id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2009-3508 | Multiple directory traversal vulnerabilities in MUJE CMS 1.0.4.34 allow remote attackers to include and execute arbitrary local files via a .. (dot dot) in the (1) _class parameter to admin.php and the (2) url parameter to install/install.php; and allow remote authenticated administrators to read arbitrary files via a .. (dot dot) in the (3) _htmlfile parameter to admin.php. | [
"cpe:2.3:a:fcgphilipp:mujecms:1.0.4.34:*:*:*:*:*:*:*"
] | null | null | null | 6 |
|
GHSA-6m97-8hch-4h66 | Another vulnerability in the Android media framework (n/a). Product: Android. Versions: 7.0, 7.1.1, 7.1.2, 8.0. Android ID: A-64836894. | [] | null | null | 7.5 | null |
|
GHSA-94p3-q55j-7qf5 | silex SX-2000WG devices with firmware before 1.5.4 allow remote attackers to cause a denial of service (connectivity outage) via crafted data in the Options field of a TCP header, a different vulnerability than CVE-2014-3890. | [] | null | null | null | null |
|
GHSA-r464-cmf2-6xc5 | Input validation issue in Buffalo BBR-4HG and and BBR-4MG broadband routers with firmware 1.00 to 1.48 and 2.00 to 2.07 allows an attacker to cause the device to become unresponsive via unspecified vectors. | [] | null | null | 4.5 | null |
|
CVE-2022-0896 | Improper Neutralization of Special Elements Used in a Template Engine in microweber/microweber | Improper Neutralization of Special Elements Used in a Template Engine in GitHub repository microweber/microweber prior to 1.3. | [
"cpe:2.3:a:microweber:microweber:*:*:*:*:*:*:*:*"
] | null | null | 7.1 | null |
GHSA-w9p9-gj6c-h5c7 | The ium (aka net.ium.mobile.android) application 3.3.4 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [] | null | null | null | null |
|
CVE-2022-47132 | A Cross-Site Request Forgery (CSRF) in Academy LMS before v5.10 allows attackers to arbitrarily add Administrator users. | [
"cpe:2.3:a:creativeitem:academy_lms:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
|
GHSA-9p8w-rwvc-4f9w | Cross-zone scripting vulnerability in the DOM templates (domplates) used by the console.log function in the Firebug extension before 1.04 for Mozilla Firefox allows remote attackers to bypass zone restrictions, read arbitrary file:// URIs, or execute arbitrary code in the browser chrome by overwriting the toString function via a certain function declaration, related to incorrect identification of anonymous JavaScript functions, a different issue than CVE-2007-1878. | [] | null | null | null | null |
|
GHSA-jx6w-5q44-8g67 | An attacker can gain VxWorks Shell after login due to hard-coded credentials on a KUKA KR C4 control software for versions prior to 8.7 or any product running KSS. | [] | null | 8.8 | null | null |
|
GHSA-77r4-738q-2mfm | In wlan driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service in wlan services. | [] | null | 5.5 | null | null |
|
CVE-2025-31460 | WordPress OmniLeads Scripts and Tags Manager plugin <= 1.3 - CSRF to Stored XSS vulnerability | Cross-Site Request Forgery (CSRF) vulnerability in danielmuldernl OmniLeads Scripts and Tags Manager allows Stored XSS. This issue affects OmniLeads Scripts and Tags Manager: from n/a through 1.3. | [] | null | 7.1 | null | null |
GHSA-rh22-qpv4-cr2w | SQL injection vulnerability in show_search_result.php in i-netsolution Job Search Engine allows remote attackers to execute arbitrary SQL commands via the keyword parameter. | [] | null | null | null | null |
|
CVE-2024-34699 | GZ::CTF allows unprivileged user can perform XSS attacks by constructing malicious team names. | GZ::CTF is a capture the flag platform. Prior to 0.20.1, unprivileged user can perform cross-site scripting attacks on other users by constructing malicious team names. This problem has been fixed in `v0.20.1`. | [] | null | 6.5 | null | null |
CVE-2024-50407 | WordPress Namaste! LMS plugin <= 2.6.2 - Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Kiboko Labs Namaste! LMS allows Reflected XSS.This issue affects Namaste! LMS: from n/a through 2.6.2. | [
"cpe:2.3:a:kibokolabs:namaste\\!_lms:*:*:*:*:*:wordpress:*:*"
] | null | 7.1 | null | null |
GHSA-c474-f694-3xx6 | A CWE-248: Uncaught Exception vulnerability exists in Modicon M580, Modicon M340, Modicon BMxCRA and 140CRA modules (all firmware versions), which could cause a Denial of Service attack on the PLC when upgrading the firmware with a missing web server image inside the package using FTP protocol. | [] | null | null | null | null |
|
CVE-2008-1917 | Multiple cross-site scripting (XSS) vulnerabilities in AMFPHP 1.2 allow remote attackers to inject arbitrary web script or HTML via the (1) class parameter to (a) methodTable.php, (b) code.php, and (c) details.php in browser/; and the (2) location parameter to browser/code.php. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | [
"cpe:2.3:a:amfphp:amfphp:1.2:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-mjh3-g7qw-vgfv | Cross-site scripting (XSS) vulnerability in the jQuery Countdown module 7.x-1.x before 7.x-1.1 for Drupal allows remote authenticated users with the "access administration pages" permission to inject arbitrary web script or HTML via unspecified vectors. | [] | null | null | null | null |
|
CVE-2023-28295 | Microsoft Publisher Remote Code Execution Vulnerability | Microsoft Publisher Remote Code Execution Vulnerability | [
"cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:publisher:2013:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:publisher:2016:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
CVE-2016-2336 | Type confusion exists in two methods of Ruby's WIN32OLE class, ole_invoke and ole_query_interface. Attacker passing different type of object than this assumed by developers can cause arbitrary code execution. | [
"cpe:2.3:a:ruby-lang:ruby:2.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ruby-lang:ruby:2.3.0:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 |
|
