id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
4.89k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
GHSA-c8xw-vjgf-94hr | Argo CD web terminal session doesn't expire | ImpactAll versions of Argo CD starting from v2.6.0 have a bug where open web terminal sessions do not expire. This bug allows users to send any websocket messages even if the token has already expired. The most straightforward scenario is when a user opens the terminal view and leaves it open for an extended period. This allows the user to view sensitive information even when they should have been logged out already.PatchesA patch for this vulnerability has been released in the following Argo CD version:v2.6.14v2.7.12v2.8.1WorkaroundsThe only way to completely resolve the issue is to upgrade.MitigationsDisable web-based terminal or define RBAC rules to it
[https://argo-cd.readthedocs.io/en/latest/operator-manual/web_based_terminal/](https://argo-cd.readthedocs.io/en/latest/operator-manual/web_based_terminal/)For more informationIf you have any questions or comments about this advisory:Open an issue in [the Argo CD issue tracker](https://github.com/argoproj/argo-cd/issues) or [discussions](https://github.com/argoproj/argo-cd/discussions)Join us on [Slack](https://argoproj.github.io/community/join-slack) in channel #argo-cdCreditsThank you to bean.zhang (@zhlu32 ) of HIT-IDS ChunkL Team who discovered the issue and reported it confidentially according to our [guidelines](https://github.com/argoproj/argo-cd/blob/master/SECURITY.md#reporting-a-vulnerability). | []
| null | 7.1 | null | null |
CVE-2021-21161 | Heap buffer overflow in TabStrip in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
]
| null | 8.8 | null | 6.8 |
|
CVE-2022-3391 | Retain Live Chat <= 0.1 - Admin+ Stored Cross-Site Scripting | The Retain Live Chat WordPress plugin through 0.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) | [
"cpe:2.3:a:retain:retain_live_chat:*:*:*:*:*:wordpress:*:*"
]
| null | 4.8 | null | null |
GHSA-9529-88rc-3q6r | Microsoft Internet Explorer 5.01 and 6.0 allow remote attackers to execute arbitrary code via malformed Content-Disposition and Content-Type header fields that cause the application for the spoofed file type to pass the file back to the operating system for handling rather than raise an error message, aka the first variant of the "Content Disposition" vulnerability. | []
| null | null | null | null |
|
GHSA-p929-hj2v-79xf | The Visionsoft Audit on Demand Service (VSAOD) in Visionsoft Audit 12.4.0.0 uses weak cryptography (XOR) when (1) transmitting passwords, which allows remote attackers to obtain sensitive information by sniffing the network; and (2) storing passwords in the configuration file, which allows local users to obtain sensitive information by reading this file. | []
| null | 7.5 | null | null |
|
GHSA-6qxm-5w27-9jp6 | The kernel in Microsoft Windows Server 2008 R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an authenticated attacker to obtain information via a specially crafted application. aka "Windows Kernel Information Disclosure Vulnerability," a different vulnerability than CVE-2017-8491, CVE-2017-8490, CVE-2017-8489, CVE-2017-8488, CVE-2017-8485, CVE-2017-8483, CVE-2017-8482, CVE-2017-8481, CVE-2017-8480, CVE-2017-8478, CVE-2017-8479, CVE-2017-8476, CVE-2017-8469, CVE-2017-8462, CVE-2017-0300, CVE-2017-0299, and CVE-2017-0297. | []
| null | null | 5 | null |
|
GHSA-54hh-fh2m-4396 | LocalAI version v2.19.4 (af0545834fd565ab56af0b9348550ca9c3cb5349) contains a vulnerability where the delete model API improperly neutralizes input during web page generation, leading to a one-time storage cross-site scripting (XSS) vulnerability. This vulnerability allows an attacker to store a malicious payload that executes when a user accesses the homepage. Additionally, the presence of cross-site request forgery (CSRF) can enable automated malicious requests. | []
| null | null | 3.4 | null |
|
CVE-2020-25125 | GnuPG 2.2.21 and 2.2.22 (and Gpg4win 3.1.12) has an array overflow, leading to a crash or possibly unspecified other impact, when a victim imports an attacker's OpenPGP key, and this key has AEAD preferences. The overflow is caused by a g10/key-check.c error. NOTE: GnuPG 2.3.x is unaffected. GnuPG 2.2.23 is a fixed version. | [
"cpe:2.3:a:gnupg:gnupg:2.2.21:*:*:*:*:*:*:*",
"cpe:2.3:a:gnupg:gnupg:2.2.22:*:*:*:*:*:*:*",
"cpe:2.3:a:gpg4win:gpg4win:3.1.12:*:*:*:*:*:*:*"
]
| null | 7.8 | null | 6.8 |
|
CVE-2007-3887 | Multiple cross-site scripting (XSS) vulnerabilities in mesaj_formu.asp in ASP Ziyaretci Defteri 1.1 allow remote attackers to inject arbitrary web script or HTML via the (1) Isim, (2) Mesajiniz, and (3) E-posta fields. NOTE: these probably correspond to the isim, mesaj, and posta parameters to save.php. | [
"cpe:2.3:a:asp_ziyaretci_defteri:asp_ziyaretci_defteri:1.1:*:*:*:*:*:*:*"
]
| null | null | null | 4.3 |
|
GHSA-6rp6-wr8f-g7wx | On the TP-Link TL-SG108E 1.0, there is a hard-coded ciphering key (a long string beginning with Ei2HNryt). This affects the 1.1.2 Build 20141017 Rel.50749 firmware. | []
| null | null | 7.5 | null |
|
GHSA-53m4-2cjq-376q | HEVC Video Extensions Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-24089, CVE-2021-24110, CVE-2021-26902, CVE-2021-27048, CVE-2021-27049, CVE-2021-27050, CVE-2021-27051, CVE-2021-27061, CVE-2021-27062. | []
| null | 7.8 | null | null |
|
RHSA-2015:1876 | Red Hat Security Advisory: python-django security update | python-django: Denial-of-service possibility in logout() view by filling session store | [
"cpe:/a:redhat:openstack:7::el7"
]
| null | null | null | null |
GHSA-xhgh-53f7-w2q7 | Buffer overflow in the Webserver component on the Huawei E5332 router before 21.344.27.00.1080 allows remote authenticated users to cause a denial of service (reboot) via a long parameter in an API service request message. | []
| null | null | null | null |
|
RHSA-2017:2486 | Red Hat Security Advisory: groovy security update | groovy: remote execution of untrusted code in class MethodClosure Groovy: Remote code execution via deserialization | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
]
| null | null | 9.6 | null |
GHSA-4mc2-jj65-m3wf | Authenticated command injection vulnerabilities exist in the ArubaOS command line interface. Successful exploitation of these vulnerabilities result in the ability to execute arbitrary commands as a privileged user on the underlying operating system. | []
| null | 7.2 | null | null |
|
GHSA-g787-fqv5-529p | A flaw in the WordPress plugin, Minimal Coming Soon & Maintenance Mode through 2.15, allows authenticated users with basic access to export settings and change maintenance-mode themes. | []
| null | null | null | null |
|
RHSA-2014:0171 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.2.1 update | Java: Java XML Signature DoS Attack Java: XML eXternal Entity (XXE) flaw in ParserPool and Decrypter jboss-as-server: Unchecked access to MSC Service Registry under JSM | [
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el6"
]
| null | null | null | null |
GHSA-x682-pjg8-jch2 | The Contact page in Monica 2.19.1 allows stored XSS via the Middle Name field. | []
| null | null | null | null |
|
CVE-2002-1598 | Buffer overflows in Computer Associates MLink (CA-MLink) 6.5 and earlier may allow local users to execute arbitrary code via long command line arguments to (1) mlclear or (2) mllock. | [
"cpe:2.3:a:broadcom:mlink:6.5:*:*:*:*:*:*:*"
