5) doclsqlbak.php, (6) defcalsel.php, or (7) cl_minical.php, which reveals the path in an error message.
[ "cpe:2.3:a:calogic:calogic:1.22:*:*:*:*:*:*:*" ]
null
null
null
5
CVE-2024-52590
Missing validation allows spoofed profiles in Misskey
Misskey is an open source, federated social media platform. In affected versions missing validation in `ApRequestService.signedGet` allows an attacker to create fake user profiles that appear to be from a different instance than the one where they actually exist. These profiles can be used to impersonate existing users from the target instance. Vulnerable Misskey instances will accept spoofed users as valid, allowing an attacker to impersonate users on another instance. Attackers have full control of the spoofed user and can post, renote, or otherwise interact like a real account. This issue has been addressed in version 2024.11.0-alpha.3. Users are advised to upgrade. There are no known workarounds for this vulnerability.
[]
8.8
null
null
null
CVE-2011-4263
Cross-site scripting (XSS) vulnerability in Schneider Electric PowerChute Business Edition before 8.5 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
[ "cpe:2.3:a:apc:powerchute:*:*:business:*:*:*:*:*", "cpe:2.3:a:apc:powerchute:6.0:*:business:*:*:*:*:*", "cpe:2.3:a:apc:powerchute:7.0.4:*:business:*:*:*:*:*", "cpe:2.3:a:apc:powerchute:7.1:*:business:*:*:*:*:*" ]
null
null
null
4.3
GHSA-8ppm-2m96-gmg5
An issue was discovered in the Linux kernel through 4.17.10. There is a use-after-free in try_merge_free_space() when mounting a crafted btrfs image, because of a lack of chunk type flag checks in btrfs_check_chunk_valid in fs/btrfs/volumes.c.
[]
null
null
5.5
null
CVE-2020-12717
The COVIDSafe (Australia) app 1.0 and 1.1 for iOS allows a remote attacker to crash the app, and consequently interfere with COVID-19 contact tracing, via a Bluetooth advertisement containing manufacturer data that is too short. This occurs because of an erroneous OpenTrace manuData.subdata call. The ABTraceTogether (Alberta), ProteGO (Poland), and TraceTogether (Singapore) apps were also affected.
[ "cpe:2.3:a:alberta:abtracetogether:-:*:*:*:*:iphone_os:*:*", "cpe:2.3:a:gov:protego_safe:-:*:*:*:*:iphone_os:*:*", "cpe:2.3:a:health:covidsafe:1.0:*:*:*:*:iphone_os:*:*", "cpe:2.3:a:health:covidsafe:1.1:*:*:*:*:iphone_os:*:*", "cpe:2.3:a:tracetogether:tracetogether:-:*:*:*:*:iphone_os:*:*" ]
null
6.5
null
3.3
GHSA-8m6h-hpr3-hm4g
Constructr CMS 3.02.5 and earlier stores passwords in cleartext in a MySQL database, which allows context-dependent attackers to obtain sensitive information by reading the hash column.
[]
null
null
null
null
CVE-2020-3179
Cisco Firepower Threat Defense Software Generic Routing Encapsulation Tunnel IPv6 Denial of Service Vulnerability
A vulnerability in the generic routing encapsulation (GRE) tunnel decapsulation feature of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to a memory handling error when GRE over IPv6 traffic is processed. An attacker could exploit this vulnerability by sending crafted GRE over IPv6 packets with either IPv4 or IPv6 payload through an affected device. A successful exploit could allow the attacker to cause the device to crash, resulting in a DoS condition.
