id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
4.89k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2019-6754 | This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.3.10826. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the localFileStorage method. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-7407. | [
"cpe:2.3:a:foxitsoftware:foxit_reader:*:*:*:*:*:*:*:*",
"cpe:2.3:a:foxitsoftware:phantompdf:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
]
| null | null | 7.3 | null |
|
GHSA-fg94-xg7j-w3vf | In the Linux kernel, the following vulnerability has been resolved:wifi: iwlwifi: mvm: set the cipher for secured NDP rangingThe cipher pointer is not set, but is derefereced trying to set its
content, which leads to a NULL pointer dereference.
Fix it by pointing to the cipher parameter before dereferencing. | []
| null | 5.5 | null | null |
|
GHSA-g7fp-8rpj-5fj2 | On BIG-IP version 16.1.x before 16.1.2, when an HTTP profile is configured on a virtual server, undisclosed requests can cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. | []
| null | null | null | null |
|
RHSA-2025:9179 | Red Hat Security Advisory: libsoup security update | libsoup: Heap buffer over-read in `skip_insignificant_space` when sniffing content libsoup: Integer Underflow in soup_multipart_new_from_message() Leading to Denial of Service in libsoup libsoup: Denial of Service attack to websocket server libsoup: Out of bounds reads in soup_headers_parse_request() libsoup: Double free on soup_message_headers_get_content_disposition() through "soup-message-headers.c" via "params" GHashTable value libsoup: NULL pointer dereference in soup_message_headers_get_content_disposition when "filename" parameter is present, but has no value in Content-Disposition header libsoup: OOB Read on libsoup through function "soup_multipart_new_from_message" in soup-multipart.c leads to crash or exit of process | [
"cpe:/o:redhat:rhel_els:7"
]
| null | 7.4 | null | null |
CVE-2022-47192 | Admin password reset via file upload vulnerability in Generex CS141 | Generex UPS CS141 below 2.06 version, could allow a remote attacker to upload a backup file containing a modified "users.json" to the web server of the device, allowing him to replace the administrator password. | [
"cpe:2.3:o:generex:cs141_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:generex:cs141:-:*:*:*:*:*:*:*"
]
| null | 8.8 | null | null |
CVE-2018-14457 | An issue was discovered in libgig 4.1.0. There is an out-of-bounds write in the function DLS::Info::UpdateChunks in DLS.cpp. | [
"cpe:2.3:a:linuxsampler:libgig:4.1.0:*:*:*:*:*:*:*"
]
| null | null | 8.8 | 6.8 |
|
GHSA-34r8-h3gq-qmjj | UCMS 1.5.0 was discovered to contain a physical path leakage via an error message returned by the adminchannelscache() function in top.php. | []
| null | 5.3 | null | null |
|
GHSA-j762-55qq-xmr6 | SQL injection vulnerability in admin_poll.asp in PollMentor 2.0 allows remote attackers to execute arbitrary SQL commands via the id parameter to pollmentorres.asp. | []
| null | null | null | null |
|
CVE-2007-1914 | The RFC_START_PROGRAM function in the SAP RFC Library 6.40 and 7.00 before 20061211 allows remote attackers to obtain sensitive information (external RFC server configuration data) via unspecified vectors, a different vulnerability than CVE-2006-6010. NOTE: This information is based upon a vague initial disclosure. Details will be updated after the grace period has ended. | [
"cpe:2.3:a:sap:rfc_library:6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:rfc_library:7.0:*:*:*:*:*:*:*"
]
| null | null | null | 7.8 |
|
GHSA-63gw-hff3-vv3w | Microsoft Windows 10 Gold and 1511 allows attackers to cause a denial of service via unspecified vectors, aka "Windows Denial of Service Vulnerability." | []
| null | null | 7.5 | null |
|
GHSA-jr6g-h572-57hf | Vulnerability in the Oracle Product Hub product of Oracle E-Business Suite (component: Item Catalog). Supported versions that are affected are 12.2.3-12.2.13. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Product Hub. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Product Hub accessible data as well as unauthorized access to critical data or complete access to all Oracle Product Hub accessible data. CVSS 3.1 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N). | []
| null | 8.1 | null | null |
|
CVE-2020-2926 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Group Replication GCS). Supported versions that are affected are 8.0.19 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H). | [
"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*"
]
| null | null | 4.4 | null |
|
GHSA-f92g-3pmp-x3pm | Multiple stack-based buffer overflows in Firebird LI 2.0.0.12748 and 2.0.1.12855, and WI 2.0.0.12748 and 2.0.1.12855, allow remote attackers to execute arbitrary code via (1) a long attach request on TCP port 3050 to the isc_attach_database function or (2) a long create request on TCP port 3050 to the isc_create_database function. | []
| null | null | null | null |
|
CVE-2024-13104 | D-Link DIR-816 A2 WiFi Settings form2AdvanceSetup.cgi access control | A vulnerability, which was classified as critical, was found in D-Link DIR-816 A2 1.10CNB05_R1B011D88210. Affected is an unknown function of the file /goform/form2AdvanceSetup.cgi of the component WiFi Settings Handler. The manipulation leads to improper access controls. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. | []
| 6.9 | 5.3 | 5.3 | 5 |
CVE-2025-32021 | Weblate VCS credentials included in URL parameters are potentially logged and saved into browser history as plaintext | Weblate is a web based localization tool. Prior to version 5.11, when creating a new component from an existing component that has a source code repository URL specified in settings, this URL is included in the client's URL parameters during the creation process. If, for example, the source code repository URL contains GitHub credentials, the confidential PAT and username are shown in plaintext and get saved into browser history. Moreover, if the request URL is logged, the credentials are written to logs in plaintext. If using Weblate official Docker image, nginx logs the URL and the token in plaintext. This issue is patched in version 5.11. | []