]
| null | null | null | 4.6 |
|
GHSA-2xvj-j3qh-x8c3 | private_address_check contains race condition | The private_address_check ruby gem before 0.5.0 is vulnerable to a time-of-check time-of-use (TOCTOU) race condition due to the address the socket uses not being checked. DNS entries with a TTL of 0 can trigger this case where the initial resolution is a public address but the subsequent resolution is a private address. | []
| null | null | null | null |
GHSA-r4fg-94jj-wp5g | In JetBrains TeamCity before 2024.07.3 path traversal leading to information disclosure was possible via server backups | []
| null | 4.9 | null | null |
|
GHSA-54cj-jmh6-9jv4 | Cross-site scripting (XSS) vulnerability in footer.php in DGNews 2.1 allows remote attackers to inject arbitrary web script or HTML via the copyright parameter. | []
| null | null | null | null |
|
GHSA-hcqc-cxvc-78q8 | Cross-Site Request Forgery (CSRF) vulnerability in Mario Mansour and Geoff Peters TubePress.NET allows Cross Site Request Forgery.This issue affects TubePress.NET: from n/a through 4.0.1. | []
| null | 7.1 | null | null |
|
CVE-2020-20412 | lib/codebook.c in libvorbis before 1.3.6, as used in StepMania 5.0.12 and other products, has insufficient array bounds checking via a crafted OGG file. NOTE: this may overlap CVE-2018-5146. | [
"cpe:2.3:a:stepmania:stepmania:5.0.12:-:*:*:*:*:*:*",
"cpe:2.3:a:xiph.org:libvorbis:*:*:*:*:*:*:*:*"
]
| null | 6.5 | null | 4.3 |
|
GHSA-v44w-3xjh-r66r | An issue was discovered in AndyOS Andy versions up to 46.11.113. By default, it starts telnet and ssh (ports 22 and 23) with root privileges in the emulated Android system. This can be exploited by remote attackers to gain full access to the device, or by malicious apps installed inside the emulator to perform privilege escalation from a normal user to root (unlike with standard methods of getting root privileges on Android - e.g., the SuperSu program - the user is not asked for consent). There is no authentication performed - access to a root shell is given upon a successful connection. NOTE: although this was originally published with a slightly different CVE ID number, the correct ID for this Andy vulnerability has always been CVE-2019-14326. | []
| null | null | null | null |
|
GHSA-2hcp-v799-49gj | The u3d plugin 9.3.0.10809 (aka plugins\U3DBrowser.fpi) in FoxitReader.exe in Foxit Reader 9.3.0.10826 allows remote attackers to cause a denial of service (out-of-bounds read), obtain sensitive information, or possibly have unspecified other impact via a U3D sample because of a "Data from Faulting Address controls Code Flow starting at U3DBrowser!PlugInMain+0x00000000000f43ff" issue. | []
| null | null | 7.1 | null |
|
GHSA-rh99-p3rq-cpj9 | Vulnerability in the Oracle Hospitality Cruise Fleet Management System component of Oracle Hospitality Applications (subcomponent: Fleet Management System Suite). The supported version that is affected is 9.x. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle Hospitality Cruise Fleet Management System executes to compromise Oracle Hospitality Cruise Fleet Management System. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Hospitality Cruise Fleet Management System accessible data. CVSS 3.0 Base Score 6.2 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N). | []
| null | null | 6.2 | null |
|
CVE-2021-33045 | The identity authentication bypass vulnerability found in some Dahua products during the login process. Attackers can bypass device identity authentication by constructing malicious data packets. | [
"cpe:2.3:o:dahuasecurity:ipc-hum7xxx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:ipc-hum7xxx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dahuasecurity:ipc-hx3xxx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:ipc-hx3xxx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dahuasecurity:ipc-hx5xxx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:ipc-hx5xxx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dahuasecurity:nvr-1xxx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:nvr-1xxx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dahuasecurity:nvr-2xxx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:nvr-2xxx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dahuasecurity:nvr-4xxx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:nvr-4xxx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dahuasecurity:nvr-5xxx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:nvr-5xxx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dahuasecurity:nvr-6xx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:nvr-6xx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dahuasecurity:vth-542xh_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:vth-542xh:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dahuasecurity:vto-65xxx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:vto-65xxx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dahuasecurity:vto-75x95x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:vto-75x95x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dahuasecurity:xvr-4x04_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:xvr-4x04:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dahuasecurity:xvr-4x08_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:xvr-4x08:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dahuasecurity:xvr-4x04_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:dahuasecurity:xvr-5x04_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:xvr-5x04:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dahuasecurity:xvr-5x08_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:xvr-5x08:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dahuasecurity:xvr-5x16_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:xvr-5x16:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dahuasecurity:xvr-7x16_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:xvr-7x16:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dahuasecurity:xvr-7x32_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:xvr-7x32:-:*:*:*:*:*:*:*"
]
| null | 9.8 | null | 10 |
|
GHSA-r7fx-x4q2-hqhr | The Host PHP Info plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check when including the 'phpinfo' function in all versions up to, and including, 1.0.4. This makes it possible for unauthenticated attackers to read configuration settings and predefined variables on the site's server. The plugin does not need to be activated for the vulnerability to be exploited. | []
| null | 8.6 | null | null |
|
CVE-2017-13667 | OX Software GmbH OX App Suite 7.8.4 and earlier is affected by: SSRF. | [
"cpe:2.3:a:open-xchange:open-xchange_appsuite:*:*:*:*:*:*:*:*"
]
| null | null | 9.9 | 6.5 |
|
CVE-2005-0431 | Barracuda Spam Firewall 3.1.10 and earlier does not restrict the domains that white-listed domains can send mail to, which allows members of white-listed domains to use Barracuda as an open mail relay for spam. | [
"cpe:2.3:h:barracuda_networks:barracuda_spam_firewall:3.1.10:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
cisco-sa-ftdfmc-sft-mitm-tc8AzFs2 | Cisco Firepower Management Center Software and Firepower Threat Defense Software sftunnel Pass the Hash Vulnerability | A vulnerability in the sftunnel functionality of Cisco Firepower Management Center (FMC) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to obtain the device registration hash.