CVE-2003-1133 | Rit Research Labs The Bat! 1.0.11 through 2.0 creates new accounts with insecure ACLs, which allows local users to read other users' email messages. | [
"cpe:2.3:a:ritlabs:the_bat:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ritlabs:the_bat:1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ritlabs:the_bat:1.011:*:*:*:*:*:*:*",
"cpe:2.3:a:ritlabs:the_bat:1.14:*:*:*:*:*:*:*",
"cpe:2.3:a:ritlabs:the_bat:1.15:*:*:*:*:*:*:*",
"cpe:2.3:a:ritlabs:the_bat:1.015:*:*:*:*:*:*:*",
"cpe:2.3:a:ritlabs:the_bat:1.17:*:*:*:*:*:*:*",
"cpe:2.3:a:ritlabs:the_bat:1.18:*:*:*:*:*:*:*",
"cpe:2.3:a:ritlabs:the_bat:1.19:*:*:*:*:*:*:*",
"cpe:2.3:a:ritlabs:the_bat:1.21:*:*:*:*:*:*:*",
"cpe:2.3:a:ritlabs:the_bat:1.22:*:*:*:*:*:*:*",
"cpe:2.3:a:ritlabs:the_bat:1.028:*:*:*:*:*:*:*",
"cpe:2.3:a:ritlabs:the_bat:1.029:*:*:*:*:*:*:*",
"cpe:2.3:a:ritlabs:the_bat:1.31:*:*:*:*:*:*:*",
"cpe:2.3:a:ritlabs:the_bat:1.031:*:*:*:*:*:*:*",
"cpe:2.3:a:ritlabs:the_bat:1.32:*:*:*:*:*:*:*",
"cpe:2.3:a:ritlabs:the_bat:1.032:*:*:*:*:*:*:*",
"cpe:2.3:a:ritlabs:the_bat:1.33:*:*:*:*:*:*:*",
"cpe:2.3:a:ritlabs:the_bat:1.34:*:*:*:*:*:*:*",
"cpe:2.3:a:ritlabs:the_bat:1.035:*:*:*:*:*:*:*",
"cpe:2.3:a:ritlabs:the_bat:1.35:*:*:*:*:*:*:*",
"cpe:2.3:a:ritlabs:the_bat:1.036:*:*:*:*:*:*:*",
"cpe:2.3:a:ritlabs:the_bat:1.36:*:*:*:*:*:*:*",
"cpe:2.3:a:ritlabs:the_bat:1.037:*:*:*:*:*:*:*",
"cpe:2.3:a:ritlabs:the_bat:1.39:*:*:*:*:*:*:*",
"cpe:2.3:a:ritlabs:the_bat:1.039:*:*:*:*:*:*:*",
"cpe:2.3:a:ritlabs:the_bat:1.041:*:*:*:*:*:*:*",
"cpe:2.3:a:ritlabs:the_bat:1.41:*:*:*:*:*:*:*",
"cpe:2.3:a:ritlabs:the_bat:1.42:*:*:*:*:*:*:*",
"cpe:2.3:a:ritlabs:the_bat:1.42f:*:*:*:*:*:*:*",
"cpe:2.3:a:ritlabs:the_bat:1.043:*:*:*:*:*:*:*",
"cpe:2.3:a:ritlabs:the_bat:1.43:*:*:*:*:*:*:*",
"cpe:2.3:a:ritlabs:the_bat:1.44:*:*:*:*:*:*:*",
"cpe:2.3:a:ritlabs:the_bat:1.45:*:*:*:*:*:*:*",
"cpe:2.3:a:ritlabs:the_bat:1.46:*:*:*:*:*:*:*",
"cpe:2.3:a:ritlabs:the_bat:1.47:*:*:*:*:*:*:*",
"cpe:2.3:a:ritlabs:the_bat:1.48:*:*:*:*:*:*:*",
"cpe:2.3:a:ritlabs:the_bat:1.49:*:*:*:*:*:*:*",
"cpe:2.3:a:ritlabs:the_bat:1.51:*:*:*:*:*:*:*",
"cpe:2.3:a:ritlabs:the_bat:1.52:*:*:*:*:*:*:*",
"cpe:2.3:a:ritlabs:the_bat:1.53d:*:*:*:*:*:*:*",
"cpe:2.3:a:ritlabs:the_bat:1.101:*:*:*:*:*:*:*",
"cpe:2.3:a:ritlabs:the_bat:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ritlabs:the_bat:2.0.1:*:*:*:*:*:*:*"
] | null | null | null | 2.1 |
|
CVE-2022-28412 | Car Driving School Managment System v1.0 was discovered to contain a SQL injection vulnerability via /cdsms/classes/Master.php?f=delete_package. | [
"cpe:2.3:a:car_driving_school_management_system_project:car_driving_school_management_system:1.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
|
GHSA-h7mg-mmcf-cc8c | Auth. (admin+) Stored Cross-site Scripting (XSS) vulnerability in PI Websolution Product page shipping calculator for WooCommerce plugin <= 1.3.20 versions. | [] | null | 4.8 | null | null |
|
GHSA-259v-fw35-w989 | golang/go in 1.0.2 fixes all.bash on shared machines. dotest() in src/pkg/debug/gosym/pclntab_test.go creates a temporary file with predicable name and executes it as shell script. | [] | null | null | null | null |
|
GHSA-3r84-hhrv-2935 | In createQuickShareAction of SaveImageInBackgroundTask.java, there is a possible way to trigger a background activity launch due to an unsafe PendingIntent. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | [] | null | 7.8 | null | null |
|
CVE-2020-21603 | libde265 v1.0.4 contains a heap buffer overflow in the put_qpel_0_0_fallback_16 function, which can be exploited via a crafted a file. | [
"cpe:2.3:a:struktur:libde265:1.0.4:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4.3 |
|
GHSA-vc6m-jrww-32fp | The System Configuration Protocol (SCP) core messaging interface in Cisco Prime Network Registrar 8.2 before 8.2.3.1 and 8.3 before 8.3.2 allows remote attackers to obtain sensitive information via crafted SCP messages, aka Bug ID CSCuv35694. | [] | null | null | 7.5 | null |
|
CVE-2023-3208 | RoadFlow Visual Process Engine .NET Core Mvc Login sql injection | A vulnerability, which was classified as critical, has been found in RoadFlow Visual Process Engine .NET Core Mvc 2.13.3. Affected by this issue is some unknown functionality of the file /Log/Query?appid=0B736354-9473-4D66-B9C0-15CAC149EB05&tabid=tab_0B73635494734D66B9C015CAC149EB05 of the component Login. The manipulation of the argument sidx/sord leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-231230 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | [
"cpe:2.3:a:roadflow:roadflow:2.13.3:*:*:*:*:*:*:*"
] | null | 6.3 | 6.3 | 6.5 |
GHSA-5c92-xf29-3c94 | Memory leak in Xen 3.3 through 4.8.x allows guest OS users to cause a denial of service (ARM or x86 AMD host OS memory consumption) by continually rebooting, because certain cleanup is skipped if no pass-through device was ever assigned, aka XSA-207. | [] | null | null | 5.5 | null |
|
GHSA-cpqg-cv2f-q5p4 | Vulnerability in the Oracle SOA Suite component of Oracle Fusion Middleware (subcomponent: Health Care FastPath). Supported versions that are affected are 11.1.1.7.0, 11.1.1.9.0, 12.1.3.0.0, 12.2.1.2.0 and 12.2.1.3.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle SOA Suite. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle SOA Suite accessible data. CVSS 3.0 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N). | [] | null | null | 4.3 | null |
|
CVE-2023-28141 | NTFS Junction |
An NTFS Junction condition exists in the Qualys Cloud Agent
for Windows platform in versions before 4.8.0.31. Attackers may write files to
arbitrary locations via a local attack vector. This allows attackers to assume
the privileges of the process, and they may delete or otherwise on unauthorized
files, allowing for the potential modification or deletion of sensitive files
limited only to that specific directory/file object. This vulnerability is
bounded to the time of installation/uninstallation and can only be exploited locally.