| null | 2.2 | null | null |
CVE-2011-1885 | win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that triggers a NULL pointer dereference, a different vulnerability than other CVEs listed in MS11-054, aka "Win32k Null Pointer De-reference Vulnerability." | [
"cpe:2.3:o:microsoft:windows_2003_server:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:x86:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:*:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:*:x32:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:*:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x32:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:*:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:*:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:*"
]
| null | null | null | 7.2 |
|
RHSA-2008:1025 | Red Hat Security Advisory: java-1.5.0-sun security update | Java Web Start File Inclusion via System Properties Override JavaWebStart allows unauthorized network connections Java WebStart privilege escalation Java Web Start exposes username and the pathname of the JWS cache Java Web Start BasicService displays local files in the browser Java WebStart allows hidden code privilege escalation Java WebStart unprivileged local file and network access JRE allows unauthorized file access and connections to localhost JRE allows unauthorized memory read access via a crafted ZIP file OpenJDK Denial-Of-Service in kerberos authentication (6588160) OpenJDK RSA public key length denial-of-service (6497740) OpenJDK allows to list files within the user home directory (6484091) OpenJDK UTF-8 decoder accepts non-shortest form sequences (4486841) OpenJDK Jar200 Decompression buffer overflow (6755943) OpenJDK calendar object deserialization allows privilege escalation (6734167) OpenJDK Privilege escalation in command line applications (6733959) OpenJDK Font processing vulnerability (6733336) OpenJDK Truetype Font processing vulnerability (6751322) OpenJDK Buffer overflow in image processing (6726779) OpenJDK temporary files have guessable file names (6721753) | [
"cpe:/a:redhat:rhel_extras:4",
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
]
| null | null | null | null |
CVE-2018-5042 | Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user. | [
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
]
| null | null | 8.8 | 6.8 |
|
CVE-2020-2026 | Kata Containers - Guests can trick the kata-runtime into mounting the container image on any host path | A malicious guest compromised before a container creation (e.g. a malicious guest image or a guest running multiple containers) can trick the kata runtime into mounting the untrusted container filesystem on any host path, potentially allowing for code execution on the host. This issue affects: Kata Containers 1.11 versions earlier than 1.11.1; Kata Containers 1.10 versions earlier than 1.10.5; Kata Containers 1.9 and earlier versions. | [
"cpe:2.3:a:katacontainers:runtime:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*"
]
| null | 7.8 | null | null |
GHSA-8329-73v4-x45c | The wireless-communication feature of the ABUS Secvest FUBE50001 device does not encrypt sensitive data such as PIN codes or IDs of used proximity chip keys (RFID tokens). This makes it easier for an attacker to disarm the wireless alarm system. | []
| null | null | null | null |
|
GHSA-hm9w-m367-w8fp | Winamp Web Interface (Wawi) 7.5.13 and earlier uses an insufficient comparison to determine whether a directory is located below the application's root directory, which allows remote authenticated users to access certain other directories if the name of the root directory is a substring of the name of the target directory, as demonstrated by accessing C:\folder2 when the root directory is C:\folder. | []
| null | null | null | null |
|
CVE-2018-10208 | An issue was discovered in Vaultize Enterprise File Sharing 17.05.31. There is anonymous reflected XSS on the error page via a /share/error?message= URI. | [
"cpe:2.3:a:vaultize:enterprise_file_sharing:17.05.31:*:*:*:*:*:*:*"
]
| null | null | 6.1 | 4.3 |
|
CVE-2022-22652 | The GSMA authentication panel could be presented on the lock screen. The issue was resolved by requiring device unlock to interact with the GSMA authentication panel. This issue is fixed in iOS 15.4 and iPadOS 15.4. A person with physical access may be able to view and modify the carrier account information and settings from the lock screen. | [
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"
]
| null | 6.1 | null | 3.6 |
|
GHSA-3783-62vc-jr7x | ConsoleMe has an Arbitrary File Read Vulnerability via Limited Git command | ID: NFLX-2024-002ImpactAuthenticated users can achieve limited RCE in ConsoleMe, restricted to flag inputs on a single CLI command. Due to this constraint, it is not currently known whether full RCE is possible but it is unlikely.
However, a specific flag allows authenticated users to read any server files accessible by the ConsoleMe process. Given ConsoleMe's role as an AWS identity broker, accessing files containing secrets on the server could potentially be exploited for privilege escalation.Deployments of ConsoleMe that allow templated resources are impacted and urged to patch immediately. Deployments that do not permit templated resources are not affected.To determine if your ConsoleMe deployment uses templated resources, check the configuration value for `cache_resource_templates.repositories`. If this value does not exist or is an empty array, your deployment is not impacted.DescriptionThe self-service flow for templated resources in ConsoleMe accepts a user-supplied JSON post body, which includes the filename for the templated resource. However, this user-supplied filename is not properly sanitized and is passed directly as a string to a CLI command. This allows users to input flags instead of filenames. By passing a specific flag with a filename value, users can induce an error that reveals the contents of the specified file, allowing them to read any files readable by the system user executing the ConsoleMe server process.PatchesThis issue has been patched in version [v1.4.0](https://pypi.org/project/consoleme/1.4.0/) via https://github.com/Netflix/consoleme/pull/9380.