The vulnerability is due to insufficient sftunnel negotiation protection during initial device registration. An attacker in a man-in-the-middle position could exploit this vulnerability by intercepting a specific flow of the sftunnel communication between an FMC device and an FTD device. A successful exploit could allow the attacker to decrypt and modify the sftunnel communication between FMC and FTD devices, allowing the attacker to modify configuration data sent from an FMC device to an FTD device or alert data sent from an FTD device to an FMC device.
Cisco has released software updates that address the vulnerability described in this advisory. There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftdfmc-sft-mitm-tc8AzFs2 ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftdfmc-sft-mitm-tc8AzFs2"]
This advisory is part of the October 2020 Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication, which includes 17 Cisco Security Advisories that describe 17 vulnerabilities. For a complete list of the advisories and links to them, see Cisco Event Response: October 2020 Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication ["https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-74302"]. | []
| null | null | 8.1 | null |
CVE-2016-1154 | SQL injection vulnerability in the Help plug-in 1.3.5 and earlier in Cuore EC-CUBE allows remote attackers to execute arbitrary SQL commands via unspecified vectors. | [
"cpe:2.3:a:cuore:ec-cube_help_plugin:*:*:*:*:*:*:*:*"
]
| null | null | 9.1 | 7.5 |
|
CVE-2024-10457 | SSRF Vulnerabilities in significant-gravitas/autogpt | Multiple Server-Side Request Forgery (SSRF) vulnerabilities were identified in the significant-gravitas/autogpt repository, specifically in the GitHub Integration and Web Search blocks. These vulnerabilities affect version agpt-platform-beta-v0.1.1. The issues arise when block inputs are controlled by untrusted sources, leading to potential credential leakage, internal network scanning, and unauthorized access to internal services, APIs, or data stores. The affected blocks include GithubListPullRequestsBlock, GithubReadPullRequestBlock, GithubAssignPRReviewerBlock, GithubListPRReviewersBlock, GithubUnassignPRReviewerBlock, GithubCommentBlock, GithubMakeIssueBlock, GithubReadIssueBlock, GithubListIssuesBlock, GithubAddLabelBlock, GithubRemoveLabelBlock, GithubListBranchesBlock, and ExtractWebsiteContentBlock. | []
| null | null | 6.5 | null |
CVE-2021-0672 | In Browser app, there is a possible information disclosure due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android SoCAndroid ID: A-199678035 | [
"cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6732:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6752:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6755:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6758:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6795:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8163:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8183:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8735a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8735b:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*"
]
| null | 5.5 | null | 2.1 |
|
GHSA-mhf4-rgw6-mm22 | PHP remote file include vulnerability in index.php in Tasarim Rehberi allows remote attackers to execute arbitrary PHP code via a URL in the (1) sayfaadi or (2) sayfa parameter. NOTE: this might be a site-specific issue. If so, it should not be included in CVE. | []
| null | null | null | null |
|
CVE-2019-1597 | Cisco FXOS and NX-OS Lightweight Directory Access Protocol Denial of Service Vulnerabilities | Multiple vulnerabilities in the implementation of the Lightweight Directory Access Protocol (LDAP) feature in Cisco FXOS Software and Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerabilities are due to the improper parsing of LDAP packets by an affected device. An attacker could exploit these vulnerabilities by sending an LDAP packet crafted using Basic Encoding Rules (BER) to an affected device. The LDAP packet must have a source IP address of an LDAP server configured on the targeted device. A successful exploit could cause the affected device to reload, resulting in a DoS condition. Firepower 4100 Series Next-Generation Firewalls are affected in versions prior to 2.0.1.201, 2.2.2.54, and 2.3.1.75. Firepower 9300 Security Appliances are affected in versions prior to 2.0.1.201, 2.2.2.54 and 2.3.1.75. MDS 9000 Series Multilayer Switches are affected in versions prior to 8.2(1). Nexus 3000 Series Switches are affected in versions prior to 7.0(3)I7(1). Nexus 3500 Platform Switches are affected in versions prior to 7.0(3)I7(2). Nexus 7000 and 7700 Series Switches are affected in versions prior to 8.2(1). Nexus 9000 Series Switches in Standalone NX-OS Mode are affected in versions prior to 7.0(3)I7(1). Cisco UCS 6200 and 6300 Fabric Interconnect devices are affected in versions prior to 3.2(2b). | [
"cpe:2.3:o:cisco:firepower_extensible_operating_system:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:firepower_4100:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:firepower_9300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:mds_9000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3500:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_7000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_7700:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ucs_6200:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ucs_6300:-:*:*:*:*:*:*:*"
]
| null | null | 8.6 | null |
GHSA-94h5-8cv5-pxxm | A vulnerability was found in Totara LMS 18.0.1 Build 20231128.01. It has been rated as problematic. Affected by this issue is some unknown functionality of the file admin/roles/check.php of the component Profile Handler. The manipulation of the argument ID Number leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-261368. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | []
| 2 | 3.5 | null | null |
|
CVE-2021-29363 | A buffer overflow vulnerability in FORMATS!ReadRAS_W+0xa74 of Irfanview 4.57 allows attackers to execute arbitrary code via a crafted RLE file.0xa74 | [
"cpe:2.3:a:irfanview:irfanview:4.57:*:*:*:*:*:*:*"
]
| null | 7.8 | null | 6.8 |
|
CVE-2021-3900 | Cross-Site Request Forgery (CSRF) in firefly-iii/firefly-iii | firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF) | [
"cpe:2.3:a:firefly-iii:firefly_iii:*:*:*:*:*:*:*:*"
]
| null | null | 4.3 | null |
GHSA-3xch-6jrp-mhcv | Vulnerabilities exist in the Aruba EdgeConnect Enterprise command line interface that allow remote authenticated users to run arbitrary commands on the underlying host. Successful exploitation of these vulnerabilities result in the ability to execute arbitrary commands as root on the underlying operating system leading to complete system compromise. | []
| null | 7.2 | null | null |
|