At the time of this disclosure, versions before 4.0 are
classified as End of Life.
| [
"cpe:2.3:a:qualys:cloud_agent:*:*:*:*:*:windows:*:*"
] | null | 6.7 | null | null |
GHSA-qw9h-4855-wwrh | A denial of service vulnerability was reported in Lenovo System Update versions prior to 5.07.0088 that could allow configuration files to be written to non-standard locations. | [] | null | null | null | null |
|
CVE-1999-0963 | FreeBSD mount_union command allows local users to gain root privileges via a symlink attack. | [
"cpe:2.3:o:freebsd:freebsd:2.2:*:*:*:*:*:*:*"
] | null | null | null | 7.2 |
|
GHSA-w3wx-pfgj-qgv3 | An exploitable use-after-free vulnerability exists in WebKitGTK browser version 2.30.1 x64. A specially crafted HTML web page can cause a use-after-free condition, resulting in a remote code execution. The victim needs to visit a malicious web site to trigger this vulnerability. | [] | null | 8.8 | null | null |
|
CVE-2009-4805 | Multiple SQL injection vulnerabilities in EZ-Blog Beta 1, when magic_quotes_gpc is disabled, allow remote attackers to execute arbitrary SQL commands via (1) the storyid parameter to public/view.php or (2) the kill parameter to admin/remove.php. | [
"cpe:2.3:a:will_kraft:ez-blog:-:beta1:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
GHSA-qp5q-3jm8-4774 | In GNU Binutils 2.30, there's an integer overflow in the function load_specific_debug_section() in objdump.c, which results in `malloc()` with 0 size. A crafted ELF file allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact. | [] | null | null | 7.8 | null |
|
CVE-2021-35645 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | [
"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*"
] | null | 4.9 | null | null |
|
GHSA-qwg8-7mc5-hgvx | A vulnerability was found in SourceCodester Drag and Drop Image Upload 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /upload.php. The manipulation leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. | [] | 5.3 | 6.3 | null | null |
|
CVE-2007-4619 | Multiple integer overflows in Free Lossless Audio Codec (FLAC) libFLAC before 1.2.1, as used in Winamp before 5.5 and other products, allow user-assisted remote attackers to execute arbitrary code via a malformed FLAC file that triggers improper memory allocation, resulting in a heap-based buffer overflow. | [
"cpe:2.3:a:flac:libflac:*:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:*:*:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
GHSA-7g38-2ph5-vm4v | Untrusted search path vulnerability in metadata/loader.c in Mono 2.8 and earlier allows local users to gain privileges via a Trojan horse shared library in the current working directory. | [] | null | null | null | null |
|
CVE-2015-2368 | Untrusted search path vulnerability in Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8.1, Windows Server 2012 R2, and Windows RT 8.1 allows local users to gain privileges via a Trojan horse DLL in the current working directory, aka "Windows DLL Remote Code Execution Vulnerability." | [
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:datacenter:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:essentials:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:standard:*:*:*"
] | null | null | null | 6.9 |
|
CVE-2023-42685 | In wifi service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed | [
"cpe:2.3:o:google:android:10.0:-:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc7731e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc9832e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t310:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
|
CVE-2020-5885 | On versions 15.0.0-15.1.0.1, 14.1.0-14.1.2.3, 13.1.0-13.1.3.3, and 12.1.0-12.1.5.1, BIG-IP systems set up for connection mirroring in a high availability (HA) pair transfer sensitive cryptographic objects over an insecure communications channel. This is a control plane issue which is exposed only on the network used for connection mirroring. | [
"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*"
] | null | 9.1 | null | 6.4 |
|
GHSA-pp63-cgj5-h996 | A buffer overflow issue was addressed with improved memory handling. This issue is fixed in macOS Monterey 12.3, Safari 15.4, watchOS 8.5, iTunes 12.12.3 for Windows, iOS 15.4 and iPadOS 15.4, tvOS 15.4. Processing maliciously crafted web content may lead to arbitrary code execution. | [] | null | 8.8 | null | null |
|
CVE-2007-3689 | The Print module before 4.7-1.0 and 5.x before 5.x-1.2 for Drupal allows remote attackers to read restricted posts in (1) Organic Groups, (2) Taxonomy Access Control, (3) Taxonomy Access Lite, and other unspecified node access modules, via modified URL arguments. | [
"cpe:2.3:a:drupal:print_module:*:*:*:*:*:*:*:*"
] | null | null | null | 7.8 |
|
CVE-2024-38471 | Multiple TP-LINK products allow a network-adjacent attacker with an administrative privilege to execute arbitrary OS commands by restoring a crafted backup file. The affected device, with the initial configuration, allows login only from the LAN port or Wi-Fi. | [
"cpe:2.3:o:tp-link:archer_ax3000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:archer_axe75_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:archer_ax5400_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:archer_axe5400_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:archer_airr5_firmware:*:*:*:*:*:*:*:*"
] | null | 6.8 | null | null |
|
GHSA-xfrc-7mj2-5xh9 | Undefined Behavior in zencashjs | Versions of `zencashjs` prior to 1.2.0 may cause loss of funds when used with cryptocurrency wallets. The package relies on a string comparison of the first two characters of a Horizen address to determine the destination address type of a transaction (P2PKH or P2SH). Due to the base58 address prefixes chosen in Horizen there exists the possibility of a clash of address prefixes for testnet P2PKH and mainnet P2SH addresses, testnet P2PKH addresses start with “zt” while a subset of mainnet P2SH addresses can also start with “zt”. The package interprets transactions sent to a “zt” P2SH address on mainnet as P2PKH transactions erroneously. Any funds sent to a mainnet P2SH multisignature address starting with “zt” will be sent to the wrong address and be lost.RecommendationUpgrade to version 1.2.0 or later. | [] | null | null | null | null |
GHSA-7657-r953-54qx | IBM SAN Volume Controller, IBM Storwize, IBM Spectrum Virtualize and IBM FlashSystem products versions 7.5 through 8.2 could allow an authenticated user to download arbitrary files from the operating system. IBM X-Force ID: 148757. | [] | null | null | 6.5 | null |