If you are unable to upgrade to the latest version, users can selectively apply the code changes in the above PR. Alternatively, removing the configuration item `cache_resource_templates.repositories` or adding it as an empty array should mitigate the issue, but will result in broken functionality (templated resources will no longer be supported for self-service).Credit[Jay Dhulia](https://github.com/jaydhulia) | []
| null | 9.6 | null | null |
GHSA-gm89-j9wr-p8rw | This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley MicroStation CONNECT 10.16.02.34. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of IFC files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-16367. | []
| null | 7.8 | null | null |
|
GHSA-mq99-924g-fq3x | A cross-site scripting (XSS) vulnerability in RageFrame2 v2.6.43, allows remote attackers to execute arbitrary web scripts or HTML and obtain sensitive information via a crafted payload injected into the upload_drive parameter. | []
| null | 6.1 | null | null |
|
CVE-2010-4898 | SQL injection vulnerability in the Gantry (com_gantry) component 3.0.10 for Joomla! allows remote attackers to execute arbitrary SQL commands via the moduleid parameter to index.php. | [
"cpe:2.3:a:gantry-framework:com_gantry:3.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:*:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
CVE-2014-2604 | Unspecified vulnerability in HP IceWall SSO 10.0 Dfw and IceWall MCRP 2.1 and 3.0 allows remote attackers to cause a denial of service via unknown vectors. | [
"cpe:2.3:a:hp:icewall_mcrp:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:icewall_mcrp:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:icewall_sso:10.0:*:*:*:dfw:*:*:*"
]
| null | null | null | 5 |
|
CVE-2019-10542 | Buffer over-read may occur when downloading a corrupted firmware file that has chunk length in header which doesn`t match the contents in Snapdragon Auto, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music in MDM9150, MDM9206, MDM9607, MDM9615, MDM9640, MDM9650, MSM8996AU, QCA6174A, QCA6574AU, QCA9377, QCA9379, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 450, SD 600, SD 625, SD 712 / SD 710 / SD 670, SD 820, SD 820A, SD 845 / SD 850, SDX20 | [
"cpe:2.3:o:qualcomm:mdm9150_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9206_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9206:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9607_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9607:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9615_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9615:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9640_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9640:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9650:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8996au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6174a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6174a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9377_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9377:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9379_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9379:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_210_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_210:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_212_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_212:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_205_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_205:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_425_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_425:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_427_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_427:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_430_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_430:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_435_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_435:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_450_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_450:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_600_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_600:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_625_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_625:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_712_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_712:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_710_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_710:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_670_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_670:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_820_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_820:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_820a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_820a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_845_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_845:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_850_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_850:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx20_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx20:-:*:*:*:*:*:*:*"
]
| null | 9.8 | null | 7.5 |
|
GHSA-7q82-fxvh-gf2x | Multiple parameters have SQL injection vulnerability in JEPaaS 7.2.8 via /je/login/btnLog/insertBtnLog, which could allow a remote user to submit a specially crafted query, allowing an attacker to retrieve all the information stored in the DB. | []
| null | 9.1 | null | null |
|
GHSA-4c9r-fcrv-f86f | Vulnerability in wordpress plugin membership-simplified-for-oap-members-only v1.58, The file download code located membership-simplified-for-oap-members-only/download.php does not check whether a user is logged in and has download privileges. | []
| null | 9.8 | null | null |
|
CVE-2016-1941 | The file-download dialog in Mozilla Firefox before 44.0 on OS X enables a certain button too quickly, which allows remote attackers to conduct clickjacking attacks via a crafted web site that triggers a single-click action in a situation where a double-click action was intended. | [
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"
]
| null | null | 6.1 | 4.3 |
|
CVE-2023-47257 | ConnectWise ScreenConnect through 23.8.4 allows man-in-the-middle attackers to achieve remote code execution via crafted messages. | [
"cpe:2.3:a:connectwise:automate:-:*:*:*:*:*:*:*",
"cpe:2.3:a:connectwise:screenconnect:*:*:*:*:*:*:*:*"
]
| null | 8.1 | null | null |
|
CVE-2024-21214 | Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: Query). Supported versions that are affected are 8.59, 8.60 and 8.61. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all PeopleSoft Enterprise PeopleTools accessible data as well as unauthorized access to critical data or complete access to all PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.1 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N). | [
"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.59:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.60:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.61:*:*:*:*:*:*:*"
]
| null | 8.1 | null | null |
|
GHSA-438x-56gx-w64g | CgiUserConfigEdit in BackupPC 3.1.0, when SSH keys and Rsync are in use in a multi-user environment, does not restrict users from the ClientNameAlias function, which allows remote authenticated users to read and write sensitive files by modifying ClientNameAlias to match another system, then initiating a backup or restore. | []
| null | null | null | null |
|
RHSA-2024:5622 | Red Hat Security Advisory: fence-agents security update | urllib3: proxy-authorization request header is not stripped during cross-origin redirects | [
"cpe:/a:redhat:rhel_aus:8.6::appstream",
"cpe:/a:redhat:rhel_e4s:8.6::appstream",
"cpe:/a:redhat:rhel_e4s:8.6::highavailability",
"cpe:/a:redhat:rhel_tus:8.6::appstream",
"cpe:/a:redhat:rhel_tus:8.6::highavailability"
]
| null | 4.4 | null | null |
GHSA-rhv8-wfm8-gjqj | In multiple Tecson Tankspion and GOKs SmartBox 4 products the affected application doesn't properly restrict access to an endpoint that is responsible for saving settings, to a unauthenticated user with limited access rights. Based on the lack of adequately implemented access-control rules, by accessing a specific uniform resource locator (URL) on the web server, a malicious user is able to change the application settings without authenticating at all, which violates originally laid ACL rules. | []
| null | 9.8 | null | null |
|
GHSA-4pvw-p74p-pc99 | IOBit Advanced SystemCare Free 13.5.0.263 allows local users to gain privileges for file deletion by manipulating the Clean & Optimize feature with an NTFS junction and an Object Manager symbolic link. | []
| null | null | null | null |
|
CVE-2009-4298 | The LAMS module (mod/lams) for Moodle 1.8 before 1.8.11 and 1.9 before 1.9.7 stores the (1) username, (2) firstname, and (3) lastname fields within the user table, which allows attackers to obtain user account information via unknown vectors. | [
"cpe:2.3:a:moodle:moodle:1.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.8.3:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.8.4:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.8.5:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.8.7:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.8.8:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.8.9:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.8.10:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.9.4:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.9.5:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.9.6:*:*:*:*:*:*:*"
]
| null | null | null | 5 |
|
CVE-2015-4209 | Cisco WebEx Meeting Center does not properly determine authorization for reading a host calendar, which allows remote attackers to obtain sensitive information by obtaining a list of all meetings and then sending a calendar request for each one, aka Bug ID CSCur23913. | [
"cpe:2.3:a:cisco:webex_meeting_center:-:*:*:*:*:*:*:*"
]
| null | null | null | 6.4 |
|
GHSA-2h65-jhhf-3h5q | Unspecified vulnerability in the Oracle VM VirtualBox component in Oracle Virtualization VirtualBox before 4.3.36 and 5.0.14 allows remote attackers to affect availability via unknown vectors related to Core. | []
| null | null | null | null |
|
GHSA-4hhj-q24f-3rg6 | PHP remote file inclusion vulnerability in index.php in Ivan Gallery Script 0.3 allows remote attackers to execute arbitrary PHP code via a URL in the gallery parameter in a new session. | []
| null | null | null | null |
|
CVE-2018-9572 | In impd_drc_parse_coeff of impd_drc_static_payload.c there is a possible out of bounds write due to missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android. Versions: Android-9. Android ID: A-116224432. | [
"cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*"
]
| null | 8.8 | null | 9.3 |
|
CVE-2010-4036 | Google Chrome before 7.0.517.41 does not properly handle the unloading of a page, which allows remote attackers to spoof URLs via unspecified vectors. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.454.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.455.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.456.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.457.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.458.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.458.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.458.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.459.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.460.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.461.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.462.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.464.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.465.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.465.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.466.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.466.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.466.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.466.3:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.466.4:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.466.5:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.466.6:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.467.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.469.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.470.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.471.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.472.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.472.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.472.