GHSA-gwq3-c78x-92gx | ** DISPUTED ** An issue was discovered in Halvotec RaQuest 10.23.10801.0. The login page of the admin application is vulnerable to an Open Redirect attack allowing an attacker to redirect a user to a malicious site after authentication. The attacker needs to be on the same network to modify the victim's request on the wire. NOTE: the vendor does not recognize this issue and will not patch it. | []
| null | null | null | null |
|
GHSA-m9p7-p2vm-7m5j | In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Mobile and Snapdragon Wear MDM9206, MDM9607, MDM9615, MDM9635M, MDM9640, MDM9645, MDM9650, MSM8909W, SD 210/SD 212/SD 205, SD 400, SD 410/12, SD 425, SD 430, SD 450, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 800, SD 808, SD 810, SD 820, SD 835, SD 845, SD 850, and SDX20, improper ciphersuite validation leads SecSSL accept an unadvertised ciphersuite. | []
| null | null | 9.1 | null |
|
CVE-2005-3702 | Safari in Mac OS X and OS X Server 10.3.9 and 10.4.3 allows remote attackers to cause files to be downloaded to locations outside the download directory via a long file name. | [
"cpe:2.3:o:apple:mac_os_x:10.3.9:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.3.9:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.3:*:*:*:*:*:*:*"
]
| null | null | null | 5 |
|
CVE-2010-2405 | Unspecified vulnerability in the Siebel Core - Highly Interactive Client component in Oracle Siebel Suite 7.7.2.12, 7.8.2.14, 8.0.0.10, and 8.1.1.3 allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors, a different vulnerability than CVE-2010-3500. | [
"cpe:2.3:a:oracle:siebel_suite:7.7.2.12:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:siebel_suite:7.8.2.14:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:siebel_suite:8.0.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:siebel_suite:8.1.1.3:*:*:*:*:*:*:*"
]
| null | null | null | 6 |
|
GHSA-gfwj-v75f-c948 | StarWind SAN and NAS before 0.2 build 1685 allows users to reset other users' passwords. | []
| null | 8.8 | null | null |
|
CVE-2025-30731 | Vulnerability in the Oracle Applications Technology Stack product of Oracle E-Business Suite (component: Configuration). Supported versions that are affected are 12.2.3-12.2.14. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle Applications Technology Stack executes to compromise Oracle Applications Technology Stack. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Applications Technology Stack accessible data as well as unauthorized read access to a subset of Oracle Applications Technology Stack accessible data. CVSS 3.1 Base Score 3.6 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N). | []
| null | 3.6 | null | null |
|
GHSA-3554-82m2-g2wf | PHP remote file inclusion vulnerability in core/editor.php in phpWebThings 1.5.2 and earlier, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the editor_insert_bottom parameter. | []
| null | null | null | null |
|
CVE-2021-36352 | Stored cross-site scripting (XSS) vulnerability in Care2x Hospital Information Management 2.7 Alpha. The vulnerability has found POST requests in /modules/registration_admission/patient_register.php page with "name_middle", "addr_str", "station", "name_maiden", "name_2", "name_3" parameters. | [
"cpe:2.3:a:care2x:hospital_information_management:2.7:alpha:*:*:*:*:*:*"
]
| null | 5.4 | null | 3.5 |
|
CVE-2021-1419 | Cisco Access Points SSH Management Privilege Escalation Vulnerability | A vulnerability in the SSH management feature of multiple Cisco Access Points (APs) platforms could allow a local, authenticated user to modify files on the affected device and possibly gain escalated privileges. The vulnerability is due to improper checking on file operations within the SSH management interface. A network administrator user could exploit this vulnerability by accessing an affected device through SSH management to make a configuration change. A successful exploit could allow the attacker to gain privileges equivalent to the root user. | [
"cpe:2.3:o:cisco:aironet_1542d_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:aironet_1542d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:aironet_1562d_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:aironet_1562d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:aironet_1815m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:aironet_1815m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:aironet_1830e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:aironet_1830e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:aironet_1840i_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:aironet_1840i:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:aironet_1850e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:aironet_1850e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:aironet_2800i_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:aironet_2800i:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:aironet_3800p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:aironet_3800p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:aironet_4800_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:aironet_4800:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:catalyst_9105axi_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9105axi:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:catalyst_9115axe_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9115axe:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:catalyst_9117_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9117axi:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:catalyst_9120axi_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9120axi:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:catalyst_9124axd_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9124axd:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:catalyst_9130axe_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9130axe:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:catalyst_iw6300_ac_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_iw6300_ac:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:esw6300_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:esw6300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:1100-8p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1100-8p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:1120_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1120:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:1160_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1160_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:wireless_lan_controller_software:*:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:catalyst_9800_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:catalyst_9800_firmware:17.4:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9800-l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:aironet_1542i_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:aironet_1542i:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9800-cl:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9800-40:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9800-80:