|
CVE-2020-22198 | SQL Injection vulnerability in DedeCMS 5.7 via mdescription parameter to member/ajax_membergroup.php. | [
"cpe:2.3:a:dedecms:dedecms:5.7:-:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
|
CVE-2006-5963 | Directory traversal vulnerability in PentaZip 8.5.1.190 and PentaSuite-PRO 8.5.1.221 allows user-assisted remote attackers to extract files to arbitrary pathnames via a ../ (dot dot slash) in a filename. | [
"cpe:2.3:a:pentaware:pentasuite-pro:8.5.1.221:*:*:*:*:*:*:*",
"cpe:2.3:a:pentaware:pentazip:8.5.1.190:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-93v6-3cxx-h8wc | An Improper Input Validation issue was discovered in ABB FOX515T release 1.0. An improper input validation vulnerability has been identified, allowing a local attacker to provide a malicious parameter to the script that is not validated by the application, This could enable the attacker to retrieve any file on the server. | [] | null | null | 5.5 | null |
|
CVE-2007-0385 | The faq section in PostNuke 0.764 allows remote attackers to obtain sensitive information (the full path) via "unvalidated output" in FAQ/index.php, possibly involving an undefined id_cat variable. | [
"cpe:2.3:a:postnuke_software_foundation:postnuke:0.764:*:*:*:*:*:*:*"
] | null | null | null | 7.8 |
|
CVE-2022-26839 | Delta Electronics DIAEnergie Incorrect Default Permissions | Delta Electronics DIAEnergie (All versions prior to 1.8.02.004) is vulnerable to an incorrect default permission in the DIAEnergie application, which may allow an attacker to plant new files (such as DLLs) or replace existing executable files. | [
"cpe:2.3:a:deltaww:diaenergie:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
CVE-2015-1892 | The Multicast DNS (mDNS) responder in IBM Security Access Manager for Web 7.x before 7.0.0 FP12 and 8.x before 8.0.1 FP1 inadvertently responds to unicast queries with source addresses that are not link-local, which allows remote attackers to cause a denial of service (traffic amplification) or obtain potentially sensitive information via port-5353 UDP packets. | [
"cpe:2.3:o:ibm:security_access_manager_for_web_7.0_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:security_access_manager_for_web_8.0_firmware:8.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:security_access_manager_for_web_8.0_firmware:8.0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:security_access_manager_for_web_8.0_firmware:8.0.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:security_access_manager_for_web_8.0_firmware:8.0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:security_access_manager_for_web_8.0_firmware:8.0.0.5:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:security_access_manager_for_web_8.0_firmware:8.0.1.0:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
RHSA-2013:0642 | Red Hat Security Advisory: tomcat5 security update | Web: Bypass of security constraints | [
"cpe:/a:redhat:jboss_enterprise_web_server:1.0.2"
] | null | null | null | null |
GHSA-q6hx-x875-r6j4 | RedwoodHQ 2.5.5 does not require any authentication for database operations, which allows remote attackers to create admin users via a con.automationframework users insert_one call. | [] | null | null | 9.8 | null |
|
GHSA-g9m4-mjxc-rw4q | Cross-site scripting (XSS) vulnerability in frontend/x3/files/fileop.html in cPanel 11.0 through 11.24.7 allows remote attackers to inject arbitrary web script or HTML via the fileop parameter. | [] | null | null | null | null |
|
CVE-2025-22727 | WordPress MailChimp Subscribe Form plugin <= 4.1 - Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in PluginOps MailChimp Subscribe Forms allows Stored XSS. This issue affects MailChimp Subscribe Forms : from n/a through 4.1. | [] | null | 6.5 | null | null |
GHSA-g36r-wf4f-vq9w | InstallHFZ.exe 6.5.201.0 in Pinnacle Hollywood Effects 6, a module in Pinnacle Systems Pinnacle Studio 12, allows remote attackers to cause a denial of service (application crash) via a crafted Hollywood FX Compressed Archive (.hfz) file. | [] | null | null | null | null |
|
GHSA-2mpr-6qr3-q9cc | cgi-bin/postpf/cgi-bin/dynamic/config/config.html on Lexmark X94x before LC.BR.P142, X85x through LC4.BE.P487, X644 and X646 before LC2.MC.P374, X642 through LC2.MB.P318, W840 through LS.HA.P252, T64x before LS.ST.P344, X64xef through LC2.TI.P325, C935dn through LC.JO.P091, C920 through LS.TA.P152, C78x through LC.IO.P187, X78x through LC2.IO.P335, C77x through LC.CM.P052, X772 through LC2.TR.P291, C53x through LS.SW.P069, C52x through LS.FA.P150, 25xxN through LCL.CU.P114, N4000 through LC.MD.P119, N4050e through GO.GO.N206, N70xxe through LC.CO.N309, E450 through LM.SZ.P124, E350 through LE.PH.P129, and E250 through LE.PM.P126 printers allows remote attackers to remove the Password Protect administrative password via the vac.255.GENPASSWORD parameter. | [] | null | null | null | null |
|
CVE-2024-37840 | SQL injection vulnerability in processscore.php in Itsourcecode Learning Management System Project In PHP With Source Code v1.0 allows remote attackers to execute arbitrary SQL commands via the LessonID parameter. | [
"cpe:2.3:a:itsourcecode:learning_management_system_project_in_php:1.0:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
|
RHSA-2024:1041 | Red Hat Security Advisory: go-toolset-1.19-golang security update | golang: net/http/internal: Denial of Service (DoS) via Resource Consumption via HTTP requests golang: cmd/go: Protocol Fallback when fetching modules | [
"cpe:/a:redhat:devtools:2023::el7"
] | null | 7.5 | null | null |
GHSA-9wgp-3xm8-wjwj | PhoneSystem Terminal in 3CX Phone System (Debian based installation) 16.0.0.1570 allows an authenticated attacker to run arbitrary commands with the phonesystem user privileges because of "<space><space> followed by <shift><enter>" mishandling. | [] | null | 8.8 | null | null |
|
CVE-2013-0513 | IBM Security AppScan Enterprise 5.6 and 8.x before 8.7 and IBM Rational Policy Tester 5.6 and 8.x before 8.5.0.4 create a service that lacks " (double quote) characters in the service path, which allows local users to gain privileges via a Trojan horse program, related to an "Unquoted Service Path Enumeration" vulnerability. | [
"cpe:2.3:a:ibm:security_appscan:5.6.0.0:-:enterprise:*:*:*:*:*",
"cpe:2.3:a:ibm:security_appscan:8.0.0.0:-:enterprise:*:*:*:*:*",
"cpe:2.3:a:ibm:security_appscan:8.0.0.1:-:enterprise:*:*:*:*:*",
"cpe:2.3:a:ibm:security_appscan:8.0.0.2:-:enterprise:*:*:*:*:*",