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.472.3:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.472.4:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.472.5:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.472.6:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.472.7:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.472.8:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.472.9:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.472.10:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.472.11:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.472.12:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.472.13:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.472.14:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.472.15:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.472.16:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.472.17:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.472.18:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.472.19:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.472.20:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.472.21:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.472.22:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.472.23:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.472.24:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.472.25:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.472.26:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.472.27:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.472.28:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.472.29:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.472.30:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.472.31:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.472.32:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.472.33:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.472.34:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.472.35:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.472.36:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.472.37:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.472.38:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.472.39:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.472.40:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.472.41:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.472.42:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.472.43:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.472.44:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.472.45:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.472.46:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.472.47:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.472.48:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.472.49:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.472.50:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.472.51:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.472.52:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.472.53:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.472.54:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.472.55:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.472.56:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.472.57:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.472.58:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.472.59:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.472.60:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.472.61:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.472.62:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.472.63:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.473.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.474.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.475.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.476.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.477.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.478.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.479.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.480.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.481.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.482.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.483.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.484.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.485.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.486.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.487.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.488.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.489.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.490.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.490.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.491.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.492.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.493.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.494.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.495.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.495.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:6.0.496.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:7.0.497.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:7.0.498.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:7.0.499.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:7.0.499.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:7.0.500.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:7.0.500.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:7.0.503.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:7.0.503.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:7.0.504.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:7.0.505.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:7.0.506.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:7.0.507.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:7.0.507.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:7.0.507.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:7.0.507.3:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:7.0.509.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:7.0.510.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:7.0.511.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:7.0.511.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:7.0.511.4:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:7.0.512.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:7.0.513.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:7.0.514.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:7.0.514.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:7.0.515.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:7.0.516.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:7.0.517.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:7.0.517.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:7.0.517.4:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:7.0.517.5:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:7.0.517.6:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:7.0.517.7:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:7.0.517.8:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:7.0.517.9:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:7.0.517.10:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:7.0.517.11:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:7.0.517.12:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:7.0.517.13:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:7.0.517.14:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:7.0.517.16:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:7.0.517.17:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:7.0.517.18:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:7.0.517.19:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:7.0.517.20:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:7.0.517.21:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:7.0.517.22:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:7.0.517.23:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:7.0.517.24:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:7.0.517.25:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:7.0.517.26:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:7.0.517.27:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:7.0.517.28:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:7.0.517.29:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:7.0.517.30:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:7.0.517.31:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:7.0.517.32:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:7.0.517.33:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:7.0.517.34:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:7.0.517.35:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:7.0.517.36:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:7.0.517.37:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:7.0.517.38:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:7.0.517.39:*:*:*:*:*:*:*"
]
| null | null | null | 6.8 |
|
GHSA-g295-36ch-j742 | The Digits plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 8.4.1. This is due to missing nonce validation in the 'digits_save_settings' function. This makes it possible for unauthenticated attackers to modify the default role of registered users to elevate user privileges via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | []
| null | 8.8 | null | null |
|
CVE-2017-3282 | Vulnerability in the Oracle Partner Management component of Oracle E-Business Suite (subcomponent: User Interface). Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5 and 12.2.6. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Partner Management. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Partner Management, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Partner Management accessible data. CVSS v3.0 Base Score 4.7 (Integrity impacts). | [
"cpe:2.3:a:oracle:partner_management:12.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:partner_management:12.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:partner_management:12.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:partner_management:12.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:partner_management:12.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:partner_management:12.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:partner_management:12.2.6:*:*:*:*:*:*:*"
]
| null | null | 4.7 | 4.3 |
|
GHSA-cqvw-46pg-24r3 | Multiple cross-site scripting (XSS) vulnerabilities in F5 FirePass SSL VPN allow remote attackers to inject arbitrary web script or HTML via (1) the xcho parameter to my.logon.php3; the (2) topblue, (3) midblue, (4) wtopblue, and certain other Custom color parameters in a per action to vdesk/admincon/index.php; the (5) h321, (6) h311, (7) h312, and certain other Front Door custom text color parameters in a per action to vdesk/admincon/index.php; the (8) ua parameter in a bro action to vdesk/admincon/index.php; the (9) app_param and (10) app_name parameters to webyfiers.php; (11) double eval functions; (12) JavaScript contained in an <FP_DO_NOT_TOUCH> element; and (13) the vhost parameter to my.activation.php. NOTE: it is possible that this candidate overlaps CVE-2006-3550. | []
| null | null | null | null |
|
GHSA-9pj9-8qr7-5x38 | A vulnerability in the Internet Key Exchange version 2 (IKEv2) protocol for VPN termination of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending crafted IKEv2 traffic to an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition. | []
| null | 8.6 | null | null |
|
RHSA-2004:632 | Red Hat Security Advisory: samba security update | security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
]
| null | null | null | null |
GHSA-m9mx-49mx-whcc | A CWE-476: NULL Pointer Dereference vulnerability exists that could cause a denial of service of the webserver when parsing JSON content type. Affected Products: X80 advanced RTU Communication Module (BMENOR2200H) (V2.01 and later), OPC UA Modicon Communication Module (BMENUA0100) (V1.10 and prior) | []
| null | 7.5 | null | null |
|
CVE-2021-34500 | Windows Kernel Memory Information Disclosure Vulnerability | Windows Kernel Memory Information Disclosure Vulnerability | [
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2061:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2061:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2061:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2061:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1679:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1679:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.18363.1679:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1110:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1110:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1110:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.19041.1110:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2004:10.0.19041.1110:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_20h2:10.0.19042.1110:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_20h2:10.0.19042.1110:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_20h2:10.0.19042.1110:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19204:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19204:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.4946:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.4946:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.4946:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:6.1.7601.25860:sp1:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_7:6.1.7601.25860:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20269:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20269:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:6.3.9600.20269:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21374:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21372:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21374:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21372:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_server_2008_r2:6.1.7601.25860:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23605:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012_r2:6.3.9600.20269:*:*:*:*:*:x64:*"
]
| null | 6.3 | null | null |
GHSA-5gjw-xf38-367f | A vulnerability, which was classified as critical, has been found in D-Link DI-8100 16.07. This issue affects the function msp_info_htm of the file msp_info.htm. The manipulation of the argument cmd leads to command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-273521 was assigned to this vulnerability. | []
| 5.3 | 6.3 | null | null |
|
CVE-2019-17057 | Footy Tipping Software AFL Web Edition 2019 allows XSS. | [
"cpe:2.3:a:footy:tipping_software:2019:*:*:*:web_edition:*:*:*"
]
| null | 6.1 | null | 4.3 |
|
GHSA-mx2h-hf7j-2x3p | Improper Neutralization of Input During Web Page Generation in Apache Solr | Multiple cross-site scripting (XSS) vulnerabilities in the Admin UI in Apache Solr before 5.1 allow remote attackers to inject arbitrary web script or HTML via crafted fields that are mishandled during the rendering of the (1) Analysis page, related to webapp/web/js/scripts/analysis.js or (2) Schema-Browser page, related to webapp/web/js/scripts/schema-browser.js. | []
| null | null | 6.1 | null |
GHSA-34fq-349c-fpv2 | A memory corruption issue was addressed with improved validation. This issue is fixed in macOS Big Sur 11.6.5, macOS Monterey 12.3, Security Update 2022-003 Catalina. Processing a maliciously crafted file may lead to arbitrary code execution. | []
| null | 7.8 | null | null |
|
GHSA-44x3-96q8-6c96 | Microsoft GDI Component in Windows 7 SP1 and Windows Server 2008 SP2 and R2 SP1 allows an attacker to log on to an affected system and run a specially crafted application to compromise the user's system, due improperly disclosing kernel memory addresses, aka "Windows GDI Information Disclosure Vulnerability". | []
| null | null | 4.7 | null |
|
CVE-2024-22032 | Rancher's RKE1 Encryption Config kept in plain-text within cluster AppliedSpec | A vulnerability has been identified in which an RKE1 cluster keeps
constantly reconciling when secrets encryption configuration is enabled.