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:aironet_1562e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:aironet_1562e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:aironet_1562i_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:aironet_1562i:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:aironet_1815w_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:aironet_1815w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:aironet_1815t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:aironet_1815t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:aironet_1815i_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:aironet_1815i:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:aironet_1830i_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:aironet_1830i:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:aironet_1850i_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:aironet_1850i:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:aironet_2800e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:aironet_2800e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:aironet_3800i_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:aironet_3800i:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:aironet_3800e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:aironet_3800e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:catalyst_9105axw_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9105axw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:catalyst_9115axi_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9115axi:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:catalyst_9120axp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9120axp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:catalyst_9120axe_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9120axe:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:catalyst_9124axi_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9124axi:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:catalyst_9130axi_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9130axi:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:catalyst_iw6300_dc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_iw6300_dc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:catalyst_iw6300_dcw_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_iw6300_dcw:-:*:*:*:*:*:*:*"
]
| null | 7.8 | null | null |
CVE-2022-36698 | Ingredients Stock Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /categories/view_category.php. | [
"cpe:2.3:a:ingredients_stock_management_system_project:ingredients_stock_management_system:1.0:*:*:*:*:*:*:*"
]
| null | 8.8 | null | null |
|
GHSA-2g27-m4gf-9r9v | An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in iOS 13.5 and iPadOS 13.5, macOS Catalina 10.15.5, tvOS 13.4.5, watchOS 6.2.5. Processing a maliciously crafted audio file may lead to arbitrary code execution. | []
| null | 7.8 | null | null |
|
CVE-2020-10592 | Tor before 0.3.5.10, 0.4.x before 0.4.1.9, and 0.4.2.x before 0.4.2.7 allows remote attackers to cause a Denial of Service (CPU consumption), aka TROVE-2020-002. | [
"cpe:2.3:a:torproject:tor:*:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:backports:sle-15:sp1:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"
]
| null | 7.5 | null | 7.8 |
|
GHSA-qvqw-6658-7p9p | The DL Robots.txt WordPress plugin through 1.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). | []
| null | 4.8 | null | null |
|
GHSA-7f25-p8gc-hxqh | A vulnerability was found in GraphQL due to improper access controls on the GraphQL introspection query. This flaw allows unauthorized users to retrieve a comprehensive list of available queries and mutations. Exposure to this flaw increases the attack surface, as it can facilitate the discovery of flaws or errors specific to the application's GraphQL implementation. | []
| null | null | 5.3 | null |
|
GHSA-cjr2-g7qm-xq33 | Password generator feature in Kaspersky Password Manager was not completely cryptographically strong and potentially allowed an attacker to predict generated passwords in some cases. An attacker would need to know some additional information (for example, time of password generation). | []
| null | null | null | null |
|
CVE-2023-44488 | VP9 in libvpx before 1.13.1 mishandles widths, leading to a crash related to encoding. | [
"cpe:2.3:a:webmproject:libvpx:*:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*"
]
| null | 7.5 | null | null |
|
CVE-2017-11916 | ChakraCore allows an attacker to execute arbitrary code in the context of the current user, due to how the ChakraCore scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11886, CVE-2017-11889, CVE-2017-11890, CVE-2017-11893, CVE-2017-11894, CVE-2017-11895, CVE-2017-11901, CVE-2017-11903, CVE-2017-11905, CVE-2017-11905, CVE-2017-11907, CVE-2017-11908, CVE-2017-11909, CVE-2017-11910, CVE-2017-11911, CVE-2017-11912, CVE-2017-11913, CVE-2017-11914, CVE-2017-11918, and CVE-2017-11930. | [
"cpe:2.3:a:microsoft:chakracore:*:*:*:*:*:*:*:*"
]
| null | null | 7.5 | 7.6 |
|
CVE-2019-7718 | An issue was discovered in Metinfo 6.x. An attacker can leverage a race condition in the backend database backup function to execute arbitrary PHP code via admin/index.php?n=databack&c=index&a=dogetsql&tables=<?php and admin/databack/bakup_tables.php?2=file_put_contents URIs because app/system/databack/admin/index.class.php creates bakup_tables.php temporarily. | [
"cpe:2.3:a:metinfo:metinfo:*:*:*:*:*:*:*:*"
]
| null | null | 8.1 | 6.8 |
|
GHSA-c38m-7h53-g9v4 | Path traversal in Apache James | Apache James ManagedSieve implementation alongside with the file storage for sieve scripts is vulnerable to path traversal, allowing reading and writing any file. This vulnerability had been patched in Apache James 3.6.1 and higher. We recommend the upgrade. Distributed and Cassandra based products are also not impacted. | []
| null | 9.1 | null | null |
CVE-2016-7951 | Multiple integer overflows in X.org libXtst before 1.2.3 allow remote X servers to trigger out-of-bounds memory access operations by leveraging the lack of range checks. | [
"cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:25:*:*:*:*:*:*:*",
"cpe:2.3:a:x:libxtst:*:*:*:*:*:*:*:*"
]
| null | 9.8 | null | 7.5 |
|
CVE-2023-2979 | Abstrium Pydio Cells User Creation access control | A vulnerability classified as critical has been found in Abstrium Pydio Cells 4.2.0. This affects an unknown part of the component User Creation Handler. The manipulation leads to improper access controls. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 4.2.1 is able to address this issue. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-230211. | [
"cpe:2.3:a:abstrium:pydio_cells:4.2.0:*:*:*:*:*:*:*"
]
| null | 4.7 | 4.7 | 5.8 |
GHSA-xf63-wjjg-4c9f | The password-reset feature in as/index.php in SweetRice CMS before 0.6.7.1 allows remote attackers to modify the administrator's password by specifying the administrator's e-mail address in the email parameter. | []