"cpe:2.3:a:ibm:security_appscan:8.0.1.0:-:enterprise:*:*:*:*:*",
"cpe:2.3:a:ibm:security_appscan:8.0.1.1:-:enterprise:*:*:*:*:*",
"cpe:2.3:a:ibm:security_appscan:8.0.11:-:enterprise:*:*:*:*:*",
"cpe:2.3:a:ibm:security_appscan:8.5.0.0:-:enterprise:*:*:*:*:*",
"cpe:2.3:a:ibm:security_appscan:8.5.0.1:-:enterprise:*:*:*:*:*",
"cpe:2.3:a:ibm:security_appscan:8.6.0.0:-:enterprise:*:*:*:*:*",
"cpe:2.3:a:ibm:security_appscan:8.6.0.1:-:enterprise:*:*:*:*:*",
"cpe:2.3:a:ibm:security_appscan:8.6.0.2:-:enterprise:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_policy_tester:5.6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_policy_tester:8.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_policy_tester:8.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_policy_tester:8.0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_policy_tester:8.0.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_policy_tester:8.0.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_policy_tester:8.5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_policy_tester:8.5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_policy_tester:8.5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_policy_tester:8.5.0.3:*:*:*:*:*:*:*"
] | null | null | null | 7.2 |
|
GHSA-fq2g-9m6v-c9hw | An issue was discovered in Bitdefender BOX firmware versions before 2.1.37.37-34 that allows an attacker to pass arbitrary code to the BOX appliance via the web API. In order to exploit this vulnerability, an attacker needs presence in Bitdefender BOX setup network and Bitdefender BOX be in setup mode. | [] | null | 7.8 | null | null |
|
CVE-2023-47488 | Cross Site Scripting vulnerability in Combodo iTop v.3.1.0-2-11973 allows a local attacker to obtain sensitive information via a crafted script to the attrib_manager_id parameter in the General Information page and the id parameter in the contact page. | [
"cpe:2.3:a:combodo:itop:3.1.0-2-11973:*:*:*:*:*:*:*"
] | null | 6.1 | null | null |
|
PYSEC-2021-263 | null | TensorFlow is an end-to-end open source platform for machine learning. In affected versions if the arguments to `tf.raw_ops.RaggedGather` don't determine a valid ragged tensor code can trigger a read from outside of bounds of heap allocated buffers. The [implementation](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/kernels/ragged_gather_op.cc#L70) directly reads the first dimension of a tensor shape before checking that said tensor has rank of at least 1 (i.e., it is not a scalar). Furthermore, the implementation does not check that the list given by `params_nested_splits` is not an empty list of tensors. We have patched the issue in GitHub commit a2b743f6017d7b97af1fe49087ae15f0ac634373. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. | [] | null | null | null | null |
CVE-2023-38218 | Incorrect Authorization - Customer account takeover | Adobe Commerce versions 2.4.7-beta1 (and earlier), 2.4.6-p2 (and earlier), 2.4.5-p4 (and earlier) and 2.4.4-p5 (and earlier) are affected by an Incorrect Authorization . An authenticated attacker can exploit this to achieve information exposure and privilege escalation. | [
"cpe:2.3:a:adobe:commerce:2.3.7:-:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.3.7:p1:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.3.7:p2:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.3.7:p3:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.3.7:p4:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.3.7:p4-ext1:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.3.7:p4-ext2:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.3.7:p4-ext3:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.3.7:p4-ext4:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.0:-:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.0:ext-1:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.0:ext-2:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.0:ext-3:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.0:ext-4:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.1:-:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.1:ext-1:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.1:ext-2:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.1:ext-3:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.1:ext-4:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.2:-:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.2:ext-1:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.2:ext-2:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.2:ext-3:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.2:ext-4:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.3:-:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.3:ext-1:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.3:ext-2:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.3:ext-3:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.3:ext-4:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.4:-:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.4:p1:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.4:p2:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.4:p3:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.4:p4:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.4:p5:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.5:-:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.5:p1:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.5:p2:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.5:p3:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.5:p4:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.5:p5:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.6:-:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.6:p1:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.6:p2:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.7:b1:*:*:*:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.4:-:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.4:p1:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.4:p2:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.4:p3:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.5:-:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.5:p1:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.5:p2:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.5:p3:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.5:p4:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.6:-:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.6:p1:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.6:p2:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.7:b1:*:*:open_source:*:*:*"