[ "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asa_5505_firmware:9.9\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asa_5505_firmware:101.5\\(1.26\\):*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asa_5505:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asa_5510_firmware:9.9\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asa_5510_firmware:101.5\\(1.26\\):*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asa_5510:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asa_5512-x_firmware:9.9\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asa_5512-x_firmware:101.5\\(1.26\\):*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asa_5512-x:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asa_5515-x_firmware:9.9\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asa_5515-x_firmware:101.5\\(1.26\\):*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asa_5515-x:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asa_5520_firmware:9.9\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asa_5520_firmware:101.5\\(1.26\\):*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asa_5520:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asa_5525-x_firmware:9.9\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asa_5525-x_firmware:101.5\\(1.26\\):*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asa_5525-x:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asa_5540_firmware:9.9\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asa_5540_firmware:101.5\\(1.26\\):*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asa_5540:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asa_5545-x_firmware:9.9\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asa_5545-x_firmware:101.5\\(1.26\\):*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asa_5545-x:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asa_5550_firmware:9.9\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asa_5550_firmware:101.5\\(1.26\\):*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asa_5550:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asa_5555-x_firmware:9.9\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asa_5555-x_firmware:101.5\\(1.26\\):*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asa_5555-x:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asa_5580_firmware:9.9\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asa_5580_firmware:101.5\\(1.26\\):*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asa_5580:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asa_5585-x_firmware:9.9\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asa_5585-x_firmware:101.5\\(1.26\\):*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asa_5585-x:-:*:*:*:*:*:*:*" ]
null
null
8.6
null
GHSA-mjmc-34rr-8mwh
An issue in the Feature Navigator of Micro-Star International MSI Feature Nagivator v1.0.1808.0901 allows attackers to cause a Denial of Service (DoS) via a crafted image or video file.
[]
null
7.1
null
null
GHSA-4527-385c-q8r6
IPP software prior to v1.71 is vulnerable to default credential vulnerability. This could lead attackers to identify and access vulnerable systems.
[]
null
6.7
null
null
CVE-2024-33688
WordPress Teluro theme <= 1.0.31 - Cross Site Request Forgery (CSRF) vulnerability
Cross-Site Request Forgery (CSRF) vulnerability in Extend Themes Teluro.This issue affects Teluro: from n/a through 1.0.31.
[ "cpe:2.3:a:wordpress:teluro_theme:*:*:*:*:*:*:*:*" ]
null
4.3
null
null
CVE-2024-45817
x86: Deadlock in vlapic_error()
In x86's APIC (Advanced Programmable Interrupt Controller) architecture, error conditions are reported in a status register. Furthermore, the OS can opt to receive an interrupt when a new error occurs. It is possible to configure the error interrupt with an illegal vector, which generates an error when an error interrupt is raised. This case causes Xen to recurse through vlapic_error(). The recursion itself is bounded; errors accumulate in the the status register and only generate an interrupt when a new status bit becomes set. However, the lock protecting this state in Xen will try to be taken recursively, and deadlock.
[]
null
7.3
null
null
CVE-2022-46123
Helmet Store Showroom Site v1.0 is vulnerable to SQL Injection via /hss/admin/categories/manage_category.php?id=.
[ "cpe:2.3:a:helmet_store_showroom_site_project:helmet_store_showroom_site:1.0:*:*:*:*:*:*:*" ]
null
7.2
null
null
GHSA-f7rq-r4jq-fq45
The RapidLoad Power-Up for Autoptimize plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.7.1. This is due to missing or incorrect nonce validation on the clear_uucss_logs function. This makes it possible for unauthenticated attackers to clear plugin logs via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
[]
null
4.3
null
null
CVE-2011-0598
Integer overflow in ACE.dll in Adobe Reader and Acrobat 10.x before 10.0.1, 9.x before 9.4.2, and 8.x before 8.2.6 on Windows and Mac OS X allows remote attackers to execute arbitrary code via crafted ICC data, a different vulnerability than CVE-2011-0596, CVE-2011-0599, and CVE-2011-0602.
[ "cpe:2.3:a:adobe:acrobat_reader:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:8.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:8.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:8.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:8.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:8.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:8.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:8.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:8.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:8.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:8.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:8.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:8.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:9.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:9.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:9.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:9.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:9.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:9.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:9.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:9.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:9.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:9.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:9.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:9.4:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:9.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.4:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.0:*:*:*:*:*:*:*" ]
null
null
null
9.3
CVE-2022-48435
In JetBrains PhpStorm before 2023.1 source code could be logged in the local idea.log file
[ "cpe:2.3:a:jetbrains:phpstorm:*:*:*:*:*:*:*:*" ]
null
3.3
null
null
PYSEC-2020-286
null
In Tensorflow before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, changing the TensorFlow's `SavedModel` protocol buffer and altering the name of required keys results in segfaults and data corruption while loading the model. This can cause a denial of service in products using `tensorflow-serving` or other inference-as-a-service installments. Fixed were added in commits f760f88b4267d981e13f4b302c437ae800445968 and fcfef195637c6e365577829c4d67681695956e7d (both going into TensorFlow 2.2.0 and 2.3.0 but not yet backported to earlier versions). However, this was not enough, as #41097 reports a different failure mode. The issue is patched in commit adf095206f25471e864a8e63a0f1caef53a0e3a6, and is released in TensorFlow versions 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1.