| null | null | null | null |
|
GHSA-rxq3-gmwr-j659 | The Essential Real Estate plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file type validation on the 'ajaxUploadFonts' function in versions up to, and including, 4.3.5. This makes it possible for authenticated attackers with subscriber-level capabilities or above, to upload arbitrary files on the affected site's server which may make remote code execution possible. | []
| null | 7.5 | null | null |
|
CVE-2019-18664 | The Log module in SECUDOS DOMOS before 5.6 allows XSS. | [
"cpe:2.3:a:secudos:domos:*:*:*:*:*:*:*:*"
]
| null | 5.4 | null | 3.5 |
|
CVE-2007-5909 | Multiple stack-based buffer overflows in Autonomy (formerly Verity) KeyView Viewer, Filter, and Export SDK before 9.2.0.12, as used by ActivePDF DocConverter, IBM Lotus Notes before 7.0.3, Symantec Mail Security, and other products, allow remote attackers to execute arbitrary code via a crafted (1) AG file to kpagrdr.dll, (2) AW file to awsr.dll, (3) DLL or (4) EXE file to exesr.dll, (5) DOC file to mwsr.dll, (6) MIF file to mifsr.dll, (7) SAM file to lasr.dll, or (8) RTF file to rtfsr.dll. NOTE: the WPD (wp6sr.dll) vector is covered by CVE-2007-5910. | [
"cpe:2.3:a:activepdf:docconverter:3.8.2_.5:*:*:*:*:*:*:*",
"cpe:2.3:a:autonomy:keyview_export_sdk:*:*:*:*:*:*:*:*",
"cpe:2.3:a:autonomy:keyview_filter_sdk:*:*:*:*:*:*:*:*",
"cpe:2.3:a:autonomy:keyview_viewer_sdk:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:*:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:mail_security:5.0:*:appliance:*:*:*:*:*",
"cpe:2.3:a:symantec:mail_security:5.0:*:microsoft_exchange:*:*:*:*:*",
"cpe:2.3:a:symantec:mail_security:5.0.0:*:smtp:*:*:*:*:*",
"cpe:2.3:a:symantec:mail_security:5.0.0.24:*:appliance:*:*:*:*:*",
"cpe:2.3:a:symantec:mail_security:5.0.1:*:smtp:*:*:*:*:*",
"cpe:2.3:a:symantec:mail_security:7.5:*:domino:*:*:*:*:*"
]
| null | null | null | 9.3 |
|
GHSA-6gqv-38q3-6c47 | In PHP 8.0.X before 8.0.28, 8.1.X before 8.1.16 and 8.2.X before 8.2.3, core path resolution function allocate buffer one byte too small. When resolving paths with lengths close to system MAXPATHLEN setting, this may lead to the byte after the allocated buffer being overwritten with NUL value, which might lead to unauthorized data access or modification. | []
| null | 9.8 | null | null |
|
GHSA-cjx9-rgqh-q7cc | A certificate parsing issue was addressed with improved checks. This issue is fixed in tvOS 15.5, iOS 15.5 and iPadOS 15.5, Security Update 2022-004 Catalina, watchOS 8.6, macOS Big Sur 11.6.6, macOS Monterey 12.4. A malicious app may be able to bypass signature validation. | []
| null | 5.5 | null | null |
|
GHSA-mrgv-56mw-m87g | sound/core/timer.c in the Linux kernel through 4.6 does not initialize certain r1 data structures, which allows local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface, related to the (1) snd_timer_user_ccallback and (2) snd_timer_user_tinterrupt functions. | []
| null | null | 5.5 | null |
|
GHSA-r3vg-939c-2mrm | Rapid7 Insight Agent, versions 3.0.1 to 3.1.2.34, suffer from a local privilege escalation due to an uncontrolled DLL search path. Specifically, when Insight Agent versions 3.0.1 to 3.1.2.34 start, the Python interpreter attempts to load python3.dll at "C:\DLLs\python3.dll," which normally is writable by locally authenticated users. Because of this, a malicious local user could use Insight Agent's startup conditions to elevate to SYSTEM privileges. This issue was fixed in Rapid7 Insight Agent 3.1.2.35. This vulnerability is a regression of CVE-2019-5629. | []
| null | null | null | null |
|
RHSA-2020:0727 | Red Hat Security Advisory: Red Hat Data Grid 7.3.3 security update | h2: Information Exposure due to insecure handling of permissions in the backup wildfly: Race condition on PID file allows for termination of arbitrary processes by local users undertow: leak credentials to log files UndertowLogger.REQUEST_LOGGER.undertowRequestFailed HTTP/2: flood using PING frames results in unbounded memory growth HTTP/2: flood using HEADERS frames results in unbounded memory growth HTTP/2: flood using SETTINGS frames results in unbounded memory growth HTTP/2: flood using empty frames results in excessive resource consumption xstream: remote code execution due to insecure XML deserialization (regression of CVE-2013-7285) infinispan: invokeAccessibly method from ReflectionUtil class allows to invoke private methods undertow: Information leak in requests for directories without trailing slashes undertow: DEBUG log for io.undertow.request.security if enabled leaks credentials to log files jackson-databind: default typing mishandling leading to remote code execution | [
"cpe:/a:redhat:jboss_data_grid:7.3"
]
| null | null | 9.8 | null |
CVE-2022-3204 | NRDelegation Attack | A vulnerability named 'Non-Responsive Delegation Attack' (NRDelegation Attack) has been discovered in various DNS resolving software. The NRDelegation Attack works by having a malicious delegation with a considerable number of non responsive nameservers. The attack starts by querying a resolver for a record that relies on those unresponsive nameservers. The attack can cause a resolver to spend a lot of time/resources resolving records under a malicious delegation point where a considerable number of unresponsive NS records reside. It can trigger high CPU usage in some resolver implementations that continually look in the cache for resolved NS records in that delegation. This can lead to degraded performance and eventually denial of service in orchestrated attacks. Unbound does not suffer from high CPU usage, but resources are still needed for resolving the malicious delegation. Unbound will keep trying to resolve the record until hard limits are reached. Based on the nature of the attack and the replies, different limits could be reached. From version 1.16.3 on, Unbound introduces fixes for better performance when under load, by cutting opportunistic queries for nameserver discovery and DNSKEY prefetching and limiting the number of times a delegation point can issue a cache lookup for missing records. | [
"cpe:2.3:a:nlnetlabs:unbound:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*"
]
| null | 7.5 | null | null |
RHSA-2022:0161 | Red Hat Security Advisory: java-17-openjdk security update | OpenJDK: Incomplete deserialization class filtering in ObjectInputStream (Serialization, 8264934) OpenJDK: Incorrect reading of TIFF files in TIFFNullDecompressor (ImageIO, 8270952) OpenJDK: Insufficient URI checks in the XSLT TransformerImpl (JAXP, 8270492) OpenJDK: Unexpected exception thrown in regex Pattern (Libraries, 8268813) OpenJDK: Incorrect marking of writeable fields (Hotspot, 8270386) OpenJDK: Incomplete checks of StringBuffer and StringBuilder during deserialization (Libraries, 8270392) OpenJDK: Incorrect IdentityHashMap size checks during deserialization (Libraries, 8270416) OpenJDK: Incorrect access checks in XMLEntityManager (JAXP, 8270498) OpenJDK: Infinite loop related to incorrect handling of newlines in XMLEntityScanner (JAXP, 8270646) OpenJDK: Array indexing issues in LIRGenerator (Hotspot, 8272014) OpenJDK: Excessive resource use when reading JAR manifest attributes (Libraries, 8272026) OpenJDK: Insufficient checks when deserializing exceptions in ObjectInputStream (Serialization, 8272236) OpenJDK: Excessive memory allocation in BMPImageReader (ImageIO, 8273756) OpenJDK: Integer overflow in BMPImageReader (ImageIO, 8273838) OpenJDK: Excessive memory allocation in TIFF*Decompressor (ImageIO, 8274096) | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