When reconciling, the Kube API secret values are written in plaintext
on the AppliedSpec. Cluster owners, Cluster members, and Project members
(for projects within the cluster), all have RBAC permissions to view
the cluster object from the apiserver. | []
| 7.1 | 6.5 | null | null |
CVE-2022-4095 | A use-after-free flaw was found in Linux kernel before 5.19.2. This issue occurs in cmd_hdl_filter in drivers/staging/rtl8712/rtl8712_cmd.c, allowing an attacker to launch a local denial of service attack and gain escalation of privileges. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.0:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.0:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.0:rc3:*:*:*:*:*:*"
]
| null | 7.8 | null | null |
|
GHSA-mwfg-6wv9-379f | Go before 1.14.12 and 1.15.x before 1.15.5 allows Code Injection. | []
| null | 7.5 | null | null |
|
CVE-2021-43046 | TIBCO PartnerExpress Session Token in URL | The Interior Server and Gateway Server components of TIBCO Software Inc.'s TIBCO PartnerExpress contain an easily exploitable vulnerability that allows an unauthenticated attacker with network access to obtain session tokens for the affected system. A successful attack using this vulnerability requires human interaction from a person other than the attacker. Affected releases are TIBCO Software Inc.'s TIBCO PartnerExpress: versions 6.2.1 and below. | [
"cpe:2.3:a:tibco:partnerexpress:*:*:*:*:*:*:*:*"
]
| null | 7.5 | null | null |
RHSA-2021:0320 | Red Hat Security Advisory: Red Hat Single Sign-On 7.4.5 security update on RHEL 8 | keycloak: Default Client configuration is vulnerable to SSRF using "request_uri" parameter | [
"cpe:/a:redhat:red_hat_single_sign_on:7::el8"
]
| null | 5.8 | null | null |
RHSA-2013:0762 | Red Hat Security Advisory: Red Hat Enterprise MRG for Red Hat Enterprise Linux 5 1-Year Notice | This is the 1-Year notification for the retirement of Red Hat Enterprise
MRG Version 1 and Version 2 for Red Hat Enterprise Linux 5. | [
"cpe:/a:redhat:enterprise_mrg:1::el5",
"cpe:/a:redhat:enterprise_mrg:2::el5"
]
| null | null | null | null |
CVE-2019-16508 | The Imagination Technologies driver for Chrome OS before R74-11895.B, R75 before R75-12105.B, and R76 before R76-12208.0.0 allows attackers to trigger an Integer Overflow and gain privileges via a malicious application. This occurs because of intentional access for the GPU process to /dev/dri/card1 and the PowerVR ioctl handler, as demonstrated by PVRSRVBridgeSyncPrimOpCreate. | [
"cpe:2.3:o:google:chrome_os:*:*:*:*:*:*:*:*"
]
| null | 7.8 | null | 9.3 |
|
CVE-2019-11842 | An issue was discovered in Matrix Sydent before 1.0.3 and Synapse before 0.99.3.1. Random number generation is mishandled, which makes it easier for attackers to predict a Sydent authentication token or a Synapse random ID. | [
"cpe:2.3:a:matrix:sydent:*:*:*:*:*:*:*:*",
"cpe:2.3:a:matrix:synapse:*:*:*:*:*:*:*:*"
]
| null | null | 7.5 | 5 |
|
GHSA-2x9w-m9r8-rmvq | LiveZilla 5.0.1.4 has a Remote Code Execution vulnerability | []
| null | null | null | null |
|
CVE-2020-9961 | An out-of-bounds read was addressed with improved input validation. This issue is fixed in macOS Catalina 10.15.7, Security Update 2020-005 High Sierra, Security Update 2020-005 Mojave. Processing a maliciously crafted image may lead to arbitrary code execution. | [
"cpe:2.3:a:apple:icloud:*:*:*:*:*:windows:*:*",
"cpe:2.3:a:apple:itunes:*:*:*:*:*:windows:*:*",
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.13.6:-:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2018-002:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2018-003:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2019-001:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2019-002:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2019-003:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2019-004:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2019-005:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2019-006:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2019-007:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2020-001:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2020-002:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2020-003:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2020-004:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:-:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-001:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-002:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-004:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-005:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-006:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-007:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-001:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-002:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-003:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-004:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
]
| null | 7.8 | null | 6.8 |
|
CVE-2008-7102 | DotNetNuke 2.0 through 4.8.4 allows remote attackers to load .ascx files instead of skin files, and possibly access privileged functionality, via unknown vectors related to parameter validation. | [