[]
null
null
null
null
GHSA-6276-fpxw-7hf6
An issue was discovered in these Pivotal RabbitMQ versions: all 3.4.x versions, all 3.5.x versions, and 3.6.x versions prior to 3.6.9; and these RabbitMQ for PCF versions: all 1.5.x versions, 1.6.x versions prior to 1.6.18, and 1.7.x versions prior to 1.7.15. Several forms in the RabbitMQ management UI are vulnerable to XSS attacks.
[]
null
null
6.1
null
GHSA-455g-hrv6-rm9g
Stack-based buffer overflow in Eureka Email 2.2q allows remote POP3 servers to execute arbitrary code via a long error message.
[]
null
null
null
null
GHSA-c3hc-9pfw-j6jf
Simple Bus Ticket Booking System 1.0 is vulnerable to SQL Injection via /SimpleBusTicket/index.php.
[]
null
9.8
null
null
GHSA-h328-hvpc-rxj2
The LTL Freight Quotes – TForce Edition plugin for WordPress is vulnerable to SQL Injection via the 'dropship_edit_id' and 'edit_id' parameters in all versions up to, and including, 3.6.4 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
[]
null
7.5
null
null
CVE-2022-3969
OpenKM FileUtils.java getFileExtension temp file
A vulnerability was found in OpenKM up to 6.3.11 and classified as problematic. Affected by this issue is the function getFileExtension of the file src/main/java/com/openkm/util/FileUtils.java. The manipulation leads to insecure temporary file. Upgrading to version 6.3.12 is able to address this issue. The name of the patch is c069e4d73ab8864345c25119d8459495f45453e1. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-213548.
[ "cpe:2.3:a:openkm:openkm:*:*:*:*:*:*:*:*" ]
null
2.6
null
null
GHSA-gjcw-vmfm-pc8c
An unauthenticated attacker can perform a null pointer dereference in the DHIP Service (UDP port 37810). This vulnerability has been resolved in firmware version 2.800.0000000.8.R.20241111.
[]
null
5.3
null
null
GHSA-x463-hcrq-3f9v
Trusty contains a vulnerability in the HDCP service TA where bounds checking in command 10 is missing. The length of an I/O buffer parameter is not checked, which might lead to memory corruption.
[]
null
6.7
null
null
GHSA-jccw-fxvj-rv5h
Object lifecycle issue in Chrome Custom Tab in Google Chrome prior to 65.0.3325.146 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.
[]
null
null
4.3
null
GHSA-g5ff-82hw-j5f8
Integer overflow in the IMAP (IMAP4) support in Microsoft Exchange Server 2000 SP3 allows remote attackers to cause a denial of service (service hang) via crafted literals in an IMAP command, aka the "IMAP Literal Processing Vulnerability."
[]
null
null
null
null
CVE-2019-8568
A validation issue existed in the handling of symlinks. This issue was addressed with improved validation of symlinks. This issue is fixed in iOS 12.3, macOS Mojave 10.14.5, tvOS 12.3, watchOS 5.2.1. A local user may be able to modify protected parts of the file system.
[ "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*" ]
null
5.5
null
2.1
CVE-2023-42122
Control Web Panel wloggui Command Injection Local Privilege Escalation Vulnerability
Control Web Panel wloggui Command Injection Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Control Web Panel. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the cwpsrv process, which listens on the loopback interface. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of root. Was ZDI-CAN-21079.
[ "cpe:2.3:a:control_web_panel:control_web_panel:*:*:*:*:*:*:*:*" ]
null
null
7.8
null
RHSA-2024:1763
Red Hat Security Advisory: OpenShift Container Platform 4.13.40 packages and security update
golang-fips/openssl: Memory leaks in code encrypting and decrypting RSA payloads
[ "cpe:/a:redhat:openshift:4.13::el8", "cpe:/a:redhat:openshift:4.13::el9" ]
null
7.5
null
null
RHSA-2025:1242
Red Hat Security Advisory: OpenShift Container Platform 4.12.73 bug fix and security update
rsync: Info Leak via Uninitialized Stack Contents kernel: media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format
[ "cpe:/a:redhat:openshift:4.12::el8" ]
null
7.3
null
null
CVE-2020-15918
Multiple Stored Cross Site Scripting (XSS) vulnerabilities were discovered in Mida eFramework through 2.9.0.