]
| null | 5.3 | null | null |
GHSA-68hq-qrc4-w5h8 | K9Mail version <= v5.600 contains a XML External Entity (XXE) vulnerability in WebDAV response parser that can result in Disclosure of confidential data, denial of service, SSRF, port scanning. This attack appear to be exploitable via malicious WebDAV server or intercept the reponse of a valid WebDAV server. | []
| null | null | 10 | null |
|
CVE-2019-3501 | The OUGC Awards plugin before 1.8.19 for MyBB allows XSS via a crafted award reason that is mishandled on the awards page or in a user profile. | [
"cpe:2.3:a:ougc_awards_project:ougc_awards:*:*:*:*:*:mybb:*:*"
]
| null | null | 4.8 | 3.5 |
|
CVE-2011-0699 | Integer signedness error in the btrfs_ioctl_space_info function in the Linux kernel 2.6.37 allows local users to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted slot value. | [
"cpe:2.3:o:linux:linux_kernel:2.6.37:*:*:*:*:*:*:*"
]
| null | 7 | null | 6.9 |
|
CVE-2008-1191 | Unspecified vulnerability in Java Web Start in Sun JDK and JRE 6 Update 4 and earlier allows remote attackers to create arbitrary files via an untrusted application, a different issue than CVE-2008-1190, aka "The fifth issue." | [
"cpe:2.3:a:sun:jdk:*:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:*:*:*:*:*:*:*:*"
]
| null | null | null | 6.8 |
|
GHSA-j2g8-rpv4-4pqf | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Roles). Supported versions that are affected are 8.0.19 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | []
| null | null | null | null |
|
GHSA-mpgq-6jmr-6c67 | Cross-site Scripting in express-cart | The express-cart package through 1.1.10 for Node.js allows Reflected XSS (for an admin) via a user input field for product options. NOTE: the vendor states that this "would rely on an admin hacking his/her own website." | []
| null | 4.8 | null | null |
GHSA-qh48-5646-82cv | In onBindingDied of CallRedirectionProcessor.java, there is a possible permission bypass due to a logic error in the code. This could lead to local escalation of privilege and background activity launch with no additional execution privileges needed. User interaction is not needed for exploitation. | []
| null | 7.8 | null | null |
|
GHSA-8f23-jcvp-f65p | IBM BigFix Platform 9.2.0 through 9.2.14 and 9.5 through 9.5.9 stores sensitive information in URL parameters. This may lead to information disclosure if unauthorized parties have access to the URLs via server logs, referrer header or browser history. IBM X-Force ID: 140763. | []
| null | null | 5.3 | null |
|
GHSA-ghhg-c6wq-2hr9 | Directory traversal vulnerability in (1) pkgadd and (2) pkgrm in SCO UnixWare 7.1.4 allows local users to gain privileges via unknown vectors. | []
| null | null | null | null |
|
GHSA-px38-239g-x5mg | Liferay Portal and Liferay DXP have Cross-site Scripting vulnerability in edit Service Access Policy page | Cross-site scripting (XSS) vulnerability in the edit Service Access Policy page in Liferay Portal 7.0.0 through 7.4.3.87, and Liferay DXP 7.4 GA through update 87, 7.3 GA through update 29, and older unsupported versions allows remote attackers to inject arbitrary web script or HTML via a crafted payload injected into a service access policy's `Service Class` text field. | []
| null | 4.8 | null | null |
CVE-2020-1540 | Windows Backup Engine Elevation of Privilege Vulnerability | An elevation of privilege vulnerability exists when the Windows Backup Engine improperly handles memory.
To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges.
The security update addresses the vulnerability by correcting how the Windows Backup Engine handles memory.
| [
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1803:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1803:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*"
]
| null | 7.8 | null | null |
GHSA-fpc4-qh4g-668v | Multiple eval injection vulnerabilities in HiveMail 1.3 and earlier allow remote attackers to execute arbitrary PHP code via (1) the contactgroupid parameter in addressbook.update.php, (2) the messageid parameter in addressbook.add.php, (3) the folderid parameter in folders.update.php, and possibly certain parameters in (4) calendar.event.php, (5) index.php, (6) pop.download.php, (7) read.bounce.php, (8) rules.block.php, (9) language.php, and (10) certain other scripts, as demonstrated by an addressbook.update.php request with a contactgroupid value of phpinfo() preceded by facilitators. | []
| null | null | null | null |
|
GHSA-8hcx-fwhr-833g | Multiple unspecified vulnerabilities in the kernel in Sun Solaris 8 through 10 allow local users to cause a denial of service (panic), related to the support for retrieval of kernel statistics, and possibly related to the sfmmu_mlspl_enter or sfmmu_mlist_enter functions. | []
| null | null | null | null |
|
RHSA-2020:4641 | Red Hat Security Advisory: python38:3.8 security, bug fix, and enhancement update | PyYAML: command execution through python/object/apply constructor in FullLoader python: infinite loop in the tarfile module via crafted TAR archive PyYAML: arbitrary command execution through python/object/new when FullLoader is used python: wrong backtracking in urllib.request.AbstractBasicAuthHandler allows for a ReDoS python: DoS via inefficiency in IPv{4,6}Interface classes | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
]
| null | 5.9 | null | null |
CVE-2022-34613 | Mealie 1.0.0beta3 contains an arbitrary file upload vulnerability which allows attackers to execute arbitrary code via a crafted file. | [
"cpe:2.3:a:mealie_project:mealie:1.0.0:beta3:*:*:*:*:*:*"
]
| null | 9.8 | null | null |
|
GHSA-jj7f-gj82-922p | The Meeting Server in IBM Sametime 8.x through 8.5.2.1 and 9.x through 9.0.0.1 does not include the HTTPOnly flag in a Set-Cookie header for an unspecified cookie, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie, a different vulnerability than CVE-2013-3984. | []
| null | null | null | null |
|
GHSA-mvwc-6gpj-59wm | An issue was discovered in Linux Foundation xapi in Citrix XenServer through 7.0. An authenticated read-only administrator can corrupt the host database. | []
| null | null | 6.5 | null |
|
CVE-2024-39487 | bonding: Fix out-of-bounds read in bond_option_arp_ip_targets_set() | In the Linux kernel, the following vulnerability has been resolved:
bonding: Fix out-of-bounds read in bond_option_arp_ip_targets_set()
In function bond_option_arp_ip_targets_set(), if newval->string is an
empty string, newval->string+1 will point to the byte after the
string, causing an out-of-bound read.