"cpe:2.3:a:dotnetnuke:dotnetnuke:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:dotnetnuke:dotnetnuke:2.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:dotnetnuke:dotnetnuke:3.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:dotnetnuke:dotnetnuke:3.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:dotnetnuke:dotnetnuke:3.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:dotnetnuke:dotnetnuke:3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:dotnetnuke:dotnetnuke:3.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:dotnetnuke:dotnetnuke:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:dotnetnuke:dotnetnuke:4.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:dotnetnuke:dotnetnuke:4.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:dotnetnuke:dotnetnuke:4.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:dotnetnuke:dotnetnuke:4.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:dotnetnuke:dotnetnuke:4.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:dotnetnuke:dotnetnuke:4.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:dotnetnuke:dotnetnuke:4.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:dotnetnuke:dotnetnuke:4.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:dotnetnuke:dotnetnuke:4.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:dotnetnuke:dotnetnuke:4.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:dotnetnuke:dotnetnuke:4.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:dotnetnuke:dotnetnuke:4.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:dotnetnuke:dotnetnuke:4.8.3:*:*:*:*:*:*:*",
"cpe:2.3:a:dotnetnuke:dotnetnuke:4.8.4:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
CVE-2023-37470 | Metabase vulnerable to remote code execution via POST /api/setup/validate API endpoint | Metabase is an open-source business intelligence and analytics platform. Prior to versions 0.43.7.3, 0.44.7.3, 0.45.4.3, 0.46.6.4, 1.43.7.3, 1.44.7.3, 1.45.4.3, and 1.46.6.4, a vulnerability could potentially allow remote code execution on one's Metabase server. The core issue is that one of the supported data warehouses (an embedded in-memory database H2), exposes a number of ways for a connection string to include code that is then executed by the process running the embedded database. Because Metabase allows users to connect to databases, this means that a user supplied string can be used to inject executable code. Metabase allows users to validate their connection string before adding a database (including on setup), and this validation API was the primary vector used as it can be called without validation. Versions 0.43.7.3, 0.44.7.3, 0.45.4.3, 0.46.6.4, 1.43.7.3, 1.44.7.3, 1.45.4.3, and 1.46.6.4 fix this issue by removing the ability of users to add H2 databases entirely. As a workaround, it is possible to block these vulnerabilities at the network level by blocking the endpoints `POST /api/database`, `PUT /api/database/:id`, and `POST /api/setup/validateuntil`. Those who use H2 as a file-based database should migrate to SQLite. | [
"cpe:2.3:a:metabase:metabase:*:*:*:*:-:*:*:*",
"cpe:2.3:a:metabase:metabase:*:*:*:*:enterprise:*:*:*"
]
| null | 10 | null | null |
CVE-2024-9913 | D-Link DIR-619L B1 formSetRoute buffer overflow | A vulnerability was found in D-Link DIR-619L B1 2.06. It has been rated as critical. This issue affects the function formSetRoute of the file /goform/formSetRoute. The manipulation of the argument curTime leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. | [
"cpe:2.3:h:d-link:dir-619l_b1:*:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dir-619l_firmware:2.06b1:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dir-619l:b1:*:*:*:*:*:*:*"
]
| 8.7 | 8.8 | 8.8 | 9 |
CVE-2012-0557 | Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.3.5 and 8.3.7 allows remote attackers to affect confidentiality, integrity, and availability, related to Outside In Image Export SDK, a different vulnerability than CVE-2012-0554, CVE-2012-0555, and CVE-2012-0556. | [
"cpe:2.3:a:oracle:fusion_middleware:8.3.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:fusion_middleware:8.3.7.0:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
GHSA-6mmq-wfvf-jxf6 | A vulnerability allows unauthorized access to functionality inadequately constrained by ACLs. Attackers may exploit this to unauthenticated execute commands potentially leading to unauthorized data manipulation, access to privileged functions, or even the execution of arbitrary code. | []
| null | 10 | null | null |
|
GHSA-vmqr-c49v-3hhp | The getItemInfoByAtom function in the ActiveX control for Microsoft Windows Media Player 9.0 returns a 0 if the file does not exist and the size of the file if the file exists, which allows remote attackers to determine the existence of files on the local system. | []
| null | null | null | null |
|
GHSA-pq95-gj94-4r5p | An issue was discovered on LG mobile devices with Android OS 7.0, 7.1, 7.2, 8.0, and 8.1 software. Certain security settings, related to whether packages are verified and accepted only from known sources, are mishandled. The LG ID is LVE-SMP-190002 (April 2019). | []
| null | null | null | null |
|
CVE-2019-12902 | Pydio Cells before 1.5.0 does incomplete cleanup of a user's data upon deletion. This allows a new user, holding the same User ID as a deleted user, to restore the deleted user's data. | [
"cpe:2.3:a:pydio:cells:*:*:*:*:*:*:*:*"
]
| null | null | 6.5 | 4 |
|
GHSA-46mw-pp5w-gff7 | An unauthenticated attacker can get users' emails by knowing usernames. A password reset email will be sent in response to this unsolicited request. | []
| 6.9 | 5.3 | null | null |
|
RHSA-2022:4587 | Red Hat Security Advisory: pcs security update | sinatra: path traversal possible outside of public_dir when serving static files | [
"cpe:/a:redhat:enterprise_linux:9::highavailability",
"cpe:/a:redhat:enterprise_linux:9::resilientstorage"
]
| null | 7.5 | null | null |
GHSA-r6rv-m68g-fvjq | An issue was discovered in WTCMS 1.0. It allows remote attackers to cause a denial of service (resource consumption) via crafted dimensions for the verification code image. | []
| null | null | 7.5 | null |
|
ICSA-21-131-07 | Siemens SIMATIC NET CP343-1 | Specially crafted packets sent to TCP port 102 could cause a Denial-of-Service condition on the affected devices. A cold restart might be necessary in order to recover. | []