] | null | 8.8 | null | null |
GHSA-chhc-4m43-hfhm | Multiple unspecified vulnerabilities in Google V8 before 3.23.17.18, as used in Google Chrome before 33.0.1750.149, allow attackers to cause a denial of service or possibly have other impact via unknown vectors. | [] | null | null | null | null |
|
GHSA-xmfr-f53v-mxcp | Vulnerability in the Oracle Outside In Technology component of Oracle Fusion Middleware (subcomponent: Outside In Filters). The supported version that is affected is 8.5.3.0. Easily exploitable vulnerability allows low privileged attacker with access to the physical communication segment attached to the hardware where the Oracle Outside In Technology executes to compromise Oracle Outside In Technology. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Outside In Technology. Note: Outside In Technology is a suite of software development kits (SDKs). The protocol and CVSS score depend on the software that uses the Outside In Technology code. The CVSS score assumes that the software passes data received over a network directly to Outside In Technology code, but if data is not received over a network the CVSS score may be lower. CVSS 3.0 Base Score 5.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H). | [] | null | null | 5.7 | null |
|
GHSA-7f33-f4f5-xwgw | In-band key negotiation issue in AWS S3 Crypto SDK for golang | SummaryThe golang AWS S3 Crypto SDK is impacted by an issue that can result in loss of confidentiality and message forgery. The attack requires write access to the bucket in question, and that the attacker has access to an endpoint that reveals decryption failures (without revealing the plaintext) and that when encrypting the GCM option was chosen as content cipher.Risk/SeverityThe vulnerability pose insider risks/privilege escalation risks, circumventing KMS controls for stored data.ImpactThis advisory describes the plaintext revealing vulnerabilities in the golang AWS S3 Crypto SDK, with a similar issue in the non "strict" versions of C++ and Java S3 Crypto SDKs being present as well.V1 prior to 1.34.0 of the S3 crypto SDK does not authenticate the algorithm parameters for the data encryption key.An attacker with write access to the bucket can use this in order to change the encryption algorithm of an object in the bucket, which can lead to problems depending on the supported algorithms. For example, a switch from AES-GCM to AES-CTR in combination with a decryption oracle can reveal the authentication key used by AES-GCM as decrypting the GMAC tag leaves the authentication key recoverable as an algebraic equation.By default, the only available algorithms in the SDK are AES-GCM and AES-CBC. Switching the algorithm from AES-GCM to AES-CBC can be used as way to reconstruct the plaintext through an oracle endpoint revealing decryption failures, by brute forcing 16 byte chunks of the plaintext. Note that the plaintext needs to have some known structure for this to work, as a uniform random 16 byte string would be the same as a 128 bit encryption key, which is considered cryptographically safe.The attack works by taking a 16 byte AES-GCM encrypted block guessing 16 bytes of plaintext, constructing forgery that pretends to be PKCS5 padded AES-CBC, using the ciphertext and the plaintext guess and that will decrypt to a valid message if the guess was correct.To understand this attack, we have to take a closer look at both AES-GCM and AES-CBC:
AES-GCM encrypts using a variant of CTR mode, i.e. `C_i = AES-Enc(CB_i) ^ M_i`. AES-CBC on the other hand *decrypts* via `M_i = AES-Dec(C_i) ^ C_{i-1}`, where `C_{-1} = IV`. The padding oracle can tell us if, after switching to CBC mode, the plaintext recovered is padded with a valid PKCS5 padding.Since `AES-Dec(C_i ^ M_i) = CB_i`, if we set `IV' = CB_i ^ 0x10*[16]`, where `0x10*[16]` is the byte `0x10` repeated 16 times, and `C_0' = C_i ^ M_i'` the resulting one block message `(IV', C_0')` will have valid PKCS5 padding if our guess `M_i'` for `M_i` was correct, since the decrypted message consists of 16 bytes of value `0x10`, the PKCS5 padded empty string.Note however, that an incorrect guess might also result in a valid padding, if the AES decryption result randomly happens to end in `0x01`, `0x0202`, or a longer valid padding. In order to ensure that the guess was indeed correct, a second check using `IV'' = IV' ^ (0x00*[15] || 0x11)` with the same ciphertext block has to be performed. This will decrypt to 15 bytes of value `0x10` and one byte of value `0x01` if our initial guess was correct, producing a valid padding. On an incorrect guess, this second ciphertext forgery will have an invalid padding with a probability of 1:2^128, as one can easily see.This issue is fixed in V2 of the API, by using the `KMS+context` key wrapping scheme for new files, authenticating the algorithm. Old files encrypted with the `KMS` key wrapping scheme remain vulnerable until they are reencrypted with the new scheme.MitigationUsing the version 2 of the S3 crypto SDK will not produce vulnerable files anymore. Old files remain vulnerable to this problem if they were originally encrypted with GCM mode and use the `KMS` key wrapping option.Proof of conceptA [Proof of concept](https://github.com/sophieschmieg/exploits/tree/master/aws_s3_crypto_poc) is available in a separate github repository.This particular issue is described in [combined_oracle_exploit.go](https://github.com/sophieschmieg/exploits/blob/master/aws_s3_crypto_poc/exploit/combined_oracle_exploit.go): | [] | null | 2.5 | null | null |
GHSA-9324-v825-64hv | Cross-site scripting (XSS) vulnerability in the embedded HTTP server in the Service Console in IBM Tivoli Monitoring 6.2.2 before 6.2.2-TIV-ITM-FP0009 and 6.3.2 before 6.2.3-TIV-ITM-FP0001 allows remote attackers to inject arbitrary web script or HTML via a crafted URI. | [] | null | null | null | null |
|
CVE-2017-3280 | Vulnerability in the Oracle Partner Management component of Oracle E-Business Suite (subcomponent: User Interface). Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5 and 12.2.6. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Partner Management. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Partner Management, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Partner Management accessible data. CVSS v3.0 Base Score 4.7 (Integrity impacts). | [