BUG: KASAN: slab-out-of-bounds in strlen+0x7d/0xa0 lib/string.c:418
Read of size 1 at addr ffff8881119c4781 by task syz-executor665/8107
CPU: 1 PID: 8107 Comm: syz-executor665 Not tainted 6.7.0-rc7 #1
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014
Call Trace:
<TASK>
__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0xd9/0x150 lib/dump_stack.c:106
print_address_description mm/kasan/report.c:364 [inline]
print_report+0xc1/0x5e0 mm/kasan/report.c:475
kasan_report+0xbe/0xf0 mm/kasan/report.c:588
strlen+0x7d/0xa0 lib/string.c:418
__fortify_strlen include/linux/fortify-string.h:210 [inline]
in4_pton+0xa3/0x3f0 net/core/utils.c:130
bond_option_arp_ip_targets_set+0xc2/0x910
drivers/net/bonding/bond_options.c:1201
__bond_opt_set+0x2a4/0x1030 drivers/net/bonding/bond_options.c:767
__bond_opt_set_notify+0x48/0x150 drivers/net/bonding/bond_options.c:792
bond_opt_tryset_rtnl+0xda/0x160 drivers/net/bonding/bond_options.c:817
bonding_sysfs_store_option+0xa1/0x120 drivers/net/bonding/bond_sysfs.c:156
dev_attr_store+0x54/0x80 drivers/base/core.c:2366
sysfs_kf_write+0x114/0x170 fs/sysfs/file.c:136
kernfs_fop_write_iter+0x337/0x500 fs/kernfs/file.c:334
call_write_iter include/linux/fs.h:2020 [inline]
new_sync_write fs/read_write.c:491 [inline]
vfs_write+0x96a/0xd80 fs/read_write.c:584
ksys_write+0x122/0x250 fs/read_write.c:637
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0x40/0x110 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x63/0x6b
---[ end trace ]---
Fix it by adding a check of string length before using it. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.10:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.10:rc5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.10:rc6:*:*:*:*:*:*"
]
| null | 7.1 | null | null |
CVE-2015-0515 | Unrestricted file upload vulnerability in EMC M&R (aka Watch4Net) before 6.5u1 and ViPR SRM before 3.6.1 allows remote authenticated users to execute arbitrary code by uploading and then accessing an executable file. | [
"cpe:2.3:a:emc:watch4net:*:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:vipr_srm:*:*:*:*:*:*:*:*"
]
| null | null | null | 6.5 |
|
CVE-2020-27052 | In getLockTaskLaunchMode of ActivityRecord.java, there is a possible way for any app to start in Lock Task Mode due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-158833495 | [
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*"
]
| null | 7.8 | null | 4.6 |
|
CVE-2016-6551 | Intellian Satellite TV antennas t-Series and v-Series, firmware version 1.07, uses default credentials | Intellian Satellite TV antennas t-Series and v-Series, firmware version 1.07, uses non-random default credentials of: ftp/ftp or intellian:12345678. A remote network attacker can gain elevated access to a vulnerable device. | [
"cpe:2.3:o:intelliantech:v60_firmware:1.07:*:*:*:*:*:*:*",
"cpe:2.3:h:intelliantech:v60:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intelliantech:v60ka_firmware:1.07:*:*:*:*:*:*:*",
"cpe:2.3:h:intelliantech:v60ka:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intelliantech:v65_firmware:1.07:*:*:*:*:*:*:*",
"cpe:2.3:h:intelliantech:v65:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intelliantech:v80g_firmware:1.07:*:*:*:*:*:*:*",
"cpe:2.3:h:intelliantech:v80g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intelliantech:t80w_firmware:1.07:*:*:*:*:*:*:*",
"cpe:2.3:h:intelliantech:t80w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intelliantech:t80q_firmware:1.07:*:*:*:*:*:*:*",
"cpe:2.3:h:intelliantech:t80q:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intelliantech:t100w_firmware:1.07:*:*:*:*:*:*:*",
"cpe:2.3:h:intelliantech:t100w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intelliantech:t100q_firmware:1.07:*:*:*:*:*:*:*",
"cpe:2.3:h:intelliantech:t100q:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intelliantech:t110w_firmware:1.07:*:*:*:*:*:*:*",
"cpe:2.3:h:intelliantech:t110w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intelliantech:t110q_firmware:1.07:*:*:*:*:*:*:*",
"cpe:2.3:h:intelliantech:t110q:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intelliantech:t130w_firmware:1.07:*:*:*:*:*:*:*",
"cpe:2.3:h:intelliantech:t130w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intelliantech:t130q_firmware:1.07:*:*:*:*:*:*:*",
"cpe:2.3:h:intelliantech:t130q:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intelliantech:t240ck_firmware:1.07:*:*:*:*:*:*:*",
"cpe:2.3:h:intelliantech:t240ck:-:*:*:*:*:*:*:*"
]
| null | null | 9.8 | 10 |
GHSA-47f3-97c9-28vx | SQL injection vulnerabilities in CMG Suite 8.4 SP2 and earlier, could allow an unauthenticated attacker to conduct an SQL injection attack due to insufficient input validation for the login interface. A successful exploit could allow an attacker to extract sensitive information from the database and execute arbitrary scripts. | []
| null | null | 9.8 | null |
|
CVE-2022-39370 | Improper access to debug panel in GLPI | GLPI stands for Gestionnaire Libre de Parc Informatique. GLPI is a Free Asset and IT Management Software package that provides ITIL Service Desk features, licenses tracking and software auditing. Connected users may gain access to debug panel through the GLPI update script. This issue has been patched, please upgrade to 10.0.4. As a workaround, delete the `install/update.php` script. | [
"cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*"
]
| null | 4.3 | null | null |
GHSA-2pjv-453j-2vhx | Rejected reason: This CVE ID has been rejected by its CNA as it was not a security issue. | []
| null | null | null | null |
|
CVE-2024-54290 | WordPress Role Includer plugin <= 1.6 - Reflected Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Justin Fletcher Role Includer allows Reflected XSS.This issue affects Role Includer: from n/a through 1.6. | []
| null | 7.1 | null | null |
GHSA-h82j-vv77-6979 | Unspecified vulnerability in the PeopleSoft Enterprise HRMS component in Oracle PeopleSoft Products 9.1 allows remote authenticated users to affect confidentiality and integrity via unknown vectors related to Time and Labor. | []
| null | null | null | null |
|
CVE-2024-0887 | Mafiatic Blue Server Connection denial of service | A vulnerability, which was classified as problematic, has been found in Mafiatic Blue Server 1.1. Affected by this issue is some unknown functionality of the component Connection Handler. The manipulation leads to denial of service. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-252038 is the identifier assigned to this vulnerability. | [
"cpe:2.3:a:mafiatic:blue_server:1.1:*:*:*:*:*:*:*"
]
| null | 5.3 | 5.3 | 5 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.