| null | 7.5 | null | null |
GHSA-w2vp-cxx6-662p | Cybonet - CWE-22: Improper Limitation of a Pathname to a Restricted Directory | []
| null | 7.5 | null | null |
|
GHSA-6648-296f-7jc7 | A vulnerability was found in SourceCodester Employee Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /Account/login.php. The manipulation of the argument txtusername leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-254624. | []
| null | 7.3 | null | null |
|
CVE-2019-2993 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: C API). Supported versions that are affected are 5.7.27 and prior and 8.0.17 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H). | [
"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*",
"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*"
]
| null | 5.3 | null | 3.5 |
|
CVE-2017-20015 | WEKA INTEREST Security Scanner LAN Viewer denial of service | A vulnerability, which was classified as problematic, was found in WEKA INTEREST Security Scanner up to 1.8. This affects an unknown part of the component LAN Viewer. The manipulation with an unknown input leads to denial of service. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. NOTE: This vulnerability only affects products that are no longer supported by the maintainer | [
"cpe:2.3:a:weka:interest_security_scanner:*:*:*:*:*:*:*:*"
]
| null | 2.8 | null | null |
RHSA-2023:5048 | Red Hat Security Advisory: flac security update | flac: Remote Code Execution (RCE) via the bitwriter_grow_ function, by supplying crafted input to the encoder | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
]
| null | 7.8 | null | null |
GHSA-wgxc-hmmq-r3v4 | IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allow remote authenticated users to obtain sensitive information about application implementation via unspecified vectors, a different vulnerability than CVE-2013-2985, CVE-2013-2987, CVE-2013-3020, CVE-2013-0568, CVE-2013-0475, and CVE-2013-0567. | []
| null | null | null | null |
|
CVE-1999-0155 | The ghostscript command with the -dSAFER option allows remote attackers to execute commands. | [
"cpe:2.3:a:aladdin_enterprises:ghostscript:2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:aladdin_enterprises:ghostscript:3.22:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
GHSA-488v-m6fm-php4 | The Royal Elementor Addons and Templates plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Advanced Accordion widget in all versions up to, and including, 1.3.971 due to insufficient input sanitization and output escaping on user supplied attributes like 'accordion_title_tag'. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | []
| null | 6.4 | null | null |
|
CVE-2023-25174 | Improper access control in some Intel(R) Chipset Driver Software before version 10.1.19444.8378 may allow an authenticated user to potentially enable escalation of privilege via local access. | [
"cpe:2.3:a:intel:chipset_device_software:*:*:*:*:*:*:*:*"
]
| null | 6.7 | null | null |
|
CVE-2018-13750 | The mintToken function of a smart contract implementation for RichiumToken, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value. | [
"cpe:2.3:a:richiumtoken_project:richiumtoken:-:*:*:*:*:*:*:*"
]
| null | null | 7.5 | 5 |
|
RHSA-2014:0520 | Red Hat Security Advisory: kernel security and bug fix update | kernel: net: sctp: null pointer dereference when processing authenticated cookie_echo chunk kernel: pty layer race condition leading to memory corruption kernel: netfilter: nf_conntrack_dccp: incorrect skb_header_pointer API usages | [
"cpe:/o:redhat:rhel_mission_critical:6.2::server"
]
| null | null | null | null |
GHSA-25pp-pjqx-3f66 | In the Linux kernel, the following vulnerability has been resolved:net_sched: sch_sfq: don't allow 1 packet limitThe current implementation does not work correctly with a limit ofiproute2 actually checks for this and this patch adds the check in
kernel as well.This fixes the following syzkaller reported crash:UBSAN: array-index-out-of-bounds in net/sched/sch_sfq.c:210:6
index 65535 is out of range for type 'struct sfq_head[128]'
CPU: 0 PID: 2569 Comm: syz-executor101 Not tainted 5.10.0-smp-DEV #1
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
Call Trace:
__dump_stack lib/dump_stack.c:79 [inline]
dump_stack+0x125/0x19f lib/dump_stack.c:120
ubsan_epilogue lib/ubsan.c:148 [inline]
__ubsan_handle_out_of_bounds+0xed/0x120 lib/ubsan.c:347
sfq_link net/sched/sch_sfq.c:210 [inline]
sfq_dec+0x528/0x600 net/sched/sch_sfq.c:238
sfq_dequeue+0x39b/0x9d0 net/sched/sch_sfq.c:500
sfq_reset+0x13/0x50 net/sched/sch_sfq.c:525
qdisc_reset+0xfe/0x510 net/sched/sch_generic.c:1026
tbf_reset+0x3d/0x100 net/sched/sch_tbf.c:319
qdisc_reset+0xfe/0x510 net/sched/sch_generic.c:1026
dev_reset_queue+0x8c/0x140 net/sched/sch_generic.c:1296
netdev_for_each_tx_queue include/linux/netdevice.h:2350 [inline]
dev_deactivate_many+0x6dc/0xc20 net/sched/sch_generic.c:1362
__dev_close_many+0x214/0x350 net/core/dev.c:1468
dev_close_many+0x207/0x510 net/core/dev.c:1506
unregister_netdevice_many+0x40f/0x16b0 net/core/dev.c:10738
unregister_netdevice_queue+0x2be/0x310 net/core/dev.c:10695
unregister_netdevice include/linux/netdevice.h:2893 [inline]
__tun_detach+0x6b6/0x1600 drivers/net/tun.c:689
tun_detach drivers/net/tun.c:705 [inline]
tun_chr_close+0x104/0x1b0 drivers/net/tun.c:3640
__fput+0x203/0x840 fs/file_table.c:280
task_work_run+0x129/0x1b0 kernel/task_work.c:185
exit_task_work include/linux/task_work.h:33 [inline]
do_exit+0x5ce/0x2200 kernel/exit.c:931
do_group_exit+0x144/0x310 kernel/exit.c:1046
__do_sys_exit_group kernel/exit.c:1057 [inline]
__se_sys_exit_group kernel/exit.c:1055 [inline]
__x64_sys_exit_group+0x3b/0x40 kernel/exit.c:1055
do_syscall_64+0x6c/0xd0
entry_SYSCALL_64_after_hwframe+0x61/0xcb
RIP: 0033:0x7fe5e7b52479
Code: Unable to access opcode bytes at RIP 0x7fe5e7b5244f.