"cpe:2.3:a:oracle:partner_management:12.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:partner_management:12.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:partner_management:12.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:partner_management:12.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:partner_management:12.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:partner_management:12.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:partner_management:12.2.6:*:*:*:*:*:*:*"
] | null | null | 4.7 | 4.3 |
|
GHSA-9qq8-fg73-j2ww | Cross-site scripting (XSS) vulnerability in divers.php in Vincent Leclercq News 5.2 allows remote attackers to inject arbitrary web script or HTML via the (1) id and (2) disabled parameters. | [] | null | null | null | null |
|
CVE-2020-35521 | A flaw was found in libtiff. Due to a memory allocation failure in tif_read.c, a crafted TIFF file can lead to an abort, resulting in denial of service. | [
"cpe:2.3:a:libtiff:libtiff:*:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*"
] | null | 5.5 | null | 4.3 |
|
GHSA-p8hc-mqcm-847r | Unspecified vulnerability in the Java SE, Java SE Embedded component in Oracle Java SE Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality and integrity via unknown vectors related to Libraries. | [] | null | null | null | null |
|
GHSA-7m3g-723h-4hwc | Cross-site request forgery (CSRF) vulnerability on ReadyNet WRT300N-DD devices with firmware 1.0.26 allows remote attackers to hijack the authentication of arbitrary users. | [] | null | null | 8.8 | null |
|
CVE-2024-13048 | Ashlar-Vellum Cobalt XE File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability | Ashlar-Vellum Cobalt XE File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ashlar-Vellum Cobalt. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of XE files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24844. | [
"cpe:2.3:a:ashlar:cobalt:1204.90:*:*:*:*:*:*:*"
] | null | null | 7.8 | null |
GHSA-5fqj-9cqv-7vh5 | An improper authorization of using debugging command in Secure Folder prior to SMR Oct-2020 Release 1 allows unauthorized access to contents in Secure Folder via debugging command. | [] | null | 5.5 | null | null |
|
CVE-2022-38044 | Windows CD-ROM File System Driver Remote Code Execution Vulnerability | Windows CD-ROM File System Driver Remote Code Execution Vulnerability | [
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_11:22h2:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11:22h2:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
GHSA-jx2r-9qhf-j88m | The web server on the Digital Alert Systems DASDEC EAS device before 2.0-2 and the Monroe Electronics R189 One-Net EAS device before 2.0-2 allows remote attackers to obtain sensitive configuration and status information by reading log files. | [] | null | null | null | null |
|
RHSA-2014:1101 | Red Hat Security Advisory: kernel security and bug fix update | kernel: net: rds: dereference of a NULL device in rds_ib_laddr_check() kernel: ath9k: tid->sched race in ath_tx_aggr_sleep() kernel: net: rds: dereference of a NULL device in rds_iw_laddr_check() Kernel: net: mac80211: crash dues to AP powersave TX vs. wakeup race kernel: net: ping: refcount issue in ping_init_sock() function | [
"cpe:/o:redhat:rhel_eus:6.4::computenode",
"cpe:/o:redhat:rhel_eus:6.4::server"
] | null | null | null | null |
CVE-2024-48534 | A reflected cross-site scripting (XSS) vulnerability on the Camp Details module of eSoft Planner 3.24.08271-USA allows attackers to execute arbitrary code in the context of a user's browser via injecting a crafted payload. | [] | null | 5.4 | null | null |
|
GHSA-9w4v-2x3h-wxmw | Potential security vulnerabilities have been identified in HP Support Assistant. These vulnerabilities include privilege escalation, compromise of integrity, allowed communication with untrusted clients, and unauthorized modification of files. | [] | null | 7.8 | null | null |
|
CVE-2022-20645 | Cisco Security Manager Cross-Site Scripting Vulnerabilities | Multiple vulnerabilities in the web-based management interface of Cisco Security Manager could allow an unauthenticated, remote attacker to conduct cross-site scripting attacks against a user of the interface. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by persuading a user to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information. | [
"cpe:2.3:a:cisco:security_manager:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | null |
CVE-2024-33406 | SQL injection vulnerability in /model/delete_student_grade_subject.php in campcodes Complete Web-Based School Management System 1.0 allows attacker to execute arbitrary SQL commands via the index parameter. | [
"cpe:2.3:a:campcodes:complete_web-based_school_management_system:1.0:*:*:*:*:*:*:*"
] | null | 7.3 | null | null |
|
CVE-2024-44727 | Sourcecodehero Event Management System1.0 is vulnerable to SQL Injection via the parameter 'username' in /event/admin/login.php. | [
"cpe:2.3:a:sourcecodehero:event_management_system:*:*:*:*:*:*:*:*",
"cpe:2.3:a:angeljudesuarez:event_management_system:1.0:*:*:*:*:*:*:*"
] | null | 7.4 | null | null |
|
GHSA-4cf4-xjp3-c6w3 | SceneKit in Apple OS X before 10.10.5 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via unspecified vectors. | [] | null | null | null | null |
|
GHSA-6398-vm89-wp76 | Cross-site request forgery (CSRF) vulnerability in the Localization client 5.x before 5.x-1.1 and 6.x before 6.x-1.6 and the Localization server 5.x before 5.x-1.0-alpha5 and 6.x before 6.x-alpha2, modules for Drupal, allows remote attackers to perform unauthorized actions as administrators via unspecified vectors related to the "local translation submission interface." | [] | null | null | null | null |
|
RHSA-2020:2404 | Red Hat Security Advisory: bind security update | bind: BIND does not sufficiently limit the number of fetches performed when processing referrals bind: A logic error in code which checks TSIG validity can be used to trigger an assertion failure in tsig.c | [
"cpe:/a:redhat:rhel_e4s:8.0::appstream",
"cpe:/o:redhat:rhel_e4s:8.0::baseos"
] | null | 7.5 | null | null |
GHSA-qphr-636v-599x | Unrestricted file upload vulnerability in image.php in PHPizabi 0.848b C1 HFP1 allows remote attackers to execute arbitrary code by uploading a file with an executable extension from the event page, then accessing it via a direct request to the file in system/cache/pictures. | [] | null | null | null | null |
|
GHSA-8297-wvjg-5vxg | Weak Password Reset Rules vulnerabilities where found providing a potiential for the storage of weak passwords that could facilitate unauthorized admin/application access.