[ "cpe:2.3:a:midasolutions:eframework:*:*:*:*:*:*:*:*" ]
null
5.4
null
3.5
GHSA-rhx9-3qf7-r3j7
Drupal Remote code execution
A 3rd party development library including with Drupal 8 development dependencies is vulnerable to remote code execution. This is mitigated by the default .htaccess protection against PHP execution, and the fact that Composer development dependencies aren't normal installed. You might be vulnerable to this if you are running a version of Drupal before 8.2.2. To be sure you aren't vulnerable, you can remove the <siteroot>/vendor/phpunit directory from your production deployments
[]
null
null
8.1
null
GHSA-q7qj-rx6w-8pxw
A race condition was addressed with additional validation. This issue is fixed in iPadOS 17.7.3, watchOS 11.2, visionOS 2.2, tvOS 18.2, macOS Sequoia 15.2, iOS 18.2 and iPadOS 18.2, macOS Ventura 13.7.2, macOS Sonoma 14.7.2. An attacker may be able to create a read-only memory mapping that can be written to.
[]
null
5.9
null
null
CVE-2007-1801
Directory traversal vulnerability in inc/lang.php in sBLOG 0.7.3 Beta allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the conf_lang_default parameter, as demonstrated by injecting PHP sequences into an Apache HTTP Server log file, which is then included by inc/lang.php.
[ "cpe:2.3:a:sblog:sblog:0.7.3_beta:*:*:*:*:*:*:*" ]
null
null
null
7.5
RHSA-2020:1020
Red Hat Security Advisory: curl security and bug fix update
curl: TFTP receive heap buffer overflow in tftp_receive_packet() function
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
7
null
null
CVE-2015-5571
Adobe Flash Player before 18.0.0.241 and 19.x before 19.0.0.185 on Windows and OS X and before 11.2.202.521 on Linux, Adobe AIR before 19.0.0.190, Adobe AIR SDK before 19.0.0.190, and Adobe AIR SDK & Compiler before 19.0.0.190 do not properly restrict the SWF file format, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks against JSONP endpoints, and obtain sensitive information, via a crafted OBJECT element with SWF content satisfying the character-set requirements of a callback API. NOTE: this issue exists because of an incomplete fix for CVE-2014-4671 and CVE-2014-5333.
[ "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:14.0.0.125:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:14.0.0.145:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:14.0.0.176:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:14.0.0.179:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:15.0.0.152:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:15.0.0.167:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:15.0.0.189:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:15.0.0.223:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:15.0.0.239:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:15.0.0.246:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:16.0.0.235:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:16.0.0.257:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:16.0.0.287:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:16.0.0.296:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:17.0.0.134:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:17.0.0.169:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:17.0.0.188:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:17.0.0.190:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:17.0.0.191:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:18.0.0.160:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:18.0.0.194:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:18.0.0.203:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:18.0.0.209:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:18.0.0.232:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*" ]
null
null
null
4.3
CVE-2014-8475
FreeBSD 9.1, 9.2, and 10.0, when compiling OpenSSH with Kerberos support, uses incorrect library ordering when linking sshd, which causes symbols to be resolved incorrectly and allows remote attackers to cause a denial of service (sshd deadlock and prevention of new connections) by ending multiple connections before authentication is completed.
[ "cpe:2.3:o:freebsd:freebsd:9.1:*:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:9.2:*:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:10.0:*:*:*:*:*:*:*" ]
null
null
null
4.3
GHSA-86p5-97jr-r598
Arbitrary file upload in ShopXO
An issue was discovered in ShopXO CMS 2.2.0. After entering the management page, there is an arbitrary file upload vulnerability in three locations.
[]
null
7.2
null
null
CVE-2024-44195
A logic issue was addressed with improved validation. This issue is fixed in macOS Sequoia 15.1. An app may be able to read arbitrary files.
[]
null
7.5
null
null