RSP: 002b:00007ffd3c800398 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fe5e7b52479
RDX: 000000000000003c RSI: 00000000000000e7 RDI: 0000000000000000
RBP: 00007fe5e7bcd2d0 R08: ffffffffffffffb8 R09: 0000000000000014
R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe5e7bcd2d0
R13: 0000000000000000 R14: 00007fe5e7bcdd20 R15: 00007fe5e7b24270The crash can be also be reproduced with the following (with a tc
recompiled to allow for sfq limits of 1):tc qdisc add dev dummy0 handle 1: root tbf rate 1Kbit burst 100b lat 1s
../iproute2-6.9.0/tc/tc qdisc add dev dummy0 handle 2: parent 1:10 sfq limit 1
ifconfig dummy0 up
ping -I dummy0 -f -c2 -W0.1 8.8.8.8
sleep 1Scenario that triggers the crash:the first packet is sent and queued in TBF and SFQ; qdisc qlen is 1TBF dequeues: it peeks from SFQ which moves the packet to the
gso_skb list and keeps qdisc qlen set to 1. TBF is out of tokens so
it schedules itself for later.the second packet is sent and TBF tries to queues it to SFQ. qdisc
qlen is now 2 and because the SFQ limit is 1 the packet is dropped
by SFQ. At this point qlen is 1, and all of the SFQ slots are empty,
however q->tail is not NULL.At this point, assuming no more packets are queued, when sch_dequeue
runs again it will decrement the qlen for the current empty slot
causing an underflow and the subsequent out of bounds access. | []
| null | 5.5 | null | null |
|
GHSA-h967-6jx6-2r3h | Memory overwriting vulnerability in the security module. Successful exploitation of this vulnerability may affect availability. | []
| null | 7.5 | null | null |
|
GHSA-mghp-6344-hxqp | NetApp SnapCenter Server versions 1.1 through 2.x are susceptible to a Cross-Site Request Forgery (CSRF) vulnerability which could be used to cause an unintended authenticated action in the user interface. | []
| null | null | 8.8 | null |
|
GHSA-cgcp-gvp8-4fpv | The Contact Form 7 Email Add on plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1.9 via the cf7_email_add_on_add_admin_template() function. This makes it possible for authenticated attackers, with Contributor-level access and above, to include and execute arbitrary PHP files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where php files can be uploaded and included. | []
| null | 8.8 | null | null |
|
CVE-2022-49928 | SUNRPC: Fix null-ptr-deref when xps sysfs alloc failed | In the Linux kernel, the following vulnerability has been resolved:
SUNRPC: Fix null-ptr-deref when xps sysfs alloc failed
There is a null-ptr-deref when xps sysfs alloc failed:
BUG: KASAN: null-ptr-deref in sysfs_do_create_link_sd+0x40/0xd0
Read of size 8 at addr 0000000000000030 by task gssproxy/457
CPU: 5 PID: 457 Comm: gssproxy Not tainted 6.0.0-09040-g02357b27ee03 #9
Call Trace:
<TASK>
dump_stack_lvl+0x34/0x44
kasan_report+0xa3/0x120
sysfs_do_create_link_sd+0x40/0xd0
rpc_sysfs_client_setup+0x161/0x1b0
rpc_new_client+0x3fc/0x6e0
rpc_create_xprt+0x71/0x220
rpc_create+0x1d4/0x350
gssp_rpc_create+0xc3/0x160
set_gssp_clnt+0xbc/0x140
write_gssp+0x116/0x1a0
proc_reg_write+0xd6/0x130
vfs_write+0x177/0x690
ksys_write+0xb9/0x150
do_syscall_64+0x35/0x80
entry_SYSCALL_64_after_hwframe+0x46/0xb0
When the xprt_switch sysfs alloc failed, should not add xprt and
switch sysfs to it, otherwise, maybe null-ptr-deref; also initialize
the 'xps_sysfs' to NULL to avoid oops when destroy it. | []
| null | 5.5 | null | null |
CVE-2006-7149 | Multiple cross-site scripting (XSS) vulnerabilities in Mambo 4.6.x allow remote attackers to inject arbitrary web script or HTML via (1) the query string to (a) index.php, which reflects the string in an error message from mod_login.php; and the (2) mcname parameter to (b) moscomment.php and (c) com_comment.php. | [
"cpe:2.3:a:mambo:mambo:4.6:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mambo:mambo:4.6:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mambo:mambo:4.6.1:*:*:*:*:*:*:*"
]
| null | null | null | 4.3 |
|
CVE-2014-4014 | The capabilities implementation in the Linux kernel before 3.14.8 does not properly consider that namespaces are inapplicable to inodes, which allows local users to bypass intended chmod restrictions by first creating a user namespace, as demonstrated by setting the setgid bit on a file with group ownership of root. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
]
| null | null | null | 6.2 |
|
CVE-2020-3645 | Firmware will hit assert in WLAN firmware If encrypted data length in FILS IE of reassoc response is more than 528 bytes in Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking in IPQ6018, IPQ8074, Kamorta, Nicobar, QCA6390, QCA8081, QCN7605, QCS404, QCS405, QCS605, Rennell, SC7180, SC8180X, SDA845, SDM670, SDM710, SDM845, SDM850, SM6150, SM7150, SM8150, SXR1130, SXR2130 | [
"cpe:2.3:o:qualcomm:ipq6018_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq6018:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq8074_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq8074:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:kamorta_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:kamorta:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:nicobar_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:nicobar:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6390_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6390:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca8081:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs404_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs404:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs405_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs405:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:rennell_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:rennell:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sc7180_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sc7180:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sc8180x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sc8180x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sda845_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sda845:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm670_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm670:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm710_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm710:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm850_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm850:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm6150_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm6150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm7150_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm7150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm8150_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm8150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sxr1130_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sxr1130:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sxr2130_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sxr2130:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn7605_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn7605:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs605_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs605:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm845_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm845:-:*:*:*:*:*:*:*"
]
| null | 7.5 | null | 7.8 |
|
GHSA-2gj7-v6cw-hpq6 | Cross-site scripting (XSS) vulnerability in frontend/x/htaccess/changepro.html in cPanel 10.9.1 allows remote attackers to inject arbitrary web script or HTML via the resname parameter. | []
| null | null | null | null |
|
CVE-2024-45993 | Giflib Project v5.2.2 is vulnerable to a heap buffer overflow via gif2rgb. | [
"cpe:2.3:a:giflib_project:giflib:*:*:*:*:*:*:*:*"
]
| null | 6.5 | null | null |
|
CVE-2021-46973 | net: qrtr: Avoid potential use after free in MHI send | In the Linux kernel, the following vulnerability has been resolved:
net: qrtr: Avoid potential use after free in MHI send
It is possible that the MHI ul_callback will be invoked immediately
following the queueing of the skb for transmission, leading to the
callback decrementing the refcount of the associated sk and freeing the
skb.
As such the dereference of skb and the increment of the sk refcount must
happen before the skb is queued, to avoid the skb to be used after free
and potentially the sk to drop its last refcount.. | [
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"
]
| null | 8.4 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.