Affected products:ABB ASPECT - Enterprise v3.07.02;
NEXUS Series v3.07.02;
MATRIX Series v3.07.02 | [] | 9.3 | 9.4 | null | null |
|
CVE-2024-39591 | Missing Authorization check in SAP Document Builder | SAP Document Builder does not perform necessary authorization checks for one of the function modules resulting in escalation of privileges causing low impact on confidentiality of the application. | [
"cpe:2.3:a:sap:document_builder:s4fnd_102:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:document_builder:s4fnd_103:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:document_builder:s4fnd_104:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:document_builder:s4fnd_105:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:document_builder:s4fnd_106:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:document_builder:s4fnd_107:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:document_builder:s4fnd_108:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:document_builder:sap_bs_fnd_702:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:document_builder:sap_bs_fnd_731:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:document_builder:sap_bs_fnd_746:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:document_builder:sap_bs_fnd_747:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:document_builder:sap_bs_fnd_748:*:*:*:*:*:*:*"
] | null | 4.3 | null | null |
CVE-2018-18717 | An issue was discovered in Eleanor CMS through 2015-03-19. XSS exists via the ajax.php?direct=admin&file=autocomplete&query=[XSS] URI. | [
"cpe:2.3:a:eleanor-cms:eleanor_cms:*:*:*:*:*:*:*:*"
] | null | null | 4.8 | 3.5 |
|
GHSA-mx4g-vhmg-3rf6 | The patch for CVE-2020-17380/CVE-2020-25085 was found to be ineffective, thus making QEMU vulnerable to the out-of-bounds read/write access issues previously found in the SDHCI controller emulation code. This flaw allows a malicious privileged guest to crash the QEMU process on the host, resulting in a denial of service or potential code execution. QEMU up to (including) 5.2.0 is affected by this. | [] | null | 5.7 | null | null |
|
GHSA-rv62-hr8r-jr2p | The Plumtree portal in BEA AquaLogic Interaction 5.0.2 through 5.0.4 and 6.0.1.218452 allows remote attackers to obtain version numbers and internal hostnames by reading comments in the HTML source of any page. | [] | null | null | null | null |
|
GHSA-hp4r-wh6m-675v | A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiWLM version 8.6.0 through 8.6.5 and 8.5.0 through 8.5.4 allows attacker to execute unauthorized code or commands via specifically crafted http get request parameters. | [] | null | 9.8 | null | null |
|
GHSA-2797-h4gc-wv56 | This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley MicroStation CONNECT 10.16.02.034. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of DXF files. Crafted data in a DXF file can trigger a read past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-16341. | [] | null | 7.8 | null | null |
|
GHSA-687w-xp39-q584 | An issue was discovered in slicer69 doas before 6.2 on certain platforms other than OpenBSD. On platforms without strtonum(3), sscanf was used without checking for error cases. Instead, the uninitialized variable errstr was checked and in some cases returned success even if sscanf failed. The result was that, instead of reporting that the supplied username or group name did not exist, it would execute the command as root. | [] | null | 9.8 | null | null |
|
CVE-2014-0184 | Red Hat CloudForms 3.0 Management Engine (CFME) before 5.2.4.2 logs the root password when deploying a VM, which allows local users to obtain sensitive information by reading the evm.log file. | [
"cpe:2.3:a:redhat:cloudforms_3.0_management_engine:*:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:cloudforms_3.0_management_engine:5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:cloudforms_3.0_management_engine:5.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:cloudforms_3.0_management_engine:5.2.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:cloudforms_3.0_management_engine:5.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:cloudforms_3.0_management_engine:5.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:cloudforms_3.0_management_engine:5.2.3.2:*:*:*:*:*:*:*"
] | null | null | null | 4.9 |
|
CVE-2008-4722 | Unspecified vulnerability in Sun Integrated Lights-Out Manager (ILOM) 2.0.1.5 through 2.0.4.26 allows remote authenticated users to (1) access the service processor (SP) and cause a denial of service (shutdown or reboot), or (2) access the host operating system and have an unspecified impact, via unknown vectors. | [
"cpe:2.3:a:sun:integrated_lights-out_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sun:blade_6000_modular_system_with_chassis:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sun:blade_6048_modular_system_with_chassis:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sun:blade_8000_modular_system:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sun:blade_8000p_modular_system:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sun:blade_t6320_server_module:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sun:blade_x6220_with_server_module_software:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sun:blade_x6250_with_server_module_software:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sun:blade_x6450_with_server_module_software:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sun:blade_x8400:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sun:blade_x8420:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sun:blade_x8440:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sun:blade_x8450:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sun:fire_x2250_server:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sun:fire_x4100_server:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sun:fire_x4100m2_server:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sun:fire_x4140_server:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sun:fire_x4150_server:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sun:fire_x4200_server:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sun:fire_x4200m2_server:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sun:fire_x4240_server:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sun:fire_x4250_server:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sun:fire_x4440_server:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sun:fire_x4450_server:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sun:fire_x4500_server:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sun:fire_x4540_server:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sun:fire_x4600_server:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sun:fire_x4600m2_server:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sun:netra:*:7.1.6:*:*:*:*:*:*",
"cpe:2.3:h:sun:netra:*:7.1.4a:*:*:*:*:*:*",
"cpe:2.3:h:sun:netra_x4200m2_server:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sun:netra_x4250_server:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sun:netra_x4450:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sun:sparc_enterprise_server_t5120:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sun:sparc_enterprise_server_t5140:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sun:sparc_enterprise_server_t5220:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sun:sparc_enterprise_server_t5240:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sun:sparc_enterprise_server_t5440:*:*:*:*:*:*:*:*"
] | null | null | null | 9 |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.